Chatterjee et al., 2024 - Google Patents
Digital twin for credit card fraud detection: Opportunities, challenges, and fraud detection advancementsChatterjee et al., 2024
- Document ID
- 18441967849120892093
- Author
- Chatterjee P
- Das D
- Rawat D
- Publication year
- Publication venue
- Future Generation Computer Systems
External Links
Snippet
Credit cards are widely used for payments due to their convenience and broad acceptance. Their popularity comes with the critical challenge of safeguarding personal and payment information from fraud and unauthorized access. Robust security measures are crucial to …
- 238000001514 detection method 0 title abstract description 270
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/40—Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
- G06Q20/401—Transaction verification
- G06Q20/4016—Transaction verification involving fraud or risk level assessment in transaction processing
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/382—Payment protocols; Details thereof insuring higher security of transaction
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/71—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
- G06F21/77—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K19/00—Record carriers for use with machines and with at least a part designed to carry digital markings
- G06K19/06—Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/04—Payment circuits
- G06Q20/042—Payment circuits characterized in that the payment protocol involves at least one cheque
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q40/00—Finance; Insurance; Tax strategies; Processing of corporate or income taxes
- G06Q40/02—Banking, e.g. interest calculation, credit approval, mortgages, home banking or on-line banking
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Chatterjee et al. | Digital twin for credit card fraud detection: Opportunities, challenges, and fraud detection advancements | |
US11276064B2 (en) | Active malfeasance examination and detection based on dynamic graph network flow analysis | |
Udeh et al. | The role of big data in detecting and preventing financial fraud in digital transactions | |
Kayikci et al. | Blockchain meets machine learning: a survey | |
US11831666B2 (en) | Blockchain data breach security and cyberattack prevention | |
US20230105207A1 (en) | System and methods for intelligent entity-wide data protection | |
Chatterjee et al. | Securing financial transactions: Exploring the role of federated learning and blockchain in credit card fraud detection | |
Zkik et al. | Securing blockchain-based crowdfunding platforms: an integrated graph neural networks and machine learning approach | |
Saxena et al. | Semantic analysis of blockchain intelligence with proposed agenda for future issues | |
Sambrow et al. | Integrating Artificial Intelligence in Banking Fraud Prevention: A Focus on Deep Learning and Data Analytics | |
Adebayo et al. | Comparative Review of Credit Card Fraud Detection using Machine Learning and Concept Drift Techniques | |
Arora et al. | Blockchain-based deep learning in IoT, healthcare and cryptocurrency price prediction: a comprehensive review | |
US20240127252A1 (en) | Risk insights utility for traditional finance and decentralized finance | |
Baabdullah et al. | Efficiency of Federated Learning and Blockchain in Preserving Privacy and Enhancing the Performance of Credit Card Fraud Detection (CCFD) Systems | |
Wang et al. | AI Empowers Data Mining Models for Financial Fraud Detection and Prevention Systems | |
AFOTANWO | Exploring Blockchain based Smart Contracts and Privacy Preserving Cryptocurrencies | |
Patel et al. | An exploration to blockchain-based deep learningframework | |
Dubey et al. | Blockchain and Machine Learning for Data Analytics, Privacy Preserving, and Security in Fraud Detection | |
Rabbani et al. | Enhancing security in financial transactions: a novel blockchain-based federated learning framework for detecting counterfeit data in fintech | |
Castillo | Blockchain: A decentralized solution for secure applications | |
Ramli | Big Data and Artificial Intelligence to Develop Advanced Fraud Detection Systems for the Financial Sector | |
US12047413B2 (en) | Apparatus, method and computer program product for identifying a set of messages of interest in a network | |
Aaron et al. | Ma-chine learning techniques for enhancing security in financial technology systems | |
Winner Olabiyi et al. | Real-Time Transaction Analysis: The Importance of Analyzing Transactions to Detect Fraud Quickly | |
Aamir | Enhancing Security in Payment Processing through AI-Based Anomaly Detection |