US20230196383A1 - Detecting security breaches with watchdog transaction accounts - Google Patents
Detecting security breaches with watchdog transaction accounts Download PDFInfo
- Publication number
- US20230196383A1 US20230196383A1 US18/106,798 US202318106798A US2023196383A1 US 20230196383 A1 US20230196383 A1 US 20230196383A1 US 202318106798 A US202318106798 A US 202318106798A US 2023196383 A1 US2023196383 A1 US 2023196383A1
- Authority
- US
- United States
- Prior art keywords
- watchdog
- transaction
- account
- electronic commerce
- purchase
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q30/00—Commerce
- G06Q30/018—Certifying business or products
- G06Q30/0185—Product, service or business identity fraud
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
- G06Q10/10—Office automation; Time management
- G06Q10/107—Computer-aided management of electronic mailing [e-mailing]
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/08—Payment architectures
- G06Q20/12—Payment architectures specially adapted for electronic shopping systems
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/385—Payment protocols; Details thereof using an alias or single-use codes
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/40—Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/40—Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
- G06Q20/401—Transaction verification
- G06Q20/4016—Transaction verification involving fraud or risk level assessment in transaction processing
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q30/00—Commerce
- G06Q30/06—Buying, selling or leasing transactions
- G06Q30/0601—Electronic shopping [e-shopping]
- G06Q30/0633—Managing shopping lists, e.g. compiling or processing purchase lists
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q40/00—Finance; Insurance; Tax strategies; Processing of corporate or income taxes
- G06Q40/02—Banking, e.g. interest calculation or account maintenance
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q50/00—Information and communication technology [ICT] specially adapted for implementation of business processes of specific business sectors, e.g. utilities or tourism
- G06Q50/10—Services
- G06Q50/26—Government or public services
- G06Q50/265—Personal security, identity or safety
Definitions
- Malware often targets businesses in order to steal customer data.
- malware may be installed on point-of-sale (PoS) terminals or inserted into the checkout page for a store’s web site in order to capture customer payment information when it is supplied by the user.
- PoS point-of-sale
- malware inserted into the checkout page of a store’s web site could be used to collect a customer’s name, credit or debit card account information, billing address, etc.
- a merchant may not notice the theft of customer data for some time.
- a bank may notice a sudden surge in fraudulent charges (e.g., because a transaction is declined, a transaction is reported by the customer as unauthorized, etc.). While the financial institution may be able to identify merchants where its customers’ debit or credit cards were commonly used, this approach often cannot pin-point the source of a data breach. This is because it’s quite possible that the cards were commonly used to purchase items from the same set of merchants. In addition, this approach might identify that a security breach has occurred, but it cannot pin-point when the security breach occurred due to the delay between when customer information was stolen and when it’s use was detected. Moreover, this approach requires that a large enough volume of fraudulent transactions occur before the bank can identify common points of purchase where the compromised debit or credit card accounts were used.
- FIG. 1 is a drawing of a network environment according to various embodiments of the present disclosure.
- FIG. 2 is an illustration of the principals of the various embodiments of the present disclosure.
- FIG. 3 is a flowchart illustrating one example of functionality implemented as portions of an application executed in the network environment of FIG. 1 according to various embodiments of the present disclosure.
- FIG. 4 is a flowchart illustrating one example of functionality implemented as portions of an application executed in the network environment of FIG. 1 according to various embodiments of the present disclosure.
- the financial institution can irrefutably identify a specific merchant as having been breached.
- the financial institution can accurately pinpoint the timeframe during which the breach occurred.
- security breaches can be identified more quickly because large data sets are not required in order to identify common points of purchase that might include the merchant that suffered the security breach.
- the security of merchant systems can be improved because breaches can be detected more quickly and with more specificity. Therefore, the breach of the merchant system can be remedied more quickly, reducing the number of transaction accounts (e.g., debit or credit card accounts) that are compromised by malware.
- the network environment 100 can include a merchant computing environment 103 and an issuer computing environment 106 .
- the merchant computing environment 103 and the issuer computing environment 106 can be in data communication with each other via a network 109 .
- the merchant computing environment 103 and issuer computing environment 106 can each include one or more computing devices that include a processor, a memory, and/or a network interface.
- the computing devices can be configured to perform computations on behalf of other computing devices or applications.
- such computing devices can host and/or provide content to other computing devices in response to requests for content.
- the merchant computing environment 103 and issuer computing environment 106 can each employ a plurality of computing devices that can be arranged in one or more server banks or computer banks or other arrangements. Such computing devices can be located in a single installation or can be distributed among many different geographical locations.
- the merchant computing environment 103 and issuer computing environment 106 can each include a plurality of computing devices that together can include a hosted computing resource, a grid computing resource or any other distributed computing arrangement.
- the merchant computing environment 103 and issuer computing environment 106 can correspond to an elastic computing resource where the allotted capacity of processing, network, storage, or other computing-related resources can vary over time.
- the network 109 can include wide area networks (WANs), local area networks (LANs), personal area networks (PANs), or a combination thereof. These networks can include wired or wireless components or a combination thereof. Wired networks can include Ethernet networks, cable networks, fiber optic networks, and telephone networks such as dial-up, digital subscriber line (DSL), and integrated services digital network (ISDN) networks. Wireless networks can include cellular networks, satellite networks, Institute of Electrical and Electronic Engineers (IEEE) 802.11 wireless networks (i.e., WI-FI®), BLUETOOTH® networks, microwave transmission networks, as well as other networks relying on radio broadcasts. The network 109 can also include a combination of two or more networks 109 . Examples of networks 109 can include the Internet, intranets, extranets, virtual private networks (VPNs), and similar networks.
- VPNs virtual private networks
- the merchant computing environment 103 could host, execute, or otherwise implement an electronic commerce system 113 .
- the electronic commerce system 113 can be executed in order to facilitate the online purchase of items or services over the network 109 .
- the electronic commerce system 113 also performs various backend functions associated with the online presence of a merchant in order to facilitate the online purchase of items.
- the electronic commerce system 113 can generate web pages that are provided to clients for the purposes of selecting items for purchase, rental, download, lease, or other form of consumption. These web page may include a checkout or purchase page, or series of pages, in which the customer can supply personally identifying information (e.g., name, billing address, shipping address, etc.) and payment information (e.g., payment type, account information, etc.) in order to complete a purchase or transaction.
- the electronic commerce system 113 may verify the personally identifying information and the payment information prior to completing the transaction.
- various data can also be stored in a merchant data store 116 that is accessible to the merchant computing environment 103 .
- the merchant data store 116 can be representative of a plurality of merchant data store 116 , which can include relational databases or non-relational databases such as object-oriented databases, hierarchical databases, hash tables or similar key-value data stores, as well as other data storage applications or data structures. Moreover, combinations of these databases, data storage applications, and/or data structures may be used together to provide a single, logical, data store.
- the data stored in the merchant data store 116 is associated with the operation of the various applications or functional entities described below. This data can include a merchant identifier 119 , and potentially other data.
- the merchant identifier 119 can represent any identifier that uniquely identifies the merchant to the issuer with respect to other merchants. Often, the merchant identifier 119 is assigned by the issuer to the merchant. Moreover, the merchant identifier 119 is normally included in any transaction authorization request submitted by the merchant to the issuer. For example, if a merchant were to request that a bank or similar credit or debit card issuer authorize a purchase by a customer, the merchant would include the merchant identifier 119 in a transaction request that includes the customer’s personally identifying information (e.g., name on account, etc.) and the customer’s payment account information (e.g., billing address, account number, expiration date, etc.). This would allow the bank or issuer to decide whether to authorize payment by the customer with the specified payment account to the merchant.
- personally identifying information e.g., name on account, etc.
- payment account information e.g., billing address, account number, expiration date, etc.
- Various applications or other functionality can be executed in the issuer computing environment 106 . These applications can include a security agent 123 and a transaction authorization system 126 .
- the security agent 123 can be executed to initiate transactions with the electronic commerce system 113 to expose security breaches of the electronic commerce system 113 .
- the security agent 123 may periodically initiate a transaction with the electronic commerce system 113 using a watchdog transaction account 129 to expose security breaches. Additional details of the operation of the security agent 123 are set forth in later paragraphs.
- the transaction authorization system 126 can be executed to authorize or decline transactions made by customers with merchants. In the event that a transaction is declined by the transaction authorization system 126 , the transaction may be further evaluated to determine if the transaction is indicative of a security breach of the merchant. For example, if the transaction authorization system 126 detects that a watchdog transaction account 129 previously submitted by the security agent 123 is used in a subsequent transaction, then the transaction authorization system 126 could determine that a security breach of the electronic commerce system 113 had resulted in a disclosure of the watchdog transaction account 129 to a third-party.
- issuer data store 133 that is accessible to the issuer computing environment 106 .
- the issuer data store 133 can be representative of a plurality of data stores, which can include relational databases or non-relational databases such as object-oriented databases, hierarchical databases, hash tables or similar key-value data stores, as well as other data storage applications or data structures.
