US20160071106A1 - System and method for investigating fraudulent activity - Google Patents
System and method for investigating fraudulent activity Download PDFInfo
- Publication number
- US20160071106A1 US20160071106A1 US14/481,463 US201414481463A US2016071106A1 US 20160071106 A1 US20160071106 A1 US 20160071106A1 US 201414481463 A US201414481463 A US 201414481463A US 2016071106 A1 US2016071106 A1 US 2016071106A1
- Authority
- US
- United States
- Prior art keywords
- transaction
- user
- report
- receive
- input
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/40—Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
- G06Q20/407—Cancellation of a transaction
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/22—Payment schemes or models
- G06Q20/24—Credit schemes, i.e. "pay after"
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/30—Payment architectures, schemes or protocols characterised by the use of specific devices or networks
- G06Q20/34—Payment architectures, schemes or protocols characterised by the use of specific devices or networks using cards, e.g. integrated circuit [IC] cards or magnetic cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/40—Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
- G06Q20/401—Transaction verification
- G06Q20/4016—Transaction verification involving fraud or risk level assessment in transaction processing
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/40—Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
- G06Q20/409—Device specific authentication in transaction processing
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/42—Confirmation, e.g. check or permission by the legal debtor of payment
Definitions
- This disclosure relates to a system for investigating fraudulent activity.
- an apparatus comprising a memory and a processor.
- the memory is operable to store information associated with a user account.
- the processor is communicatively coupled to the memory and is operable to receive a message indicating that a transaction associated with a card has occurred. In response to the message, the processor can receive a first input indicating that the transaction is fraudulent.
- the processor can receive a second input indicating that a report should be filed and in response to receiving the second input, present, on a display, a plurality of questions to determine whether the card has been stolen.
- the processor can receive a third input indicating an answer to each of the plurality of questions and in response to receiving the third input, present, on the display, an affidavit.
- the processor can receive a fourth input indicating the affidavit has been electronically signed and in response to receiving the fourth input, present, on the display, a confirmation message indicating that the report has been filed.
- FIG. 1 is a schematic diagram of one embodiment of a system for initiating a fraud claim
- FIG. 2 is an illustration of an interface of a device of the system of FIG. 1 ;
- FIG. 3 is an illustration of an interface of a device of the system of FIG. 1 ;
- FIG. 4 is an illustration of an interface of a device of the system of FIG. 1 ;
- FIG. 5 is an illustration of an interface of a device of the system of FIG. 1 ;
- FIG. 6 is an illustration of an interface of a device of the system of FIG. 1 ;
- FIG. 7 is a flowchart illustrating a method using the system of FIG. 1 .
- FIGS. 1 through 7 like numerals being used for like and corresponding parts of the various drawings.
- the described system alerts a user on a device when a potentially fraudulent transaction has occurred or is occurring.
- the user may then use the device to alert the appropriate institution of the fraud and to initiate a fraud claim.
- the device may reduce network traffic associated with fraud alerts and fraud claims.
- An example embodiment of the proposed system is illustrated in FIG. 1 .
- FIG. 1 is a schematic diagram of one embodiment of a system 100 for initiating a fraud claim.
- system 100 includes a fraud alert module 110 , device 114 and network 120 .
- a user 112 A may be performing a transaction and a user 112 B may be associated with device 114 .
- Device 114 may alert user 112 B of a potentially fraudulent transaction and user 112 B may use device 114 to initiate a fraud claim.
- user 112 A may have stolen the information associated with user 112 B and uses that information to perform a transaction. For example, user 112 A may have stolen the credit card or debit card information of user 112 B and attempts to make an online purchase using that information.
- the purchase by user 112 A may be approved and user 112 B will be asked to pay for the purchase.
- user 112 B may use device 114 to initiate a fraud claim and/or challenge the transaction.
- user 112 B may be asked to verify the transaction before the purchase is approved.
- System 100 may provide user 112 B a way to verify the transaction and to initiate a fraud claim.
- Network 120 may facilitate communication amongst the components of system 100 , including fraud alert module 110 and device 114 .
- This disclosure contemplates any suitable network 120 operable to facilitate communication between the components of system 100 .
- Network 120 may include any interconnecting system capable of transmitting audio, video, signals, data, messages, or any combination of the preceding.
- Network 120 may include all or a portion of a public switched telephone network (PSTN), a public or private data network, a local area network (LAN), a metropolitan area network (MAN), a wide area network (WAN), a local, regional, or global communication or computer network, such as the Internet, a wireline or wireless network, an enterprise intranet, or any other suitable communication link, including combinations thereof, operable to facilitate communication between the components.
- PSTN public switched telephone network
- LAN local area network
- MAN metropolitan area network
- WAN wide area network
- Internet a local, regional, or global communication or computer network
- wireline or wireless network such as the Internet
- enterprise intranet such as any other suitable communication link, including combinations thereof, operable to facilitate communication between the components.
- Fraud alert module 110 may receive the transaction information and may determine whether the transaction is potentially fraudulent. Fraud alert module 110 may include a processor 111 , a memory 115 and any other appropriate hardware and/or software to determine whether a transaction is potentially fraudulent. Processor 111 and memory 115 may be similar and/or analogous to processor 132 and memory 134 . This disclosure contemplates fraud alert module 110 determining whether a transaction is potentially fraudulent in any appropriate manner. For example, fraud alert module 110 may compare the transaction information with stored transaction information 116 associated with user 112 B. If, based on the comparison, the received transaction information indicates a transaction that is unusual or not characteristic of user 112 B's regular transactions, fraud alert module 110 may determine that the transaction is potentially fraudulent. If fraud alert module 110 determines that a transaction is potentially fraudulent, fraud alert module 110 may communicate, through network 120 , a message 140 to device 114 . Message 140 may indicate the potentially fraudulent transaction.
- Device 114 may be associated with user 112 B. This disclosure contemplates device 114 being any appropriate device for sending and receiving communications over network 120 .
- device 114 may be a computer, a laptop, a wireless or cellular telephone, an electronic notebook, a personal digital assistant, a tablet, or any other device capable of receiving, processing, storing, and/or communicating information with other components of system 100 .
- Device 114 may also include a user interface, such as a display, a microphone, keypad, or other appropriate terminal equipment usable by user 112 B.
