Patent classifications
G06Q20/4016
METHOD AND SYSTEM FOR PRIVACY ORIENTED PROVENANCE AT THE POINT OF SALE
The present disclosure provides a description of systems and methods for verifying product authenticity at a point of sale through transaction messages. A point of sale may collect product identifiers from products that a consumer is interested in purchase as part of a traditional checkout process. Product identifiers can be included in special data elements in a transaction message that is submitted to a merchant's acquiring bank through for the payment transaction. As part of the processing of the transaction by the acquirer, the acquirer can consult a processor to check the authenticity of the products being purchased by examining a provenance blockchain for the product identifiers included in the transaction message. If the products are determined to be authentic, the transaction can proceed as normal. If the products are not authentic, then the acquirer can deny the transaction and stop the consumer from purchasing a counterfeit or fraudulent good.
ROLLOVER FRAUD AVOIDANCE
Fraud associated with rollover of funds is avoided with enhanced mechanisms. Employee status can be determined from an employee profile. Based on changes to the employee profile, for example reflecting a change to the status of an employee, actions can be triggered to safe guard and aid rollover of an eligible retirement account. In one instance, notifications reminding an employee to initiate rollover of a retirement account of the employee can be generated, scheduled, and delivered in accordance with a notification plan. Further, a rollover grievance request from an employee can be processed with respect to a former employer, for instance by way of various notifications and optionally escalating further processing to an external party.
SERVICE MANAGEMENT SYSTEM FOR PROCESSING A REQUEST
In some implementations, a system may receive a request to facilitate a service interaction involving a user. The system may determine, based on receiving the request, a priority factor associated with facilitating the service interaction for the user. The priority factor may be determined based on account activity information associated with a user account of the user. The system may determine, based on the priority factor and service information, a priority score associated with facilitating the service interaction. The system may select, based on the priority score, a queue location of a queue. The queue may be associated with a provider system that is configured to facilitate the service interaction. The system may perform an action associated with causing the provider system to facilitate the service interaction according to the queue location.
Identifying domains for evaluation during transaction processing
Techniques are disclosed relating to determining a risk score for domains associated with a transaction. In some embodiments, a transaction computer system receives transaction details for a transaction between a consumer and a merchant, where the transaction details are received from the merchant real-time with the transaction and include a set of transaction URLs for subsequent use in the transaction. The computer system may receive, from a browser of the consumer that is used to initiate the transaction, URL referrer information real-time with the transaction, where the URL referrer information indicates a referring web page to the transaction computer system. The computer system may determine, using the set of transaction URLs and the URL referrer information, a set of domains for the transaction and then determine a risk score for the set of domains. The computer system may determine, based on the risk score, whether to allow the transaction.
Systems and methods for validating customer interactions
A method may include generating, by a computing device, a first dynamic QR code comprising a plurality of QR code frames, each QR code frame transmitted at a first frequency, the plurality of QR code frames comprising non-viable QR code frame(s) and at least one viable QR code frame. The method may include displaying, by the computing device, the first dynamic QR code, the at least one viable QR code frame displayed at a first time. The method may include transmitting, by the computing device, a first pulse to a user device. The method may include capturing, by the user device at the first time and in response to receiving the first pulse, the at least one viable QR code frame. The method may include generating and displaying, by the user device, a second dynamic QR code, causing the computing device to complete a requested transaction.
Computer-based information management system configured for automated and dynamic account analysis and methods thereof
Systems and methods of the present disclosure enable user-level activity recordation using population level activity data by receiving operator data including a record of activities performed by users on an operator system. Each entry in the record of activities is parsed to form structured activity entries representing each activity executed on the operator system. Each entry in the record of activities is matched to an individual account in an account database based on an individual identifier of each entry and an account individual identifier identifying the individual account. A statistical metric representing the activity history of the individual account is produced based on each entry matched to the individual account, and an activity history dashboard is displayed on an operator computing device to depicts the statistical metric for the individual account.
Systems and methods for providing fraud indicator data within an authentication protocol
A computing device for risk-based analysis of a payment card transaction is provided herein. The computing device includes a processor communicatively coupled to a memory. The computing device is programmed to receive a request for authentication of the payment card transaction. The payment card transaction includes a suspect consumer presenting a payment card from a digital wallet of a privileged cardholder. The computing device is also programmed to identify fraud feature data from the digital wallet. The computing device is further programmed to compute a fraud score for the payment card transaction based at least in part on the fraud feature data. The computing device is still further programmed to provide the fraud score for use during authentication of the suspect consumer.
Mobile application crash monitoring user interface
Various methods and systems for tracking incomplete purchases in correlation with application performance, such as application errors or crashes, are provided. In this regard, aspects of the invention facilitate monitoring transaction and application error events and analyzing data associated therewith to identify data indicating an impact of incomplete purchases in relation to an error(s) such that application performance can be improved. In various implementations, application data associated with an application installed on a mobile device is received. The application data is used to determine that an error that occurred in association with the application installed on the mobile device correlates with an incomplete monetary transaction initiated via the application. Based on the error correlating with the incomplete monetary transaction, a transaction attribute associated with the error is determined.
Systems and methods for automated fraud detection and analytics using aggregated payment vehicles and devices
Systems and methods are disclosed for automated fraud detection and analytics using aggregated payment vehicles and devices, at the individual and/or household level. One method includes receiving an authorization request for a payment transaction originating at a merchant, using a first payment vehicle; receiving device information of a first device used in the payment transaction; retrieving transaction data and identifying information associated with the authorization request before the authorization request is routed to a financial institution; searching and determining payment vehicles and devices associated with the individual using the retrieved identifying information; aggregating transaction data associated with the payment vehicles and devices from the transaction database; retrieving reported fraudulent activities pertaining to the payment vehicles and devices; and generating a profile data for the individual according to the identifying information associated with the authorization request, personally identifiable information (PII), the aggregated transaction data, and reported fraudulent activities.
SYSTEMS AND METHODS OF GLOBAL IDENTIFICATION
The invention provides one or more consortia of networks that identify and share information about users and/or user devices interacting with the consortia. User devices may be identified, at least in part, by a delta of time parameter between a user device used and a reference time. Other parameters may be analyzed to identify a computer user and/or device and noteworthy transactions. The invention may be used for identity-based applications such as network security, the detection of fraudulent transactions, identity theft, ratings-based communities and law enforcement. User may be permitted to register user devices in order to control access for performing transactions.