- the data stored in the issuer data store 133 is associated with the operation of the various applications hosted or executed by the issuer computing environment 106 . This data can include one or more watchdog transaction records 139 and potentially other data.
- a watchdog transaction record 139 represents a transaction initiated by the security agent 123 with the electronic commerce system 113 of a merchant using a watchdog transaction account 129 . As the security agent 123 may monitor the electronic commerce system 113 over an extended period of time, multiple watchdog transaction records 139 may be stored. Each watchdog transaction record 139 would therefore represent a unique transaction initiated by the security agent 123 with a merchant. Accordingly, each watchdog transaction record 139 may include a merchant identifier 119 representing the merchant with whom the transaction occurred. Each watchdog transaction record 139 can also include an amount 141 of the transaction, a timestamp 143 indicating when the transaction was initiated, and a watchdog transaction account 129 used by the security agent 123 for the transaction.
- a watchdog transaction account 129 can represent a fictious transaction or payment account that would be declined or denied by the transaction authorization system 126 if presented to the transaction authorization system 126 for payment in a transaction.
- a watchdog transaction account 129 is fictious, in many implementations it will have the properties that a genuine transaction account would be expected to have in order to hide the fact that a transaction account is a fictious watchdog transaction account 129 instead of a genuine account.
- well-known aliases or pseudonyms may be avoided (e.g., “John Doe,” “Jane Doe,” “John Q. Public,” etc.).
- the watchdog transaction account 129 represents a debit card or credit card
- the account number may be successfully validated using the Luhn algorithm.
- the watchdog transaction account 129 were ever used to attempt payment, the transaction would be rejected by the transaction authorization system 126 .
- a unique watchdog transaction account 129 will be used for each transaction initiated by the security agent 123 .
- a first transaction initiated by the security agent 123 with the electronic commerce system 113 may use a credit card number 1111223233334444 with an expiration date of January, 2023 and a card verification value (CVV) of “789.”
- a second transaction initiated by the security agent 123 could then use the same credit card number and expiration date, but a different CVV.
- a watchdog transaction account 129 may be uniquely identified by the tuple formed from several properties.
- a watchdog transaction account 129 could be uniquely identified by the tuple formed from the account number, CVV number, account holder name, and/or billing address.
- the security agent 123 can interact with the electronic commerce system 113 to initiate a transaction using a watchdog transaction account 129 .
- the security agent 123 may crawl one or more web pages provided by the electronic commerce system 113 to add items to a potential order (e.g., by adding items to a shopping cart provided by the electronic commerce system 113 ).
- the security agent 123 can then initiate a transaction by attempting to purchase the selected items (e.g., by initiating a checkout process provided by the electronic commerce system 113 ).
- the security agent 123 can generate a watchdog transaction account 129 or use a previously created, but unused, watchdog transaction account 129 to attempt to complete the purchase, such as providing the fictious name, account number, billing address, and expiration date of the watchdog transaction account 129 .
- the purchase will then be declined by the transaction authorization system 126 because the information for the watchdog transaction account 129 does not correspond to a valid transaction account (e.g., an issued debit or credit card).
- the security agent 123 can create a watchdog transaction record 139 associated with the merchant operating the electronic commerce system 113 .
- the security agent 123 can record merchant identifier 119 of the merchant, the amount 141 of the transaction, the timestamp reflecting when the security agent 123 submitted the transaction to the merchant for processing, and the watchdog transaction account 129 used for the transaction.
- the transaction authorization system 126 can evaluate the watchdog transaction records 139 to determine whether a watchdog transaction record 139 exists that has a matching merchant identifier 119 , amount 141 , timestamp 143 , and watchdog transaction account 129 .
- a match would indicate that the transaction being declined is the same transaction recently initiated by the security agent 123 with the electronic commerce system 113 .
- a failure to find a matching watchdog transaction record 119 e.g., a record with a matching watchdog transaction account 129 , but mismatched merchant identifier 119 , amount 141 , or timestamp
- the electronic commerce system 113 had been compromised (e.g., by malware, criminals, etc.) and that thief is attempting to use the stolen watchdog transaction account 129 to commit a fraudulent transaction.
- the detected breach could then be reported to the appropriate individuals, entities, or systems.
- FIG. 2 provides a graphical illustration of the principles of the various embodiments of the present disclosure.
- a watchdog transaction 203 is initiated with “Merchant X.”
- the watchdog transaction can include an account identifier (e.g., an account number such as a credit or debit card account number), the merchant identifier 119 of “Merchant X,” an amount 141 of the watchdog transaction 203 , a timestamp 143 of when the watchdog transaction 203 occurred, and authentication information for the watchdog transaction account 129 (e.g., a CVV number, a billing zip code, a billing address, etc.).
- an account identifier e.g., an account number such as a credit or debit card account number
- the merchant identifier 119 of “Merchant X” e.g., an amount 141 of the watchdog transaction 203
- a timestamp 143 e.g., a timestamp 143 of when the watchdog transaction 203 occurred
- watchdog transaction account 129 is used in a subsequent transaction 206 with “Merchant Y,” then one can determine that Merchant X suffered a security breach of their electronic commerce system 113 .
- the timestamp 143 can also be used to help identify the time period in which the security breach occurred, as described in more detail in the discussion of FIG. 4 .
- FIG. 3 shown is a flowchart that provides one example of the operation of a portion of the security agent 123 .
- the flowchart of FIG. 3 provides merely an example of the many different types of functional arrangements that can be employed to implement the operation of the depicted portion of the security agent 123 .
- the flowchart of FIG. 3 can be viewed as depicting an example of elements of a method implemented within the network environment 100 .
- the security agent 123 can request a home page of an electronic commerce system 113 .
- the identity or address of the home page may have been previously specified to the security agent 123 .
- a script that causes the security agent 123 to evaluate the electronic commerce system 113 at periodic intervals may have provided the address of the home page as an argument to the security agent 123 .
- the security agent 123 can add one or more items or services to a shopping cart or similar purchase request mechanism.
- the security agent 123 may add an item to a shopping cart that is advertised or displayed on the home page.
- the security agent 123 can navigate to an item catalog or similar section of the electronic commerce system 113 and then select one or more items or services to add to the shopping cart.
- the number of items or services added can be as few as one item or service or as many as desired.
- the security agent 123 can begin the checkout process in order to initiate a watchdog transaction 203 .
- the security agent 123 may request a web page generated by the electronic commerce system 113 that would allow a user to request to purchase the items or service.
- the requested web page may ask for personally identifying information of the purchaser (e.g., full name, shipping address, etc.) and information for a payment or transaction account (e.g., debit or credit card number, expiration date, CVV code, and/or billing address).
- the security agent 123 can generate or obtain a watchdog transaction account 129 for use with the watchdog transaction 203 .
- the security agent 123 may generate a new, unique watchdog transaction account 129 based on a previously used watchdog transaction account 129 .
- the security agent 123 could change authentication information associated with the watchdog transaction account 129 to generate a new, unique combination of authentication information or data.
- the security agent 123 could update or change one or more of an account holder’s name, billing address (e.g., house number, street name, city, state, and/or zip code, etc.), CVV or expiration date of a previously used watchdog transaction account 129 to create a new watchdog transaction account 129 .
- the security agent 123 may further search the watchdog transaction records 139 to confirm that the newly created watchdog transaction account 129 does not match a previously used watchdog transaction account 129 .
- the security agent 123 may request a new watchdog transaction account 129 .
- the security agent 123 may request from an issuing system a new debit or credit card number that has not previously been issued to a customer.
- the security agent 123 could then create a customer name, billing address, expiration date, and CVV for the new debit or credit card number and save this information in conjunction with the newly issued credit or debit card number as a watchdog transaction account 129 .
- the issuing system might mark the unissued credit or debit card number as reserved or unavailable in order to prevent it from being issued to a legitimate customer.
- the security agent 123 can submit the watchdog transaction account 129 to the electronic commerce system 113 .
- the security agent 123 might complete a form provided by the electronic commerce system 113 requesting payment or billing information.
- the security agent 123 can initiate the watchdog transaction 203 .
- the security agent 123 could submit the watchdog transaction account 129 as part of an order or purchase request to the electronic commerce system 113 . This could be done in a webform by manipulating a submit or purchase button included in the webpage. This could be similarly accomplished by submitting a hypertext transfer protocol (HTTP) GET or POST request to the electronic commerce system that includes the watchdog transaction account 129 , amount 141 of the purchase, and a list of identifiers of items or services to be purchased.
- HTTP hypertext transfer protocol
- the security agent 123 can create a watchdog transaction record 139 for the watchdog transaction 203 initiated at block 319 .
- the watchdog transaction record 139 can include the amount 141 of the watchdog transaction 203 , the merchant identifier 119 of the merchant operating the electronic commerce system, the watchdog transaction account 129 used, and the timestamp 143 reflecting the time at which the watchdog transaction 203 was initiated with the electronic commerce system 113 .
- the watchdog transaction record 139 After the watchdog transaction record 139 is created, it can be stored in the issuer data store 133 .
