G06Q20/4016

ABNORMAL BEHAVIOR DETECTION METHOD AND APPARATUS, ELECTRONIC DEVICE, AND COMPUTER-READABLE STORAGE MEDIUM
20230004979 · 2023-01-05 ·

This application provides an abnormal online operational behavior detection method performed by an electronic device. The method includes: obtaining a first target sub-model corresponding to a first target object from a first preset object model; determining an abnormal data volume from the first target sub-model based on a preset model parameter and a first detection result by comparing a target data volume and the abnormal data volume; obtaining a second target sub-model corresponding to a second target object and having a highest similarity with the first target sub-model from a second preset object model; obtaining a target maximum data volume corresponding to the second target sub-model, and determining a second detection result by comparing the target data volume and the target maximum data volume; and determining a target detection result of the online operation behavior information in accordance with the first detection result and the second detection result.

VISUAL INDICATOR OF FRICTIONLESS STATUS OF SHOPPERS
20230005343 · 2023-01-05 · ·

A system for determining whether shoppers are eligible for frictionless checkout is disclosed. The system has a processor that obtains image data captured using image sensors positioned in a retail store. The processor analyzes the image data to identify at least one shopper at one or more locations of the retail store. The processor detects, based on the analysis of the image data, at least one product interaction event associated with an action of the at least one shopper at the one or more locations of the retail store. Further, based on the detected at least one product interaction event, the processor determines whether the at least one shopper is eligible for frictionless checkout. In response to a determination that the at least one shopper is ineligible for frictionless checkout, the processor causes delivery of an indicator that the at least one shopper is ineligible for frictionless checkout.

Methods and systems for reconciling a transaction within a computer-based game
11521226 · 2022-12-06 · ·

Methods and systems of reconciling a transaction in a computer-based game are disclosed. At least one attribute is determined, based on digital data obtained from at least one sensor, wherein the digital data includes location data associated with the game and representing a scene. One or more attributes from the digital data of the scene are derived, wherein at least one attribute comprises a location derived from the location data. A signature is generated for a transaction from the one or more attributes including the location, and mapped to a plurality of accounts via a reconciliation matrix. A transaction associated with at least one item related to the game is initiated from at least one provider account to the plurality of accounts according to the reconciliation matrix.

System and server for receiving transaction requests

A gateway is provided for controlling transfer of electronic messages between a financial institution and a transaction processing system comprising a plurality of switches. The gateway includes communication circuitry operable to receive an electronic message issued by the financial institution and processing circuitry operable to determine whether the electronic message includes enough information for a switch of the transaction processing system to process the electronic message. In response to the electronic message including enough information, the communication circuitry is further operable to transmit the electronic message over a data communications network for storage in a message queue unit associated with the transaction processing system for subsequent processing by the switch. In response to the electronic message not including enough information, the communication circuitry is operable to return the electronic message to the financial institution.

Risk assessment using social networking data

Tools, strategies, and techniques are provided for evaluating the identities of different entities to protect individual consumers, business enterprises, and other organizations from identity theft and fraud. Risks associated with various entities can be analyzed and assessed based on analysis of social network data, professional network data, or other networking connections, among other data sources. In various embodiments, the risk assessment may include calculating an authenticity score based on the collected network data.

Identifying high risk computing operations

This specification discloses techniques for risk identification. One example method includes receiving, by a client device, a risk identification request identifying a requested service operation and service data associated with the requested service operation; retrieving, by the client device, service data corresponding to the risk identification request; determining, by the client device, service indicator data associated with the service data; analyzing, by the client device, one or more of the service data and the service indicator based on a risk identification rule or a risk identification model to produce a risk result; and determining, by the client device, whether the requested service operation is a high risk operation based at least in part on the risk result.

Method and device for implementing password-free EMV contact transaction
11568387 · 2023-01-31 · ·

A method for realizing an EMV contact transaction without a password, wherein said method is implemented by an EMV IC card and a terminal, wherein when a terminal receives transaction information, it sets a password-free function setting; performs an offline data validation and limitation; performs terminal risk management and a behavior analysis; determines, on the basis of the password-free function setting, whether to perform online processing and performs transaction termination processing; the password-free function setting comprises: when an optional kernel configuration flag in an application parameter corresponding to the current application acquired is set and the transaction amount in the transaction information is greater than a password-free IC card transaction limitation amount, the current application is configured so that verifying the cardholder's PIN is obviated. The present invention allows password-free small-amount transactions, and obviates to upgrade IC cards.

Decentralized safeguard against fraud

A method includes acquiring, at a node server, blockchain data for a blockchain address on a blockchain network. The blockchain data includes a plurality of transactions for the blockchain address. The method includes generating a local node trust score for the blockchain address based on the blockchain data. The local node trust score indicates a likelihood that the blockchain address is involved in fraudulent activity. The method includes receiving, from a plurality of remote servers, a plurality of additional local trust scores for the blockchain address. The method includes determining a consensus trust score based on the local node trust score and the plurality of additional local trust scores. Additionally, the method includes receiving a trust request for the blockchain address from a requesting device and sending the consensus trust score for the specified blockchain address to the requesting device.

Interbank account verification and funds transfer system and method

A process includes receiving a check deposit and a withdrawal request associated with an account of a customer, the account associated with a first amount, the check deposit includes a second amount greater than the first amount, and the withdrawal request includes a third amount greater than the first amount. The process further includes forwarding, via an account verification system, an inquiry message regarding the check deposit to a paying computing system, the inquiry message including an identifier of the paying computing system, the inquiry message forwarded prior to settlement of the check deposit. The process further includes determining real time account status information of the account of the payor, and authorizing in real time relative to when the real time account status is accessed.

MONITORING ENGINE FOR MULTIPLE BLOCKCHAIN LEDGERS
20230237495 · 2023-07-27 ·

Provided are systems and methods for auto-performing short-term investments on an intermittent basis via a crypto-network and returning the principal and interest before the cash is needed. As an example, the method may include installing a blockchain smart contract on a blockchain ledger with read access to content stored on the blockchain ledger, establishing a communication channel between a monitoring engine and the blockchain smart contract, configuring the monitoring engine to identify stop conditions from content stored on the blockchain ledger, monitoring the blockchain ledger for updates to content stored on the blockchain ledger via the communication channel and detecting a stop condition based on an update to the blockchain ledger via the monitoring engine, and in response the detected stop condition, transmitting a request to the crypto-exchange server to return the funds to the external data source.