G06Q20/4016

FRAUD DETECTION SYSTEM, FRAUD DETECTION DEVICE, FRAUD DETECTION METHOD, AND PROGRAM
20220351211 · 2022-11-03 ·

A fraud detection system for executing predetermined processing when a detection target is detected by using a detection device, the fraud detection system comprising at least one processor which determines, before the detection target is detected, whether a predetermined action has been performed by a user having a user terminal; executes, when it is determined that the predetermined action has been performed, fraud detection on the user based on identification information stored in the user terminal; and executes, when the detection target is detected, the predetermined processing based on an execution result of the fraud detection.

CRYPTOCURRENCY TRANSACTION ANALYSIS METHOD AND APPARATUS
20220343330 · 2022-10-27 · ·

The present disclosure relates to a method for detecting a scam address of cryptocurrency using a machine learning model, and the method comprises: acquiring information about scam addresses labeled as being used for a scam transaction and information about benign addresses labeled as being used for a normal transaction from a database; acquiring information about a mule address group used for money laundering on the basis of the scam address group; acquiring feature information corresponding to each of the benign addresses and the addresses included in the scam address group or the mule address group on the basis of at least one of the information about the benign addresses, the information about the scam address group, and the information about the mule address group; and generating a machine learning model by machine learning of the feature information corresponding to each of the addresses and label information corresponding to each of the addresses.

METHOD AND SYSTEM FOR DETECTION OF ABNORMAL TRANSACTIONAL BEHAVIOR

A method for detecting abnormal transactional behavior in a financial account is provided. The method includes: accessing first information that includes a textual description of a first transaction of a plurality of transactions associated with a first account; analyzing the text by applying tags thereto; assigning, based on a result of the analyzing, the first transaction to a respective cluster of the plurality of transactions; and designating each respective cluster as corresponding to one from among a normal transactional behavior group, an abnormal transactional behavior group, and an anomalous transactional behavior group. When a proportion of abnormal and anomalous transactions exceeds a threshold, the account may be flagged for further investigation.

SYSTEMS AND METHODS FOR GENERATING SYNTHETIC DATA USING FEDERATED, COLLABORATIVE, PRIVACY PRESERVING MODELS

Systems and methods for generating synthetic data using federated, collaborative, privacy preserving learning models are disclosed. In one embodiment, a method for generating synthetic data from real data for use in a federated learning network may include: (1) conducting, by a backend for a first institution of a plurality of institutions in a federated learning network, a transaction comprising transaction data; (2) generating, by the backend for the first institution, local synthetic data for the transaction data using a local synthetic data generating model; (3) sharing, by the backend for the first institution, the local synthetic data with a plurality of backends for other institutions; (4) receiving, by the backend for the first institution, global synthetic data from the plurality of backends for the other institutions; and (5) training, by the backend for the first institution, a local machine learning model with the global synthetic data.

TRANSACTION VERIFICATION METHOD, AND SYSTEM
20220343332 · 2022-10-27 · ·

Disclosed are a transaction verification method and a system. The method comprises: receiving request information for launching a transaction page that is sent by a user terminal, the request information for launching the transaction page comprising current position information of the user terminal and region restriction information pre-configured for the transaction page; verifying, according to the current position information of the user terminal and the region restriction information, a transaction action corresponding to the request information for the transaction page; if the transaction action corresponding to the request information for the transaction page is verified successfully, performing a transaction page response, and sending the transaction page to the user terminal, so as to enable the user terminal to perform the transaction action; and if the transaction action corresponding to the request information for the transaction page does not pass the verification, ending a transaction page response.

ENHANCING INVESTMENT ACCOUNT SECURITY

A method, computer system, and a computer program product for account security is provided. The present invention may include analyzing one or more financial accounts of a user and assigning a risk threshold to each of the one or more financial accounts. The present invention may include monitoring a vulnerability of each of the one or more financial accounts, wherein the vulnerability is monitored using a vulnerability score, the vulnerability score being generated based on user data. The present invention may include determining the risk threshold has been exceeded for at least one financial account based on a comparison of the vulnerability score and the risk threshold of the at least one financial account. The present invention may include preventing access to the at least one financial account in which the risk threshold has been exceeded.

PROGRESSIVELY VALIDATING ACCESS TOKENS
20230092902 · 2023-03-23 ·

Embodiments relate to progressively validating access token. In response to intercepting an initial call for a transaction for a service from a client, a token is validated for the initial call of the transaction for the service, the validating including contacting an authentication sever and locally storing a time to live received for the token. In response to intercepting at least one successive call for the transaction for the service from the client, it is determined that the token for the at least one successive call is valid based on the time to live locally saved. The at least one successive call for the transaction for the service is permitted to pass without contacting the authentication sever.

DYNAMIC SECURITY CODE

A system and method are disclosed for determining when to update and updating dynamic security codes. A user's payment information (e.g., credit card information) includes a dynamic security code that may be updated after a threshold amount of time passes or after successful transactions made using the dynamic security code. The time at which an update is made may be used to generate the updated dynamic security code. A user may specify a dynamic security code associated with the user's payment information (e.g., credit card information) while requesting a transaction be made with the user's credit card. A record of previously generated dynamic security codes is maintained. The transaction may be authorized based on whether the user-specified dynamic security code matches any of the current or previously generated dynamic security codes.

DYNAMIC SPATIAL AND TEMPORAL SYSTEM FOR AUTHENTICATION OF ELECTRONIC INTERACTIONS BETWEEN ELECTRONIC DEVICES
20230089937 · 2023-03-23 · ·

Systems, computer program products, and methods are described herein for the dynamic authentication of electronic interactions between electronic devices. The present invention may be configured to identify an unauthorized resource transfer from a source retainer, extract a resource transfer log, and determine an interaction associated with a previous resource transfer during which authentication credentials providing access to the source retainer were obtained without authorization. The present invention may be configured to extract data associated with the previous resource transfer, and historical data associated with historical unauthorized resource transfers. The data associated with the previous resource transfer and historical data may comprise spatial information, temporal information, and resource transfer device information. The present invention may be configured to correlate the data associated with the previous resource transfer with the historical data and identify a pattern associated with the unauthorized resource transfers. The present invention may be configured to construct a geo-fencing boundary based on the pattern and apply unique authentication credentials to received interaction requests from within the geo-fencing boundary.

SYSTEMS AND METHODS FOR APPLICATION-BASED MANAGEMENT OF TRANSACTIONS
20230091965 · 2023-03-23 ·

Systems and methods for application-based management of transactions are disclosed. In accordance with aspects, a method may include receiving, at a transaction management service, a received transaction including a plurality of data parameters associated with the received transaction; generating, by the transaction management service, a transaction challenge record including the plurality of data parameters, a party key and a challenge identifier; transmitting a notification to a user device including the challenge identifier; receiving, from the user device, a validation communication that validates the received transaction and includes the challenge identifier; determining customer context information based on the challenge identifier and the party key; generating, by the transaction management service, service options based on the customer context information; transmitting, by the transaction management service, the service options to the user device; and receiving, at the transaction management service, instructions with respect to the received transaction based on the service options.