- device 114 may be configured to capture images.
- an application executed by device 114 may perform the functions described herein.
- Device 114 may include a processor 132 , a memory 134 , a camera 136 , input 138 and a display 139 .
- This disclosure contemplates device 114 using one or more of these components to perform the functions and features described herein.
- processor 132 may execute software stored on memory 134 to perform these functions.
- Memory 134 may store information associated with user 112 B. Memory 134 may store user account information 135 associated with user 112 B. User account information 135 may include one or more usernames, password, credit card numbers, expiration dates, and/or any other appropriate information associated with a user account. Memory 134 may also store software 137 executable by processor 132 . Software 137 may include instructions executable by processor 132 to perform any function described herein. For example, software 137 may be executed by processor 132 to initiate a fraud claim.
- Memory 134 may store, either permanently or temporarily, data, operational software, or other information for processor 132 .
- Memory 134 may include any one or a combination of volatile or non-volatile local or remote devices suitable for storing information.
- memory 134 may include random access memory (RAM), read only memory (ROM), magnetic storage devices, optical storage devices, or any other suitable information storage device or a combination of these devices.
- the software represents any suitable set of instructions, logic, or code embodied in a computer-readable storage medium.
- the software may be embodied in memory 134 , a disk, a CD, or a flash drive.
- the software may include an application executable by processor 132 to perform one or more of the functions described herein.
- Processor 132 may be communicatively coupled to memory 134 .
- Processor 132 may execute software stored on memory 134 to perform any of the functions described herein.
- Processor 132 may control the operation and administration of device 114 by processing information received from network 120 and memory 134 .
- processor 132 may receive message 140 , photographs from camera 136 , and input from input 138 .
- Processor 132 may further present information, such as messages and questions, on display 139 .
- processor 132 may present a message indicating that a potentially fraudulent transaction has occurred.
- processor 132 may present questions associated with a fraudulent transaction such as “Is your card still in your possession?”
- Processor 132 may include any hardware and/or software that operates to control and process information.
- Processor 132 may be a programmable logic device, a microcontroller, a microprocessor, any suitable processing device, or any suitable combination of the preceding.
- Camera 136 may be communicatively coupled to processor 132 .
- device 114 may use camera 136 to take photographs.
- user 112 B may use camera 136 to take a photograph of a police report. The police report may then be submitted and/or communicated to help resolve a claim regarding fraudulent activity.
- This disclosure contemplates camera 136 including any appropriate hardware and/or software to take photographs.
- Input 138 may be communicatively coupled to processor 132 .
- Input 138 may be used to receive any appropriate user input.
- user 112 B may use input 138 to confirm that a potentially fraudulent transaction was fraudulent.
- user 112 B may use input 138 to answer a series of questions regarding the transaction.
- Input 138 may include buttons, switches, touch screens, microphones, track balls and/or track pads. This disclosure contemplates input 138 including any appropriate hardware and/or software to receive user input.
- Display 139 may be communicatively coupled to processor 132 .
- Display 139 may be used to present images and/or messages.
- display 139 may present message 140 , a series of questions, and a confirmation message to user 112 B.
- This disclosure contemplates display 139 including any appropriate hardware and/or software to present images and/or messages.
- System 100 may be used to communicate alerts of fraud and to initiate claims regarding fraudulent activity.
- fraud alert module 110 may detect the potentially fraudulent transaction. For example, fraud alert module 110 may compare the transaction information with stored transaction information associated with user 112 B. Fraud alert module 110 may determine, based on the comparison, that the transaction is occurring at a location where user 112 B does not typically conduct transactions or that the transaction involves a dollar amount that is higher than transactions previously made by user 112 B. In response, fraud alert module 110 may communicate a message 140 to device 114 associated with user 112 B. Message 140 may alert user 112 B of the potentially fraudulent transaction. For example, message 140 may contain information associated with the potentially fraudulent transaction such as the name of a store and a dollar value. Device 114 may present message 140 on display 139 .
- User 112 B may use device 114 to confirm that the transaction is fraudulent. User 112 B may use input 138 to indicate whether the transaction is fraudulent or not. As an example, message 140 may include a request for user 112 B to confirm whether the potentially fraudulent transaction is fraudulent. When user 112 B sees message 140 presented on display 139 , user 112 B may press a button or touch a portion of a touch screen to indicate that the transaction is fraudulent.
- User 112 B may use device 114 to initiate a fraud claim.
- the fraud claim may involve filing a report.
- User 112 B may use input 138 to prompt the filing of a report.
- device 114 may present another message to determine whether user 112 B wants to file a report associated with the fraudulent transaction.
- User 112 B may press a button or touch a portion of a touch screen to indicate that the report should be filed.
- device 114 may begin the report filing process.
- device 114 may present on display 139 one or more questions for user 112 B to answer regarding the report. For example, device 114 may present the question “is your card still in your possession?” User 112 B may then use input 138 to respond to the one or more questions. In this manner, device 114 may generate an appropriate report based on user 112 B's responses. As another part of the report filing process, device 114 may allow user 112 B to sign an affidavit associated with the report. For example, device 114 may present an interface that requests user 112 B to swear or affirm that the transaction is fraudulent or that user 112 B will assist with any necessary investigation associated with the transaction. Device 114 may present the affidavit on display 139 .
- Device 114 may present a confirmation message on display 139 after the report has been filed. For example, device 114 may present a message on display 139 that says, “Your report has been filed.”
- device 114 may allow user 112 E to make a telephone call. For example, after device 114 receives message 140 , device 114 may present an option for user 112 B to call support regarding the potentially fraudulent transaction. During the call, user 112 B may gather additional information regarding the transaction that may help user 112 B determine whether a report should be filed.
- Device 114 may allow user 112 B to submit a police report associated with the potentially fraudulent transaction.
- User 112 B may use input 138 to indicate to device 114 that user 112 B will file a police report. After the police report is filed, user 112 B may use camera 136 to take a picture of the police report. Device 114 may then communicate the picture.
- device 114 may receive a request for the police report, and user 112 B may take the picture and device 114 may communicate the picture in response to the request. In this manner, user 112 B may send the police report to help resolve the fraud claim.
- device 114 may receive alerts associated with the report.
- the alert may be a push notification.
- Device 114 may then present the alert on display 139 .
