G06Q20/4015

SYSTEMS AND METHODS TO DETECT FRADULENT TRANSACTIONS

Systems and methods of the present disclosure are directed to detect fraudulent transactions. The method include detecting an online transaction initiated by a computing device. The method includes determining, identifying that the online transaction is in a state, a value corresponding to information of the computing device or a field of the online transaction. The method includes obtaining a look-up value corresponding to the value. The method includes selecting a routing policy based on comparing the value with the look-up value. The method includes determining to interrupt the online transaction based on detecting a presence of a match between at least one of the value and the look-up value. The method can include interrupting, responsive to the determination, the online transaction to direct the online transaction to a resolving state according to the routing policy.

LOCATION MODELING USING TRANSACTION DATA FOR VALIDATION
20200410492 · 2020-12-31 ·

Location modeling may be generated for candidate locations based on validated location data. The location models for candidate locations may be based on validated location data associated with wireless access points that is validated using transaction data. Such validation may include comparing an identifier associated with candidate location data received from a client device to an identifier for a transaction account associated with a transaction from transaction data at a candidate location. Matching transaction data and candidate location data may generate validated location data to be used in generating location models for candidate locations.

Method, server, and storage medium for verifying transactions using a smart card

A method, server and storage medium for verifying a transaction using a smart card are disclosed. A server receives a transaction request to perform a transaction with a user of the smart card. The transaction request includes identification information and encrypted data extracted from the smart card, and transaction information. The server determines a user account linked to the identification information. The server performs a first verification process to authenticate the smart card by verifying that the smart card possesses a correct decryption key corresponding to the identification information. The server performs a second verification process to authenticate the smart card by verifying that the encrypted data extracted from the smart card encodes stored data corresponding to the respective user account linked to the identification information. If the first and the second verification processes are successful, the server processes the transaction in accordance with the transaction information.

Automatic away mode for smart devices
10877546 · 2020-12-29 · ·

A processor may detect a transaction made using a point of sale system. The processor may determine that the transaction indicates a smart device is not in use. The processor may send a command causing the smart device to operate in an away mode.

Methods and systems for controlling access to a protected resource

An electronic device is disclosed. The electronic device includes a memory, a camera module, a communications module, and a processor that is configured to: receive first credentials identifying a user; transmit, via the communications module to an authentication server, a first signal including a request to verify that the first credentials are authorized for accessing a protected resource; when the first credentials are authorized for accessing the protected resource, receive, via the communications module from the authentication server, a second signal including an access token for use in authenticating the user on requests to access the protected resource; receive, from the camera module, image data associated with a machine-readable optical label, the optical label encoding transaction details of a first transaction; and generate a request based on the transaction details to access the protected resource for initiating the first transaction, the request including the access token.

Automated container kiosk
10878680 · 2020-12-29 ·

Apparatuses, methods, systems, and program products are disclosed for an automated container kiosk. An apparatus includes a request module configured to receive a request over a data network to unlock a door of a container. An apparatus includes a payment module configured to determine whether one or more payment conditions is satisfied for one or more items within a container. An apparatus includes a security module configured to, in response to determining that one or more payment conditions is satisfied, receive unlock information for unlocking a door of a container and enable one or more security measures for monitoring activity within the container.

System, Method, and Computer Program Product for Predicting a Specified Geographic Area of a User
20200402057 · 2020-12-24 ·

Provided is a system, method, and computer program product for predicting a specified geographic area of a user. The method includes receiving transaction data associated with a plurality of transactions during a predetermined time interval. The method also includes generating a geographic area prediction model based on the transaction data by determining a verified geographic area for each user, and determining transaction data associated with a plurality of transactions involving each user for a plurality of feature vector parameters, training the geographic area prediction model based on the plurality of feature vector parameters for the verified geographic area for each user, and validating the geographic area prediction model based on the plurality of feature vector parameters for the verified geographic area for each user.

SYSTEMS AND METHODS FOR PROVIDING A THIRD PARTY ACCESS TO INTERACTION DATA FOR AN ARTICLE

Systems, methods, and computer-readable media for providing a third party access to interaction data of an article. An event detection system can be coupled to an article for a recipient. The event detection system can include a wireless communication interface and a sensor configured to detect at least one interaction event that occurs at the article. Interaction data related to the at least one interaction event can be generated that includes a user identifier of the recipient that is uniquely associated with an article identifier of the article. The interaction data can be transmitted through the wireless communication interface to an operating server for providing a third party access to the interaction data based on the inclusion of the user identifier and the article identifier with the interaction data.

EDGE-NODE TOUCHLESS AUTHENTICATION ARCHITECTURE
20200402052 · 2020-12-24 ·

This disclosure describes an edge-node computing system that provides streamlined access to secured products/services based on data captured by one or more sensors. The captured data may include unsolicited authenticators. Edge-nodes may process the captured data and perform a plurality of pre-authentication routines. A consensus protocol executed by the edge-nodes may establish a threshold pre-authentication of a customer based on the plurality of pre-authentication routines. Edge-nodes may configure an automated teller machine (ATM) to provide the customer access to the ATM based on the threshold pre-authentication. The edge-nodes may configure the ATM to allow the customer to use a contactless authentication method to access the ATM.

MOBILE ORDERING AND PAYMENT SOLUTION BASED ON WI-FI NETWORK
20200402056 · 2020-12-24 ·

Conventionally, ordering for items at large venues with multiple concessions stands requires users to wait in line at each counter to place an order. Embodiments of present disclosure provide system to place an order from their mobile phones, without need of downloading any application. When user logins to wi-fi network, a captive portal specific to the location of user is dynamically generated wherein proximity based entities providing items for ordering are displayed. MAC address of user's mobile device is captured during registering of mobile device to Wi-Fi network. A zip code from mobile device is obtained to authenticate payment card selected on captive portal for completing transaction. The order is determined as a first order or nth order for given day and amount is computed for completing the transaction, the computed amount is specific to item and other items being processed in previous sessions of the given day.