Patent classifications
G06Q20/4093
System, method, and computer-accessible medium for blocking malicious EMV transactions
An exemplary system, method, and computer-accessible medium can include, for example, storing on a first device an applet configured to generate a digital tag; receiving a request at the first device for information; configuring the digital tag to be associated with at least one of (i) an application or (ii) an input on a second device, such that receipt of the digital tag by a second device causes the application to launch on the second device; and emitting from the first device a digital tag.
DETERMINING WHETHER A USER HAS POSSESSION OF A TRANSACTION CARD AND/OR WHETHER THE USER IS AUTHORIZED TO POSSESS THE TRANSACTION CARD
A device receives a transaction request concerning a transaction and a transaction card from a transaction terminal, and determines, based on the transaction request, information concerning the transaction card. The device sends, based on the transaction request and to a user device, a query concerning possession of the transaction card by a user of the user device, where the query includes an instruction for the user to confirm possession of the transaction card via a component of the user device. The device receives, from the user device and after sending the query to the user device, a response concerning possession of the transaction card by the user, and determines, based on the response and the information concerning the transaction card, whether the user has possession of the transaction card. The device performs, based on determining whether the user has possession of the transaction card, at least one action.
Security Tool
A processor receives global positioning system data from a mobile device of a user of an account. The processor further receives information from a vendor, indicating that a transaction using the account was attempted. The processor determines, based on historical transaction and location information, and current transaction information, a probability that the transaction is fraudulent. In response, the processor rejects the transaction, and deactivates a card and mobile wallet of the user. The processor also sends a notification to the mobile device requesting a voice confirmation. The processor receives the voice confirmation, splits it into a set of voice characteristic data and determines, based on voice characteristic data stored in memory, that the voice confirmation was generated by the user. In response, the processor reactivates the card and the mobile wallet and stores a set of information describing the transaction in memory.
SYSTEM AND METHOD FOR DYNAMIC MULTIFACTOR AUTHENTICATION
A method of authenticating a user. The method comprises the step of sending an authentication request to a remote authentication device and generating a first piece of authentication information. A mobile device receives the first piece of authentication information from either an access terminal or the remote authentication device. The mobile device of the user generating a second piece of authentication information which is at least partially based on the received first piece of authentication information. The second piece of authentication information is sent to the remote authentication devices and the second piece of authentication information validated. If the second piece of authentication information is successfully validated an authentication signal is generated.
Systems and methods for determining and analyzing characteristics of devices used in payment transactions
A device profiling computer system for determining and analyzing characteristics of devices used in payment transactions includes a processor, a device profiling database in communication with the processor, and a memory coupled to the processor. The device profiling computer system is configured to receive a set of first transaction data associated with a first transaction initiated by a cardholder at an online merchant wherein the cardholder initiates the first transaction using a cardholder computing device and wherein the set of first transaction data includes a set of first device characteristic data related to the cardholder computing device, analyze the set of first transaction data to determine a set of device characteristics, and update a device record stored in a device profiling database with the set of first transaction data wherein the device record is associated with the set of device characteristics.
SYSTEM FOR LEVERAGED COLLABORATIVE PRE-VERIFICATION AND AUTHENTICATION FOR SECURE REAL-TIME RESOURCE DISTRIBUTION
Embodiments of the present invention provide a system for providing leveraged collaborative pre-verification and authentication for secure real-time resource distribution associated with a managing entity. Within a real-time resource distribution processing network, when a resource distribution request is received, historical verification factors are identified and used to establish a statistical model of how an associated account is expected to operate. Features of the pending resource distribution request are analyzed with respect to the statistical model to establish a pre-verification value of the user. Based on this established pre-verification value, the resource distribution request can be pre-verified or terminated, or additional authentication credentials can be prompted and received from a computing device of a user associated with the resource distribution request to verify the resource distribution request in real-time.
DEDICATED POINT OF SALE OVER AN INTERMITTENT NETWORK
Disclosed are various embodiments for improvements in customer relationship management and point of sale payment processing at remote event spaces. The system, apparatuses, and methods disclosed herein facilitate the transaction processing of credit cards and other payment vehicles in often remote locations where network connections may be intermittent and suffer from frequent disconnects or interruptions of service. The embodiments disclosed operate to detect network events, dynamically adjust to the event space, and processes the transactions on demand. The apparatuses are equipped to facilitate the event environment and are adapted to execute instructions to facilitate the financial transactions.
IDENTIFYING HIGH RISK COMPUTING OPERATIONS
This specification discloses techniques for risk identification. One example method includes receiving, by a client device, a risk identification request identifying a requested service operation and service data associated with the requested service operation; retrieving, by the client device, service data corresponding to the risk identification request; determining, by the client device, service indicator data associated with the service data; analyzing, by the client device, one or more of the service data and the service indicator based on a risk identification rule or a risk identification model to produce a risk result; and determining, by the client device, whether the requested service operation is a high risk operation based at least in part on the risk result.
SYSTEMS AND METHODS FOR PARTIAL AUTHORIZATION OF ELECTRONIC TRANSACTIONS
A method for managing payment submissions includes receiving, at an acquirer computing system, an authorization request submitted by a merchant computing system for a transaction of a predefined amount, the merchant computing system being associated with a merchant, and the authorization request identifying account information for an account that is associated with a payment card network and an issuer processor; and re-transmitting the authorization request for less than the predefined amount and greater than a configurable threshold value, until the authorization request is approved by the issuer processor or until the authorization request falls below the configurable threshold value.
Defense against credit card theft from point-of-sale terminals
A security system for point of sale (POS) terminals, including one or more POS processors for injecting decoy credit cards numbers into memories of corresponding one or more POS terminals, a secure database including entries of the decoy credit card numbers and, for each entry, a corresponding identifier of a specific POS terminal and a corresponding date & time, and a security manager receiving a notification of attempted use of a specific decoy credit card number, extracting the POS identifier and the date & time corresponding to the specific decoy credit card number from the database, identifying legitimate credit card numbers that were processed by the identified POS terminal during a time period including the date & time corresponding to the specific decoy credit card number, and alerting an authority that the legitimate credit card numbers may have been compromised.