US20100145868A1 - Location based fraud reduction system and method - Google Patents
Location based fraud reduction system and method Download PDFInfo
- Publication number
- US20100145868A1 US20100145868A1 US12/707,228 US70722810A US2010145868A1 US 20100145868 A1 US20100145868 A1 US 20100145868A1 US 70722810 A US70722810 A US 70722810A US 2010145868 A1 US2010145868 A1 US 2010145868A1
- Authority
- US
- United States
- Prior art keywords
- request
- location
- transaction
- access
- time
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Abandoned
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/04—Payment circuits
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/30—Payment architectures, schemes or protocols characterised by the use of specific devices or networks
- G06Q20/32—Payment architectures, schemes or protocols characterised by the use of specific devices or networks using wireless devices
- G06Q20/321—Payment architectures, schemes or protocols characterised by the use of specific devices or networks using wireless devices using wearable devices
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/30—Payment architectures, schemes or protocols characterised by the use of specific devices or networks
- G06Q20/32—Payment architectures, schemes or protocols characterised by the use of specific devices or networks using wireless devices
- G06Q20/322—Aspects of commerce using mobile devices [M-devices]
- G06Q20/3224—Transactions dependent on location of M-devices
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/40—Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
- G06Q20/403—Solvency checks
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q30/00—Commerce
- G06Q30/018—Certifying business or products
- G06Q30/0185—Product, service or business identity fraud
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q50/00—Systems or methods specially adapted for specific business sectors, e.g. utilities or tourism
- G06Q50/10—Services
- G06Q50/26—Government or public services
- G06Q50/265—Personal security, identity or safety
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/20—Individual registration on entry or exit involving the use of a pass
- G07C9/22—Individual registration on entry or exit involving the use of a pass in combination with an identity check of the pass holder
Definitions
- Embodiments of the present invention relate to the field of fraud reduction, and in particular, to a request processing system and method for request to enter a financial transaction, access of physical/informational resources, and access of secured area.
- Credit account fraud costs companies millions of dollars per year. Additionally, companies spend large amounts of time and money trying to reduce credit account fraud. Many transactions involving credit accounts and credit cards occur via the Internet every day. Establishing the identity of the person using a credit card or credit account via the Internet is nearly impossible.
- ZIP code verification This process occurs when either a website prompts a cardholder to enter their billing ZIP code when completing a purchase form or when an operator verbally requests this information during a telephone transaction. When an order is placed, a match or no match is given based on whether or not the accurate ZIP code information was given.
- Another fraud prevention method is additional number verification.
- Credit card issuers are now including extra digits on cards that are only visible to someone physically holding a card. These numbers usually appear on the front or back of a card. The idea behind this security measure is that only the person holding the card would have access to these numbers. For example, if a thief stolen a credit card receipt it could contain the account number and the expiration date, but would not have these extra digits.
- FIG. 1 is a schematic view illustrating a payment device present transaction according to one embodiment of the present invention
- FIG. 2 is a schematic view, according to another embodiment of the present invention, showing a payment device-not-present transaction
- FIG. 3 is a schematic view illustrating an access device-present transaction according to one embodiment of the present invention.
- FIG. 4 is a schematic view illustrating a security device-present transaction according to one embodiment of the present invention.
- Embodiments of the present invention include transaction and access control devices and systems equipped to reduce the likelihood of fraud.
- Payment device-present transaction system 10 typically includes a payment device 11 configured to be read by a payment device reader 12 .
- a payment device 11 is a credit or debit card, but may alternatively be a mobile commerce device (such as an mobile commerce enabled mobile telephone) configured to transmit payment information to credit device reader via an infrared or other communication link.
- payment device 11 may include a position sensor 11 a , as well as payment information 11 b.
- mobile telephone refers to the class of telephone devices equipped to enable a user to make and receive calls wirelessly, notwithstanding the user's movement, as long as the user is within the communication reach of a service or base station of a wireless network service provider. Unless specifically excluded, the term “mobile telephone” is to include the analog subclass as well as the digital subclass (of all signaling protocols).
- the payment device reader 12 typically includes a position sensor 12 a and merchant related information, such as a merchant identifier, 12 b .
- payment device reader 12 is configured to send payer and payment information, merchant information (such as merchant identifier), and/or position information to a payment processing system 14 , to request an amount to be charged against the account of payer for the transaction.
- payment device 11 may be a mobile commerce device configured to directly transmit payer, payment, payee, and/or position information to payment processing system 14 , to request an amount to be charged against the account of payer for the transaction.
- an identifier of the location of the transaction i.e. the location from where the request is submitted
- information leading to the identifying of the location e.g. name and branch of the merchant
- the payer information etc. may be sent as part of the request or after an initial request for the transaction.
- Payment processing system 14 is configured to determine the location or position of the payment device and/or payment device reader by the position information received from position sensor 11 a or 12 a .
- payment processing system 14 is implemented with a conventional computing system having storage medium having stored therein programming instructions implementing the teachings of the present invention, and one or more processor to execute the programming instructions.
- the payment processing system 14 is configured to detect the position of the payment device reader (and therefore, the position of the payment device in a payment device-present transaction), by resolving merchant information (such as the merchant identifier) using a database of known merchant locations.
- merchant information such as the merchant identifier
- a merchant having the merchant identifier 1234567 may correspond to a convenience mart on the corner of 5 th and Vine streets in a particular town.
- system 10 further includes a position-sensing device 16 having a position sensor 16 b .
- Position-sensing device 16 may be a mobile telephone, watch, jewelry, computing device, global positioning unit, or other device including a position sensor 16 b .
- position-sensing device 16 is otherwise not involved in payment related to the transaction entered into by payment device 11 .
- the position-sensing device 16 is configured to send position information to a position tracking system 18 .
- the communication link between position tracking system 18 and position-sensing device 16 may be a satellite link such as used in a global positioning satellite system, radio frequency link, optical link such as infrared, or virtually any other communication link suitable for use in position detection.
- Position tracking system 18 is configured to communicate the position information for the position-sensing device 16 to payment processing system 14 .
- payment processing system 14 is configured to compare the position of position-sensing device 16 to the location or position of a current transaction involving payment device 11 (i.e., the location or position of payment device 11 and/or payment device reader 12 ).
- the payment processing system is configured to determine that there is a possibility of fraud in the current transaction. Upon determining the possibility of fraud, the payment processing system is configured to take a designated action, such as preventing the completion of the transaction.
- the requirement of the possession of the payment device and the position sensing device may be referred to as “double custody” fraud prevention or reduction.
- a cardholder may carry a device that has a built-in position locator within it.
- the device may be a cell phone, watch, jewelry, wallet, or any other item that a locator could be placed in and that a person would normally carry.
- the device may even change from day to day. For example, some people currently have three cell phones from various companies and each has a unique feature. One may be extremely compact, one may be large, but can send and receive emails, and the third may have a long battery life.
- a person may choose to use one of the three phones and may place a location device in or on that phone. In an embodiment, there may be three phones, but maybe only one location device.
- the location device may e.g. be a watch.
- the location device may be integrated with or removably associated with the watch.
- the cardholder would inform the credit card company ahead of time, as to the identification number/model of the location device. Once this information is given, the information may be entered into the database, and the system is primed to prevent fraudulent use of a credit card.
- the cardholder may turn the watch's tracking device on or off at their leisure, as you can with a cell phone.
- the database would contain the current location, such as, the coordinates, of the watch (during a transaction).
- the cardholder may turn the tracking device on and the database would be provided with the location information of the watch and its owner.
- PDX Portland airport
- the merchant's machine may send out information about the transaction to the processing company, including the merchant's location.
- the location is PDX.
- the processing system may access the database to verify the merchant's location against the watch's location and registers that the watch is also at PDX and gives a match to permit the transaction to be completed.
- the above embodiment may be applied to wireless portable Point-Of-Sale (POS) terminals.
- POS Point-Of-Sale
- Individuals may be provided with their own personal portable terminals equipped to provide location information.
- the merchant's POS terminal may also be portable, and therefore may be relocated and used in a weekly or monthly specialty, fruit or produce market.
- transactions conducted under this “transient” market environment may also be accorded the added fraud prevention as earlier described.
- the location information obtained may be used for other purposes besides fraud prevention.
- Cardholders may access online statements that create a picture of their transaction history. When a cardholder clicks on a particular transaction on their bill, they may have the option to look at a map or satellite overlay of the city and view where the transaction took place. A customer may create a trip diary based off purchases in a set period of time.
- this system in some parts, may be used for tracking corporate card user movements.
- FIG. 2 shows a payment-device-not-present transaction system 20 according to another embodiment of the present invention.
- Payment-device-not-present transaction system 20 typically includes a device 21 that is capable of transmitting position information to a payment processing system 24 .
- device 21 is a mobile telephone or a computing device configured to detect its position as well as to enter into payment transactions using on-board payment information.
- Payment-device-not-present transaction system 20 typically is configured to enable a user to enter into transaction, such as making a purchase by mobile telephone, or by a computing device (PDA, laptop, desktop, web-enabled mobile telephone, etc.) over a computer network, or in another manner in which the user is not required to present a payment device, such as a credit card at the point of sale.
- PDA personal digital assistant
- laptop desktop, web-enabled mobile telephone, etc.
- Device 21 may include an interface configured to be used to input transaction data for a transaction, such as a purchase, to be entered into by the user. This transaction data may include payer information, items to be purchased, payment information etc. Device 21 may also include a position sensor 22 configured to detect a position of the device and send this position information to payment processing system 24 via a wireless or a wireline communication link. Thus, device 21 is typically configured to send substantially simultaneously the transaction data and position information to payment processing system 24 . Payment processing system 24 includes an associated database of permissible and/or impermissible use areas for a particular user's device 21 .
- Payment processing system 24 is configured to check position information of the device 21 against the permissible and/or impermissible use areas for each user, and thereby determine if the device is being used in an impermissible use area for the user. If so, the system 24 is configured to indicate that a possibility of fraud exists in the pending transaction. If the possibility of fraud is detected, the system may be configured to take an action, such as preventing fulfillment of the transaction due to the possibility of fraud.
- the payment processing system may be implemented with conventional computing system with storage medium having programming instructions designed to implement the present invention, and one or more processors to execute the programming instructions.
- the above embodiment is particularly useful in preventing fraud in e-commerce transactions over a public network, such as the Internet.
- a public network such as the Internet.
- a cardholder orders a product or service via the Internet or telephone, there is no good way to know, in real-time, where that person and credit card are.
- a thief in Baltimore could be using an Oregonian's card information.
- the cardholder when a cardholder is issued a card, the cardholder may be asked to give the geographic location of their home and office, as well as any other locations that the cardholder frequently place on-line orders and use the credit card. This information may be obtained during the application process or on an ongoing basis. The information may be entered into a database.
- the order processing system may check the database for whether the transaction is being conducted from a permissible location. If the transaction is not being conducted from a permissible location, the transaction may be rejected. Additionally, a warning in the form of a message and/or a call may be provided to the cardholder.
- GPS, cell phones, and other wireless devices may not work in all places, all of the time. Communication errors may often occur inside basements or underneath a canopy, etc.
- the FCC also must allow for interference. Black outs are becoming less of an issue over time as more towers are built and satellites are deployed, however, in some form or another, this will always be an issue.
- the solution may be a smart database that tracks the velocity of the double custody device. For example, if the device is heading south at a velocity of 40 miles per hour and there is no coverage for an hour, the database could set up a grid displaying a 40 mile radius in which the transaction could possible occur. A red flag would be raised if the credit card were used outside this radius.
- the database may also factor in qualitative data, such as whether or not the last coverage occurred at an airport. In this scenario, the database might allow the velocity to be 400 miles an hour.
- the database may know that a certain coordinate has consistent coverage difficulties and may allow transactions based off previous history of the area.
- the parameters may be configured in a variety of ways, including time limits and authorization limits.
- the embodiment may also potentially assist in the capturing of a credit card thief attempting to perpetrate the fraudulent transaction. If the credit card thief is making the fraudulent transaction from a device equipped to provide location information as described above, the location information could pin point where the transaction was initiated, making apprehension easier.
