-
1.
公开(公告)号:US11961085B2
公开(公告)日:2024-04-16
申请号:US17730245
申请日:2022-04-27
CPC分类号: G06Q20/4016 , G06Q20/3224 , G06Q20/40155 , G06Q20/405
摘要: The disclosed technology relates to Spend Limit Systems for gas-station refuel transactions. An exemplary system may receive vehicle information identifying a customer's vehicle and identify associated vehicle characteristics (e.g., gas tank size). The system may identify a known gas-station transaction geographic region for the customer. When the customer (or a fraudster) attempts to purchase gas, the system may receive a transaction request and, in response, set a single transaction limit sufficient to fill the gas tank size with gas and an associated spend limit. The system may also determine whether the merchant location falls within the known gas-station transaction geographic region. When it does, the system may approve the transaction request up to the spend limit. Otherwise, the system may perform one or more fraud prevention actions to authenticate the customer and either approve or deny the transaction request up to the spend limit and/or selectively perform fraud mitigation action(s).
-
公开(公告)号:US11694205B2
公开(公告)日:2023-07-04
申请号:US17161732
申请日:2021-01-29
发明人: Jacob Learned , Michael Saia , Max Miracolo , Kaylyn Gibilterra
CPC分类号: G06Q20/4016 , G06N3/08 , G06Q20/351 , H04L63/1416 , H04L63/1425
摘要: Disclosed are systems and methods for data breach identification. The method may include: generating virtual card number (VCN) data sets; storing the VCN data sets on a first database; receiving one or more compromised VCN data sets stored on a second database and obtained from a scan of unindexed websites; comparing the compromised VCN data sets with the VCN data set stored on the first database to determine whether the VCN data sets have been compromised; for each compromised VCN data set, training the recurrent neural network (RNN) to associate the compromised VCN data sets with one or more sequential patterns found within the compromised VCN data sets to generate a trained RNN; receiving a first VCN data set from the first database; determining whether the first VCN data set matches a compromised VCN data set; and transmitting a message indicating the determination to a user or provider device.
-
公开(公告)号:US11057390B2
公开(公告)日:2021-07-06
申请号:US16593458
申请日:2019-10-04
发明人: Taurean Butler , Christine Berglund , Adam Vukich , Jessica Greenberg , Colin Hart , Mykhaylo Bulgakov , Jason Ji , Kaylyn Gibilterra
摘要: A method for providing a locked electronic item includes receiving a selection of an electronic lock and the electronic item from a first computing device associated with a sender. The electronic lock includes a lock clue and a lock solution. The method includes determining an answer input field configuration that includes a number of input boxes and spaces that may be arranged to correspond to the lock solution. The method includes transmitting the lock clue and the input field configuration to a second computing device associated with a recipient for display by the second computing device and receiving an attempted lock solution from the second computing device. The method further includes transmitting the electronic item to the second computing device for display or use by the second computing device in response to determining that the attempted lock solution matches the lock solution.
-
公开(公告)号:US20200045052A1
公开(公告)日:2020-02-06
申请号:US16597115
申请日:2019-10-09
发明人: Taurean Butler , Christine Berglund , Adam Vukich , Jessica Greenberg , Colin Hart , Mykhaylo Bulgakov , Jason Ji , Kaylyn Gibilterra
摘要: A method for providing a locked electronic item includes receiving a selection of an electronic lock and the electronic item from a first computing device associated with a sender. The electronic lock includes a lock clue and a lock solution. The method includes determining an answer input field configuration that includes a number of input boxes and spaces that may be arranged to correspond to the lock solution. The method includes transmitting the lock clue and the input field configuration to a second computing device associated with a recipient for display by the second computing device and receiving an attempted lock solution from the second computing device. The method further includes transmitting the electronic item to the second computing device for display or use by the second computing device in response to determining that the attempted lock solution matches the lock solution.
-
公开(公告)号:US10476881B1
公开(公告)日:2019-11-12
申请号:US16248889
申请日:2019-01-16
发明人: Taurean Butler , Christine Berglund , Adam Vukich , Jessica Greenberg , Colin Hart , Mykhaylo Bulgakov , Jason Ji , Kaylyn Gibilterra
摘要: A method for providing a locked electronic item includes receiving a selection of an electronic lock and the electronic item from a first computing device associated with a sender. The electronic lock includes a lock clue and a lock solution. The method includes determining an answer input field configuration that includes a number of input boxes and spaces that may be arranged to correspond to the lock solution. The method includes transmitting the lock clue and the input field configuration to a second computing device associated with a recipient for display by the second computing device and receiving an attempted lock solution from the second computing device. The method further includes transmitting the electronic item to the second computing device for display or use by the second computing device in response to determining that the attempted lock solution matches the lock solution.