- device 114 may receive an alert that indicates that the report has been received, processed and/or resolved.
- device 114 may receive an alert that indicates the report is incomplete or requires more information.
- user 112 B may use device 114 to view the outcome of any investigation associated with the report or to supply additional information for the report.
- user 112 B may use device 114 to check a balance associated with the user's account and to deposit a check into the user's account. For example, user 112 B may use input 138 to indicate that user 112 B wants to check the balance. In response, device 114 may present the balance on display 139 . As another example, user 112 B may use input 138 to indicate that user 112 B wants to deposit a check. User 112 B may then use camera 136 to take a picture of the check. Device 114 may then communicate the picture to the appropriate institution to deposit the check.
- system 100 may reduce network traffic associated with initiating a claim regarding fraudulent activity.
- system 100 may provide user 112 B a streamlined process for initiating a claim regarding fraudulent activity, thereby reducing the amount of network traffic produced by user 112 B, for example, by needlessly checking for potentially fraudulent transactions or by submitting information associated with the transaction to different institutions.
- system 100 may improve fraud prevention.
- system 100 may prevent user 112 A from using the stolen information multiple times.
- FIGS. 2 through 7 illustrate device 114 initiating a fraud claim.
- using device 114 to initiate a claim regarding fraudulent activity may reduce network traffic associated with such claims and may improve fraud prevention.
- FIG. 2 is an illustration of a device 114 of the system 100 of FIG. 1 .
- device 114 includes input 138 and display 139 .
- Device 114 may present a message 140 on display 139 .
- This disclosure contemplates device 114 displaying any appropriate message 140 on display 139 .
- Device 114 may present message 140 on display 139 in response to receiving message 140 .
- Message 140 may indicate that a questionable transaction has occurred. For example, message 140 may read “a questionable transaction was attempted. (See below). Did you attempt this transaction?” This disclosure contemplates message 140 being any appropriate message to indicate a potentially fraudulent transaction has occurred.
- Device 114 may also present additional information to user 112 B. For example, device 114 may present on display 139 the name of the store at which the transaction was attempted. As another example, device 114 may present a monetary value associated with the transaction. In the example illustrated in FIG. 2 , device 114 is presenting the name of the store and a fifteen dollar value associated with the transaction. In this manner, user 112 E may be presented with information to help determine whether the transaction is fraudulent.
- User 112 B may also use device 114 to indicate whether the transaction is fraudulent. User 112 B may use input 138 to indicate whether the transaction is fraudulent. In the illustrated example of FIG. 2 , device 114 presents on display 139 the two options “Yes” and “No”. User 112 B may use input 138 to select “Yes” if the transaction is fraudulent and “No” if the transaction is not fraudulent.
- device 114 may present on display 139 an option to file a report.
- User 112 B may use input 138 to select the option to file a report. If user 112 B indicates that a report should be filed, device 114 may continue to generate the report. In particular embodiments, device 114 may present the option to file a report in response to user 112 B indicating that the transaction is fraudulent. The report serves as part of the claim regarding fraudulent activity in certain embodiments.
- FIG. 3 is an illustration of a device 114 of the system 100 of FIG. 1 .
- device 114 may present on display 139 one or more questions associated with the transaction.
- Device 114 may use the responses to these questions to generate a report.
- device 114 may present the one or more questions in response to user 112 B indicating that a report should be filed.
- device 114 is presenting the questions “Do you have the card in your possession?”, “Was it lost or stolen?” and “Will you be filing a police report?” As indicated on display 139 , user 112 B has responded that the card is in user 112 B's possession, that it was not lost or stolen, and that user 112 B will be filing a police report. User 112 B may have provided these responses using input 138 . In particular embodiments, device 114 may use these responses to generate a report. This disclosure contemplates device 114 presenting any appropriate question associated with the report and user 112 B supplying any appropriate response.
- Device 114 may provide user 112 B an option to make a telephone call.
- device 114 presents on display 139 an option labeled “call support.”
- User 112 B may select the option to initiate a telephone call with support regarding the transaction. In this manner, user 112 B may gather more information associated with the transaction and/or resolve the transaction.
- This disclosure contemplates device 114 presenting the option to make a telephone call at any appropriate time.
- FIG. 4 is an illustration of a device 114 of the system 100 of FIG. 1 .
- device 114 may present on display 139 an affidavit 410 .
- Affidavit 410 may ask user 112 B to swear or affirm that the transaction is fraudulent and/or that user 112 B will assist with any investigation associated with the transaction.
- device 114 may present affidavit 410 in response to receiving the responses to the one or more questions.
- User 112 B may use input 138 to electronically sign and/or execute the affidavit.
- device 114 may provide a check box and/or a text box through which user 112 B may sign and/or execute affidavit 410 .
- FIG. 5 is an illustration of a device 114 of the system 100 of FIG. 1 .
- device 114 may allow user 112 B to upload an image.
- user 112 B is using device 114 to upload a picture of a police report 510 .
- user 112 E may use camera 136 to take a picture to upload.
- user 112 B may use camera 136 to take a picture of police report 510 and then upload the picture of police report 510 . Uploading the picture of police report 510 may help to resolve the claim regarding fraudulent activity.
- police report 510 may have been filed with the police separately by user 112 B.
- FIG. 6 is an illustration of a device 114 of the system 100 of FIG. 1 .
- device 114 may present on display 139 a confirmation message 610 indicating that a report has been filed.
- device 114 may present confirmation message 610 in response to receiving an indication that affidavit 410 has been electronically signed and/or executed.
- Confirmation message 610 tells user 112 B that the claim regarding fraudulent activity has been initiated and/or that the report has been filed.
- FIG. 7 is a flow chart illustrating a method 700 using the system 100 of FIG. 1 .
- Device 114 may perform method 700 .
- performing method 700 may reduce the network traffic associated with claims regarding fraudulent activity and/or improve fraud prevention.
- Device 114 may begin by receiving a message indicating that a potentially fraudulent transaction has occurred in step 705 .
- Device 114 may present the message on a display to alert a user about the transaction.