- an access device-present transaction system 100 is provided according to one embodiment of the present invention.
- System 100 is typically configured to use location indicators, alone or in combination with other parameters, to determine whether or not a user may operate on a particular virtual private computer network.
- Access device-present transaction system 100 typically includes an access device 110 configured to access network 120 .
- the access device 110 may be a laptop, PDA, cell phone, or any other type of computing device configured to access a computer network, such as network 120 , which may be the Internet.
- Device 110 typically includes position sensor 110 a , and may be connected to network 120 via a communication link 130 .
- Communication link 130 may be a wireless, radio, optical, USB, or virtually any other link that allows device 110 to communicate with network 120 .
- device 110 Upon establishment of link 130 , device 110 is further configured to communicate with and/or operate on a variety of sub-networks, websites, etc. on network 120 .
- the network 120 typically includes a virtual private network (VPN) 120 a and is configured to allow access device 110 , and similar devices to communicate with, and/or operate on VPN 120 a.
- VPN virtual private network
- VPN 120 a Upon being accessed by device 110 , VPN 120 a is configured to send access and/or position information of device 110 to a VPN access control system 140 . In alternate embodiments, the access and/or position information of device 110 may be provided to VPN access control system 140 directly.
- System 140 is configured to use the access and/or position information received from VPN 120 a and/or information directly from device 110 , along with position information received from position tracking system 180 , discussed below, to determine if device 110 may operate on network 120 a.
- System 100 further includes a position-sensing device 160 having a position sensor 160 b .
- Position-sensing device 160 may be a mobile telephone, watch, jewelry, computing device, global positioning unit, or other device including a position sensor 160 b .
- position-sensing device 160 is otherwise not involved in the access of VPN 120 a by access device 110 .
- the position-sensing device 160 is configured to send position information to a position tracking system 180 .
- the communication link between position tracking system 180 and position-sensing device 160 may be a satellite link such as used in a global positioning satellite system, radio frequency link, optical link such as infrared, or virtually any other communication link suitable for use in position detection.
- Position tracking system 180 is configured to communicate the position information for the position-sensing device 160 to VPN access control system 140 .
- VPN access control system 140 is configured to compare the position of position-sensing device 160 to the location or position of access device 110 . If the locations of the position-sensing device 160 and the access device 110 are different, or alternatively, if the location of the access device 110 is outside of some predetermined acceptable location, then the VPN access system is configured to determine that there is a possibility of an improper use of device 110 , with respect to VPN 120 a.
- the VPN access control system Upon determining the possibility of improper use, the VPN access control system is configured to take a designated action, such as preventing access device 110 from operating on VPN 120 a .
- control system 140 may be further configured to compare this information with that obtained from tracking system 180 and use it to either admit or deny access to access device 110 on VPN 120 a , prior to the establishment of a communication link between the two.
- the access control system may be implemented with conventional computing system with storage medium having programming instructions designed to implement the present invention, and one or more processors to execute the programming instructions.
- a security device-present transaction system 200 is provided according to one embodiment of the present invention.
- System 200 is typically configured to use location indicators, alone or in combination with other parameters, to determine the security clearance for access to a particular secured location.
- Security device-present transaction system 200 typically includes a security device 210 configured to be read by a security device reader 220 .
- Security device 210 may be a card or badge encoded with security information, such as an access code.
- the security device may be a mobile device (such as a mobile telephone) configured to transmit security information to security device reader 220 via an infrared or other communication link.
- the security device may be any other device capable of providing the appropriate security and position information to security device reader 220 .
- security device 210 may include a position sensor 210 a , configured to transmit information about its relative geographical location.
- the security device reader 220 is typically configured to read security device 210 , and to transmit security information received there from, to a security access control system 240 .
- security access control system 240 knows the location of security device reader 220 .
- security reader 220 may include a position sensor 220 a and may be configured to send position information, along with security information, to security access system 240 .
- security device 210 may be a mobile device configured to directly transmit security and/or position information to security access control system 240 via a wireless link.
- Security access control system 240 is further configured to detect the location or position of security device 210 and/or security reader 220 by the position information received from position sensors 210 a , and/or 220 a .
- the security access control system 240 is configured to detect the position of the security device reader (and therefore the position of the security device in a device-present transaction), by resolving a security identifier 220 b using a database of known security identifier locations.
- the security identifier 1234567 may correspond to a gated entrance to a secured building.
- System 200 further includes a position-sensing device 260 having a position sensor 260 b .
- Position-sensing device 260 may be a mobile telephone, watch, jewelry, computing device, global positioning unit, or other device including a position sensor 260 b .
- position-sensing device 260 is otherwise not involved in the transaction entered into between security device 210 and security access control system 240 (via security reader 220 ), or similar transactions.
- the position-sensing device 260 is configured to send position information to a position tracking system 280 .
- the communication link between position tracking system 280 and position-sensing device 260 may be a satellite link such as used in a global positioning satellite system, radio frequency link, optical link such as infrared, or virtually any other communication link suitable for use in position detection.
- Position tracking system 280 is configured to communicate the position information for the position-sensing device 260 to payment processing system 240 .
- security access control system 240 is configured to compare the position of position-sensing device 260 to the location or position of a current transaction involving security device 210 (i.e., the location or position of security device 210 and/or security device reader 220 ). If the locations of the position-sensing device 260 and the security device 210 are different, or alternatively, if the locations of position-sensing device 260 and security reader 220 are different, then the security access control system is configured to determine that there is a possibility of improper use of the security device in the current transaction.
- the system 240 Upon determining the possibility of improper use, the system 240 is configured to take a designated action, such as warning a security attendant and/or by automatically locking an entrance to a secured area.
- the security control system may be implemented with conventional computing system with storage medium having programming instructions designed to implement the present invention, and one or more processors to execute the programming instructions.
- the present invention may be practiced to control access to physical resources or spaces without the employment of separate location sensor device, similar to the embodiment of FIG. 2 as an alternative to the embodiment of FIG. 1 .
- present invention may be employed selectively for only certain high value transactions, usages or accesses. Rules may be pre-established to facilitate identification of the higher value transactions, usages or accesses, and trigger the application of the present invention.
- the present invention may be used to accumulate the locations where the transactions are occurred, and a user may access the accumulated information to create a geographic picture or diary of the transactions conducted over a selected period.
Abstract
Embodiments of the present invention provide for reduction of the likelihood of fraud by having at least one of an identifier of a location from where a request is submitted or information that can lead to identification of the location, submitted with or in addition to a request. Then, determination is made whether to service the request, based at least in part on the location from where the request is submitted or processed. In various embodiments, the location may be compared against predetermined permissible location(s) or a current user location. The request may be a request to conduct a transaction, access data, access a physical or informational resource, or access a secured area.
Description
- The present application is a continuation of and claims priority to U.S. patent application Ser. No. 12/050,752, filed Mar. 18, 2008, entitled “Location Based Fraud Reduction System and Method,” which claims priority to U.S. patent application Ser. No. 10/355,557, filed Jan. 31, 2003, entitled “Location Based Fraud Reduction System and Method,” which claims priority to U.S. Provisional Patent Application No. 60/355,667, filed on Feb. 5, 2002, U.S. Provisional Patent Application No. 60/356,861, filed on Feb. 12, 2002, and U.S. Provisional Patent Application No. 60/361,646, filed on Mar. 4, 2002, the entire disclosures of which are hereby incorporated by reference in their entirety.
- Embodiments of the present invention relate to the field of fraud reduction, and in particular, to a request processing system and method for request to enter a financial transaction, access of physical/informational resources, and access of secured area.
- Credit account fraud costs companies millions of dollars per year. Additionally, companies spend large amounts of time and money trying to reduce credit account fraud. Many transactions involving credit accounts and credit cards occur via the Internet every day. Establishing the identity of the person using a credit card or credit account via the Internet is nearly impossible.
- Currently, in the credit card industry there are several ways to help merchants verify that credit card information is actually coming from the cardholder and not a person trying to commit fraud. Unfortunately, none has proven to be effective all of the time.
- One method is ZIP code verification. This process occurs when either a website prompts a cardholder to enter their billing ZIP code when completing a purchase form or when an operator verbally requests this information during a telephone transaction. When an order is placed, a match or no match is given based on whether or not the accurate ZIP code information was given.
- Another fraud prevention method is additional number verification. Credit card issuers are now including extra digits on cards that are only visible to someone physically holding a card. These numbers usually appear on the front or back of a card. The idea behind this security measure is that only the person holding the card would have access to these numbers. For example, if a thief stole a credit card receipt it could contain the account number and the expiration date, but would not have these extra digits.
- The problem with these verification methods is they are not fool proof in preventing fraud in the case where someone has physically stolen the card, piece of mail, or a company's internal database.
- Similar problems exist for controlling access to usage of physical/informational resources, and access of secured areas.
- Embodiments of the present invention will be readily understood by the following detailed description in conjunction with the accompanying drawings. Embodiments of the invention are illustrated by way of example and not by way of limitation in the figures of the accompanying drawings.
-
FIG. 1 is a schematic view illustrating a payment device present transaction according to one embodiment of the present invention; -
FIG. 2 is a schematic view, according to another embodiment of the present invention, showing a payment device-not-present transaction; -
FIG. 3 is a schematic view illustrating an access device-present transaction according to one embodiment of the present invention; and -
FIG. 4 is a schematic view illustrating a security device-present transaction according to one embodiment of the present invention. - In the following detailed description, reference is made to the accompanying drawings which form a part hereof, and in which are shown by way of illustration embodiments in which the invention may be practiced. It is to be understood that other embodiments may be utilized and structural or logical changes may be made without departing from the scope of the present invention. Therefore, the following detailed description is not to be taken in a limiting sense, and the scope of embodiments in accordance with the present invention is defined by the appended claims and their equivalents.
- Embodiments of the present invention include transaction and access control devices and systems equipped to reduce the likelihood of fraud.
- Parts of the description will be presented in terms, such as payment device, payment device reader, payment processing system, location, transaction, access request, and so forth, consistent with the manner commonly employed by those skilled in the art to convey the substance of their work to others skilled in the art.
- In the following description, various aspects of embodiments of the present invention will be described. However, it will be apparent to those skilled in the art that the embodiments may be practiced with only some or all aspects. For purposes of explanation, specific numbers, materials and configurations are set forth in order to provide a thorough understanding of the embodiments of the present invention. However, it will be apparent to one skilled in the art that the embodiments of the present invention may be practiced without the specific details. In other instances, well-known features are omitted or simplified in order not to obscure the embodiments of the present invention.
- Various operations will be described as multiple discrete steps in turn, in a manner that is most helpful in understanding the embodiments of the present invention, however, the order of description should not be construed as to imply that these operations are necessarily order dependent. In particular, these operations need not be performed in the order of presentation.
- The phrase “in one embodiment” is used repeatedly. The phrase generally does not refer to the same embodiment, however, it may.
- The terms “comprising”, “having” and “including” are synonymous, unless the context dictates otherwise.
- As shown in
FIG. 1 , a payment device-present transaction system 10 is provided according to one embodiment of the present invention. Payment device-present transaction system 10 typically includes apayment device 11 configured to be read by apayment device reader 12. An example of apayment device 11 is a credit or debit card, but may alternatively be a mobile commerce device (such as an mobile commerce enabled mobile telephone) configured to transmit payment information to credit device reader via an infrared or other communication link. In one embodiment,payment device 11 may include aposition sensor 11 a, as well aspayment information 11 b. - The term “mobile telephone” as used herein (in the specification and in the claims) refers to the class of telephone devices equipped to enable a user to make and receive calls wirelessly, notwithstanding the user's movement, as long as the user is within the communication reach of a service or base station of a wireless network service provider. Unless specifically excluded, the term “mobile telephone” is to include the analog subclass as well as the digital subclass (of all signaling protocols).