- FIG. 4 shown is a flowchart that provides one example of the operation of a portion of the transaction authorization system 126 .
- the flowchart of FIG. 4 provides merely an example of the many different types of functional arrangements that can be employed to implement the operation of the depicted portion of the transaction authorization system 126 .
- the flowchart of FIG. 4 can be viewed as depicting an example of elements of a method implemented within the network environment 100 .
- the transaction authorization system 126 can receive a transaction request from the electronic commerce system 113 .
- the transaction request can represent a request by the electronic commerce system 113 to authorize a purchase made using a transaction account (e.g., credit or debit card account) issued by the entity operating the issuer computing environment 106 (e.g., the “issuer” of the transaction account).
- the transaction request can include information such as an account identifier (e.g., a credit or debit card number), authentication information (e.g., the name and billing address associated with the account, the expiration date of the account, a CVV or similar authentication number, etc.), a merchant identifier 119 , a time that the transaction occurred, and an amount of the transaction.
- the transaction request could represent a subsequent transaction 206 , a watchdog transaction 203 , or other types of transactions.
- the transaction authorization system 126 can attempt to authorize the transaction. For example, the transaction authorization system 126 can determine whether the authentication information matches or is appropriate for the account identified by the account identifier. Further, the transaction authorization system 126 may attempt to deduct an amount of funds or available credit from the account identified in the transaction request.
- the transaction authorization system 126 determines whetherthere was an authorization failure and the reason for the authorization failure.
- Authorization could occur for any number of reasons, some of which might indicate a security breach while others might indicate other issues. For example, if authorization failed because there were insufficient funds or available credit for the transaction, this would not indicate a security breach. However, if the authorization failed because the account identifier included in the transaction account failed to identify an existing account, this could indicate that a security breach had occurred. If the transaction is successfully authorized, or if authorization failed for a reason other than the account identifier failing to identify an existing account, then the process ends. However, if the authorization fails because the account identifier fails to identify an existing account, then the process proceeds to block 413 .
- the transaction authorization system 126 can determine whether the account identified in the failed transaction request was a watchdog transaction account 129 . For example, the transaction authorization system 126 could search the watchdog transaction records 139 for a matching watchdog transaction account 129 . If a matching watchdog transaction account 129 is identified, then the process proceeds to block 416 . If no matching watchdog transaction account is identified, then the process ends.
- the transaction authorization system 126 can further analyze the transaction request received at block 403 to determine if it matches a watchdog transaction record 139 . This analysis can be performed in order to determine whether the transaction request is the result of a data breach of a merchant, or if the transaction request represents a watchdog transaction 203 initiated by the security agent 123 . For example, if the time of the transaction, the merchant identifier 119 for the transaction, and the amount of the transaction match the merchant identifier 119 , amount 141 , and timestamp 143 of the watchdog transaction record 139 , then the transaction authorization system 126 can conclude that the transaction request received at block 403 is the result of a watchdog transaction 203 initiated by the security agent 123 . Accordingly, the process would end.
- the transaction authorization system 126 could conclude that the transaction request was the result of a security breach. For example, if merchant identifier 119 in the transaction request received at block 403 failed to match the merchant identifier 119 in the watchdog transaction record 139 , then the transaction authorization system 126 could conclude that the electronic commerce system 113 where the security agent 123 used the watchdog transaction account 129 had been breached and an attacker was trying to reuse the watchdog transaction account 129 to make a purchase with another merchant.
- the transaction authorization system 126 could conclude that the electronic commerce system 113 had been breached and an attacker was attempting to reuse the compromised watchdog transaction account 129 for a subsequent purchase.
- the transaction authorization system 126 can determine the timeframe in which the breach occurred. For example, if a single instance of a compromised watchdog transaction account 129 is identified, then the transaction authorization system 126 could conclude that the breach occurred on or before the time specified in the timestamp 143 for the respective watchdog transaction record 139 of the compromised watchdog transaction account 129 . Similarly, if multiple instances of compromised watchdog transaction accounts 129 are identified, then the watchdog transaction record 139 with the oldest timestamp 143 could be used as an identifier for when the security breach occurred.
- the transaction authorization system 126 can report the detected breach of the merchant or electronic commerce system identified by the merchant identifier 119 included in the watchdog transaction record 139 for the compromised watchdog transaction account 129 .
- the transaction authorization system 126 could send an email to a predefined email address of a security or incident response team for the compromised merchant.
- the transaction authorization system 126 could send an email to a predefined email address of a security or incident response team for the issuer of the watchdog transaction account.
- the report or message could include the identity of the merchant who was breached, a copy of the transaction authorization received at block 403 , a copy of the watchdog transaction record 139 , and a proposed timeframe for when the breach may have occurred.
- SMS short message service
- executable means a program file that is in a form that can ultimately be run by the processor.
- executable programs can be a compiled program that can be translated into machine code in a format that can be loaded into a random access portion of the memory and run by the processor, source code that can be expressed in proper format such as object code that is capable of being loaded into a random access portion of the memory and executed by the processor, or source code that can be interpreted by another executable program to generate instructions in a random access portion of the memory to be executed by the processor.
- An executable program can be stored in any portion or component of the memory, including random access memory (RAM), read-only memory (ROM), hard drive, solid-state drive, Universal Serial Bus (USB) flash drive, memory card, optical disc such as compact disc (CD) or digital versatile disc (DVD), floppy disk, magnetic tape, or other memory components.
- RAM random access memory
- ROM read-only memory
- USB Universal Serial Bus
- CD compact disc
- DVD digital versatile disc
- floppy disk magnetic tape, or other memory components.
- the memory includes both volatile and nonvolatile memory and data storage components. Volatile components are those that do not retain data values upon loss of power. Nonvolatile components are those that retain data upon a loss of power.
- the memory can include random access memory (RAM), read-only memory (ROM), hard disk drives, solid-state drives, USB flash drives, memory cards accessed via a memory card reader, floppy disks accessed via an associated floppy disk drive, optical discs accessed via an optical disc drive, magnetic tapes accessed via an appropriate tape drive, or other memory components, or a combination of any two or more of these memory components.
- the RAM can include static random access memory (SRAM), dynamic random access memory (DRAM), or magnetic random access memory (MRAM) and other such devices.
- the ROM can include a programmable read-only memory (PROM), an erasable programmable read-only memory (EPROM), an electrically erasable programmable read-only memory (EEPROM), or other like memory device.
- each block can represent a module, segment, or portion of code that includes program instructions to implement the specified logical function(s).
- the program instructions can be embodied in the form of source code that includes human-readable statements written in a programming language or machine code that includes numerical instructions recognizable by a suitable execution system such as a processor in a computer system.
- the machine code can be converted from the source code through various processes. For example, the machine code can be generated from the source code with a compiler prior to execution of the corresponding application. As another example, the machine code can be generated from the source code concurrently with execution with an interpreter. Other approaches can also be used.
- each block can represent a circuit or a number of interconnected circuits to implement the specified logical function or functions.
- any logic or application described herein that includes software or code can be embodied in any non-transitory computer-readable medium for use by or in connection with an instruction execution system such as a processor in a computer system or other system.
- the logic can include statements including instructions and declarations that can be fetched from the computer-readable medium and executed by the instruction execution system.
- a “computer-readable medium” can be any medium that can contain, store, or maintain the logic or application described herein for use by or in connection with the instruction execution system.
- a collection of distributed computer-readable media located across a plurality of computing devices may also be collectively considered as a single non-transitory computer-readable medium.
- the computer-readable medium can include any one of many physical media such as magnetic, optical, or semiconductor media. More specific examples of a suitable computer-readable medium would include, but are not limited to, magnetic tapes, magnetic floppy diskettes, magnetic hard drives, memory cards, solid-state drives, USB flash drives, or optical discs. Also, the computer-readable medium can be a random access memory (RAM) including static random access memory (SRAM) and dynamic random access memory (DRAM), or magnetic random access memory (MRAM). In addition, the computer-readable medium can be a read-only memory (ROM), a programmable read-only memory (PROM), an erasable programmable read-only memory (EPROM), an electrically erasable programmable read-only memory (EEPROM), or other type of memory device.
- RAM random access memory
- SRAM static random access memory
- DRAM dynamic random access memory
- MRAM magnetic random access memory
- the computer-readable medium can be a read-only memory (ROM), a programmable read-only memory (PROM), an
- any logic or application described herein can be implemented and structured in a variety of ways.
- one or more applications described can be implemented as modules or components of a single application.
- one or more applications described herein can be executed in shared or separate computing devices or a combination thereof.
- a plurality of the applications described herein can execute in the same computing device, or in multiple computing devices in the same computing environment.
- Disjunctive language such as the phrase “at least one of X, Y, or Z,” unless specifically stated otherwise, is otherwise understood with the context as used in general to present that an item, term, etc., can be either X, Y, or Z, or any combination thereof (e.g., X, Y, or Z). Thus, such disjunctive language is not generally intended to, and should not, imply that certain embodiments require at least one of X, at least one of Y, or at least one of Z to each be present.
