Patent classifications
G06Q20/4015
System and method for communicating a token to a mobile device
A method of communicating a token to a mobile device includes a server or computing device issuing a token, the token defining a bond for a transaction associated with a vehicle and associated with an entity. The method also includes transferring the token to a mobile device. The token can then be communicated from the mobile device to a point of sale (POS) device to enable completion of the transaction associated with the vehicle.
System, Method, and Computer Program Product for Dynamic Authorization Response Timeout
Systems, methods, and computer program products may receive, from a merchant system, an authorization request associated with a transaction; communicate the authorization request to an issuer system and initiate a response timer associated with the transaction; in response to the response timer satisfying a predetermined response time amount without receiving, from the issuer system, an authorization response associated with the authorization request, determine an extended response time; and in response to receiving the authorization response from the issuer system before the response timer satisfies a sum of the extended response time amount and the predetermined response time amount, communicate, to the merchant system, the authorization response.
CASH TRANSACTION MACHINE
Introduced is a technology for withdrawing cash from a cash transaction machine (CTM) by use of a mobile payment application installed on a mobile device of a consumer user (“the CTM technology”). Briefly described, the CTM technology enables a consumer user to identify one or more CTMs from which to withdraw cash by using his/her mobile device (e.g., a smartphone) as a “virtual” card. A particular CTM can be a conventional ATM or a POS system at a merchant's place of business. The user can use a mobile payment application installed on the user's mobile device to identify any nearby CTMs, request a withdrawal amount from a particular CTM from the identified nearby CTMs, receive a transaction code specific to that particular CTM, and physically obtain, or collect, the cash representative of the withdrawal amount at that particular CTM using the transaction code.
System, Method, and Computer Program Product for Real-Time Automatic Authorization of a Payment Transaction
Provided is a computer-implemented method for real-time automatic authorization of a payment transaction that is independent of an authorization input from a consumer. The method may include receiving first data associated with a consumer, generating a payment transaction classification model based on the first data associated with the consumer, receiving second data associated with the consumer, determining whether to process a payment transaction in real-time between the consumer and a merchant independent of an authorization input received from the consumer using the payment transaction classification model and the second data associated with the consumer, and processing a payment transaction between the consumer and the merchant based on determining to process the payment transaction in real-time between the consumer and the merchant.
METHODS AND SYSTEMS FOR VOICE COMMAND TRANSACTION AUTHENTICATION
The disclosure describes techniques for authenticating a voice command transaction initiated by a consumer at a voice-activated digital assistant. The system determine a proximity score for a consumer device. The proximity score is based on a distance between the consumer device and the digital assistant. The system detects motion indicating presence of a person proximate the digital assistant (based on wireless signal data) and determines a motion score. The system receives voice data from the digital assistant and determines a voice differentiation score. The system determines a rank score for the consumer device based on historical transaction data associated with the device. The system analyzes the proximity score, motion score, voice differentiation score, and rank score using a voice command authentication model. Based on the analysis, the system determines an authentication score for the voice command transaction request.
DATA QUALITY CONTROL IN AN ENTERPRISE DATA MANAGEMENT PLATFORM
Methods and systems are presented for collectively storing, managing, and analyzing data associated with different data sources. A data management system defines an enterprise data model schema based on different data model schemas associated with the different data sources. The data management system generates, for each data source, an enterprise data model instance based on the enterprise data model schema. Data is ingested from the different data sources, and then transformed and stored in a corresponding enterprise data model instance based on a mapping between a corresponding data model schema and the enterprise data model schema. Upon ingesting the data from the data sources, one or more consolidated data views are generated that combine at least portions of data from different enterprise data model instances. The data arranged according to the one or more consolidated data views is presented on a device and/or further analyzed to produce an analysis outcome.
Systems and methods for generation and selection of access rules
In some embodiments, a resource security system may determine an access request outcome (e.g., accept, reject, or review) for an access request based on access rules. The resource security system may generate and select the access rules to be used for using stability information. For instance, the resource security system may select a training set from the received access requests, e.g., including recently received access requests, and generate a plurality of potential access rules based on the training set. The resource security system may determine and compare the detection performance and the stability performance of the potential access rules. The resource security system may select the best performing potential access rules to be used in operation for determining the outcome of access requests.
Dynamic risk assessment for security features
Techniques are described for determining account features based on a risk assessment. A first set of account features may be determined, including security feature(s) such as mode(s) for authenticating and/or verifying the identity of a user associated with account(s). Based on the first set of features, a risk metric may be determined for the account(s). The risk metric may indicate a risk that fraud may be committed against the account or using the account. Based on the determined risk metric, a second set of account features may be determined for the account(s). The first and second sets of account feature(s) may be applied to the account(s). Disabling a particular feature may cause a reevaluation of the risk metric and a redetermination of the feature sets to be applied to the account(s).
Methods and systems for authentication for high-risk communications
An authentication method includes assigning a risk status to a request received from a remote interaction system, transmitting a notification communication to a device associated with the request, monitoring interaction data from an interaction network, and identifying, from the monitored interaction data, authentication interaction information, the authentication interaction information including a coded sequence and a predetermined authentication identifier. The authentication method also includes comparing the coded sequence in the authentication interaction information to an expected coded sequence and transmitting a verification communication after determining the coded sequence in the authentication interaction information matches the expected coded sequence.
System for dynamic network authentication protocols
A system for implementing and managing network-based, variable authentication protocols receives information relating to a digital monetary transaction. Additionally, the system accesses an initial authentication protocol dataset. The system also generates a variable authentication protocol dataset. The system then communicates the variable authentication protocol dataset to the point-of-sale computer system. The system also receives, from the point-of-sale computer system, authentication tokens. Further, the system validates the authentication tokens in view of the variable authentication protocol dataset. Further still, in response to the validation of the authentication tokens, the system processes the digital monetary transaction.