- The
payment device reader 12 typically includes a position sensor 12 a and merchant related information, such as a merchant identifier, 12 b. Typically,payment device reader 12 is configured to send payer and payment information, merchant information (such as merchant identifier), and/or position information to apayment processing system 14, to request an amount to be charged against the account of payer for the transaction. - Alternatively,
payment device 11 may be a mobile commerce device configured to directly transmit payer, payment, payee, and/or position information topayment processing system 14, to request an amount to be charged against the account of payer for the transaction. - Further, in alternate embodiment, in lieu of an identifier of the location of the transaction, i.e. the location from where the request is submitted, information leading to the identifying of the location, e.g. name and branch of the merchant, may be sent instead. The payer information etc. may be sent as part of the request or after an initial request for the transaction.
-
Payment processing system 14 is configured to determine the location or position of the payment device and/or payment device reader by the position information received fromposition sensor 11 a or 12 a. In one embodiment,payment processing system 14 is implemented with a conventional computing system having storage medium having stored therein programming instructions implementing the teachings of the present invention, and one or more processor to execute the programming instructions. - Alternatively, the
payment processing system 14 is configured to detect the position of the payment device reader (and therefore, the position of the payment device in a payment device-present transaction), by resolving merchant information (such as the merchant identifier) using a database of known merchant locations. For example, a merchant having the merchant identifier 1234567 may correspond to a convenience mart on the corner of 5th and Vine streets in a particular town. - For the illustrated embodiment,
system 10 further includes a position-sensing device 16 having aposition sensor 16 b. Position-sensing device 16 may be a mobile telephone, watch, jewelry, computing device, global positioning unit, or other device including aposition sensor 16 b. Typically, except for its novel employment to prevent fraud under the present invention, position-sensing device 16 is otherwise not involved in payment related to the transaction entered into bypayment device 11. - The position-
sensing device 16 is configured to send position information to aposition tracking system 18. The communication link betweenposition tracking system 18 and position-sensingdevice 16 may be a satellite link such as used in a global positioning satellite system, radio frequency link, optical link such as infrared, or virtually any other communication link suitable for use in position detection. -
Position tracking system 18 is configured to communicate the position information for the position-sensingdevice 16 topayment processing system 14. To detect a fraudulent use ofpayment device 11,payment processing system 14 is configured to compare the position of position-sensingdevice 16 to the location or position of a current transaction involving payment device 11 (i.e., the location or position ofpayment device 11 and/or payment device reader 12). - If the locations of the position-sensing
device 16 and thepayment device 11 are different, or alternatively, if the locations of the position-sensingdevice 16 and thepayment device reader 12 are different, then the payment processing system is configured to determine that there is a possibility of fraud in the current transaction. Upon determining the possibility of fraud, the payment processing system is configured to take a designated action, such as preventing the completion of the transaction. - In embodiments, the requirement of the possession of the payment device and the position sensing device may be referred to as “double custody” fraud prevention or reduction.
- The above embodiment is especially useful for face to face transactions. A cardholder may carry a device that has a built-in position locator within it. The device may be a cell phone, watch, jewelry, wallet, or any other item that a locator could be placed in and that a person would normally carry. The device may even change from day to day. For example, some people currently have three cell phones from various companies and each has a unique feature. One may be extremely compact, one may be large, but can send and receive emails, and the third may have a long battery life. In an embodiment, depending on the needs for a particular day, a person may choose to use one of the three phones and may place a location device in or on that phone. In an embodiment, there may be three phones, but maybe only one location device.
- The location device may e.g. be a watch. The location device may be integrated with or removably associated with the watch. The cardholder would inform the credit card company ahead of time, as to the identification number/model of the location device. Once this information is given, the information may be entered into the database, and the system is primed to prevent fraudulent use of a credit card.
- The cardholder may turn the watch's tracking device on or off at their leisure, as you can with a cell phone. When the watch's tracking device is on, the database would contain the current location, such as, the coordinates, of the watch (during a transaction).
- When the cardholder decides to make a purchase e.g. at the Portland airport (PDX), the cardholder may turn the tracking device on and the database would be provided with the location information of the watch and its owner.
- The merchant's machine may send out information about the transaction to the processing company, including the merchant's location. In this case, the location is PDX. The processing system may access the database to verify the merchant's location against the watch's location and registers that the watch is also at PDX and gives a match to permit the transaction to be completed.
- Similarly, the above embodiment may be applied to wireless portable Point-Of-Sale (POS) terminals. Individuals may be provided with their own personal portable terminals equipped to provide location information. The merchant's POS terminal may also be portable, and therefore may be relocated and used in a weekly or monthly specialty, fruit or produce market. In like manner, transactions conducted under this “transient” market environment may also be accorded the added fraud prevention as earlier described.
- The location information obtained may be used for other purposes besides fraud prevention. Cardholders may access online statements that create a picture of their transaction history. When a cardholder clicks on a particular transaction on their bill, they may have the option to look at a map or satellite overlay of the city and view where the transaction took place. A customer may create a trip diary based off purchases in a set period of time.
- It is also believed this system, in some parts, may be used for tracking corporate card user movements.
-
FIG. 2 shows a payment-device-not-present transaction system 20 according to another embodiment of the present invention. Payment-device-not-present transaction system 20 typically includes adevice 21 that is capable of transmitting position information to apayment processing system 24. Typically,device 21 is a mobile telephone or a computing device configured to detect its position as well as to enter into payment transactions using on-board payment information. Payment-device-not-present transaction system 20 typically is configured to enable a user to enter into transaction, such as making a purchase by mobile telephone, or by a computing device (PDA, laptop, desktop, web-enabled mobile telephone, etc.) over a computer network, or in another manner in which the user is not required to present a payment device, such as a credit card at the point of sale. -
Device 21 may include an interface configured to be used to input transaction data for a transaction, such as a purchase, to be entered into by the user. This transaction data may include payer information, items to be purchased, payment information etc.Device 21 may also include aposition sensor 22 configured to detect a position of the device and send this position information topayment processing system 24 via a wireless or a wireline communication link. Thus,device 21 is typically configured to send substantially simultaneously the transaction data and position information topayment processing system 24.Payment processing system 24 includes an associated database of permissible and/or impermissible use areas for a particular user'sdevice 21. -
Payment processing system 24 is configured to check position information of thedevice 21 against the permissible and/or impermissible use areas for each user, and thereby determine if the device is being used in an impermissible use area for the user. If so, thesystem 24 is configured to indicate that a possibility of fraud exists in the pending transaction. If the possibility of fraud is detected, the system may be configured to take an action, such as preventing fulfillment of the transaction due to the possibility of fraud. - The payment processing system may be implemented with conventional computing system with storage medium having programming instructions designed to implement the present invention, and one or more processors to execute the programming instructions.
- The above embodiment is particularly useful in preventing fraud in e-commerce transactions over a public network, such as the Internet. Typically, when a cardholder orders a product or service via the Internet or telephone, there is no good way to know, in real-time, where that person and credit card are. A thief in Baltimore could be using an Oregonian's card information.
- Under the present invention, when a cardholder is issued a card, the cardholder may be asked to give the geographic location of their home and office, as well as any other locations that the cardholder frequently place on-line orders and use the credit card. This information may be obtained during the application process or on an ongoing basis. The information may be entered into a database.
- Thus, when an on-line order is placed through a device equipped to also sense and provide current location information to the order processing system, the order processing system may check the database for whether the transaction is being conducted from a permissible location. If the transaction is not being conducted from a permissible location, the transaction may be rejected. Additionally, a warning in the form of a message and/or a call may be provided to the cardholder.
- GPS, cell phones, and other wireless devices may not work in all places, all of the time. Communication errors may often occur inside basements or underneath a canopy, etc. The FCC also must allow for interference. Black outs are becoming less of an issue over time as more towers are built and satellites are deployed, however, in some form or another, this will always be an issue.
- The solution may be a smart database that tracks the velocity of the double custody device. For example, if the device is heading south at a velocity of 40 miles per hour and there is no coverage for an hour, the database could set up a grid displaying a 40 mile radius in which the transaction could possible occur. A red flag would be raised if the credit card were used outside this radius. The database may also factor in qualitative data, such as whether or not the last coverage occurred at an airport. In this scenario, the database might allow the velocity to be 400 miles an hour. The database may know that a certain coordinate has consistent coverage difficulties and may allow transactions based off previous history of the area. The parameters may be configured in a variety of ways, including time limits and authorization limits.
- The embodiment may also potentially assist in the capturing of a credit card thief attempting to perpetrate the fraudulent transaction. If the credit card thief is making the fraudulent transaction from a device equipped to provide location information as described above, the location information could pin point where the transaction was initiated, making apprehension easier.
- As shown in
FIG. 3 , an access device-present transaction system 100 is provided according to one embodiment of the present invention.System 100 is typically configured to use location indicators, alone or in combination with other parameters, to determine whether or not a user may operate on a particular virtual private computer network. Access device-present transaction system 100 typically includes anaccess device 110 configured to accessnetwork 120. Theaccess device 110 may be a laptop, PDA, cell phone, or any other type of computing device configured to access a computer network, such asnetwork 120, which may be the Internet. -
Device 110 typically includesposition sensor 110 a, and may be connected to network 120 via acommunication link 130.Communication link 130 may be a wireless, radio, optical, USB, or virtually any other link that allowsdevice 110 to communicate withnetwork 120. - Upon establishment of
link 130,device 110 is further configured to communicate with and/or operate on a variety of sub-networks, websites, etc. onnetwork 120. - The
network 120 typically includes a virtual private network (VPN) 120 a and is configured to allowaccess device 110, and similar devices to communicate with, and/or operate onVPN 120 a. - Upon being accessed by
device 110,VPN 120 a is configured to send access and/or position information ofdevice 110 to a VPNaccess control system 140. In alternate embodiments, the access and/or position information ofdevice 110 may be provided to VPNaccess control system 140 directly. -
System 140 is configured to use the access and/or position information received fromVPN 120 a and/or information directly fromdevice 110, along with position information received fromposition tracking system 180, discussed below, to determine ifdevice 110 may operate onnetwork 120 a. -
System 100 further includes a position-sensingdevice 160 having aposition sensor 160 b. Position-sensing device 160 may be a mobile telephone, watch, jewelry, computing device, global positioning unit, or other device including aposition sensor 160 b. Typically, except to facilitateaccess device 110 in gaining access toVPN 120 a, position-sensingdevice 160 is otherwise not involved in the access ofVPN 120 a byaccess device 110. - The position-sensing
device 160 is configured to send position information to aposition tracking system 180. The communication link betweenposition tracking system 180 and position-sensingdevice 160 may be a satellite link such as used in a global positioning satellite system, radio frequency link, optical link such as infrared, or virtually any other communication link suitable for use in position detection.Position tracking system 180 is configured to communicate the position information for the position-sensingdevice 160 to VPNaccess control system 140. - To allow a user of
access device 110 to operate onVPN 120 a, VPNaccess control system 140 is configured to compare the position of position-sensingdevice 160 to the location or position ofaccess device 110. If the locations of the position-sensingdevice 160 and theaccess device 110 are different, or alternatively, if the location of theaccess device 110 is outside of some predetermined acceptable location, then the VPN access system is configured to determine that there is a possibility of an improper use ofdevice 110, with respect toVPN 120 a. - Upon determining the possibility of improper use, the VPN access control system is configured to take a designated action, such as preventing
access device 110 from operating onVPN 120 a. In instances where position information is obtained directly fromaccess device 110,control system 140 may be further configured to compare this information with that obtained from trackingsystem 180 and use it to either admit or deny access toaccess device 110 onVPN 120 a, prior to the establishment of a communication link between the two. - The access control system may be implemented with conventional computing system with storage medium having programming instructions designed to implement the present invention, and one or more processors to execute the programming instructions.
