Recent years have seen a significant development in systems that utilize web-based and mobile-based applications to manage user accounts and digital information for user accounts in real time. For example, many conventional applications provide various graphical user interfaces (GUIs) to present digital information and options to client devices. This often includes determining or calculating account-specific values or limits and communicating such information via the web-based and mobile-based applications. Although conventional systems attempt to determine and communicate digital information to user accounts on web-based and mobile-based applications, such conventional systems face a number of technical shortcomings, particularly with regard to the flexibility and efficiency of user interfaces that display obscure, non-transparent outputs from computer-based models and other user transactions.
For example, many conventional systems utilize computer-based models that act as a black box mechanism and, as a result, provide outputs that are difficult to navigate within a GUI. For instance, conventional systems oftentimes utilized computer-based models that analyze a large number of variables and, without providing an understandable reasoning, generate a prediction or determination. Accordingly, many conventional systems are limited to rigid GUIs that are unable to provide insight into both determinations and how future or predicted actions will impact determinations of the computer-based models.
In addition, many conventional systems inefficiently utilize computational resources due to computer-based model outputs and the resulting inflexible user interfaces. For example, conventional systems often require navigation between multiple user interfaces to understand an output of a computer-based model and also to understand future actions (or behaviors) that would yield a particular outcome from the computer-based model. Indeed, in addition to receiving an obscure output from a computer-based model, many conventional systems fail to accurately visualize outputs from the computer-based models while also providing insight into the output within limited screen spaces of GUIs in mobile devices.
Furthermore, conventional systems oftentimes are also unable to provide insight into impacts on user account values resulting from various digital transactions (when the digital transactions occur across multiple connected accounts). For example, conventional systems oftentimes are unable to efficiently present (or display) effects of a digital transaction in a particular function or account related to a user across multiple connected user accounts within a single graphical user interface (e.g., within a limited screen space of a mobile device). In some cases, such conventional systems also require substantial, inefficient navigation between multiple user interfaces to determine (or understand) an effect of a digital transaction on one or more connected accounts of a user.
Additionally, conventional systems are often unable to track digital transactions over multiple connected accounts and/or across user account values applicable to the connected accounts. In particular, many conventional systems often inaccurately authorize digital transactions when the digital transaction affects multiple connected accounts of a user. Furthermore, in many instances, many conventional systems are unable to quickly check digital transactions when the digital transaction affects multiple connected accounts of a user in real time (or near-real time). In particular, due to inaccuracies in authorizations and slowdowns in authorizations, many conventional systems are unable to authorize digital transactions that are dependent on multiple connected accounts or account values in real time and/or near-real time.
Furthermore, many conventional systems are unable to accurately determine account-specific values or limits through computer models. For example, conventional systems fail to accurately determine account-specific limits that accurately reflect underlying risks based on numerous factors or variables corresponding to digital accounts.
This disclosure describes one or more embodiments of systems, computer-implemented methods, and non-transitory computer readable media that provide benefits and solve one or more of the foregoing or other problems by dynamically determining, tracking, modifying, and displaying a base limit value across digital transactions detected on multiple connected accounts corresponding to a user account. For instance, the disclosed systems can utilize a variety of machine learning models and a base limit value model to generate user interface elements that transparently and efficiently present current and future base limit values for user accounts reflecting a value limit for excess account withdrawals. Furthermore, the disclosed systems can utilize a transaction value limit (based on one or more digital deposit transactions), in a secured credit account, to enable and authorize digital transactions (e.g., in relation to the transaction value limit). In addition, the disclosed systems can detect one or more digital transactions and utilize the universal base limit value (that is accessible between multiple connected accounts) to enable a digital transaction that exceeds a transaction value limit. Indeed, the disclosed systems can efficiently and accurately display updates to the base limit value and the transaction value limit based on digital transactions across multiple connected accounts. Additionally, the disclosed systems can also accurately and quickly authorize digital transactions based on tracked updates to the base limit value across the multiple connected accounts and the transaction value limit.
The detailed description is described with reference to the accompanying drawings in which:
The disclosure describes on or more embodiments of a dynamic base limit value allocation system that dynamically determines and displays a base limit value in relation to digital transactions detected on multiple connected accounts corresponding to a user account (utilizing a transaction value limit). In one or more implementations, the dynamic base limit value allocation system utilizes a variety of machine learning models and a base limit value model to generate user interface elements that transparently and efficiently present current and future base limit values for user accounts (that is accessible to multiple connected accounts). Furthermore, the dynamic base limit value allocation system also, upon detecting a digital transaction, utilizes the base limit value to fulfill a remainder between a transaction value of the digital transaction and a transaction value limit corresponding to a particular transaction account from the multiple connected accounts. Indeed, the dynamic base limit value allocation system can efficiently display modifications to the base limit value (based on digital transactions across the multiple connected accounts) and a modified transaction value limit for a particular transaction account. Furthermore, the dynamic base limit value allocation system can also quickly and accurately authorize a digital transaction in comparison to the universally accessible base limit value and the transaction value limit.
Indeed, the dynamic base limit value allocation system can utilize various machine learning models and a dynamic base limit value model to generate user interface elements that transparently and efficiently present determined base limit values, subsequent base limit values, and user activity conditions within a graphical user interface. For example, the dynamic base limit value allocation system can select an activity machine learning model from multiple activity machine learning models utilizing a user activity duration corresponding to a user account. In addition, the dynamic base limit value allocation system can generate an activity score for the user account by utilizing the selected activity machine learning model and user activity data of the user account.
Furthermore, the dynamic base limit value allocation system can determine a base limit value from the activity score using a base limit value model. Moreover, the dynamic base limit value allocation system can also utilize the base limit value model to determine a subsequent base limit value and user activity conditions that achieve the subsequent base limit value. Additionally, in one or more embodiments, the dynamic base limit value allocation system generates and displays user interface elements to transparently and efficiently present base limit values (and subsequent base limit values and user activity conditions).
Moreover, the dynamic base limit value allocation system can utilize a transaction value limit to facilitate digital transactions. For example, the dynamic base limit value allocation system can generate and display a transaction value limit utilizing one or more detected deposit transactions within a secured credit account. Furthermore, in one or more instances, the dynamic base limit value allocation system detects a digital transaction corresponding to the secured credit account to authorize (e.g., authorize and/or reject) the digital transaction. Moreover, the dynamic base limit value allocation system can utilize the transaction value limit to fulfill a transaction value corresponding to the digital transaction and display a modified transaction value limit.
In addition, the dynamic base limit value allocation system can utilize a universally accessible (via multiple connected transaction accounts) base limit value with the transaction value limit to enable one or more digital transactions within the secured credit account. For example, upon detecting a digital transaction corresponding to the secured credit account exceeds a transaction value limit, the dynamic base limit value allocation system utilizes the base limit value to fulfill a remainder between a transaction value of the digital transaction and the transaction value limit. In addition, the dynamic base limit value allocation system can modify the base limit value and the transaction value limit in response to fulfilling the digital transaction and display the modified base limit value and the modified transaction value limit.
Additionally, in one or more instances, the dynamic base limit value allocation system displays the modified base limit value across multiple connected accounts. Indeed, by updating the modified base limit value, the dynamic base limit value allocation system can utilize an accurate (modified) base limit value to utilize the modified base limit value to fulfill various digital transactions in the multiple connected accounts. Indeed, the dynamic base limit value allocation system can display an updated modified base limit value (in addition to the transaction value limit for the secured credit account) when the base limit value is utilized in one or more other connected transaction accounts.
Furthermore, in some embodiments, the dynamic base limit value allocation system also utilizes the transaction value limit and the base limit value to authorize one or more digital transactions (accurately and quickly). For instance, upon detecting a digital transaction, the dynamic base limit value allocation system can compare the transaction value of the digital transaction to a combination of the universally accessible base limit value and the transaction value limit. Indeed, upon determining that the transaction value of the digital transaction exceeds the combination of the universally accessible base limit value and the transaction value limit, the universally accessible base limit value and the transaction value limit can reject the digital transaction. In addition, upon determining that the transaction value of the digital transaction does not exceed the combination of the universally accessible base limit value and the transaction value limit, the universally accessible base limit value and the transaction value limit can authorize the digital transaction.
In one or more implementations, the dynamic base limit value allocation system utilizes the base limit value to fulfill a remainder between a transaction value of the digital transaction and the transaction value limit in a secured credit account in a two-phase process. In particular, upon detecting a transaction with a transaction value that exceeds the transaction value limit of the secured credit account, the dynamic base limit value allocation system can determine that the base limit value accessible by the user account covers the excess of the transaction value. In response to this determination, the dynamic base limit value allocation system can authorize the transaction and reserve a portion of the base limit value to cover the excess of the transaction value. Furthermore, at the time (or near the time) at which a user payment is processed for a balance on the secured credit account (e.g., using the transaction value limit generated from user received deposits in a secured deposit account of the secured credit account), the dynamic base limit value allocation system can utilize the reserved portion of the base limit value to cover the excess balance on the secured credit account.
The dynamic base limit value allocation system can provide numerous advantages, benefits, and practical applications relative to conventional systems. For example, unlike conventional systems that often utilize computer-based models that provide outputs in difficult to navigate GUIs, the dynamic base limit value allocation system can utilize various machine learning models and base limit value models to determine and provide current and future base limit values together with information for achieving the future base limit values. In certain instances, the dynamic base limit value allocation system can generate flexible user interfaces that provide transparency and insight into a combined machine learning model and base value model that utilizes various variables to determine base limit values, subsequent base limit values, and user activity conditions to achieve the subsequent base limit values. By providing such transparency, the dynamic base limit value allocation system can generate increasingly robust and flexible GUIs to provide practical applications from outputs and behaviors of computer-based base limit value model.
