CPC G06Q 20/4016 (2013.01) [G06Q 20/409 (2013.01); G09C 1/00 (2013.01)] | 17 Claims |
1. A system for detecting fraud, comprising:
a non-transitory memory;
a processor;
and at least one application stored in the memory and executable by the processor, wherein the application is in communication with a data store, wherein the application is executed by the processor and causes the processor to perform the steps of:
receiving a request to at least one of view a website;
receiving a request to engage in a transaction using a stored-value card,
wherein the request is associated with an artifact,
wherein the artifact comprises at least one of a profile, a key, a fingerprint, and a digital fingerprint; and
determining whether the artifact is approved to use the stored-value card based upon at least one of:
an analysis of a risk score associated with the request and a risk threshold, wherein the risk threshold is dynamically updated based on real-time system received data,
a determination as to whether the first party is on a banned access list based upon the received artifact,
and a determination as to whether the artifact is associated with the stored-value card;
determining whether the artifact is approved to use the stored-value card, the processor:
based on a determination that the artifact is approved to use the stored-value card, the processor, declining to process the request, based on a determination that at least one of (i) the first party is on the banned access list and (ii) the first party is not approved to use the stored-value card when the risk score is at or above the risk threshold, and instead performs an alternate environment transaction which appears to the first party as a processing of the request, wherein alternate environment comprises a dummy website.
|