Patent classifications
G06Q20/4015
PARALLEL MACHINE LEARNING MODELS
A processing system including at least one processor may obtain at least one of a first machine learning model or a second machine learning model, deploy the at least one of the first machine learning model or the second machine learning model to a plurality of trained machine learning models for operating in parallel with respect to a same prediction task, obtain at least one data set, apply the at least one data set to the plurality of trained machine learning models, obtain the first result of the first machine learning model and a second result of the second machine learning model in accordance with the applying, store the first result of the first machine learning model and the second result of the second machine learning model, and provide an output in accordance with at least one of the first result or the second result.
Systems and methods for authentication based on personal card network
A financial institution computing system includes a network circuit exchanging information over a network, a customer database storing financial information, and a transaction circuit. The transaction circuit receives a transaction request associated with a user computing device. The transaction request specifies a financial account. The transaction circuit receives payment card location information indicative of a location of a payment card with respect to the user computing device. The payment card location information indicates that the payment card is within a threshold distance of the user computing device. The transaction circuit authenticates the transaction request using the payment card location information and by determining whether the payment card is associated with an authorized user of the financial account. The transaction circuit authorizes the transaction request based on whether the transaction request is authenticated and transmits a confirmation to a transaction terminal over the network via the network circuit.
SYSTEMS AND METHODS FOR PAYMENT PROCESSING
Systems and methods are disclosed for processing payments. For example, a method may include: receiving, from a mobile device associated with a user, a code and a request to enable the code to be usable to open a payment channel for receiving payment from an account of the user; receiving, from a merchant system associated with a merchant, a request to use the code to open the payment channel; receiving, from the merchant system, information indicative of a payment to be made to an account of the merchant via the payment channel; receiving, from the mobile device, geolocation information indicative of a geolocation of the mobile device; determining whether there is a location match between the geolocation of the mobile device indicated by the geolocation information and a point of sale location of the merchant; and processing the payment.
System and method for detecting fraudulent bank transactions
A system for detecting a fraudulent ATM transaction is disclosed. The system relates to an ATM machine that receives a bank/ATM card from a customer. The ATM first attempts to read information from the card chip, but is unable to do so due to a read error. The ATM then instead reads the information from the magnetic strip, and initiates a fraud detection procedure. In one such procedure, the ATM uses a local wireless access point to detect a customer's device, such as a phone, in the vicinity of the ATM. In another such procedure, the ATM communicates with a backend server. The backend server then determines the location of the customer device either by transmitting a message to request authorization, or by utilizing GPS or other location-detection means on the customer device to determine whether the customer device is within the ATM vicinity.
GAME BASED ON PAYMENT TRANSACTIONS IN ELECTRONIC PAYMENT TRANSACTION PROCESSING NETWORKS
Embodiments include apparatuses, methods, and systems for playing a game based on payment transactions within an electronic payment transaction processing network. Based on data provided by a user, the user is authenticated to operate a game based on payment transactions. One or more payment cards used to perform payment transactions are to be registered within the game. A data record is added and an award within the game is received for a contactless payment transaction performed using the one or more payment cards. The data record is stored in a storage accessible by the game. The award is to be converted to a benefit to the user. The received award is displayed on a leaderboard in a user interface of the game. The leaderboard also displays one or more awards received by one or more other people associated with the user. Other embodiments may also be described and claimed.
PERSONAL SECURITY MONITORING
Computer-implemented services provide personal security monitoring and/or oversight of interactions between parties that may be initiated online, and in some circumstances extended to real-world in-person interactions. Profiles associated with individuals involved in a transaction may be developed and centrally managed. Profiles may contain, e.g., information concerning a user's identity, historical and/or current location information, user communication information, and the like. Profile information may be used by a central security oversight platform and/or provided to third party systems for, e.g., assessing risks involved in a particular interaction, providing accountability amongst users, and assisting law enforcement or third parties in transaction intercession and/or investigation in the event that an interaction results in negative consequences.
Method for Internet User Authentication
A computer-implemented method of authenticating the identity of a user is provided, where the user is associated with a computer signature and is in possession of a mobile phone. The method involves obtaining a current geographical location of the mobile phone, determining if the computer signature is associated in a database with a stored geographical location of the phone, and, if the computer signature is associated in the database with a stored geographical location, comparing the stored geographical location to the current geographical location of the phone.
SYSTEM AND METHOD FOR AUTHORIZING A TRANSACTION BASED ON DYNAMIC LOCATION UPDATES FROM A USER DEVICE
A method and system for processing a payment authorization request associated with a payment card is provided. The method comprises: receiving by a server location, updates from a user device based on at least one criterion for location updates from the user device; determining by the server, a cardholder's location based on the location updates; determining by the server, a transaction location based on analysis of a payment authorization request associated with a transaction; generating by the server, at least one of a transaction authorization approval and a transaction authorization denial in connection with the payment authorization request based on selectively matching the transaction location with the cardholder's location at the time of the transaction.
INFORMATION PROCESSING APPARATUS, INFORMATION PROCESSING METHOD, AND STORAGE MEDIUM
An information processing apparatus according to one example embodiment is an information processing apparatus that performs a checkout process for a product or a service, and the information processing apparatus includes: a motion unit that causes the information processing apparatus to autonomously move; a detection unit configured to detect a position of a person; and a control unit that controls the motion unit in accordance with the position of the person.
LOCATION-BASED ACCESS APPROVAL
In one aspect, a method of granting geographic-based access authorization, includes storing, with a first processor, an access credential, receiving, with the first processor, travel data for at least one travel plan for a user of the access credential, transmitting, with the first processor, the received travel data to an issuer of the access credential, updating, with a second processor, access rules based on the received travel plans, receiving, by the second processor from the first processor, an access request during travel, authorizing, by the second processor, access to the first processor in accordance with the updated access rules.