- device 114 may determine whether the transaction is fraudulent. In particular embodiments, device 114 may make this determination based on input from the user. For example, the user may press a button or touch a portion of a touch screen to indicate whether the transaction is fraudulent or not. If device 114 determines that the transaction is not fraudulent, method 700 ends. If device 114 determines that the transaction is fraudulent, device 114 may continue to step 715 to determine whether a report should be filed. In particular embodiments, device 114 may determine whether a report should be filed based on input from a user. If device 114 determines that the report should not be filed, method 700 ends.
- device 114 may present a plurality of questions on a display in step 720 . The user may provide answers to these questions and device 114 may use these answers to generate the report. In step 725 , device 114 may receive a plurality of answers to the questions. Device 114 may then continue to present an affidavit on the display in step 730 . The user may sign and/or execute the affidavit and device 114 may receive the signature in step 735 . In response to receiving the answers and the signature, device 114 may generate and file the report in step 740 . After the report is filed, device 114 may present a confirmation message in step 745 .
Landscapes
- Business, Economics & Management (AREA)
- Engineering & Computer Science (AREA)
- Accounting & Taxation (AREA)
- Physics & Mathematics (AREA)
- Strategic Management (AREA)
- General Business, Economics & Management (AREA)
- General Physics & Mathematics (AREA)
- Theoretical Computer Science (AREA)
- Finance (AREA)
- Computer Security & Cryptography (AREA)
- Microelectronics & Electronic Packaging (AREA)
- Computer Networks & Wireless Communication (AREA)
- Alarm Systems (AREA)
Abstract
Description
- This disclosure relates to a system for investigating fraudulent activity.
- The growth in use of credit and debit cards has been met with a rise in fraud and theft. To improve the customer experience, merchants often relax security standards during transactions. As an example, a merchant may require only a credit card number, expiration date, and security code, but not evidence of possession of the actual credit card before allowing a transaction. As a result, a user may possess the physical credit card even though information associated with the credit card has been stolen.
- In accordance with the present disclosure, disadvantages and problems associated with investigating fraudulent activities may be reduced or eliminated.
- According to one embodiment, an apparatus comprising a memory and a processor is provided. The memory is operable to store information associated with a user account. The processor is communicatively coupled to the memory and is operable to receive a message indicating that a transaction associated with a card has occurred. In response to the message, the processor can receive a first input indicating that the transaction is fraudulent. The processor can receive a second input indicating that a report should be filed and in response to receiving the second input, present, on a display, a plurality of questions to determine whether the card has been stolen. The processor can receive a third input indicating an answer to each of the plurality of questions and in response to receiving the third input, present, on the display, an affidavit. The processor can receive a fourth input indicating the affidavit has been electronically signed and in response to receiving the fourth input, present, on the display, a confirmation message indicating that the report has been filed.
- Technical advantages of certain embodiments of the present disclosure include reducing network traffic and improved fraud prevention. Other technical advantages will be readily apparent to one skilled in the art from the following figures, descriptions, and claims. Moreover, while specific advantages have been enumerated above, various embodiments may include all, some or none of the enumerated advantages.
- For a more complete understanding of the present disclosure and its advantages, reference is now made to the following description, taken in conjunction with the accompanying drawings, in which:
-
FIG. 1 is a schematic diagram of one embodiment of a system for initiating a fraud claim; -
FIG. 2 is an illustration of an interface of a device of the system ofFIG. 1 ; -
FIG. 3 is an illustration of an interface of a device of the system ofFIG. 1 ; -
FIG. 4 is an illustration of an interface of a device of the system ofFIG. 1 ; -
FIG. 5 is an illustration of an interface of a device of the system ofFIG. 1 ; -
FIG. 6 is an illustration of an interface of a device of the system ofFIG. 1 ; and -
FIG. 7 is a flowchart illustrating a method using the system ofFIG. 1 . - Embodiments of the present invention and its advantages are best understood by referring to
FIGS. 1 through 7 , like numerals being used for like and corresponding parts of the various drawings. - The growth in use of credit and debit cards has been met with a rise in fraud and theft. To improve the customer experience, merchants often relax security standards during transactions. As an example, a merchant may require only a credit card number, expiration date and security code but not evidence of possession of the actual credit card before allowing a transaction. As a result, a user may possess the physical credit card even though information associated with the credit card has been stolen.
- The described system alerts a user on a device when a potentially fraudulent transaction has occurred or is occurring. The user may then use the device to alert the appropriate institution of the fraud and to initiate a fraud claim. In this manner, the device may reduce network traffic associated with fraud alerts and fraud claims. An example embodiment of the proposed system is illustrated in
FIG. 1 . -
FIG. 1 is a schematic diagram of one embodiment of asystem 100 for initiating a fraud claim. As illustrated inFIG. 1 ,system 100 includes afraud alert module 110,device 114 andnetwork 120. Auser 112A may be performing a transaction and auser 112B may be associated withdevice 114.Device 114 may alertuser 112B of a potentially fraudulent transaction anduser 112B may usedevice 114 to initiate a fraud claim. - In an embodiment,
user 112A may have stolen the information associated withuser 112B and uses that information to perform a transaction. For example,user 112A may have stolen the credit card or debit card information ofuser 112B and attempts to make an online purchase using that information. In some instances, the purchase byuser 112A may be approved anduser 112B will be asked to pay for the purchase. In response to being asked to pay for the purchase,user 112B may usedevice 114 to initiate a fraud claim and/or challenge the transaction. In other instances,user 112B may be asked to verify the transaction before the purchase is approved.System 100 may provideuser 112B a way to verify the transaction and to initiate a fraud claim. - The transaction information is communicated through
