G06Q20/4093

Method and system for providing performance assessment of terminal devices

A method for providing performance assessment of terminal devices is provided. A user initiates, by way of a service application that runs on a user device of the user, a first request for obtaining risk scores or connectivity scores of the terminal devices. The first request may include terminal identifiers of specific terminal devices or information pertaining to a specific geographical area. The user device communicates the first request to a server. The server determines the risk scores or the connectivity scores based on the first request. The server transmits, to the user device, a first response that includes the risk scores or the connectivity scores. The user device displays the risk scores or the connectivity scores to the user based on the first response, thereby providing the performance assessment of the terminal devices.

SYSTEMS AND METHODS FOR INCORPORATING BREACH VELOCITIES INTO FRAUD SCORING MODELS

A method and system for detecting fraudulent network events in a payment card network by incorporating breach velocities into fraud scoring models are provided. A potential compromise event is detected, and payment cards that transacted at a compromised entity associated with the potential compromise event are identified. Subsequent transaction activity for the payment cards is reviewed, and a data structure for the payment cards are generated. The data structure sorts subsequent transaction activity into fraud score range stripes. The data structure is parsed over a plurality of time periods, and at least one cumulative metric is calculated for each of the time periods in each fraud score range stripe. A plurality of ratio striping values are determined, and a set of feature inputs is generated using the ratio striping values. The feature inputs are applied to a scoring model used to score future real-time transactions initiated using the payment cards.

Method and System for Authenticating Digital Transactions

A system and computer-implemented method for authenticating digital transactions. The method includes receiving a device registration request and a device attestation response including at least a device integrity status from a device. In response to the device registration request, the method includes providing a device registration response to the device, based on validation of the device integrity status. Further, the method includes receiving a first payment transaction request and an enrolment request from the device via an application to authenticate a second payment transaction request using a first type of authentication technique. Finally, the method includes enrolling the device to the first type of authentication technique and providing a second token to the device based on a result of the first payment transaction request, wherein the second token is used for authenticating the second payment transaction request.

Computerized methods and computer systems for verification of transactions

When a payment transaction made by a user, a reminder data file is created including reminder items associated with the payment transaction. At least one of the reminder items is an image. Subsequently, a transaction statement listing one or more payment transactions is provided to the user, in a form in which each listed payment transaction is associated with an embedded link to the corresponding reminder data file, which permits the user to access the reminder data file. Thus, a user who is unable to recognize a payment transaction on the transaction statement, can use the statement to access the corresponding reminder items, to provide the user with a reminder of the details of the transaction.

Electronic payment method and system
11488154 · 2022-11-01 ·

The present disclosure relates to an electronic payment method and to an electronic payment system. A central server generates a secret number based on a payment card number. The central server associates the secret number with a transaction. A copy of the association between the secret number and the transaction is stored at a remote terminal. An access is detected at the remote terminal by acquiring the payment card number at the remote terminal. The remote terminal generates an identifier based on the payment card number. The remote terminal verifies whether the identifier matches the secret number. When the identifier matches the secret number, the remote terminal determines whether a provision of a product or service offered at the remote terminal is authorized based on a content of the transaction.

Proxy checkout and payment transaction services
11488155 · 2022-11-01 · ·

A method for using proxy checkout services is discussed. The method includes accessing transaction details of a potential transaction for an item or a first service at a merchant, the potential transaction initiated by a user at a user device at a first location. The method includes responsive to a determination, based on merchant characteristics or user characteristics, that use of proxy services is permitted, initiating proxy services for performing the potential transaction at different user locations. The method includes determining, based on selection criteria, a particular proxy service from the proxy services for initiating a proxy transaction based on the potential transaction using one of different user locations. The method includes causing a user interface of the user device to render a user-selectable option for performing the proxy transaction instead of the potential transaction.

USING A THIRD PARTY DYNAMIC QR CODE ON A PERSONAL MOBILE DEVICE TO COMPLETE A TRANSACTION AT AN ATM
20230087357 · 2023-03-23 · ·

Disclosed herein are system, method, and computer program product embodiments for using a third party dynamic QR code on a personal mobile device to complete a transaction at an ATM. The customer may stage a transaction using a mobile application on a mobile device. Upon the staged transaction being authenticated and approved, a machine-readable image may be transmitted to the mobile device. When the customer visits the ATM, the machine-readable image on the mobile device may be captured by the ATM and sent to an application server from the ATM. The application server may associate the ATM with the staged transaction that is staged using the mobile application, and send instructions to the ATM to dispense cash according to the staged transaction.

SYSTEM FOR DETECTION OF ENTITIES ASSOCIATED WITH COMPROMISED RECORDS

The disclosure herein describes a system and method for predictive identification of breached entities. Identification number and expiration date pairs associated with compromised records in a source file are analyzed to identify a set of candidate entities having records at least partially matching the source file data pairs having events occurring during a selected time period. Probability vectors are calculated for records associated with each identified entity. A divergence value is calculated which represents a distance between probability distribution vectors for each entity and probability distribution vectors for the source file. A predicted breached entity is identified based on the divergence values. The predicted breached entity is notified of the predicted breach. The notification can include an identification of the breached entity, identification of breached records, predicted time of breach, and/or a recommendation to take action to mitigate the predicted breach.

Terminal device, personal authentication system and personal authentication method
11483713 · 2022-10-25 · ·

A technology which is highly safe and furthermore highly convenient in personal authentications via a mobile terminal is provided. A terminal device 200 of the present invention includes: a position determining section 271 that determines a position of the terminal device 200 at predetermined time intervals, and accumulates the position as position information; a movement history generating section 272 that generates a movement history by using the position information accumulated in a predetermined period, and stores the movement history as movement history information; a registration processing section 276 that transmits, for registration, the movement history information to a personal authentication apparatus; and an authentication requesting section 279 that makes an authentication request to the personal authentication apparatus 310 by using the movement history information stored after the transmission by the registration processing section 276 to the personal authentication apparatus 310.

BIOMETRIC TRANSACTION SYSTEM
20230130755 · 2023-04-27 · ·

Disclosed is a system for enrolling a user for control of entry to a venue, concert, festival, or event. The system includes a computer configured to execute an application program that, when executed, is configured to: receive a user attribute; create an anonymous client reference (ACR) associated with the user attribute; and receive a biometric template. The biometric template has been determined from an input of a biometric. The enrolling system is further configured to create an association between the biometric template and the ACR, such that on dependence on the bound ACR and biometric template, subsequent single-factor authentication is enabled to control entry to the venue, concert, festival, or event in dependence on the created association.