- As shown in
FIG. 4 , a security device-present transaction system 200 is provided according to one embodiment of the present invention.System 200 is typically configured to use location indicators, alone or in combination with other parameters, to determine the security clearance for access to a particular secured location. Security device-present transaction system 200 typically includes asecurity device 210 configured to be read by asecurity device reader 220.Security device 210 may be a card or badge encoded with security information, such as an access code. - Alternatively, the security device may be a mobile device (such as a mobile telephone) configured to transmit security information to
security device reader 220 via an infrared or other communication link. Further, the security device may be any other device capable of providing the appropriate security and position information tosecurity device reader 220. In particular,security device 210 may include aposition sensor 210 a, configured to transmit information about its relative geographical location. - The
security device reader 220 is typically configured to readsecurity device 210, and to transmit security information received there from, to a securityaccess control system 240. Typically, securityaccess control system 240 knows the location ofsecurity device reader 220. Alternatively,security reader 220 may include aposition sensor 220 a and may be configured to send position information, along with security information, tosecurity access system 240. Alternatively,security device 210 may be a mobile device configured to directly transmit security and/or position information to securityaccess control system 240 via a wireless link. - Security
access control system 240 is further configured to detect the location or position ofsecurity device 210 and/orsecurity reader 220 by the position information received fromposition sensors 210 a, and/or 220 a. Alternatively, the securityaccess control system 240 is configured to detect the position of the security device reader (and therefore the position of the security device in a device-present transaction), by resolving asecurity identifier 220 b using a database of known security identifier locations. For example, the security identifier 1234567 may correspond to a gated entrance to a secured building. -
System 200 further includes a position-sensingdevice 260 having aposition sensor 260 b. Position-sensing device 260 may be a mobile telephone, watch, jewelry, computing device, global positioning unit, or other device including aposition sensor 260 b. Typically, except for facilitating validation of theusage security device 210, position-sensingdevice 260 is otherwise not involved in the transaction entered into betweensecurity device 210 and security access control system 240 (via security reader 220), or similar transactions. - The position-sensing
device 260 is configured to send position information to aposition tracking system 280. The communication link betweenposition tracking system 280 and position-sensingdevice 260 may be a satellite link such as used in a global positioning satellite system, radio frequency link, optical link such as infrared, or virtually any other communication link suitable for use in position detection.Position tracking system 280 is configured to communicate the position information for the position-sensingdevice 260 topayment processing system 240. - In order to detect an improper use of
security device 210, securityaccess control system 240 is configured to compare the position of position-sensingdevice 260 to the location or position of a current transaction involving security device 210 (i.e., the location or position ofsecurity device 210 and/or security device reader 220). If the locations of the position-sensingdevice 260 and thesecurity device 210 are different, or alternatively, if the locations of position-sensingdevice 260 andsecurity reader 220 are different, then the security access control system is configured to determine that there is a possibility of improper use of the security device in the current transaction. - Upon determining the possibility of improper use, the
system 240 is configured to take a designated action, such as warning a security attendant and/or by automatically locking an entrance to a secured area. - The security control system may be implemented with conventional computing system with storage medium having programming instructions designed to implement the present invention, and one or more processors to execute the programming instructions.
- Thus, it can be seen from the above descriptions, various novel location based method and apparatus for fraud prevention or reduction, including “double custody” methods, have been described.
- While the present invention has been described in terms of the foregoing embodiments, those skilled in the art will recognize that the invention is not limited to the embodiments described. The present invention can be practiced with modification and alteration within the spirit and scope of the appended claims.
- In particular, the present invention may be practiced to control access to physical resources or spaces without the employment of separate location sensor device, similar to the embodiment of
FIG. 2 as an alternative to the embodiment ofFIG. 1 . - Further, the present invention may be employed selectively for only certain high value transactions, usages or accesses. Rules may be pre-established to facilitate identification of the higher value transactions, usages or accesses, and trigger the application of the present invention.
- Yet further, the present invention may be used to accumulate the locations where the transactions are occurred, and a user may access the accumulated information to create a geographic picture or diary of the transactions conducted over a selected period.
- Thus, the description is to be regarded as illustrative instead of restrictive on the present invention.
Claims (25)
1-20. (canceled)
21. A method for detecting fraud in a transaction, the method comprising:
receiving by a request processor a request for a first entity to conduct a transaction with a second entity, wherein the first entity and the second entity are not present in the same location;
detecting by the request processor a position of a payment device to be used by the first entity to conduct the transaction;
determining by the request processor whether the position corresponds to a permissible or impermissible use area for the first entity to conduct the transaction; and
permitting by the request processor the transaction to continue if it is determined that the position corresponds to a permissible use area.
22. The method of claim 21 , further comprising flagging the request as potentially fraudulent if it is determined that the position does not correspond to a permissible use area.
23. The method of claim 21 , further comprising denying the request if it is determined that the position corresponds to an impermissible use area.
24. The method of claim 21 , wherein detecting by the request processor a position of a payment device to be used by the first entity to conduct the transaction comprises receiving position information wirelessly from the payment device.
25. The method of claim 24 , further comprising receiving by the request processor transaction information from the payment device.
26. The method of claim 21 , wherein determining by the request processor whether the position corresponds to a permissible or impermissible use area to conduct the transaction comprises comparing by the request processor the detected position of the payment device to a permissible and/or impermissible use area stored in a database accessible by the request processor.
27. The method of claim 21 , wherein the payment device is a computing device, a mobile commerce device, a mobile telephone, or a point of sale terminal.
28. A request processing method with reduced likelihood of fraud, comprising a request processor:
receiving a request submitted via a device to conduct a transaction, access data, access a physical or informational resource, or access a secured area;
receiving from the device a location identifier indicating a location where the request is submitted or information that can lead to identification of the location where the request is submitted;
determining whether the location corresponds to a permissible or impermissible use area for the first entity to conduct the transaction, access the data, access the physical or informational resource, or access the secured area; and
determining whether to service the request based at least in part on the received location identifier or information and if it is determined that the location corresponds to a permissible use area.
29. A request processing method with reduced likelihood of fraud, comprising a request processor:
receiving from a device a first location identifier indicating a first location of the device at a first time;
receiving at a second time a request submitted via the device to conduct a transaction, access data, access a physical or informational resource, or access a secured area;
receiving from the device at the second time a second location identifier indicating a second location of the device at the second time; and
determining whether to service the request based at least in part on whether the second location is permissible based on the device being present at the first location at the first time and being present at the second location at the second time.
30. The method of claim 29 , wherein the payment device is a computing device, a mobile commerce device, or a mobile telephone.
31. The method of claim 29 , further comprising receiving from the device velocity information indicating a velocity of the device at the first time.
32. The method of claim 31 , wherein determining whether to service the request is further based on the indicated velocity.
33. The method of claim 29 , wherein determining whether to service the request is further based on a determined velocity of the device.
34. The method of claim 29 , wherein determining whether to service the request is further based on one or more qualitative data.
35. The method of claim 29 , wherein determining whether to service the request is further based on one or more established time limits.
36. The method of claim 29 , wherein determining whether to service the request is further based on one or more established authorization limits.
37. A request processing method with reduced likelihood of fraud, comprising a request processor:
receiving from a position sensing device a first location identifier indicating a first location of the position sensing device at a first time;
receiving at a second time a request to conduct a transaction, access data, access a physical or informational resource, or access a secured area via another device associated with the position sensing device;
receiving from the position sensing device at the second time a second location identifier indicating a second location of the position sensing device at the second time; and
determining whether to service the request based at least in part on whether the second location is permissible based on the position sensing device being present at the first location at the first time and being present at the second location at the second time.
38. The method of claim 37 , wherein the another device is a credit card, a computing device, a mobile commerce device, or a mobile telephone.
39. The method of claim 37 , further comprising receiving from the position sensing device velocity information indicating a velocity of the position sensing device at the first time.
40. The method of claim 39 , wherein determining whether to service the request is further based on the indicated velocity.
41. The method of claim 37 , wherein determining whether to service the request is further based on a determined velocity of the position sensing device.
42. The method of claim 37 , wherein determining whether to service the request is further based on one or more qualitative data.
43. The method of claim 37 , wherein determining whether to service the request is further based on one or more established time limits.
44. The method of claim 37 , wherein determining whether to service the request is further based on one or more established authorization limits.
