ARTICLE AND METHOD FOR TRANSACTION IRREGULARITY DETECTION
First Claim
1. A method for irregularity detection within a previous security-device transaction between a security-device and a previous device, comprising:
- receiving a last-reported transaction counter value associated with a last-reported security-device transaction with the security-device;
receiving a previous device identifier associated with the previous security-device transaction with the security-device;
receiving a currently-reported transaction counter value associated with a current security-device transaction with the security-device; and
associating an irregularity with the previous device if the current transaction counter value differs from the last-reported transaction counter value by other than an increment.
10 Assignments
0 Petitions
Accused Products
Abstract
Articles and methods for transaction irregularity detection are disclosed. In one example, the article discloses: a memory including a record of a last-reported security-device transaction with the security-device, and including a last-reported transaction counter value associated with the last-reported security-device transaction; a previous device identifier; a record of the previous security-device transaction with the security-device, and including the previous device identifier associated with the previous security-device transaction; a record of a current security-device transaction with the security-device, and including a currently-reported transaction counter value associated with the current security-device transaction; and a back-end device tagging the previous device with fraud if the current transaction counter value differs from the last-reported transaction counter value by other than an increment. In one example, the method discloses: a transaction irregularity detection process based on the article.
-
Citations
20 Claims
-
1. A method for irregularity detection within a previous security-device transaction between a security-device and a previous device, comprising:
-
receiving a last-reported transaction counter value associated with a last-reported security-device transaction with the security-device; receiving a previous device identifier associated with the previous security-device transaction with the security-device; receiving a currently-reported transaction counter value associated with a current security-device transaction with the security-device; and associating an irregularity with the previous device if the current transaction counter value differs from the last-reported transaction counter value by other than an increment. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. An article for fraud detection, within a previous security-device transaction between a security-device and a previous device comprising:
-
a memory including a record of a last-reported security-device transaction with the security-device, and including a last-reported transaction counter value associated with the last-reported security-device transaction; wherein the previous device includes a previous device identifier; the memory including a record of the previous security-device transaction with the security-device, and including the previous device identifier associated with the previous security-device transaction; the memory including a record of a current security-device transaction with the security-device, and including a currently-reported transaction counter value associated with the current security-device transaction; and a back-end device tagging the previous device with fraud if the current transaction counter value differs from the last-reported transaction counter value by other than an increment. - View Dependent Claims (11)
-
-
12. An article for facilitating fraud detection by a backend, comprising:
-
a memory for storing a previous-transactional-device identifier associated with a previous transaction between the article and a previous device; a transaction counter having a transaction counter value that is set to change by an increment in response to the previous transaction; the memory for storing a current-transactional-device identifier associated with a current transaction between the article and a current device; wherein the transaction counter is set to change by the increment in response to the current transaction; and a transaction value module configured to transmit the transaction counter value, the previous-transactional-device identifier, and the current-transactional-device identifier to the backend in response to a commit message. - View Dependent Claims (13, 14, 15, 16, 17, 18, 19, 20)
-
Specification