Patent classifications
G06Q20/4015
SYSTEMS AND METHODS FOR FRAUD DETECTION AND PREVENTION
Systems and methods for fraud detection and prevention is disclosed. The system may receive a transaction request for a first customer including a transaction location, transaction time stamp, and merchant type code. The system may determine whether the transaction location is expected for the first customer. When the transaction location is unexpected, the system may identify a last-known video detection having a last-known time stamp and last-known location. The system may determine a travel time estimate between the last-known location and the transaction location and determine a buffer based on the merchant type code. The system may compare the travel time estimate to an allotted time that includes a difference between the transaction time stamp and last-known time stamp less the buffer. When the travel time estimate exceeds the allotted time, the system may execute one or more fraud prevention steps.
Methods and systems for efficient transfer of entities on a peer-to-peer distributed ledger using the blockchain
The invention provides a secure method for exchanging entities via a blockchain. The invention incorporates tokenisation techniques, and also techniques for embedding metadata in a redeem script of a blockchain transaction. Embodiment(s) provide a computer implemented method of performing a transfer, the method comprising: generating a first exchange transaction, and broadcasting, over a first network, the first exchange transaction for inclusion on a P2P distributed ledger, wherein the first exchange transaction comprises: an indication of a first quantity of a cryptocurrency to be transferred; a first input provided from an output of a first invitation transaction from a first user, the first invitation transaction previously included on the P2P distributed ledger, a first script, a first user private key associated with the first user, a first third-party private key associated with a first third-party, and a first output indicating a transfer of a first entity from the first user to a second user; and wherein the first script comprises: a first set of metadata providing an indication of the first entity to be transferred and a first set of conditions for the transfer, a first user public key associated with the first user, the first user public key being a cryptographic pair with the first user private key, and a first third-party public key associated with the first third-party, the first third-party public key being a cryptographic pair with the first third-party private key.
Real-time misappropriation detection and exposure assessment system
Real-time prevention of misappropriation and/or exposure assessment posed by a transaction at a POS terminal, especially those transactions in which it is not possible to otherwise definitively determine that a user/transactor is present at the POS terminal. AI is relied on, such as, a neural network implementing sequence modeling, to predict the likelihood that a user/transactor is present at the POS terminal. Location of a user is tracked via a designated mobile communication device and in instances in which a location of the mobile communication cannot be identified at the time of the transaction, the invention performs analysis based at least on the last-in-time location of the mobile communication device, the user's travel route leading up to the last-in-time location of the mobile communication device and other factors to predict a likelihood that the user is located at the POS terminal. As a result of the predicted likelihood either the transaction is automatically decisioned or the user/transactor is alerted and requested to their approve or reject/deny the transaction.
SYSTEMS AND METHODS FOR VALIDATING AN INSTRUMENT
Disclosed are methods and systems for validating instruments. For instance, a request to generate a cashier's check may be received from an application executing on a drawer's computing device. Request information may be stored within a data storage entry for the check, and a code to be printed on the check may be generated to include at least a portion of the request information. Instructions may be provided to a printing system to cause the check to be printed with the code, where the printed check is invalid. Instructions may be provided to the application and/or printing system to cause display of a prompt to facilitate a reading of the code to validate the check. When information within the code is read by and received from the printing system, the check may be validated, which triggers a transfer of funds from the drawer's account. Otherwise, the check may remain invalid.
Intermediary communications over non-persistent network connections
A mobile device with a first transceiver, a second transceiver, one or more processors, and memory bridges communications between an offline retail machine with a short-range communication capability and a remote server by obtaining via the first transceiver a single-use request code from an information packet broadcast by the offline retail machine; transmitting via the second transceiver the single-use request code to a remote server; obtaining via the second transceiver from the remote server a grant token including the single-use request code; detecting a trigger condition for initiating provision of a product or service by the offline retail machine; and in response to detecting the trigger condition, initiating performance of the provision of the product or service by transmitting the grant token to the offline retail machine via the first transceiver.
Transaction validation and fraud mitigation
Systems and methods that can verify transactions based upon location disparity between an account holder and POS (point of sale) as well as identity of a customer are provided. The system can employ camera-equipped drones or other image capture mechanisms to perform identity verification on behalf of a financial entity, cardholder or merchant. Further, the innovation provides systems and methodologies by which allegedly fraudulent or suspect transactions can be blocked or further investigated in real- or near real-time so as to assist in loss mitigation and potentially identification of fraudsters.
MOBILE DEVICE ACCESS PROTECTION
In aspects of mobile device access protection, a mobile device implements a performance degradation manager that can detect one or more contextual triggers that indicate at least one potential risk event, such as an unauthorized attempt to access a device application. Based on the one or more contextual triggers, the performance degradation manager performs a degradation protocol that limits access to one or more functions of the mobile device, where the one or more functions would normally provide access to personal information and/or a device application. The degradation protocol includes the appearance of a malfunction of the device, such as an application update, a touchscreen malfunction, a display malfunction, a connection malfunction, a power failure, and/or a redirection.
System for dynamic network authentication protocols
A system for implementing and managing network-based, variable authentication protocols receives information relating to a digital monetary transaction. Additionally, the system accesses an initial authentication protocol dataset. The system also generates a variable authentication protocol dataset. The system then communicates the variable authentication protocol dataset to the point-of-sale computer system. The system also receives, from the point-of-sale computer system, authentication tokens. Further, the system validates the authentication tokens in view of the variable authentication protocol dataset. Further still, in response to the validation of the authentication tokens, the system processes the digital monetary transaction.
INTERLEAVED SEQUENCE RECURRENT NEURAL NETWORKS FOR FRAUD DETECTION
A process for handling interleaved sequences using RNNs includes receiving data of a first transaction, retrieving a first state (e.g., a default or a saved RNN state for an entity associated with the first transaction), and determining a new second state and a prediction result using the first state and an input data based on the first transaction. The process includes updating the saved RNN state for the entity to be the second state. The process includes receiving data of a second transaction, where the second transaction is associated with the same entity as the first transaction. The process unloops an RNN associated with the saved RNN state including by: retrieving the second state, determining a new third state and a prediction result using the second state and an input data based the second transaction, and updating the saved RNN state for the entity to be the third state.
Image-based authorization systems
Aspects described herein may allow transactions to be authenticated based on images taken at the transaction site. For example, a computing device may decline a transaction request based on a first category of the transaction indicated in the category information violates a transaction category restriction of the user account. The computing device may send, to a user device associated with the user account, an instruction to upload one or more photos that depict a physical environment where the transaction is requested. If the photos indicate the requested transaction belongs to another category that does not violate the transaction category restriction, the system may approve the transaction based on the photos.