Landscapes
- Business, Economics & Management (AREA)
- Engineering & Computer Science (AREA)
- Accounting & Taxation (AREA)
- Strategic Management (AREA)
- Finance (AREA)
- Physics & Mathematics (AREA)
- Theoretical Computer Science (AREA)
- General Physics & Mathematics (AREA)
- General Business, Economics & Management (AREA)
- Marketing (AREA)
- Economics (AREA)
- Development Economics (AREA)
- Human Resources & Organizations (AREA)
- Entrepreneurship & Innovation (AREA)
- Tourism & Hospitality (AREA)
- Computer Security & Cryptography (AREA)
- General Health & Medical Sciences (AREA)
- Health & Medical Sciences (AREA)
- Educational Administration (AREA)
- Technology Law (AREA)
- Primary Health Care (AREA)
- Computer Hardware Design (AREA)
- Data Mining & Analysis (AREA)
- Operations Research (AREA)
- Quality & Reliability (AREA)
- Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
Abstract
Disclosed are various embodiments for detecting security breaches using watchdog transaction accounts. A security agent can initiate a purchase with a first electronic commerce system and provide a watchdog transaction account as payment for the purchase. The security agent can then store a record of the purchase which includes a merchant identifier for the merchant and the watchdog transaction account. Subsequently, a transaction authorization system can determine that authorization for a transaction with second electronic commerce system failed. If the transaction authorization system determines that the account used in the transaction with the second electronic commerce system, then the transaction authorization system can determine that the first electronic commerce system has suffered a security breach.
Description
- This application is a continuation of, claims priority to and the benefit of, copending U.S. Pat Application No. 16/919,875, entitled “DETECTING SECURITY BREACHES WITH WATCHDOG TRANSACTION ACCOUNTS” and filed on Jul. 2, 2020, which is incorporated by reference as if set forth herein in its entirety.
- Malware often targets businesses in order to steal customer data. For example, malware may be installed on point-of-sale (PoS) terminals or inserted into the checkout page for a store’s web site in order to capture customer payment information when it is supplied by the user. For example, malware inserted into the checkout page of a store’s web site could be used to collect a customer’s name, credit or debit card account information, billing address, etc. Unfortunately, a merchant may not notice the theft of customer data for some time.
- However, financial institutions may suspect that a merchant has suffered a security breach. For example, a bank may notice a sudden surge in fraudulent charges (e.g., because a transaction is declined, a transaction is reported by the customer as unauthorized, etc.). While the financial institution may be able to identify merchants where its customers’ debit or credit cards were commonly used, this approach often cannot pin-point the source of a data breach. This is because it’s quite possible that the cards were commonly used to purchase items from the same set of merchants. In addition, this approach might identify that a security breach has occurred, but it cannot pin-point when the security breach occurred due to the delay between when customer information was stolen and when it’s use was detected. Moreover, this approach requires that a large enough volume of fraudulent transactions occur before the bank can identify common points of purchase where the compromised debit or credit card accounts were used.
- Many aspects of the present disclosure can be better understood with reference to the following drawings. The components in the drawings are not necessarily to scale, with emphasis instead being placed upon clearly illustrating the principles of the disclosure. Moreover, in the drawings, like reference numerals designate corresponding parts throughout the several views.
-
FIG. 1 is a drawing of a network environment according to various embodiments of the present disclosure. -
FIG. 2 is an illustration of the principals of the various embodiments of the present disclosure. -
FIG. 3 is a flowchart illustrating one example of functionality implemented as portions of an application executed in the network environment ofFIG. 1 according to various embodiments of the present disclosure. -
FIG. 4 is a flowchart illustrating one example of functionality implemented as portions of an application executed in the network environment ofFIG. 1 according to various embodiments of the present disclosure. - Disclosed are various approaches for financial institutions to detect security breaches of merchants with specificity. Using the disclosed approaches, the financial institution can irrefutably identify a specific merchant as having been breached. In addition, the financial institution can accurately pinpoint the timeframe during which the breach occurred. Moreover, security breaches can be identified more quickly because large data sets are not required in order to identify common points of purchase that might include the merchant that suffered the security breach. As a result, the security of merchant systems can be improved because breaches can be detected more quickly and with more specificity. Therefore, the breach of the merchant system can be remedied more quickly, reducing the number of transaction accounts (e.g., debit or credit card accounts) that are compromised by malware.
- In the following discussion, a general description of the system and its components is provided, followed by a discussion of the operation of the same. Although the following discussion provides illustrative examples of the operation of various components of the present disclosure, the use of the following illustrative examples does not exclude other implementations that are consistent with the principals disclosed by the following illustrative examples.
- With reference to
FIG. 1 , shown is anetwork environment 100 according to various embodiments. Thenetwork environment 100 can include amerchant computing environment 103 and anissuer computing environment 106. Themerchant computing environment 103 and theissuer computing environment 106 can be in data communication with each other via anetwork 109. - The
merchant computing environment 103 andissuer computing environment 106 can each include one or more computing devices that include a processor, a memory, and/or a network interface. For example, the computing devices can be configured to perform computations on behalf of other computing devices or applications. As another example, such computing devices can host and/or provide content to other computing devices in response to requests for content. - Moreover, the
merchant computing environment 103 andissuer computing environment 106 can each employ a plurality of computing devices that can be arranged in one or more server banks or computer banks or other arrangements. Such computing devices can be located in a single installation or can be distributed among many different geographical locations. For example, themerchant computing environment 103 andissuer computing environment 106 can each include a plurality of computing devices that together can include a hosted computing resource, a grid computing resource or any other distributed computing arrangement. In some cases, themerchant computing environment 103 andissuer computing environment 106 can correspond to an elastic computing resource where the allotted capacity of processing, network, storage, or other computing-related resources can vary over time. - The
network 109 can include wide area networks (WANs), local area networks (LANs), personal area networks (PANs), or a combination thereof. These networks can include wired or wireless components or a combination thereof. Wired networks can include Ethernet networks, cable networks, fiber optic networks, and telephone networks such as dial-up, digital subscriber line (DSL), and integrated services digital network (ISDN) networks. Wireless networks can include cellular networks, satellite networks, Institute of Electrical and Electronic Engineers (IEEE) 802.11 wireless networks (i.e., WI-FI®), BLUETOOTH® networks, microwave transmission networks, as well as other networks relying on radio broadcasts. Thenetwork 109 can also include a combination of two ormore networks 109. Examples ofnetworks 109 can include the Internet, intranets, extranets, virtual private networks (VPNs), and similar networks. - Various applications or other functionality can be executed in the
merchant computing environment 103. For example, themerchant computing environment 103 could host, execute, or otherwise implement anelectronic commerce system 113. - The
electronic commerce system 113 can be executed in order to facilitate the online purchase of items or services over thenetwork 109. Theelectronic commerce system 113 also performs various backend functions associated with the online presence of a merchant in order to facilitate the online purchase of items. For example, theelectronic commerce system 113 can generate web pages that are provided to clients for the purposes of selecting items for purchase, rental, download, lease, or other form of consumption. These web page may include a checkout or purchase page, or series of pages, in which the customer can supply personally identifying information (e.g., name, billing address, shipping address, etc.) and payment information (e.g., payment type, account information, etc.) in order to complete a purchase or transaction. Theelectronic commerce system 113 may verify the personally identifying information and the payment information prior to completing the transaction. - Also, various data can also be stored in a
merchant data store 116 that is accessible to themerchant computing environment 103. Themerchant data store 116 can be representative of a plurality ofmerchant data store 116, which can include relational databases or non-relational databases such as object-oriented databases, hierarchical databases, hash tables or similar key-value data stores, as well as other data storage applications or data structures. Moreover, combinations of these databases, data storage applications, and/or data structures may be used together to provide a single, logical, data store. The data stored in themerchant data store 116 is associated with the operation of the various applications or functional entities described below. This data can include amerchant identifier 119, and potentially other data. - The
merchant identifier 119 can represent any identifier that uniquely identifies the merchant to the issuer with respect to other merchants. Often, themerchant identifier 119 is assigned by the issuer to the merchant. Moreover, themerchant identifier 119 is normally included in any transaction authorization request submitted by the merchant to the issuer. For example, if a merchant were to request that a bank or similar credit or debit card issuer authorize a purchase by a customer, the merchant would include themerchant identifier 119 in a transaction request that includes the customer’s personally identifying information (e.g., name on account, etc.) and the customer’s payment account information (e.g., billing address, account number, expiration date, etc.). This would allow the bank or issuer to decide whether to authorize payment by the customer with the specified payment account to the merchant. - Various applications or other functionality can be executed in the
issuer computing environment 106. These applications can include asecurity agent 123 and atransaction authorization system 126. - The
