Patent classifications
G07F19/207
AUTOMATIC SWITCHING OF DEVICE SECURITY PROTOCOLS BASED ON THE DETECTION OF AN UNAUTHORIZED EVENT
A system includes a plurality of sensors distributed about a space. Each sensor generates sensor data associated with properties of one or more people in the space. An automated response subsystem receives the sensor data. An unauthorized event is detected associated with an adaptive-security device operating within the space and operating instructions are transmitted that identify security protocols to increase security of devices during the unauthorized event. An adaptive-security device operates within the space and receives the operating instructions. After receiving the operating instructions, the adaptive-security device determines whether a user is currently accessing secure information in the adaptive-security device. If the user is currently accessing the secure information, display of at least a portion of the secure information is prevented. If the user is not currently accessing the secure information, authentication requirements are increased for accessing the secure information.
SYSTEM, METHOD, AND COMPUTER PROGRAM PRODUCT FOR REAL-TIME AUTOMATED TELLER MACHINE FRAUD DETECTION AND PREVENTION
Described are a system, method, and computer program product for real-time automated teller machine (ATM) fraud detection and prevention. The method includes receiving transaction data of a plurality of transactions in real-time during processing at a transaction service provider system. The method further includes storing the transaction data in a distributed cache and receiving a transaction request for a user transaction at an ATM using a payment device. The method further includes modifying a profile of ATM activity stored in the distributed cache and comparing at least one metric of the profile to at least one predetermined ATM activity threshold. The method further includes activating a fraud prevention operation before the user transaction is completed at the ATM, including declining the user transaction, disabling a transaction account, communicating an alert to an issuer, or any combination thereof.
Security video data processing systems and methods
Identifying a person committing a crime in video data captured by a security device. An information request message identifying the video data and a need for information about the video data is received. When the video data is determined suitable for sharing within a geographic network, an access control of the video data is set to allow a client device registered with the geographic network to display the video data. A display control value of the video data is set to direct display of a label with the video data to indicate the need for the information. A rating of usefulness of the information received from the client device is determined and a first value is added to an account associated with the client device based at least in part upon the rating.
APPARATUS AND METHODS FOR CONTACT-MINIMIZED ATM TRANSACTION PROCESSING USING RADAR-BASED GESTURE RECOGNITION AND AUTHENTICATION
Apparatus and methods for contact-minimized automated teller machine (“ATM”) use and transaction processing using Doppler-radar based gesture recognition and authentication. The apparatus and methods may include an ATM including a millimeter-wave radar transmitter and receiver. Movement of one or more objects, including fingers, within a radar field may be analyzed and translated into gestures and authentication passcode(s). By utilizing the radar field instead of physical buttons or a touchscreen, contact with the ATM may be minimized.
Automated teller machine (ATM) onlooker detection
An ATM system is provided. The system may include a back-end server, an ATM CPU that receives information relating to the ATM, an ATM dispenser configured to dispense a cash withdrawal amount in the event that the ATM CPU receives information relating to a selection of a cash withdrawal amount and a mobile computer. The mobile computer may include a CPU, a keypad, a touch screen having a diagonal dimension of between 9 inches and 17 inches, and an interface system that interfaces between the ATM CPU and MC CPU, wherein the back-end server is configured to format and transmit an API call to request information regarding an ATM session. The ATM may be configured to respond to the API call and the back-end server is configured to respond to an API call response. The back-end server response may be further configured for display on the touch screen.
TERMINAL SURVEILLANCE DEVICE, AUTOMATIC TELLER MACHINE, DECISION METHOD, AND PROGRAM ON A STORAGE MEDIUM
A terminal surveillance device, an automatic teller machine, a decision method, and a program on a storage medium that can detect suspicious motion at a terminal device. The terminal surveillance device includes a motion information acquisition unit configured to acquire motion information indicating a motion of a user at a terminal device, a specification unit configured to specify a specific motion of the user from the motion information acquired by the motion information acquisition unit, and a state information acquisition unit configured to acquire state information indicating a state of the terminal device. A decision unit decides whether the specific motion specified by the specification unit is normal, on the basis of a relationship between the specific motion and the state information acquired by the state information acquisition unit.
ACCOUNT SECURITY SYSTEM
In certain embodiments, image-feature malicious-activity detection and access prevention may be facilitated, where an activity notification associated with a transaction triggers feature detection for at least one image related to a different transaction. In some embodiments, a first image (received in connection with a first transaction) may be associated with the first transaction, and a second image (received in connection with a second transaction) may be associated with a second transaction. In response to a malicious activity notification associated with the first transaction, an identifying characteristic (e.g., a facial feature) detected in the first image may be used to determine whether to prevent access to an account related to the second transaction. As an example, in response to determining that the identifying characteristic is present in the second image, access to the account related to the second transaction may be prevented.
System and apparatus for biometric identification of a unique user and authorization of the unique user
A verification device provides an approach to identification and authorization by requiring an authorized biometric presence before permitting the input of a sequence of signals. Furthermore, the device may be configured to recognize incorrect inputs, and to respond by transmitting an alert code while providing limited functionality to convince an unauthorized user that access has been granted until a location of the device has been determined.
Systems and methods for detecting compromised ATMs
Examples described herein relate to apparatuses and methods of providing automated teller machine (ATM) status notifications. A method includes detecting a signal near an ATM, determining that the signal is indicative of the ATM being comprised, calculating a compromise score based at least on the determination that the signal is indicative of the ATM being compromised, and displaying an image on a user interface of the user device in a manner that reflects the compromise score.
Systems and methods for detecting human presence near a transaction kiosk
Disclosed embodiments may include a system that may receive first level authentication data from a first user, identify a first user device associated with the first user, and determine whether a current location of the first user device is within a predetermined proximity of a first computing device. In response to the determination, the system may detect one or more objects within the predetermined proximity of the first computing device using the one or more positional sensors. The system may determine that at least one of the one or more objects is associated with a human, and in response, trigger a security measure. The system may transmit an indication of the triggered security measure to the first computing device, and may transmit instructions to the first user device configured to cause the first user device to provide an alert to the first user.