G06Q20/4016

ADVANCED CHECK CLEARANCE SYSTEM
20230230092 · 2023-07-20 ·

A computerized method verifies an issued check. The method verifies that the first check information matches second check information. The first and second checking information includes first and second routing numbers, first and second account numbers, first and second check numbers, and first and second dollar amounts associated with an issued check and received check, respectively. The method sends to a computer system of a payee financial institution in response to verifying the first check information matches the second check information, a verification message indicating that the first check information matches the second check information. The method also receives an indicator from the payer financial institution after the issued check has cleared in the payer financial institution; and informs the payee financial institution after the issued check has cleared.

METHODS, SYSTEMS, ARTICLES OF MANUFACTURE AND APPARATUS TO CONTROL TRANSACTIONAL DATA
20230230091 · 2023-07-20 ·

Methods, apparatus, systems, and articles of manufacture are disclosed to control transactional data. An example apparatus disclosed herein includes memory, machine readable instructions, and processor circuitry to at least one of instantiate or execute the machine readable instructions to populate encrypted input data into a first portion of a data structure, populate an encryption key into a second portion of the data structure, cause the first portion of the data structure to be signed with (a) credentials corresponding to an owner of the encrypted data and (b) credentials corresponding to a transaction host, and store the data structure in a ledger.

METHOD AND SYSTEM OF IDENTIFYING AND REDUCING SCALPING USING DISTRIBUTED LEDGERS

A method for preventing an unauthorized transaction indicative of scalping includes: receiving transaction data for a first payment transaction including one or more product identifiers associated with one or more products purchased in the first payment transaction and consumer identification data; updating a consumer profile based on the one or more product identifiers, wherein the consumer profile is identified using the consumer identification data; receiving a transaction message for a second payment transaction including at least one product identifier included in the one or more product identifiers and at least one consumer data value that is also included in the consumer profile; determining a suspicion score for the consumer profile above a predetermined threshold value; and transmitting an authorization response message for the second payment transaction including a response code indicative of rejection of the second payment transaction.

SYSTEMS, METHODS, AND APPARATUSES FOR IMPLEMENTING USER CUSTOMIZABLE RISK MANAGEMENT TOOLS WITH STATISTICAL MODELING AND RECOMMENDATION ENGINE
20230230090 · 2023-07-20 ·

Systems, methods, and apparatuses for implementing user customizable risk management tools with statistical modeling and a recommendation engine within a computing environment are provided. A system may include, for example, means for evaluating the performance of a user rule for fraud prevention, in which the system receives a plurality of purchase transactions for the user; analyzes each purchase transaction received to generate a fraud likelihood score; receives the rule that specifies conditions when the system is to accept or reject transactions regardless of the fraud likelihood score generated by the system; transmits a historical analysis to the user based on the received rule; receives an input from the user to activate the rule; monitors performance of the rule; and transmits a recommendation to the user to retain or cancel the activated rule based on the monitored performance. Other related embodiments are disclosed.

SYSTEMS AND METHODS FOR PROVIDING REAL-TIME WARNINGS TO MERCHANTS FOR DATA BREACHES

The disclosed embodiments provide systems and methods for providing real-time warnings to merchants for data breaches. For example, the system may include one or more memory devices storing instructions and one or more processors configured to perform operations consistent with this disclosure. The operations may include collecting and storing transaction authorization requests from one or more merchants. The transaction authorization requests may include a virtual account number associated with an account, the virtual account number being previously bound to a merchant and reusable only for the bound merchant. The operations may further include detecting an event at the bound merchant based on, for example, a transaction authorization request having a mismatch between a transacting merchant and the bound merchant. The operations my further include communicating notification of the event through a communication interface with the bound merchant.

Risk mitigation for a cryptoasset custodial system using data points from multiple mobile devices

Methods, systems, and apparatus for risk mitigation for a cryptoasset custodial system include transmitting an endorsement request for a cryptoasset transaction to a user device configured to cause the user device to prompt a user to endorse the cryptoasset transaction. Multiple data points are collected from mobile devices associated with the user. The data points indicate an identity of the user. A cryptographic endorsement of the cryptoasset transaction is received from the user device. A graphical visualization including a risk metric is generated based on the data points. The risk metric indicates a risk of accepting the cryptographic endorsement from the user device. Generating the graphical visualization includes determining whether the plurality of data points matches expected values.

Systems and methods employing searches for known identifiers of sensitive information to identify sensitive information in data
11704672 · 2023-07-18 · ·

A data string that includes potentially sensitive information, such as an account number for a payment card, may be evaluated to determine whether or not any portion of the data string encodes a known identifier of sensitive information, such as a known bank identification number (BIN). A fixed number of bytes of the data string may be analyzed using a trie algorithm, in which the value of a first byte is compared with the value of a corresponding first character of the known identifier. A second byte is then compared with a set of values of corresponding second characters, which accompany the first character of the known identifier. Then the value of a third byte of the data string is compared with a set of values of corresponding third values, which accompany the first and second characters of the known identifier. The use of a trie algorithm decreases the length of the search process by several orders of magnitude.

USER INTERFACE MODALITY SWITCHING FOR TRANSACTION MANAGEMENT
20230229466 · 2023-07-20 ·

A method may include presenting a user interface (UI), to a user, in a first mode on a client device, the UI including a list portion, the list portion including a plurality of transactions associated with respective activity on a user account, and the client device including an input device; receiving an indication of a first user action on a transaction presented in the list portion of the UI; in response to receiving the indication, updating a section of the list portion corresponding to the transaction, the updating including revealing a set of options for the transaction; receiving an indication of a second user action corresponding to activation of an option of the set of options; and in response to receiving the indication of the second user action, transitioning the UI from the first mode to a second mode, the second mode including a chatbot interface instantiated with respect to the transaction.

User authentication based on a user interaction associated with a transaction

An example fraud analysis platform may receive timing information associated with a user interaction during a transaction, wherein the user interaction is associated with a user engaging in a transaction using a transaction account and a transaction device to access the transaction account. The fraud analysis platform may generate, based on the timing information, a transaction interaction signature associated with the user interaction. The fraud analysis platform may compare the transaction interaction signature to a reference signature associated with an authorized user of a transaction account. The fraud analysis platform may determine, based on the transaction interaction signature being associated with the reference signature, that the user interaction was performed by the authorized user of the transaction account. The fraud analysis platform may perform, based on determining that the user interaction was performed by the authorized user, an action associated with the transaction or transaction account.

Banknote deposit machine
11704670 · 2023-07-18 ·

A banknote deposit machine is able to receive banknotes, preferably so as to make a payment, wherein the banknote machine is permanently connected via a data link to a (cloud) storage system, or is designed to establish a temporary data link with the (cloud) storage system. Banknote data, such as image data or serial number data, etc., specifically of banknotes which are considered stolen or which were handed over as a result of a crime, for example as a ransom, are stored in the (cloud) storage system. Whenever the banknote deposit machine receives a banknote whose identification appears suspicious, for example because the banknote has a serial number that is stored in the (cloud) storage system, feedback is sent to the operator of the banknote machine and/or the payment transaction is terminated and/or an appropriate institution or authority, for example the police or a security service, is automatically informed.