G06Q20/4093

Systems and methods for incorporating breach velocities into fraud scoring models

A method and system for detecting fraudulent network events in a payment card network by incorporating breach velocities into fraud scoring models are provided. A potential compromise event is detected, and payment cards that transacted at a compromised entity associated with the potential compromise event are identified. Subsequent transaction activity for the payment cards is reviewed, and a data structure for the payment cards are generated. The data structure sorts subsequent transaction activity into fraud score range stripes. The data structure is parsed over a plurality of time periods, and at least one cumulative metric is calculated for each of the time periods in each fraud score range stripe. A plurality of ratio striping values are determined, and a set of feature inputs is generated using the ratio striping values. The feature inputs are applied to a scoring model used to score future real-time transactions initiated using the payment cards.

Authorization control network and method of validating an authorization request

An authorization control network includes a limit profile database and at least one computer server. The server(s) receives an account identifier and a datum from a communications device, and associates the datum with the account identifier in a limit profile record of the limit profile database. The server(s) also receives the account identifier and a transaction limit, and associates the transaction limit with the account identifier in the limit profile record. The server(s) then receives from a POS device an authorization request that includes the account identifier and an authorization amount. If the server(s) confirms that the authorization amount does not exceed the transaction limit that is associated with the account identifier in the limit profile record and does not exceed an available credit limit that is associated with the account identifier, the server(s) transmits to the POS device an authorization response that confirms authorization of the authorization amount.

TECHNIQUES TO PROCESS TRANSACTIONS WITH A CONTACTLESS CARD BASED ON ONE OR MORE CONFIGURATIONS OF THE CONTACTLESS CARD

Embodiments may be generally directed to techniques, systems, and devices to control settings stored on contactless cards.

USING A THIRD PARTY DYNAMIC QR CODE ON A PERSONAL MOBILE DEVICE TO COMPLETE A TRANSACTION AT AN ATM
20250299171 · 2025-09-25 · ·

Disclosed herein are system, method, and computer program product embodiments for using a third party dynamic QR code on a personal mobile device to complete a transaction at an ATM. The customer may stage a transaction using a mobile application on a mobile device. Upon the staged transaction being authenticated and approved, a machine-readable image may be transmitted to the mobile device. When the customer visits the ATM, the machine-readable image on the mobile device may be captured by the ATM and sent to an application server from the ATM. The application server may associate the ATM with the staged transaction that is staged using the mobile application, and send instructions to the ATM to dispense cash according to the staged transaction.

Systems and methods for distributing data

Systems and methods are provided for distributing data to multiple data centers within a network based on unique information associated with the data. One example computer-implemented method includes receiving a request, from a service provider, for data stored at a data center and generating a group identifier based on the device ID specific to a device of a user. The method also includes identifying the data center based on the first group identifier and directing the request to the identified data center. The method then includes retrieving the data from the data center and returning the retrieved data to the service provider, in response to the request.

Home router authentication device

A user authorization device (or UAD) physically connected to a user's router to aid in the authentication of the user. A bank server polls the user's router to verify that the UAD is connected to the router before granting the user the capability to perform transactions on the user's account that would be otherwise restricted. The bank server implements a set of policies designed by the user that require the UAD to be present for some transactions with the account to be performed. The presence of this device thus adds an extra layer of security to such financial transactions beyond the use of a username and password.

Antifraud Resilient Transaction Identifier Datastructure Apparatuses, Methods and Systems
20250335924 · 2025-10-30 ·

The Antifraud Resilient Transaction Identifier Datastructure Apparatuses, Methods and Systems (ARTID) transforms PIN, unique user identifying device datastructure inputs via ARTID components into secure payment authorization outputs. The ARTID includes a virtual secure element datastructure transaction apparatus, comprising, a memory, a component collection in the memory, and a processor disposed in communication with the memory, and configured to issue a plurality of processing instructions from the component collection stored in the memory. ARTID includes instructions to: obtain request to generate a tamper resistant asset account from a requestor, and instantiate a new tamper resistant asset account, wherein the account is populated with the requestor identifier, unique requestor device identifier, a secure cryptographic element for the tamper resistant account. ARTID also includes instructions to provide a message to generate a new physical account card and an associated virtual account card associated with the tamper resistant asset account, and obtain a request to engage the virtual account card in a transaction, wherein the request includes the user access credential. ARTID also includes instructions to generate a card access event message from the request to engage the virtual account card, provide the card access event message to a payment network, and obtain a card access event authorization response.

Systems and methods for managing combinations of verification data and transaction data

A technique for managing verification data, such identity information, membership information, and personal information, and the like, is provided. The verification data management system may receive an indication of a transaction and select a combination of a transaction card, such as a credit card, debit card, and the like, and/or multiple types of verification information for executing the transaction. Further, the verification data management system may generate a transaction output, which may include causing a display to display a graphical user interface that informs the user of the selected combination.

SYSTEMS AND METHODS FOR SECURE REPROVISIONING
20250365145 · 2025-11-27 ·

Systems and methods for authentication may include a first device having an association with a first account, including a memory containing one or more applets, a counter value, and transmission data, a communication interface, and one or more processors in communication with the memory and communication interface. The first device may create a cryptogram based on the counter value, wherein the cryptogram includes the counter value and the transmission data. The first device may transmit, after entry of the communication interface into a communication field, the cryptogram, and update, after transmission of the cryptogram, the counter value. The first device may receive, via the communication interface, one or more encrypted keys and one or more parameters. The first device may decrypt the one or more encrypted keys and, after decryption of the one or more encrypted keys, switch an association from the first account to a second account.

Systems and methods for determining and analyzing characteristics of devices used in payment transactions

A device profiling computer system for determining and analyzing characteristics of devices used in payment transactions includes a processor, a device profiling database in communication with the processor, and a memory coupled to the processor. The device profiling computer system is configured to receive a set of first transaction data associated with a first transaction initiated by a cardholder at an online merchant wherein the cardholder initiates the first transaction using a cardholder computing device and wherein the set of first transaction data includes a set of first device characteristic data related to the cardholder computing device, analyze the set of first transaction data to determine a set of device characteristics, and update a device record stored in a device profiling database with the set of first transaction data wherein the device record is associated with the set of device characteristics.