Abstract:
A system and methods for assessing risk of fraud associated with a unique identifier associated with a telecommunication device of a user. The disclosed system utilizes one or more datasets of traffic representing network sessions over a telecommunications network. The system uses machine learning techniques to analyze network session data and/or static or dynamic attributes characterizing the network session data, and generates a risk scoring model that assesses the likelihood that the user is associated with fraudulent activities. The system receives a unique identifier and queries the one or more datasets for data characterizing traffic over the telecommunications network associated with the unique identifier. The system analyzes the traffic data associated with the unique identifier based on the risk scoring model and generates a score, grade, reason code, or other characterization indicating the likelihood of fraud associated with the unique identifier.
Abstract:
System and method for generating RCS message templates using a graphical user interface (GUI) with concurrent representative display. Templates are generated based on inputs via an input region of the GUI. Inputs can include a template name, a template type, and message content, which can include text, images, video, interactive buttons or icons, and so forth. Inputs can be static or parameterized. A representative message based on the template is concurrently displayed in a display region of the GUI. Based on the inputs, the system generates RCS message templates, such as by compiling JSON code corresponding to the user inputs and the representative display. The templates can be used to generate and send finalized RCS messages, such as text messages, rich cards, and so forth, by invoking a generated template and providing data for any parameterized fields in the template.
Abstract:
System and method for generating RCS message templates using a graphical user interface (GUI) with concurrent representative display. Templates are generated based on inputs via an input region of the GUI. Inputs can include a template name, a template type, and message content, which can include text, images, video, interactive buttons or icons, and so forth. Inputs can be static or parameterized. A representative message based on the template is concurrently displayed in a display region of the GUI. Based on the inputs, the system generates RCS message templates, such as by compiling JSON code corresponding to the user inputs and the representative display. The templates can be used to generate and send finalized RCS messages, such as text messages, rich cards, and so forth, by invoking a generated template and providing data for any parameterized fields in the template.
Abstract:
A subscriber information authentication system that compares network-obtained and device-obtained information to verify that a device being used in connection with a user account is authenticated for that account. Certain subscriber information may be associated with the account during a registration process. In subsequent attempts to access the account, the registered subscriber information may be used in conjunction with information obtained from a telecommunication network and from a device to verify that the device is authorized. The information from the telecommunication network may be queried using Signaling System No. 7 (“SS7”) protocols. The device authorization may be performed, for example, to ensure that a device being used for device-based verification is the device a user purports it to be.
Abstract:
A verification method and system are disclosed that verify a user. The user is provided a verification code via, for example, a website, to be communicated to the system via an application on a mobile communication device. If the correct verification code is communicated by the user, the user receives via the application a verification message containing another verification code, which the user submits to a website or on-line form or to another verification system for authentication.
Abstract:
A service call between a service user and a call center for a service provider is established when the service user is contacted or calls into the call center of the service provider. The service provider may request basic account information for verification of the identity of the service user. If the service provider determines that a further verification of the user's identity is necessary, the service provider may send a verification code to the service user via the user communication device. The verification code is relayed back to the service provider. The transmitted verification code and the relayed verification code are compared and if the codes match, the user is authenticated.
Abstract:
A frictionless multi-factor authentication system and method (“FMFA system”) that facilitates verification of the identity of a website user, registrant or applicant. The FMFA system reduces or removes the burden on the user by eliminating the additional manual second step traditionally required by two-factor authentication methods, and replacing the second step with an automated authentication step based on the location of a mobile device that is associated with the user. The FMFA system may be utilized for authenticating users to access sensitive data on online accounts, applications and websites, download files, perform online transactions, store information through websites or data stores, or the like. The FMFA system allows registration information obtained from a previously-registered user to authenticate the user on subsequent visits or logins to the website.
Abstract:
A verification and notification system. The system receives information including a telephone number from a user during an attempt by the user to access a service. The telephone number is verified by establishing a short message service (SMS) connection with the user using the received telephone number, and receiving a submitted verification code entered by the user. The received information and verified telephone number are used to complete the registration process and enable the user to access the service. Upon the occurrence of a notification event, an indication of the occurrence of the notification event is transmitted to the verified telephone number. The system receives an acknowledgement of an action associated with the notification event from the user.
Abstract:
A user provides at least one electronic contact address, such as a telephone number, during a registration process. The user is verified by establishing a connection with the user via the electronic contact address. Notification events are established, and the electronic contact address re-verified with the user via the electronic contact address when the notification event occurs. A re-verification code is conveyed to the user, which is returned by the user via an on-line form or telephone entry.
Abstract:
A behavioral characteristics authentication system and method (“BCA system”) that facilitates authentication of the identity of a user, registrant, or applicant of a website, application, or other accessible computer resource using a verification process that incorporates behavioral characteristics. In operation, the BCA system compares a single user's behavior with their previous behavior, a user's behavior with behavior generally attributed to non-fraudulent behavior, or a user's behavior with behavior generally attributed to fraudulent behavior. The population of other users that a user's behavior is compared with may be selected to have similar demographic or other characteristics as the user. By analyzing various behavioral characteristics associated with legitimate or fraudulent multi-factor authentication attempts, the BCA system adds another layer of security to online transactions.