security agent 123 can be executed to initiate transactions with theelectronic commerce system 113 to expose security breaches of theelectronic commerce system 113. For example, thesecurity agent 123 may periodically initiate a transaction with theelectronic commerce system 113 using awatchdog transaction account 129 to expose security breaches. Additional details of the operation of thesecurity agent 123 are set forth in later paragraphs. - The
transaction authorization system 126 can be executed to authorize or decline transactions made by customers with merchants. In the event that a transaction is declined by thetransaction authorization system 126, the transaction may be further evaluated to determine if the transaction is indicative of a security breach of the merchant. For example, if thetransaction authorization system 126 detects that awatchdog transaction account 129 previously submitted by thesecurity agent 123 is used in a subsequent transaction, then thetransaction authorization system 126 could determine that a security breach of theelectronic commerce system 113 had resulted in a disclosure of thewatchdog transaction account 129 to a third-party. - Also, various data is stored in an
issuer data store 133 that is accessible to theissuer computing environment 106. Theissuer data store 133 can be representative of a plurality of data stores, which can include relational databases or non-relational databases such as object-oriented databases, hierarchical databases, hash tables or similar key-value data stores, as well as other data storage applications or data structures. The data stored in theissuer data store 133 is associated with the operation of the various applications hosted or executed by theissuer computing environment 106. This data can include one or morewatchdog transaction records 139 and potentially other data. - A
watchdog transaction record 139 represents a transaction initiated by thesecurity agent 123 with theelectronic commerce system 113 of a merchant using awatchdog transaction account 129. As thesecurity agent 123 may monitor theelectronic commerce system 113 over an extended period of time, multiplewatchdog transaction records 139 may be stored. Eachwatchdog transaction record 139 would therefore represent a unique transaction initiated by thesecurity agent 123 with a merchant. Accordingly, eachwatchdog transaction record 139 may include amerchant identifier 119 representing the merchant with whom the transaction occurred. Eachwatchdog transaction record 139 can also include anamount 141 of the transaction, atimestamp 143 indicating when the transaction was initiated, and awatchdog transaction account 129 used by thesecurity agent 123 for the transaction. - A
watchdog transaction account 129 can represent a fictious transaction or payment account that would be declined or denied by thetransaction authorization system 126 if presented to thetransaction authorization system 126 for payment in a transaction. Although awatchdog transaction account 129 is fictious, in many implementations it will have the properties that a genuine transaction account would be expected to have in order to hide the fact that a transaction account is a fictiouswatchdog transaction account 129 instead of a genuine account. For example, well-known aliases or pseudonyms may be avoided (e.g., “John Doe,” “Jane Doe,” “John Q. Public,” etc.). As another example, if thewatchdog transaction account 129 represents a debit card or credit card, the account number may be successfully validated using the Luhn algorithm. However, if thewatchdog transaction account 129 were ever used to attempt payment, the transaction would be rejected by thetransaction authorization system 126. - Generally, a unique
watchdog transaction account 129 will be used for each transaction initiated by thesecurity agent 123. However, there may only be minor differences between awatchdog transaction account 129 used in a first transaction and a secondwatchdog transaction account 129 used for a second transaction. For example, a first transaction initiated by thesecurity agent 123 with theelectronic commerce system 113 may use a credit card number 1111223233334444 with an expiration date of January, 2023 and a card verification value (CVV) of “789.” A second transaction initiated by thesecurity agent 123 could then use the same credit card number and expiration date, but a different CVV. One could then use the differences in the CVV values to subsequently determine which transaction initiated bysecurity agent 123 was compromised. Similarly, changes in the expiration date, account holder name, billing address, or account number itself could be used to differentiate between watchdog transaction accounts 129. Accordingly, awatchdog transaction account 129 may be uniquely identified by the tuple formed from several properties. To use a credit or debit card as an example, awatchdog transaction account 129 could be uniquely identified by the tuple formed from the account number, CVV number, account holder name, and/or billing address. - Next, a general description of the operation of the various components of the
network environment 100 is provided. While the following paragraphs illustrate various aspects of the present disclosure, they do not describe the only manner in which the various components may interact with each other. More detailed descriptions of the individual components and how they interact with each other accompany the description ofFIGS. 2-4 - To begin, the
security agent 123 can interact with theelectronic commerce system 113 to initiate a transaction using awatchdog transaction account 129. For example, thesecurity agent 123 may crawl one or more web pages provided by theelectronic commerce system 113 to add items to a potential order (e.g., by adding items to a shopping cart provided by the electronic commerce system 113). Thesecurity agent 123 can then initiate a transaction by attempting to purchase the selected items (e.g., by initiating a checkout process provided by the electronic commerce system 113). Accordingly, thesecurity agent 123 can generate awatchdog transaction account 129 or use a previously created, but unused,watchdog transaction account 129 to attempt to complete the purchase, such as providing the fictious name, account number, billing address, and expiration date of thewatchdog transaction account 129. The purchase will then be declined by thetransaction authorization system 126 because the information for thewatchdog transaction account 129 does not correspond to a valid transaction account (e.g., an issued debit or credit card). - In parallel, the
security agent 123 can create awatchdog transaction record 139 associated with the merchant operating theelectronic commerce system 113. For example, thesecurity agent 123 can recordmerchant identifier 119 of the merchant, theamount 141 of the transaction, the timestamp reflecting when thesecurity agent 123 submitted the transaction to the merchant for processing, and thewatchdog transaction account 129 used for the transaction. When the transaction initiated by thesecurity agent 123 is declined, thetransaction authorization system 126 can evaluate thewatchdog transaction records 139 to determine whether awatchdog transaction record 139 exists that has a matchingmerchant identifier 119,amount 141,timestamp 143, andwatchdog transaction account 129. A match would indicate that the transaction being declined is the same transaction recently initiated by thesecurity agent 123 with theelectronic commerce system 113. A failure to find a matching watchdog transaction record 119 (e.g., a record with a matchingwatchdog transaction account 129, butmismatched merchant identifier 119,amount 141, or timestamp) would indicate that theelectronic commerce system 113 had been compromised (e.g., by malware, criminals, etc.) and that thief is attempting to use the stolenwatchdog transaction account 129 to commit a fraudulent transaction. The detected breach could then be reported to the appropriate individuals, entities, or systems. -
FIG. 2 provides a graphical illustration of the principles of the various embodiments of the present disclosure. As illustrated inFIG. 2 , awatchdog transaction 203 is initiated with “Merchant X.” The watchdog transaction can include an account identifier (e.g., an account number such as a credit or debit card account number), themerchant identifier 119 of “Merchant X,” anamount 141 of thewatchdog transaction 203, atimestamp 143 of when thewatchdog transaction 203 occurred, and authentication information for the watchdog transaction account 129 (e.g., a CVV number, a billing zip code, a billing address, etc.). If thewatchdog transaction account 129 is used in asubsequent transaction 206 with “Merchant Y,” then one can determine that Merchant X suffered a security breach of theirelectronic commerce system 113. Thetimestamp 143 can also be used to help identify the time period in which the security breach occurred, as described in more detail in the discussion ofFIG. 4 . - Referring next to
FIG. 3 , shown is a flowchart that provides one example of the operation of a portion of thesecurity agent 123. The flowchart ofFIG. 3 provides merely an example of the many different types of functional arrangements that can be employed to implement the operation of the depicted portion of thesecurity agent 123. As an alternative, the flowchart ofFIG. 3 can be viewed as depicting an example of elements of a method implemented within thenetwork environment 100. - Beginning with
block 303, thesecurity agent 123 can request a home page of anelectronic commerce system 113. The identity or address of the home page may have been previously specified to thesecurity agent 123. For example, a script that causes thesecurity agent 123 to evaluate theelectronic commerce system 113 at periodic intervals may have provided the address of the home page as an argument to thesecurity agent 123. - Then at
block 306, thesecurity agent 123 can add one or more items or services to a shopping cart or similar purchase request mechanism. For example, thesecurity agent 123 may add an item to a shopping cart that is advertised or displayed on the home page. As another example, thesecurity agent 123 can navigate to an item catalog or similar section of theelectronic commerce system 113 and then select one or more items or services to add to the shopping cart. The number of items or services added can be as few as one item or service or as many as desired. - Next at
block 309, thesecurity agent 123 can begin the checkout process in order to initiate awatchdog transaction 203. For example, thesecurity agent 123 may request a web page generated by theelectronic commerce system 113 that would allow a user to request to purchase the items or service. The requested web page may ask for personally identifying information of the purchaser (e.g., full name, shipping address, etc.) and information for a payment or transaction account (e.g., debit or credit card number, expiration date, CVV code, and/or billing address). - Moving on to block 313, the
security agent 123 can generate or obtain awatchdog transaction account 129 for use with thewatchdog transaction 203. For example, thesecurity agent 123 may generate a new, uniquewatchdog transaction account 129 based on a previously usedwatchdog transaction account 129. For instance, thesecurity agent 123 could change authentication information associated with thewatchdog transaction account 129 to generate a new, unique combination of authentication information or data. As an example, thesecurity agent 123 could update or change one or more of an account holder’s name, billing address (e.g., house number, street name, city, state, and/or zip code, etc.), CVV or expiration date of a previously usedwatchdog transaction account 129 to create a newwatchdog transaction account 129. Thesecurity agent 123 may further search thewatchdog transaction records 139 to confirm that the newly createdwatchdog transaction account 129 does not match a previously usedwatchdog transaction account 129. As another example, thesecurity agent 123 may request a newwatchdog transaction account 129. For example, thesecurity agent 123 may request from an issuing system a new debit or credit card number that has not previously been issued to a customer. Thesecurity agent 123 could then create a customer name, billing address, expiration date, and CVV for the new debit or credit card number and save this information in conjunction with the newly issued credit or debit card number as awatchdog transaction account 129. In such an example, the issuing system might mark the unissued credit or debit card number as reserved or unavailable in order to prevent it from being issued to a legitimate customer. - Next at
