G06Q20/4016

DISTRIBUTED LEDGER BASED ARTIFICE PROHIBITION TECHNOLOGY
20230035049 · 2023-02-02 ·

Apparatus and methods are provided for multiple debit/credit cards from a family/friend group to enter in a distributed ledger network such as a blockchain. These networked cards may store, and replicate records of all transactions initiated by each card using immutable cryptographic signature. A secure mobile app may link and delink cards to the network. Linked cards may maintain transaction amount, time, place, date, location, key type pattern, user's image, voice sample, user info for all the other cards in the distributed ledger. Whenever any card performs a transaction, a record of the transaction is replicated locally on the same card and copied to all other cards in the distributed ledger network. Any care may verify all the attributes of past transactions, compare those attributes to current transaction attributes and alert other cards in the network in response to detecting suspicious transaction activity.

ENTITY EMBEDDINGS FOR VIRTUAL CARD NUMBER PAYMENT VERIFICATION
20230036263 · 2023-02-02 ·

The present disclosure provides systems and methods for calculating a similarity value between entities embedded within a vector field of a plurality of entities. The systems and methods can include receiving a first request from a first request entity to process a first payment completed via a virtual number, and accessing a database comprising a plurality of entity embeddings. The systems and methods can include retrieving a first embedding for the first request entity and a second embedding for a bound entity associated with the virtual number. After calculating a similarity value between the first request entity and the bound entity, the systems and methods can approve or deny the first request based on a similarity threshold value.

TRANSACTION SEQUENCE MODELING FOR FRAUD DETECTION
20230030327 · 2023-02-02 ·

The probabilities of transitioning between states of a given transaction sequence for a given transaction are calculated and a non-fraud score is calculated from the probabilities. The non-fraud score is provided to a fraud-detection system for determining whether the transaction sequence is more likely or less likely to be associated with fraud.

Risk management and control method and device

Methods, systems, and apparatus, including computer programs encoded on computer storage media, for a risk management method are provided. One of the methods includes: determining a candidate verification mode set comprising one or more candidate verification modes for a target event; determining output weights for at least some of the verification modes in the candidate verification mode set; and selecting a verification mode for risk management of the target event from the candidate verification mode set based on the output weights. In this method, multiple factors, such as risk type, device type, user preference, are taken into consideration in an quantification process when selecting a verification mode. Thus this method avoids excessive reliance on subject understanding of a transaction, improves the robustness of risk management against unauthorized transactions, and reduces unnecessary interference to authorized transactions.

DISTRIBUTED ADAPTIVE MACHINE LEARNING TRAINING FOR INTERACTION EXPOSURE DETECTION AND PREVENTION
20230031123 · 2023-02-02 · ·

Embodiments of the present invention provide for a distributed adaptive learning transaction fraud detection and prevention system has a meta-model system that accesses a fraud meta-model comprising a real-time fraud detection and prevention engine and a transaction database comprising transaction fraud decision data and transaction fraud feedback data; receives from at least one sub-system a sub-system best performing fraud model; updates the fraud meta-model based at least in part on the sub-system best performing fraud model; and transmits the updated fraud meta-model to the at least one sub-system; and at least one sub-system receives the updated fraud meta-model transmitted from the meta-model system; accessing a sub-system fraud model comprising a real-time fraud detection and prevention engine and a transaction database comprising transaction fraud decision data and transaction fraud feedback data; and updates the sub-system fraud model with the updated fraud meta-model transmitted from the meta-model system.

System For Deterring Unauthorized Access To An Account Associated With An Online Ordering Platform
20230032497 · 2023-02-02 · ·

A system and a method for deterring unauthorized access to an account. The method includes the steps of receiving a user login request from one of a plurality of account holder computers, then identifying a username associated with the received user login request, a time associated with the received user login request, and an internet protocol (IP) address associated with the received user login request. The method and system determine a number of prior login requests received from the identified IP address during a duration of time T.sub.R prior to the identified time. Each of the received login requests has a unique username that is different than the identified username. The method includes the step of disabling access to the account associated with the identified username when the determined number of received login requests is above a request threshold B.

Account security system

A webcam account security system that allows a user to require activation of a webcam when accessing an account. The system may prompt a user attempting to access the account to activate the webcam and may deny access to the account or require additional security procedures when access to the webcam is not granted. Additionally, the system may store any images or footage captured by the webcam for analysis in the case a fraud notification is received. The system may further deny access to the account when the webcam is unable to detect the face or an identifying characteristic of the person attempting to access the account.

METHOD AND SYSTEM FOR VALIDATING FINANCIAL EVENTS AND SECURITY EVENTS
20230032963 · 2023-02-02 ·

Methods and systems provide for approaching end-users, collecting their information as it relates to a specific suspect event or set of events, for security events, such as financial events and computer security events, and then applying an Artificial Intelligence (AI) model, to a given security event, to analyze the provided information, to investigate the event or set of events, for validation.

Systems and methods for using information from wearable devices

Systems and methods for the of use information from application programming interfaces on wearable devices in third party applications are provided. A system comprising a user device, data storage, an application programming interface and an application is provided. In this system, there is a user device that includes a health monitor. The health monitor includes sensors and associated software that enable it to obtain health information about the wearer of the user device. In this system, there is data storage on the user device that stores the health information as user health data. In this system, there is an application programming interface on the user device that enables the health monitor to share the user health data with other applications executing on the user device.

Personalized Out-of-Pocket Cost for Healthcare Service Bundles
20220351162 · 2022-11-03 ·

An example method for providing out-of-pocket cost for invasive and/or operative procedure bundles includes: receiving a query that identifies an insurance payor, a requested procedure, and an insured patient; defining one or more providers required by the requested procedure; translating the query into a corresponding electronic data interchange eligibility and benefits inquiry for each of the one or more providers; sending each electronic data interchange eligibility and benefits inquiry to a payor; receiving a corresponding electronic data interchange eligibility and benefits response from the payor; parsing and extracting necessary elements from the eligibility and benefits responses; mapping and sending the parsed and extracted necessary elements from the eligibility and benefits responses to a cost calculator; collecting, calculating, and/or estimating corresponding provider contracted rates; and sending the collected, calculated, and/or estimated corresponding provider contracted rates to a cost calculator.