G06Q20/4015

Using Augmented Reality Data as Part of a Fraud Detection Process
20240070675 · 2024-02-29 ·

A fraud detection system may identify a suspected fraudulent transaction based on one or more criteria. The transaction may be associated with a user. Based on identifying a suspected fraudulent transaction, the fraud detection system may receive augmented reality data from an augmented reality device of the user. The fraud detection system may determine, based on the augmented reality data, whether the transaction is fraudulent, and may take an action based on the determination.

LOCATION BASED TRANSACTION AUTHENTICATION

A method includes: receiving an authorization request for a transaction including information identifying an account of a user; identifying an identity of the user; determining a computing device associated with the identified user; determining a distance between a location of the transaction and a location of the determined computing device; determining that additional authentication is required based on the determined distance relative to an authentication distance such that in response to the determined distance being greater than an authorization distance but less than or equal to the authentication distance, the required additional authentication includes a first set of authentication information, and in response to the determined distance being greater than the authentication distance, the required additional authentication includes a second set of authentication information different from the first set of authentication information; and authorizing the transaction based on the additional information matching stored additional authentication information.

Image-Based Authorization Systems

Aspects described herein may allow transactions to be authenticated based on images taken at the transaction site. For example, a computing device may decline a transaction request based on a first category of the transaction indicated in the category information violates a transaction category restriction of the user account. The computing device may send, to a user device associated with the user account, an instruction to upload one or more photos that depict a physical environment where the transaction is requested. If the photos indicate the requested transaction belongs to another category that does not violate the transaction category restriction, the system may approve the transaction based on the photos.

User Authentication Based on Account Transaction Information in Text Field

Methods, systems, and apparatuses are described herein for authenticating access to an account using questions which allow users to provide textual information about transactions conducted by an account. A machine learning model may be trained to predict the guessability of merchants. A request for access to an account may be received, and transaction data for that account may be received. An authentication question may be presented. For example, a user may be prompted to list places they have shopped recently. A user response comprising text data may be received. The text data may be processed to identify one or more merchants. If the one or more merchant(s) are represented in the transaction data, the machine learning model may be used to determine the guessability of the one or more merchants. An authentication score may be determined based on the guessability, and access to the account may be provided.

METHOD FOR AUTHENTICATING A USER, A SYSTEM AND A TRANSPORTATION VEHICLE
20240059249 · 2024-02-22 ·

A method for authenticating a user of a transportation vehicle, a system to perform the method and a transportation vehicle equipped with the system. A position and/or a movement gradient of an authorized user is/are determined based on received impulse responses of emitted UWB impulses and/or based on a result of channel impulse response (CIR) measurements using UWB signals, and the authorized user is authenticated based on this information.

Service processing method and device
11910197 · 2024-02-20 · ·

A service processing method includes receiving, by a mobile phone, a first identifier from a head device of a vehicle after the head device receives a trigger request to perform a vehicle door opening service, determining, by the mobile phone based on the first identifier, to perform authentication, indicating, by the mobile phone, the head device to perform the vehicle door opening service when the authentication succeeds, or determining, by the mobile phone based on the first identifier, not to perform the authentication, and sending, by the mobile phone, location information of the mobile phone, and an indication that indicating a location of the mobile phone and a location of the head device are normal to the head device.

Server, wallet system, computer readable recording medium, and notification method

A server includes a processor including hardware, the processor being configured to: acquire store position information of a store where a user has entered; acquire store information in which position information of each of a plurality of stores and one or more settlement methods available in each of the plurality of stores are associated; and notify a terminal owned by the user of the settlement method available in the store where the user has entered based on the store position information and the store information.

SYSTEM AND METHOD FOR ACCOUNT VERIFICATION BY AERIAL DRONE
20240054809 · 2024-02-15 · ·

A verification application executing at a user's mobile phone directs the user to take a photo of an identification document (e.g., driver's license or other form of government issued identification) or of their face. After the verification application sends the image to a backend service, the service may then dispatch a drone to the user's location and take a photograph of the user. The service may then validate the previously-imaged document or photo of the user's face against the photograph of the user and the geolocation sent with the first image. The service may then verify the new account and provision a token to the verification application to complete a secured account generation.

SYSTEM AND METHOD FOR IMPULSE PURCHASE PROMPTING
20240054547 · 2024-02-15 ·

A method of prompting impulse purchases includes detecting a position of a customer at an impulse purchase location via an impulse purchase prompt initiator, automatically transmitting, via the impulse purchase prompt initiator, an impulse purchase prompt to the customer, fulfilling, in near-real time, an impulse purchase request transmitted by the customer in response to the impulse purchase prompt via the impulse purchase prompt initiator automatically sending a signal to a communications module of an automated locker, and automatically opening the at least one storage compartment and dispensing a product associated with the impulse purchase. The automated locker includes storage that is temperature controlled so as to lower a temperature of the product, and the impulse purchase prompt is only automatically transmitted in response to the temperature of the product being equal to or less than a predetermined temperature.

METHOD FOR VALIDATING ELECTRONIC TRANSACTIONS
20240054495 · 2024-02-15 · ·

A computer system is configured to authenticate the identity of a user who is attempting to access a website or conduct a transaction. The system is configured to receive a geographical location associated with the user and to receive the geographical location of a mobile phone associated with the user, and to determine whether the two geographical locations are within an acceptable distance.