Priority Applications (25)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US12/707,228 US20100145868A1 (en) | 2002-02-05 | 2010-02-17 | Location based fraud reduction system and method |
US13/179,836 US20120005039A1 (en) | 2002-02-05 | 2011-07-11 | Method of conducting financial transactions |
US13/179,832 US20120005096A1 (en) | 2002-02-05 | 2011-07-11 | Method of conducting financial transactions |
US13/192,147 US8615445B2 (en) | 2002-02-05 | 2011-07-27 | Method for conducting financial transactions |
US13/298,525 US9582795B2 (en) | 2002-02-05 | 2011-11-17 | Methods of transmitting information from efficient encryption card readers to mobile devices |
US13/298,564 US9916581B2 (en) | 2002-02-05 | 2011-11-17 | Back end of payment system associated with financial transactions using card readers coupled to mobile devices |
US13/298,506 US9495676B2 (en) | 2002-02-05 | 2011-11-17 | Method of transmitting information from a power efficient card to a mobile device |
US13/298,545 US20120126014A1 (en) | 2002-02-05 | 2011-11-17 | Card reader with offset read head |
US13/298,540 US9324100B2 (en) | 2002-02-05 | 2011-11-17 | Card reader with asymmetric spring |
US13/298,560 US20120126007A1 (en) | 2002-02-05 | 2011-11-17 | Card reader with communication protocol |
US13/298,520 US20120126013A1 (en) | 2002-02-05 | 2011-11-17 | Method for transmitting information from a card reader to a mobile device with the card reader having read head offset from a center of an associated housing |
US13/298,511 US20120118960A1 (en) | 2002-02-05 | 2011-11-17 | Method of transmitting information from a small card reader to a mobile device |
US13/298,510 US9262757B2 (en) | 2002-02-05 | 2011-11-17 | Method of transmitting information from a card reader with a power supply and wake-up circuit to a mobile device |
US13/298,557 US20120126006A1 (en) | 2002-02-05 | 2011-11-17 | Card reader with efficient encryption |
US13/298,487 US9262777B2 (en) | 2002-02-05 | 2011-11-17 | Card reader with power efficient architecture that includes a wake-up circuit |
US13/298,534 US9286635B2 (en) | 2002-02-05 | 2011-11-17 | Method of transmitting information from efficient communication protocol card readers to mobile devices |
US13/298,514 US20120138683A1 (en) | 2002-02-05 | 2011-11-17 | Method of transmitting information from a card reader with an asymmetric spring to a mobile device |
US13/298,484 US20120126010A1 (en) | 2002-02-05 | 2011-11-17 | Cost effective card reader configured to be coupled to a mobile device |
US13/298,491 US9224142B2 (en) | 2002-02-05 | 2011-11-17 | Card reader with power efficient architecture that includes a power supply and a wake up circuit |
US13/298,501 US9305314B2 (en) | 2002-02-05 | 2011-11-17 | Methods of transmitting information to mobile devices using cost effective card readers |
US13/298,496 US9495675B2 (en) | 2002-02-05 | 2011-11-17 | Small card reader configured to be coupled to a mobile device |
US14/942,515 US9449203B2 (en) | 2002-02-05 | 2015-11-16 | Card reader with power efficient architecture that includes a power supply and a wake-up circuit |
US15/013,964 US9858603B2 (en) | 2002-02-05 | 2016-02-02 | Card reader with power efficient architecture that includes a wake-up circuit |
US15/066,496 US10007813B2 (en) | 2002-02-05 | 2016-03-10 | Card reader with passive ID circuit |
US15/252,033 US10140481B2 (en) | 2002-02-05 | 2016-08-30 | Card reader with power efficient architecture that includes a power supply and a wake-up circuit |
Applications Claiming Priority (6)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US35566702P | 2002-02-05 | 2002-02-05 | |
US35686102P | 2002-02-12 | 2002-02-12 | |
US36164602P | 2002-03-04 | 2002-03-04 | |
US10/355,557 US7376431B2 (en) | 2002-02-05 | 2003-01-31 | Location based fraud reduction system and method |
US12/050,752 US7684809B2 (en) | 2002-02-05 | 2008-03-18 | Location based fraud reduction system and method |
US12/707,228 US20100145868A1 (en) | 2002-02-05 | 2010-02-17 | Location based fraud reduction system and method |
Related Parent Applications (2)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US12/050,752 Continuation US7684809B2 (en) | 2002-02-05 | 2008-03-18 | Location based fraud reduction system and method |
US12/903,753 Continuation-In-Part US20110084139A1 (en) | 2002-02-05 | 2010-10-13 | Systems and methods for financial transaction through miniaturized card reader |
Related Child Applications (2)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US13/043,270 Continuation-In-Part US8235287B2 (en) | 2002-02-05 | 2011-03-08 | Read head device with slot configured to reduce torque |
US13/179,836 Continuation-In-Part US20120005039A1 (en) | 2002-02-05 | 2011-07-11 | Method of conducting financial transactions |
Publications (1)
Publication Number | Publication Date |
---|---|
US20100145868A1 true US20100145868A1 (en) | 2010-06-10 |
Family
ID=27792292
Family Applications (3)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US10/355,557 Active 2025-07-15 US7376431B2 (en) | 2002-02-05 | 2003-01-31 | Location based fraud reduction system and method |
US12/050,752 Expired - Lifetime US7684809B2 (en) | 2002-02-05 | 2008-03-18 | Location based fraud reduction system and method |
US12/707,228 Abandoned US20100145868A1 (en) | 2002-02-05 | 2010-02-17 | Location based fraud reduction system and method |
Family Applications Before (2)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US10/355,557 Active 2025-07-15 US7376431B2 (en) | 2002-02-05 | 2003-01-31 | Location based fraud reduction system and method |
US12/050,752 Expired - Lifetime US7684809B2 (en) | 2002-02-05 | 2008-03-18 | Location based fraud reduction system and method |
Country Status (1)
Country | Link |
---|---|
US (3) | US7376431B2 (en) |
Cited By (16)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20110258117A1 (en) * | 2010-04-14 | 2011-10-20 | Dfs Services Llc | Modification of payment transactions in real-time based upon external data source |
CN102521936A (en) * | 2011-12-20 | 2012-06-27 | 福建联迪商用设备有限公司 | Method for avoiding non-local cashing through point of sale (POS) |
WO2014149804A1 (en) * | 2013-03-15 | 2014-09-25 | Mcafee, Inc. | System and method to reduce misuse of a financial instrument at a point-of-sale location |
US9436955B2 (en) | 2009-06-10 | 2016-09-06 | Square, Inc. | Methods for transferring funds using a payment service where financial account information is only entered once with a payment service and need not be re-entered for future transfers |
US9454866B2 (en) | 2010-10-13 | 2016-09-27 | Square, Inc. | Method of conducting financial transactions where a payer's financial account information is entered only once with a payment system |
US9619797B2 (en) | 2010-10-13 | 2017-04-11 | Square, Inc. | Payment methods with a payment service and tabs selected by a first party and opened by a second party at an geographic location of the first party's mobile device |
CN106898069A (en) * | 2017-02-24 | 2017-06-27 | 广东林盟科技有限公司 | Gate control system |
US10332162B1 (en) | 2013-09-30 | 2019-06-25 | Square, Inc. | Using wireless beacons for transit systems |
US10373151B1 (en) | 2012-11-20 | 2019-08-06 | Square, Inc. | Multiple merchants in cardless payment transactions and multiple customers in cardless payment transactions |
US10560808B2 (en) | 2013-07-23 | 2020-02-11 | Square, Inc. | Computing distances of devices |
US10783531B2 (en) | 2012-03-16 | 2020-09-22 | Square, Inc. | Cardless payment transactions based on geographic locations of user devices |
US10885522B1 (en) | 2013-02-08 | 2021-01-05 | Square, Inc. | Updating merchant location for cardless payment transactions |
US11449850B2 (en) | 2009-01-28 | 2022-09-20 | Validsoft Limited | Card false-positive prevention |
US11449854B1 (en) | 2012-10-29 | 2022-09-20 | Block, Inc. | Establishing consent for cardless transactions using short-range transmission |
US11538063B2 (en) | 2018-09-12 | 2022-12-27 | Samsung Electronics Co., Ltd. | Online fraud prevention and detection based on distributed system |
US11587146B1 (en) | 2013-11-13 | 2023-02-21 | Block, Inc. | Wireless beacon shopping experience |
Families Citing this family (208)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6104802A (en) | 1997-02-10 | 2000-08-15 | Genesys Telecommunications Laboratories, Inc. | In-band signaling for routing |
US6480600B1 (en) | 1997-02-10 | 2002-11-12 | Genesys Telecommunications Laboratories, Inc. | Call and data correspondence in a call-in center employing virtual restructuring for computer telephony integrated functionality |
US7031442B1 (en) | 1997-02-10 | 2006-04-18 | Genesys Telecommunications Laboratories, Inc. | Methods and apparatus for personal routing in computer-simulated telephony |
US6985943B2 (en) | 1998-09-11 | 2006-01-10 | Genesys Telecommunications Laboratories, Inc. | Method and apparatus for extended management of state and interaction of a remote knowledge worker from a contact center |
US6711611B2 (en) | 1998-09-11 | 2004-03-23 | Genesis Telecommunications Laboratories, Inc. | Method and apparatus for data-linking a mobile knowledge worker to home communication-center infrastructure |
USRE46528E1 (en) | 1997-11-14 | 2017-08-29 | Genesys Telecommunications Laboratories, Inc. | Implementation of call-center outbound dialing capability at a telephony network level |
US7907598B2 (en) | 1998-02-17 | 2011-03-15 | Genesys Telecommunication Laboratories, Inc. | Method for implementing and executing communication center routing strategies represented in extensible markup language |
US6332154B2 (en) | 1998-09-11 | 2001-12-18 | Genesys Telecommunications Laboratories, Inc. | Method and apparatus for providing media-independent self-help modules within a multimedia communication-center customer interface |
USRE46153E1 (en) | 1998-09-11 | 2016-09-20 | Genesys Telecommunications Laboratories, Inc. | Method and apparatus enabling voice-based management of state and interaction of a remote knowledge worker in a contact center environment |
US8706630B2 (en) | 1999-08-19 | 2014-04-22 | E2Interactive, Inc. | System and method for securely authorizing and distributing stored-value card data |
US7929978B2 (en) * | 1999-12-01 | 2011-04-19 | Genesys Telecommunications Laboratories, Inc. | Method and apparatus for providing enhanced communication capability for mobile devices on a virtual private network |
US7110773B1 (en) | 2000-04-11 | 2006-09-19 | Telecommunication Systems, Inc. | Mobile activity status tracker |
AU2002336770A1 (en) | 2001-09-24 | 2003-04-07 | E2Interactive, Inc. D/B/A E2Interactive, Inc. | System and method for supplying communication service |
US20030119528A1 (en) * | 2001-12-26 | 2003-06-26 | Boathouse Communication Partners, Llc | System and method for an automated intermediary to broker remote transaction between parties based on actively managed private profile information |
US7376431B2 (en) * | 2002-02-05 | 2008-05-20 | Niedermeyer Brian J | Location based fraud reduction system and method |
US11257094B2 (en) | 2002-10-23 | 2022-02-22 | Catalina Marketing Corporation | System and method of a media delivery services platform for targeting consumers in real time |
US9811836B2 (en) | 2002-10-23 | 2017-11-07 | Modiv Media, Inc | System and method of a media delivery services platform for targeting consumers in real time |
US10430798B2 (en) | 2002-10-23 | 2019-10-01 | Matthew Volpi | System and method of a media delivery services platform for targeting consumers in real time |
US8626130B2 (en) * | 2005-08-23 | 2014-01-07 | Modiv Media, Inc. | System and method for user controlled log-in; interacting and log-out |
US10657561B1 (en) | 2008-08-20 | 2020-05-19 | Modiv Media, Inc. | Zone tracking system and method |
US8783561B2 (en) | 2006-07-14 | 2014-07-22 | Modiv Media, Inc. | System and method for administering a loyalty program and processing payments |
US7740168B2 (en) | 2003-08-18 | 2010-06-22 | Visa U.S.A. Inc. | Method and system for generating a dynamic verification value |
US7761374B2 (en) | 2003-08-18 | 2010-07-20 | Visa International Service Association | Method and system for generating a dynamic verification value |
WO2005029044A1 (en) * | 2003-09-22 | 2005-03-31 | Tekran Instruments Corporation | Conditioning system and method for use in the measurement of mercury in gaseous emissions |
US20050071417A1 (en) * | 2003-09-29 | 2005-03-31 | Jeffrey Taylor | Method and apparatus for geolocation of a network user |
