Patent classifications
G06Q20/4016
System and method for detecting fraudulent bank transactions
A system for detecting a fraudulent ATM transaction is disclosed. The system relates to an ATM machine that receives a bank/ATM card from a customer. The ATM first attempts to read information from the card chip, but is unable to do so due to a read error. The ATM then instead reads the information from the magnetic strip, and initiates a fraud detection procedure. In one such procedure, the ATM uses a local wireless access point to detect a customer's device, such as a phone, in the vicinity of the ATM. In another such procedure, the ATM communicates with a backend server. The backend server then determines the location of the customer device either by transmitting a message to request authorization, or by utilizing GPS or other location-detection means on the customer device to determine whether the customer device is within the ATM vicinity.
Systems and methods for authorizing transactions without a payment card present
Systems, methods, and computer-readable storage media utilized for authorizing transactions without a payment card present. One method includes receiving a habitual transaction request including a customer indicator and identifying characteristics of the habitual transaction request. The method further includes identifying, utilizing the customer indicator, habit information of a customer and authenticating the habitual transaction request based on the characteristics of the habitual transaction request conforming with the habit information. The method further includes, in response to authenticating the habitual transaction request, authorizing the habitual transaction request and receiving a non-habitual transaction request including the customer indicator. The method further includes determining that the customer is active, and the customer indicator is approved to conduct a non-habitual transaction and authorizing the non-habitual transaction request based on the determination and the customer indicator being approved to conduct the non-habitual transaction and transmitting a notification indicating the non-habitual transaction request was authorized.
OFFICE OF FOREIGN ASSETS CONTROL (OFAC) COMPLIANCE SYSTEM
A computerized method produces an identity code to identify each subject stored in the computer systems connected to a computer network while protecting the privacy and confidentiality of the subject. A central computer system receives an identity code of a suspect of a financial crime and sends the identity code to all computer systems connected to the computer network. The computer systems that have the matched identity code send the requested information to the central computer system. As a result, law enforcement organizations can eliminate crimes and financial institutions can recover the money stolen from them. In addition, law enforcement organizations and financial institutions can identify money launderers that are missed by their anti-money laundering transactional monitoring systems.
System and method to accept third-party payments
A real-time third-party payment system accepts payments to a lender from third-party merchants in real-time. The payment system may receive real-time payment information from the third-party, and various services within the payment system validate the customer account information, create a payment, store the payment in a database, and post the payment to a real-time ledger. The payment system may also receive an end-of-day file including file-based payment information. The file-based payment information may be verified against the real-time payments stored in the database. Upon validation, the payment system creates a file based payment and posts the file-based payment to a file-based ledger. The payment system may detect fraud, errors, and other discrepancies in real-time payments and make corrections based on settlement rules and self-healing rules provided by the third-party.
Financial messaging transformation-as-a-service
A transformation-as-a-service apparatus, system and method are described, where the transformation converts financial messages from one format to another (such as SWIFT format to ISO 20022 format, etc), storing the original and transformed messages for future access by a token. The transformation service also includes a permissions and access control mechanism for allowing access to the financial messages based on requestor permissions when requested via the token.
GRAPH DATA PROCESSING METHOD AND APPARATUS, COMPUTER DEVICE, AND STORAGE MEDIUM
Provided is a graph data processing method, including: acquiring a degree of association of each node in a network graph; splitting the network graph to obtain a dense subgraph according to the degree of association of each node; determining stable nodes in the network graph and coreness of the stable nodes based on the dense subgraph, the coreness of the stable nodes being greater than a preset threshold; obtaining a sparse subgraph in the network graph according to the preset threshold, and remaining nodes in the network graph other than the stable nodes and connecting edges between the remaining nodes; and determining the coreness of each node in the sparse subgraph based on the sparse subgraph and the stable nodes.
Fraud behavior recognition device, control program thereof, and fraud behavior recognition method
A detection device for detecting a fraud behavior of a customer at a point-of-sale (POS) terminal in a store, including a first interface circuit configured to receive a first image of the customer from a camera, a second interface circuit configured to receive a second image that is displayed on the POS terminal, and a processor configured to acquire one or more first images via the first interface circuit and determine one or more behaviors of the customer based on the acquired first images, acquire one or more second images via the second interface circuit and determine, based on the acquired second images, one or more operations that have been made by the customer on the POS terminal, and determine that one of the behaviors is fraudulent based on one or more of the operations that have been made by the customer before said one of the behaviors.
Contactless payment relay attack protection
A method for contactless payment relay attack protection includes receiving an online authorization request including a cryptogram, a measured processing time, and a reference processing time from a terminal. The cryptogram is verified, and a determination is performed as to whether the measured processing time exceeds the reference processing time. An online authorization response authorizing or declining a monetary transaction is transmitted, based on the determination. An artificial intelligence transaction analysis can be performed based on past and current conditions (e.g., battery level, operating system, open applications) of a payment device such as a mobile phone, past and current conditions of a terminal, and/or a monetary amount. The online authorization response can be based on the artificial intelligence transaction analysis.
PEER-TO-PEER TERMINAL AND CONTRACT TRANSACTION SYSTEM
A peer-to-peer terminal includes a bid data obtaining unit, a bid data transmitter, a contract result calculator, a contract result transmitter, a contract result receiver, and a contract result selector. The bid data obtaining unit obtains bid data. The bid data transmitter transmits the bid data to another peer-to-peer terminal. The contract result calculator calculates a contract result from a bid data set obtained by the bid data obtaining unit and including the bid data. The contract result transmitter transmits the contract result to the other peer-to-peer terminal. The contract result receiver receives, from the other peer-to-peer terminal, another contract result calculated by the other peer-to-peer terminal. The contract result selector selects one contract result from among the contract result and the other contract result.
System and method for processing real-time online donations
A method including a system receiving, in real-time and through a computer network, a donation authorization from a donor via a donor user interface executed on a donor device of the donor. The donation authorization can comprise: a donation amount, a donor token for the donor, a donee first token for a donee, and/or donee information. The donor token can be uniquely associated with a donor account for the donor, and the donor account can be maintained by a sender financial institution. The donee first token can be uniquely associated with a donee account for the donee, and the donee account can be maintained by a receiver financial institution. The method further can include the system, after receiving the donation authorization, instructing or facilitating, in real-time and through the computer network, the receiver financial institution to post in real-time the donation amount to the donee account. Other embodiments are disclosed.