SYSTEMS AND METHODS FOR DETERMINING FRAUDULENT TRANSACTIONS USING DIGITAL WALLET DATA
First Claim
1. A computing device for risk-based analysis of a payment card transaction, said computing device comprising a processor communicatively coupled to a memory, said computing device programmed to:
- receive a request for authentication of the payment card transaction, wherein the payment card transaction includes a suspect consumer presenting a payment card from a digital wallet of a privileged cardholder;
identify fraud feature data from the digital wallet;
compute a fraud score for the payment card transaction based at least in part on the fraud feature data; and
provide the fraud score for use during authentication of the suspect consumer.
1 Assignment
0 Petitions
Accused Products
Abstract
A computing device for risk-based analysis of a payment card transaction is provided herein. The computing device includes a processor communicatively coupled to a memory. The computing device is programmed to receive a request for authentication of the payment card transaction. The payment card transaction includes a suspect consumer presenting a payment card from a digital wallet of a privileged cardholder. The computing device is also programmed to identify fraud feature data from the digital wallet. The computing device is further programmed to compute a fraud score for the payment card transaction based at least in part on the fraud feature data. The computing device is still further programmed to provide the fraud score for use during authentication of the suspect consumer.
-
Citations
21 Claims
-
1. A computing device for risk-based analysis of a payment card transaction, said computing device comprising a processor communicatively coupled to a memory, said computing device programmed to:
-
receive a request for authentication of the payment card transaction, wherein the payment card transaction includes a suspect consumer presenting a payment card from a digital wallet of a privileged cardholder; identify fraud feature data from the digital wallet; compute a fraud score for the payment card transaction based at least in part on the fraud feature data; and provide the fraud score for use during authentication of the suspect consumer. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A computer-based method for risk-based analysis of a payment card transaction, the method implemented using a computer device including a processor and a memory, said method comprising:
-
receiving a request for authentication of the payment card transaction, wherein the payment card transaction includes a suspect consumer presenting a payment card from a digital wallet of a privileged cardholder; identifying fraud feature data from the digital wallet; computing a fraud score for the payment card transaction based at least in part on the fraud feature data; and providing the fraud score for use during authentication of the suspect consumer. - View Dependent Claims (9, 10, 11, 12, 13, 14)
-
-
15. At least one non-transitory computer-readable storage media having computer-executable instructions embodied thereon, wherein when executed by at least one processor, the computer-executable instructions cause the processor to:
-
receive a request for authentication of a payment card transaction, wherein the payment card transaction includes a suspect consumer presenting a payment card from a digital wallet of a privileged cardholder; identify fraud feature data from the digital wallet; compute a fraud score for the payment card transaction based at least in part on the fraud feature data; and provide the fraud score for use during authentication of the suspect consumer. - View Dependent Claims (16, 17, 18, 19, 20, 21)
-
Specification