In addition to GUI flexibility, the dynamic base limit value allocation system can also generate GUIs to visualize model outputs and improve computing efficiency. In particular, by generating and displaying base limit values, subsequent base limit values, and user activity conditions to achieve subsequent base limit values, the dynamic base limit value modification system reduces the number of navigational steps required within a GUI in a limited screen space of a mobile device. Accordingly, the dynamic base limit value allocation system efficiently utilizes screen space and also utilizes less computational resources due to the reduction in navigation between different user interfaces (and/or information sources) to determine or interpret the outputs of a base limit value model.
Furthermore, the dynamic base limit value allocation system also flexibly and efficiently displays dynamic base limit values that change resulting from various digital transactions across multiple connected accounts (of a user). To illustrate, unlike conventional systems that are unable to determine and display effects of digital transactions in relation to multiple connected accounts, the dynamic base limit value allocation system can easily and efficiently determine an effect that a digital transaction from one part of multiple connected accounts has on a base limit value (and a transaction value limit). Furthermore, the dynamic base limit value allocation system can also display the changes in the base limit value (and the transaction value limit) within a single graphical user interface to effortlessly communicate an effect the base limit value has on multiple connected accounts of a user.
Moreover, in contrast to conventional systems that require navigation between multiple UIs to determine the effects on user account values due to transactions in multiple connected accounts, the dynamic base limit value allocation system can display modifications to base limit values and transaction limit values within a single graphical user interface. In one or more instances, by displaying modifications to the base limit values and transaction limit values in a single graphical user interface, the dynamic base limit value allocation system efficiently utilizes screen space and also utilizes less computational resources due to the reduction in navigation between different user interfaces (and/or information sources) to determine or interpret effects of digital transactions across multiple connected accounts.
Likewise, the dynamic base limit value allocation system also reduces the number of inquiries and/or electronic communications that are taken to identify information regarding a base limit value (or other output) of a base limit value model and/or base limit value modifiers from a user account. In particular, the dynamic base limit value allocation system can generate GUIs (or a single GUI) that determine and display the base limit value, the user activity conditions that contribute to the determined base limit value, subsequent base limit values, digital transactions, transaction value limit modifications, and/or digital actions related to the base limit value. Accordingly, additional electronic communications to obtain such information is reduced. As a result, the dynamic base limit value allocation system improves computational efficiency of implementing computing devices and networks by reducing the number of electronic communications and the accompanying network bandwidth.
Moreover, unlike conventional systems that are unable to accurately and quickly track digital transactions over multiple connected accounts and/or across user account values applicable to the connected accounts, the dynamic base limit value allocation system also can enable accurate and quick tracking that accounts for changes across multiple connected accounts and/or user account values. For instance, the dynamic base limit value allocation system automatically modifies a base limit value (and account specific limits) corresponding to a user account when digital transactions occur across multiple transaction accounts of a user account such that the base limit value accurately reflects real time (or near-real time) transactions. In addition, due to the accuracy of the automatically modified base limit value, the dynamic base limit value allocation system can accurately and quickly authorize digital transactions that depend on the base limit value and other account specific limits (e.g., a transaction value limit). Indeed, upon detecting a digital transaction, the dynamic base limit value allocation system can quickly (e.g., in real time and/or near-real time) and accurately check the digital transaction against the dynamically changing base limit value (that accounts for actions in multiple connected accounts) and a transaction value limit specific to an account in which the digital transaction occurs to authorize the digital transaction.
In addition, the dynamic base limit value allocation system can accurately determine account-specific values reflecting risk associated with user accounts. More specifically, the dynamic base limit value allocation system utilizes multiple activity machine learning models that are specifically trained for a category of user accounts. Indeed, by utilizing and emphasizing a varying set of user activity data variables for different types of user accounts, the dynamic base limit value allocation system improves the accuracy of determined metrics associated with a diverse range of user accounts.
As indicated by the foregoing discussion, the present disclosure utilizes a variety of terms to describe features and advantages of the dynamic base limit value allocation system. As used herein, the term “machine learning model” refers to a computer model that can be trained (e.g., tuned or learned) based on inputs to approximate unknown functions and corresponding outputs. As an example, a machine learning model can include, but is not limited to, a neural network (e.g., a convolutional neural network, recurrent neural network, or deep learning model), a decision tree (e.g., a gradient boosted decision tree, a random forest decision tree, a decision tree with variable or output probabilities), and/or a support vector machine.
Furthermore, as used herein, the term “activity machine learning model” refers to a machine learning model that can be trained to predict (or determine) an activity score for a user. In particular, an activity machine learning model can analyze input user account activity data corresponding to a user account to generate (or predict) an activity score for the user account. In some embodiments, the activity machine learning model includes a decision tree that generate probabilities for activity scores from various variables corresponding to various characteristics from user account activity data. Indeed, in one or more embodiments, the dynamic base limit value allocation system utilizes the probabilities corresponding to the various activity scores to select (or determine) an activity score for the user account. Additionally, in one or more embodiments, the dynamic base limit value allocation system can train multiple activity machine learning models to specifically generate activity scores for a category of user accounts (e.g., based on account activity duration).
As used herein, the term “activity score” refers to a value indicating a rating for a user account. In some embodiments, the activity score indicates a risk level corresponding to a user account. For example, the dynamic base limit value allocation system can utilize the activity score of a user account generated from an activity machine learning model to determine a base limit value utilization risk level for the user account. Indeed, the activity score of a user account can indicate the likelihood of a user account failing to pay a base limit value amount utilized by the user account. In some instances, the dynamic base limit value allocation system can utilize an activity score to determine a risk segment of a user account.
As used herein, the term “user activity data” refers to information (or data) associated with interactions of a user with the dynamic base limit value allocation system (or a corresponding client device application). For example, user activity data can include actions, durations corresponding to actions, frequencies of actions, digital transactions, account values, and/or other representations of interactions of a user corresponding to a user account on a client application (e.g., operating a client application as shown in
Furthermore, as used herein, the term “user digital action” refers to an electronic activity or digital change within a user account or within one or more systems in relation to the user account in reaction to a digital user interaction of a user corresponding to the user account via a client application and/or a third party system. For example, a user digital action can include one or more digital network transactions in relation to the user account, a deposit and/or withdrawal transaction in relation to the user account, configuration of an automatic digital network transaction (e.g., direct deposit settings, auto payment settings) in relation to the user account. As another example, a user digital action can include user interactions to initiate or create accounts and/or account types (e.g., opening a savings account, opening a credit card account, opening a secured credit account), initiating and/or completing various user communications with one or more other user accounts (e.g., a network transaction with another user account, sending a user account referral link). In some cases, the dynamic base limit value allocation system detects various user digital actions from various user activity data (as described above).
As used herein, the term “digital transaction” refers to an electronic communication to facilitate (or request) utilization of a user account value (e.g., a fund). Indeed, a digital transaction can include an electronic communication to initiate a payment. Moreover, as used herein, the term “credit transaction” refers to a digital transaction within a credit account (e.g., a credit card account, a secured credit card account). Indeed, a credit transaction can include an electronic communication to initiate a payment utilizing a line of credit (or a user deposited secured line of credit as a transaction value limit) corresponding to the user account.
As used herein, the term “base limit value” refers to a numerical value that represents an excess utilization buffer for a user account. In particular, the base limit value can include a numerical value that represents an amount that a user account is permitted to obtain or transact in excess of an amount belonging to the user account. As an example, a base limit value can include a monetary overdraft amount or a line of credit. In addition, as used herein, the term “available base limit value” refers to a base limit value that is accessible for a user account (e.g., across multiple transaction and/or other accounts connected to the user account). In particular, the available base limit value can include the base limit value and/or a modified base limit value determined from the base limit value (and one or more digital transactions across multiple transaction and/or other accounts connected to the user account).
As used herein, the term “user activity condition” refers to a benchmark action from a user account that causes a change in a base limit value corresponding to the user account. In particular, the user activity condition can include a conditional action that upon performance from a user account results in a change (or assignment) of a base limit value for the user account. As an example, the user activity condition can include a deposit transaction activity (e.g., a user account transaction that adds a monetary value within the user account), a deposit transaction amount, a frequency of a deposit transaction, and/or a user-to-user transaction activity. In some embodiments, the user activity condition can include a user activity condition tier that indicates a range or level of user activity corresponding to the user account. For instance, the user activity condition tier can include a deposit transaction activity tier that indicates a range of deposit transaction amounts corresponding to a user account (e.g., $0 to $300, $301 to $700, $1801 to $2900 in deposit transaction amounts).
As used herein, the term “base limit value model” refers to a model that determines (and/or outputs) a base limit value for a user account from an activity score and/or user activity data. For example, a base limit value model can include a mapping of information between user activity scores, user activity conditions, and base limit values. In some embodiments, the base limit value model includes a machine learning model and/or a model (or representation) generated through a machine learning model that maps user activity scores, user activity conditions, and base limit values to output base limit values based on input activity scores and/or other user activity data.
In some instances, a base limit value model includes a base limit value matrix. For example, a base limit value matrix can include activity scores and user activity conditions that intersect to reference base limit values. In addition, a base limit value model can include a base limit value tiered data table. For instance, a base limit value tiered data table can include base limit values and a set of user activity conditions that achieve subsequent base limit values in the tiered data table.
Furthermore, as used herein, the term “secured credit account” (sometimes referred to as a “secured transaction account” or a “secured credit card”) refers to a transaction user account that facilitates one or more digital transactions in relation to a transaction value limit. In particular, a secured credit account can include a user account that establishes a transaction value limit from one or more deposits (e.g., checks, direct deposits, wire transfers, automated clearing house (ACH) transactions). Indeed, in one or more instances, a secured credit account enables (or facilitates) a line of credit based on a transaction value limit to authorize (e.g., authorize and/or reject) one or more digital transactions and fulfill the one or more digital transactions utilizing a transaction value limit. In one or more cases, a secured credit account includes a credit card account with a secured line of credit (e.g., a transaction value limit) established through one or more user account deposit transactions.
