G06Q20/4018

FRAUD DETECTION BASED ON KNOWN USER IDENTIFICATION

Systems, methods, devices, and computer readable media for determining whether a transaction was initiated by a known user. Known users can be identified using a known user identification linear regression algorithm. The known user identification algorithm incorporates a variety of features of an initiated transaction, as well as reputation and historical data associated with an account or user, to produce a prediction value that indicates whether a user is a known user or whether there is a high potential for fraud. If the prediction value that results from the known user identification algorithm is greater than or equal to the threshold value, a fraud rule is triggered (i.e., predicted fraud). If the prediction value that results from the known user identification algorithm is less than the threshold value, the user who initiated the transaction is identified as a known user and the transaction is permitted to proceed (i.e., predicted non-fraud).

DATA TRANSMISSION VIA DUAL CHANNELS
20210073822 · 2021-03-11 ·

A method enables the transmission of encrypted and unencrypted data over different channels. The method includes: receiving, at a first device, unencrypted data via a first channel; causing, by the first device, generating a data entry form at a second device based on the received unencrypted data; causing, by the first device, transmitting, from the second device, the generated data entry form to a third device via a second channel, the generated data entry to be displayed within a webpage on the third device; causing, by the first device, intercepting and encrypting data entered into the generated data entry from by a user; and receiving, by the first device, via the second channel the encrypted data.

Operation of mathematical constant PI to authenticate website and computer network users
10951610 · 2021-03-16 ·

A computer-implemented user authentication method to provide users of computer devices interconnecting with computer information systems with a frequently changing numeric passcode generated via a time-synchronized mathematical operation of the mathematical constant Pi () without the need for a Two Factor Authentication process. The method operates the mathematical constant Pi, wherein an application software performs the mathematical operation of Pi to select a segment of Pi. The selected Pi segment becomes the user's passcode, referred in this invention as the PI ID Value (PIV). The method is dynamic, creating a new PIV for the computer user each time the user operates his/her computer device to gain access into a network or website. To attain the same Pi segment in real-time and authenticate the user, the network or website administrator utilizes in its computer server the same parameters and mathematical operation used by the user's computing device.

METHODS AND APPARATUS FOR IMPROVING SECURITY IN NETWORK-SUPPORTED DYNAMIC TRANSACTING
20210073826 · 2021-03-11 ·

A method is provided for authenticating dynamically generated virtual credit card (VCC) data or virtual account number (VAN) data assigned to an electronic account for network distribution to one or more than one transaction device for use in electronic transacting.

Secure automated teller machines

A method for improved security at automated teller machines (ATMs) comprising: capturing, by a first camera at an ATM, one or more images of a bank card; reading card information from the bank card by processing the one or more images of the bank card, wherein the card information comprises an account number and an expiration date; receiving, from an input device at the ATM, a personal identification number (PIN) entered by a user; sending a request to a server device to verify the card information and the PIN; and in response receiving a response from the server device, allowing the user to transact with the ATM.

Operation of Mathematical Constant PI to Authenticate Website and Computer Network Users
20210044581 · 2021-02-11 ·

A computer-implemented user authentication method to provide users of computer devices interconnecting with computer information systems with a frequently changing numeric passcode generated via a time-synchronized mathematical operation of the mathematical constant Pi () without the need for a Two Factor Authentication process. The method operates the mathematical constant Pi, wherein an application software performs the mathematical operation of Pi to select a segment of Pi. The selected Pi segment becomes the user's passcode, referred in this invention as the PI ID Value (PIV). The method is dynamic, creating a new PIV for the computer user each time the user operates his/her computer device to gain access into a network or website. To attain the same Pi segment in real-time and authenticate the user, the network or website administrator utilizes in its computer server the same parameters and mathematical operation used by the user's computing device.

METHOD AND SYSTEM FOR GENERATING A DYNAMIC CARD VERIFICATION VALUE FOR PROCESSING A TRANSACTION
20230419328 · 2023-12-28 · ·

Systems, methods, transaction cards, mobile devices, processors, and computer memory programmed with machine-readable instructions, for providing a dynamic Card Verification Value (dCVV) to a user of a transaction card. A mobile device associated with the user and with the transaction card initiates a non-payment near field communication (NFC) with the transaction card, receives a message from the transaction card in the non-payment NFC communication, transmits a prompt to an IP address or web address over a global computer information network, and receives a secure communication from containing the dCVV from a server accessible from the IP address or web address in response to the prompt. The dCVV code is then provided to the user. In embodiments, the non-payment NFC may be initiated via a card tap, a user interface, or a communication from a website.

Authentication method
10909530 · 2021-02-02 · ·

An authentication method performed by an authentication server (ACS). The method includes receiving from an access server (SW) giving access to a service (S), an authentication request including transaction data (DT) associated with an IC card; determining whether a security code included in the transaction data is of the DCVV type; and if so, detecting that no 3D secure (3DS) authentication is to be performed and co-operating with a verification server (SV) in order to verify the validity of the DCVV security code.

DEVICE AND METHOD FOR SECURING SECURE DATA FOR A BANK PAYMENT CARD
20210216996 · 2021-07-15 ·

The method secures data of a bank card linked to a bank account. The data is static and includes the number of the card, the identification data of the holder of the card, the expiration date of the card, and a cryptogram. The bank card number and cryptogram include multiple digits and/or letters. The method includes inscribing only partially secure data on the card in such a manner that the data is concealed and never visible on the card. The concealed data is multiple digits and/or letters of the number of the card and/or at least an identification datum of the holder and/or at least one element of the expiration date and/or at least one digit and/or letter of the cryptogram. The method includes transmitting to the only cardholder a means for disclosing the concealed data.

ON-DEMAND PAYMENT GENERATION TRANSACTION SYSTEMS
20210027284 · 2021-01-28 ·

Methods and systems for generating on-demand payment instruments are described. A user with a user payment account may perform a transaction with a user device and request an on-demand payment instrument. The request may be communicated to a transaction device. The transaction device may authenticate the request and associate an on-demand payment instrument to the user payment account. Information associated with the on-demand payment instrument information may then be tokenized and communicated to the user device, the merchant, or another party and the information may be entered and/or processed for the transaction.