block 316, thesecurity agent 123 can submit thewatchdog transaction account 129 to theelectronic commerce system 113. For example, thesecurity agent 123 might complete a form provided by theelectronic commerce system 113 requesting payment or billing information. - Then at
block 319, thesecurity agent 123 can initiate thewatchdog transaction 203. For example, thesecurity agent 123 could submit thewatchdog transaction account 129 as part of an order or purchase request to theelectronic commerce system 113. This could be done in a webform by manipulating a submit or purchase button included in the webpage. This could be similarly accomplished by submitting a hypertext transfer protocol (HTTP) GET or POST request to the electronic commerce system that includes thewatchdog transaction account 129,amount 141 of the purchase, and a list of identifiers of items or services to be purchased. - In parallel at
block 323, thesecurity agent 123 can create awatchdog transaction record 139 for thewatchdog transaction 203 initiated atblock 319. Thewatchdog transaction record 139 can include theamount 141 of thewatchdog transaction 203, themerchant identifier 119 of the merchant operating the electronic commerce system, thewatchdog transaction account 129 used, and thetimestamp 143 reflecting the time at which thewatchdog transaction 203 was initiated with theelectronic commerce system 113. After thewatchdog transaction record 139 is created, it can be stored in theissuer data store 133. - Referring next to
FIG. 4 , shown is a flowchart that provides one example of the operation of a portion of thetransaction authorization system 126. The flowchart ofFIG. 4 provides merely an example of the many different types of functional arrangements that can be employed to implement the operation of the depicted portion of thetransaction authorization system 126. As an alternative, the flowchart ofFIG. 4 can be viewed as depicting an example of elements of a method implemented within thenetwork environment 100. - Beginning with
block 403, thetransaction authorization system 126 can receive a transaction request from theelectronic commerce system 113. The transaction request can represent a request by theelectronic commerce system 113 to authorize a purchase made using a transaction account (e.g., credit or debit card account) issued by the entity operating the issuer computing environment 106 (e.g., the “issuer” of the transaction account). The transaction request can include information such as an account identifier (e.g., a credit or debit card number), authentication information (e.g., the name and billing address associated with the account, the expiration date of the account, a CVV or similar authentication number, etc.), amerchant identifier 119, a time that the transaction occurred, and an amount of the transaction. Accordingly, the transaction request could represent asubsequent transaction 206, awatchdog transaction 203, or other types of transactions. - Then at
block 406, thetransaction authorization system 126 can attempt to authorize the transaction. For example, thetransaction authorization system 126 can determine whether the authentication information matches or is appropriate for the account identified by the account identifier. Further, thetransaction authorization system 126 may attempt to deduct an amount of funds or available credit from the account identified in the transaction request. - Next at
block 409, thetransaction authorization system 126 determines whetherthere was an authorization failure and the reason for the authorization failure. Authorization could occur for any number of reasons, some of which might indicate a security breach while others might indicate other issues. For example, if authorization failed because there were insufficient funds or available credit for the transaction, this would not indicate a security breach. However, if the authorization failed because the account identifier included in the transaction account failed to identify an existing account, this could indicate that a security breach had occurred. If the transaction is successfully authorized, or if authorization failed for a reason other than the account identifier failing to identify an existing account, then the process ends. However, if the authorization fails because the account identifier fails to identify an existing account, then the process proceeds to block 413. - Moving on to block 413, the
transaction authorization system 126 can determine whether the account identified in the failed transaction request was awatchdog transaction account 129. For example, thetransaction authorization system 126 could search thewatchdog transaction records 139 for a matchingwatchdog transaction account 129. If a matchingwatchdog transaction account 129 is identified, then the process proceeds to block 416. If no matching watchdog transaction account is identified, then the process ends. - Then at
block 416, thetransaction authorization system 126 can further analyze the transaction request received atblock 403 to determine if it matches awatchdog transaction record 139. This analysis can be performed in order to determine whether the transaction request is the result of a data breach of a merchant, or if the transaction request represents awatchdog transaction 203 initiated by thesecurity agent 123. For example, if the time of the transaction, themerchant identifier 119 for the transaction, and the amount of the transaction match themerchant identifier 119,amount 141, and timestamp 143 of thewatchdog transaction record 139, then thetransaction authorization system 126 can conclude that the transaction request received atblock 403 is the result of awatchdog transaction 203 initiated by thesecurity agent 123. Accordingly, the process would end. - However, if there is a mismatch, then the
transaction authorization system 126 could conclude that the transaction request was the result of a security breach. For example, ifmerchant identifier 119 in the transaction request received atblock 403 failed to match themerchant identifier 119 in thewatchdog transaction record 139, then thetransaction authorization system 126 could conclude that theelectronic commerce system 113 where thesecurity agent 123 used thewatchdog transaction account 129 had been breached and an attacker was trying to reuse thewatchdog transaction account 129 to make a purchase with another merchant. Similarly, if thetimestamp 143 oramount 141 listed in thewatchdog transaction record 139 failed to match the time or amount of the transaction specified in the transaction request received atblock 403, then thetransaction authorization system 126 could conclude that theelectronic commerce system 113 had been breached and an attacker was attempting to reuse the compromisedwatchdog transaction account 129 for a subsequent purchase. - Next at
block 419, thetransaction authorization system 126 can determine the timeframe in which the breach occurred. For example, if a single instance of a compromisedwatchdog transaction account 129 is identified, then thetransaction authorization system 126 could conclude that the breach occurred on or before the time specified in thetimestamp 143 for the respectivewatchdog transaction record 139 of the compromisedwatchdog transaction account 129. Similarly, if multiple instances of compromised watchdog transaction accounts 129 are identified, then thewatchdog transaction record 139 with theoldest timestamp 143 could be used as an identifier for when the security breach occurred. - Finally, at
block 423, thetransaction authorization system 126 can report the detected breach of the merchant or electronic commerce system identified by themerchant identifier 119 included in thewatchdog transaction record 139 for the compromisedwatchdog transaction account 129. For example, thetransaction authorization system 126 could send an email to a predefined email address of a security or incident response team for the compromised merchant. Similarly, thetransaction authorization system 126 could send an email to a predefined email address of a security or incident response team for the issuer of the watchdog transaction account. The report or message could include the identity of the merchant who was breached, a copy of the transaction authorization received atblock 403, a copy of thewatchdog transaction record 139, and a proposed timeframe for when the breach may have occurred. These messages would allow the appropriate personnel to investigate and mitigate the breach. Although email is used as an illustrative example, other notification approaches may also be used. These can include application notifications (e.g., for a dashboard of a security monitoring system), short message service (SMS) messages, etc. Once the security breach is reported, the process can end. - A number of software components previously discussed are stored in the memory of the respective computing devices and are executable by the processor of the respective computing devices. In this respect, the term “executable” means a program file that is in a form that can ultimately be run by the processor. Examples of executable programs can be a compiled program that can be translated into machine code in a format that can be loaded into a random access portion of the memory and run by the processor, source code that can be expressed in proper format such as object code that is capable of being loaded into a random access portion of the memory and executed by the processor, or source code that can be interpreted by another executable program to generate instructions in a random access portion of the memory to be executed by the processor. An executable program can be stored in any portion or component of the memory, including random access memory (RAM), read-only memory (ROM), hard drive, solid-state drive, Universal Serial Bus (USB) flash drive, memory card, optical disc such as compact disc (CD) or digital versatile disc (DVD), floppy disk, magnetic tape, or other memory components.
- The memory includes both volatile and nonvolatile memory and data storage components. Volatile components are those that do not retain data values upon loss of power. Nonvolatile components are those that retain data upon a loss of power. Thus, the memory can include random access memory (RAM), read-only memory (ROM), hard disk drives, solid-state drives, USB flash drives, memory cards accessed via a memory card reader, floppy disks accessed via an associated floppy disk drive, optical discs accessed via an optical disc drive, magnetic tapes accessed via an appropriate tape drive, or other memory components, or a combination of any two or more of these memory components. In addition, the RAM can include static random access memory (SRAM), dynamic random access memory (DRAM), or magnetic random access memory (MRAM) and other such devices. The ROM can include a programmable read-only memory (PROM), an erasable programmable read-only memory (EPROM), an electrically erasable programmable read-only memory (EEPROM), or other like memory device.