As used herein, the term “transaction value limit” refers to a numerical value that represents an accessible amount for one or more digital transactions within a particular transaction account (e.g., a secured credit account). For example, a transaction value limit can include a numerical value (or amount) established through one or more deposit transactions corresponding to a user account. Indeed, a transaction value limit can include a limiter on an available amount to facilitate one or more digital transactions.
In some cases, a transaction value limit includes a secured line of credit value. For example, the dynamic base limit value allocation system can detect a deposited value from one or more deposit transactions and utilize the deposited value to establish a secured deposit account balance (as a transaction value limit) that sets a limit on utilization of a credit transaction account (e.g., a credit card). Moreover, the dynamic base limit value allocation system can receive one or more digital transactions (e.g., credit card transactions) and utilize the secured deposit account balance (e.g., the transaction value limit) to settle a credit card account balance. In some implementations, the dynamic base limit value allocation system can deny digital transactions that exceed the transaction value limit (and a base limit value).
Turning now to the figures,
Although
As shown in
Indeed, the inter-network facilitation system 104 can include a system that includes the dynamic base limit value allocation system and that facilitates financial transactions and digital communications across different computing systems over one or more networks. For example, an inter-network facilitation system manages credit accounts, secured accounts, and other accounts for a single account registered within the inter-network facilitation system. In some cases, the inter-network facilitation system is a centralized network system that facilitates access to online banking accounts, credit accounts, and other accounts within a central network location. Indeed, the inter-network facilitation system can link accounts from different network-based financial institutions to provide information regarding, and management tools for, the different accounts. For example, as shown in
Furthermore, in accordance with one or more implementations described herein, the dynamic base limit value allocation system 106 can generate and display a base limit value and a transaction value limit for a user account (e.g., in relation to a secured credit account with one or more digital transactions). For example, the dynamic base limit value allocation system 106 can utilize a variety of machine learning models and a base limit value model to generate user interface elements that display a base limit value that changes based on digital transactions detected on multiple connected accounts corresponding to a user account (utilizing a transaction value limit). Additionally, the dynamic base limit value allocation system 106 can, upon detecting a digital transaction, utilize the base limit value to fulfill a remainder between a transaction value of the digital transaction and a transaction value limit corresponding to a secured credit account from the multiple connected accounts. Moreover, the dynamic base limit value allocation system 106 can display modifications to the base limit value (based on digital transactions across the multiple connected accounts) and a modified transaction value limit for the secured credit account. Additionally, the dynamic base limit value allocation system 106 can also authorize a digital transaction in comparison to the universally accessible base limit value and the transaction value limit.
As also illustrated in
Furthermore, as shown in
In certain instances, the client device 110 corresponds to one or more user accounts (e.g., user accounts stored at the server device(s) 102). For instance, a user of a client device can establish a user account with login credentials and various information corresponding to the user. In addition, the user accounts can include a variety of information regarding financial information and/or financial transaction information for users (e.g., name, telephone number, address, bank account number, credit amount, debt amount, financial asset amount), payment information, transaction history information, and/or contacts for financial transactions. In some embodiments, a user account can be accessed via multiple devices (e.g., multiple client devices) when authorized and authenticated to access the user account within the multiple devices.
The present disclosure utilizes client devices to refer to devices associated with such user accounts. In referring to a client (or user) device, the disclosure and the claims are not limited to communications with a specific device, but any device corresponding to a user account of a particular user. Accordingly, in using the term client device, this disclosure can refer to any computing device corresponding to a user account of an inter-network facilitation system.
As further shown in
As mentioned above, the dynamic base limit value allocation system 106 determines and displays a base limit value in relation to digital transactions detected on multiple connected accounts corresponding to a user account (utilizing a transaction value limit). For instance,
As shown in act 202 of
Furthermore, as shown in act 204 of
As also shown in act 206 of
Moreover, as shown in act 208 of
Additionally, as shown in act 210 of
As previously mentioned, the dynamic base limit value allocation system 106 can select an activity machine learning model for a user account based on characteristics of the user account. For example,
As shown in
As further shown in
For example, the dynamic base limit value allocation system 106 can determine that the user activity duration 302 satisfies a particular user activity duration range corresponding to an activity machine learning model from the multiple activity machine learning models 304. Subsequently, the dynamic base limit value allocation system 106 can select the activity machine learning model that corresponds to the particular user activity duration range as the activity machine learning model for the user account.
Although one or more embodiments describe the dynamic base limit value allocation system 106 utilizing a user activity duration to select the activity machine learning model, the dynamic base limit value allocation system 106 can utilize various types of user account data (or characteristics) to select an activity machine learning model. For example, the dynamic base limit value allocation system 106 can utilize an activity (or usage) time corresponding to a user account (e.g., the amount of time that a user account is actively online within a client application of the inter-network facilitation system), an account value, an amount of time with a threshold amount of direct deposit value, a number of financial account types, types of financial accounts, and/or other user account characteristics (user age, user authentication security settings, geographic location). Furthermore, although one or more embodiments associates activity machine learning models with user activity duration ranges, the dynamic base limit value allocation system 106 can associate the activity machine learning models to various types of user account data (or characteristics) with various types of categorical references (e.g., a list or mapping of types, a specific value, a threshold).
Indeed, in one or more embodiments, the dynamic base limit value allocation system 106 trains each activity machine learning model from the multiple activity machine learning models for a specific set of user accounts (e.g., based on the categorization with the user account data or characteristics such as user activity duration). As an example, the dynamic base limit value allocation system 106 trains an activity machine learning model to generate an accuracy score for a user account that corresponds to a user activity duration associated with the activity machine learning model. By training the activity machine learning model for user accounts within a user activity duration range, the dynamic base limit value allocation system 106 generates and selects activity machine learning models that are accurate for a specific grouping of user accounts and the resulting activity scores are more accurate indicators of risk for the specific grouping of user accounts.
As an example, the dynamic base limit value allocation system 106 can train a first activity machine learning model to generate activity scores for user accounts utilizing a first set of user activity data. Moreover, the dynamic base limit value allocation system 106 can train a second activity machine learning model to generate activity scores for user accounts utilizing a second set of user activity data. Indeed, the first set of user activity data can include a combination of user activity data variables that are different from the second set of user activity data. By doing so, the dynamic base limit value allocation system 106 can train activity machine learning models to emphasize user activity data that more effectively determines a risk (or other metric) of user accounts belonging to a group of user accounts in a particular grouping (e.g., based on user activity duration).
In one or more embodiments, the dynamic base limit value allocation system 106 trains an activity machine learning model utilizing historical user activity data from user accounts. In particular, the dynamic base limit value allocation system 106 utilizes historical user activity data from a user account to select an activity machine learning model and generate a predicted activity score for the user account. Then, the dynamic base limit value allocation system 106 can determine a loss function by comparing the predicted activity score to historical behaviors of the user account (as ground truth data). For example, the dynamic base limit value allocation system 106 can identify the number of times that the user account has paid back a utilized base limit value and/or the number of unpaid utilized base limit values as ground truth data. Then, the dynamic base limit value allocation system 106 can compare the ground truth data to the generated activity score to calculate a loss that indicates the accuracy of the activity score for the particular user. For example, the dynamic base limit value allocation system 106 can utilize a loss function such as, but not limited to, an L1 loss, L2 loss, mean square error, classification loss, and/or cross entropy loss.
In some embodiments, the dynamic base limit value allocation system 106 utilizes third party metric information of user accounts to generate a loss (or determine an accuracy) for a generated activity score from an activity machine learning model. For example, the dynamic base limit value allocation system 106 can receive (or identify) a fraud (or risk) score for a user account from a third party source as the metric information of the user account. Indeed, a fraud (or risk) score can indicate whether a user account is associated with fraudulent activity and/or negative credit reports. Then, the dynamic base limit value allocation system 106 can compare the fraud (or risk) score to the activity score generated by the activity machine learning model to determine an accuracy of the activity machine learning model (e.g., a loss function).
Furthermore, the dynamic base limit value allocation system 106 can utilize a loss value determined from a predicted (or generated) activity score of a user account to train an activity machine learning model. In particular, in one or more embodiments, the dynamic base limit value allocation system 106 trains an activity machine learning model based on a loss value by adjusting or learning parameters of the activity machine learning model (e.g., back propagation), adjusting weights provided to various user activity data variables, and/or modifying the user activity data variables utilized for the activity machine learning model. In some embodiments, the dynamic base limit value allocation system 106 adjusts (or modifies) the risk values (or scores) associated with various nodes in an activity score decision tree model based on the loss values.
As mentioned above, the dynamic base limit value allocation system 106 can generate an activity score for a user account utilizing an activity machine learning model. For example,
As illustrated in
In addition, the dynamic base limit value allocation system 106 can utilize a duration of satisfying a threshold account value from a user account. In particular, the duration of satisfying a threshold account value can include an amount of time (e.g., days, months, and/or years) that a user account has maintained an account value (e.g., an account balance) that is equal to or above a particular threshold account value. In addition, the dynamic base limit value allocation system 106 can utilize a historical base limit value utilization. In one or more embodiments, the dynamic base limit value allocation system 106 can utilize the historical base limit value utilization to indicate the amount, frequency, and times (e.g., dates, times of day) that a user account has utilized a provided base limit value. Additionally, the dynamic base limit value allocation system 106 can utilize base limit payoff times from a user account that indicates times (e.g., dates, times of day) of transactions that pay a utilized base limit value amount within a user account.
