G06Q20/4093

SYSTEMS AND METHODS FOR DEVICE AND USER AUTHORIZATION
20200218795 · 2020-07-09 ·

Systems and methods are described for authorizing users and/or devices. An example method may comprise receiving, from a user device, a request to access a function associated with a service account. The request may comprise an identifier of the user device. The example method may comprise determining, based on the identifier, a primary authority holder of the service account. The example method may comprise determining that a first record on a first distributed ledger associated with the primary authority holder indicates that the user device is associated with the primary authority holder. The example method may comprise determining that a second record on a second distributed ledger associated with the user device indicates that the user device is associated with the primary authority holder. The example method may comprise granting, based on the request, the first record, and the second record, the user device access to the function.

ENABLING SECURE INTERNET TRANSACTIONS IN AN UNSECURE HOME USING IMMOBILE TOKEN
20200213119 · 2020-07-02 ·

This specification discloses devices and methods for a security concept that includes an immobile hardware token (e.g., a wall token that is fixed within a wall) which ensures that the more sensitive actions of electronic banking (e.g., money transfers of large sums to foreign bank accounts) can only be done from the account owner's home, but not from a remote place. However, other less sensitive (and lower security risk) actions can still be done from anywhere else. In some embodiments, the hardware token includes sensors to ensure that the token is not moved or tampered with, interfaces to provide distance bounding, and a crypto-processor to provide secure authentication. The distance bounding can be used to determine if the authentication device is in close proximity to the hardware token, which can in turn ensure that the authentication device is within the account owner's home.

SYSTEMS AND METHODS FOR INCORPORATING BREACH VELOCITIES INTO FRAUD SCORING MODELS

A method and system for detecting fraudulent network events in a payment card network by incorporating breach velocities into fraud scoring models are provided. A potential compromise event is detected, and payment cards that transacted at a compromised entity associated with the potential compromise event are identified. Subsequent transaction activity for the payment cards is reviewed, and a data structure for the payment cards are generated. The data structure sorts subsequent transaction activity into fraud score range stripes. The data structure is parsed over a plurality of time periods, and at least one cumulative metric is calculated for each of the time periods in each fraud score range stripe. A plurality of ratio striping values are determined, and a set of feature inputs is generated using the ratio striping values. The feature inputs are applied to a scoring model used to score future real-time transactions initiated using the payment cards.

FLOW BASED PATTERN INTELLIGENT MONITORING SYSTEM

Systems, methods, and computer program products for identifying a data pattern change anomaly uses a distributing computing environment that processes thousands of different data flows are provided. Numerous data flows are collected from the application computing environment over a configurable time period. The flows are aggregated into aggregated data according to at least one attribute from the flows and without losing information included in the flows. Historical data that includes aggregated data from multiple flows that occurred prior to a time during which the numerous data flows were collected is provided from a distributed disk storage. An anomaly that indicates change in data patterns in the flows is identified by comparing the aggregated data to the historical data using one or more models that are tailored to the numerous flows. An alert that includes an anomaly and a reason for an anomaly is transmitted and recorded in the system.

Client device authentication using contactless legacy magnetic stripe data
10701560 · 2020-06-30 · ·

A technique for generating a diversified encryption key for a contactless legacy magnetic stripe card is disclosed. The diversified key can be generated using a master key, a key diversification value and an encryption algorithm. In one example embodiment, the key diversification value can be provided by the user as a fingerprint, numeric code or photo. The user can provide the key diversification value to the card or a cellphone. The card can generate the diversified key using the user provided key diversification value. The card or the cellphone can transmit the user provided diversification value to the server and the server can regenerate the diversified key using the user provided diversification value.

SMART CARD FOR GENERATING VIRTUAL CARD NUMBER, AND METHOD AND PROGRAM FOR PROVIDING SMART CARD-BASED VIRTUAL CARD NUMBER
20200202329 · 2020-06-25 · ·

The present invention relates to a smart card for generating a virtual card number, and smart card-based virtual card number providing method and program.

A smart card-based virtual card number providing method according to an embodiment of the present invention comprises: a step for a virtual card number generation module receiving a virtual card number provision request; a step for the virtual card number generation module synchronizing the time of an encryption algorithm and the smart card; a virtual card number generating step for the virtual card number generation module generating a virtual card number; a step for the virtual card number generation module generating the virtual card number as an encryption code on the basis of the synchronized encryption algorithm; and a step for the virtual card number generation module transmitting the encryption code to the smart card.

SECURING A TRANSACTION BY MEANS OF A SMART CARD AND SMART CARD
20200193101 · 2020-06-18 ·

Disclosed is a method of managing a smart card configured for securing a transaction with an external device via a card reader, the method including the following steps: incrementing at least one command counter of commands received by the smart card during a transaction; and depending on the current value of the at least one counter and a command profile, implementation of a smart card management command.

SYSTEMS AND METHODS FOR ACCOUNT EVENT NOTIFICATION

A system and computer-implemented method includes the operations of receiving an electronic transaction message including transaction data from an interchange network. The transaction message may include a type of transaction associated with a primary account number of the cardholder. A type of transaction may be determined from the electronic transaction message. Transaction details may be extracted from the transaction data. The operations may also include determining whether the cardholder is registered for the account event notification service. If based on the determination, the cardholder is registered for the account event notification service, a notification message may be generated. The notification message may include the type of transaction. The notification message may be transmitted to the cardholder.

Method and apparatus having multiple identifiers for use in making transactions
10679452 · 2020-06-09 · ·

A payment device is provided for use in transactions such as credit purchases at a retail store. The device includes a non-volatile memory containing a set of multiple identifiers that are associated with a customer account. The multiple identifiers are also known to an agency that provides the customer account. The device further includes a processor operable to select one identifier out of the set of multiple identifiers for use with any particular transaction involving the device and the customer account. This identifier is then conveyed from the device, typically via a store terminal, to the agency that maintains the account.

Managing fraudulent logins at payment systems

A method for detecting fraudulent logins at a payment system is discussed. The method includes receiving a suspect login request for logging into an existing user account at the payment system. The method includes providing access to a duplicate user account responsive to receiving the suspect login request, the duplicate user account being a copy of a portion of the existing user account. The method includes initiating a fraud determination of whether the suspect login request is fraudulent. The method includes receiving a request for transferring a first amount of funds from the existing user account to another account. The method includes providing an indication that the first amount of funds is being transferred to the another account. The method also includes delaying a transfer of the first amount of funds to the another account until receiving results of the fraud determination.