G06Q20/4093

TRANSACTION CARDS AND COMPUTER-BASED SYSTEMS THAT PROVIDE FRAUD DETECTION AT POS DEVICES BASED ON ANALYSIS OF FEATURE SETS AND METHODS OF USE THEREOF
20210241284 · 2021-08-05 ·

Transaction cards, systems and methods for performing fraud detection at POS devices based on analysis of feature sets are disclosed. In one embodiment, an exemplary transaction card may comprise one or more sensors configured to collect pre-card-use sensor data regarding a user of the card, circuitry that assembles such data into feature sets and performs fraud detection, and data storage. According to some aspects, the fraud detection may include comparing user specific sensor data, collected for a current transaction, to a user-specific risk profile validation model to determine a risk score for the current transaction, and transmitting the risk score to a card transacting device when a card is presented during a transaction. In some implementations, the risk score may enable the card transacting device to evaluate a risk associated with accepting the transaction card to complete the attempted transaction.

Method and system for authenticating digital transactions

A system and computer-implemented method for authenticating digital transactions. The method includes receiving a device registration request and a device attestation response including at least a device integrity status from a device. In response to the device registration request, the method includes providing a device registration response to the device, based on validation of the device integrity status. Further, the method includes receiving a first payment transaction request and an enrolment request from the device via an application to authenticate a second payment transaction request using a first type of authentication technique. Finally, the method includes enrolling the device to the first type of authentication technique and providing a second token to the device based on a result of the first payment transaction request, wherein the second token is used for authenticating the second payment transaction request.

Flow based pattern intelligent monitoring system

Systems, methods, and computer program products for identifying a data pattern change anomaly uses a distributing computing environment that processes thousands of different data flows are provided. Numerous data flows are collected from the application computing environment over a configurable time period. The flows are aggregated into aggregated data according to at least one attribute from the flows and without losing information included in the flows. Historical data that includes aggregated data from multiple flows that occurred prior to a time during which the numerous data flows were collected is provided from a distributed disk storage. An anomaly that indicates change in data patterns in the flows is identified by comparing the aggregated data to the historical data using one or more models that are tailored to the numerous flows. An alert that includes an anomaly and a reason for an anomaly is transmitted and recorded in the system.

Using a third party dynamic QR code on a personal mobile device to complete a transaction at an ATM
11074562 · 2021-07-27 · ·

Disclosed herein are system, method, and computer program product embodiments for using a third party dynamic QR code on a personal mobile device to complete a transaction at an ATM. The customer may stage a transaction using a mobile application on a mobile device. Upon the staged transaction being authenticated and approved, a machine readable image may be transaminted to the mobile device. When the customer visits the ATM, the machine readable image on the mobile device may be captured by the ATM and sent to an application server from the ATM. The application server may associate the ATM with the staged transaction that is staged using the mobile application, and send instructions to the ATM to dispense cash according to the staged transaction.

System for proactively providing a user with prescriptive remedies in response to a credit card transaction error

A method, system, and computer-usable medium for implementing a system providing a customer with prescriptive remedies in response to a credit card transaction error. At least one embodiment includes receiving a credit card transaction request for purchase of a product during a purchase session from a merchant; receiving a credit card transaction error from a payment gateway; passing the credit card transaction error, customer segment information, and customer score information to a prescriptive machine learning engine; analyzing the error type, customer segment information, and customer score information at the prescriptive machine learning engine to assign a proactive response to the credit card transaction error. The proactive response is selected to increase the likelihood that a customer will continue the purchase despite the decline of the credit card.

ELECTRONIC METHODS AND SYSTEMS FOR PROCESSING A DECLINED FINANCIAL TRANSACTION

Embodiments provide methods, and server systems for processing a declined transaction. A method includes receiving, by a server system associated with a payment network, a declined transaction notification signal about an identification of an authentication credential of a payment card provided by a user for initiating a transaction in a transaction capturing device as incorrect. The method includes verifying if the user has opted for a dual authentication service facilitating re-authentication of the declined transaction via an application. If yes, the method includes sending a user approval notification signal to a user device via the application. The method includes receiving, the user approval of providing the incorrect authentication credential. The method includes electronically facilitating re-authentication of the transaction via the application by requesting the user to provide a re-authentication credential. The method includes electronically facilitating a completion of the declined transaction based on verification of the re-authentication credential.

SYSTEMS AND METHODS FOR MANAGING FRAUDULENT OPERATIONS IN A PLURALITY OF COMPUTING DEVICES

In some embodiments, a method includes receiving operation data about operations performed by computing devices managed by an entity. The operation data is stored in respective data entries of a log data storage on a server managed by an authorizing entity. A set of agents are identified from the entity associated with fraudulent operations in entries of the log data storage having positive fraud indications. A number of instances for each identified agent in the set associated with fraudulent operations are determined. A score is assigned to each agent in the set based on the number of instances that each agent was associated with fraudulent operations. An alert to an administering computing device associated with the entity is generated when the assigned score of at least one agent is greater than a predefined threshold.

SECURE AND SAFE METHOD TO DISABLING PAYMENT FUNCTIONALITY ON LOST OR STOLEN TRANSACTION CARDS

The disclosure includes systems and methods for disabling a payment function of a transaction card. The system receives payment account data from a transaction card and transmits a payment authorization request message to a card issuer associated with the transaction card. The system receives, from the card issuer, an authorization request response message. The authorization request response message declines the transaction and includes a status response code corresponding to a status of the transaction card. The system determines whether the status response code indicates that the transaction card is to be captured, and if so, disables the payment function of the transaction card via activation of a disabling system.

Smart card for generating virtual card number, and method and program for providing smart card-based virtual card number
11842334 · 2023-12-12 · ·

The present invention relates to a smart card for generating a virtual card number, and smart card-based virtual card number providing method and program. A smart card-based virtual card number providing method according to an embodiment of the present invention comprises: a step for a virtual card number generation module receiving a virtual card number provision request; a step for the virtual card number generation module synchronizing the time of an encryption algorithm and the smart card; a virtual card number generating step for the virtual card number generation module generating a virtual card number; a step for the virtual card number generation module generating the virtual card number as an encryption code on the basis of the synchronized encryption algorithm; and a step for the virtual card number generation module transmitting the encryption code to the smart card.

Systems and methods for location-binding authentication

Systems, methods, and apparatuses for authenticating a user based at least in part on a location of the user or a location of a user device are described. The user may be authenticated as part of a financial transaction or as part of a login process for a computing device. The user device was previously bound or associated with the user. During the authentication, a system (e.g., a financial institution computing system or a backend authentication system) requests location information from the user device. The location information may be packaged as a digital fingerprint of the user device, which can only be created from the user device. Based on the location information, the user can be authenticated thereby approving the transaction or login request.