Furthermore, the dynamic base limit value allocation system 106 can utilize historical flagged activities as user account activity data for an activity machine learning model. As an example, a historical flagged activity can include flags (or notes) corresponding to a user account that indicates various identified activities of the user account such as, but not limited to, a flag indicating fraudulent activity, a flag indicating historical bans and/or blacklists of a user account, and/or previous penalties associated with a user account. In addition, the historical flagged activities can include third party reports on a user account that identifies (or indicates) fraudulent, malicious, and/or other security related activities or actions taken by a user of the user account.
Additionally, the dynamic base limit value allocation system 106 can also utilize historical transaction activities as user account activity data. In some embodiments, the dynamic base limit value allocation system 106 identifies previous transactions with merchants, services, persons, and/or other users of the inter-network facilitation system as historical transaction activities. In certain instances, the dynamic base limit value allocation system 106 utilizes a transaction type (e.g., utilities, shopping, travel, fitness) associated with the transaction as part of the historical transaction activity. In some cases, the dynamic base limit value allocation system 106 utilizes various combinations of at least the timing corresponding to the historical transaction activity (e.g., dates, time of days, time), the recipient or sender of the transactions, and/or transaction amounts as part of historical transaction activities. In addition, the dynamic base limit value allocation system 106 can also utilize a number of declined transactions as user account activity data. For example, the dynamic base limit value allocation system 106 a number of declined transactions to indicate a number of times a user account has had a declined transaction (e.g., due to insufficient funds, fraud alerts).
Although one or more embodiments describe the dynamic base limit value allocation system 106 utilizing particular types of user account activity data, the dynamic base limit value allocation system 106 can utilize various user account activity data variables within an activity machine learning model to generate an activity score. In particular, the dynamic base limit value allocation system 106 can utilize numerous variables (e.g., hundreds, thousands) corresponding to various categories such as, but not limited to, activity logs of a user account sessions, user account balances, user account transactions, user account income and/or occupation information, geographic location information, financial products (e.g., credit cards, loans) associated with the user account, contact information associated with a user account (e.g., phone numbers, email addresses), user account spending, and/or transaction behaviors.
As mentioned above, the dynamic base limit value allocation system 106 can train multiple activity machine learning models to accurately generate activity scores for a specific category of user accounts. Indeed, the dynamic base limit value allocation system 106 can train an activity machine learning model to emphasize (or function) for a specific set of user account activity data variables. In particular, the dynamic base limit value allocation system 106 can determine a set of user account activity data variables to utilize for a particular activity machine learning model (e.g., based on a duration of activity from a user account or other characteristic of a user account). In some cases, the dynamic base limit value allocation system 106 can provide (or assign) weights to particular user account activity data variables based on the duration of activity from a user account or other characteristic of a user account (e.g., for the selected activity machine learning model).
As shown in
To illustrate, the dynamic base limit value allocation system 106 can utilize an activity score decision tree to determine whether data of a user account (e.g., activity data) satisfies a threshold for a first node of the decision tree. Based on whether the user account satisfies the threshold for the first node, the dynamic base limit value allocation system 106 can track a risk score for the user account and further traverse to subsequent nodes to check other user activity data variables. Indeed, at each node of the decision tree, the dynamic base limit value allocation system 106 can adjust the risk score of the user account based on whether the user account activity data satisfies the thresholds for the user activity data variable at the particular node.
As an example, at a first node of the decision tree, the dynamic base limit value allocation system 106 can identify whether an account balance of a user account has been above a threshold balance amount for a threshold number of days. In some instances, upon determining that the account balance of the user account does satisfy the threshold balance amount and the threshold number of days, the dynamic base limit value allocation system 106 can subsequently traverse to a node of the activity score decision tree that does not increase the risk score of the user account. On the other hand, upon determining that the account balance of the user account does not satisfy the threshold balance for the threshold number of days, the dynamic base limit value allocation system 106 can subsequently traverse to a node of the activity score decision tree that increases the risk score of the user account. In addition, the dynamic base limit value allocation system 106 can further analyze another user activity data variable at the subsequent nodes to further determine increases (and/or decreases) in a risk score for the user account.
In one or more embodiments, the dynamic base limit value allocation system 106 outputs an activity score that indicates a numerical value within a predetermined range based on the risk score (or another value) of the decision tree of the activity machine learning model. For instance, the dynamic base limit value allocation system 106 can utilize an activity score value between zero and six. In particular, the dynamic base limit value allocation system 106 can utilize the activity score value of zero to six to indicate varying risk levels corresponding to the user account (e.g., via a risk score from the activity score decision tree). For instance, an activity score of zero can be associated with a high risk level (e.g., a high risk percentage) and an activity score of six can be associated with a low risk level (or vice versa). Indeed, the activity score can indicate a risk level of a user account failing to repay a utilized base limit value (or failing to reinstate an account balance amount that satisfies the base limit value).
In some embodiments, the activity score can be various numerical values (e.g., zero to nine) and/or other types of data to indicate a category (or magnitude) of risk of a user account. For example, the activity score can include an alphabetical grade, a percentage, class, and/or a label. In addition, although one or more embodiments describe the dynamic base limit value allocation system 106 generating an activity score from a risk value determined within a decision tree of the activity machine learning model, the dynamic base limit value allocation system 106 can utilize the decision tree of the activity machine learning model to generate various metrics. For instance, the dynamic base limit value allocation system 106 can utilize the activity machine learning model to generate metrics such as, but not limited to, an interest (or satisfaction) value of a user account, a conversion probability for the user account, a loyalty of the user account, a user activity condition tier for the user account, and/or a risk segment for the user account.
For instance, although one or more embodiments describe the dynamic base limit value allocation system 106 utilizing machine learning models to generate (or predict) an activity score for a user account, the dynamic base limit value allocation system 106 can also utilize machine learning models to determine user activity condition tiers (e.g., a deposit transaction activity tier) for the user account as a metric. To illustrate, the dynamic base limit value allocation system 106 can utilize user account activity data with an activity machine learning model to determine a user activity condition tier for a user account. In some cases, the user activity condition tier includes a deposit transaction activity tier for a user account that associates the user account with a range of deposit transaction activity amounts (e.g., $0 to $300, $301 to $700, $701 to $1200). In one or more embodiments, the dynamic base limit value allocation system 106 utilizes a determined user activity condition tier for a user account to determine an activity score (e.g., determining a higher activity score as a user accounts user activity condition tier rises).
Furthermore, although one or more embodiments describe the dynamic base limit value allocation system 106 utilizing machine learning models to generate (or predict) an activity score for a user account, in some implementations, the dynamic base limit value allocation system 106 can also utilize machine learning models to determine risk segments for the user account as a metric. In particular, the dynamic base limit value allocation system 106 can utilize user account activity data with an activity machine learning model to determine a risk segment for a user account. Indeed, in some instances, the risk segment indicates a categorized likelihood of a user account failing to pay a base limit value amount utilized by the user account (i.e., risk level). For instance, the dynamic base limit value allocation system 106 can utilize the user account activity data with an activity machine learning model to determine risk segments, such as, but not limited to, low risk, medium risk, and/or high risk for a user account. In some implementations, the dynamic base limit value allocation system 106 utilizes a determined activity score (from the activity machine learning model) for a user account to determine a risk segment for the user account (e.g., determining a lower risk segment as the activity score for the user account increases).
In addition, although one or more embodiments describe the dynamic base limit value allocation system 106 utilizing an activity score decision tree model, the dynamic base limit value allocation system 106 can utilize various machine learning models to generate (or predict) an activity score for a user account. For example, the dynamic base limit value allocation system 106 can utilize a classification neural network to classify a user account into an activity score (or activity score grouping) based on one or more user activity data variables. In some instances, the dynamic base limit value allocation system 106 can utilize a regression-based and/or clustering-based machine learning models to determine an activity score for a user account based on one or more user activity data variables.
Moreover, in one or more embodiments, the dynamic base limit value allocation system 106 can determine activity scores using activity machine learning models as described in U.S. application Ser. No. 17/519,129 filed Nov. 4, 2021, entitled GENERATING USER INTERFACES COMPRISING DYNAMIC BASE LIMIT VALUE USER INTERFACE ELEMENTS DETERMINED FROM A BASE LIMIT VALUE MODEL (hereinafter “application Ser. No. 17/519,129”), the contents of which are herein incorporated by reference in their entirety.
As previously mentioned, the dynamic base limit value allocation system 106 can determine a base limit value from an activity score utilizing a base limit value model. For example,
As shown in
In addition, as shown in
In some embodiments, the dynamic base limit value allocation system 106 can utilize an account deposit amount as the user activity condition within the base limit value model 506. For example, the user activity condition can include a deposit transaction activity of a particular deposit amount. Moreover, in one or more embodiments, the dynamic base limit value allocation system 106 can determine from the user activity data 504 a deposit transaction activity of the user account (e.g., a deposit transaction activity of 2000 dollars). Then, upon determining that the activity score 502 is six and the user activity data 504 triggers (or maps) to the user activity condition “d” when the condition is a deposit transaction of 2000 dollars, the dynamic base limit value allocation system 106 can determine a base limit value of 200 for the user account.
Although one or more embodiments describes a deposit transaction activity as the user activity condition, the dynamic base limit value allocation system 106 can utilize various user activity data for the user activity condition. For instance, the user activity condition within a base limit value matrix can include a frequency of a deposit transaction, a user-to-user transaction activity, and/or a spending transaction activity. Indeed, the dynamic base limit value allocation system 106 can map user activity data and activity score from a user account to a base limit value matrix to determine a base limit value for the user account.
