Patent classifications
G06Q20/4016
SYSTEMS AND METHODS FOR GENERATING A PERSONALITY PROFILE BASED ON USER DATA FROM DIFFERENT SOURCES
Implementations claimed and described herein provide systems and methods for behavior assessment for an individual. In one implementation, user data for the individual is obtained from one or more digital sources. Categorized user data is created by transforming the user data into a platform independent format. The categorized user data is associated with a plurality of content-based bins. One or more behavioral insight categories are determined from the categorized user data. A plurality of behavioral metrics is determined based on the one or more behavioral insight categories and the categorized user data. A personality profile for the individual is generated by converting the plurality of behavioral metrics into one or more scores. A risk assessment for the individual is generated based on the personality profile.
Method, system, and computer program product for processing a payment transaction via a proxy guarantor
A method for processing a payment transaction via a proxy guarantor includes: receiving a transaction request between a user and a merchant including payment device data associated with a payment device of the user of a payment type not accepted by the merchant, and an indicator causing the payment transaction to be processed as a proxy guarantor transaction; identifying a guarantor associated with the user having a payment device of a payment type accepted by the merchant; communicating an authorization request to an issuer system associated with the guarantor to cause the issuer system of the guarantor to authorize the payment transaction; receiving an authorization response from the issuer system of the guarantor, the authorization response including a payment transaction approval indicator; and communicating a settlement request to an issuer system of the user.
System and method for card control
A system and method for card control includes a card control computing system configured to enforce a card control rule based upon transactions made with a payment card. The card control computing system includes a memory unit configured to store information associated with a card control dashboard, and a processing unit configured to cause presentation of the card control dashboard via a display associated with a remote computing device, such that the card control dashboard is associated with the payment card and the card control rule. The card control dashboard includes a user interface. The processing unit is further configured to receive an input via the user interface to activate or deactivate one or more features associated with the card control rule, and trigger the card control rule based upon the one or more features that are activated or deactivated.
Financial risk management based on transactions portrait
An approach is provided in which the approach constructs a 3-dimensional (3D) matrix based on a plurality of historical transactions performed by a user. The 3D matrix includes a set of features, a set of rows, and a set of channels. The approach trains a convolutional neural network using the 3D matrix, and then uses the trained convolutional neural network to predict a risk level of a new transaction initiated by the user. The approach transmits an alert message based on the predicted risk level.
Context-dependent authentication system, method and device
A method for authenticating a user using a user device connected to a communications network, the method comprising an implicit phase, wherein said implicit phase comprises performing at least one task within a workflow, said at least one task necessary to move forward within said workflow; storing information associated with said performing of at least one task; comparing said stored information with a stored user profile; and determining whether said authentication of said user is successful or unsuccessful based on said comparing.
Systems and methods for monitoring and analyzing financial transactions on public distributed ledgers for suspicious and/or criminal activity
Systems and methods configured for monitoring and analyzing financial transactions on public distributed ledgers for suspicious and/or criminal activity are disclosed. Exemplary implementations may: access public third-party information for addresses involved in financial transactions; correlate a first portion of the public third-party information with transaction addresses; label the financial transactions and/or the addresses according to characteristics, such that individual ones of the addresses either have been labeled or are unlabeled; cluster the financial transactions and/or the addresses into a set of clusters that includes a first cluster; assign levels of risk for suspicious and/or criminal activity to the addresses and the financial transactions; and responsive to comparisons of levels of risk with a threshold, report transactions for suspicious and/or criminal activity.
Method, use thereof, computer program product and system for fraud detection
The current invention pertains to a computer-implemented method, a method, a use thereof, a computer system and a computer program product for determining a potential for anomalous activity by a suspect user, particularly for detecting fraud and most particularly for detecting money laundering.
Interactive mobile sessions based on point-of-sale and network transactions
Techniques described herein include analyzing point-of-sale transactions and initiating interactive mobile sessions responsive to the transactions. Platform servers receive transaction data indicative of a transaction performed via a point-of-sale system, determine additional data associated with server processes, and initiate interactive session with the mobile device to receive the additional data for performing the server processes. Based on the interactive sessions and additional data, the platform servers may enhance fraud detection capabilities and generates compliance records for tax and expense reporting based on the transactions, while supporting credentialing and authentication capabilities.
SECURELY PROCESSING EXCHANGE ITEMS IN A DATA COMMUNICATION SYSTEM
A data communication system comprises an enterprise storage and an enterprise server. The enterprise storage includes an exchange item database, an agreements database, and a rules database. The enterprise server operably coupled to the enterprise storage, wherein the enterprise server is operable to validate exchange items and create records in the exchange item database for validated exchange items. The enterprise server is further operable to securely transfer a selected exchange item from a first computing device to a second computing device. The enterprise server is further operable to authorize utilization of the selected exchange item in accordance with an agreement of the agreements database. The enterprise server is further operable to securely modify the data of the selected exchange item in accordance with rules from the rules database to produce an updated record regarding the selected exchange item and store the updated record in the exchange item database.
Reducing false positive fraud alerts for online financial transactions
In a method of preventing fraudulent online financial transactions, a request to authorize an online, financial transaction may be received, where the transaction is associated with a debit or credit card account. A computing device at which information associated with the debit or credit card account was entered for the transaction may be identified, and a first geographic location at which the computing device resides may be determined. Based upon geolocation data indicating one or more geographic locations of the authorized cardholder, it may be determined that the authorized cardholder was at a second geographic location at a time of the transaction. If the second geographic location does not correspond to the first geographic location, the financial transaction may be prevented from being executed.