network 120.Network 120 may facilitate communication amongst the components ofsystem 100, includingfraud alert module 110 anddevice 114. This disclosure contemplates anysuitable network 120 operable to facilitate communication between the components ofsystem 100.Network 120 may include any interconnecting system capable of transmitting audio, video, signals, data, messages, or any combination of the preceding.Network 120 may include all or a portion of a public switched telephone network (PSTN), a public or private data network, a local area network (LAN), a metropolitan area network (MAN), a wide area network (WAN), a local, regional, or global communication or computer network, such as the Internet, a wireline or wireless network, an enterprise intranet, or any other suitable communication link, including combinations thereof, operable to facilitate communication between the components. -
Fraud alert module 110 may receive the transaction information and may determine whether the transaction is potentially fraudulent.Fraud alert module 110 may include aprocessor 111, a memory 115 and any other appropriate hardware and/or software to determine whether a transaction is potentially fraudulent.Processor 111 and memory 115 may be similar and/or analogous toprocessor 132 andmemory 134. This disclosure contemplatesfraud alert module 110 determining whether a transaction is potentially fraudulent in any appropriate manner. For example,fraud alert module 110 may compare the transaction information withstored transaction information 116 associated withuser 112B. If, based on the comparison, the received transaction information indicates a transaction that is unusual or not characteristic ofuser 112B's regular transactions,fraud alert module 110 may determine that the transaction is potentially fraudulent. Iffraud alert module 110 determines that a transaction is potentially fraudulent,fraud alert module 110 may communicate, throughnetwork 120, amessage 140 todevice 114.Message 140 may indicate the potentially fraudulent transaction. -
Device 114 may be associated withuser 112B. This disclosure contemplatesdevice 114 being any appropriate device for sending and receiving communications overnetwork 120. As an example and not by way of limitation,device 114 may be a computer, a laptop, a wireless or cellular telephone, an electronic notebook, a personal digital assistant, a tablet, or any other device capable of receiving, processing, storing, and/or communicating information with other components ofsystem 100.Device 114 may also include a user interface, such as a display, a microphone, keypad, or other appropriate terminal equipment usable byuser 112B. In particular embodiments,device 114 may be configured to capture images. In some embodiments, an application executed bydevice 114 may perform the functions described herein. -
Device 114 may include aprocessor 132, amemory 134, acamera 136,input 138 and adisplay 139. This disclosure contemplatesdevice 114 using one or more of these components to perform the functions and features described herein. For example,processor 132 may execute software stored onmemory 134 to perform these functions. -
Memory 134 may store information associated withuser 112B.Memory 134 may storeuser account information 135 associated withuser 112B.User account information 135 may include one or more usernames, password, credit card numbers, expiration dates, and/or any other appropriate information associated with a user account.Memory 134 may also storesoftware 137 executable byprocessor 132.Software 137 may include instructions executable byprocessor 132 to perform any function described herein. For example,software 137 may be executed byprocessor 132 to initiate a fraud claim. -
Memory 134 may store, either permanently or temporarily, data, operational software, or other information forprocessor 132.Memory 134 may include any one or a combination of volatile or non-volatile local or remote devices suitable for storing information. For example,memory 134 may include random access memory (RAM), read only memory (ROM), magnetic storage devices, optical storage devices, or any other suitable information storage device or a combination of these devices. The software represents any suitable set of instructions, logic, or code embodied in a computer-readable storage medium. For example, the software may be embodied inmemory 134, a disk, a CD, or a flash drive. In particular embodiments, the software may include an application executable byprocessor 132 to perform one or more of the functions described herein. -
Processor 132 may be communicatively coupled tomemory 134.Processor 132 may execute software stored onmemory 134 to perform any of the functions described herein.Processor 132 may control the operation and administration ofdevice 114 by processing information received fromnetwork 120 andmemory 134. For example,processor 132 may receivemessage 140, photographs fromcamera 136, and input frominput 138.Processor 132 may further present information, such as messages and questions, ondisplay 139. For example,processor 132 may present a message indicating that a potentially fraudulent transaction has occurred. As another example,processor 132 may present questions associated with a fraudulent transaction such as “Is your card still in your possession?”Processor 132 may include any hardware and/or software that operates to control and process information.Processor 132 may be a programmable logic device, a microcontroller, a microprocessor, any suitable processing device, or any suitable combination of the preceding. -
Camera 136 may be communicatively coupled toprocessor 132. In particular embodiments,device 114 may usecamera 136 to take photographs. For example,user 112B may usecamera 136 to take a photograph of a police report. The police report may then be submitted and/or communicated to help resolve a claim regarding fraudulent activity. This disclosure contemplatescamera 136 including any appropriate hardware and/or software to take photographs. - Input 138 may be communicatively coupled to
processor 132. Input 138 may be used to receive any appropriate user input. For example,user 112B may useinput 138 to confirm that a potentially fraudulent transaction was fraudulent. As another example,user 112B may useinput 138 to answer a series of questions regarding the transaction. Input 138 may include buttons, switches, touch screens, microphones, track balls and/or track pads. This disclosure contemplatesinput 138 including any appropriate hardware and/or software to receive user input. -
Display 139 may be communicatively coupled toprocessor 132.Display 139 may be used to present images and/or messages. For example,display 139 may presentmessage 140, a series of questions, and a confirmation message touser 112B. This disclosure contemplatesdisplay 139 including any appropriate hardware and/or software to present images and/or messages. -
System 100 may be used to communicate alerts of fraud and to initiate claims regarding fraudulent activity. In operation, whenuser 112A attempts a transaction using stolen information,fraud alert module 110 may detect the potentially fraudulent transaction. For example,fraud alert module 110 may compare the transaction information with stored transaction information associated withuser 112B.Fraud alert module 110 may determine, based on the comparison, that the transaction is occurring at a location whereuser 112B does not typically conduct transactions or that the transaction involves a dollar amount that is higher than transactions previously made byuser 112B. In response,fraud alert module 110 may communicate amessage 140 todevice 114 associated withuser 112B.Message 140 may alertuser 112B of the potentially fraudulent transaction. For example,message 140 may contain information associated with the potentially fraudulent transaction such as the name of a store and a dollar value.Device 114 may presentmessage 140 ondisplay 139. -