Although one or more embodiments herein illustrate the dynamic base limit value allocation system 106 utilizing user activity conditions and activity scores as variables within a base limit value model (e.g., base limit value matrix) to determine a base limit value for a user account, in one or more embodiments, the dynamic base limit value allocation system 106 can utilize various dimensions of variables in the base limit value model (e.g., base limit value matrix). For instance, in some cases, the dynamic base limit value allocation system 106 can utilize a base limit value matrix that represents relationships (or mappings) between user activity condition tiers, activity scores, and particular risk segments of a user account. Indeed, the dynamic base limit value allocation system 106 can input activity condition tiers, activity scores, and particular risk segments corresponding to a user account within the base limit value model (e.g., base limit value matrix) to select (or output) a base limit value for the user account.
In addition, the dynamic base limit value allocation system 106 can also determine a subsequent base limit value for a user account from a base limit value matrix. For example, the dynamic base limit value allocation system 106 can determine the next incremental step (or change) in base limit values in relation to a determined base limit value from a base limit value matrix as the subsequent base limit value. For instance, the dynamic base limit value allocation system 106 can determine that when a base limit value is 20 and, within the same activity score, the next achievable base limit value that is an element in the base limit value matrix is 30, the dynamic base limit value allocation system 106 can determine that the subsequent base limit value is 30.
Moreover, the dynamic base limit value allocation system 106 can also determine one or more user activity conditions within the base limit value matrix to achieve the subsequent base limit value. For instance, the dynamic base limit value allocation system 106 can identify from the base limit value matrix, the user activity condition that changes the determined base limit value to the subsequent base limit value. As an example, in reference to
As mentioned above, in one or more embodiments, the dynamic base limit value allocation system 106 utilizes a base limit value tiered data table as a base limit value model to determine a base limit value for a user account. For instance,
For instance, in an act 606 of
As further illustrated in
In some embodiments, the dynamic base limit value allocation system 106 can directly determine a higher base limit value (e.g., 200). For instance, the dynamic base limit value allocation system 106 can identify that the user account activity data of a user account indicates that a user activity condition of a deposit transaction for the higher base limit value has been performed by the user account for a number of months having a sum that totals the number of months in the base limit value tiered data table from the lowest base limit value to the determined base limit value. Accordingly, the dynamic base limit value allocation system 106, in some embodiments, directly assigns the higher base limit value to a user account having such user activity data.
In addition, as shown in
Furthermore, as illustrated in
In one or more embodiments, the dynamic base limit value allocation system 106 generates each base limit value tiered data table from a set of base limit value tiered data tables to be configured for a set of user accounts based on activity scores. In particular, the dynamic base limit value allocation system 106 can associate a first base limit value tiered data table to a first activity score by selecting (or generating) values for the first base limit value tiered data table to reflect a risk level represented by the first activity score (e.g., user activity conditions that are less stringent based on a low risk level associated with a user account). In addition, the dynamic base limit value allocation system 106 can associate a second base limit value tiered data table to a second activity score by selecting (or generating) values for the second base limit value tiered data table to reflect a risk level represented by the second activity score (e.g., user activity conditions that are more stringent based on a high risk level associated with a user account).
Although one or more embodiments illustrate the dynamic base limit value allocation system 106 categorizing base limit value tiered data tables based on risk levels, the dynamic base limit value allocation system 106 can utilize various metrics from various types of activity scores to categorize and/or select base limit value tiered data tables. For example, the dynamic base limit value allocation system 106 can utilize metrics such as, but not limited to, an interest (or satisfaction) value of a user account, a conversion probability for the user account, and/or a loyalty of the user account to categorize (and/or configure) base limit value tiered data tables. In addition, the dynamic base limit value allocation system 106 can utilize an activity score that corresponds to the various metrics to select a base limit value tiered data table in accordance with one or more embodiments herein.
Additionally, although one or more embodiments describes a deposit transaction activity as the user activity condition for the base limit value tiered data tables, the dynamic base limit value allocation system 106 can utilize various user activity data for the user activity condition in the base limit value tiered data tables. For example, the user activity condition within a base limit value tiered data table can include a user-to-user transaction activity and/or a spending transaction activity. In addition, the base limit value tiered data table can include various combinations of the user activity conditions such as, but not limited to, a user-to-user transaction activity and a number of times the user-to-user transaction activity occurs and/or a spending transaction activity frequency and a value amount of the spending transaction activities.
In one or more embodiments, the values associated with a base limit value model (e.g., a base limit value matrix and/or a base limit value tiered data table) can be generated (or populated) utilizing a machine learning model. As an example, the dynamic base limit value allocation system 106 can train a machine learning model (e.g., a decision tree model, a regression model, a classification model) to determine (or predict) base limit values for varying activity scores and/or user activity conditions (e.g., mappings that are likely to result in a non-default success rate that satisfies a threshold non-default success rate). Then, the dynamic base limit value allocation system 106 can utilize the machine learning model to generate a base limit value model by populating data values of the base limit value model based on the determined base limit values and predicted mappings to user activity conditions and/or activity scores.
In some embodiments, the values corresponding to the base limit value model can be configured and/or modified by an administrator user on an administrator device. For instance, the dynamic base limit value allocation system 106 can receive a selection and/or input value for a particular value or element within the base limit value model. Then, the dynamic base limit value allocation system 106 can utilize the selection and/or input to modify a base limit value, activity score, and/or a user activity condition within the base limit value model. As an example, the dynamic base limit value allocation system 106 can receive a user interaction from an administrator device to modify the base limit value associated with a user activity condition of a deposit transaction of 300 from a base limit value of 30 to 35.
Although one or more embodiments describes the dynamic base limit value allocation system 106 utilizing a base limit value model and activity score (from the activity machine learning model) to determine base limit values, the dynamic base limit value allocation system 106 an utilize the base limit value model and activity score to determine various types of values for a user account. For instance, the dynamic base limit value allocation system 106 can determine a lending credit value (and subsequent lending credit value) for a user account in accordance with one or more embodiments herein. In some embodiments, the dynamic base limit value allocation system 106 can determine a credit line (and subsequent credit line) for a user account in accordance with one or more embodiments herein. Furthermore, the dynamic base limit value allocation system 106 can also determine a transfer limit (and subsequent transfer limit) for a user account in accordance with one or more embodiments herein.
As previously mentioned, the dynamic base limit value allocation system 106 can generate and display user interface elements to transparently and efficiently present base limit values. For instance,
Indeed, as illustrated in
Furthermore, the dynamic base limit value allocation system 106 can also generate and display a graphical user interface that displays the base limit value, a subsequent base limit value, and user activity conditions to achieve the subsequent base limit value from a base limit value model. For example, in some implementations, the dynamic base limit value allocation system 106 provides for display, within a graphical user interface of the client device, information corresponding to the base limit value determined for the user account. For instance, the dynamic base limit value allocation system 106 can provide for display, within a graphical user interface, a base limit value and one or more user interface elements that indicate a subsequent base limit value for the user account and user activity conditions to achieve the subsequent base limit value.
Additionally, in one or more embodiments, the dynamic base limit value allocation system 106 can determine (and display) base limit values using base limit value models (e.g., base limit matrices and/or base limit value tiered data tables) as described in U.S. application Ser. No. 17/519,129, the contents of which are herein incorporated by reference in their entirety.
Furthermore, in one or more instances, the dynamic base limit value allocation system 106 also utilizes modifiers (e.g., boosts and/or bonuses) based on digital user account actions to further modify the base limit value. For instance, the available base limit value (as described herein) can include a base limit value that is modified using a variety of modifiers from one or more digital user account actions (e.g., setting up direct deposit, transmitting referrals) and/or other event-based triggers (e.g., natural disaster relief, holidays). As an example, the dynamic base limit value allocation system 106 can modify a base limit value (to generate an available base limit value for a user account) as described in U.S. application Ser. No. 18/498,776 filed Oct. 31, 2023, entitled GENERATING USER INTERFACES COMPRISING DYNAMIC BASE LIMIT VALUE AND BASE LIMIT VALUE MODIFIER USER INTERFACE ELEMENTS DETERMINED FROM DIGITAL USER ACCOUNT ACTIONS, the contents of which are herein incorporated by reference in their entirety.
As mentioned above, the dynamic base limit value allocation system 106 can facilitate digital transactions within a secured credit account utilizing a transaction value limit. For example,
As shown in
Indeed, as further shown in
In some cases, the dynamic base limit value allocation system 106 can detect various types of deposits and/or transfers to a secured credit account (by a user account). For example, the dynamic base limit value allocation system 106 can detect a deposit from a direct deposit corresponding to the user account. Moreover, the dynamic base limit value allocation system 106 can also detect (or utilize) reoccurring scheduled deposits or transfers to the secured credit account. In some cases, the dynamic base limit value allocation system 106 further utilizes values corresponding to refunds and/or cancelled digital transactions as a deposit value to increase the transaction value limit.
In some cases, the dynamic base limit value allocation system 106 can detect a deposit from a user selected amount to transfer to the secured credit account from one or more other connected transaction accounts (for the user account) and/or one or more third-party transaction accounts (e.g., transaction accounts external to the inter-network facilitation system 104). For example, as shown in
In addition, as shown in
Furthermore, as shown in
In one or more embodiments, the dynamic base limit value allocation system 106 utilizes a secured credit account and a transaction value limit (e.g., a credit builder account and credit limit) as described in U.S. application Ser. No. 17/021,939 filed Sep. 15, 2020, entitled GENERATING CREDIT BUILDING RECOMMENDATIONS THROUGH MACHINE LEARNING ANALYSIS OF USER ACTIVITY-BASED FEEDBACK, the contents of which are herein incorporated by reference in their entirety.