- Although the applications and systems described herein can be embodied in software or code executed by general purpose hardware as discussed above, as an alternative the same can also be embodied in dedicated hardware or a combination of software/general purpose hardware and dedicated hardware. If embodied in dedicated hardware, each can be implemented as a circuit or state machine that employs any one of or a combination of a number of technologies. These technologies can include, but are not limited to, discrete logic circuits having logic gates for implementing various logic functions upon an application of one or more data signals, application specific integrated circuits (ASICs) having appropriate logic gates, field-programmable gate arrays (FPGAs), or other components, etc. Such technologies are generally well known by those skilled in the art and, consequently, are not described in detail herein.
- The flowcharts and sequence diagrams show the functionality and operation of an implementation of portions of the various embodiments of the present disclosure. If embodied in software, each block can represent a module, segment, or portion of code that includes program instructions to implement the specified logical function(s). The program instructions can be embodied in the form of source code that includes human-readable statements written in a programming language or machine code that includes numerical instructions recognizable by a suitable execution system such as a processor in a computer system. The machine code can be converted from the source code through various processes. For example, the machine code can be generated from the source code with a compiler prior to execution of the corresponding application. As another example, the machine code can be generated from the source code concurrently with execution with an interpreter. Other approaches can also be used. If embodied in hardware, each block can represent a circuit or a number of interconnected circuits to implement the specified logical function or functions.
- Although the flowcharts show a specific order of execution, it is understood that the order of execution can differ from that which is depicted. For example, the order of execution of two or more blocks can be scrambled relative to the order shown. Also, two or more blocks shown in succession can be executed concurrently or with partial concurrence. Further, in some embodiments, one or more of the blocks shown in the flowcharts can be skipped or omitted. In addition, any number of counters, state variables, warning semaphores, or messages might be added to the logical flow described herein, for purposes of enhanced utility, accounting, performance measurement, or providing troubleshooting aids, etc. It is understood that all such variations are within the scope of the present disclosure.
- Also, any logic or application described herein that includes software or code can be embodied in any non-transitory computer-readable medium for use by or in connection with an instruction execution system such as a processor in a computer system or other system. In this sense, the logic can include statements including instructions and declarations that can be fetched from the computer-readable medium and executed by the instruction execution system. In the context of the present disclosure, a “computer-readable medium” can be any medium that can contain, store, or maintain the logic or application described herein for use by or in connection with the instruction execution system. Moreover, a collection of distributed computer-readable media located across a plurality of computing devices (e.g., storage area networks or distributed or clustered filesystems or databases) may also be collectively considered as a single non-transitory computer-readable medium.
- The computer-readable medium can include any one of many physical media such as magnetic, optical, or semiconductor media. More specific examples of a suitable computer-readable medium would include, but are not limited to, magnetic tapes, magnetic floppy diskettes, magnetic hard drives, memory cards, solid-state drives, USB flash drives, or optical discs. Also, the computer-readable medium can be a random access memory (RAM) including static random access memory (SRAM) and dynamic random access memory (DRAM), or magnetic random access memory (MRAM). In addition, the computer-readable medium can be a read-only memory (ROM), a programmable read-only memory (PROM), an erasable programmable read-only memory (EPROM), an electrically erasable programmable read-only memory (EEPROM), or other type of memory device.
- Further, any logic or application described herein can be implemented and structured in a variety of ways. For example, one or more applications described can be implemented as modules or components of a single application. Further, one or more applications described herein can be executed in shared or separate computing devices or a combination thereof. For example, a plurality of the applications described herein can execute in the same computing device, or in multiple computing devices in the same computing environment.
- Disjunctive language such as the phrase “at least one of X, Y, or Z,” unless specifically stated otherwise, is otherwise understood with the context as used in general to present that an item, term, etc., can be either X, Y, or Z, or any combination thereof (e.g., X, Y, or Z). Thus, such disjunctive language is not generally intended to, and should not, imply that certain embodiments require at least one of X, at least one of Y, or at least one of Z to each be present.
- It should be emphasized that the above-described embodiments of the present disclosure are merely possible examples of implementations set forth for a clear understanding of the principles of the disclosure. Many variations and modifications can be made to the above-described embodiments without departing substantially from the spirit and principles of the disclosure. All such modifications and variations are intended to be included herein within the scope of this disclosure and protected by the following claims.
Claims (20)
1. A system, comprising:
a computing device comprising a processor and a memory; and
machine-readable instructions stored in the memory that, when executed by the processor, cause the computing device to at least:
initiate a purchase with an electronic commerce system;
provide a watchdog transaction account to the electronic commerce system as payment for the purchase; and
store a record of the purchase, the record comprising a merchant identifier associated with the electronic commerce system and the watchdog transaction account.
2. The system of claim 1 , wherein the machine-readable instructions further cause the computing device to at least:
request a web page provided by the electronic commerce system;
select an item to purchase from the electronic commerce system;
add the item to a shopping cart provided by the electronic commerce system; and
the purchase is initiated in response to the item being added to the shopping cart.
3. The system of claim 1 , wherein the machine-readable instructions further cause the computing device to at least generate the watchdog transaction account.
4. The system of claim 3 , wherein the machine-readable instructions that cause computing device to generate the watchdog transaction account further cause the computing device to at least:
select a previously used account identifier for the respective watchdog transaction account; and
generate a unique combination of authentication information for the previously used account identifier.
5. The system of claim 3 , wherein the machine-readable instructions further cause the computing device to at least search a plurality of previously used watchdog transaction accounts to determine that the generated watchdog transaction account fails to match any of the plurality of previously used watchdog transaction accounts.
6. The system of claim 1 , wherein the record further comprises a timestamp representing a date and time that the purchase was initiated.
7. The system of claim 1 , wherein the watchdog transaction account represents an unissued debit or credit card account.
8. A method, comprising:
initiating a purchase with an electronic commerce system;
providing a watchdog transaction account to the electronic commerce system as payment for the purchase; and
storing a record of the purchase, the record comprising a merchant identifier associated with the electronic commerce system and the watchdog transaction account.
9. The method of claim 8 , further comprising:
requesting a web page provided by the electronic commerce system;
selecting an item to purchase from the electronic commerce system;
adding the item to a shopping cart provided by the electronic commerce system; and
the purchase is initiated in response to the item being added to the shopping cart.
10. The method of claim 8 , further comprising generating the watchdog transaction account.
11. The method of claim 10 , wherein the generating of the watchdog transaction account further comprises:
selecting a previously used account identifier for the respective watchdog transaction account; and
generating a unique combination of authentication information for the previously used account identifier.
12. The method of claim 10 , further comprising searching a plurality of previously used watchdog transaction accounts to determine that the generated watchdog transaction account fails to match any of the plurality of previously used watchdog transaction accounts.
13. The method of claim 8 , wherein the record further comprises a timestamp representing a date and time that the purchase was initiated.
14. The method of claim 8 , wherein the watchdog transaction account represents an unissued debit or credit card account.
15. A non-transitory, computer-readable medium comprising machine-readable instructions that, when executed by a processor of a computing device, cause the computing device to at least:
initiate a purchase with an electronic commerce system;
provide a watchdog transaction account to the electronic commerce system as payment for the purchase; and
store a record of the purchase, the record comprising a merchant identifier associated with the electronic commerce system and the watchdog transaction account.
16. The non-transitory, computer-readable medium of claim 15 , wherein the machine-readable instructions further cause the computing device to at least:
request a web page provided by the electronic commerce system;
select an item to purchase from the electronic commerce system;
add the item to a shopping cart provided by the electronic commerce system; and
the purchase is initiated in response to the item being added to the shopping cart.
17. The non-transitory, computer-readable medium of claim 15 , wherein the machine-readable instructions further cause the computing device to at least generate the watchdog transaction account.
18. The non-transitory, computer-readable medium of claim 17 , wherein the machine-readable instructions that cause computing device to generate the watchdog transaction account further cause the computing device to at least:
select a previously used account identifier for the respective watchdog transaction account; and
generate a unique combination of authentication information for the previously used account identifier.
19. The non-transitory, computer-readable medium of claim 17 , wherein the machine-readable instructions further cause the computing device to at least search a plurality of previously used watchdog transaction accounts to determine that the generated watchdog transaction account fails to match any of the plurality of previously used watchdog transaction accounts.
