G06Q20/4015

STAGE-SPECIFIC PIPELINE VIEW USING PREDICTION ENGINE

Techniques for displaying a stage-specific pipeline view with a prediction engine are disclosed. A system displays a plurality of regions representing various stages of completion for a plurality of transactions. The system determines a stage of completion for each of the plurality of transactions at a first point-in-time, and generates and displays visualizations representing each of the plurality of transactions in one of the plurality of regions based on the respective current stage of completion. Generating a visualization representing a first transaction includes determining a likelihood of the first transaction completing a stage associated with the first transaction. The likelihood may be determined by selecting attributes associated with the first transaction and identifying prior transactions with similar attributes. The system may compute the likelihood of the first transaction completing the stage based on completion rates associated with the prior transactions, and select the visualization based on the computed likelihood.

SYSTEMS FOR DETECTING APPLICATION, DATABASE, AND SYSTEM ANOMALIES
20210073819 · 2021-03-11 ·

Detecting fraudulent activity can include receiving, via at least one computing device, transactional data from a first computing system, the transactional data comprising data describing at least one transaction and user identifying information. The transactional data can be determined to correspond to a particular user account. Mobile device data associated with the particular user account can be received. Based on a comparison of the transactional data to the mobile device data, a likelihood of a fraudulent event can be determined. In response to the likelihood of the fraudulent event exceeding a predefined threshold, one or more remedial actions can be performed.

PEER VALIDATION FOR UNAUTHORIZED TRANSACTIONS
20210073818 · 2021-03-11 ·

A method for peer validation for unauthorized transactions includes receiving a request to validate a user performing a transaction anomaly, wherein the transaction anomaly represents a potential fraudulent financial transaction. The method, responsive to identifying one or more boundaries to search for validation users, identifies a set of validation users in the identified one or more boundaries, where each validation user from the set of validation users has the ability to visually confirm the user performing the transaction as a valid user associated with an account for the transaction anomaly. The method displays information for the valid user associated with the account for the transaction anomaly. The method, responsive to determining the user is not validated for the transaction anomaly, declines the transaction anomaly.

SYSTEM FOR IDENTIFYING POINTS OF COMPROMISE
20210073820 · 2021-03-11 ·

The disclosure describes an apparatus having programmed instructions that when executed cause the apparatus to receive, via a communication network, information regarding suspicious fraud activity at a first location involving a plurality of transaction cards; monitor changes over a first time interval to received information regarding suspicious fraud activity at the first location; and identify a point-of-compromise (POC) location based on monitored changes surpassing a threshold indicating suspicious fraud activity at the first location over the first time interval.

System, method and computer program product for automatic and remote control of NFC transaction processing

A method, system, and computer program product for automatic and remote control of NFC transaction processing. The method includes receiving transaction data associated with a transaction, automatically requesting a token associated with the transaction from a transaction processing network in response to receiving the transaction data, receiving the token from the transaction processing network, automatically and wirelessly transmitting the token from a first device to a second device via NFC in response to receiving the token from the transaction processing network, automatically transmitting the token to the transaction processing network in response to receiving the token from the first device, receiving an authorization response associated with the transaction from the transaction processing network, and determining a compatibility of an application associated with at least one of the first device and the second device with the transaction processing network based on the authorization response.

REPLACING A CUSTOMER CARD PAYMENT WITH A ONE-TIME LOAN AT A POINT OF SALE
20210065160 · 2021-03-04 · ·

A system and method for replacing a customer's debit card payment with a one-time loan at a point of sale (POS) is disclosed. The method receives, at a POS, a debit card input from a customer to be used as a transaction payment. The POS obtains, from the debit card input, identification information for the customer. A total monetary amount of the transaction payment and the identification information is provided to a one-time loan provider's computer system. The one-time loan provider's system uses the customer identification information to perform a credit screening for the total monetary amount of the transaction payment. The one-time loan provider's system provides to the POS a one-time loan offer for the customer. The one-time loan offer to be used in place of the debit card input to make the transaction payment.

SYSTEMS AND METHODS FOR MONITORING POST-TRANSACTION ADJUSTMENTS
20230419314 · 2023-12-28 ·

Disclosed embodiments may include a system for monitoring post-transaction adjustments. The system may receive data associated with a transaction, and determine whether the transaction is indicative of a post-transaction event (PTE). The system may cause a user device to display, via a GUI, a notification to prompt a user to confirm the PTE occurred and to enter a post-transaction amount (PTA) associated with the PTE. The system may monitor the data to determine whether the data has been updated to include a second PTA, and if so, the system may determine whether the first and second PTAs match. When a match is determined, the system may confirm the transaction, modify the GUI to generate a modified GUI comprising a confirmation indication, and cause the user device to display the confirmation indication. When no match is determined, the system may initiate fraud prevention action(s).

AUTOMATED TELLER MACHINE (ATM) INCLUDING AN APPLICATION PROGRAMMING INTERFACE (API)-EQUIPPED, EMBEDDED MOBILE COMPUTER

An ATM system includes a back-end server, an ATM central processing unit (ATM CPU) that receives information relating to the ATM system and a mobile computer. The mobile computer provides a CPU (MC CPU) and a keypad. The mobile computer may also provide a touch screen configured to display an initial ATM display. The ATM system also includes an interface system for interfacing between the ATM CPU and MC CPU. The back-end server formats and transmits to the ATM an API call. The API call requests a location of the user, ATM device information, and identification information of the user. The mobile computer is configured to respond to the API call by providing the location, the ATM device information, and the identification information of the user to the back-end server.

Using augmented reality data as part of a fraud detection process

A fraud detection system may identify a suspected fraudulent transaction based on one or more criteria. The transaction may be associated with a user. Based on identifying a suspected fraudulent transaction, the fraud detection system may receive augmented reality data from an augmented reality device of the user. The fraud detection system may determine, based on the augmented reality data, whether the transaction is fraudulent, and may take an action based on the determination.

PROXIMITY DETECTION, VIRTUAL DETECTION, OR LOCATION BASED TRIGGERING OF THE EXCHANGE OF VALUE AND INFORMATION

A system, methods, and apparatuses are provided for valuation and exchange of stored value assets, information of value, and the transfer of value to or among individuals. The exchanged assets may be of a similar nature, e.g., music files exchanged for other music files, and exchange or trade of information such as rewards value or a restaurant coupon. The exchanged assets may also be other dissimilar assets exchanged between individuals and/or entities. The exchange may be initiated in numerous ways such as after completing a review, exchanging or trading a gift card, a prepaid card, a reward card, a coupon, a ticket, a pass, and/or the like when in proximity to a specific location or a location of some type or category, and/or exchanging or trading of other assets between individuals based on one or more constraints such as time, location, need, desire for the assets, and/or proximity.