G06Q20/4016

High authentication layer to determine a person's location when considering sending a secure object
11488214 · 2022-11-01 · ·

A system, apparatus, and method are disclosed to enable a bank to send a secure object to a bank customer at a remote location. In addition to performing authentication, the system and method exploit the payment rails to verify transactions by the bank customer, as well as to confirm the physical location of the customer. The bank customer who is successfully verified may receive the secure object by courier at the remote location within a limited time period of the request.

Intelligent agent to simulate financial transactions

Embodiments can provide a computer implemented method for simulating transaction data using a reinforcement learning model including an intelligent agent, a policy engine, and an environment, the method including: providing standard customer transaction data representing a group of customers having similar transaction characteristics as a goal; and performing a plurality of iterations to simulate the standard customer transaction data, wherein the plurality of iterations is performed until a degree of similarity of simulated customer transaction data relative to the standard customer transaction data is higher than a first predefined threshold. In each iteration, the method includes: conducting, by the intelligent agent, an action including a plurality of simulated transactions; comparing, by the environment, the action with the goal; providing by the environment, a feedback associated with the action based on a degree of similarity relative to the goal; and adjusting, by the policy engine, a policy based on the feedback.

Crowd sourced mapping system

A crowd-sourced modeling system to perform operations that include: receiving image data that comprises image attributes; accessing a 3D model based on at least the image attributes of the image data, wherein the 3D model comprises a plurality of parts that collectively depict an object or environment; identifying a change in the object or environment based on a comparison of the image data with the plurality of parts of the 3D model, the change corresponding to a part of the 3D model from among the plurality of parts; and generating an update to the part of the 3D model based on the image attributes of the image data.

Systems and methods of detecting scan avoidance events

Methods of detecting scan avoidance events when items are passed through a field of view (FOV) of a scanner are disclosed herein. An example method, during a decode session, receiving, at one or more processors of the symbology reader, an image of an object; during a timeout period, detecting, at the one or more processors, an indicia in the image of the object, the indicia having a decodable payload; during the timeout period, attempting to decode the indicia to identify the decodable payload, at the one or more processors; and after the timeout period expires, when at least one portion but less than all portions of the indicia is decodable, determining a potential scan avoidance attempt and generating a scan avoidance alarm signal.

AUTOMATED FRAUD MONITORING AND TRIGGER-SYSTEM FOR DETECTING UNUSUAL PATTERNS ASSOCIATED WITH FRAUDULENT ACTIVITY, AND CORRESPONDING METHOD THEREOF

An automated real-time fraud monitoring and detection system for detecting unusual and/or suspicious activities within a network of nodes interconnected by edges triggered by captured synthetic forms of social data, in particular social networking and/or linkage and/or relationship data and social metadata including at least data from microblogging services and/or social networking services by pattern recognition and matching.

Systems and methods for automated fraud detection and analytics using aggregated payment vehicles and devices
11488170 · 2022-11-01 · ·

Systems and methods are disclosed for automated fraud detection and analytics using aggregated payment vehicles and devices, at the individual and/or household level. One method includes receiving an authorization request for a payment transaction originating at a merchant, using a first payment vehicle; receiving device information of a first device used in the payment transaction; retrieving transaction data and identifying information associated with the authorization request before the authorization request is routed to a financial institution; searching and determining payment vehicles and devices associated with the individual using the retrieved identifying information; aggregating transaction data associated with the payment vehicles and devices from the transaction database; retrieving reported fraudulent activities pertaining to the payment vehicles and devices; and generating a profile data for the individual according to the identifying information associated with the authorization request, personally identifiable information (PII), the aggregated transaction data, and reported fraudulent activities.

Managed EMV kernel for faster processing

Method and system of performing transactions with a payment card in a managed integrated payment environment comprising an integrated circuit are disclosed comprising interacting with an integrated circuit on a received payment card to obtain card data by a payment terminal and determining whether full online transaction processing of the card data is required. If full online transaction processing of the card data is required, the card data is sent to a point-of-sale terminal, which sends the card data and a transaction total for the transaction to a merchant gateway, which obtains approval or denial of the transaction. The approval or denial is provided to the PIN pad by the merchant gateway via the point-of-service terminal. The PIN pad also receives transaction data and sends the transaction data and card data to a services processor to collect metadata, perform fraud and security checks, and/or encrypt the card data.

SYSTEMS AND METHODS FOR PROCESSING TRANSACTION DISPUTES AND PROCESSING TRANSACTIONS ASSOCIATED WITH COMPROMISED ACCOUNTS

The present disclosure provides systems and methods for computerized methods and systems for processing transaction disputes and processing transactions associated with compromised accounts. According to one exemplary method, a server receives, from a user device, an instruction for disputing a transaction associated with a user account. The server can initiate, based on a record of the transaction, a dispute investigation, and issue provisional credit to the user account for the transaction. Based on a transaction history associated with the user account, the server can determine a plurality of expected transactions associated with the user account and cause the determined expected transactions to be displayed on the user device. After receiving a transaction authorization for at least one of the plurality of expected transactions, the server can process payments for the at least one of the plurality of expected transactions, and generate a notification indicating a status of the dispute investigation.

SYSTEM FOR DETECTION OF ENTITIES ASSOCIATED WITH COMPROMISED RECORDS

The disclosure herein describes a system and method for predictive identification of breached entities. Identification number and expiration date pairs associated with compromised records in a source file are analyzed to identify a set of candidate entities having records at least partially matching the source file data pairs having events occurring during a selected time period. Probability vectors are calculated for records associated with each identified entity. A divergence value is calculated which represents a distance between probability distribution vectors for each entity and probability distribution vectors for the source file. A predicted breached entity is identified based on the divergence values. The predicted breached entity is notified of the predicted breach. The notification can include an identification of the breached entity, identification of breached records, predicted time of breach, and/or a recommendation to take action to mitigate the predicted breach.

ONLINE TRANSACTION SYSTEM WITH BUYER REPUTATIONS

Systems and methods provide determining a reputation score of a buyer of a transaction of an item. An online shopping server receives buyer information and determines the reputation score of the buyer based on a transaction history of the buyer. The reputation score corresponds to a transaction type (e.g., a credit card transaction and a prepaid cash transaction) in varied levels of burden on the buyer. The online shopping server permits a buyer with a lower reputation score with a type of transaction that is higher in burden to perform for the buyer. The online shopping server performs the transaction based on the determined transaction type. The online shopping server updates the reputation score of the buyer based on a result of the transaction. Sellers of items uses reputation scores of buyers for providing distinguished sales items to buyers with higher reputations.