US8655309B2 (en) | 2003-11-14 | 2014-02-18 | E2Interactive, Inc. | Systems and methods for electronic device point-of-sale activation |
US6948656B2 (en) * | 2003-12-23 | 2005-09-27 | First Data Corporation | System with GPS to manage risk of financial transactions |
US20050149443A1 (en) * | 2004-01-05 | 2005-07-07 | Marko Torvinen | Method and system for conditional acceptance to a group |
US8272032B2 (en) * | 2004-11-10 | 2012-09-18 | Mlb Advanced Media, L.P. | Multiple user login detection and response system |
US20060217880A1 (en) * | 2005-03-22 | 2006-09-28 | Jung Edward K | Map-based guide system and method |
US7221949B2 (en) * | 2005-02-28 | 2007-05-22 | Research In Motion Limited | Method and system for enhanced security using location-based wireless authentication |
US7258268B2 (en) | 2005-02-28 | 2007-08-21 | Moneygram International, Inc. | Method and apparatus for money transfer |
US7472822B2 (en) | 2005-03-23 | 2009-01-06 | E2Interactive, Inc. | Delivery of value identifiers using short message service (SMS) |
US8656458B2 (en) * | 2005-08-25 | 2014-02-18 | Guy Heffez | Method and system for authenticating internet user identity |
US9727867B2 (en) | 2005-04-26 | 2017-08-08 | Guy Hefetz | Method for detecting misuse of identity in electronic transactions |
US11308477B2 (en) | 2005-04-26 | 2022-04-19 | Spriv Llc | Method of reducing fraud in on-line transactions |
US10645072B2 (en) | 2005-04-26 | 2020-05-05 | Spriv Llc | Method and system for validating transactions |
US8640197B2 (en) * | 2005-04-26 | 2014-01-28 | Guy Heffez | Methods for acquiring an internet user's consent to be located and for authenticating the identity of the user using location information |
US10521786B2 (en) | 2005-04-26 | 2019-12-31 | Spriv Llc | Method of reducing fraud in on-line transactions |
DE102005021129A1 (en) * | 2005-05-06 | 2006-11-09 | Robert Bosch Gmbh | Data e.g. bank transaction data, transmitting method, involves connecting data source to locating unit, and assigning useful data in supplementary data, where supplementary data is transmitted to sink together with useful data |
US8285639B2 (en) * | 2005-07-05 | 2012-10-09 | mConfirm, Ltd. | Location based authentication system |
US11818287B2 (en) | 2017-10-19 | 2023-11-14 | Spriv Llc | Method and system for monitoring and validating electronic transactions |
FR2895122B1 (en) * | 2005-12-16 | 2008-02-01 | Sagem Defense Securite | METHOD OF SECURING PHYSICAL ACCESS AND PROVIDING ACCESS TO THE PROCESS |
US9008075B2 (en) | 2005-12-22 | 2015-04-14 | Genesys Telecommunications Laboratories, Inc. | System and methods for improving interaction routing performance |
US7818264B2 (en) | 2006-06-19 | 2010-10-19 | Visa U.S.A. Inc. | Track data encryption |
US9065643B2 (en) | 2006-04-05 | 2015-06-23 | Visa U.S.A. Inc. | System and method for account identifier obfuscation |
US8463284B2 (en) | 2006-07-17 | 2013-06-11 | Telecommunication Systems, Inc. | Short messaging system (SMS) proxy communications to enable location based services in wireless devices |
US20080035725A1 (en) * | 2006-08-11 | 2008-02-14 | International Business Machines Corporation | Method to use cell phone location to authenticate or enable/disable authorization of credit cards |
FR2905022B1 (en) * | 2006-08-17 | 2009-12-25 | Ingenico Sa | ELECTRONIC PAYMENT TERMINAL AND METHOD FOR PROVIDING ELECTRONIC PAYMENT TERMINALS |
US20080147546A1 (en) * | 2006-09-19 | 2008-06-19 | Walter Weichselbaumer | Wireless device electronic wallet transaction validation |
US8099105B2 (en) | 2006-09-19 | 2012-01-17 | Telecommunication Systems, Inc. | Device based trigger for location push event |
US9408046B2 (en) | 2006-10-03 | 2016-08-02 | Telecommunication Systems, Inc. | 911 data messaging |
US7657497B2 (en) | 2006-11-07 | 2010-02-02 | Ebay Inc. | Online fraud prevention using genetic algorithm solution |
US7878393B2 (en) | 2006-12-07 | 2011-02-01 | Moneygram International, Inc. | Method and apparatus for distribution of money transfers |
US9876749B2 (en) * | 2006-12-18 | 2018-01-23 | Cisco Technology, Inc. | Dynamic location-specific distribution lists |
US20150310564A1 (en) * | 2007-01-29 | 2015-10-29 | Capital One Financial Corporation | Systems and methods for geo-coded financial account statement visualization |
WO2009139890A1 (en) * | 2008-05-14 | 2009-11-19 | Finsphere Corporation | Systems and methods for authenticating a user of a computer application, network, or device using a wireless device |
US9922323B2 (en) | 2007-03-16 | 2018-03-20 | Visa International Service Association | System and method for automated analysis comparing a wireless device location with another geographic location |
US9154952B2 (en) * | 2007-03-16 | 2015-10-06 | Finsphere Corporation | Systems and methods for authenticating a user of a computer application, network, or device using a wireless device |
US8374634B2 (en) | 2007-03-16 | 2013-02-12 | Finsphere Corporation | System and method for automated analysis comparing a wireless device location with another geographic location |
US9432845B2 (en) | 2007-03-16 | 2016-08-30 | Visa International Service Association | System and method for automated analysis comparing a wireless device location with another geographic location |
US20110208601A1 (en) | 2010-02-19 | 2011-08-25 | Finshpere Corporation | System and method for financial transaction authentication using travel information |
US9185123B2 (en) | 2008-02-12 | 2015-11-10 | Finsphere Corporation | System and method for mobile identity protection for online user authentication |
US9420448B2 (en) | 2007-03-16 | 2016-08-16 | Visa International Service Association | System and method for automated analysis comparing a wireless device location with another geographic location |
US9456348B2 (en) | 2007-03-16 | 2016-09-27 | Visa International Service Association | Systems and methods for authenticating a user of a computer application, network, or device using a wireless device |
US8280348B2 (en) | 2007-03-16 | 2012-10-02 | Finsphere Corporation | System and method for identity protection using mobile device signaling network derived location pattern recognition |
US10440572B2 (en) | 2007-03-16 | 2019-10-08 | Visa International Service Association | Systems and methods for authenticating a user of a computer application, network, or device using a wireless device |
US8116731B2 (en) * | 2007-11-01 | 2012-02-14 | Finsphere, Inc. | System and method for mobile identity protection of a user of multiple computer applications, networks or devices |
US10853855B2 (en) * | 2007-05-20 | 2020-12-01 | Michael Sasha John | Systems and methods for automatic and transparent client authentication and online transaction verification |
US11257080B2 (en) | 2007-05-04 | 2022-02-22 | Michael Sasha John | Fraud deterrence for secure transactions |
US8533821B2 (en) | 2007-05-25 | 2013-09-10 | International Business Machines Corporation | Detecting and defending against man-in-the-middle attacks |
AU2007354390B2 (en) * | 2007-05-29 | 2010-03-11 | Guy S. Heffez | Method and system for authenticating internet user indentity |
US11354667B2 (en) | 2007-05-29 | 2022-06-07 | Spriv Llc | Method for internet user authentication |
US8676672B2 (en) | 2007-08-23 | 2014-03-18 | E2Interactive, Inc. | Systems and methods for electronic delivery of stored value |
US20090119170A1 (en) | 2007-10-25 | 2009-05-07 | Ayman Hammad | Portable consumer device including data bearing medium including risk based benefits |
WO2009078966A1 (en) * | 2007-12-14 | 2009-06-25 | Telecommunication Systems, Inc. | Wireless application protocol (wap) application location based services (lbs) |
US9369294B2 (en) | 2007-12-14 | 2016-06-14 | Telecommunication Systems, Inc. | Reverse 911 using multicast session internet protocol (SIP) conferencing of voice over internet protocol (VoIP) users |
US8220034B2 (en) * | 2007-12-17 | 2012-07-10 | International Business Machines Corporation | User authentication based on authentication credentials and location information |
WO2009082369A1 (en) * | 2007-12-21 | 2009-07-02 | Telecommunication Systems, Inc. | Wireless device electronic wallet transaction validation |
US20090171797A1 (en) * | 2007-12-28 | 2009-07-02 | Mastercard International, Inc. | Positionally Trackable Payment Device |
US8725578B2 (en) * | 2008-01-30 | 2014-05-13 | Intuit Inc. | Method and apparatus for authorizing a financial transaction |
US8837465B2 (en) | 2008-04-02 | 2014-09-16 | Twilio, Inc. | System and method for processing telephony sessions |
EP2266269B1 (en) | 2008-04-02 | 2019-01-02 | Twilio Inc. | System and method for processing telephony sessions |
US8346662B2 (en) * | 2008-05-16 | 2013-01-01 | Visa U.S.A. Inc. | Desktop alert with interactive bona fide dispute initiation through chat session facilitated by desktop application |
US9596359B2 (en) * | 2008-06-26 | 2017-03-14 | Visa International Service Association | Mobile communication device configured for transit application |
US8707319B2 (en) * | 2008-06-26 | 2014-04-22 | Visa International Service Association | Resource location verification by comparing and updating resource location with a location of a consumer device after a threshold of location mismatches is exceeded |
US8478692B2 (en) | 2008-06-26 | 2013-07-02 | Visa International Service Association | Systems and methods for geographic location notifications of payment transactions |
US20090327135A1 (en) * | 2008-06-26 | 2009-12-31 | Loc Duc Nguyen | Credit card paired with location identifiable device for point of service fraud detection |
US9542687B2 (en) | 2008-06-26 | 2017-01-10 | Visa International Service Association | Systems and methods for visual representation of offers |
US8744959B2 (en) * | 2008-08-13 | 2014-06-03 | Moneygram International, Inc. | Electronic bill payment with variable payment options |
AU2009296822B2 (en) * | 2008-09-24 | 2015-03-26 | Visa International Service Association | Intelligent alert system and method |
AU2009296796B8 (en) | 2008-09-25 | 2015-02-26 | Visa International Service Association | Systems and methods for sorting alert and offer messages on a mobile device |
US20100078472A1 (en) | 2008-09-30 | 2010-04-01 | Apple Inc. | Group peer-to-peer financial transactions |
US20100078471A1 (en) * | 2008-09-30 | 2010-04-01 | Apple Inc. | System and method for processing peer-to-peer financial transactions |
US10380573B2 (en) * | 2008-09-30 | 2019-08-13 | Apple Inc. | Peer-to-peer financial transaction devices and methods |
US20100114617A1 (en) * | 2008-10-30 | 2010-05-06 | International Business Machines Corporation | Detecting potentially fraudulent transactions |
US9031866B1 (en) | 2008-11-17 | 2015-05-12 | Jpmorgan Chase Bank, N.A. | Systems and methods for use of transaction data for customers |
FR2940567B1 (en) * | 2008-12-22 | 2013-07-05 | Compagnie Ind Et Financiere Dingenierie Ingenico | TRANSACTION SECURING METHOD, TRANSACTION DEVICE, BANK SERVER, MOBILE TERMINAL, AND CORRESPONDING COMPUTER PROGRAM PRODUCTS |
US9576119B2 (en) * | 2008-12-26 | 2017-02-21 | Facebook, Inc. | Preventing phishing attacks based on reputation of user locations |
US8145561B1 (en) | 2009-01-05 | 2012-03-27 | Sprint Communications Company L.P. | Phone usage pattern as credit card fraud detection trigger |
GB0904874D0 (en) * | 2009-03-20 | 2009-05-06 | Validsoft Uk Ltd | Smartcard security system |
US9230259B1 (en) | 2009-03-20 | 2016-01-05 | Jpmorgan Chase Bank, N.A. | Systems and methods for mobile ordering and payment |
US20100269162A1 (en) | 2009-04-15 | 2010-10-21 | Jose Bravo | Website authentication |
US20100274566A1 (en) * | 2009-04-22 | 2010-10-28 | Mark Carlson | Location based processing of announcements for delivery to an announcement recipient |
US8032413B2 (en) * | 2009-04-22 | 2011-10-04 | Visa U.S.A. Inc. | Auctioning of announcements |
US20100274627A1 (en) * | 2009-04-22 | 2010-10-28 | Mark Carlson | Receiving an announcement triggered by location data |
US7937291B2 (en) * | 2009-04-22 | 2011-05-03 | Visa U.S.A. Inc. | Providing an announcement about transactions of a target merchant to a consumer |
US8543468B2 (en) | 2009-04-22 | 2013-09-24 | Visa U.S.A. Inc. | Bidding to receive data after a consumer is in a zone |
US8160934B2 (en) * | 2009-04-22 | 2012-04-17 | Visa U.S.A. Inc. | Notification of resources of interest to members of a consumer group |
US20100274626A1 (en) * | 2009-04-22 | 2010-10-28 | Mark Carlson | Receipt of communications from announcement recipients of consumer data |
