Systems and methods for identifying devices used in fraudulent or unauthorized transactions
A computer-based method for identifying a user computing device used in a fraudulent transaction is provided. The method includes receiving device data associated with the user computing device during a first payment transaction initiated from the user computing device, wherein the device data is ca...
Gespeichert in:
Hauptverfasser: | , , |
---|---|
Format: | Patent |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext bestellen |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
Zusammenfassung: | A computer-based method for identifying a user computing device used in a fraudulent transaction is provided. The method includes receiving device data associated with the user computing device during a first payment transaction initiated from the user computing device, wherein the device data is capable of uniquely identifying the user computing device. The method further includes storing the device data within the at least one memory device, and receiving an indication that the first payment transaction initiated from the user computing device was fraudulent. The method further includes assigning a risk factor to the user computing device, and transmitting the risk factor to a merchant, wherein the merchant uses the risk factor to determine whether to process a resale transaction initiated from the user computing device wherein the resale transaction is associated with a resale of goods acquired in association with the first payment transaction. |
---|