METHOD FOR AUTHENTICATING TRANSACTIONS IN REAL-TIME
Inventors
Vikram Devdas, Sidhant Bahl
Abstract
One variation of a method for detecting fraudulent transactions includes, in response to receiving a first transaction request for a first transaction initiated at a first merchant, the first transaction request specifying a payment identifier and a first transaction value, accessing a user profile associated with a user based on the payment identifier. The method further includes, in response to the first transaction value exceeding a threshold transaction value stored at the user profile: transmitting a verification request to the user to confirm the first transaction; and, in response to receiving confirmation of the first transaction from the user, approving the first transaction request. The method further includes, in response to receiving a second transaction request for a second transaction initiated at a second merchant, the second transaction request specifying the payment identifier and a second transaction value less than the threshold transaction value, approving the second transaction request.
CPC Classifications
Filing Date
2025-09-19
Application No.
19334031