Patent classifications
G06Q20/4015
METHOD AND SYSTEM FOR AUTHORIZING CARD ACCOUNT TRANSACTIONS BY GEOGRAPHIC REGION
A method and system for authorizing card account transactions by geographic region by providing data for a user interface displaying geographic regions and merchant locations each corresponding to the location of a merchant where a transaction using a card account may be initiated, receiving a user interface selection representing a request to authorize or restrict card account transactions, receiving authorization requests for desired transactions, and authorizing or restricting the transactions in accordance with the request.
System and Method for Authenticating a Location of a Payment Acceptance Device
A system and method for authenticating a location of a payment acceptance device is provided. The method comprises receiving a transaction request comprising merchant data, the merchant data identifying the payment acceptance device and location information identifying a location at which the transaction request is initiated; retrieving, from a database, a payment acceptance device identifier based on the merchant data, the payment acceptance device identifier identifying a location at which the payment acceptance device is registered; authenticating the location of the payment acceptance device by comparing the location information and the location identified by the payment acceptance device identifier.
Fraud Monitoring Apparatus
A fraud monitoring apparatus for determining a fraud score representing a relative risk of fraudulent activity for a payment request, comprising one or more processors in communication with non-transitory data storage having instructions stored thereon which, when executed by the processor or processors, cause the apparatus to perform a fraud monitoring process comprising: receiving, from an authorization server, a fraud monitoring request including transaction-related data; identifying, from said transaction-related data, an associated mobile computer device; sending a request for authentication data to the mobile computer device; receiving requested authentication data from the mobile computer device; generating a fraud score, from the received requested authentication data and the transaction-related data, representing a relative risk of fraudulent activity; and sending data representing the fraud score to the authorization server.
SELF-SERVICE KIOSK DEVICES AND SYSTEMS AND METHOD FOR OPERATION THEREWITH
Various embodiments herein each include at least one of systems, devices, methods, and software for self-service kiosk devices and systems and for the operation therewith. One embodiment, in the form of a method, includes receiving input defining a transaction with regard to an account to be conducted at a self-service kiosk device and staging the transaction defined by the received input. This method further includes receiving a notification that an authentication with regard to the account has been received from a particular self-service kiosk device and transmitting a set of commands to the particular self-service kiosk device to perform the staged transaction.
Data sharing platform
A data sharing platform can be used to implement a method for allowing at least one entity which makes payments with a payment network to share transaction data. A database containing the transaction data from the at least one entity which makes payments with the payment network is maintained. A user interface is provided, which presents the at least one entity which makes payments with the payment network with at least one selection providing consent to sharing of at least a portion of the transaction data with at least one third party. The consent from the at least one entity which makes payments with the payment network is obtained, via the at least one selection. Interfacing takes place with the at least one third party to share the at least portion of the transaction data.
Systems and methods for authenticating user identities in networked computer systems
The disclosed embodiments include methods, systems, system terminals, and point-of-sale terminals for authenticating a user. The disclosed embodiments include, for example, a method for receiving, by one or more processors, authentication data from an authentication network, the authentication data including an authentication code identifying an authentication transaction associated with an authenticating partner system. The method may also include validating, by the one or more processors, the authentication data, the validating comprising comparing the authentication data with validation data corresponding to a prior authentication event associated with the user. The method may also include generating, by the one or more processors, validation information based on the validating, the validation information comprising a determination whether to validate the user for the authentication transaction. The method may also include providing, by the one or more processors, the validation information to the authentication network.
Utilizing machine learning and trusted transaction card locations to generate a geographical map of the trusted transaction cards
A device may receive, from client devices of users, user data identifying the users, client device data identifying the client devices, and transaction card data identifying transaction cards, and may receive transaction account data identifying transaction accounts. The device may process the user data, the client device data, the transaction card data, and the transaction account data, with a machine learning model, to determine trust scores for the transaction cards, and may identify trusted transaction cards based on the trust scores. The device may receive, from trusted client devices associated with the trusted transaction cards, location data identifying locations of the trusted client devices and communication data indicating communications between the trusted transaction cards and the trusted client devices. The device may generate a card mapping for the trusted transaction cards based on the location data and the communication data, and may perform actions based on the card mapping.
Identification Of Malicious Activity Based On Analysis Of Travel Path Of A Mobile Device
A method for identification of malicious activity based on analysis of a travel path of a mobile device through multiple geographic areas includes receiving at least three location data associated with the mobile communication device, the first location data comprising indication of the geographic area of the mobile subscriber and a receipt timestamp; determining the actual travel time of the mobile subscriber from the first geographic area and the third geographic area based on a difference between timestamps of the first location data and the third location data; determining a minimum transition time for the subscriber of the mobile device to move from the first geographic area to the third geographic area; and identifying a malicious activity based on comparison of the actual travel time and the minimum transition time wherein actual travel time is less than minimum transition time between the first geographic area and the third geographic area.
ANALOGUE TICKET EXCHANGE SYSTEMS AND METHODS
A system for providing frictionless transfer of tickets at a venue comprising: a server system comprising at least one server, a processor, and a database; at least one user device; and at least one unique ticket ID corresponding to a particular seat or ticket; wherein the server performs the following method: accessing the system via the user device and identifying a first ticket corresponding to an event, said first ticket having a unique ticket ID; validating ownership of the first ticket through a confirmation process by validating the unique ticket ID and storing the same within the database; identifying a second ticket for exchange; and confirming the exchange of the first ticket and the second ticket.
USING LOCATION-BASED MAPPING TO ENABLE AUTOMATED INFORMATION TRANSFER AT A USER LOCATION
In some implementations, an automated information transfer system may receive an indication of a location of the user device. The automated information transfer system may identify an interacting entity associated with the automated information transfer that is associated with a physical location that is within a threshold proximity of the location of the user device. The automated information transfer system may receive item-specific data associated with the automated information transfer. The automated information transfer system may identify one or more interaction terminals at the physical location associated with the interacting entity. The automated information transfer system may receive authorization information associated with the automated information transfer. The automated information transfer system may perform an action based on whether the authorization information indicates that the automated information transfer is at least one of authorized, conditionally authorized, not authorized, or conditionally not authorized.