CPC G06Q 30/0185 (2013.01) [G06Q 20/204 (2013.01); G06Q 20/341 (2013.01); G06Q 20/352 (2013.01); G06Q 20/354 (2013.01); G06Q 20/40 (2013.01); G06Q 20/42 (2013.01); H04W 4/80 (2018.02); H04W 12/12 (2013.01); H04W 84/12 (2013.01)] | 20 Claims |
1. A computer-implemented method comprising:
receiving, by a server and from a mobile device, an identification of a transaction card and a first plurality of signals that are transmitted by one or more first devices in physical proximity to the transaction card and detected by the transaction card via a periodic scan;
receiving, by the server and at a time of an attempted transaction, the identification of the transaction card and a second plurality of signals that are transmitted by one or more second devices in physical proximity to the transaction card and detected by the transaction card at the time of the attempted transaction;
generating, by the server and based on a determination that the one or more second devices do not comprise a subset of the one or more first devices, a message that the attempted transaction is unauthorized; and
sending the message that the attempted transaction is unauthorized.
|