摘要:
Disclosed are methods and systems for user authentication. User-specific data is aggregated by an authentication system. Answers to authentication questions are identified in the aggregated data. A user device attempting to authenticate with the authentication system is presented with the authentication question and selectable options for answering the authentication question. The selectable options include one or more valid answers and one or more false answers. A user device is authenticated after correctly answering one or more presented authentication questions.
摘要:
Temporarily increasing a credit limit of the credit account to accommodate a purchase by a buyer for goods and/or services from a merchant. An account management module can receive a request to increase the credit limit via an interface. The request can include information regarding the purchase and information regarding the credit limit increase, including an amount by which to increase the credit limit. The request also can include rules for decreasing the credit limit at the end of the credit limit increase term. The account management module can process the credit limit increase and decrease, in accordance with the request. The account management module also can transmit an email to the merchant with credit account information needed to process the purchase. For example, the email can include a link to a web site at which the merchant can obtain the credit account information upon successful completion of an authentication procedure.
摘要:
Methods, systems, and apparatuses for improved fraud detection and reduction are described herein. A system may receive a number of analysis parameters for detecting and reducing fraud. Using the analysis parameters, the system may determine a set of training events for each of a number of selected event types for analysis. Each event type may include one or more attributes. The system may transform each of the attributes. The system may determine a predicted action for each event. The system may include a machine learning module. The predicted action for each event may be provided to the machine learning module to train a machine learning model(s) for fraud detection and prevention.
摘要:
Providing data as part of a testing regime for computer software. Random data values can be automatically generated to support the testing of any type of computer software that operates on data as part of its function. This random generation of data values can provide a breadth of data needed to fully stress the software program being tested. Data of any type can be provided to a testing regime and individual data elements may be related such that the provided data reflects realistic situations. Data can be extracted from data tables and/or generated through operating a function designed to generate a specific value type.
摘要:
A process for using an inkjet printer to apply translucent inks for producing a pseudo-metallic visual effect on a substrate is disclosed. The process uses a matte printing technique that results in a metallic appearance when applied to various substrates, such as commercial plastic cards. The resulting card product is also disclosed.
摘要:
Encrypting sensitive information sent using an interactive voice response (IVR) system. The systems and methods may include an HSM that provides a secure platform to encrypt the sensitive information. They may also include interfaces with IVR systems and transaction processing hosts. The systems and methods may interact directly with a customer using an IVR to receive the sensitive information. They may also provide for a secure platform to validate the strength of the information, such as a PIN or password, prior to further processing of the sensitive information.
摘要:
Controlling the authorization of financial transactions, such as credit card transactions. Financial institutions and businesses can establish accounts for employees that have an authorization process that augments the normal authorization process, where this augmented authorization process can result in approving transactions that otherwise exceed the transaction limitations established for the account. A single event authorization control (SEAC) process can be completed in response to determining that a financial services transaction undergoing a conventional authorization process qualifies for the SEAC process. To complete the process, a SEAC data record containing parameter values that most closely match the parameter values associated with the authorization request is selected and the applicable SEAC action contained in the data record, e.g., decline override, funds encumbrance, or budgetary exception, is performed. Then, a decision regarding authorization of the transaction is generated.
摘要:
Allowing an account holder for a newly-established financial card account to establish a PIN at the time the financial card account is opened and use that PIN to authenticate transactions at the time the account is opened. The systems and methods may include a POS device that securely captures and encrypts a custom PIN, that is, a PIN supplied by the customer for a new financial card account. The systems and methods would also include a transaction processing system that receives an encrypted PIN, along with customer information about a new financial card account, and processes that information and encrypted PIN to establish a new account. As a result of this processing, an authorization platform would receive information necessary to authenticate a user and authorize a transaction. Through these systems and methods, a customer would be able to use the custom PIN to authenticate a transaction at the time the new account is opened.
摘要:
Securely disclosing a personal identification number (“PIN”) associated with a financial account to an account holder and receiving a new PIN from the account holder. A PIN reveal application can interact with a hardware security module (“HSM”) using a PIN offset masking process and randomly generated account data to reveal the PIN to the account holder one or more PIN characters at a time. A PIN set application also can interact the HSM using a PIN offset masking process and randomly generated account data to receive a new PIN for the account one or more PIN characters at a time. In each of the PIN reveal and PIN setting processes, less than the entirety of the PIN is stored in an unencrypted format outside of the HSM only.
摘要:
Providing a centralized process for accessing and implementing database management tools. These tools may be either developed by a vendor of the database management system, a third party, or by the enterprise implementing the database management tools. The system would include an interface between the user and the system that allows the user to indicate specific tasks to perform and provide a means for the user to receive and input information. The interface may support the development of specific job control messages that can be executed to implement a chosen task.