Patent classifications
G06Q20/4014
Static Authentication Questions for Account Authentication
Methods, systems, and apparatuses are described herein for improving computer authentication processes using static authentication questions with answers that change based on user account information. A request for access to an account may be received. A static question may be received. The static question may comprise one or more prompts and a plurality of different predetermined answers. Transaction data may be received. Based on the transaction data, a portion of the plurality of different predetermined answers may that correspond to correct answers may be determined. The question may be presented to a user, and a candidate response may be received. Access to the account may be provided based on the candidate response.
Method and System for Automated Application of Fuel Discounts from Carriers to Contracted Drivers
Receiving, at a server, an identifier from a user to authorize fuel payment at a fuel station. Associating the identifier with a carrier, the carrier being entitled to a fuel discount at the fuel station. Authorizing the fuel station to provide fuel to the user with the fuel discount, which may be variable. The identifier may be received from a mobile application, a company credit card, a personal credit card, a virtual credit card, and/or an onboard electronic logging device (ELD). The authorizing of the fuel station to provide fuel to the user with the fuel discount may be limited by an amount and/or a type of fuel. A system is provided that includes a receiver module, and a server, and a transmitter module. A non-transitory computer-readable medium storing a program for operating a fuel discount sharing application is provided.
Payment transaction authentication system and method
This disclosure describes, in part, techniques for validating a money transfer request between a sender and a recipient via challenge questions. For instance, the method includes determining, by a payment service system, a level of risk associated with the money transfer request between the sender and the recipient; in response the level of risk being higher than a threshold, obtaining a query for the recipient, wherein the query is based at least on the current money transfer request or one or more past requests between the sender and recipient; receiving, from the recipient device, a response to the query; and validating the current payment transaction based on the response.
Systems and methods for improved verification of transactions
A method for implementing transactions includes receiving, by a first computing system, a transaction request from a second computing system, the transaction request indicating a first account number that is an alias of a transaction account having a second account number, and specifying a transaction. The method further includes determining the second account number by referencing a data structure that associates the first account number and the second account number, determining a verification policy associated with the second account number, and transmitting a verification challenge based on the verification policy. The method yet further includes receiving a response to the verification challenge, determining to authorize the transaction request based on the response to the verification challenge, and implementing the transaction involving the transaction account specified by the transaction request.
Illicit proceeds tracking system
A computerized method produces an identity code to identify each subject stored in the computer systems connected to a computer network while protecting the privacy and confidentiality of the subject. A central computer system receives an identity code of a suspect of a financial crime and sends the identity code to all computer systems connected to the computer network. The computer systems that have the matched identity code send the requested information to the central computer system. As a result, law enforcement organizations can eliminate crimes and financial institutions can recover the money stolen from them. In addition, law enforcement organizations and financial institutions can identify money launderers that are missed by their anti-money laundering transactional monitoring systems.
Platform for management of user data
A system, method, device, and platform for managing data. Data associated with a user received from one of a number of sources. The data is automatically confirmed as applicable to a user. The data is added to a data set associated with the user. A determination is made whether the data set is complete after adding the data to the data set. One or more tokens are created based on the data set of the user.
Information security system and method for multi-factor authentication for ATMS using authentication media
A system for verifying a user operating an Automated Teller Machine (ATM) sends an authentication media item to a user device associated with the user when the ATM receives a transaction request. The system receives, from the ATM, a first image of the authentication media item when the authentication media item is presented to the ATM. The system compares the first image of the authentication media item with a second image of the authentication media item stored in a user profile associated with the user. The system extracts a first unique code from the first image of the authentication media item, and a second unique code from the second image of the authentication media item. The system determines whether the first unique code corresponds to the second unique code. The system approves the transaction request if it is determined that the first unique code corresponds to the second unique code.
System and method for inserting data into an internet browser form
Systems, methods, and computer-readable storage media for inserting payment information into payment forms without user interaction. A system can identify that a user has navigated to a web page operated by a merchant computer system for a merchant and identify a payment form within the web page. The system can then execute a payment request API which generates a query for saved payment credentials for the user from the merchant computer system. When the merchant computer system indicates it does not have the saved payment credentials for the user, the system can identify browser-saved payment credentials stored in the Internet browser, then generate a virtual payment information associated with the browser-saved payment credentials. The virtual payment information can then be inserted into corresponding fields of the payment form without the user entering any additional information.
Systems and methods for identity graph based fraud detection
A method and apparatus for fraud detection during transactions using identity graphs are described. The method may include receiving, at a commerce platform system, a transaction from a user having initial transaction attributes and transaction data. The method may also include determining, by the commerce platform system, an identity associated with the user, wherein the identity is associated with additional transaction attributes not received with the transaction. Furthermore, the method may include accessing, by the commerce platform system, a feature set associated with the initial transaction attributes and the additional transaction attributes, wherein the feature set comprises machine learning (ML) model features for detecting transaction fraud. The method may also include performing, by the commerce platform system, a machine learning model analysis using the feature set and the transaction data to determine a likelihood that the transaction is fraudulent, and performing, by the commerce platforms system, the transaction when the likelihood that the transaction is fraudulent does not satisfy a transaction fraud threshold.
SINGLE SIGN-ON PROCESS
In order to check the authorization of passengers, the following steps are performed:
storing of authorization data, for example of tickets, in an electronic storage area of a portable personal identification module (40) of the user, for example in a chip-card,
storing of identification data that are specific to the user's outer appearance in an electronic storage area of the personal identification module (40),
contactless transmission of said identification and authorization data in a portable authorization-checking device (90),
visual reproduction of said identification and authorization data with a VRD (Virtual Retina Display).