20. The non-transitory, computer-readable medium of claim 15 , wherein:
the record further comprises a timestamp representing a date and time that the purchase was initiated; and
the watchdog transaction account represents an unissued debit or credit card account.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US18/106,798 US20230196383A1 (en) | 2020-07-02 | 2023-02-07 | Detecting security breaches with watchdog transaction accounts |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US16/919,875 US11580561B1 (en) | 2020-07-02 | 2020-07-02 | Detecting security breaches with watchdog transaction accounts |
US18/106,798 US20230196383A1 (en) | 2020-07-02 | 2023-02-07 | Detecting security breaches with watchdog transaction accounts |
Related Parent Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US16/919,875 Continuation US11580561B1 (en) | 2020-07-02 | 2020-07-02 | Detecting security breaches with watchdog transaction accounts |
Publications (1)
Publication Number | Publication Date |
---|---|
US20230196383A1 true US20230196383A1 (en) | 2023-06-22 |
Family
ID=85198670
Family Applications (2)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US16/919,875 Active 2041-04-30 US11580561B1 (en) | 2020-07-02 | 2020-07-02 | Detecting security breaches with watchdog transaction accounts |
US18/106,798 Pending US20230196383A1 (en) | 2020-07-02 | 2023-02-07 | Detecting security breaches with watchdog transaction accounts |
Family Applications Before (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US16/919,875 Active 2041-04-30 US11580561B1 (en) | 2020-07-02 | 2020-07-02 | Detecting security breaches with watchdog transaction accounts |
Country Status (1)
Country | Link |
---|---|
US (2) | US11580561B1 (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20250086634A1 (en) * | 2023-09-07 | 2025-03-13 | Bank Of America Corporation | System and method for determining data transfer freezes |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20140129360A1 (en) * | 2011-06-30 | 2014-05-08 | Rakuten, Inc. | Credit card information processing system, credit card information processing method, order information receiving device, credit card transaction device, program, and information recording medium |
US20140164091A1 (en) * | 2010-03-19 | 2014-06-12 | Shop Ma, Inc. | Multi-Merchant Payment System Using Shopper Identifiers |
US20140195324A1 (en) * | 2013-01-10 | 2014-07-10 | Antoine Hage | System and method for enhanced commerce |
US20170093812A1 (en) * | 2014-06-02 | 2017-03-30 | Datex Inc. | Tokenizing network appliance and method |
US20210357941A1 (en) * | 2020-05-12 | 2021-11-18 | Capital One Services, Llc | System, method and computer-accessible medium for early merchant breach fraud detection |
US11354673B1 (en) * | 2014-08-06 | 2022-06-07 | Block, Inc. | Data security enhancement for online transactions involving payment card accounts |
Family Cites Families (21)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7996288B1 (en) * | 2000-11-15 | 2011-08-09 | Iprivacy, Llc | Method and system for processing recurrent consumer transactions |
US7584153B2 (en) * | 2004-03-15 | 2009-09-01 | Qsecure, Inc. | Financial transactions with dynamic card verification values |
US7580898B2 (en) * | 2004-03-15 | 2009-08-25 | Qsecure, Inc. | Financial transactions with dynamic personal account numbers |
US7380710B2 (en) * | 2006-04-28 | 2008-06-03 | Qsecure, Inc. | Payment card preloaded with unique numbers |
US20090254447A1 (en) * | 2008-04-04 | 2009-10-08 | Global Launch Incorporated | Methods for selection, purchase and shipping of items for sale |
US8332325B2 (en) * | 2009-11-02 | 2012-12-11 | Visa International Service Association | Encryption switch processing |
US8423467B1 (en) * | 2010-03-08 | 2013-04-16 | Jesper M. Johansson | Merchant-specific shadow account numbers |
US9367684B2 (en) * | 2011-12-15 | 2016-06-14 | Realsource, Inc. | Data security seeding system |
US20130263226A1 (en) * | 2012-01-22 | 2013-10-03 | Frank W. Sudia | False Banking, Credit Card, and Ecommerce System |
US20150339673A1 (en) * | 2014-10-28 | 2015-11-26 | Brighterion, Inc. | Method for detecting merchant data breaches with a computer network server |
US11250431B2 (en) * | 2015-01-26 | 2022-02-15 | Mastercard International Incorporated | Systems and methods for enhanced fraud detection based on transactions at potentially compromised locations |
US10296918B1 (en) * | 2015-03-19 | 2019-05-21 | EMC IP Holding Company LLC | Providing risk assessments to compromised payment cards |
US20170024828A1 (en) * | 2015-07-23 | 2017-01-26 | Palantir Technologies Inc. | Systems and methods for identifying information related to payment card testing |
US20210264458A1 (en) * | 2016-03-25 | 2021-08-26 | State Farm Mutual Automobile Insurance Company | Preempting or resolving fraud disputes relating to introductory offer expirations |
EP3343422B1 (en) * | 2016-12-30 | 2021-04-28 | Capital One Services, LLC | Systems and methods for detecting resources responsible for events |
US20190311361A1 (en) * | 2018-04-09 | 2019-10-10 | Ca, Inc. | Adding security to a transaction by verifying locations |
US11265323B2 (en) * | 2018-11-13 | 2022-03-01 | Paypal, Inc. | Fictitious account generation on detection of account takeover conditions |
US11521211B2 (en) * | 2018-12-28 | 2022-12-06 | Mastercard International Incorporated | Systems and methods for incorporating breach velocities into fraud scoring models |
US10523681B1 (en) * | 2019-05-28 | 2019-12-31 | Capital One Services, Llc | Techniques to automatically update payment information in a compute environment |
US11640606B2 (en) * | 2019-10-31 | 2023-05-02 | Capital One Services, Llc | Systems and methods for providing real-time warnings to merchants for data breaches |
US11062248B1 (en) * | 2020-02-07 | 2021-07-13 | Capital One Services, Llc | Computer-based systems configured to detect fraudulent activities related to card-transacting devices and methods of use thereof |
-
2020
- 2020-07-02 US US16/919,875 patent/US11580561B1/en active Active
-
2023
- 2023-02-07 US US18/106,798 patent/US20230196383A1/en active Pending
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20140164091A1 (en) * | 2010-03-19 | 2014-06-12 | Shop Ma, Inc. | Multi-Merchant Payment System Using Shopper Identifiers |
US20140129360A1 (en) * | 2011-06-30 | 2014-05-08 | Rakuten, Inc. | Credit card information processing system, credit card information processing method, order information receiving device, credit card transaction device, program, and information recording medium |
US20140195324A1 (en) * | 2013-01-10 | 2014-07-10 | Antoine Hage | System and method for enhanced commerce |
US20170093812A1 (en) * | 2014-06-02 | 2017-03-30 | Datex Inc. | Tokenizing network appliance and method |
US11354673B1 (en) * | 2014-08-06 | 2022-06-07 | Block, Inc. | Data security enhancement for online transactions involving payment card accounts |
US20210357941A1 (en) * | 2020-05-12 | 2021-11-18 | Capital One Services, Llc | System, method and computer-accessible medium for early merchant breach fraud detection |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20250086634A1 (en) * | 2023-09-07 | 2025-03-13 | Bank Of America Corporation | System and method for determining data transfer freezes |
Also Published As
Publication number | Publication date |
---|---|
US11580561B1 (en) | 2023-02-14 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US12033148B2 (en) | Systems and methods for providing real-time warnings to merchants for data breaches | |
US7996288B1 (en) | Method and system for processing recurrent consumer transactions | |
US20030195859A1 (en) | System and methods for authenticating and monitoring transactions | |
US20150012430A1 (en) | Systems and methods for risk based decisioning service incorporating payment card transactions and application events | |
CN111344729B (en) | System and method for identifying fraudulent point of co-purchase | |
WO2009055785A2 (en) | Fraud detection using honeytoken data tracking | |
JP2011508924A (en) | Approve credit and debit card transactions using location verification | |
CN111279374B (en) | System and method for identifying data hazard sources | |
US11004069B2 (en) | Article and method for transaction irregularity detection | |
US20130185191A1 (en) | Systems and method for correlating transaction events | |
US20170161746A1 (en) | Compromised Identity Exchange Systems and Methods | |
US11354668B2 (en) | Systems and methods for identifying devices used in fraudulent or unauthorized transactions | |
US10776788B2 (en) | Systems and methods for identifying compromised accounts using historical authorization messages | |
CN109074577B (en) | Wallet Management System | |
US20140250010A1 (en) | Method and system of cookie driven cardholder authentication summary | |
CN111492363A (en) | Detecting data leaks | |
US20240311839A1 (en) | Fraud detection and prevention system | |
US12346471B2 (en) | Systems and methods for hard deletion of data across systems | |
US20140250007A1 (en) | Method and system of cookie driven cardholder authentication summary | |
US20230196383A1 (en) | Detecting security breaches with watchdog transaction accounts | |
CN116739596A (en) | Blockchain-based transaction supervision method, device, equipment, medium and product | |
US20230281687A1 (en) | Real-time fraud detection based on device fingerprinting | |
US7991663B1 (en) | System for volume and stress testing bank debit card processing systems | |
US20240070677A1 (en) | Aggregated transaction accounts | |
US20250078072A1 (en) | Systems and methods for use in authentication, based on network details |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
STPP | Information on status: patent application and granting procedure in general |
Free format text: DOCKETED NEW CASE - READY FOR EXAMINATION |
|
AS | Assignment |
Owner name: AMERICAN EXPRESS TRAVEL RELATED SERVICES COMPANY, INC., NEW YORK Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:BAWEJA, AMAN;DAS, KRISHNENDU;GLUCH, SUSAN K.;AND OTHERS;REEL/FRAME:068880/0443 Effective date: 20200701 |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: NON FINAL ACTION MAILED |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: RESPONSE TO NON-FINAL OFFICE ACTION ENTERED AND FORWARDED TO EXAMINER |