US20100274567A1 (en) * | 2009-04-22 | 2010-10-28 | Mark Carlson | Announcing information about payment transactions of any member of a consumer group |
US20100274625A1 (en) * | 2009-04-22 | 2010-10-28 | Mark Carlson | Targeting merchant announcements triggered by consumer activity relative to a surrogate merchant |
US10387885B2 (en) * | 2009-04-28 | 2019-08-20 | Visa International Service Association | SKU level control and alerts |
US9710802B2 (en) | 2009-04-28 | 2017-07-18 | Visa International Service Association | Merchant competition alert |
US9449327B2 (en) | 2009-04-28 | 2016-09-20 | Visa International Service Association | Merchant alert based system and method including customer presence notification |
US20100274653A1 (en) * | 2009-04-28 | 2010-10-28 | Ayman Hammad | Notification social networking |
US9734495B2 (en) * | 2009-06-02 | 2017-08-15 | Qualcomm Incorporated | Mobile commerce authentication and authorization systems |
US11797997B2 (en) | 2009-07-07 | 2023-10-24 | Visa International Service Association | Data verification in transactions in distributed network |
US20120130898A1 (en) | 2009-07-07 | 2012-05-24 | Finsphere, Inc. | Mobile directory number and email verification of financial transactions |
US10438181B2 (en) * | 2009-07-22 | 2019-10-08 | Visa International Service Association | Authorizing a payment transaction using seasoned data |
US20110022518A1 (en) * | 2009-07-22 | 2011-01-27 | Ayman Hammad | Apparatus including data bearing medium for seasoning a device using data obtained from multiple transaction environments |
US9396465B2 (en) * | 2009-07-22 | 2016-07-19 | Visa International Service Association | Apparatus including data bearing medium for reducing fraud in payment transactions using a black list |
US9818121B2 (en) | 2009-07-31 | 2017-11-14 | Visa International Space Association | Mobile communications message verification of financial transactions |
US20110055013A1 (en) * | 2009-08-28 | 2011-03-03 | Ayman Hammad | Secure alert system and method |
US8683609B2 (en) * | 2009-12-04 | 2014-03-25 | International Business Machines Corporation | Mobile phone and IP address correlation service |
US20110137740A1 (en) | 2009-12-04 | 2011-06-09 | Ashmit Bhattacharya | Processing value-ascertainable items |
US11928696B2 (en) | 2009-12-16 | 2024-03-12 | E2Interactive, Inc. | Systems and methods for generating a virtual value item for a promotional campaign |
US20110148633A1 (en) * | 2009-12-21 | 2011-06-23 | Kohlenberg Tobias M | Using trajectory for authentication |
US9092763B2 (en) | 2009-12-30 | 2015-07-28 | Moneygram International, Inc. | Retail sale money transfer system |
EP2526441A1 (en) * | 2010-01-20 | 2012-11-28 | Giesecke & Devrient GmbH | Method for carrying out a transaction between a portable data carrier and a terminal |
US11792314B2 (en) | 2010-03-28 | 2023-10-17 | Spriv Llc | Methods for acquiring an internet user's consent to be located and for authenticating the location information |
US20110270744A1 (en) * | 2010-04-30 | 2011-11-03 | Ginger Baker | Mobile tangible value banking system |
EP2577578A2 (en) * | 2010-05-24 | 2013-04-10 | Secure Electrans Limited | Electronic payment unit, electronic payment origin authentication system and method |
US8336664B2 (en) | 2010-07-09 | 2012-12-25 | Telecommunication Systems, Inc. | Telematics basic mobile device safety interlock |
US20120084162A1 (en) * | 2010-10-05 | 2012-04-05 | Merrill Brooks Smith | Systems and methods for conducting a composite bill payment transaction |
US9483786B2 (en) | 2011-10-13 | 2016-11-01 | Gift Card Impressions, LLC | Gift card ordering system and method |
US9031869B2 (en) | 2010-10-13 | 2015-05-12 | Gift Card Impressions, LLC | Method and system for generating a teaser video associated with a personalized gift |
US8688087B2 (en) | 2010-12-17 | 2014-04-01 | Telecommunication Systems, Inc. | N-dimensional affinity confluencer |
US8942743B2 (en) | 2010-12-17 | 2015-01-27 | Telecommunication Systems, Inc. | iALERT enhanced alert manager |
US20130030934A1 (en) * | 2011-01-28 | 2013-01-31 | Zumigo, Inc. | System and method for credit card transaction approval based on mobile subscriber terminal location |
KR101361821B1 (en) * | 2011-02-10 | 2014-02-13 | 주식회사 케이티 | Method and system for collecting information of access point interworking with mobile card payment system, mobile communication terminal for use therein |
US20120317027A1 (en) * | 2011-06-13 | 2012-12-13 | Ho Ming Luk | Computer-Implemented Systems And Methods For Real-Time Scoring Of Enterprise Data |
US20120317008A1 (en) * | 2011-06-13 | 2012-12-13 | Revathi Subramanian | Computer-Implemented Systems And Methods For Handling And Scoring Enterprise Data |
US8732042B2 (en) * | 2011-07-28 | 2014-05-20 | Visa International Service Association | Mobile data mapping system and method |
EP2551814A1 (en) * | 2011-07-29 | 2013-01-30 | Pacifica Beteiligungsgesellschaft mbH | Method for authenticating a person authorised to access a transaction terminal |
US20130046692A1 (en) * | 2011-08-19 | 2013-02-21 | Bank Of America Corporation | Fraud protection with user location verification |
US8863258B2 (en) * | 2011-08-24 | 2014-10-14 | International Business Machines Corporation | Security for future log-on location |
US10417677B2 (en) | 2012-01-30 | 2019-09-17 | Gift Card Impressions, LLC | Group video generating system |
GB2492614B (en) * | 2012-02-28 | 2014-01-29 | Barclays Bank Plc | System and method for authenticating a payment transaction |
US10528944B2 (en) * | 2012-04-13 | 2020-01-07 | Mastercard International Incorporated | Systems, methods, and computer readable media for conducting a transaction using cloud based credentials |
GB2501478A (en) * | 2012-04-23 | 2013-10-30 | Icheque Network Ltd | Verification of electronic payment |
WO2013181151A2 (en) * | 2012-05-26 | 2013-12-05 | Finsphere Corporation | System and method for automated analysis comparing a wireless device location with another geographic location |
US8768847B2 (en) | 2012-06-21 | 2014-07-01 | Microsoft Corporation | Privacy enhancing personal data brokerage service |
SG10201700306RA (en) * | 2012-07-16 | 2017-02-27 | Mashinery Pty Ltd | Authorization of Transactions |
US8737962B2 (en) | 2012-07-24 | 2014-05-27 | Twilio, Inc. | Method and system for preventing illicit use of a telephony platform |
US8917826B2 (en) | 2012-07-31 | 2014-12-23 | International Business Machines Corporation | Detecting man-in-the-middle attacks in electronic transactions using prompts |
US9578499B2 (en) | 2012-08-21 | 2017-02-21 | Facebook, Inc. | Authenticating user sessions based on information obtained from mobile devices |
US20140058805A1 (en) * | 2012-08-24 | 2014-02-27 | Sap Ag | Remotely authorizing a purchase from a head unit of a vehicle |
US9208346B2 (en) | 2012-09-05 | 2015-12-08 | Telecommunication Systems, Inc. | Persona-notitia intellection codifier |
US9607344B2 (en) * | 2012-09-18 | 2017-03-28 | American Express Travel Related Services Company, Inc. | Method, system, and computer program product for merchant servicing |
US9247432B2 (en) * | 2012-10-19 | 2016-01-26 | Airwatch Llc | Systems and methods for controlling network access |
WO2014124043A1 (en) | 2013-02-05 | 2014-08-14 | Visa International Service Association | Integrated communications network for transactions |
US9565911B2 (en) | 2013-02-15 | 2017-02-14 | Gift Card Impressions, LLC | Gift card presentation devices |
US11219288B2 (en) | 2013-02-15 | 2022-01-11 | E2Interactive, Inc. | Gift card box with slanted tray and slit |
CN103236118B (en) * | 2013-02-28 | 2015-12-23 | 上海富友支付服务有限公司 | Based on mobile financial terminal supervisory system and the method for mobile base station location technology |
US9940616B1 (en) | 2013-03-14 | 2018-04-10 | Square, Inc. | Verifying proximity during payment transactions |
JP2016518735A (en) * | 2013-03-14 | 2016-06-23 | テルコム・ベンチャーズ・エルエルシー | Authentication of user identification using location |
US9594907B2 (en) | 2013-03-14 | 2017-03-14 | Sas Institute Inc. | Unauthorized activity detection and classification |
US11055710B2 (en) * | 2013-05-02 | 2021-07-06 | Visa International Service Association | Systems and methods for verifying and processing transactions using virtual currency |
US10217107B2 (en) | 2013-05-02 | 2019-02-26 | Gift Card Impressions, LLC | Stored value card kiosk system and method |
US20140358741A1 (en) * | 2013-05-29 | 2014-12-04 | Mastercard International Incorporated | Method and system for showrooming detection |
US10102575B1 (en) * | 2013-06-24 | 2018-10-16 | Dividex Analytics, LLC | Securities claims identification, optimization and recovery system and methods |
US9646342B2 (en) | 2013-07-19 | 2017-05-09 | Bank Of America Corporation | Remote control for online banking |
US9519934B2 (en) | 2013-07-19 | 2016-12-13 | Bank Of America Corporation | Restricted access to online banking |
US10198731B1 (en) | 2014-02-18 | 2019-02-05 | Square, Inc. | Performing actions based on the location of mobile device during a card swipe |
US9344419B2 (en) | 2014-02-27 | 2016-05-17 | K.Y. Trix Ltd. | Methods of authenticating users to a site |
US9510204B2 (en) | 2014-02-28 | 2016-11-29 | Life360, Inc. | Apparatus and method of determining fraudulent use of a mobile device based on behavioral abnormality |
WO2015143373A1 (en) * | 2014-03-21 | 2015-09-24 | ITG Software Solutions, Inc | Network communication system for exchange trading |
US9226217B2 (en) | 2014-04-17 | 2015-12-29 | Twilio, Inc. | System and method for enabling multi-modal communication |
US20150309962A1 (en) * | 2014-04-25 | 2015-10-29 | Xerox Corporation | Method and apparatus for modeling a population to predict individual behavior using location data from social network messages |
US10262346B2 (en) | 2014-04-30 | 2019-04-16 | Gift Card Impressions, Inc. | System and method for a merchant onsite personalization gifting platform |
US9569767B1 (en) | 2014-05-06 | 2017-02-14 | Square, Inc. | Fraud protection based on presence indication |
WO2016020927A1 (en) * | 2014-08-04 | 2016-02-11 | Hewlett-Packard Development Company, L.P. | Event stream processing |
RU2711464C2 (en) | 2015-03-17 | 2020-01-17 | Виза Интернэшнл Сервис Ассосиэйшн | Multiple-device transaction verification |
US10453065B2 (en) | 2016-02-12 | 2019-10-22 | Visa International Service Association | Method and system for determining terminal location |
JP2017162239A (en) * | 2016-03-10 | 2017-09-14 | 東芝メモリ株式会社 | Memory system |
US10621581B2 (en) | 2016-06-11 | 2020-04-14 | Apple Inc. | User interface for transactions |
US20180053189A1 (en) * | 2016-08-18 | 2018-02-22 | Justin T. Monk | Systems and methods for enhanced authorization response |
GB2570825A (en) * | 2016-11-07 | 2019-08-07 | Walmart Apollo Llc | Reducing cybersecurity risks when purchasing products over a network |
US11354659B1 (en) * | 2016-12-19 | 2022-06-07 | Amazon Technologies, Inc. | Securing transaction messages based on a dynamic key selection |
US11341489B1 (en) | 2016-12-19 | 2022-05-24 | Amazon Technologies, Inc. | Multi-path back-end system for payment processing |
WO2018177503A1 (en) * | 2017-03-27 | 2018-10-04 | Swiss Reinsurance Company Ltd. | Adaptive, self-optimizing, leveraged capacity system and corresponding method thereof |
US11221744B2 (en) | 2017-05-16 | 2022-01-11 | Apple Inc. | User interfaces for peer-to-peer transfers |
KR102409769B1 (en) | 2017-05-16 | 2022-06-16 | 애플 인크. | User interfaces for peer-to-peer transfers |
US10954049B2 (en) | 2017-12-12 | 2021-03-23 | E2Interactive, Inc. | Viscous liquid vessel for gifting |
JP6474184B1 (en) * | 2018-03-30 | 2019-02-27 | 加藤 寛之 | Stock price prediction support system and method |
US10778681B1 (en) | 2019-04-12 | 2020-09-15 | Capital One Services, Llc | Using common identifiers related to location to link fraud across mobile devices |
CN110992048A (en) * | 2019-11-29 | 2020-04-10 | 中国联合网络通信集团有限公司 | Transaction fraud determination method and device |
KR102252859B1 (en) * | 2020-05-04 | 2021-05-14 | 윤성민 | Foreign currency exchange system and method thereof |
US11900457B2 (en) * | 2020-08-24 | 2024-02-13 | Leonid Chuzhoy | Methods for prediction and rating aggregation |
US20220156811A1 (en) * | 2020-11-15 | 2022-05-19 | Refinitiv Us Organization Llc | User-defined matching |
US20220269662A1 (en) * | 2021-02-22 | 2022-08-25 | Mastercard Technologies Canada ULC | Event interval approximation |
