Chatterjee et al., 2024 - Google Patents

Digital twin for credit card fraud detection: Opportunities, challenges, and fraud detection advancements

Chatterjee et al., 2024

Document ID
18441967849120892093
Author
Chatterjee P
Das D
Rawat D
Publication year
Publication venue
Future Generation Computer Systems

External Links

Snippet

Credit cards are widely used for payments due to their convenience and broad acceptance. Their popularity comes with the critical challenge of safeguarding personal and payment information from fraud and unauthorized access. Robust security measures are crucial to …
Continue reading at www.sciencedirect.com (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/401Transaction verification
    • G06Q20/4016Transaction verification involving fraud or risk level assessment in transaction processing
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/71Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
    • G06F21/77Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in smart cards
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06KRECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K19/00Record carriers for use with machines and with at least a part designed to carry digital markings
    • G06K19/06Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/04Payment circuits
    • G06Q20/042Payment circuits characterized in that the payment protocol involves at least one cheque
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • G06Q40/02Banking, e.g. interest calculation, credit approval, mortgages, home banking or on-line banking
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06KRECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K9/00Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints

Similar Documents

Publication Publication Date Title
Chatterjee et al. Digital twin for credit card fraud detection: Opportunities, challenges, and fraud detection advancements
US11276064B2 (en) Active malfeasance examination and detection based on dynamic graph network flow analysis
Udeh et al. The role of big data in detecting and preventing financial fraud in digital transactions
Kayikci et al. Blockchain meets machine learning: a survey
US11831666B2 (en) Blockchain data breach security and cyberattack prevention
US20230105207A1 (en) System and methods for intelligent entity-wide data protection
Chatterjee et al. Securing financial transactions: Exploring the role of federated learning and blockchain in credit card fraud detection
Zkik et al. Securing blockchain-based crowdfunding platforms: an integrated graph neural networks and machine learning approach
Saxena et al. Semantic analysis of blockchain intelligence with proposed agenda for future issues
Sambrow et al. Integrating Artificial Intelligence in Banking Fraud Prevention: A Focus on Deep Learning and Data Analytics
Adebayo et al. Comparative Review of Credit Card Fraud Detection using Machine Learning and Concept Drift Techniques
Arora et al. Blockchain-based deep learning in IoT, healthcare and cryptocurrency price prediction: a comprehensive review
US20240127252A1 (en) Risk insights utility for traditional finance and decentralized finance
Baabdullah et al. Efficiency of Federated Learning and Blockchain in Preserving Privacy and Enhancing the Performance of Credit Card Fraud Detection (CCFD) Systems
Wang et al. AI Empowers Data Mining Models for Financial Fraud Detection and Prevention Systems
AFOTANWO Exploring Blockchain based Smart Contracts and Privacy Preserving Cryptocurrencies
Patel et al. An exploration to blockchain-based deep learningframework
Dubey et al. Blockchain and Machine Learning for Data Analytics, Privacy Preserving, and Security in Fraud Detection
Rabbani et al. Enhancing security in financial transactions: a novel blockchain-based federated learning framework for detecting counterfeit data in fintech
Castillo Blockchain: A decentralized solution for secure applications
Ramli Big Data and Artificial Intelligence to Develop Advanced Fraud Detection Systems for the Financial Sector
US12047413B2 (en) Apparatus, method and computer program product for identifying a set of messages of interest in a network
Aaron et al. Ma-chine learning techniques for enhancing security in financial technology systems
Winner Olabiyi et al. Real-Time Transaction Analysis: The Importance of Analyzing Transactions to Detect Fraud Quickly
Aamir Enhancing Security in Payment Processing through AI-Based Anomaly Detection