Patent classifications
G06Q20/4016
Authentication of Users Using Historical Tipping Information to Generate Authentication Questions
Methods, systems, and apparatuses are described herein for improving computer authentication processes by generating authentication questions based on tipping trends. A computing device may receive a request for access to an account. Transactions data conducted by a user may be received. A tipping trend may be determined based on the one or more transactions conducted by the user. Based on the tipping trend, an authentication question may be generated. The authentication question may be provided, and a response to the authentication question may be received. A user device may be provided access to the account based on the response to the authentication question.
ACTION EXECUTION USING DECISION ENGINE SCORES WITH MULTIPLE MERCHANTS
Actions between a customer and a merchant are guided by decision engine scores using a shared history from multiple merchants. In an example, an action request is received at a service provider. A prime merchant identifier is applied to a merchant database to obtain a policy stack. A customer identifier is applied to a transactions database to obtain a transaction history for the customer and different merchants. Rules of the policy stack are applied in sequence to action parameters and values of the customer transaction history at a decision engine of the service provider, the decision engine generating a first action score. A customer score from the prime merchant is applied to generate a final action score and the prime merchant is notified to conditionally execute the requested action based on the final action score.
METHOD AND SYSTEM FOR DETECTING ABNORMAL TRANSACTION BETWEEN COMPUTING DEVICES IN A COMMUNICATION NETWORK USING VALID TRANSACTION PATTERN
The described technology relates to a method for detecting abnormal transaction data between computing devices in a communication network using valid transaction patterns and a server for performing the same. In one aspect, the method includes receiving, at a data collection processor, from an institution server computer, a plurality of pieces of transaction data communicated between two or more of the plurality of user devices, and determining, at a data processor, at least one piece of valid transaction data from the plurality of pieces of transaction data. The method may also include generating, at the data collection processor, a valid transaction pattern based on the determined valid transaction data. The method may further include detecting, at an abnormal transaction detection processor, an existence of an abnormal transaction data between two or more of the plurality of user devices based on the generated valid transaction pattern.
NOT PRESENT DISTRIBUTION COMMUNICATIONS TEIRED AUTHENTICATOR SYSTEM
Embodiments of the invention are directed to a system, method, or computer program product for a vehicle not present distribution communications tiered authenticator. This invention creates an instant authentication notification process to notify a user when a resource distribution is occurring in a vehicle not present resource distribution event. A user threshold matrix is generated a pre-determined threshold for threshold datapoints associated with a vehicle not present resource distribution event. The invention identifies a vehicle not present resource distribution event and confirms if the even triggers the user threshold matrix. If so, an authentication communication is transmitted to the user for real-time vehicle not present resource distribution approval prior to allowance of rail processing.
AUTOMATED SUPPORT FOR FREELANCERS
A facility for facilitating payments from a client to a freelancer is described. The facility provides a mobile app enabling the freelancer to open an account and solicit payments by clients. In response, each client can use any of a variety of forms of electronic payments to pay into the account. The freelancer can use a debit card issued for the account to spend or withdraw payments made into the account, and can use the app to track requests for payment, payments, client activity, and spending and withdrawals from the account.
TECHNIQUES FOR VEHICLE PARKING MANAGEMENT AND INVITATION-BASED PERMITTING
A parking management system identifies vehicles in entrance lanes, exit lanes, or both, of a parking facility and provides a real-time vehicle inventory count. One or more beacons locate point of sale (POS) devices assigned to parking attendants to determine which of them are performing vehicle transactions. Vehicles can be associated with specific transactions, as well as the transaction-authorizing attendant and the barrier gate and vehicle travel lane to which the attendant is assigned. To reduce fraud, this transaction information can be monitored in real time by a web or mobile dashboard and analyzed in real time or upon attendant end-of-shift checkout. The parking management system also implements permit parking invitation techniques that provide registration, payment in advance or on demand, or both, for parking of an invitee's vehicle. These tasks are accomplished without an inviter's knowledge about the invitee, the invitee's vehicle, or both.
Deployment of self-contained decision logic
In one aspect there is provided a method. The method may include collecting one or more functions that implement the decision logic of a solution. A snapshot of the one or more functions can be generated. The snapshot can executable code associated with the one or more functions. The solution can be deployed by at least storing the snapshot of the one or more functions to a repository Systems and articles of manufacture, including computer program products, are also provided.
Enhanced item validation and image evaluation system
Systems for item validation and image evaluation are provided. In some examples, a system may receive an instrument and associated data. The instrument may be received and at least one of a bill pay profile and a user profile may be retrieved. The bill pay profile and user profile may each include a plurality of previously processed instruments that have been determined to be valid and/or authentic. The instrument may be compared to the plurality of previously processed instruments to determine whether one or more elements of the instrument being evaluated match one or more corresponding elements of the plurality of previously processed instruments. Matching or non-matching elements may be identified. In some examples, one or more user interfaces may be generated displaying the instruments and including any highlighting or enhancements identifying matching or non-matching elements.
Systems and methods for incorporating breach velocities into fraud scoring models
A method and system for detecting fraudulent network events in a payment card network by incorporating breach velocities into fraud scoring models are provided. A potential compromise event is detected, and payment cards that transacted at a compromised entity associated with the potential compromise event are identified. Subsequent transaction activity for the payment cards is reviewed, and a data structure for the payment cards are generated. The data structure sorts subsequent transaction activity into fraud score range stripes. The data structure is parsed over a plurality of time periods, and at least one cumulative metric is calculated for each of the time periods in each fraud score range stripe. A plurality of ratio striping values are determined, and a set of feature inputs is generated using the ratio striping values. The feature inputs are applied to a scoring model used to score future real-time transactions initiated using the payment cards.
Data processing systems for generating personal data receipts and related methods
A method of identifying one or more pieces of personal data associated with a data subject based at least in part on one or more triggering action; identifying a storage location of each of the one or more pieces of personal data associated with the data subject; automatically determining that a first portion of the one or more of the pieces of personal data has one or more legal bases for continued storage; automatically maintaining storage of the first portion of the one or more pieces of personal data; and automatically facilitating deletion of a second portion of the one or more pieces of personal data associated with the data subject.