G06Q20/4015

Methods, devices, and systems for authenticating user identity for location-based deliveries
11200306 · 2021-12-14 · ·

A method for authenticating a user includes transmitting, from a first electronic device at a first location via a first communications link, first biometric information of a first user, authenticating a first identity of the first user for a transaction associated with an item, transmitting, from a second electronic device at a second location via a second communications link, second biometric information of a second user, authenticating a second identity of the second user located at the second location that is different from the first location, verifying that the first user at the first location corresponds to the second user at the second location, and authorizing access to the item at the second location, responsive to verifying by the server that the first user at the first location corresponds to the second user at the second location. Related systems, devices and computer program products are also described.

METHOD FOR CONTROLLING THE RESOLUTION OF FAULTS IN DISTRIBUTED EQUIPMENT
20210383333 · 2021-12-09 ·

Control procedure for resolving faults in equipment (1) distributed over a plurality of users (2) and requiring the movement of technicians (3) belonging to a technical service that is supervised by a controller (4), which includes various sub-stages by the users (2) each of them on a first terminal (20) connected to the internet (100), and on which a first application runs; various sub-stages by the technicians (3), provided with a second terminal (30) each equipped with a geolocator (33), connected to the internet (100) and on which a second application runs and various sub-stages by a controller (4), who has the central server (40) connected to the internet (100) to communicate with the first terminals (20) and with the second terminals (30) to control the technicians' schedules and to give them support and speed up the work.

AUTHENTICATION AND AUTHORIZATION WITH PHYSICAL CARDS
20210383397 · 2021-12-09 ·

Systems and methods for authentication and authorization using physical computing cards include receiving from the physical computing card an authorization request, where the request includes a card identifier and an entity location. Authorized users associated with the card identifier are determined. Identifications of users with pending transactions at the entity location are obtained. Verification is performed by determining that there is a match between an identification of a user to an identification of one of the authorized users. The user is then authorized to access resources associated with the physical computing card.

Intelligent Processing of Broken or Failed ATM Transactions

Aspects of the disclosure relate to intelligent processing of broken or failed ATM transactions. In some embodiments, a computing platform may receive transaction data associated with a pending transaction initiated on a mobile computing device and generate hash information corresponding to the received transaction data. Then, the computing platform may identify ATMs previously visited by the user. Based on performing analytics on those previously visited ATMs, the computing platform may identify, from those previously visited ATMs, one or more alternate ATMs for completing the pending transaction. Next, the computing platform may send a notification to the mobile computing device that includes navigation information. Thereafter, the computing platform may cause the alternate ATMs to await input from the user by sending the generated hash information. In response to receiving a message indicating completion of the pending transaction, the computing platform may initiate clearing of a pending status of the pending transaction.

SYSTEM FOR DYNAMIC NETWORK AUTHENTICATION PROTOCOLS

A system for implementing and managing network-based, variable authentication protocols receives information relating to a digital monetary transaction. Additionally, the system accesses an initial authentication protocol dataset. The system also generates a variable authentication protocol dataset. The system then communicates the variable authentication protocol dataset to the point-of-sale computer system. The system also receives, from the point-of-sale computer system, authentication tokens. Further, the system validates the authentication tokens in view of the variable authentication protocol dataset. Further still, in response to the validation of the authentication tokens, the system processes the digital monetary transaction.

MACHINE LEARNING TELECOMMUNICATION NETWORK SERVICE FRAUD DETECTION
20210383393 · 2021-12-09 ·

A processing system may obtain a customer identifier at a first retail location of a telecommunication network service provider, determine a recency factor of the identifier, obtain an identification of items of interest to the customer, and determine whether the customer has visited a second retail location of the provider within a time period prior to the customer being at the first retail location. The processing system may then apply, to a fraud detection machine learning model, a plurality of factors comprising: a quantity of items of interest, a value of the items, a factor associated with whether the customer has visited the second retail location within the time period, and the recency factor, where the fraud detection machine learning model outputs a fraud indicator value, determine that the fraud indicator value meets a warning threshold and present a warning to a device at the first retail location.

LIVE CARD TRACKING
20210383390 · 2021-12-09 ·

A method for use with a smart card is provided. The smart card may include a communication interface, a housing, a microprocessor embedded in the housing, a battery for powering the communication interface and the microprocessor, and a nano GPS chip, located within the housing and in electronic communication with the communication interface and the microprocessor. The thickness of the smart card is preferably no greater than 0.8 millimeters (“mm”) and has surface area not greater than 86 mm×54 mm. The method may include determining the location of the smart card in response to a request for a smart card transaction authorization and determining the location of a mobile device associated with a specified user of the smart card. Based on the location of the smart card and the location of the mobile device, the smart card may calculate a location delta between the smart card and the mobile device. If the location delta is greater than or equal to a threshold distance, the smart card may deny the request for smart card transaction authorization.

SYSTEMS AND METHODS FOR FRAUD DETECTION AND PREVENTION
20210383392 · 2021-12-09 ·

Systems and methods for fraud detection and prevention is disclosed. The system may receive a transaction request for a first customer including a transaction location, transaction time stamp, and merchant type code. The system may determine whether the transaction location is expected for the first customer. When the transaction location is unexpected, the system may identify a last-known video detection having a last-known time stamp and last-known location. The system may determine a travel time estimate between the last-known location and the transaction location and determine a buffer based on the merchant type code. The system may compare the travel time estimate to an allotted time that includes a difference between the transaction time stamp and last-known time stamp less the buffer. When the travel time estimate exceeds the allotted time, the system may execute one or more fraud prevention steps.

UTILIZING MACHINE LEARNING AND TRUSTED TRANSACTION CARD LOCATIONS TO GENERATE A GEOGRAPHICAL MAP OF THE TRUSTED TRANSACTION CARDS
20210383394 · 2021-12-09 ·

A device may receive, from client devices of users, user data identifying the users, client device data identifying the client devices, and transaction card data identifying transaction cards, and may receive transaction account data identifying transaction accounts. The device may process the user data, the client device data, the transaction card data, and the transaction account data, with a machine learning model, to determine trust scores for the transaction cards, and may identify trusted transaction cards based on the trust scores. The device may receive, from trusted client devices associated with the trusted transaction cards, location data identifying locations of the trusted client devices and communication data indicating communications between the trusted transaction cards and the trusted client devices. The device may generate a card mapping for the trusted transaction cards based on the location data and the communication data, and may perform actions based on the card mapping.

Ambient transaction system

An ambient transaction system is described for facilitating various transactions types between a management system and a connected device over a transaction platform. Based on a variety of different triggering conditions, the transaction platform may establish an integrated session among the transaction platform, the management system, and the connected device. The transaction platform includes integrated logic of the management system such that a presentment layer provided to the connected device by the transaction platform via the integrated session includes features of the management system associated with the transaction type. When the transaction is a payment transaction, the features may include a payment feature through which checkout options may be selected for payment via the connected device. Upon receiving a payment selection from the connected device, the transaction platform may transmit the payment information to a payment processing system, and provide payment confirmation to at least the management system.