Abstract:
A computer-implemented method for detecting potentially compromised payment cards is provided. The method uses a processor in communication with a memory. The method includes storing a plurality of tokens. Each token includes merchant identification data corresponding to a first merchant. The method also includes transmitting the plurality of tokens to the first merchant and receiving an authorization request message from a merchant. The authorization request message includes a token and a merchant identifier corresponding to the merchant. The method further includes determining that the received token is one of the plurality of tokens associated with the first merchant, determining that the merchant identifier does not correspond to the first merchant, transmitting a message including instructions to decline the transaction, and attaching a potentially compromised flag to the first merchant. The potentially compromised flag indicates a heightened probability of fraudulent activity.
Abstract:
A text-to-speech (TTS) computing includes a processor and a memory. The TTS computing device is configured to generate a machine pronunciation of a text data according to at least one phonetic rule, and provide the machine pronunciation to a user interface of the TTS computing device such that the machine pronunciation is audibly communicated to a user of the TTS computing device. The TTS computing device is also configured to receive a pronunciation correction of the machine pronunciation from the user via the user interface, and store the pronunciation correction in a TTS data source. The TTS computing device is further configured to assign the pronunciation correction provided by the user to a user profile that corresponds to the text data.
Abstract:
A text-to-speech (TTS) computing includes a processor and a memory. The TTS computing device is configured to generate a machine pronunciation of a text data according to at least one phonetic rule, and provide the machine pronunciation to a user interface of the TTS computing device such that the machine pronunciation is audibly communicated to a user of the TTS computing device. The TTS computing device is also configured to receive a pronunciation correction of the machine pronunciation from the user via the user interface, and store the pronunciation correction in a TTS data source. The TTS computing device is further configured to assign the pronunciation correction provided by the user to a user profile that corresponds to the text data.
Abstract:
A method for posting of anonymous directed transaction includes: storing a plurality of entity profiles, each including an entity identifier and a secret value; receiving a transaction request from a first entity, the request including transaction data and a specific entity identifier associated with a second entity; identifying a specific entity profile that includes the specific entity identifier; generating a first hash value via application of one or more hashing algorithms to the transaction data; generating a second hash value via application of one of more hashing algorithms to a combination of the first hash value and the secret value included in the identified specific entity profile; and posting the first hash value and second hash value to a publicly accessible data source.
Abstract:
Systems and methods for use in identifying payment accounts to segments are provided. One exemplary method includes receiving a first indicator for a first location from a communication device, where the communication device is associated with a consumer and the consumer is associated with a payment account issued to the consumer by an issuer. The method also includes appending, by a computing device, the payment account to a first segment based on the first location indicator, and causing at least one rule associated with the payment account to be modified where the at least one rule relates to authorization of transactions in a first region including the first location.
Abstract:
A computer-implemented method for detecting potentially compromised payment cards is provided. The method uses a processor in communication with a memory. The method includes storing a plurality of tokens. Each token includes merchant identification data corresponding to a first merchant. The method also includes transmitting the plurality of tokens to the first merchant and receiving an authorization request message from a merchant. The authorization request message includes a token and a merchant identifier corresponding to the merchant. The method further includes determining that the received token is one of the plurality of tokens associated with the first merchant, determining that the merchant identifier does not correspond to the first merchant, transmitting a message including instructions to decline the transaction, and attaching a potentially compromised flag to the first merchant. The potentially compromised flag indicates a heightened probability of fraudulent activity.
Abstract:
Systems and methods are provided for use in locating one or more merchant terminals based on transaction data associated with the terminals. One exemplary method generally includes accessing, by a computing device, transaction data for a transaction to a payment account between a merchant and a consumer at a merchant terminal where the transaction data includes a terminal ID for the merchant terminal, a merchant ID of the merchant, an acquirer ID for an acquirer associated with the merchant, and a temporal indicator. In addition, the method includes receiving, by the computing device, location data associated with the transaction, identifying, by the computing device, a location associated with the location data as a location of the merchant terminal, and assigning, by the computing device, a score to the identified location indicative of a confidence that the identified location is the actual location of the merchant terminal.
Abstract:
A computer-implemented method for detecting potentially compromised payment cards is provided. The method uses a processor in communication with a memory. The method includes storing a plurality of tokens. Each token includes merchant identification data corresponding to a first merchant. The method also includes transmitting the plurality of tokens to the first merchant and receiving an authorization request message from a merchant. The authorization request message includes a token and a merchant identifier corresponding to the merchant. The method further includes determining that the received token is one of the plurality of tokens associated with the first merchant, determining that the merchant identifier does not correspond to the first merchant, transmitting a message including instructions to decline the transaction, and attaching a potentially compromised flag to the first merchant. The potentially compromised flag indicates a heightened probability of fraudulent activity.
Abstract:
A method for performing authentication of a client device using a hash chain includes: receiving a first data request from a client device, the first data request including at least a user identifier and a first hash value; transmitting a first data response message to the client device; receiving a second data request from the client device, the second data request including at least the user identifier and a second hash value; generating a validating hash value by applying a hashing algorithm to the second hash value; validating the first hash value as being equal to the generated validating hash value; and transmitting a second data response message to the client device upon successful validation of the first hash value, wherein the second data response message includes one or more data values associated with the user identifier.
Abstract:
Systems and methods are provided for use in locating one or more merchant terminals. One example method generally includes accessing, by a computing device, interaction data for at least one interaction between a merchant and a user at a merchant terminal, where the interaction data includes a temporal indicator. In addition, the method includes receiving, by the computing device, location data associated with the at least one interaction and matching the interaction to the location data, based on the temporal indicator in the interaction data. The method then includes, in response to matching the interaction data to the location data, identifying, by the computing device, a location indicated by the location data as an actual location of the merchant terminal.