-
公开(公告)号:US11263636B2
公开(公告)日:2022-03-01
申请号:US17099626
申请日:2020-11-16
发明人: Taurean Butler , Christine Berglund , Adam Vukich , Jessica Greenberg , Colin Hart , Mykhaylo Bulgakov , Jason Ji , Kaylyn Gibilterra
摘要: A method for providing a gift includes receiving a gift token creation request representative of a selection of a gift recipient and gift limitations from a first computing device. The method includes generating a tokenized PAN associated with a gift account and transmitting the tokenized PAN and gift limitations to a second computing device. The method includes detecting a transaction authorization request that is representative of an attempted transaction at a merchant POS device based on monitoring of transaction authorization data originating from a plurality of merchant POS devices. The transaction authorization request represents an attempted tokenized PAN, an attempted transaction amount and a merchant code. The method includes determining that the attempted tokenized PAN matches the tokenized PAN associated with the gift account. The method includes transmitting an authorization message to the merchant POS in response to determining that the transaction authorization request satisfies the gift limitations.
-
公开(公告)号:US20210398131A1
公开(公告)日:2021-12-23
申请号:US17463354
申请日:2021-08-31
发明人: Sophie Bermudez , Alexandra Colevas , Sarah Cunningham , Michael Saia , Kaylyn Gibilterra , Salik Shah
IPC分类号: G06Q20/40 , G06F16/22 , G06F16/2457 , G06Q20/10
摘要: A system includes one or more memory devices storing instructions, and one or more processors configured to execute the instructions to perform steps of a method providing biometric detection of coercion of a user. The system may detect a trigger event associated with a potential transfer of funds and may receive user biometric data. The system may determine, based on stored user biometric data and the detected user biometric data, a confidence level that the stored user biometric data is indicative of biological information representative of a user being in a stressed state. The system may initiate one or more precautionary safety measures.
-
8.
公开(公告)号:US20210365947A1
公开(公告)日:2021-11-25
申请号:US16879112
申请日:2020-05-20
摘要: The disclosed technology relates to Spend Limit Systems for gas-station refuel transactions. An exemplary system may receive vehicle information identifying a customer's vehicle and identify associated vehicle characteristics (e.g., gas tank size). The system may identify a known gas-station transaction geographic region for the customer. When the customer (or a fraudster) attempts to purchase gas, the system may receive a transaction request and, in response, set a single transaction limit sufficient to fill the gas tank size with gas and an associated spend limit. The system may also determine whether the merchant location falls within the known gas-station transaction geographic region. When it does, the system may approve the transaction request up to the spend limit. Otherwise, the system may perform one or more fraud prevention actions to authenticate the customer and either approve or deny the transaction request up to the spend limit and/or selectively perform fraud mitigation action(s).
-
公开(公告)号:US11115422B2
公开(公告)日:2021-09-07
申请号:US16597115
申请日:2019-10-09
发明人: Taurean Butler , Christine Berglund , Adam Vukich , Jessica Greenberg , Colin Hart , Mykhaylo Bulgakov , Jason Ji , Kaylyn Gibilterra
摘要: A method for providing a locked electronic item includes receiving a selection of an electronic lock and the electronic item from a first computing device associated with a sender. The electronic lock includes a lock clue and a lock solution. The method includes determining an answer input field configuration that includes a number of input boxes and spaces that may be arranged to correspond to the lock solution. The method includes transmitting the lock clue and the input field configuration to a second computing device associated with a recipient for display by the second computing device and receiving an attempted lock solution from the second computing device. The method further includes transmitting the electronic item to the second computing device for display or use by the second computing device in response to determining that the attempted lock solution matches the lock solution.
-
公开(公告)号:US20190392418A1
公开(公告)日:2019-12-26
申请号:US16014454
申请日:2018-06-21
发明人: Taurean Butler , Christine Berglund , Adam Vukich , Jessica Greenberg , Colin Hart , Mykhaylo Bulgakov , Jason Ji , Kaylyn Gibilterra
摘要: A method for providing a gift includes receiving gift information from a first computing device. The gift information includes a maximum gift amount, a gift recipient, and a gifter financial account and gift redemption information. The method includes generating a tokenized PAN associated with the gifter financial account, identifying a second computing device associated with the gift recipient, determining one or more gift redemption locations and receiving gift recipient location data. The method includes determining that the second computing device has entered a gift-eligible location based on the gift recipient location data and the one or more redemption locations and transmitting data indicative of a gift for display by the second computing device. The method further includes outputting an instruction to debit the gifter financial account with an amount of money in response to determining that a transaction has been executed using the tokenized PAN at the gift-eligible location.
-
-
-
-
-
-
-
-
-