As previously mentioned, the dynamic base limit value allocation system 106 can dynamically determine, track, modify, and display a base limit value across digital transactions detected on multiple connected accounts corresponding to a user account. For instance, FIG. 9 illustrates the dynamic base limit value allocation system 106 utilizing a universally accessible base limit value over multiple connected accounts. In particular,
Indeed, as shown in
As an example, in reference to
As mentioned above, the dynamic base limit value allocation system 106 can utilize a universally accessible (via multiple connected transaction accounts) base limit value with a transaction value limit of a secured credit account to enable one or more digital transactions within the secured credit account. For instance,
For instance, as shown in
Furthermore, as shown in
Upon detecting one or more digital transactions (via the transaction processor settlements 1012), the dynamic base limit value allocation system 106 can utilize (e.g., via freezing or reserving) funds from a transaction value limit balance available within the secured deposit account (SDA) 1006 to reconcile (or cover) a balance of the secured credit account (SCA) 1008 resulting from the one or more digital transactions. In addition, upon detecting a digital transaction and determining that the transaction value limit balance available within the secured deposit account (SDA) 1006 does not cover the transaction value of the digital transaction, the dynamic base limit value allocation system 106 utilizes the available base limit value 1010 to fulfill (or cover) the remainder between the transaction value of the digital transaction and the transaction value limit balance (in accordance with one or more implementations herein).
Indeed, the dynamic base limit value allocation system 106 can freeze and/or reserve funds from the transaction value limit balance available within the secured deposit account (SDA) 1006 and/or the available base limit value 1010 to enable the digital transaction from the transaction processor settlements 1012. In one or more instances, the dynamic base limit value allocation system 106 utilizes the reserved and/or frozen funds from the transaction value limit balance available within the secured deposit account (SDA) 1006 and/or the available base limit value 1010 to settle (or pay) the transaction processor settlements 1012 for one or more digital transactions.
Furthermore, as shown in
Additionally, in reference to
In some cases, the dynamic base limit value allocation system 106 receives optional transactions (e.g., base limit value account optional transaction 1014) with the secured credit account (SCA) 1008 (from a user of the user account 1004). For example, the dynamic base limit value allocation system 106 can receive a supplemental tip for the available base limit value service. Indeed, the dynamic base limit value allocation system 106 can receive an optional user allotted tip amount for the inter-network facilitation system 104.
In some instances, the dynamic base limit value allocation system 106 communicates, transmits, and/or processes one or more deposit transactions, digital transactions, available base limit values, and/or secured credit settlements utilizing a platform including various transaction computer networks within the inter-network facilitation system 104. For example, in one or more implementations, the dynamic base limit value allocation system 106 communicates, transmits, and/or processes one or more deposit transactions, digital transactions, available base limit values, and/or secured credit settlements utilizing one or more transaction computer network platforms as described in U.S. application Ser. No. 17/805,385 filed Jun. 3, 2022, entitled GENERATING AND PUBLISHING UNIFIED TRANSACTION STREAMS FROM A PLURALITY OF COMPUTER NETWORKS FOR DOWNSTREAM COMPUTER SERVICE SYSTEMS, the contents of which are herein incorporated by reference in their entirety (e.g.,
As previously mentioned, the dynamic base limit value allocation system 106 can also utilize the transaction value limit and the base limit value to, accurately and quickly, authorize one or more digital transactions. For instance,
For instance, as shown in
Moreover, as further shown in
Moreover, as shown in
Furthermore, the dynamic base limit value allocation system 106 can utilize the available base limit value to fulfill a remainder between the transaction value and the transaction value limit (in the act 1114) in accordance with one or more implementations herein (e.g., in reference to
In one or more embodiments, the dynamic base limit value allocation system 106 displays one or more user interface elements to setup and/or configure a universally accessible base limit value. For instance,
As further shown in
Moreover, as shown in
As further shown in
Additionally, as also shown in
As further shown in
In some cases, the dynamic base limit value allocation system 106 can deactivate an available base limit value for a secured credit account. In particular, the dynamic base limit value allocation system 106 can receive a user selection to disable the available base limit value for the secured credit account and, in response, can disable access to the available base limit value for one or more credit transactions in the secured credit account. Moreover, upon reactivation of the available base limit value for the secured credit account, the dynamic base limit value allocation system 106 can enable access to the available base limit value for one or more credit transactions in the secured credit account.
As previously mentioned, the dynamic base limit value allocation system 106 can display modifications to an available base limit value and/or a transaction value limit based on one or more digital transactions. For instance,
As shown in
Additionally, as shown in
Furthermore, as shown in the transition from
Additionally, as shown in
Moreover, as shown in
In one or more embodiments, the dynamic base limit value allocation system 106 further modifies the available base limit value for the secured credit account based on activities (or digital transactions) within one or more connected accounts. For example,
As further shown in
In one or more embodiments, the dynamic base limit value allocation system 106 also modifies the available base limit value for the secured credit account based on activities (or digital transactions) within one or more connected accounts and the secured credit account. For example,
Indeed, as shown in the transition from
Although one or more embodiments herein illustrate particular monetary amounts for the available base limit value, base limit value, transaction value limits, and/or digital transactions, the dynamic base limit value allocation system 106 can determine, utilize, and/or display various monetary amounts (or other values) for the available base limit value, base limit value, transaction value limits, and/or digital transactions. Furthermore, although one or more embodiments herein illustrate a particular order of digital transactions, deposit transactions, and/or utilizations of the transaction value limits and/or the available base limit values, the dynamic base limit value allocation system 106 can receive digital transactions, deposit transactions, and/or utilizations of the transaction value limits and/or the available base limit value in various combinations and/or orders in accordance with one or more implementations herein.
Moreover, although one or more embodiments herein illustrate the dynamic base limit value allocation system 106 displaying an available base limit value, the dynamic base limit value allocation system 106 can also display a base value limit maximum accessible to a user account (e.g., the total base value limit accessible to the user account when the user account is not actively utilizing any amount of the available base limit value). Furthermore, in some cases, the dynamic base limit value allocation system 106 can also display a combined amount that indicates a total available to spend within a secured credit account that includes a transaction value limit (e.g., a balance available in a secured deposit account), an amount to deduct from a secured credit account (e.g., unsettled credit transactions), and an available base limit value (e.g., a base limit value available to the user deducted by a base limit value utilized by the secured credit account and/or one or more other transaction accounts).
Additionally, in one or more instances, the dynamic base limit value allocation system 106 generates notifications to display one or more modifications to an available base limit value when a digital transaction is detected within a secured credit account. For instance,
Furthermore, in one or more embodiments, the dynamic base limit value allocation system 106 enables authorizing digital transactions that exceed a transaction value limit and an available base limit value. In some cases, the dynamic base limit value allocation system 106 authorizes one or more digital transaction that exceed a transaction value limit and an available base limit value and indicates, within a graphical user interface, the exceeded transaction amount. In some cases, the dynamic base limit value allocation system 106 facilitates the exceeded transaction amounts as a line of credit (e.g., with a past due date and/or a credit reporting mechanism). Upon receiving a deposit transaction and/or a user interaction to transfer funds to the secured credit account, the dynamic base limit value allocation system 106 can apply the deposit transaction and/or transferred funds to the exceeded transaction amounts, then reinstate utilized available base limit value via the deposit transaction and/or transferred funds, and subsequently increase the transaction value limit with remainder amount from the deposit transaction and/or transferred funds.
For instance,
Additionally, as shown in
Turning now to
As shown in
In some cases, the act 1602 includes determining, utilizing a machine learning model, a base limit value or a user account based on one or more user activities, wherein the base limit value represents an excess utilization buffer for the user account and determining, for the user account, an available base limit value based on the base limit value, the act 1604 includes receiving, for the user account, a credit transaction corresponding to a secured credit account with a transaction value limit based on a deposited value within the secured credit account and, upon detecting that a transaction value of the credit transaction is greater than the transaction value limit, utilizing the available base limit value corresponding to the user account to fulfill a remainder between the transaction value and the transaction value limit, and the act 1606 includes generating a modified transaction value limit and a modified available base limit value for the user account based on the utilization of the available base limit value and providing, for display within a graphical user interface, the modified transaction value limit and the modified available base limit value.
In some cases, the series of acts 1600 include receiving an additional credit transaction corresponding to the secured credit account. Moreover, the series of acts 1600 can include authorizing the additional credit transaction for the user account (based on an additional transaction value of the additional credit transaction) by comparing an additional transaction value of the additional credit transaction to the modified transaction value limit and the modified available base limit value. Additionally, the series of acts 1600 can include authorizing the additional credit transaction (based on an additional transaction value of the additional credit transaction) by accepting the additional credit transaction upon detecting that the additional transaction value does not exceed a combination of the modified transaction value limit and the modified available base limit value and/or rejecting the additional credit transaction upon detecting that the additional transaction value exceeds the combination of the modified transaction value limit and the modified available base limit value.
Moreover, the series of acts 1600 can include determining, for the user account, the available base limit value based on the base limit value, one or more credit transactions corresponding to the secured credit account, and one or more transactions corresponding to an additional transaction account of the user account.
Furthermore, the series of acts 1600 can include generating the modified available base limit value based on the remainder between the transaction value and the transaction value limit from the available base limit value.
Additionally, the series of acts 1600 can include detecting a transaction corresponding to an additional transaction account of the user account. For example, the additional transaction account can be different from the secured credit account. Moreover, the series of acts 1600 an include generating an updated modified available base limit value based on the transaction. In addition, the series of acts 1600 can include providing, for display within the graphical user interface, the modified transaction value limit and the updated modified available base limit value.
