SYSTEMS AND METHODS FOR PROVIDING FRAUD INDICATOR DATA WITHIN AN AUTHENTICATION PROTOCOL
First Claim
1. A computing device for providing fraud indicator data within an authentication system including an authentication protocol, said computing device comprising a processor communicatively coupled to a memory, said computing device programmed to:
- identify fraud feature data associated with a payment card transaction, wherein the payment card transaction includes a suspect consumer presenting a payment card from a digital wallet of a privileged cardholder;
compute a first risk score for the payment card transaction based at least in part on the fraud feature data;
generate a message in the authentication protocol, the message including at least one extension field, wherein the first risk score is included within the at least one extension field; and
transmit the message with the first risk score included within the at least one extension field to a party associated with the payment card transaction for use during authentication of the payment card transaction.
1 Assignment
0 Petitions
Accused Products
Abstract
A computing device for providing fraud indicator data within an authentication system including an authentication protocol is provided herein. The computing device includes a processor communicatively coupled to a memory. The computing device is programmed to identify fraud feature data associated with a payment card transaction. The transaction includes a suspect consumer presenting a payment card from a digital wallet of a privileged cardholder. The computing device is further programmed to compute a first risk score for the transaction based at least in part on the fraud feature data. The computing device is also programmed to generate a message in the authentication protocol, the message including at least one extension field. The first risk score is included within the extension field. The computing device is still further programmed to transmit the message with the first risk score to a party associated with the transaction for use during authentication of the transaction.
-
Citations
21 Claims
-
1. A computing device for providing fraud indicator data within an authentication system including an authentication protocol, said computing device comprising a processor communicatively coupled to a memory, said computing device programmed to:
-
identify fraud feature data associated with a payment card transaction, wherein the payment card transaction includes a suspect consumer presenting a payment card from a digital wallet of a privileged cardholder; compute a first risk score for the payment card transaction based at least in part on the fraud feature data; generate a message in the authentication protocol, the message including at least one extension field, wherein the first risk score is included within the at least one extension field; and transmit the message with the first risk score included within the at least one extension field to a party associated with the payment card transaction for use during authentication of the payment card transaction. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A computer-based method for providing fraud indicator data within an authentication system including an authentication protocol, the method implemented using a computer device including a processor and a memory, said method comprising:
-
identifying fraud feature data associated with a payment card transaction, wherein the payment card transaction includes a suspect consumer presenting a payment card from a digital wallet of a privileged cardholder; computing a first risk score for the payment card transaction based at least in part on the fraud feature data; generating a message in the authentication protocol, the message including at least one extension field, wherein the first risk score is included within the at least one extension field; and transmitting the message with the first risk score included within the at least one extension field to a party associated with the payment card transaction for use during authentication of the payment card transaction. - View Dependent Claims (9, 10, 11, 12, 13, 14)
-
-
15. At least one non-transitory computer-readable storage media having computer-executable instructions embodied thereon, wherein when executed by at least one processor, the computer-executable instructions cause the processor to:
-
identify fraud feature data associated with a payment card transaction, wherein the payment card transaction includes a suspect consumer presenting a payment card from a digital wallet of a privileged cardholder; compute a first risk score for the payment card transaction based at least in part on the fraud feature data; generate a message in the authentication protocol, the message including at least one extension field, wherein the first risk score is included within the at least one extension field; and transmit the message with the first risk score included within the at least one extension field to a party associated with the payment card transaction for use during authentication of the payment card transaction. - View Dependent Claims (16, 17, 18, 19, 20, 21)
-
Specification