User 112B may usedevice 114 to confirm that the transaction is fraudulent.User 112B may useinput 138 to indicate whether the transaction is fraudulent or not. As an example,message 140 may include a request foruser 112B to confirm whether the potentially fraudulent transaction is fraudulent. Whenuser 112B seesmessage 140 presented ondisplay 139,user 112B may press a button or touch a portion of a touch screen to indicate that the transaction is fraudulent. -
User 112B may usedevice 114 to initiate a fraud claim. The fraud claim may involve filing a report.User 112B may useinput 138 to prompt the filing of a report. As an example, afteruser 112B indicates that the transaction is fraudulent,device 114 may present another message to determine whetheruser 112B wants to file a report associated with the fraudulent transaction.User 112B may press a button or touch a portion of a touch screen to indicate that the report should be filed. Afteruser 112B indicates that the report should be filed,device 114 may begin the report filing process. - As part of the report filing process,
device 114 may present ondisplay 139 one or more questions foruser 112B to answer regarding the report. For example,device 114 may present the question “is your card still in your possession?”User 112B may then useinput 138 to respond to the one or more questions. In this manner,device 114 may generate an appropriate report based onuser 112B's responses. As another part of the report filing process,device 114 may allowuser 112B to sign an affidavit associated with the report. For example,device 114 may present an interface that requestsuser 112B to swear or affirm that the transaction is fraudulent or thatuser 112B will assist with any necessary investigation associated with the transaction.Device 114 may present the affidavit ondisplay 139.User 112B may useinput 138 to electronically sign the affidavit.Device 114 may present a confirmation message ondisplay 139 after the report has been filed. For example,device 114 may present a message ondisplay 139 that says, “Your report has been filed.” - In particular embodiments,
device 114 may allow user 112E to make a telephone call. For example, afterdevice 114 receivesmessage 140,device 114 may present an option foruser 112B to call support regarding the potentially fraudulent transaction. During the call,user 112B may gather additional information regarding the transaction that may helpuser 112B determine whether a report should be filed. -
Device 114 may allowuser 112B to submit a police report associated with the potentially fraudulent transaction.User 112B may useinput 138 to indicate todevice 114 thatuser 112B will file a police report. After the police report is filed,user 112B may usecamera 136 to take a picture of the police report.Device 114 may then communicate the picture. In particular embodiments,device 114 may receive a request for the police report, anduser 112B may take the picture anddevice 114 may communicate the picture in response to the request. In this manner,user 112B may send the police report to help resolve the fraud claim. - After the report has been filed,
device 114 may receive alerts associated with the report. In particular embodiments, the alert may be a push notification.Device 114 may then present the alert ondisplay 139. For example,device 114 may receive an alert that indicates that the report has been received, processed and/or resolved. As another example,device 114 may receive an alert that indicates the report is incomplete or requires more information. Whenuser 112B sees the alert,user 112B may usedevice 114 to view the outcome of any investigation associated with the report or to supply additional information for the report. - Additionally,
user 112B may usedevice 114 to check a balance associated with the user's account and to deposit a check into the user's account. For example,user 112B may useinput 138 to indicate thatuser 112B wants to check the balance. In response,device 114 may present the balance ondisplay 139. As another example,user 112B may useinput 138 to indicate thatuser 112B wants to deposit a check.User 112B may then usecamera 136 to take a picture of the check.Device 114 may then communicate the picture to the appropriate institution to deposit the check. - In particular embodiments,
system 100 may reduce network traffic associated with initiating a claim regarding fraudulent activity. For example,system 100 may provideuser 112B a streamlined process for initiating a claim regarding fraudulent activity, thereby reducing the amount of network traffic produced byuser 112B, for example, by needlessly checking for potentially fraudulent transactions or by submitting information associated with the transaction to different institutions. In certain embodiments,system 100 may improve fraud prevention. For example,system 100 may preventuser 112A from using the stolen information multiple times. -
FIGS. 2 through 7 illustratedevice 114 initiating a fraud claim. In particular embodiments, usingdevice 114 to initiate a claim regarding fraudulent activity may reduce network traffic associated with such claims and may improve fraud prevention. -
FIG. 2 is an illustration of adevice 114 of thesystem 100 ofFIG. 1 . As shown,device 114 includesinput 138 anddisplay 139.Device 114 may present amessage 140 ondisplay 139. This disclosure contemplatesdevice 114 displaying anyappropriate message 140 ondisplay 139. -
Device 114 may presentmessage 140 ondisplay 139 in response to receivingmessage 140.Message 140 may indicate that a questionable transaction has occurred. For example,message 140 may read “a questionable transaction was attempted. (See below). Did you attempt this transaction?” This disclosure contemplatesmessage 140 being any appropriate message to indicate a potentially fraudulent transaction has occurred. -
Device 114 may also present additional information touser 112B. For example,device 114 may present ondisplay 139 the name of the store at which the transaction was attempted. As another example,device 114 may present a monetary value associated with the transaction. In the example illustrated inFIG. 2 ,device 114 is presenting the name of the store and a fifteen dollar value associated with the transaction. In this manner, user 112E may be presented with information to help determine whether the transaction is fraudulent. -
User 112B may also usedevice 114 to indicate whether the transaction is fraudulent.User 112B may useinput 138 to indicate whether the transaction is fraudulent. In the illustrated example ofFIG. 2 ,device 114 presents ondisplay 139 the two options “Yes” and “No”.User 112B may useinput 138 to select “Yes” if the transaction is fraudulent and “No” if the transaction is not fraudulent. - Furthermore,
device 114 may present ondisplay 139 an option to file a report.User 112B may useinput 138 to select the option to file a report. Ifuser 112B indicates that a report should be filed,device 114 may continue to generate the report. In particular embodiments,device 114 may present the option to file a report in response touser 112B indicating that the transaction is fraudulent. The report serves as part of the claim regarding fraudulent activity in certain embodiments. -
