Patent classifications
G07F19/2055
MONITORING AND PREDICTING PHYSICAL FORCE ATTACKS ON TRANSACTION TERMINALS
Visual features of a vehicle, a vehicle's orientation with respect to a transaction terminal, and an individual associated with the vehicle are derived from video captured of the terminal and a surrounding area of the terminal. Additional information associated with brute force attacks in a location associated with the terminal are obtained as additional features. The visual features and the additional features are provided as input to a trained Machine-Learning Model (MLM) and the MLM provides as output a confidence value representing a prediction as to whether the current vehicle and the current individual are potentially about to engage in a brute force attack on the terminal. When the confidence value exceeds a threshold value, enhanced feature detection is enabled on the video, external systems are notified, and an incident packet of information is assembled.
ATM FRAUD DETECTION SYSTEM AND METHODS THEREOF
An ATM fraud detection system having a plurality of vibration sensors to detect vibration of one or more of an ATM cash dispenser, card reader, cash rejection bin, and/or cash tray. The system further having NFC sensor to detect persistent presence of wireless signal near an ATM machine. The system also includes a plurality of reed switch sensors to detect tampering of cash door, network cable-model interface, network cable-computer interface, hard disk drive-computer interface and/or ATM keyboard cable-computer interface. A micro controller is programmed to detect fraudulent ATM activity such as jackpotting, transaction reversal, shimming, skimming, cash trapping or internal theft.
DETECTING A SKIMMER VIA A VIBRATION SENSOR
Disclosed herein are system, method, and apparatus for detecting a skimmer via a vibration sensor on a transaction card. The method includes receiving, at a server, from a user equipment, vibration information recorded by a transaction card in response to an execution of a transaction at a point-of-service (POS) terminal of a plurality of POS terminals using the transaction card. The vibration information may be recorded by a microphone or an accelerometer on the transaction card while the transaction card is swiped through the POS terminal or inserted into or removed from the POS terminal. The method includes determining, at the server, a state of the POS terminal based on the received vibration information and in response to a determination of the state of the POS being compromised, sending to one or more stakeholders of the transaction a warning message containing the POS terminal information including the POS terminal's state.
Detecting unauthorized devices using proximity sensor(s)
A payment reader and a POS terminal may communicate over a wireless connection. The methods and systems include monitoring one or more parameters corresponding to a payment reader and another device in proximity to the payment reader. The first device, through a set of customized instructions, determines whether behavior of the second device substantially corresponds to the first device, in order to detect suspected hardware or software intrusion associated with the secure first device. On successful detection of a suspected intrusion, the first device generates an alert for a user of the first device if illegal intrusion is suspected by the processor.
Mobile application-based error reporting
An apparatus is configured to receive a complaint initiation signal that includes an indication that a card reader may be compromised, and initiation date and time of the complaint, and geolocation data related to the reporting party. The apparatus is further configured to identify a street address closest to the geolocation data in the complaint using a geolocation application programming interface and the set of geolocation data. The apparatus is also configured to determine that the identified street address is associated with an entity. The apparatus then calculates a confidence interval as to whether that entity is the type of entity that uses a card reader. The apparatus is further configured to determine that the confidence interval exceeds a threshold. The apparatus is also configured to determine an identifier of the entity. Further, the apparatus is configured to publish an alert to a data feed.
SYSTEMS AND METHODS FOR DETECTING COMPROMISED ATMS
A provider computing system includes a processing circuit comprising one or more processors coupled to one or more memories having instructions stored thereon that, when executed by the one or more processors, cause the one or more processors to receive an indication from a user device that an automated teller machine (ATM) is compromised. The instructions, when executed by the one or more processors, further cause the one or more processors to generate, upon receiving the indication that the ATM is compromised, a reward message including a reward for reporting the ATM as being compromised. The instructions, when executed by the one or more processors, further cause the one or more processors to transmit the reward message to the user device.
ATM-based anomaly and security threat detection
An automated teller machine (ATM) receives a first set of signals from components of the ATM. The first set of signals includes intercommunication electrical signals between the components of the ATM and electromagnetic radiation signals propagated from the components of the ATM. The ATM extracts baseline features from the first set of signals. The baseline features represent a unique electrical signature of the ATM. The ATM extracts test features from a second set of signals received from the component of the ATM. The ATM determines whether there is a deviation between the test features and baseline features. If the ATM detects the deviation, the ATM determines that the ATM is associated with a particular anomaly that makes the ATM vulnerable to unauthorized access.
Smart glasses based detection of ATM fraud
Systems, methods, and apparatus are provided for fraud screening via smart glasses interactions during an ATM session. A smart glasses device may capture an image of an ATM environment. The ATM and the smart glasses device may be edge nodes on an edge network. An edge platform may use a fraud detection model to classify the image and compare it to stored ATM images. The model may be trained at an enterprise server and stored on the edge platform. In response to a determination of fraud at the edge platform, a fraud alert may be transmitted to the smart glasses device during the ATM session. Edge computing reduces latency to enable real-time smart glasses alerts. The smart glasses device may communicate the fraud alert to other smart glasses devices on the edge network.
System to prevent full ATM enclosure skimming attacks
A computer-implemented method includes: receiving by a skimming prevention system operatively coupled to a machine, a plurality of sound data from a plurality of corresponding sound sensors operatively coupled to the machine; identifying by the skimming prevention system, a type of user action input of the machine; retrieving by the skimming prevention system from a storage system operatively coupled to the machine, a baseline acoustic signature associated with the machine and corresponding to the type of user action input; comparing by the skimming prevention system, the received plurality of sound data to the baseline acoustic signature associated with the machine and corresponding to the type of user action input; and in response to a determination that the compared plurality of sound data and the baseline acoustic signature differ more than a predetermined threshold, triggering by the skimming prevention system, an execution/alert mode of the machine.
METHODS AND SYSTEMS FOR VERIFICATION OF OPERATIONS OF COMPUTER TERMINALS AND PROCESSING NETWORKS
A verification computing system for verifying operation of a payment terminal and a payment processing network linking the payment terminal to a payment processor is provided. The verification computing system includes at least one verification computing module including at least one processor. The verification computing module is programmed to receive a test request message corresponding to a test payment card transaction from the payment terminal, identify a void flag included in the test request message, and bypass a settlement process for the test payment card transaction based on the identified void flag. The verification computing module is further configured to determine an operating status of the payment terminal and the payment processing network, generate a test response message based upon the determination, and transmit the test response message to the payment terminal for notifying a user.