Patent classifications
G06Q20/4015
Using receipts for multifactor authentication
Multifactor authentication techniques described herein may allow a user to submit a recent proof of purchase as a part of a multifactor authentication process to access an account associated with a financial institution. As part of the login process, the user may submit a proof of purchase associated with a transaction. The financial institution may determine information associated with the transaction, such as a merchant associated with the proof of purchase, a time of the transaction, the last four numbers of the transaction card used, a dollar amount, or any combination thereof. If the information matches one or more records in the transaction history of the user's account, the financial institution may authenticate the user and provide access to the account. In this way, the financial institution may leverage transaction history known to the financial institution and the user to authenticate the user.
Peer validation for unauthorized transactions
A method for peer validation for unauthorized transactions includes receiving a request to validate a user performing a transaction anomaly, wherein the transaction anomaly represents a potential fraudulent financial transaction. The method, responsive to identifying one or more boundaries to search for validation users, identifies a set of validation users in the identified one or more boundaries, where each validation user from the set of validation users has the ability to visually confirm the user performing the transaction as a valid user associated with an account for the transaction anomaly. The method displays information for the valid user associated with the account for the transaction anomaly. The method, responsive to determining the user is not validated for the transaction anomaly, declines the transaction anomaly.
Locking system for exchange of items, services, and/or facilities
One or more techniques and/or systems are provided for facilitating the exchange of an item. For example, a containment component is configured to receive one or more items. A locking component is configured to selectively restrict or allow access to the item. A code generation component is configured to generate and provide an unlocking code to a requestor (e.g., based upon payment by the requestor that requests access to the item). A code entry component is configured to receive user input of a code. The code entry component either retains the locking component in a locked state if the code is not validated as the unlocking code or transitions the locking component into an unlocked state if the code is validated as the unlocking code.
System and method to identify user and device behavior abnormalities to continuously measure transaction risk
Aspects of the disclosure provide techniques for using behavior based information for providing and restricting access to a secure website, or computer network and its assets to a user. Components of the system may include the following. Client remote computing device, network and browser unique attribute data collection and fingerprinting. Method for capturing user habits and fingerprinting with ability to detect abnormalities through AIML using mobile and wearable device applications. System for detection of normality of user behavior based on habits, and cyber transactions, device access and determining a confidence score associated with each transaction. Method for calculating individual transaction risk based on contextual factors such as user behavior, device, browser and the network traffic and request for authentication by account owner when risk greater than allowed threshold. Method and system to identify user device, browser, and behavior unique attributes, storing and later matching to infer change upon consequent transactions and measuring transaction risk through a search and match against classified set of static and dynamic attributes using a user, browser traffic, device search and match engine.
METHOD AND SYSTEM FOR CHARGING ELECTRIC VEHICLE, AND STORAGE MEDIUM
A method and system for charging an electric vehicle, and a storage medium are provided. The method includes: acquiring a target charging user in a charging station and to-be-confirmed charging guns in the charging station, the target charging user being a user requires charging of the electric vehicle in the charging station, and the to-be-confirmed charging gun being a charging gun which is inserted into an electric vehicle but is not started for charging; transmitting, to a terminal device of the target charging user, a charging gun list including information about the to-be-confirmed charging guns in the charging station; receiving, from the terminal device of the target charging user, a target charging gun selected by the target charging user from the charging gun list; and controlling the target charging gun to charge the electric vehicle. The solution is applicable for charging an electric vehicle under various conditions and lights.
Systems and methods for completing transactions via lockable boxes
A method performed by a processor of a provider computing system includes allowing an account holder at the provider to initiate a transaction with the provider remotely (e.g., via smartphone, online banking, etc.), by submitting a request for a specified transaction to be picked up in a lockbox at a provider's lockbox location. The pickup and completion of the account holder's requested transaction occurs at a lockbox location that has a plurality of lockboxes. The lockbox allows the account holder to access the facility at the account holder's leisure, both in time and location. The lockbox pickup service alleviates the uncertainty, fluctuating time cost, and inconvenient operating hours by allowing the account holder to request transactions with an easy to use interface resulting in a lockbox to be accordingly prepped so that the account holder can provide the proper authentication information and access the lockbox.
Systems and methods for remote atm access
Systems and methods of remotely configuring a transaction based, in part, on location information for execution by a computing device associated with a financial institution computing system include a backend system configured to receive location information associated with a user device, determine the location information associated with the user device matches a location configured for pre-staging an ATM transaction, transmit an ATM pre-stage authorization signal to the user device, transmit an authentication decision to the user device, and transmit a transaction code to the user device.
Systems and methods for detecting transaction card fraud based on geographic patterns of purchases
A computer-implemented method for detecting potentially fraudulent cardholder transactions is implemented by a fraud detection computer system in communication with a memory. The method includes identifying a first home location for a first cardholder, identifying an expected range of travel relative to the first home location for the first cardholder when making a typical financial transaction in at least one merchant category, receiving transaction data associated with a first financial transaction, retrieving the first home location based on the cardholder data and a merchant location for the first merchant based on the merchant data, calculating a distance of travel between the first merchant location and the cardholder home location, comparing the calculated distance of travel to the expected range of travel, and flagging the first financial transaction as potentially fraudulent upon determining that the calculated distance of travel exceeds the expected range of travel.
Automatically displaying payment pages based on proximity to a payment device
Techniques for displaying a payment page based on the proximity of a payment device to a client computing device are described. One example method includes receiving, at a client computing device, a signal when the client computing device is within a predetermined range of a source of the signal; determining, by the client computing device, that the signal is a predetermined characteristic signal sent by an electronic device of a payee; and in response to determining that the received signal is the predetermined characteristic signal, displaying, by the client computing device, a payment page configured to be read by the electronic device of the payee to perform an electronic payment.
SYSTEMS AND METHODS FOR TRANSLATING A GESTURE TO INITIATE A FINANCIAL TRANSACTION
Systems and methods for initiating and/or facilitating a financial transaction in response to detecting and translating a spatial gesture may be provided. A payor transaction device may be capable of detecting, via a motion-detecting device, a payor spatial gesture corresponding to a payment gesture of one or more predetermined spatial gestures and, responsive to detecting the payor spatial gesture, receiving payee account information from a payee transaction device. The payor transaction device may also be capable of transmitting, to a payor computing device, transaction data comprising the payee account information and data indicative of the payor spatial gesture. The payor computing device may be capable of transmitting at least a portion of the transaction data to a financial service provider terminal to enable the financial service provider terminal to facilitate the requested transaction.