Furthermore, the series of acts 1600 can include detecting a deposit transaction within one or more transaction accounts corresponding to the user account. Moreover, the series of acts 1600 can include generating, utilizing the deposit transaction, an updated modified available base limit value for the user account. In some implementations, the series of acts 1600 include providing, for display within the graphical user interface, the modified transaction value limit and the updated modified available base limit value. In some instances, the series of acts 1600 include detecting an additional deposited value within the secured credit account, generating, utilizing the additional deposited value, an updated modified transaction value limit and an updated modified available base limit value, and providing, for display within the graphical user interface, the updated modified transaction value limit and the updated modified available base limit value.
In one or more embodiments, the series of acts 1600 include detecting an additional deposited value within the secured credit account and generating, utilizing the additional deposited value, an updated modified transaction value limit by combining the additional deposited value and the modified transaction value limit.
Furthermore, the series of acts 1600 can include providing, for display within an additional graphical user interface, one or more selectable user interface elements to select, for access to the available base limit value, the secured credit account or one or more additional transaction accounts. Moreover, the series of acts 1600 can include, upon receiving a user selection of a selectable user interface element corresponding to the secured credit account and an additional transaction account from the one or more additional transaction accounts, enabling the available base limit value for the secured credit account and the additional transaction account.
Additionally, the series of acts 1600 can include providing, for display within an additional graphical user interface, a user interface element indicating utilization of the available base limit value for the credit transaction and an additional user interface element indicating an amount of the available base limit value utilized based on the remainder between the transaction value and the transaction value limit.
Embodiments of the present disclosure may comprise or utilize a special purpose or general-purpose computer including computer hardware, such as, for example, one or more processors and system memory, as discussed in greater detail below. Embodiments within the scope of the present disclosure also include physical and other computer-readable media for carrying or storing computer-executable instructions and/or data structures. In particular, one or more of the processes described herein may be implemented at least in part as instructions embodied in a non-transitory computer-readable medium and executable by one or more computing devices (e.g., any of the media content access devices described herein). In general, a processor (e.g., a microprocessor) receives instructions, from a non-transitory computer-readable medium, (e.g., a memory), and executes those instructions, thereby performing one or more processes, including one or more of the processes described herein.
Computer-readable media can be any available media that can be accessed by a general purpose or special purpose computer system, including by one or more servers. Computer-readable media that store computer-executable instructions are non-transitory computer-readable storage media (devices). Computer-readable media that carry computer-executable instructions are transmission media. Thus, by way of example, and not limitation, embodiments of the disclosure can comprise at least two distinctly different kinds of computer-readable media: non-transitory computer-readable storage media (devices) and transmission media.
Non-transitory computer-readable storage media (devices) includes RAM, ROM, EEPROM, CD-ROM, solid state drives (“SSDs”) (e.g., based on RAM), Flash memory, phase-change memory (“PCM”), other types of memory, other optical disk storage, magnetic disk storage or other magnetic storage devices, or any other medium which can be used to store desired program code means in the form of computer-executable instructions or data structures and which can be accessed by a general purpose or special purpose computer.
Further, upon reaching various computer system components, program code means in the form of computer-executable instructions or data structures can be transferred automatically from transmission media to non-transitory computer-readable storage media (devices) (or vice versa). For example, computer-executable instructions or data structures received over a network or data link can be buffered in RAM within a network interface module (e.g., a “NIC”), and then eventually transferred to computer system RAM and/or to less volatile computer storage media (devices) at a computer system. Thus, it should be understood that non-transitory computer-readable storage media (devices) can be included in computer system components that also (or even primarily) utilize transmission media.
Computer-executable instructions comprise, for example, instructions and data which, when executed at a processor, cause a general-purpose computer, special purpose computer, or special purpose processing device to perform a certain function or group of functions. In some embodiments, computer-executable instructions are executed on a general-purpose computer to turn the general-purpose computer into a special purpose computer implementing elements of the disclosure. The computer executable instructions may be, for example, binaries, intermediate format instructions such as assembly language, or even source code. Although the subject matter has been described in language specific to structural features and/or methodological acts, it is to be understood that the subject matter defined in the appended claims is not necessarily limited to the described features or acts described above. Rather, the described features and acts are disclosed as example forms of implementing the claims.
Those skilled in the art will appreciate that the disclosure may be practiced in network computing environments with many types of computer system configurations, including, virtual reality devices, personal computers, desktop computers, laptop computers, message processors, hand-held devices, multi-processor systems, microprocessor-based or programmable consumer electronics, network PCs, minicomputers, mainframe computers, mobile telephones, PDAs, tablets, pagers, routers, switches, and the like. The disclosure may also be practiced in distributed system environments where local and remote computer systems, which are linked (either by hardwired data links, wireless data links, or by a combination of hardwired and wireless data links) through a network, both perform tasks. In a distributed system environment, program modules may be located in both local and remote memory storage devices.
Embodiments of the present disclosure can also be implemented in cloud computing environments. In this description, “cloud computing” is defined as a model for enabling on-demand network access to a shared pool of configurable computing resources. For example, cloud computing can be employed in the marketplace to offer ubiquitous and convenient on-demand access to the shared pool of configurable computing resources. The shared pool of configurable computing resources can be rapidly provisioned via virtualization and released with low management effort or service provider interaction, and then scaled accordingly.
A cloud-computing model can be composed of various characteristics such as, for example, on-demand self-service, broad network access, resource pooling, rapid elasticity, measured service, and so forth. A cloud-computing model can also expose various service models, such as, for example, Software as a Service (“SaaS”), Platform as a Service (“PaaS”), and Infrastructure as a Service (“IaaS”). A cloud-computing model can also be deployed using different deployment models such as private cloud, community cloud, public cloud, hybrid cloud, and so forth. In this description and in the claims, a “cloud-computing environment” is an environment in which cloud computing is employed.
In particular embodiments, processor(s) 1702 includes hardware for executing instructions, such as those making up a computer program. As an example, and not by way of limitation, to execute instructions, processor(s) 1702 may retrieve (or fetch) the instructions from an internal register, an internal cache, memory 1704, or a storage device 1706 and decode and execute them.
The computing device 1700 includes memory 1704, which is coupled to the processor(s) 1702. The memory 1704 may be used for storing data, metadata, and programs for execution by the processor(s). The memory 1704 may include one or more of volatile and non-volatile memories, such as Random Access Memory (“RAM”), Read Only Memory (“ROM”), a solid-state disk (“SSD”), Flash, Phase Change Memory (“PCM”), or other types of data storage. The memory 1704 may be internal or distributed memory.
The computing device 1700 includes a storage device 1706 includes storage for storing data or instructions. As an example, and not by way of limitation, storage device 1706 can comprise a non-transitory storage medium described above. The storage device 1706 may include a hard disk drive (“HDD”), flash memory, a Universal Serial Bus (“USB”) drive or a combination of these or other storage devices.
The computing device 1700 also includes one or more input or output (“I/O”) interface 1708, which are provided to allow a user (e.g., requester or provider) to provide input to (such as user strokes), receive output from, and otherwise transfer data to and from the computing device 1700. These I/O interface 1708 may include a mouse, keypad or a keyboard, a touch screen, camera, optical scanner, network interface, modem, other known I/O devices or a combination of such I/O interface 1708. The touch screen may be activated with a stylus or a finger.
The I/O interface 1708 may include one or more devices for presenting output to a user, including, but not limited to, a graphics engine, a display (e.g., a display screen), one or more output providers (e.g., display providers), one or more audio speakers, and one or more audio providers. In certain embodiments, the I/O interface 1708 is configured to provide graphical data to a display for presentation to a user. The graphical data may be representative of one or more graphical user interfaces and/or any other graphical content as may serve a particular implementation.
The computing device 1700 can further include a communication interface 1710. The communication interface 1710 can include hardware, software, or both. The communication interface 1710 can provide one or more interfaces for communication (such as, for example, packet-based communication) between the computing device and one or more other computing devices 1700 or one or more networks. As an example, and not by way of limitation, communication interface 1710 may include a network interface controller (“NIC”) or network adapter for communicating with an Ethernet or other wire-based network or a wireless NIC (“WNIC”) or wireless adapter for communicating with a wireless network, such as a WI-FI. The computing device 1700 can further include a bus 1712. The bus 1712 can comprise hardware, software, or both that couples components of computing device 1700 to each other.
Moreover, although
This disclosure contemplates any suitable network 1804. As an example, and not by way of limitation, one or more portions of network 1804 may include an ad hoc network, an intranet, an extranet, a virtual private network (“VPN”), a local area network (“LAN”), a wireless LAN (“WLAN”), a wide area network (“WAN”), a wireless WAN (“WWAN”), a metropolitan area network (“MAN”), a portion of the Internet, a portion of the Public Switched Telephone Network (“PSTN”), a cellular telephone network, or a combination of two or more of these. Network 1804 may include one or more networks 1804.
Links may connect client device 1806, inter-network facilitation system 104 (e.g., which hosts the dynamic base limit value allocation system 106), and third-party system 1808 to network 1804 or to each other. This disclosure contemplates any suitable links. In particular embodiments, one or more links include one or more wireline (such as for example Digital Subscriber Line (“DSL”) or Data Over Cable Service Interface Specification (“DOCSIS”), wireless (such as for example Wi-Fi or Worldwide Interoperability for Microwave Access (“WiMAX”), or optical (such as for example Synchronous Optical Network (“SONET”) or Synchronous Digital Hierarchy (“SDH”) links. In particular embodiments, one or more links each include an ad hoc network, an intranet, an extranet, a VPN, a LAN, a WLAN, a WAN, a WWAN, a MAN, a portion of the Internet, a portion of the PSTN, a cellular technology-based network, a satellite communications technology-based network, another link, or a combination of two or more such links. Links need not necessarily be the same throughout network environment 1800. One or more first links may differ in one or more respects from one or more second links.
