摘要:
Embodiments of the present invention are directed to methods and systems for performing a secure authentication process by leveraging the historical transaction data associated with an issuer. The historical transaction data stored at a fraud detection system may include the types of frequency of past authentication processes performed by the issuer, allowing for a determination of the likelihood of an authentication challenge process being applied to a current transaction. A merchant may define merchant rules that define what authentication process, if any, should then be applied to the current transaction based on the likelihood of an authentication challenge process being applied to the current transaction.
摘要:
Embodiments of the present invention are directed to methods and systems for performing a secure authentication process by leveraging the historical transaction data associated with an issuer. The historical transaction data stored at a fraud detection system may include the types of frequency of past authentication processes performed by the issuer, allowing for a determination of the likelihood of an authentication challenge process being applied to a current transaction. A merchant may define merchant rules that define what authentication process, if any, should then be applied to the current transaction based on the likelihood of an authentication challenge process being applied to the current transaction.
摘要:
Embodiments of the invention are directed to systems and methods of user authentication for data services. The data services may include accessing a tax return at the IRS, accessing or completing a student loan application, accessing a credit report, etc. User authentication data is collected by a data provider and provided to a server computer, and user device data is collected by the server computer after the user device accesses a resource identifier (e.g., URL) associated with the server computer. The user authentication data and/or user device data is analyzed and a risk score is generated.
摘要:
Embodiments are directed to a method for accelerating machine learning using a plurality of graphics processing units (GPUs), involving receiving data for a graph to generate a plurality of random samples, and distributing the random samples across a plurality of GPUs. The method may comprise determining a plurality of communities from the random samples using unsupervised learning performed by each GPU. A plurality of sample groups may be generated from the communities and may be distributed across the GPUs, wherein each GPU merges communities in each sample group by converging to an optimal degree of similarity. In addition, the method may also comprise generating from the merged communities a plurality of subgraphs, dividing each sub-graph into a plurality of overlapping clusters, distributing the plurality of overlapping clusters across the plurality of GPUs, and scoring each cluster in the plurality of overlapping clusters to train an AI model.
摘要:
Embodiments of the invention are directed to systems and methods of user authentication for data services. The data services may include accessing a tax return at the IRS, accessing or completing a student loan application, accessing a credit report, etc. User authentication data is collected by a data provider and provided to a server computer, and user device data is collected by the server computer after the user device accesses a resource identifier (e.g., URL) associated with the server computer. The user authentication data and/or user device data is analyzed and a risk score is generated.
摘要:
Embodiments of the present invention are directed to methods and systems for utilizing the history of previous authentications and authorizations related to third party computers, as factors in determining whether a current request for accessing a resource should be authorized. A processor server computer, in determining whether to authorize access to the resource, may generate and send a query message to one or more of the third party computers to obtain authorization activity that the third party computers may have regarding a user and/or a device associated with the request. The processor server computer may use the authorization activity from the third party computers in determining whether the request is an authentic request and that the request should be authorized.
摘要:
A server computing device receives authentication request messages formatted according to a first message format from a party via a computing device of a user involved in a transaction, translates the messages into modified authentication request messages formatted according to a second message format, and transmits the modified authentication request messages to an authorization computer. The server computing device may augment the modified authentication request messages by including data gathered from the received authentication request messages describing the user, user's computing device, and/or network path between the server computing device and user's computing device, as well as risk scores generated based upon the received authentication request message. Additionally, the server computing device receives messages formatted according to the second message format from the authorization computer and translates them into messages formatted according to the first message format to be sent to the user's computing device.
摘要:
A system for providing real-time risk mitigation for an authorization system. The system receives authorization requests from multiple merchants (or their respective acquirers) and processes such requests. Each processed request is then forwarded to its corresponding issuer for further authorization. Each processed request includes an authorization message. The authorization message can include a risk score, a number of reason codes, and a number of condition codes. The use of the risk score, reason codes and condition codes allows issuers to make better informed decisions with respect to providing authorizations.
摘要:
A processor module is packaged with a display for a portable electronic device. The display is designed to create a space within a display housing to allow a processor module to be included in the display housing. The processor module can be designed to be integral with the display housing. Additionally, the processor module can be designed to be detachable from the display housing to provide a removable processor module. The removable processor module can be replaced with another processor module having different functionality or have stand alone functionality, as well as system functionality when attached to a display lid or a portable electronic device.
摘要:
A user interface (UI) for use with a secondary display module of a mobile electronic device. The UI allows the user to access application data without activating the operating system (OS) of the main portion of the mobile electronic device. The UI can allow the user to access application data by activating the OS and an associated low-power application without launching the application. The UI also provides a simple mechanism to disable wireless components of the mobile electronic device while allowing the user to use other non-wireless components. The secondary display module can be detached from a main portion of the mobile electronic device, with the UI being automatically activated. The UI can be automatically activated (or deactivated) in response to deactivation (or activation) of the UI of the main display of the mobile electronic device.