Obfuscating communications that include sensitive information based on context of the communications

    公开(公告)号:US12254117B2

    公开(公告)日:2025-03-18

    申请号:US17650315

    申请日:2022-02-08

    Abstract: In some implementations, a user device may detect a communication associated with the user device and a user. The user device may analyze, using a machine learning model, a context of the communication to determine a risk score associated with the communication, the risk score indicating a likelihood that the communication is associated with a fraudulent actor attempting to solicit sensitive information from the user. The user device may monitor the communication to identify a trigger in the communication that indicates that sensitive information is to be shared, wherein monitoring the communication includes performing one or more operations to secure the communication based on the risk score satisfying one or more thresholds. The user device may detect, based on monitoring the communication, a portion of the communication that includes the sensitive information. The user device may obfuscate the portion of the communication.

    Transaction card with integrated USB device

    公开(公告)号:US12125015B2

    公开(公告)日:2024-10-22

    申请号:US18382352

    申请日:2023-10-20

    CPC classification number: G06Q20/204 G06F13/4282 G06Q20/382 G06F2213/0042

    Abstract: A transaction card is provided for communicating with a computing device. The transaction card may comprise a computer interface device, at least one memory, at least one processor, and a card reader module. The card reader module configured to receive, from the computing device through the computer interface device, a first data packet comprising a request associated with a transaction, the first data packet being compatible with an interface protocol. The card reader module may process the first data packet to generate a second data packet compatible with the payment authentication protocol; provide the second data packet to the processor; receive, from the processor, a third data packet comprising a response to the request; process the third data packet to generate a fourth data packet based on the response, the fourth data packet compatible with the interface protocol; and transmit, to the computer interface device, the fourth data packet.

    Identity verification using a virtual credential

    公开(公告)号:US12045818B2

    公开(公告)日:2024-07-23

    申请号:US17649724

    申请日:2022-02-02

    CPC classification number: G06Q20/4014 G06Q50/01

    Abstract: In some implementations, an identity verification device may receive a request to verify an identity associated with a user accessing a social media account to share information on a social media platform. The identity verification device may generate, based on the request, a virtual credential linked to a primary credential associated with a financial account belonging to a holder of the social media account. The virtual credential may be used in an identity verification transaction to prove that the user accessing the social media account has access to the financial account associated with the social media account holder. The identity verification device may store a record indicating that the virtual credential was used to conduct the identity verification transaction and may provide, to the social media platform, information to verify the identity associated with the user accessing the social media account based on the record.

    Transaction card with integrated USB device

    公开(公告)号:US11443292B2

    公开(公告)日:2022-09-13

    申请号:US16528991

    申请日:2019-08-01

    Abstract: A transaction card is provided for communicating with a computing device. The transaction card may comprise a computer interface device, at least one memory, at least one processor, and a card reader module. The card reader module configured to receive, from the computing device through the computer interface device, a first data packet comprising a request associated with a transaction, the first data packet being compatible with an interface protocol. The card reader module may process the first data packet to generate a second data packet compatible with the payment authentication protocol; provide the second data packet to the processor; receive, from the processor, a third data packet comprising a response to the request; process the third data packet to generate a fourth data packet based on the response, the fourth data packet compatible with the interface protocol; and transmit, to the computer interface device, the fourth data packet.

    Providing alerts via a color changing transaction card

    公开(公告)号:US11366995B2

    公开(公告)日:2022-06-21

    申请号:US17327854

    申请日:2021-05-24

    Abstract: Methods and systems disclosed herein may communicate information, such as alerts and notifications, to a cardholder via a color-changing transaction card. In particular, the cardholder may configure one or more thresholds that establish when a transaction card may change colors. For instance, a transaction card may change colors at, or while approaching, a first threshold. The transaction card may change colors at, or while approaching, a second threshold. When the cardholder's balance goes below the thresholds, the transaction card may revert back to the lower threshold color or the original color of the transaction card. Using the techniques described herein a financial institution may convey information to a cardholder in a way that does not require the cardholder to digitally engage with the financial institution.

    Providing alerts via a color changing transaction card

    公开(公告)号:US11055593B1

    公开(公告)日:2021-07-06

    申请号:US16735782

    申请日:2020-01-07

    Abstract: Methods and systems disclosed herein may communicate information, such as alerts and notifications, to a cardholder via a color-changing transaction card. In particular, the cardholder may configure one or more thresholds that establish when a transaction card may change colors. For instance, a transaction card may change colors at, or while approaching, a first threshold. The transaction card may change colors at, or while approaching, a second threshold. When the cardholder's balance goes below the thresholds, the transaction card may revert back to the lower threshold color or the original color of the transaction card. Using the techniques described herein a financial institution may convey information to a cardholder in a way that does not require the cardholder to digital engage with the financial institution.

    Auto-generated synthetic identities for simulating population dynamics to detect fraudulent activity

    公开(公告)号:US10484426B2

    公开(公告)日:2019-11-19

    申请号:US16298170

    申请日:2019-03-11

    Abstract: Embodiments disclosed herein generally relate to a system and method for detecting fraudulent computer activity. A computing system generates a plurality of synthetic identities. Each of the plurality of synthetic identities mimics information associated with a verified identity. The computing system receives, from a user, an input attempt. The input attempt includes a synthetic identity of the plurality of synthetic identities. The computing system compares input information in the input attempt to the plurality of synthetic identities. The computing system determines that the input information in the input attempt includes information from the plurality of synthetic identities, if it does, the computing system rejects the input attempt.

    Input Commands via Visual Cues
    30.
    发明申请

    公开(公告)号:US20190278377A1

    公开(公告)日:2019-09-12

    申请号:US15916809

    申请日:2018-03-09

    Abstract: Embodiments disclosed herein generally relate to a method and system of generating text input via facial recognition. A computing system receives a video stream of a user operating an application on a client device. The video stream includes a time series of images of the user. The computing system parses the video stream to identify one or more visual cues of the user. The computing system identifies a current page of the application. The computing system maps the identified on or more visual cues to an operation available on the current page of the application. The computing system executes the mapped operation.

Patent Agency Ranking