FIG. 3 is an illustration of adevice 114 of thesystem 100 ofFIG. 1 . As illustrated inFIG. 3 ,device 114 may present ondisplay 139 one or more questions associated with the transaction.Device 114 may use the responses to these questions to generate a report. In particular embodiments,device 114 may present the one or more questions in response touser 112B indicating that a report should be filed. - In the illustrated example of
FIG. 3 ,device 114 is presenting the questions “Do you have the card in your possession?”, “Was it lost or stolen?” and “Will you be filing a police report?” As indicated ondisplay 139,user 112B has responded that the card is inuser 112B's possession, that it was not lost or stolen, and thatuser 112B will be filing a police report.User 112B may have provided theseresponses using input 138. In particular embodiments,device 114 may use these responses to generate a report. This disclosure contemplatesdevice 114 presenting any appropriate question associated with the report anduser 112B supplying any appropriate response. -
Device 114 may provideuser 112B an option to make a telephone call. In the illustrated example ofFIG. 3 ,device 114 presents ondisplay 139 an option labeled “call support.”User 112B may select the option to initiate a telephone call with support regarding the transaction. In this manner,user 112B may gather more information associated with the transaction and/or resolve the transaction. This disclosure contemplatesdevice 114 presenting the option to make a telephone call at any appropriate time. -
FIG. 4 is an illustration of adevice 114 of thesystem 100 ofFIG. 1 . As shown inFIG. 4 ,device 114 may present ondisplay 139 anaffidavit 410.Affidavit 410 may askuser 112B to swear or affirm that the transaction is fraudulent and/or thatuser 112B will assist with any investigation associated with the transaction. In particular embodiments,device 114 may presentaffidavit 410 in response to receiving the responses to the one or more questions.User 112B may useinput 138 to electronically sign and/or execute the affidavit. As shown inFIG. 4 ,device 114 may provide a check box and/or a text box through whichuser 112B may sign and/or executeaffidavit 410. -
FIG. 5 is an illustration of adevice 114 of thesystem 100 ofFIG. 1 . As shown inFIG. 5 ,device 114 may allowuser 112B to upload an image. In the illustrated example ofFIG. 5 ,user 112B is usingdevice 114 to upload a picture of apolice report 510. In particular embodiments, user 112E may usecamera 136 to take a picture to upload. For example,user 112B may usecamera 136 to take a picture ofpolice report 510 and then upload the picture ofpolice report 510. Uploading the picture ofpolice report 510 may help to resolve the claim regarding fraudulent activity. In particular embodiments,police report 510 may have been filed with the police separately byuser 112B. -
FIG. 6 is an illustration of adevice 114 of thesystem 100 ofFIG. 1 . As shown inFIG. 6 ,device 114 may present on display 139 aconfirmation message 610 indicating that a report has been filed. ln particular embodiments,device 114 may presentconfirmation message 610 in response to receiving an indication thataffidavit 410 has been electronically signed and/or executed.Confirmation message 610 tellsuser 112B that the claim regarding fraudulent activity has been initiated and/or that the report has been filed. -
FIG. 7 is a flow chart illustrating amethod 700 using thesystem 100 ofFIG. 1 .Device 114 may performmethod 700. In particular embodiments, performingmethod 700 may reduce the network traffic associated with claims regarding fraudulent activity and/or improve fraud prevention. -
Device 114 may begin by receiving a message indicating that a potentially fraudulent transaction has occurred instep 705.Device 114 may present the message on a display to alert a user about the transaction. Instep 710,device 114 may determine whether the transaction is fraudulent. In particular embodiments,device 114 may make this determination based on input from the user. For example, the user may press a button or touch a portion of a touch screen to indicate whether the transaction is fraudulent or not. Ifdevice 114 determines that the transaction is not fraudulent,method 700 ends. Ifdevice 114 determines that the transaction is fraudulent,device 114 may continue to step 715 to determine whether a report should be filed. In particular embodiments,device 114 may determine whether a report should be filed based on input from a user. Ifdevice 114 determines that the report should not be filed,method 700 ends. - If
device 114 determines that a report should be filed,device 114 may present a plurality of questions on a display instep 720. The user may provide answers to these questions anddevice 114 may use these answers to generate the report. Instep 725,device 114 may receive a plurality of answers to the questions.Device 114 may then continue to present an affidavit on the display instep 730. The user may sign and/or execute the affidavit anddevice 114 may receive the signature instep 735. In response to receiving the answers and the signature,device 114 may generate and file the report instep 740. After the report is filed,device 114 may present a confirmation message instep 745. - Although the present disclosure includes several embodiments, changes, substitutions, variations, alterations, transformations, and modifications may be suggested to one skilled in the art, and it is intended that the present disclosure encompass such changes, substitutions, variations, alterations, transformations, and modifications as fall within the spirit and scope of the appended claims.
Claims (21)
Priority Applications (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US14/481,463 US9280774B1 (en) | 2014-09-09 | 2014-09-09 | System and method for investigating fraudulent activity |
US14/987,997 US9466059B2 (en) | 2014-09-09 | 2016-01-05 | System and method for investigating fraudulent activity |
US14/987,961 US9547863B2 (en) | 2014-09-09 | 2016-01-05 | System and method for investigating fraudulent activity |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US14/481,463 US9280774B1 (en) | 2014-09-09 | 2014-09-09 | System and method for investigating fraudulent activity |
Related Child Applications (2)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US14/987,961 Continuation US9547863B2 (en) | 2014-09-09 | 2016-01-05 | System and method for investigating fraudulent activity |
US14/987,997 Continuation US9466059B2 (en) | 2014-09-09 | 2016-01-05 | System and method for investigating fraudulent activity |
Publications (2)
Publication Number | Publication Date |
---|---|
US9280774B1 US9280774B1 (en) | 2016-03-08 |
US20160071106A1 true US20160071106A1 (en) | 2016-03-10 |
Family
ID=55410477
Family Applications (3)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US14/481,463 Active US9280774B1 (en) | 2014-09-09 | 2014-09-09 | System and method for investigating fraudulent activity |
US14/987,961 Active US9547863B2 (en) | 2014-09-09 | 2016-01-05 | System and method for investigating fraudulent activity |
US14/987,997 Active US9466059B2 (en) | 2014-09-09 | 2016-01-05 | System and method for investigating fraudulent activity |
Family Applications After (2)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US14/987,961 Active US9547863B2 (en) | 2014-09-09 | 2016-01-05 | System and method for investigating fraudulent activity |