In particular embodiments, the client device 1806 may be an electronic device including hardware, software, or embedded logic components or a combination of two or more such components and capable of carrying out the appropriate functionalities implemented or supported by client device 1806. As an example, and not by way of limitation, a client device 1806 may include any of the computing devices discussed above in relation to
In particular embodiments, the client device 1806 may include a requester application or a web browser, such as MICROSOFT INTERNET EXPLORER, GOOGLE CHROME, or MOZILLA FIREFOX, and may have one or more add-ons, plug-ins, or other extensions, such as TOOLBAR or YAHOO TOOLBAR. A user at the client device 1806 may enter a Uniform Resource Locator (“URL”) or other address directing the web browser to a particular server (such as server), and the web browser may generate a Hyper Text Transfer Protocol (“HTTP”) request and communicate the HTTP request to server. The server may accept the HTTP request and communicate to the client device 1806 one or more Hyper Text Markup Language (“HTML”) files responsive to the HTTP request. The client device 1806 may render a webpage based on the HTML files from the server for presentation to the user. This disclosure contemplates any suitable webpage files. As an example, and not by way of limitation, webpages may render from HTML files, Extensible Hyper Text Markup Language (“XHTML”) files, or Extensible Markup Language (“XML”) files, according to particular needs. Such pages may also execute scripts such as, for example and without limitation, those written in JAVASCRIPT, JAVA, MICROSOFT SILVERLIGHT, combinations of markup language and scripts such as AJAX (Asynchronous JAVASCRIPT and XML), and the like. Herein, reference to a webpage encompasses one or more corresponding webpage files (which a browser may use to render the webpage) and vice versa, where appropriate.
In particular embodiments, inter-network facilitation system 104 may be a network-addressable computing system that can interface between two or more computing networks or servers associated with different entities such as financial institutions (e.g., banks, credit processing systems, ATM systems, or others). In particular, the inter-network facilitation system 104 can send and receive network communications (e.g., via the network 1804) to link the third-party-system 1808. For example, the inter-network facilitation system 104 may receive authentication credentials from a user to link a third-party system 1808 such as an online bank account, credit account, debit account, or other financial account to a user account within the inter-network facilitation system 104. The inter-network facilitation system 104 can subsequently communicate with the third-party system 1808 to detect or identify balances, transactions, withdrawal, transfers, deposits, credits, debits, or other transaction types associated with the third-party system 1808. The inter-network facilitation system 104 can further provide the aforementioned or other financial information associated with the third-party system 1808 for display via the client device 1806. In some cases, the inter-network facilitation system 104 links more than one third-party system 1808, receiving account information for accounts associated with each respective third-party system 1808 and performing operations or transactions between the different systems via authorized network connections.
In particular embodiments, the inter-network facilitation system 104 may interface between an online banking system and a credit processing system via the network 1804. For example, the inter-network facilitation system 104 can provide access to a bank account of a third-party system 1808 and linked to a user account within the inter-network facilitation system 104. Indeed, the inter-network facilitation system 104 can facilitate access to, and transactions to and from, the bank account of the third-party system 1808 via a client application of the inter-network facilitation system 104 on the client device 1806. The inter-network facilitation system 104 can also communicate with a credit processing system, an ATM system, and/or other financial systems (e.g., via the network 1804) to authorize and process credit charges to a credit account, perform ATM transactions, perform transfers (or other transactions) across accounts of different third-party systems 1808, and to present corresponding information via the client device 1806.
In particular embodiments, the inter-network facilitation system 104 includes a model for approving or denying transactions. For example, the inter-network facilitation system 104 includes a transaction approval machine learning model that is trained based on training data such as user account information (e.g., name, age, location, and/or income), account information (e.g., current balance, average balance, maximum balance, and/or minimum balance), credit usage, and/or other transaction history. Based on one or more of these data (from the inter-network facilitation system 104 and/or one or more third-party systems 1808), the inter-network facilitation system 104 can utilize the transaction approval machine learning model to generate a prediction (e.g., a percentage likelihood) of approval or denial of a transaction (e.g., a withdrawal, a transfer, or a purchase) across one or more networked systems.
The inter-network facilitation system 104 may be accessed by the other components of network environment 1800 either directly or via network 1804. In particular embodiments, the inter-network facilitation system 104 may include one or more servers. Each server may be a unitary server or a distributed server spanning multiple computers or multiple datacenters. Servers may be of various types, such as, for example and without limitation, web server, news server, mail server, message server, advertising server, file server, application server, exchange server, database server, proxy server, another server suitable for performing functions or processes described herein, or any combination thereof. In particular embodiments, each server may include hardware, software, or embedded logic components or a combination of two or more such components for carrying out the appropriate functionalities implemented or supported by the server. In particular embodiments, the inter-network facilitation system 104 may include one or more data stores. Data stores may be used to store various types of information. In particular embodiments, the information stored in data stores may be organized according to specific data structures. In particular embodiments, each data store may be a relational, columnar, correlation, or other suitable database. Although this disclosure describes or illustrates particular types of databases, this disclosure contemplates any suitable types of databases. Particular embodiments may provide interfaces that enable a client device 1806, or an inter-network facilitation system 104 to manage, retrieve, modify, add, or delete, the information stored in a data store.
In particular embodiments, the inter-network facilitation system 104 may provide users with the ability to take actions on various types of items or objects, supported by the inter-network facilitation system 104. As an example, and not by way of limitation, the items and objects may include financial institution networks for banking, credit processing, or other transactions, to which users of the inter-network facilitation system 104 may belong, computer-based applications that a user may use, transactions, interactions that a user may perform, or other suitable items or objects. A user may interact with anything that is capable of being represented in the inter-network facilitation system 104 or by an external system of a third-party system, which is separate from inter-network facilitation system 104 and coupled to the inter-network facilitation system 104 via a network 1804.
In particular embodiments, the inter-network facilitation system 104 may be capable of linking a variety of entities. As an example, and not by way of limitation, the inter-network facilitation system 104 may enable users to interact with each other or other entities, or to allow users to interact with these entities through an application programming interfaces (“API”) or other communication channels.
In particular embodiments, the inter-network facilitation system 104 may include a variety of servers, sub-systems, programs, modules, logs, and data stores. In particular embodiments, the inter-network facilitation system 104 may include one or more of the following: a web server, action logger, API-request server, transaction engine, cross-institution network interface manager, notification controller, action log, third-party-content-object-exposure log, inference module, authorization/privacy server, search module, user-interface module, user-profile (e.g., provider profile or requester profile) store, connection store, third-party content store, or location store. The inter-network facilitation system 104 may also include suitable components such as network interfaces, security mechanisms, load balancers, failover servers, management-and-network-operations consoles, other suitable components, or any suitable combination thereof. In particular embodiments, the inter-network facilitation system 104 may include one or more user-profile stores for storing user profiles for transportation providers and/or transportation requesters. A user profile may include, for example, biographic information, demographic information, financial information, behavioral information, social information, or other types of descriptive information, such as interests, affinities, or location.
The web server may include a mail server or other messaging functionality for receiving and routing messages between the inter-network facilitation system 104 and one or more client devices 1806. An action logger may be used to receive communications from a web server about a user's actions on or off the inter-network facilitation system 104. In conjunction with the action log, a third-party-content-object log may be maintained of user exposures to third-party-content objects. A notification controller may provide information regarding content objects to a client device 1806. Information may be pushed to a client device 1806 as notifications, or information may be pulled from client device 1806 responsive to a request received from client device 1806. Authorization servers may be used to enforce one or more privacy settings of the users of the inter-network facilitation system 104. A privacy setting of a user determines how particular information associated with a user can be shared. The authorization server may allow users to opt in to or opt out of having their actions logged by the inter-network facilitation system 104 or shared with other systems, such as, for example, by setting appropriate privacy settings. Third-party-content-object stores may be used to store content objects received from third parties. Location stores may be used for storing location information received from client devices 1806 associated with users.
In addition, the third-party system 1808 can include one or more computing devices, servers, or sub-networks associated with internet banks, central banks, commercial banks, retail banks, credit processors, credit issuers, ATM systems, credit unions, loan associates, brokerage firms, linked to the inter-network facilitation system 104 via the network 1804. A third-party system 1808 can communicate with the inter-network facilitation system 104 to provide financial information pertaining to balances, transactions, and other information, whereupon the inter-network facilitation system 104 can provide corresponding information for display via the client device 1806. In particular embodiments, a third-party system 1808 communicates with the inter-network facilitation system 104 to update account balances, transaction histories, credit usage, and other internal information of the inter-network facilitation system 104 and/or the third-party system 1808 based on user interaction with the inter-network facilitation system 104 (e.g., via the client device 1806). Indeed, the inter-network facilitation system 104 can synchronize information across one or more third-party systems 1808 to reflect accurate account information (e.g., balances, transactions, etc.) across one or more networked systems, including instances where a transaction (e.g., a transfer) from one third-party system 1808 affects another third-party system 1808.
In the foregoing specification, the invention has been described with reference to specific exemplary embodiments thereof. Various embodiments and aspects of the invention(s) are described with reference to details discussed herein, and the accompanying drawings illustrate the various embodiments. The description above and drawings are illustrative of the invention and are not to be construed as limiting the invention. Numerous specific details are described to provide a thorough understanding of various embodiments of the present invention.
The present invention may be embodied in other specific forms without departing from its spirit or essential characteristics. The described embodiments are to be considered in all respects only as illustrative and not restrictive. For example, the methods described herein may be performed with less or more steps/acts or the steps/acts may be performed in differing orders. Additionally, the steps/acts described herein may be repeated or performed in parallel with one another or in parallel with different instances of the same or similar steps/acts. The scope of the invention is, therefore, indicated by the appended claims rather than by the foregoing description. All changes that come within the meaning and range of equivalency of the claims are to be embraced within their scope.