CPC G06Q 50/265 (2013.01) [G06Q 20/108 (2013.01); G06F 21/57 (2013.01)] | 20 Claims |
1. A computer-implemented method, comprising:
acquiring, by a provider computing system, information regarding a user enrolled in a breach notification service including information regarding a mobile wallet application of a user device of the user;
generating, by the provider computing system, one or more indicators of a data breach for an entity that stores one of transactional behavior data regarding the user or an indication of a transaction with the user in a past predefined time period;
determining, by the provider computing system, that the one or more indicators meet a threshold level for notifying the user of the data breach;
in response to determining that the one or more indicators meet the threshold level, generating, by the provider computing system, a first notification specific to the user regarding the data breach and including an option to scan transaction information of the user for suspected fraudulent activity at the entity;
providing, by the provider computing system, the first notification to the user during a log-in process associated with the provider computing system, the first notification being provided subsequent to an authorization of the user during the log-in process;
receiving, by the provider computing system, an indication from the user to exercise the option to scan the transaction information of the user for suspected fraudulent activity at the entity;
scanning, by the provider computing system, the transaction information;
determining, by the provider computing system, a suspected fraudulent transaction based on scanning the transaction information;
generating, by the provider computing system and in response to determining the suspected fraudulent transaction, a second notification specific to the user and the suspected fraudulent transaction, the second notification comprising a location and date of the suspected fraudulent transaction and a selectable option to indicate that the suspected fraudulent transaction is fraudulent;
providing, by the provider computing system, the second notification to the user during the log-in process associated with the provider computing system; and
in response to receiving an indication of a selection of the selectable option, i) deactivating, by the provider computing system, a payment card associated with the fraudulent transaction; ii) providing, by the provider computing system, a supplemental notification to the user regarding the fraudulent transaction; and iii) providing, by the provider computing system, a temporary virtual card to the mobile wallet application of the user device.
|