G06Q20/4016

Authentication Question Topic Exclusion Based on Response Hesitation

Methods, systems, and apparatuses are described herein for improving computer authentication processes by analyzing user response times to authentication questions. A request for access to an account may be received. Transaction data associated with a user of that account may be retrieved, and a list of merchants may be generated based on the transaction data. A blocklist may be retrieved, and the list of merchants may be filtered based on the blocklist. An authentication question may be presented. The authentication question may relate to the list of merchants. User responses may be received, and response times for the user responses may be measured. Based on the response times and the response times for other users, an average response time for the merchants may be determined. Based on the average response time for a particular merchant exceeding a threshold, the particular merchant may be added to the blocklist.

Fraud Detection and Prevention System
20230012460 · 2023-01-12 ·

Systems, apparatuses, and methods are described for detecting and preventing suspicious payment card authorization attempts at a merchant level. A computing device may receive a plurality of authorization attempts and store the plurality of authorization attempts in a database. Each authorization attempt may correspond to an attempted transaction and may be associated with a respective merchant. The computing device may generate a database query configured to retrieve a first plurality of authorization attempts corresponding to a first merchant. The database query may be generated based on first criteria corresponding to a first notification rule, and the first criteria may be configured to detect a pattern of authorization attempts at a given merchant and associated with a potential account testing attack. The computing device may determine a suspicious status for the merchant and perform one or more actions associated with the merchant.

User Presence Detection for Authentication Question Generation

Methods, systems, and apparatuses are described herein for improving computer authentication processes by generating authentication questions based on the location of a user. Transaction data indicating a plurality of transactions associated with a user account may be received. Location data indicating a plurality of locations of a user device might be received. At least a subset of the plurality of transactions may be tagged, based on the location data, with an indication that a user was present for a respective transaction. For example, a location of a merchant might be compared to a user device location indicated by the location data. A plurality of authentication questions might be generated based on the subset of the plurality of transactions. Access to the user account might be provided based on responses to the plurality of authentication questions.

Advanced data collection using browser extension application for internet security

A browser extension application is configured to collect data relating to the user's browsing activity and display notifications on a user interface. A user can instruct a web browsing application to navigate to a website. The browser extension application can detect a type of the webpage, and based on the type of the webpage, collect certain information relating to what the webpage is asking the user to provide and what the user is providing to the webpage. The browser extension application can transmit this information to a browser extension server. The browser extension server can determine a likelihood that the website is associated with instances of hacking online accounts. The browser extension server can transmit a signal to the browser extension application of the user's computing device. The browser extension application can take an action, e.g., direct the user to another website or log out of the user's account.

Dynamic generation of digital messages with unique links for direct-to-merchant payments
11699157 · 2023-07-11 · ·

A payer initiates a payment transaction of a certain dollar amount through a user interface provided by their bank. The bank generates a hyperlink associated with the payment transaction. By managing a state of the transaction, the hyperlink can be given an expiration time and/or a counter of visits. The hyperlink is sent to a payment recipient in a text message or email, either by the payer or by the bank. Upon following the hyperlink, the recipient can enter their own debit card information to receive the money transfer to their debit account, without the need to set up an account login or account. A notification mechanism, such as a broadcast stream of payments, can be employed to inform different entities (such as those recording property payments or utilities payments) that a payment was made to the payment recipient.

METHOD AND APPARATUS FOR DETECTING SUSPICIOUS ACTIVITY USING VIDEO ANALYSIS
20230215180 · 2023-07-06 ·

A system detects a transaction outcome by obtaining video data associated with a transaction area and analyzing the video data to obtain at least one video transaction parameter concerning transactions associated with the transaction area. The transaction area can be a video count of items indicated in the video data as detected by an automated item detection algorithm applied to the video data. The system obtains at least one expected transaction parameter concerning an expected transaction that occurs in the transaction area, such as a scan count of items scanned at a point of sale terminal. The system automatically compares the video transaction parameter(s) to the expected transaction parameter(s) to identify a transaction outcome that may indicate fraudulent activity such as sweethearting in a retail environment.

METHOD AND COMPUTER SYSTEM ADAPTED FOR PERFORMING DIGITAL ASSET DONATION TRANSACTIONS FOR NONPROFIT ORGANIZATIONS
20230011577 · 2023-01-12 ·

In a method and computer system adapted for performing digital asset donation transactions for nonprofit organizations (NPOs), at least one of one or more computing devices ingests digital donation assets from one or more donors intended for a NPO, and then tokenizes the ingested digital donation assets using stablecoin to provide tokenized assets. The tokenized assets are then processed for transfer via ACH to the NPO.

Method, System, and Computer Program Product for Operating Dynamic Shadow Testing Environments
20230214313 · 2023-07-06 ·

Described are a method, system, and computer program product for operating dynamic shadow testing environments for machine-learning models. The method includes generating a shadow testing environment operating at least two transaction services. The method also includes receiving a plurality of transaction authorization requests. The method further includes determining a first percentage associated with a first testing policy of the first transaction service and a second percentage associated with a second testing policy of the second transaction service. The method further includes replicating in the shadow testing environment, in real-time with processing the payment transactions, a first portion of the plurality of transaction authorization requests and a second portion of the plurality of transaction authorization requests. The method further includes testing the first transaction service using the first set of replicated transaction data and the second transaction service using the second set of replicated transaction data.

Payslip verification for blockchain transaction

A computer-implemented method, system, and computer program product for reducing fraud based on a forged or altered payslip. A blockchain is configured for recording transactions. A payslip is prepared having information regarding an employee. At least one hash is provided for a portion of the information. The at least one hash and the portion of the information is recorded in the blockchain as a blockchain transaction. A barcode is configured to act as a pointer for locating the blockchain transaction. The barcode is inserted into a barcode location on the payslip. The payslip is delivered to the employee.

Intelligent security risk assessment
11550905 · 2023-01-10 · ·

A method, computer system, and computer program product for on-demand risk assessment in on-line transactions comprises: computing, by a machine intelligence application, a risk score for the individual; providing the risk score to a cache; and responsive to receiving new data regarding the individual, calculating a new risk score for the individual and replacing the risk score in the cache with the new score.