Patent classifications
G06Q20/4016
COMMUNICATIONS SERVER APPARATUS, METHOD AND COMMUNICATIONS SYSTEM FOR MANAGING AUTHENTICATION OF A USER
A communications server apparatus for managing authentication of a user based on one or more authentication events in a session is provided, to, in one or more data records, generate, for each authentication event, data indicative of a trust score corresponding to the authentication event; and generate, data indicative of a security score based on the trust scores corresponding to the one or more authentication events in the session, and, in response to receiving request data indicative of an authentication request associated with the user corresponding to a transaction in the session, the transaction having a value indicator, authenticate the user if the security score satisfies a condition for authentication corresponding to the transaction according to the value indicator, wherein security scores for satisfying the condition are variable according to value indicators of transactions.
BLOCKCHAIN TRANSACTION DOUBLE SPEND PROOF
A computer-implemented method of testing whether or not a blockchain transaction is a double spend attempt, the method being performed by a first party and comprising: generating a first blockchain transaction, wherein the first blockchain transaction comprises an input for unlocking an output of a blockchain transaction previously transmitted to one or more nodes of a blockchain network for inclusion in the blockchain; generating a signature based on the first blockchain transaction and one or more time indicators, each time indicator indicating when the first blockchain transaction was generated and/or transmitted to a second party; and transmitting to the second party, the first blockchain transaction, the signature and the one or more time indicators, wherein at least the first blockchain transaction is transmitted to the second party via an off-chain communication channel.
RISK MITIGATION FOR A CRYPTOASSET CUSTODIAL SYSTEM USING DATA POINTS FROM MULTIPLE MOBILE DEVICES
Methods, systems, and apparatus for risk mitigation for a cryptoasset custodial system include transmitting an endorsement request for a cryptoasset transaction to a user device configured to cause the user device to prompt a user to endorse the cryptoasset transaction. Multiple data points are collected from mobile devices associated with the user. The data points indicate an identity of the user. A cryptographic endorsement of the cryptoasset transaction is received from the user device. A graphical visualization including a risk metric is generated based on the data points. The risk metric indicates a risk of accepting the cryptographic endorsement from the user device. Generating the graphical visualization includes determining whether the plurality of data points matches expected values
SYSTEMS AND METHODS FOR A CONTEXT-DRIVEN ELECTRONIC TRANSACTIONS FRAUD DETECTION
Systems and methods are disclosed for establishing a multi-dimensional fraud detection system and payment analysis. One method includes: receiving transaction history of a user, the transaction history including a first payment vehicle and a second payment vehicle; determining, of the received transaction history, one or more instances of switching from one the first payment vehicle to the second payment vehicle; and determining a user-specific abandonment score for the user, based on the determined instances of switching from the first payment vehicle to the second payment vehicle.
PERSONAL SECURITY MONITORING
Computer-implemented services provide personal security monitoring and/or oversight of interactions between parties that may be initiated online, and in some circumstances extended to real-world in-person interactions. Profiles associated with individuals involved in a transaction may be developed and centrally managed. Profiles may contain, e.g., information concerning a user's identity, historical and/or current location information, user communication information, and the like. Profile information may be used by a central security oversight platform and/or provided to third party systems for, e.g., assessing risks involved in a particular interaction, providing accountability amongst users, and assisting law enforcement or third parties in transaction intercession and/or investigation in the event that an interaction results in negative consequences.
SYSTEMS AND METHODS FOR CLASSIFYING IMBALANCED DATA
A transaction classification system obtains a data set including first data associated with a first characteristic and second data associated with a second characteristic. In response to obtaining the data set, the system uses a classification model to generate a classification by classifying the first data into majority data and the second data into minority data. From the classification and using the classification model, the system determines a cost. The system modifies the classification model based on this cost to generate an updated classification model. The system uses the updated classification model to re-classify a subset of the first data into the minority data and a subset of the second data into the majority data.
SYSTEMS AND METHODS OF DETECTING FRAUDULENT ACTIVITY AT SELF-CHECKOUT TERMINALS
Methods and systems for detecting fraudulent activity at a self-checkout terminals of a retail store include a scanner for scanning an identifier of a candidate product located in the product-scanning area of the self-checkout terminal, and one or more sensors that detect at least one physical characteristic of the candidate product located in the product-scanning area of the self-checkout terminal. A computing device then correlates the obtained electronic data corresponding to actual identifying characteristic information associated with the candidate product to the reference physical characteristic information associated with the reference product in order to generate a similarity score between the actual and reference physical characteristic information. If the similarity score is above a predetermined similarity threshold, the self-checkout terminal is permitted to process a purchase of the candidate product, but if the similarity score is below the threshold, the self-checkout terminal is restricted from processing the purchase.
Transaction processing by multiple devices
Techniques associated with a customer-facing device and a merchant-facing device are described herein. In an example, a system can include a customer-facing device configured with a customer application that is executable on an operating system of the customer-facing device to (i) display information to a customer and (ii) receive input from the customer, wherein the customer-facing device includes a payment reader to read payment data from a payment instrument in association with a payment transaction between the customer and a merchant, and a merchant-facing device configured with a merchant application that is executable on an operating system of the merchant-facing device to (i) display information to the merchant and (ii) receive input from the merchant. In at least one example, the customer-facing device and the merchant-facing device can communicate to process, at least in part, the payment transaction associated with the payment instrument via a remote payment service system.
Method of processing a transaction request
A transaction processing system (130) is arranged to receive a transaction request from a user device (110), the transaction processing system (130) comprises a cookie retriever (141) arranged to obtain a cookie (112) stored in a browser application (111) of the user device (110) containing outcome data indicative of an outcome of at least one prior transaction, a processing setter (142) arranged to determine based on the outcome data which of a plurality of transaction processes (152) is to be applied by the transaction processing system (130) to the transaction request, and a transaction processor (143) arranged to process the transaction in accordance with the determined transaction process.
Authentication Question Generation Based on Statement Availability
Methods, systems, and apparatuses are described herein for improving computer authentication processes by generating authentication questions based on the availability of statements. A computing device may receive a request for access to an account. The computing device may receive transactions data that indicates a plurality of transactions. The computing device may determine that a first subset of the plurality of transactions were indicated in one or more statements sent to the user. The computing device may determine that a second subset of the plurality of transactions have not been indicated in the one or more statements sent to the user. The computing device may generate authentication questions based on the first subset and the second subset. The computing device may receive candidate responses to the authentication questions, and provide access to the account based on the candidate responses.