Systems and methods for detecting potentially compromised payment cards

    公开(公告)号:US11893549B2

    公开(公告)日:2024-02-06

    申请号:US16890896

    申请日:2020-06-02

    Abstract: A computer-implemented method for detecting potentially compromised payment cards is provided. The method uses a processor in communication with a memory. The method includes storing a plurality of tokens. Each token includes merchant identification data corresponding to a first merchant. The method also includes transmitting the plurality of tokens to the first merchant and receiving an authorization request message from a merchant. The authorization request message includes a token and a merchant identifier corresponding to the merchant. The method further includes determining that the received token is one of the plurality of tokens associated with the first merchant, determining that the merchant identifier does not correspond to the first merchant, transmitting a message including instructions to decline the transaction, and attaching a potentially compromised flag to the first merchant. The potentially compromised flag indicates a heightened probability of fraudulent activity.

    System and methods for correcting text-to-speech pronunciation

    公开(公告)号:US10553200B2

    公开(公告)日:2020-02-04

    申请号:US15964163

    申请日:2018-04-27

    Abstract: A text-to-speech (TTS) computing includes a processor and a memory. The TTS computing device is configured to generate a machine pronunciation of a text data according to at least one phonetic rule, and provide the machine pronunciation to a user interface of the TTS computing device such that the machine pronunciation is audibly communicated to a user of the TTS computing device. The TTS computing device is also configured to receive a pronunciation correction of the machine pronunciation from the user via the user interface, and store the pronunciation correction in a TTS data source. The TTS computing device is further configured to assign the pronunciation correction provided by the user to a user profile that corresponds to the text data.

    SYSTEM AND METHODS FOR CORRECTING TEXT-TO-SPEECH PRONUNCIATION

    公开(公告)号:US20180247637A1

    公开(公告)日:2018-08-30

    申请号:US15964163

    申请日:2018-04-27

    Abstract: A text-to-speech (TTS) computing includes a processor and a memory. The TTS computing device is configured to generate a machine pronunciation of a text data according to at least one phonetic rule, and provide the machine pronunciation to a user interface of the TTS computing device such that the machine pronunciation is audibly communicated to a user of the TTS computing device. The TTS computing device is also configured to receive a pronunciation correction of the machine pronunciation from the user via the user interface, and store the pronunciation correction in a TTS data source. The TTS computing device is further configured to assign the pronunciation correction provided by the user to a user profile that corresponds to the text data.

    Systems and methods for detecting potentially compromised payment cards

    公开(公告)号:US10671980B2

    公开(公告)日:2020-06-02

    申请号:US14518804

    申请日:2014-10-20

    Abstract: A computer-implemented method for detecting potentially compromised payment cards is provided. The method uses a processor in communication with a memory. The method includes storing a plurality of tokens. Each token includes merchant identification data corresponding to a first merchant. The method also includes transmitting the plurality of tokens to the first merchant and receiving an authorization request message from a merchant. The authorization request message includes a token and a merchant identifier corresponding to the merchant. The method further includes determining that the received token is one of the plurality of tokens associated with the first merchant, determining that the merchant identifier does not correspond to the first merchant, transmitting a message including instructions to decline the transaction, and attaching a potentially compromised flag to the first merchant. The potentially compromised flag indicates a heightened probability of fraudulent activity.

    Systems and Methods for Locating Merchant Terminals Based on Transaction Data

    公开(公告)号:US20200065913A1

    公开(公告)日:2020-02-27

    申请号:US16667362

    申请日:2019-10-29

    Abstract: Systems and methods are provided for use in locating one or more merchant terminals based on transaction data associated with the terminals. One exemplary method generally includes accessing, by a computing device, transaction data for a transaction to a payment account between a merchant and a consumer at a merchant terminal where the transaction data includes a terminal ID for the merchant terminal, a merchant ID of the merchant, an acquirer ID for an acquirer associated with the merchant, and a temporal indicator. In addition, the method includes receiving, by the computing device, location data associated with the transaction, identifying, by the computing device, a location associated with the location data as a location of the merchant terminal, and assigning, by the computing device, a score to the identified location indicative of a confidence that the identified location is the actual location of the merchant terminal.

    SYSTEMS AND METHODS FOR DETECTING POTENTIALLY COMPROMISED PAYMENT CARDS
    8.
    发明申请
    SYSTEMS AND METHODS FOR DETECTING POTENTIALLY COMPROMISED PAYMENT CARDS 审中-公开
    用于检测潜在付费付款卡的系统和方法

    公开(公告)号:US20160110709A1

    公开(公告)日:2016-04-21

    申请号:US14518804

    申请日:2014-10-20

    Abstract: A computer-implemented method for detecting potentially compromised payment cards is provided. The method uses a processor in communication with a memory. The method includes storing a plurality of tokens. Each token includes merchant identification data corresponding to a first merchant. The method also includes transmitting the plurality of tokens to the first merchant and receiving an authorization request message from a merchant. The authorization request message includes a token and a merchant identifier corresponding to the merchant. The method further includes determining that the received token is one of the plurality of tokens associated with the first merchant, determining that the merchant identifier does not correspond to the first merchant, transmitting a message including instructions to decline the transaction, and attaching a potentially compromised flag to the first merchant. The potentially compromised flag indicates a heightened probability of fraudulent activity.

    Abstract translation: 提供了一种用于检测可能受损的支付卡的计算机实现的方法。 该方法使用与存储器通信的处理器。 该方法包括存储多个令牌。 每个令牌包括对应于第一商家的商家标识数据。 该方法还包括将多个令牌发送给第一商家并从商家接收授权请求消息。 授权请求消息包括对应于商家的令牌和商家标识符。 该方法还包括确定所接收的令牌是与第一商家相关联的多个令牌中的一个,确定商家标识符不对应于第一商家,发送包括拒绝该交易的指令的消息,以及附加潜在受损的 标志给第一个商人。 潜在受损标志表示欺诈活动的可能性增加。

    Method and system for HTTP session management using hash chains

    公开(公告)号:US11621826B2

    公开(公告)日:2023-04-04

    申请号:US16705506

    申请日:2019-12-06

    Abstract: A method for performing authentication of a client device using a hash chain includes: receiving a first data request from a client device, the first data request including at least a user identifier and a first hash value; transmitting a first data response message to the client device; receiving a second data request from the client device, the second data request including at least the user identifier and a second hash value; generating a validating hash value by applying a hashing algorithm to the second hash value; validating the first hash value as being equal to the generated validating hash value; and transmitting a second data response message to the client device upon successful validation of the first hash value, wherein the second data response message includes one or more data values associated with the user identifier.

    Systems and Methods for Locating Merchant Terminals Based on Transaction Data

    公开(公告)号:US20220391995A1

    公开(公告)日:2022-12-08

    申请号:US17888311

    申请日:2022-08-15

    Abstract: Systems and methods are provided for use in locating one or more merchant terminals. One example method generally includes accessing, by a computing device, interaction data for at least one interaction between a merchant and a user at a merchant terminal, where the interaction data includes a temporal indicator. In addition, the method includes receiving, by the computing device, location data associated with the at least one interaction and matching the interaction to the location data, based on the temporal indicator in the interaction data. The method then includes, in response to matching the interaction data to the location data, identifying, by the computing device, a location indicated by the location data as an actual location of the merchant terminal.

Patent Agency Ranking