G06Q20/4016

Detecting security breaches with watchdog transaction accounts

Disclosed are various embodiments for detecting security breaches using watchdog transaction accounts. A security agent can initiate a purchase with a first electronic commerce system and provide a watchdog transaction account as payment for the purchase. The security agent can then store a record of the purchase which includes a merchant identifier for the merchant and the watchdog transaction account. Subsequently, a transaction authorization system can determine that authorization for a transaction with second electronic commerce system failed. If the transaction authorization system determines that the account used in the transaction with the second electronic commerce system, then the transaction authorization system can determine that the first electronic commerce system has suffered a security breach.

Risk determination enabled crypto currency transaction system
11580551 · 2023-02-14 · ·

Systems and methods for providing risk determination in a crypto currency transaction include receiving, through a network via a broadcast by a first payer device, a first crypto currency transaction that includes a first payee public address. A first request for a determination of risk associated with the first crypto currency transaction is then identified in the first crypto currency transaction, with the first request including risk criteria. A first payee involved in the first crypto currency transaction is then identified using the first payee public address, and first payee risk information is accessed via at least one external risk information database based on the identification of the first payee. If it is determined that the first payee risk information satisfies the at least one risk criteria in the first request, the first crypto currency transaction is provided for addition to a block in a crypto currency public ledger.

NFC card verification
11580523 · 2023-02-14 · ·

Methods and systems are provided for verifying the possession of a card, such as a credit card or a debit card, by a card user. Possession of the card can be verified, for example, when a purchase transaction, such as a telephone purchase transaction or an online purchase transaction, is attempted with the card and the purchase transaction is denied due to suspected account take over. Possession of the card can be verified by detecting the present of the card with a mobile device of the user, such as a smart phone. For example, possession of the card can be verified by near field communication (NFC) between the card and the mobile device, wherein the communication is sufficient to adequately determine the presence of the card.

Camera activation and image processing for transaction verification
11580507 · 2023-02-14 · ·

A device may receive first information related to a transaction. The device may identify a first device from which to receive an image of a receipt related to the transaction. The device may provide, to the first device, a notification to cause the first device to perform a set of actions including activating a camera associated with the first device to capture the image of the receipt, or providing, for display, an instruction related to capturing the image of the receipt associated with the transaction. The device may receive, from the first device, the image of the receipt. The device may process the image of the receipt to perform an analysis of the transaction. The device may perform an action related to the transaction based on a result of processing the image of the receipt.

Shared expense management

Systems and methods are provided for managing shared expenses. The systems and methods may include a financial service provider identifying shared expenses in a customer's transaction history with software application executed on a server or personal computing device. The financial service provider may identify other individuals with whom the customer shares the expense, and send requests for reimbursement on the customer's behalf. The financial service provider ay monitor the status of reimbursement payments, and send reminders as necessary until the shared expense has been reimbursed.

Device reputation

A user device is associated with a dynamic trust score that may be updated as needed, where the trust score and the updates are based on various activities and information associated with the mobile device. The trust score is based on both parameters of the device, such as device type, registered device location, device phone number, device ID, the last time the device has been accessed, etc. and activities the device engages in, such as amount of transactions, dollar amount of transactions, amount of denied requests, amount of approved requests, location of requests, etc. Based on a transaction request from the user device, the trust score and a network reputation score is used to determine an overall trust/fraud score associated with the transaction request.

Transaction tracking and fraud detection using voice and/or video data

A device receives recording data, for a recording of a user associated with an account, that captures the user describing a transaction. The device processes the recording data to identify one or more characteristics of an individual that described the transaction in the recording. The device determines, based on the one or more characteristics of the individual, whether the individual that described the transaction in the recording is the user associated with the account. The device causes the recording data to be stored in association with transaction data that identifies a list of transactions that are associated with the account of the user, wherein causing the recording data to be stored in association with the transaction data allows the recording to be made accessible to the user via an interface of an application used to manage the account.

Method, device, and system of detecting mule accounts and accounts used for money laundering
11580553 · 2023-02-14 · ·

Method, device, and system of detecting a mule bank account, or a bank account used for terror funding or money laundering. A method includes: monitoring interactions of a user with a computing device during online access with a bank account; and based on the monitoring, determining that the bank account is utilized as a mule bank account to illegally receive and transfer money, or is used for money laundering or terror funding. The method takes into account one or more indicators, such as, utilization of a remote access channel, utilization of a virtual machine or a proxy server, unique behavior across multiple different accounts, temporal correlation among operations, detection of a set of operations that follow a pre-defined mule account playbook, detection of multiple incoming fund transfers from multiple countries that are followed by a single outgoing fund transfer to a different country, and other indicators.

System, method, and computer program product for determining an event in a distributed data system
11580552 · 2023-02-14 · ·

A method for preventing duplicate processing of a payment transaction includes: generating a first data structure with a first predetermined time interval and generating a second data structure with a second predetermined time interval. A first overlap region and second overlap region of the first and second predetermined time interval are defined by a same time interval. The method includes receiving first transaction data associated with a first payment transaction, receiving second transaction data associated with a second payment transaction, and determining based on a first transaction ID and a second transaction ID, that the second payment transaction is a duplicate of the first payment transaction. A computer program product and system for preventing duplicate processing of a payment transaction are also disclosed.

Printer for selectively printing symbolic information on a medium

In some implementations, a printing system may include a card printer that includes a printing controller and a marking device. The card printer may be configured to receive a first printing instruction or a second printing instruction associated with printing an account identifier on a card. The card printer may receive one of the first printing instruction or the second printing instruction based on whether a risk score, associated with the account identifier, satisfies a threshold. The card printer may print a full account identifier, associated with the card, on a surface of the card based on receiving the first printing instruction. The card printer may print the card without the full account identifier on the surface of the card based on receiving the second printing instruction.