US14/987,997 Active US9466059B2 (en) | 2014-09-09 | 2016-01-05 | System and method for investigating fraudulent activity |
Country Status (1)
Country | Link |
---|---|
US (3) | US9280774B1 (en) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US11610200B2 (en) | 2021-02-26 | 2023-03-21 | Double Check Solutions, Llc | Alert management system with real-time remediation and integration with the exception originating system |
US11615420B1 (en) | 2022-07-08 | 2023-03-28 | Double Check Solutions, Inc. | Alert management system with real-time remediation and integration with the overdraft allowance originating system |
US11935063B1 (en) * | 2022-07-08 | 2024-03-19 | Double Check Solutions, Inc. | Fraud alert management system with real-time remediation and integration with the originating system |
Families Citing this family (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US12125039B2 (en) | 2016-03-25 | 2024-10-22 | State Farm Mutual Automobile Insurance Company | Reducing false positives using customer data and machine learning |
US11334894B1 (en) | 2016-03-25 | 2022-05-17 | State Farm Mutual Automobile Insurance Company | Identifying false positive geolocation-based fraud alerts |
US10565573B2 (en) * | 2016-05-10 | 2020-02-18 | Visa International Service Association | Reported location correction system |
CN107368962B (en) * | 2017-07-13 | 2021-06-01 | 上海文沥信息技术有限公司 | Automatic credit investigation method and system for enterprise transaction |
US11681966B2 (en) | 2021-02-24 | 2023-06-20 | Fannie Mae | Systems and methods for enhanced risk identification based on textual analysis |
Family Cites Families (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7451113B1 (en) * | 2003-03-21 | 2008-11-11 | Mighty Net, Inc. | Card management system and method |
US7870066B2 (en) * | 2003-06-06 | 2011-01-11 | Ebay Inc. | Automatic dispute resolution |
US20080288299A1 (en) * | 2006-10-31 | 2008-11-20 | Genmobi Technologies, Inc. | System and method for user identity validation for online transactions |
US8478692B2 (en) * | 2008-06-26 | 2013-07-02 | Visa International Service Association | Systems and methods for geographic location notifications of payment transactions |
US8370265B2 (en) * | 2008-11-08 | 2013-02-05 | Fonwallet Transaction Solutions, Inc. | System and method for managing status of a payment instrument |
US20100280914A1 (en) * | 2009-05-04 | 2010-11-04 | Mark Carlson | Security system and method including alert messages |
US20110004498A1 (en) * | 2009-07-01 | 2011-01-06 | International Business Machines Corporation | Method and System for Identification By A Cardholder of Credit Card Fraud |
US8781963B1 (en) * | 2010-04-16 | 2014-07-15 | Jpmorgan Chase Bank, N.A. | Systems and methods for providing a mobile financial platform |
US8782217B1 (en) * | 2010-11-10 | 2014-07-15 | Safetyweb, Inc. | Online identity management |
US9098842B2 (en) * | 2012-02-27 | 2015-08-04 | American Express Travel Related Services Company, Inc. | Smart phone system and method |
US20140006275A1 (en) * | 2012-06-28 | 2014-01-02 | Bank Of America Corporation | Electronic identification and notification of banking record discrepancies |
-
2014
- 2014-09-09 US US14/481,463 patent/US9280774B1/en active Active
-
2016
- 2016-01-05 US US14/987,961 patent/US9547863B2/en active Active
- 2016-01-05 US US14/987,997 patent/US9466059B2/en active Active
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US11610200B2 (en) | 2021-02-26 | 2023-03-21 | Double Check Solutions, Llc | Alert management system with real-time remediation and integration with the exception originating system |
US12020245B2 (en) | 2021-02-26 | 2024-06-25 | Double Check Solutions, Inc. | Alert management system with real-time remediation and integration with the exception originating system |
US11615420B1 (en) | 2022-07-08 | 2023-03-28 | Double Check Solutions, Inc. | Alert management system with real-time remediation and integration with the overdraft allowance originating system |
US11935063B1 (en) * | 2022-07-08 | 2024-03-19 | Double Check Solutions, Inc. | Fraud alert management system with real-time remediation and integration with the originating system |
Also Published As
Publication number | Publication date |
---|---|
US9466059B2 (en) | 2016-10-11 |
US20160132888A1 (en) | 2016-05-12 |
US9547863B2 (en) | 2017-01-17 |
US9280774B1 (en) | 2016-03-08 |
US20160132882A1 (en) | 2016-05-12 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US9466059B2 (en) | System and method for investigating fraudulent activity | |
US11151546B2 (en) | Trigger peer to peer payment with financial cards and phone camera | |
US11468696B2 (en) | Systems and methods for imaging identification information | |
US11605060B1 (en) | System and method for mobile check deposit with restricted endorsement | |
US20180315046A1 (en) | Apparatus and method for providing transaction security and/or account security | |
US20160086187A1 (en) | Apparatus and method for providing transaction security and/or account security | |
US11803835B2 (en) | Methods and systems for displaying account information | |
US20160098709A1 (en) | Atm with dual display having privacy filter | |
US20160098692A1 (en) | Method for processing transaction statement inquiries via an atm | |
US20200013046A1 (en) | Apparatus and method for providing transaction security and/or account security | |
US20150310419A1 (en) | Cardless point-of-sale payment method | |
US20160098700A1 (en) | Method for providing privacy through atm communication to consumer devices | |
US10453128B2 (en) | System and method for processing loan applications | |
US20150142647A1 (en) | Consumer Bill-Pay | |
US20170109741A1 (en) | Tokenization of Financial Account Information for Use in Transactions | |
US20170109736A1 (en) | Tokenization of financial account information for use in transactions | |
US20150149337A1 (en) | Apparatus, method, system, and storage medium | |
US20170109747A1 (en) | Telephone-Based Payments Using Tokens | |
US20140372307A1 (en) | Apparatus and method for providing transaction security and/or account security | |
US20140372306A1 (en) | Apparatus and method for providing transaction security and/or account security | |
US20180276669A1 (en) | Fraud Remedy Tool | |
JP2021026382A (en) | Loan system, loan program and loan method | |
CN109543562A (en) | Identity identifying method, insurance institution's server and the terminal of insured people | |
US20160253643A1 (en) | Method of completing a purchase transaction | |
US20140372312A1 (en) | Apparatus and method for providing transaction security and/or account security |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AS | Assignment |
Owner name: BANK OF AMERICA CORPORATION, NORTH CAROLINA Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:CHOUDHURI, SOMNATH;GOLDBERG, ADAM D.;HANSEN, MATTHEW;AND OTHERS;SIGNING DATES FROM 20140806 TO 20140909;REEL/FRAME:033702/0862 |
|
STCF | Information on status: patent grant |
Free format text: PATENTED CASE |
|
MAFP | Maintenance fee payment |
Free format text: PAYMENT OF MAINTENANCE FEE, 4TH YEAR, LARGE ENTITY (ORIGINAL EVENT CODE: M1551); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY Year of fee payment: 4 |
|
MAFP | Maintenance fee payment |
Free format text: PAYMENT OF MAINTENANCE FEE, 8TH YEAR, LARGE ENTITY (ORIGINAL EVENT CODE: M1552); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY Year of fee payment: 8 |