US 12,260,412 B2
Systems and methods for dynamically detecting and preventing consumer fraud
Henry Ivey, Pleasanton, CA (US); Rajiv Venkataramana Appana, Fremont, CA (US); Patrick Ramsey, Pleasanton, CA (US); and Theodore Yeh, Pleasanton, CA (US)
Assigned to Blackhawk Network, Inc., Pleasanton, CA (US)
Filed by Blackhawk Network, Inc., Pleasanton, CA (US)
Filed on Dec. 11, 2023, as Appl. No. 18/535,976.
Application 18/535,976 is a continuation of application No. 17/549,451, filed on Dec. 13, 2021, granted, now 11,887,125.
Application 17/549,451 is a continuation of application No. 14/789,710, filed on Jul. 1, 2015, granted, now 11,232,452, issued on Jan. 25, 2022.
Claims priority of provisional application 62/019,975, filed on Jul. 2, 2014.
Prior Publication US 2024/0104575 A1, Mar. 28, 2024
This patent is subject to a terminal disclaimer.
Int. Cl. G06Q 20/00 (2012.01); G06Q 20/40 (2012.01); G09C 1/00 (2006.01)
CPC G06Q 20/4016 (2013.01) [G06Q 20/409 (2013.01); G09C 1/00 (2013.01)] 17 Claims
OG exemplary drawing
 
1. A system for detecting fraud, comprising:
a non-transitory memory;
a processor;
and at least one application stored in the memory and executable by the processor, wherein the application is in communication with a data store, wherein the application is executed by the processor and causes the processor to perform the steps of:
receiving a request to at least one of view a website;
receiving a request to engage in a transaction using a stored-value card,
wherein the request is associated with an artifact,
wherein the artifact comprises at least one of a profile, a key, a fingerprint, and a digital fingerprint; and
determining whether the artifact is approved to use the stored-value card based upon at least one of:
an analysis of a risk score associated with the request and a risk threshold, wherein the risk threshold is dynamically updated based on real-time system received data,
a determination as to whether the first party is on a banned access list based upon the received artifact,
and a determination as to whether the artifact is associated with the stored-value card;
determining whether the artifact is approved to use the stored-value card, the processor:
based on a determination that the artifact is approved to use the stored-value card, the processor, declining to process the request, based on a determination that at least one of (i) the first party is on the banned access list and (ii) the first party is not approved to use the stored-value card when the risk score is at or above the risk threshold, and instead performs an alternate environment transaction which appears to the first party as a processing of the request, wherein alternate environment comprises a dummy website.