US11200306B1 (en) | 2021-02-25 | 2021-12-14 | Telcom Ventures, Llc | Methods, devices, and systems for authenticating user identity for location-based deliveries |
US20220318906A1 (en) * | 2021-04-05 | 2022-10-06 | Pranil Ram | Interactive Grid-based Graphical Trading System with Smart Order Action |
CN113256116A (en) * | 2021-05-26 | 2021-08-13 | 陈新燊 | Transaction price reference index calculation method realized through computer |
US11943259B2 (en) | 2021-09-22 | 2024-03-26 | Bank Of America Corporation | System and method for security management of application information |
US11811778B2 (en) | 2021-09-22 | 2023-11-07 | Bank Of America Corporation | System and method for security management of a plurality of invalid interactions |
US20230121239A1 (en) * | 2021-10-15 | 2023-04-20 | Tomer Karni | Systems and methods for dynamically determining the best respected moving average lines associated with a time series data set |
Citations (21)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5878337A (en) * | 1996-08-08 | 1999-03-02 | Joao; Raymond Anthony | Transaction security apparatus and method |
US20010001856A1 (en) * | 1999-10-28 | 2001-05-24 | Gould David B. | Prepaid cash equivalent card and system |
US20020049644A1 (en) * | 2000-09-28 | 2002-04-25 | Kargman James B. | Method for simplified one-touch ordering of goods and services from a wired or wireless phone or terminal |
US20020099648A1 (en) * | 2000-09-19 | 2002-07-25 | Devoe Dana L. | Method of reducing fraud in credit card and other E-business |
US20020108062A1 (en) * | 2000-05-15 | 2002-08-08 | Takayuki Nakajima | Authentication system and method |
US20020169541A1 (en) * | 1995-01-11 | 2002-11-14 | Bouve W. Lincoln | System and methods for remotely accessing a selected group of items of interest from a database |
US20020188535A1 (en) * | 2001-03-15 | 2002-12-12 | David Chao | Method and apparatus for processing sales transaction data |
US20030135463A1 (en) * | 2002-01-16 | 2003-07-17 | International Business Machines Corporation | Credit authorization system and method |
US6612488B2 (en) * | 2001-03-14 | 2003-09-02 | Hitachi, Ltd. | Method and system to prevent fraudulent payment in credit/debit card transactions, and terminals therefor |
US6813608B1 (en) * | 1999-10-11 | 2004-11-02 | Park Tours, Inc. | System and method for enhancing user experience in a wide-area facility having a distributed, bounded environment |
US6832721B2 (en) * | 2000-10-04 | 2004-12-21 | Nec Corporation | Authentication system using information on position |
US6850147B2 (en) * | 2001-04-02 | 2005-02-01 | Mikos, Ltd. | Personal biometric key |
US6868391B1 (en) * | 1997-04-15 | 2005-03-15 | Telefonaktiebolaget Lm Ericsson (Publ) | Tele/datacommunications payment method and apparatus |
US6896182B2 (en) * | 2000-08-10 | 2005-05-24 | Nec Corporation | Card verification system and card verification method |
US7013149B2 (en) * | 2002-04-11 | 2006-03-14 | Mitsubishi Electric Research Laboratories, Inc. | Environment aware services for mobile devices |
US7149296B2 (en) * | 2001-12-17 | 2006-12-12 | International Business Machines Corporation | Providing account usage fraud protection |
US7167711B1 (en) * | 1997-12-23 | 2007-01-23 | Openwave Systems Inc. | System and method for controlling financial transactions over a wireless network |
US20070124211A1 (en) * | 2000-03-27 | 2007-05-31 | Smith Steven B | Methods and apparatus for wireless point-of-sale transactions |
US7376431B2 (en) * | 2002-02-05 | 2008-05-20 | Niedermeyer Brian J | Location based fraud reduction system and method |
US20080147564A1 (en) * | 2001-06-26 | 2008-06-19 | Tara Chand Singhal | Security in use of bankcards that protects bankcard data from merchant systems in a payment card system |
US20090100168A1 (en) * | 2000-05-24 | 2009-04-16 | Harris Scott C | Automatic location detection in a computing environment |
-
2003
- 2003-01-31 US US10/355,557 patent/US7376431B2/en active Active
-
2008
- 2008-03-18 US US12/050,752 patent/US7684809B2/en not_active Expired - Lifetime
-
2010
- 2010-02-17 US US12/707,228 patent/US20100145868A1/en not_active Abandoned
Patent Citations (22)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20020169541A1 (en) * | 1995-01-11 | 2002-11-14 | Bouve W. Lincoln | System and methods for remotely accessing a selected group of items of interest from a database |
US5878337A (en) * | 1996-08-08 | 1999-03-02 | Joao; Raymond Anthony | Transaction security apparatus and method |
US6868391B1 (en) * | 1997-04-15 | 2005-03-15 | Telefonaktiebolaget Lm Ericsson (Publ) | Tele/datacommunications payment method and apparatus |
US7167711B1 (en) * | 1997-12-23 | 2007-01-23 | Openwave Systems Inc. | System and method for controlling financial transactions over a wireless network |
US6813608B1 (en) * | 1999-10-11 | 2004-11-02 | Park Tours, Inc. | System and method for enhancing user experience in a wide-area facility having a distributed, bounded environment |
US20010001856A1 (en) * | 1999-10-28 | 2001-05-24 | Gould David B. | Prepaid cash equivalent card and system |
US20070124211A1 (en) * | 2000-03-27 | 2007-05-31 | Smith Steven B | Methods and apparatus for wireless point-of-sale transactions |
US20020108062A1 (en) * | 2000-05-15 | 2002-08-08 | Takayuki Nakajima | Authentication system and method |
US20090100168A1 (en) * | 2000-05-24 | 2009-04-16 | Harris Scott C | Automatic location detection in a computing environment |
US6896182B2 (en) * | 2000-08-10 | 2005-05-24 | Nec Corporation | Card verification system and card verification method |
US20020099648A1 (en) * | 2000-09-19 | 2002-07-25 | Devoe Dana L. | Method of reducing fraud in credit card and other E-business |
US20020049644A1 (en) * | 2000-09-28 | 2002-04-25 | Kargman James B. | Method for simplified one-touch ordering of goods and services from a wired or wireless phone or terminal |
US6832721B2 (en) * | 2000-10-04 | 2004-12-21 | Nec Corporation | Authentication system using information on position |
US6612488B2 (en) * | 2001-03-14 | 2003-09-02 | Hitachi, Ltd. | Method and system to prevent fraudulent payment in credit/debit card transactions, and terminals therefor |
US20020188535A1 (en) * | 2001-03-15 | 2002-12-12 | David Chao | Method and apparatus for processing sales transaction data |
US6850147B2 (en) * | 2001-04-02 | 2005-02-01 | Mikos, Ltd. | Personal biometric key |
US20080147564A1 (en) * | 2001-06-26 | 2008-06-19 | Tara Chand Singhal | Security in use of bankcards that protects bankcard data from merchant systems in a payment card system |
US7149296B2 (en) * | 2001-12-17 | 2006-12-12 | International Business Machines Corporation | Providing account usage fraud protection |
US20030135463A1 (en) * | 2002-01-16 | 2003-07-17 | International Business Machines Corporation | Credit authorization system and method |
US7376431B2 (en) * | 2002-02-05 | 2008-05-20 | Niedermeyer Brian J | Location based fraud reduction system and method |
US20080156870A1 (en) * | 2002-02-05 | 2008-07-03 | Brian Joseph Niedermeyer | Location based fraud reduction system and method |
US7013149B2 (en) * | 2002-04-11 | 2006-03-14 | Mitsubishi Electric Research Laboratories, Inc. | Environment aware services for mobile devices |
Cited By (16)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US11449850B2 (en) | 2009-01-28 | 2022-09-20 | Validsoft Limited | Card false-positive prevention |
US9436955B2 (en) | 2009-06-10 | 2016-09-06 | Square, Inc. | Methods for transferring funds using a payment service where financial account information is only entered once with a payment service and need not be re-entered for future transfers |
US20110258117A1 (en) * | 2010-04-14 | 2011-10-20 | Dfs Services Llc | Modification of payment transactions in real-time based upon external data source |
US9454866B2 (en) | 2010-10-13 | 2016-09-27 | Square, Inc. | Method of conducting financial transactions where a payer's financial account information is entered only once with a payment system |
US9619797B2 (en) | 2010-10-13 | 2017-04-11 | Square, Inc. | Payment methods with a payment service and tabs selected by a first party and opened by a second party at an geographic location of the first party's mobile device |
CN102521936A (en) * | 2011-12-20 | 2012-06-27 | 福建联迪商用设备有限公司 | Method for avoiding non-local cashing through point of sale (POS) |
US10783531B2 (en) | 2012-03-16 | 2020-09-22 | Square, Inc. | Cardless payment transactions based on geographic locations of user devices |
US11449854B1 (en) | 2012-10-29 | 2022-09-20 | Block, Inc. | Establishing consent for cardless transactions using short-range transmission |
US10373151B1 (en) | 2012-11-20 | 2019-08-06 | Square, Inc. | Multiple merchants in cardless payment transactions and multiple customers in cardless payment transactions |
US10885522B1 (en) | 2013-02-08 | 2021-01-05 | Square, Inc. | Updating merchant location for cardless payment transactions |
WO2014149804A1 (en) * | 2013-03-15 | 2014-09-25 | Mcafee, Inc. | System and method to reduce misuse of a financial instrument at a point-of-sale location |
US10560808B2 (en) | 2013-07-23 | 2020-02-11 | Square, Inc. | Computing distances of devices |
US10332162B1 (en) | 2013-09-30 | 2019-06-25 | Square, Inc. | Using wireless beacons for transit systems |
US11587146B1 (en) | 2013-11-13 | 2023-02-21 | Block, Inc. | Wireless beacon shopping experience |
CN106898069A (en) * | 2017-02-24 | 2017-06-27 | 广东林盟科技有限公司 | Gate control system |
US11538063B2 (en) | 2018-09-12 | 2022-12-27 | Samsung Electronics Co., Ltd. | Online fraud prevention and detection based on distributed system |
Also Published As
Publication number | Publication date |
---|---|
US20080156870A1 (en) | 2008-07-03 |
US7376431B2 (en) | 2008-05-20 |
US7684809B2 (en) | 2010-03-23 |
US20030169881A1 (en) | 2003-09-11 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US7684809B2 (en) | Location based fraud reduction system and method | |
AU2010226524B2 (en) | Account activity alert | |
CN102812480B (en) | For verifying the method and system of transaction | |
US7761381B1 (en) | Method and system for approving of financial transactions | |
US9811837B2 (en) | System and method for setting a product watch on transaction data | |
US10878416B2 (en) | Apparatus, method, and computer program product for bus rapid transit ticketing and the like | |
EP1487176A1 (en) | A method of paying from an account by a customer having a mobile user terminal, and a customer authenticating network | |
US20140279503A1 (en) | Providing customer alerts based on geo-thresholds | |
US20060131390A1 (en) | Method and system for providing transaction notification and mobile reply authorization | |
US20130046692A1 (en) | Fraud protection with user location verification | |
US20090327135A1 (en) | Credit card paired with location identifiable device for point of service fraud detection | |
US20070084913A1 (en) | Systems and methods for authorizing a transaction for a financial account | |
US20160048821A1 (en) | Simple in-store payments | |
WO2017003713A1 (en) | Systems and methods for determining device location using wireless data and other geographical location data | |
US20140358769A1 (en) | Merchant data correction through location averaging | |
CA2390705A1 (en) | Method and system for detecting fraud in non-personal transactions | |
CN101960480A (en) | Mobile commerce authentication and authorization system | |
CA2949366A1 (en) | Apparatus, method, and computer program product for settlement to a merchant's card account using an on-line bill payment platform | |
US20160125400A1 (en) | Systems and methods for geo component fraud detection for card-present transactions | |
US11354668B2 (en) | Systems and methods for identifying devices used in fraudulent or unauthorized transactions | |
US20210004812A1 (en) | Pre-designated Fraud Safe Zones | |
US20130006863A1 (en) | Method, System and Program Product for Deterring Credit Fraud | |
CA3162110A1 (en) | Providing a customer with a number of payment scenarios | |
CA3165152A1 (en) | Providing a buy now pay later product to a credit account holder | |
US20160063493A1 (en) | System and method for performing payment authorization verification using geolocation data |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AS | Assignment |
Owner name: SQUARE, INC., CALIFORNIA Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:NIEDERMEYER, BRIAN J.;REEL/FRAME:025580/0721 Effective date: 20101216 |
|
STCB | Information on status: application discontinuation |
Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION |