WO2023129354A1 - Systems and methods for authenticating online users and providing graphic visualizations of an authentication process - Google Patents

Systems and methods for authenticating online users and providing graphic visualizations of an authentication process Download PDF

Info

Publication number
WO2023129354A1
WO2023129354A1 PCT/US2022/052201 US2022052201W WO2023129354A1 WO 2023129354 A1 WO2023129354 A1 WO 2023129354A1 US 2022052201 W US2022052201 W US 2022052201W WO 2023129354 A1 WO2023129354 A1 WO 2023129354A1
Authority
WO
WIPO (PCT)
Prior art keywords
authentication
data
rba
transaction
transactions
Prior art date
Application number
PCT/US2022/052201
Other languages
French (fr)
Inventor
Julia Sharon GOSSET
Warda Zahid KHAN
Felix Johannes FLORY
Adam Kenneth HOSP
Chengxi LI
Christopher John MERZ
Original Assignee
Mastercard International Incorporated
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Priority claimed from US17/567,015 external-priority patent/US20220122087A1/en
Application filed by Mastercard International Incorporated filed Critical Mastercard International Incorporated
Publication of WO2023129354A1 publication Critical patent/WO2023129354A1/en

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/401Transaction verification
    • G06Q20/4016Transaction verification involving fraud or risk level assessment in transaction processing
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/02Payment architectures, schemes or protocols involving a neutral party, e.g. certification authority, notary or trusted third party [TTP]
    • G06Q20/027Payment architectures, schemes or protocols involving a neutral party, e.g. certification authority, notary or trusted third party [TTP] involving a payment switch or gateway
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/08Payment architectures
    • G06Q20/12Payment architectures specially adapted for electronic shopping systems
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • H04L63/105Multiple levels of security

Definitions

  • the present application relates generally to authenticating online users over an electronic network, and more particularly, to. authenticating online users with an access control server using risk-based aritheiitication.
  • the bank that issued the payment card for the transaction contracts with an access control server (ACS) for authentication services.
  • the ACS analyzes at least some of the data associated with the transaction, determines whether or not it is likely that the alleged cardholder is, in fact, the actual or legitimate cardholder, and reports that determination to the issuer.
  • contracting with an ACS for authentication services may be relatively expensive for an issuer.
  • different issuers may contract with different ACSs. Accordingly, the amount of data that a particular ACS is able to leverage when performing authentication services may be fairly limited, as that ACS may only have access to a relatively small number of transactions.
  • ACSs do not have the capability to perform more sophisticated (and thus more accurate) autiienticatioa procedures.
  • ACSs that, are able io provide some level of fraud detection capability may temporarily lose such capability (e.g., due to equipment malfimction), directly impacting their ability to successMly authenticate online users.
  • Some authentication systems may also implement strong consumer authentication (SCA) (or just “strong anilieiiticatiou”) for certain traiisactious.
  • SCA strong consumer authentication
  • an issuing bank may insist on authenticating consumers during online tRuisactions (e.g,, witli a username and password, or by SMS text message).
  • Such tools may help issuers verify identity and authenticate cardholders, but they may also increase fiiction with the cardholders, which sometimes leads to transactions being abandoned. This can result in losses to the merchant and to the tmderiying payment card network.
  • SCA methods such as passwords may be less trtistworihy than others, which may lead to increased risk in transactions.
  • regulators may require SCA on digital transactions.
  • RMI Reserve Bank of India
  • India India’s central bank
  • certain classes of digital transactions e.g., those involving more than 2,000 Rupees
  • SCA SCA
  • a coinputer-impleinented authentication platform th at is capable of performing sophisticated authentication services on behalf of ACSs that are unable to do so.
  • a computer-implemented method for authenticating an online user is provided.
  • Hie method is implemented using a computing system including at least one processor and a memory device.
  • the method includes steps performed by the at least one processor including receiving, from a requestor server in caiiimunication with a merchant website, an authentication reques t message including authentication data collected from a user computing device during an online interaction with the merchant website.
  • the steps also include extracimg the authentication data from the authentication request message, and applying a riskbased authentication (RBA) engine to the autlieuticatiou data to obtain RBA result data including a reason code.
  • the reason code includes no more than three bytes of data.
  • the steps further indude causing the reason code to be embedded in an authorization request message generated during die online interaction and routed to a decisioning server via a payment network.
  • the authorization request message is formatted according to a set of proprietary conmiunications standards promulgated by the payment network for exchange of data between institutions that are members of the payment network.
  • a computing system for authenticating an online user includes at least one processor and a memory device.
  • the at least one processor is programmed to perform steps including receiving, from a requestor server in communication with a merchant website, an an&enticatioH request message including authentication data collected from a user computing device during an online interaction with the merchant website.
  • the steps also include extracting the authentication data from the. authentication request message, and applying a risk-based authentication (RBA). engine to the authentication data to obtain RBA result data including a reason code.
  • the reason code includes no more than three bytes of data.
  • the steps further include causing the reason code to be embedded in an authorization request message generated during the online interaction and routed to a decisioning server via a payment network.
  • the authorization request message is formatted according to a set of proprietary communications standards promulgated by the payment network for exchange of data between institutions that are member's of the payment network.
  • At least one non-transitory computer-readable medium inchiding instructions stored thereon for authenticating an online user is provided.
  • the instructions are executable by at least oile processor to cause the at least one processor to perform steps including receiving, from a requestor server in communication with a merchant website, an authentication request message including authentication data collected fr om a user computing device during an online interaction with the merchant website.
  • the steps also include extracting the autlieutication data from the authentication request message, and applying a risk- based authentication (RBA) engine to the authentication data to obtain RBA result data including a reason code.
  • RBA risk- based authentication
  • the reason code includes no more than three bytes of data
  • the steps further include causing the reason code to be embedded in an authorization request message generated during the online interaction and routed to a decisioning server via a payment network.
  • the authorization request message is formated according to a set of proprietary communications standards promulgated by the payment network for exchange of data between institutions that are members of the payment network.
  • FIGS. 1 - 17 show example embodiments of the methods and systems described herein.
  • FIG. 1 is a schematic diagram illustrating an example RB A platform in communication with a multi-party payment card system for processing payment transactions iu accordance with one embodiment of the present disclosure.
  • FIG . 2 is an expanded block diagram of an example embodiment of a computer system used in processing pawent transactions that includes a server system in accordance with one example embodiment of the present disclosure.
  • FIG. 3 illustrates an exampleconfiguration of a server system such .as the server system shown in FIG. 2.
  • FIG. 4 illustrates an example configuration of a client system shown in
  • FIG. 5 is a schematic diagram illustrating transaction flow m an example authentication system.
  • FIG. 6 is a schematic diagram illustrating transaction flow in snoilier example authentication system.
  • FIG. 7 is a flow diagram of au example method for authenticating a riser on behalf of an access control server (ACS).
  • ACS access control server
  • FIG. 8 is a data flow diagram of another example method for authenticating an online user.
  • FIG. 9 is a flow diagram of another example method for authenticating an online user.
  • FIG. 10 is a flow diagram of a further example method for authenticating an online user.
  • FIG. 1 I A is a swim-lane diagrams illustrating additional example embodiments involving conditional SC A evaluation on transactions associated with a regulated market.
  • FIGS. 11 B is a continuation of the swim-lane diagram shown in FIG.
  • FIG. 12 is a flow diagram of a further example advanced autheiitication process for autheiiticatirrg; an online user and for increasing approvals, reducing fraud, and improving consumer experience.
  • FIG, 13 is a schematic diagram illustrating transaction flow in another example authentication system.
  • FIG. 14 is an example of a gr aphic visualization generated by a visualization engine in commmiication with the authentication system.
  • FIG. 15A is another example of a grapliic visualization generated by the visualization engine.
  • FIG. 15B is another example of the graphic visualization shown in
  • FIG. 16 is another example of a graphic visualization generated by the visualization engine.
  • FIG. 17 is another example of a graphic visualization generated by the visualization engine.
  • a riskbased authentication enabled (RBA-enabled) directory server receives an authentication request message, the authentication request message includes authentication data.
  • the RBA-enabled directory sei ver extracts the authentication data from the authentication request message, and transmits the extracted authentication data to an RBA engine.
  • the RBA engine then generates, based at least in part on the extracted autlienticatiou data, RBA result data including a risk score, a risk analysis, and at least one reason code, and transmits the RB A result data to the RBA-enabled directory server.
  • Tire RBA-enabled directory server embeds the RBA result data into the authentication request message to generate an enhanced authentication request message, and tiansmits the enhanced auilientication request message to the ACS to enable the ACS to make an authentication decision based on the RBA result data.
  • a bank that issued a payment card for a transaction (referred to as the issuer) contracts with an ACS for authentication services.
  • the ACS analyzes at least some of the data associated with the transaction, determines whether or not it is likely that the alleged cardholder is, hi fact, the actual or legitimate cardholder, and reports that determination to the issuer, hi some markets, regulator’s may mandate strong consumer authentication on certain types of transactions, such as card-not-preseut (CNP) transactions.
  • CNP card-not-preseut
  • Such regulation is directed at reducing online fraud, but often at the expense of cus tomer and merchant satisfaction . For example, forcing customers to provide password or pin information or respond to a text message for 100% of transactions within feat market increases friction in online purchasing environments, leading to increased rates of abandonment due to the customers’ frustrations.
  • contracting with an ACS for authentication services may be relatively expensive for an issuer.
  • ACSs may contract with different issuers. Accordingly, the amount of data that a particular ACS is able to leverage when performing authentication services may be fairly limited, as that ACS may only have access to a relatively small number of transactions . Further, at least some ACSs do not have the capability to perforin more sophisticated (and thus more accurate) authentication procedures. In addition, ACSs feat are able to provide some level of fraud detection capability may temporarily lose those capabilities te g._ due to equipment malfunction), direcdy impacting their ability to successfully authenticate online users. Further, at least some ACSs rely on their associated issuers for updated and accurate fraud information. Accordingly, those ACSs can only improve their fraud detection and authentication procedures if they receive fee necessary data from those issuers.
  • ACSs do not have sufficient resources to develop more sophisticated authentication procedures, and accordingly, are unable to compete with more sophisticated entities.
  • some issuers only contract with an ACS for specific ranges of payment card numbers . Therefore, a specific payment card involved in a transaction might not be enrolled on the directory server wife a vendor authentication solution or issuer implemented authentication solution, such as an ACS.
  • the ACS may be unavailable for authentication processing. This may be due to network connectivity issues between the directory server and the ACS.
  • the ACS may be shut down.
  • the ACS may also be overloaded and unable to process authentications in a timely manner.
  • the ACS may not return a response from any request in a timely manner .
  • the ACS may return a response indicating that it was unable to authenticate the cardholder. This response may indicate that the cardholder is not enrolled with the ACS or that the ACS is unavailable.
  • the systems and methods described herein allow the authentication process to be perfonued whether or not an ACS is available and allow an ACS to realize the benefits of RB A procedures, even if the ACS lacks the capability to perform more sophisticated authentication procedures, such as RBA.
  • the systems and methods described herein allow for reduced messaging traffic and processing load on the ACS by filtering the authentications to determine if the AC S is necessary to the authentication process.
  • the RBA-enabled directory server allows low-risk, low-value transactions to avoid SCA step-up challenges to the consumer, while forcing SCA for transactions above a particular transaction value (e.g., above 2,000 rupees), or for transactions that are above a particular risk threshold
  • the RBA-enabled directory server allows regulators to set both a transaction value threshold and a risk threshold lor when SCA may be avoided.
  • Some regulators may agree that, for certain low-risk, low-value transactions, the increased friction that SCA adds to the tiausaetion process may not be worth the marginal reduction in fraud in those situations.
  • the occmTence of fraud in low-value transactions may be relatively small and, with the value of those transactions being low, the amount of loss due to low-value transactions may also be relatively small.
  • those transactions with a low le vel of risk may represent only a small fraction of fraud, thereby further marginalizing their contribution to overall fraud.
  • regulators may configure the RBA-enabled directory server to avoid SCA when the transaction value is low ami when the risk that the transaction is fraudulent is determined to be low.
  • the RBA-enabled directory server provides a graphical user interface (GUI) to the regulators that provides an insight into fraud within their regulated market, and may allow the regulators to directly configure operational aspects of the RBA-enabled directory server, such as changing threshold values used in the conditional SCA process for their market.
  • the GUI may allow the regulators to evaluate current performance of existing thresholds, displaying and comparing fraud data on transactions above or below the configured thresholds, such as the basis points of fraud lost during a particular period of time.
  • the GUI may also allow regulators to evaluate potential threshold values, providing an estimate of fraud levels based on a set of prospective threshold values. As such, regulators may use such simulations to detennine how they may set or change threshold values for their market.
  • RBA refers to performing authentication on transactions using a rich, comprehensive data set that is generally not available to an issuer or ACS.
  • RB A may include performing authentication using the 3DS 2 Protocol (for example versions 2.0, 2.1. 2.2, arid subsequent versions of the 3 DS Protocol).
  • the 3DS Protocols are owned and updated by EMVCo.
  • RBA may be performed by an authentication platform that is operated by a payment processing network.
  • the authentica tion platform is capable of leveraging large volumes of historical transaction data for all transactions previously processed by the payment processing network (as compared to the relatively small number of transactions processed by a particular ACS).
  • the authentication system uses the 3 DS 2 Protocol (or subsequent versions of the 3DS Protocol) for authentication, and performs RBA and potentially authentication on behalf of ACS providers that am unable to perform RBA.
  • An RBA-enabled directory server is communicatively coupled to a RBA engine (which may be collectively referred to as an aw&enticatioH platfoim).
  • the RBA-enabled directory server and the RB A engine facilitate performing RB A behalf of ACS provider s, as described herein.
  • Tire RBA-enabled directory server and the RBA engine may be operated, for example, by an interchange network (e g., a payment processing network).
  • an interchange network e g., a payment processing network
  • the RBA-enabled directory server receives an authentication request (AReq) message from a IDS server. However, instead of immediately forwarding the AReq message to an ACS, the RBA-enabled directory server transmits at least some of the data in the AReq message (e.g fashion autlieuticatiou data) to the RBA engine. Alternatively, the RBA-enabled directory server may evaluate the transaction to determine with which inarket(s) the transaction is associated (e,g., based on merchant, merchant bank, issuing bank, consumer , and so forth) .
  • AReq authentication request
  • the RBA-enabled directory server may evaluate the transaction to determine with which inarket(s) the transaction is associated (e,g., based on merchant, merchant bank, issuing bank, consumer , and so forth) .
  • foe RBA-enabled directory server compares the transaction value wifo the configured transaction value threshold set by the regulators of the associated market. If the transaction value is below the transaction value threshold, then the RBA engine evaluates foe risk of the transaction using transaction data and other data available to the RBA-enabled directory server.
  • the RBA-enabled directory server determines whether or not the ACS available by transmitting the authentication request message to the ACS. In these embodiments, the RBA-enabled directory server waits a predetermined period of time for a response from the ACS . The RB A-euabled directory server determines that the ACS is unavailable if no response is received from the ACS after the predetermined period of time. Alternatively, the RBA-enabled directory server may receive a response from the ACS that indicates (hat foe ACS is unable to perform authentication. The response from foe ACS may indicate that the online user is not enrolled with the ACS, that foe ACS is currently unavailable, or that the ACS was unable to authenticate the online user. In other embodiments, the RBA- enabled directory' server may transmit periodic status cheek messages to the ACS to determine whether or not the ACS is available.
  • foe RB A engine analyzes the data in the AReq message to generate RBA result data.
  • the RBA engine may compare the data in the AReq message to one or more long term variables (“LTV’’).
  • LTV long term variables
  • the one or more LTV may include liistorical authentication data associated with the paynnent account number (PAN) at issue, historical authorization data associated with the PAN, other liistorical data associated wifo the PAN, etc.
  • the LTV may be associated with both card present and card not present historical transactions.
  • the LTV may include cardholder shipping address, cardholder billing address, cardholder email address, cardholder phone number, merchant name, merchant category, merchant location, and/or at least one envirormient-related variable (e.g., device details, browser details) including device ID, IP address, device channel, etc.
  • the LTV may be stored in a database accessible by the RBA engine and operated by tlie interchange network.
  • the LTV data vvijl be hashed prior to storing to protect the security of this personally identifiable hifomiation
  • the data in the AReq message may also be compared to other parameters, For example, to monitor consistency mid changes in behavior, the data may be compared to short term variables (e.g., on the order of minutes, hours, or days), inchiding velocities and ratios of PAN authorization and authentication. This may include comparing to recent transaction frequency, amount spent, declines, historical risk scores, etc.
  • the data in the AReq message may be analyzed using any suitable techniques to generate RB A result data, as described herein.
  • the RBA result data generated by the RBA engine includes a risk score, a risk analysis, and at least one reason code.
  • the risk score is a score representing a determined riskiness of the transaction., with lower semes indicating lower risk and higher scores indicating higher risk.
  • the risk score represents a likelihood that the suspect cardholder (e.g., the person attempting to perform a transaction) is the legitimate cardholder having the privileges to use the payment card to perform a payment transaction.
  • the risk score may be represented by a number from 0-999 and/or by a risk threshold category from 0-19.
  • the risk score is represented between 0 and 950 in twenty increments of 50 (i.e., the potential risk scores are 0, 50, 100, 150, ..., 950).
  • risks assessments that will be shared, such as through the authorization field of one or mere messages will be quantified on a scale of 0-9. Tho se of skill in the art will appreciate that any sui table risk score may be used.
  • the risk analysis is a description of a level of risk coroespomlmg to the risk score (e.g., low risk, medium risk, or high risk).
  • the reason codes include one or more factors that influenced the risk score.
  • the reason codes are generated using reason code categories and anchors, as described herein.
  • the reason codes are affected by nrf.es and/or a combination of the rules and the model.
  • the RBA engine transmits the RBA result data to the RBA-enabled directory server.
  • Hie RBA-enabled directory server embeds the RBA result data info the AReq message to generate an enhanced or enriched AReq message.
  • the RB A result data is appended to the AReq message as an extensible markup language (XML) extension of the AReq message .
  • the extension may have the following format: where "seme” is the risk score, “decision” is the risk analysis, and "reasonCode 1" and "reasoii €ode2" are the reason codes.
  • the mason codes ate transmited as a single leter each.
  • the reason codes may be represented in different methods.
  • reasonCode2 is transmitted by the merchant to provide the merchant’s assessment of the transaction.
  • additional bytes may be used to ingorge codes from an additional reviewing platform and/or a field signifier to identify the platform that provided the code in reasonCode I , reasonCode2, and/or another code field.
  • the RBA result data may be embedded into the AReq message to generate an enhanced or enriched AReq message using any suitable process.
  • the enhanced AReq message is then transmitted from the RBA- enabied directory server to the ACS.
  • the ACS analyzes the RBA result data in the enhanced AReq message to make an authentication decision. That is, in the example embodiment, the ACS may determine to folly authenticate the transaction, deny authentication for the transaction, or perform additional authentication (e.g., by issuing a step-up challenge to the cardholder) for the transaction, based on at least one of a risk score, the risk analysis, and the reason codes. Accordingly, the ACS does notperform the RBA analysis, but is still able to leverage the results of that analysis to make an authentication decision (e.g. , by using the results in their own fraud analysis platform), generally resulting in more approvals with less fraud. Thus, the RBA-enahled directory server and the RBA engine perform the RBA analysis on behalf of the ACS . In some embodiments, the ACS receives atitlientication data fi om a plurality of sources.
  • the authentication platform compares the RBA result data io a stored authentication profile.
  • the autlientieatiou profile contains a plurality of rules for the processing of authentication repnests, hi some embodiments, the authentication profile is provided by an issuer computing device associated with an issuer bank. Examples of the rules include, but are not limited to. how to proceed when the ACS is unavailable, information to include in the RBA, risk level thresholds for the risk score and risk levels, decision making risk thresholds, and specialized rules (such as all cross-border transactions are to be submitted to the ACS).
  • the authentication profile may include regulator- imposed threshold values for risk categories or transaction threshold values for particular markets that define wlien SC A is mandated.
  • the authentication profile is stored at the RBA platform, and can be accessed whenever a risk score is determined.
  • the authentication piatibnn compares the RBA result data to the authentication profile to determine the risk level associated with the transaction associated with tire aniiientieatiofi request.
  • the authentication platform compares the nsk score to one or more thresholds in the authentication profile to determine the risk level associated with the transaction.
  • tire authentication platform compares the risk analysis, the reason codes, and/or any other combination of data from the RBA result data and potentially some or all of the authentication data to the authentication profile to determine the risk level associated with this transaction.
  • a risk score of 900 or less may be considered tow risk
  • a risk score between 900 and 980 may be considered medium risk
  • a risk score above 980 may be considered high risk.
  • the authentication platform determines it? the risk level is high risk, hi the example embodiment, in the ease of a high risk transaction, the authentication platform may not folly authenticate the transaction.
  • the autlieiiticatiou platform may transmit an autlieatication response (ARes) message indicating the failed authentication to the 3 DS server.
  • ARes autlieatication response
  • the 3DS server may transmit the Ar es message indicating the Med authentication to the merchant ami the merchant determines whether or not to proceed with the airthorization process in the absence of fell authentication. In these circumstances, the nierchaiit’s acquirer or the merchant may decide to forgo authentication and submit the transaction to authorization. If authorization is approved, liability remains with the merchant (i.e., the merchant assumes the risk for the transaction) since there is no successful authentication.
  • the authentication platfornr determines that the transaction is medium risk or low risk. If the transaction is low risk, the authentication platform may fully authenticate the transaction and transmit an authentication response (AR.es) message indicating the foil authentication io the 3 DS server, where at least one of the 3DS server and the merchant may initiate the authorization process.
  • AR.es authentication response
  • the transaction may be authorized without SCA if the transaction is below the transaction value tluesliold for that market, or the transaction may be mandated to be subject to SCA if the transaction value is above the threshold for that market.
  • Hie antientication platform may issue a step-up challenge to the cardholder.
  • the authentication platform may folly authenticate or fail to folly authenticate the transaction.
  • the authentication platform transmits the RBA result data to the ACS, so that the ACS will perform the step-up challenge.
  • the authentication platform may take different steps at different risk levels and have additional or fewer risk levels to analyze based on the authentication profile.
  • the authentication platform determines that the online user is not associated with the ACS based on the extracted authentication data. In these embodiments, the issuer associated with the online user has not registered with an ACS . In these embodiments, the authentication platform generates an authentication decision based on the RBA result data.
  • the 3DS 2 Protocol ( and subsequent versions of the 3 DS Pro tocol) provides a number of benefi ts to cardholders, issuers, and merchants. It reduces risk of unauthorized transactions through an approach that incorporates a rich, comprehensive set of data to make au thentication decisions.
  • cardholders it provides a simple, secure, and familiar online authentication experience, regardless of payment channel or device.
  • issuers it allows for “fiictionless” authentication, in which an explicit cardholder step-up authentication is not requir ed or performed. This enables more intelligent risk assessment decisions and the ability to selectively challenge the cardholder as needed. This also improves cardholder experience and overall cardholder lovaltv to issuers.
  • the 3DS 2 Protoco .l decreases fraud on all authenticated transactions, and increases revenue potential from reduced friction and reduced cart abandonment (i.e., cardholders deciding not to complete a transaction after they have already selected one or more items to be purchased), especially for mobile payment channels. This also improves cardholder experience and overall cardholder loyalty to merchants.
  • the 3DS 2 Protocol and RBA may support additional payment channels, such as, but not limited to , card-on-trle, wallet, mobile, in-app, and Internet of Things (loT).
  • 3DS 2 Protocol or subsequent versions of the 3DS Protocol
  • payment networks see 100% of all authentication requests globally on all cards on their brands, bto other party, including issuers and ACS providers, is able to provide- this global visibility. Uris global visibility may be leveraged to provide a consistent, staudards-based risk analysis of transactions on behal f of issuers , enabling a market- wide risk-based authentication approach.
  • the 3DS 2 Protocol (and subsequent versions of the 3DS Protocol) allows for approximately ten times the amount of transaction data to be gathered, analyzed, and utilized to prevent fraud.
  • the additional data included in the 3DS Protocol increases data exchange between merchants and issuers, and improves risk-based authentication
  • RBA fraud prevention decisionmg.
  • RBA allows issuers to examine every authentication request through transaction risk analysis, while focusing fraud prevention efforts on transactions that prevent the most risk. Further, RBA utilizes both behavioral and transactional inputs in conjunction with a risk engine to determine riskiness of a transaction.
  • the RBA method of cardholder aitthemicatioii dynamically calculates a. risk assessment for any given e-conmierce transaction m real time. The assessment can then be used to authenticate the cardholder in a frictionless manner.
  • the RBA methodology includes tliree components that work together to provide authentication of cardholders.
  • the underlying data model is used to provide a basis for tire authentication.
  • the underlying data model may include 3DS data, which may include cardholder data, behavioral data, location data, merchant data, and device data.
  • the underlying data model may also include interchange network data, such as, but not limited to, past risk scores, authentication approvals, authorization history, chargeback data, and fraud data.
  • the RBA methodology may use in tile underlying data model in one or more measurement methodologies.
  • the measurement methodologies may include shortterm velocities and ratios, mchtding measuring behavior consistency and changes, such as frequency, amount spent, time, location, and device.
  • the measurement methodologies may also include long term velocities and ratios, which include measurement of behavior and anomaly detection.
  • the measurement methodologies may further include continuous measurement across the payment network.
  • Tire rules engine may include thresholds for interpreting measurement results, rules for combining results of measurements, arid rules for combining other data with models and measurements.
  • An example of a safe (or low-risk) tirmsaetioii may include, where the cardholder has a positive transaction history, is performing the transaction with a known device with a positive association with the cardholder, the cardholder is in a typical geolocation, the device is using a typical IP address, the ti'atlsaction fits within a typical behavimal and transaction pattern, and the shipping address has been used with the payment aecoimt number (PAM) and is the same as the last transaction.
  • PAM payment aecoimt number
  • An example of a medium risk transaction may include, where the cardholder has a positive transaction history, is using an unknown device with no known association with the cardholder, the device is at a non-typical geolocation and IP address, but is typical behavioral, cardholder, and transaction pattern, I- or example, the cardholder is on travel and purchases Internet Access at a hotel.
  • An example of a liigh risk transaction may iaeze, where there are anomalous velocities detected with the cardholder in network, is using an unknown device with no faiown association with the cardholder, the device is at a noil-typical geolocation and IP address, and there is anomalous behavior patterns detected. The cardholder purchases over $600 of clothing in Texas right after the cardholder purchased lunch in St. Louis.
  • RBA One goal of RBA is to nrimntize the number of transactions that require active (i.e,, step-up) authentication, while keeping fraud to a minimum and improving consumer friction points during the transaction process.
  • the goal of RBA is to silently eliminate unnecessary friction on low risk transactions. In markets where authentication is widely used for a representative range of transactions, approximately 90% of transactions are deemed low risk and would then be authenticated without any action and would proceed to the Authorization process. This greatly decreases the amornit of processing and message traffic necessary to authenticate transactions. 5-8% of transactions would be considered medium risk arid the cardholder would be asked to authenticate themselves, such as through a step-up challenge. Then 1-2% of transactions would be deemed high risk and would fail authentication. With RBA, the mthrmation gathered enables transaction scoring and classification into low, medium, and high risk, allowing the issuer and ACS to take appropriate action.
  • the 3DS 2 Protocol (and subsequent versions of the 3DS Protocol) enables a market-wide level risk analysis of all traiisactions that reach directory server 510. Each transaction can be scored and/or flagged based on the global data available using the 3DS 2 Protocol (and subsequent versions of the 3DS Protocol), Additionally, the payment processor operating the directory server 51.0 has the ability to see cardholder activity across the digital and phy sical domains, and can utilize this expanded view to improve scaring. In contrast, traditional authentication service providers may only address the digital domain. For example, a payment processor could indicate if a particular device is associated with fraud, and flag that device for issuers in future transactions. The issuer may then reject transactions involving that device or prompt for additional authentication (e,g. ? through two-factor authentication).
  • Table 1 lists a number of the data elements that are used in the 3 DS 2 Protocol for authentication- Far example, at least some of these data elements may be included in the authentication data included in the AReq sent to directory server 510.
  • the eighteen data elements that are also part of the 3 DS 1.0 Protocol are bolded in Table I .
  • Those of skill in the art will apprecia te that the number of rich data elements could grow beyond those listed below (e. g., in firture versions of the 3DS Ifrotocol), and could include over one hundred and seventy- data elements.
  • an app-based transaction e.g., carried out using a. mobile: computing device
  • the authentication data may also be divided by category, such as: transaction data (amount, currency, date, and time), device data (IP address, device info, and channel data), cardholder data (account number and shipping address), and merchant data (name, category, and country).
  • transactions are categorized ‘"merchant only” or “fully authenticated.” “Fully authenticated” transactions are generally considered to be low risk transactions that have been authenticated. " Merchant only” transactions are more risky transactions. In some embodiments, “mercliaui only” transactions have been authenticated.
  • one or more indicators in the authentication response indicate whether a transaction is “merchant only” or “fully authenticated.” One or more indicators may also indicate whether or not authentication was attempted on the transaction. This information is used by the merchant to determine whether or not to begin the authorization process for the transaction. In some embodiments, this infonnation is also stored in a database and is referred to by at least one of the inferchange .network and the issuer processor dining the authorization process.
  • the authentication platform determines whether the authentication request message complies with the 3DS 2 Protocol or subsequent versions of the 3 DS Protocol . If the authentication request message does not. comply with the appropriate 3 DS Protocols, the authentication platform bypasses determining if the AC S is available. lit this situation, the authentication platform transmits an authentication response message indicating that the transaction is considered merchant only and that no aiitiienticatioii was attempted. In some embodiments, the authentication platform determines a risk level based on the RBA result data. If the risk level is low.
  • the authentication platform embeds an indicator in the authentication response message indicating that the transaetion is “fully authenticated,” If the risk level is not low, die authentication platform embeds one or more indicators in the authentication response message indicating that the transaction is a merchant only transaction and that authentication was attempted.
  • the authentication platform performs the authentication process on the transaction, including RBA. This analysis is based on a machine learning model where over tune, rhe authentication platform is capable of improving its ability to determine tire risk level associated with transactions.
  • the authentication platform analyzes transactions that are authenticated by the ACS and compares these transactions with historical data to generate a risk model for each issuer. Dv comparing the data points m each transaction, the risk model u ill indicate the amount of risk associated with each transaction based on the authentication data in the. corresponding authentication requests.
  • This allows the authentication platform to analyze transactions when die ACS is unavailable and perfonn authentication on these transactions to provide a response to the authentication request. Accordingly, the authentication platform may determine that a received authorization request is substantially similar to a previous transaction that die ACS scored at low risk. Tims allowing the authentication platform to determine that the received transaction is low risk with a degree of certainty .
  • a technical effect of the sy stems and proces ses described herein is achieved by performing at least one of the following steps : (i) store, in a memory device, an authentication profile for at least one PAN of the plurality' of pans; (h) receive an authentication request message, the authentication request message including authentication data; (iii) extract, the authentication data, from the authentication .request message; (iv) compare the authentication data to at least one long term variable and. at least one short term variable, wherein the at least one long term variable includes historical authentication data and historical authorization data;
  • a technical effect of the systems and processes described herein is achieved by performing at least one of the following steps: (i) receiving, at a riskbased authentication enabled (RBA-enabled) directory server, an authentication request message, the authentication request message including authentication data: (ii) extracting, using the RBA-enabled directory server, the authentication data from the authentication request message; (iii) transmitting the extracted authentication data to an RBA engine; (iy) generating, using the RBA engine, based at least in part on the extracted authentication data, RBA result data including a risk score, a risk analysis, and at least one reason code; (v) transmiting the RBA result data to the RBA-euabied directoiy server; (vi) embedding, using the RBA-enabled directory server, the RBA result data into the anflieirticatioH request message to generate an enhanced authentication request message; and (vli) transmitting the enhanced authentication request message to the ACS to enable the ACS to slake an authentication decision based on the
  • Another technical problems addressed by this system includes: (i) high network load based at least in part on step-up challenging most or all card-not-present transactions winch results in network delays and reduced bandwidth; (ii) allowing fraudulent transactions to be successfitlly processed if there is no step-up challenge of a card-not-present transaction .
  • Yet another technical effect of the systems and processes described herein is achieved by performing at least one of the following steps: (i) receive an authentication request message for a transaction, the authentication request message including autlieutication data; (ii) extract the authentication data from die authentication request message; (iii) determine If the ACS is available to process the transaction; (iv) if the ACS is unavailable, the at least one processor programmed to: (a) generate, based at least in part on the extracted authentication data, risk-based authentication (UBA) result data including a risk score and at feast one reason code that indicates at least one factor that influeneed the generated risk score; (b) compare the authentication data to at least one long term variable and at feast one short term variable, wherein the at least one long term variable includes historical authentication data and historical authorization data; and (c) transmit an authentication response message based su the RBA.
  • UUA risk-based authentication
  • (ix) embed one or more indicators in the authentication response message indicating that the transaction is a merchant only transaction and that authentication was attempted if the risk level is not low; (x) determine whether the authentication request message complies with the 3DS 2 Protocol or subsequent versions of the 3 DS Protocol; mid (xi) bypass determining if the ACS is available if the authentication request message does not comply.
  • the authentication platform determines that the online user is not associated with foe ACS based on the extracted authenticatfon data. In these embodiments, the issuer associated with the online user has not registered with an ACS . In these embodiments, the authentication platfbnn generates an authentication decision based on the RBA result data.
  • the technical improvement in the authentication system as described herein is a computer-based solution to a technical deficiency or problem that is itself rooted in computer technology (e.g., the problem itself derives itom the use of computer technology). More specifically, fraud is significant problem for transactions conducted over an electronic payment network, especially for card-not-present transactions.
  • Advanced fiand detection methodologies e.g.. RBA
  • RBA Advanced fiand detection methodologies
  • ACSs are unable to execute those methodologies and furthermore eomniunication with ACSs increases network traffic and processing load, and in addition the ACS may be unavailable. Accordingly.
  • the systems and methods described herein address this technical problem by using an RBA-enabled directory server and RBA engine to perform RBA and filter the results to determine which authentications need to be forwarded to an ACS and to forward the results of the RBA to the ACS to enable the ACS to make an authentication decision.
  • any processor in. a computet device referred to herein may also refer to one or more processors wherein the processor may be in one computing device or a plurality of computing devices acting in parallel.
  • any memory in a computer device referred to herein may also refer to one or more memories wherein the memories may be in one computing device or a plurality of computing devices acting in parallel.
  • a processor may include any programmable system inchiding systems using niicro-eonbxillers, reduced instruction set circuits (RISC), application specific integrated circuits (ASICs), logic circuits, and any other circuit or processor capable of executing the functions described herein .
  • RISC reduced instruction set circuits
  • ASICs application specific integrated circuits
  • processors any other circuit or processor capable of executing the functions described herein .
  • the above examples are example only, and are thus not intended to limit in any way die definition and/or meaning of the term “processor.”
  • the term ‘database” may refer to either a body of data, a relational database management system t RDBMS), or to both.
  • a database may include any collection of data including hierarchical databases, relational databases, flat file databases, object-relational databases, object oriented databases, and any other structured collection of records or data that is stored in a computer system.
  • RDBMS examples include, but are not limited to including, Oracle® Database, MySQL, IBM® DB2, Microsoft® SQL Server, Sybase®, and PostgieSQL.
  • any database may be used that enables the systems and methods described herein.
  • a computer program is provided, and the program is embodied on a computer readable medium.
  • the system is executed on a single computer system, without requiring a connection to a sever computer, hi a further embodiment, the system is being nm in a Windows® environment (Windows is a registered trndemark of Microsoft Corporation, Redmond, Washington).
  • the system is run on a mainframe environment and a UNIX® server environment (UNIX is a registered trademark of X/Open Company Limited located in Reading, Berkshire, United Kingdom).
  • UNIX is a registered trademark of X/Open Company Limited located in Reading, Berkshire, United Kingdom
  • the system is run on an iOS® environment (iOS is a registered trademark of Cisco Systems, Inc. located in San Jose, CA).
  • the system is ran on. a Mac OS® environment (Mae OS is a registered trademark of Apple Ine. located in Cupertino, CA).
  • the system is nin on Android® OS (Android is a registered trademark of Google, Inc. of Mountain View, CA).
  • tile system includes multiple components distributed among a plurality of computing devices.
  • One or more components may be in tiie form of computer-executable instructions embodied In a computer-readable medium.
  • an element or step recited in the singular and proceeded with the word “a” or “an” should be understood as not excluding plural elements or steps, unless such exclusion is explicitly recited.
  • references to “example embodiment” or “one embodiment” of the present disclosure are not intended to be interpreted as excluding the existence of additional embodiments that also incorporate the recited features.
  • the terms “software” and “firmware” are interchangeable, and include any computer program stored in memory for execution by a processor, including RAM memory, ROM memory, EPROM memory, EEPROM memory, and non-volatile RAM (NVRAM) memory.
  • RAM memory random access memory
  • ROM memory read-only memory
  • EPROM memory electrically erasable programmable read-only memory
  • EEPROM memory electrically erasable programmable read-only memory
  • NVRAM non-volatile RAM
  • the terms “paymetit device,” “‘transaction card,” “financial transaction card,” and “payment card” refer to any suitable transaction card, such as a credit card, a debit card, a prepaid card, a charge card, a membership card, a promotional card, a frequent flyer card, an identification card, a prepaid card, a gift card, and/or any other device that may hold payment account information, such as mobile phones, Smartphones, personal digital, assistants (PD As), wearable computing devices, key fobs, and/or any other computing devices capable of providing account information. Moreover, these terms may refer to payments made directly from or iising bank accounts, stored valued accounts, mobile, wallets, etc.
  • consumer card account behavior can include but is not limited to purchases, management activities (e.g., balance checking), bill payments, achievement of targets (meeting account balance goals, paying bills on time), and/or product registrations (e.g., mobile application downloads).
  • FIG. 1 is a schematic diagram illustrating an example RBA platform
  • FIG. 1 depicts a flow of data in a financial transaction through system 20.
  • Embodiments described herein may relate to a transaction card system, such as a credit card payment system using 'the MASTERCARD® interchange network.
  • the MASTERCARD® interchange network is a set of proprietary communications standards promulgated by Mastercard International Incoiporated® for the exchange of financial transaction data and the settlement ofcons between financial institutions that are members of Mastercard Intemaiional Incorporated®. (MASTERCARD® is a registered tr ademark of Mastercard International Incorporated located in Purchase, New York),
  • a financial institution called the “issuer” issues a transaction card, such as a credit card, to a consumer or cardholder 22, who uses the transaction card to tender payment for a purchase from a merchant 24.
  • Cardholder 22 may purchase goods and services ‘products”) at merchant 24.
  • Cardholder 22 may make such purchases using virtual forms of the tiansaetfon card and, more specifically, by providing data related to the transaction card (e.g., the transaction card number, expiration date, associated postal code, and security code) to initiate transactions.
  • merchant 24 To accept payment with the tiansaction card or virtual forms of the transaction card, merchant 24 must normally establish an account with a financial institution that is part of the financial payment system. This financial institution is usually called the “merchant bank,” the “acquiring bank,” or the
  • merchant 24 requests authentication of the cardholder 22 and authorization from a merchant bank 26 for the amount of the purchase.
  • the request may be performed over the telephone or electronically, but is usually performed through the use of a point-of-sale terminal, which reads cardholder’s 22 account information from a magnetic stripe, a chip, or embossed characters on the transaction card and communicates Electronically with the transaction processing computers of merchant bank 26.
  • Merchant 24 receives cardholder’s 22 account information as provided by cardholder 22, Alternatively, merchant bank 26 may authorize a third party to perform transaction processing on its behalf. In tills case, the point-of-sale terminal will be configured to communicate with the third party.
  • Such a third party is usually called a “merchant processor?’ an “acquiring processor,” or a “third party processor.”
  • the payment card system 20 includes or is in commumcation with a risk-based authentication (RBA) server 34.
  • RBA risk-based authentication
  • the RBA platfoim 34 provides enhanced meta-data collection to capture information, including meta-data hum the payment transactions processed by the payment card system 20,
  • the RBA platform 34 steres this meta-data to use to provide as Ihstorical data when performing an authentication process prior to performing an authorization process, hr the exemplary embodiment, the RBA platform 34 may receive historical data from one or more of the acquirer bank 26, the interchange network 28, and the issuer bank 30. Examples of this data include one or more long tenn variables (“LTV”),
  • the one or more LTV may include historical authorization data associated with a plurality of PANs, other historical data associated with the plurality of PANs, etc.
  • the LTV may be associated with both card present and card not present historical transactions.
  • the LTV may include cardholder shipping address, cardholder billing address, cardholder email address, cardholder phone mrniber, merchant name, merchant category, merchant location, and/or ai least one euvironmem-related variable (e.g., device details, browser details) htcluding device ID, IP address, device channel, etc.
  • the LTV may be stored in a database accessible by RBA platform 34 and operated by an interchange network 28. hr some embodiments, the LTV data will be hashed prior to storing to protect the security of this personally identifiable information.
  • a charge for a pawent card transaction is not posted immediately to cardholder’s 22 account 32 because bankcard associations, such as Mastercard International Incorporated®, have .promulgated rules that do not allow merchant 24 to charge, or “capture,” a transaction until products are shipped or services are delivered. However, with respect to at least some debit card transactions, a charge may be posted at the time of the transaction.
  • merchant 24 ships or delivers the products or services
  • merchant 24 captures the transaction by, for example, appropriate data entry procedures on the point-of-sale terminal. This may include bundling of approved transactions daily for standard retail purchases. If cardholder 22 cancels a transaction before it.
  • Interchange network 28 and-' or issuer bank 30 stems the transaction card hifoimation, such as a type of merchant, amount of purchase, date of purchase, in a database 120 (shown in FIG. 2).
  • a clearing process occurs to transfer additional transaction data related to the purchase among the parties to the transaction, such as merchant bank 26, interchange network 28, and issuer bank 30. More specifically, during and/or after the clearing process, additional data, such as a . time of purchase, a merchant name, a ripe of merchant, purchase information, cardholder account information, a type of transaction, information regarding the purcltased item and/or service, and/or other suitable information, is associated with a transaction and transmitted between. parties to the transaction as transaction data, and may be stored by any of the parties to the transaction. After a transaction is authorized and cleared, the tramaction is settled among merchant 24, merchant bank 26, and issuer bank 30.
  • FIG. 2 is an expanded block diagram of an example embodiment of a computer system 100 used in authenticating payment transactions.
  • system 100 may be used for authenticating payment transactions either in concert with an ACS or in place of the ACS.
  • cardholder computing devices 102 are computers that include a web browser or a software application, which enables cardholder computing devices 102 to access remote computer devices, such as merchant website 104, using the Internet or other network. More specifically, cardholder computing devices 102 may be communicatively coupled to the Internet through many interfaces including, but not limited to, at least one of a network, such as the Internet, a local, area: network. (LAN), a wide area network (WAN), or an integrated services digital network (ISDN), a dial-up-coisnection, a digital subscriber line (DSL), a cellular phone connection, and a cable modem.
  • LAN local, area: network.
  • WAN wide area network
  • ISDN integrated services digital network
  • DSL digital subscriber line
  • cellular phone connection a cellular phone connection
  • Cardholder computing devices 102 may be any device capable of accessing the Internet including, but not limited to, a desktop computer, a laptop computer, a personal digital assistant (FDA), a cellular phone, a smartphone, a tablet, a phablet, wearable electronics, smart watch, or other web-based connectable equipment or mobile devices, hi the exemplary embodiment, cardholder computing devices 102 are associated with individual cardholders 22 (shown in FIG. 1).
  • merchant website 104 is an online shopping website that is reaehable through computers that include a web browser or a software application, such as cardholder computing devices 102, using the Internet or other network.
  • merchant website 104 may be hosted OH one or more computers that are commitnieatively coupled to the Internet through many interfaces including, but not limited to, at least one of a network, such as the Internet, a local area network (LAN), a wide area network (WAN), or an integrated services digital network (ISDN), a dial-iip-connection, a digital subscriber line (DSL), a cellular phone connection, and a cable modem.
  • a network such as the Internet, a local area network (LAN), a wide area network (WAN), or an integrated services digital network (ISDN), a dial-iip-connection, a digital subscriber line (DSL), a cellular phone connection, and a cable modem.
  • Computing devices hosting merchant website 104 may be any device capable of accessing the Internet including, but not limited to, a desktop computer, a laptop computer, a personal digital assistant (PDA), a cellular phone, a smartphone, a tablet, a phablet, wearable electronics, smart watch, or other web-based connectable equipment or mobile devices, hi the exemplary embodiment, merchant website 104 is associated with merchant 24 (shown in FIG. 1). In the exemplary embodiment, merchant website 104 allows cardholder 22 to purchase goods and/or sendees using cardholder computing device 102. In some embodiments, payment transactions performed through merchant website 104 are considered card not present transactions.
  • data gathering computer devices 106 ate computers first include a web browser or a software application, which enables data gathering computer devices 106 to access remote computer devices, such as merchant website 104 and authentication server 112, using the Internet or other network, More specifically, data gathering computing devices 106 may be communicatively coupled to Hie Internet through many interfaces including, but not limited to, at least one of a network, such as the Internet, a local area network (LAN), a wide area network (WAN), or an integrated services digital network (ISDN), a dialup-connection, a digital subscriber line (DSL), a cellular phone connection, and a cable modem.
  • a network such as the Internet, a local area network (LAN), a wide area network (WAN), or an integrated services digital network (ISDN), a dialup-connection, a digital subscriber line (DSL), a cellular phone connection, and a cable modem.
  • LAN local area network
  • WAN wide area network
  • ISDN integrated services digital network
  • DSL digital subscriber line
  • Data gathering computer devices 106 may be any device capable of accessing the internet including, but not limited to, a desktop computer; a laptop computer, a personal digital assistant i PDA), a cellular phone, a smartphone, a tablet, a phablet, wearable electronics, smart watch, or other web-based coimectabie equipment or mobile devices.
  • the data gathering computer devices 106 are associated with a 3DS server or service, fir other embodiments, data gathering computer devices 106 are associated with acquirer bank 26 (shown in FIG. 1).
  • authentication server 112 is in communication with a plurality of data: gathering computer devices 106 and one or more access control servers (ACS) 108.
  • authentication server 112 is similar io RBA platform 34 (shown in FIG. 1).
  • authentication server 112 receives data from data gathering computer device 106 and uses that data to perform authentication of payment transactions.
  • authentication server 112 performs authentication with ACS IOS, In oilier embodiments, authentication server 112 replaces the ACS 108 in the autlieiuication process.
  • authentication server 112 is associated with the interchange network 28 (shown in FIG. I).
  • issuer computing devices 110 are computers that include a web browser dr a software application, which enables issuer computing devices 110 to access remote computer devices, such as ACS 108 and authentication server 112, using the Internet or other network.
  • issuer computing devices 110 may be cornnmnicatively coupled to the Internet through many interfaces including, but not limited to, at least one of a network, such as the Internet, a local area network (LAN), a wide area network (WAN), or an integrated services digital network (ISDN), a dial-up-coimection, a digital subscriber line (DSL), a cellular phone connection, and a cable modem.
  • Issuer computing de vices 110 may be any device capable of accessing the Internet including, but not limited to, a desktop computer, a laptop computer, a personal digital assistant (PDA), a cellular phone, a smartphone, a tablet, a phablet. Wearable electronics, smart wateh, or other web-based connectable equipment or mobile devices.
  • issuer computing devices 110 are associated with the issuer bank 30 (shown in FIG. 1).
  • a database server 116 is connected to database 120.
  • centralized database 120 is stored on server system 112 and can be accessed by potential users at one of client systems (not shown) by logging onto au thentication server 112 tiuough one of client systems.
  • database 120 is stored remotely from authentication server 112 and may be lion-centralized, Database 120 may be a database configured to store information used by aiithenticatiou server 112 mcluding, for example, historical payment transaction records.
  • Database 120 may include a single database having separated sections dr partitions, or may include multiple databases, each being separate from each other.
  • Database 120 may store transaction data generated over the processing network including data relating to merchants, consumers, account holders, prospective customers, issuers, acquirers, and/or purchases made.
  • Database 120 may also store account data including at least one of a cardholder name, a cardholder address, an account number, other account identifiers, and transaction iiifoimation.
  • Database 120 may also store merchant information including a merchant identifier that identifies each memhant registered to use the nenxoik, and instructions tor settling trail sinuous including merchant bank account information.
  • Database 120 may also store purchase data associated with items being purchased by a cardholder fr om a merchant, and authentieatioH and. authorization request data.
  • Database 120 may store one or more authentication profiles, where each authentication profile includes one or more authentication rules , one or more risk level thresholds, and one or more routing rules based on the risk level thresholds.
  • FIG. 3 illustrates an example configuration of a server system 301 such as RBA platform 34 (shown in FIG. i), in accordance with one example embodiment of the present disclosure
  • Server system 301 may also include, but is not limited to, merchant website 104, data gathering computer device 106, ACS 108, issuer computing device 110, authentication server 112, and database server 116 (all shown in FIG. 2).
  • server system 301 determines and analyzes characteristics of devices used in payment transactions, as described below.
  • Server system 301 includes a processor 305 for executing mstmctions. Instructions may be stored in a memory area 310, for example.
  • Processor 305 may include one or more processing units (e.g., in a multi-core configuration) for executing instructions. The instructions may be executed withm a variety’ of different operating systems on the server system 301, such as UNIX, LINUX, Microsoft Windows®, etc. It should also be appreciated that upon initiation of a computer- based method, various instructions may be executed during initialization .
  • Some operations may be required in order to perform one or more processes described herein, while other operations may be more general and/or specific to a particular programnung language (e.g,, C, C#, C++, Java, or other • suitable prograniming languages, etc,).
  • Processor 305 is operatively coupled to a communication interface 315 such that server system 301 is capable of coimnunicating with a ternate device such as a user system or another server system.301.
  • commumcation interface 315 may receive requests from a client system (not shown) via the Internet. as illustrated in FIG, 2.
  • Processor 305 may also be operatively coupled to a storage device 334.
  • Storage device 334 is any computer-operated hardware suitable for storing and/or retrieving data.
  • storage device 334 is integrated in server system 301.
  • server system 301 may include one or more hard disk drives as storage device 334.
  • storage device 334 is external to server system 301 and may be accessed by a plurality of server systems 301.
  • storage device 334 may include multiple storage units such as hard disks or solid state disks in a redundant array of inexpensive disks (RAID) configuration.
  • RAID redundant array of inexpensive disks
  • Storage device 334 may include a storage area network (SAN) and/or a network attached storage (NAS) system.
  • processor 305 is operatively coupled to storage device 334 via a storage interface 320.
  • Storage interface 320 is any component capable of providing processor 305 with access to storage device 334.
  • Storage interface 320 may include, for example, an Advanced Technology Atachment (ATA) adapter, a Serial ATA (SATA) adapter, a Small Computer System Interface (SCSI) adapter, a RAID controller, a SAN adapter, a network adapter, and/or any component providing processor 305 with access to storage device 334.
  • ATA Advanced Technology Atachment
  • SATA Serial ATA
  • SCSI Small Computer System Interface
  • RAID controller a SAN adapter
  • network adapter a network adapter
  • Memory area 310 may include, but are not limited to, random, access memory (RAM) such as dynamic RAM (DRAM) or static RAM (SRAM), read-only memory (ROM), erasable programmable read-only memory (EPROM), electrically erasable programmable read-only memory (EEPROM), and non-volatile RAM (NVRAM).
  • RAM random, access memory
  • DRAM dynamic RAM
  • SRAM static RAM
  • ROM read-only memory
  • EPROM erasable programmable read-only memory
  • EEPROM electrically erasable programmable read-only memory
  • NVRAM non-volatile RAM
  • FIG. 4 illustrates an example configuration of a client computing device 402
  • Client computing device 402 may include, but is not limited to, cardholder computing device 102 (shown in FIG, 1).
  • Client computing device 402 includes a. processor 404 for executing instructions.
  • executable instructions are stored in a memory area 406.
  • Processor 404 may include one or more processing units (e.g., in a multi-core conflguiation).
  • Memory area 406 is any device allowing information such as executable instructions and/or other data to be stored and retrieved.
  • Memory area 406 may include one or more eomputer- wadable media.
  • Client computing device 402 also includes at least one media output component 408 for presenting information to a user 400.
  • Media output component 408 is any component capable of converting information to user 400.
  • media output component 408 includes an output adapter such as a video adapter and/or an audio adapter.
  • An output adapter is operatively coupled to processor 404 and operatively couplable to an output device such as a display device (e.g.. a liquid crystal display (LCD), organic light emitting diode (QLED) display, cathode ray tube (CRT), or “electronic ink'’ display) or an audio output device (e.g., a speaker or headphones).
  • a display device e.g. a liquid crystal display (LCD), organic light emitting diode (QLED) display, cathode ray tube (CRT), or “electronic ink'’ display
  • an audio output device e.g., a speaker or headphones.
  • client computing device 402 includes an input device 410 for receiving input from user 400.
  • Input device 410 may include, for example, a keyboard, a pointing device, a mouse, a stylus, a touch sensitive panel (e.g., a touch pad or a touch screen), a camera, a gyroscope, an accelerometer, a position detector, and/or an audio input device.
  • A. single component such as a touch screen may fimction as both an output device of media output component 408 and input device 410.
  • Client computing device 402 may also include a commimieatiou interface 412, which is communicatively couplable to a remote device such as server system 301 or a web server operated by a merchant.
  • Communication interface 412 may include, for example, a wired or wireless network adapter or a wireless data transceiver for use with a mobile phone network (e,g., Global System for Mobile: commuihcaiions (GSM), 3G, 4G or Bluetooth) or other mobile data network (e,g... Worldwide Interoperability for Microwave Access (WIMAX)).
  • GSM Global System for Mobile
  • 3G, 4G or Bluetooth 3G, 4G or Bluetooth
  • WIMAX Worldwide Interoperability for Microwave Access
  • FIG. 5 is a schematic diagram illustrating transaction flow m an example authentication system 500 that uses the 3DS 2 Protocol (or subsequent versions of the 3DS Protocol) for authentication. Information regarding the 3DS Protocol, including the current version of the protocol, can be found at https://www.emvco.com.
  • System 500 includes a directory server 510 that facilitates authenticating a cardholder for a transacfion, as described herein.
  • Directory server 510 may be operated, for example, by interchange network 28 (shown in FIG. I),
  • a cardholder (e.g, cardholder 22, shown in FIG. 1) initiates- a transaction (e.g., an online transaction) on a cardholder computing device 102 (shown in FIG. 2), such as, for example, a mobile computing device.
  • a transaction e.g., an online transaction
  • the cardholder provides authentication data that will ultimately be used to authenticate the cardholder.
  • this authentication data includes form data that the cardholder fills in to make the purchase and scraped data, Which is data about the cardholder, such as device details and browser details including device ID, IP address, device channel, etc.
  • the authentication data is transmitted from tire cardholder- computing device 102 to a 3DS client 502 within a 3DS requestor environment 504.
  • the 3DS client 502 may be operated by a merchant (e.g., merchant 24, shown in FIG. 1).
  • 3 DS client 502 is a part of merchant website 104 (shown in FIG. 2).
  • 3DS client 502 collects, from the cardholder computing device 102. information necessary to authenticate the cardholder using the 3DS 2 Protocol, including the authentication data.
  • the 3 DS client 502 collects information (including the authentication data) and transmits the collected information to a 3DS Server 506 for inclusion in an alsheudication request message, also referred to herein as an AReq message.
  • 3DS client 502 is also part of the 3DS requestor environment 504.
  • 3DS client 502 and 3DS server 506 may eormnunicate with one another, for example, using application programming interfaces (APIs) or browser interactions.
  • the 3DS server 506 is similar to data gathering computer device 106 (shown in FIG. 2).
  • the 3DS server 506 uses the autlienrication data provided by the cardholder and other data collected within 3DS requestor enwomient 504, the 3DS server 506 generates the AReq message and transmits the AReq message to directory server 510, based on the payinent processor associated with the transaction card being used in the transaction.
  • the directory server 510 is similar to the authentication server 112 (shown in FIG. .2). That is, different payment processors will generally have different directoiy servers for processing transact ions.
  • 3DS server 506 formats the data for secwity purposes.
  • directory server 510 forwards the .AReq message to an appropriate access control server (ACS) 512 , based on the issuer of the payment card, hi some embodiments, ACS 512 is similar to ACS 108 (shown in FIG. 2)
  • ACS 512 determines, based on the AReq message, whether authentication is required. Further, ACS 512 facilitates ensuring that any required authentication is properly carried out. ACS 512 performs these authentication operations on behalf of an issuer operating an issuer compiiting device 514.
  • ACS 512 In response to the AReq message, ACS 512 returns an authentication response (ARes) message to directory -server 510, which directory server 510 in turn forwards to 3 DS server 506. Before returning the ARes message, ACS 512 evaluates the data in the AReq message and performs risk-based authenncanon (RBA) on the transaction. Specifically, when ACS 512 determines that an explicit cardholder step- up authentication is not required (i.e.., when the transaction is determined to be low risk), ACS 512 determines authentication is complete and returns an ARes indicating the same. If, however, ACS 512 determines that cardholder step-up authentication is required, ACS 512 initiates a step-up challenge request.
  • ARes authentication response
  • RBA risk-based authenncanon
  • Hie results of the step-np challenge requests are transmitted (in the ARes message), to 3 DS server 506 (via directory sewer 510), and ultimately to the cardholder.
  • ACS 512 controls the step-up authentication in accordance with methods used for cardholders of the issuer (e,g., biometric authentication, one time password (OTP) authentication, short message service (SMS) authentication, etc.).
  • OTP one time password
  • SMS short message service
  • a 3 DS requestor 516 included in 3DS requestor environment 504 controls how the various components interact with one another in the example embodiment.
  • the authentication process is complete (i.e., after the 3DS Protocol is finished)
  • payment authorization for the transaction is undertaken. That is, the authentication using the 3DS 2 Protocol (or subsequent versions of the 3DS Protocol) occurs before payment authorization for the transaction.
  • the merchant e g., using 3DS server 506 exchanges authorization data with an acquirer computing device 520 operated by an acquirer, such as merchant bank 26 (shown in FIG. 1 ) and a payment network 522, such as interchange network 28 (shown in FIG. 1), If appropriate, the merchant, acquirer, or payment network may submit an authorization request including information that indicates authentication occurred. Acquirer computing device 520 then processes the authorization with issuer -computing device 514 and returns the authorization remits to the merchant
  • the 3DS 2 Protocol provides a number of benefits to cardholders, issuers, and merchants. It reduces risk of unauthorized transactions through an approach that incorporates a rich, comprehensive set of data to make authentication decisions. For cardholders, it provides a simple, secure, and familiar online authentication experience, regardless of payment channel or device. For issuers, it allows for “fiictionless” authentication, in which an explicit cardholder step-up authentication is hot required or performed. This enables more intelligent risk assessment decisions and the ability to selectively challenge the cardholder as needed. This also improves cardholder experience and overall cardholder lovaltv to issuers.
  • the 3DS 2 Protocol decreases fraud on all authenticated transactions, and increases revenue potential from reduced friction and reduced cart abandonment (i.e., cardlrolders deciding not to complete a transaction after they have already selected one or more items to be purchased), especially for mobile payment channels. This also improves cardholder experience and overall cardholder loyalty to merchants.
  • 3DS 2 Protocol (or subsequent versions of the 3DS Protocol), pawent networks see 100% of all authentication requests globally on all cards on their brands. No other party, including issuers and ACS providers, is able to provide this global visibility. This global visibility may be leveraged to provide a consistent, standards-based risk analysis of transactions on behalf of issuers, enabling a marketwide risk-based authentication approach.
  • the 3DS 2 Protocol (and subsequent versions of the 3DS Protocol) allows for approximately ten times the amount of transaction data to be gathered, analyzed, and utilized to prevent fraud.
  • Tire additional data included in Ute 3DS Protocol increases data exchange between merchants and issuers, and improves risk-based authentication (RBA) decisioning.
  • RBA risk-based authentication
  • RB A allows issuers to examine every authentication request through transaction risk analysis, while focusing fraud prevention efforts on transactions that prevent the most risk.
  • RBA utilizes both behavioral and transactional inputs in conjunction with a risk engine to determine riskiness of a transaction.
  • RBA One goal of RBA is to minimize the number of transactions that require active (i.e.. step-up) authentication, while keeping fraud to a minimum and improving consumer friction points during the transaction process.
  • active i.e.. step-up
  • the information gathered enables transaction scoring and classification into low, medium, and high risk, allowing tire issuer and ACS 512 to take appropriate action.
  • the 3 DS 2 Protocol (and subsequent versions of the 3 DS Protocol) enables a market- wide level risk analysis of all transactions that reach directory server
  • Each transaction can be scored and/or flagged based on the global data available using the 3 D S 2 Protocol (and subsequent versions of the 3 DS Protocol).
  • the payment processor operating the directory server 510 has the ability to see cardholder activity 7 across the digital and physical domains, and can utilize this expanded view to improve scoring, hi contrast, traditional autheiiticatioii service providers may only address the digital domain. For example, a payment processor could indicate if a particular device is associated with fraud, and flag that device for issuers in future transactions. The issuer may then reject transactions involving that device of prompt for additiouaiautlientication (e g., through two-factor authentication).
  • Table 2 lists a number of the data elements that are used in the 3DS 2 Protocol for authentication. For example, at least some o f these data elements may be included in the authentication data included in the AReq sent to directory’ server 510.
  • the eighteen da ta elements that ar e also part of the 3 DS 1.0 Protocol are bolded in Table 2, Those of skill in the art will appreciate that the number of rich data elements could grow beyond those listed below (e.gang in future versions of the 3DS Protocol), and could include over one hundred and seventy data elements.
  • an app-based transaction e.g., carried out using a mobile computing device
  • a tinnsaction performed using an Android device could have over one hundred and thirty additional elements.
  • ACS 512 performs autheutieation using RBA capabilities.
  • many ACS providers that are issuer processors for authentication do not have RBA capabilities.
  • ACS providers with RBA capabilities may temporarily lose those capabilities (e.g., due to equipment malfunction).
  • ACS providers without RBA capabilities risk losing customers to other ACS providers that have this capability. Accordingly, it would be desirable to facilitate 3DS 2 Protocol (and subsequent versions of the 3DS Protocol) authentication for ACS providers that do not have RBA capabilities.
  • FIG. 6 is a schematic diagram illustrating transaction flow in another example authentication system 600 that uses the 3DS 2 Protocol (or subsequent versions of the 3DS Protocol) for authentication, and that performs RB A on behalf of
  • authentication system 600 ACS providers that are unable to perform RBA. Unless otherwise indicated, components of authentication system 600 are substantially similar to those of authentication system 500 (shown in FIG. 51.
  • authentication system 600 includes an RBA-enabled directory server 610 communicatively coupled to a RBA engine 612 (which may be collectively referred to as an authentication platform 614).
  • RBA- enabled directory server 610 and RBA engine 612 facilitate performing RBA behalf of ACS providers, as described herein.
  • RBA-enabled directory server 610 and RBA engine 612 may be operated, for example, by interchange network 28 (shown in FIG. I),
  • authentication platform 614 is similar to RB A platform 34
  • RBA-enabled directory server 610 receives an AReq message from 3DS server 506. However, instead of immediately .forwarding the AReq message to ACS 512, RBA-enabled directory server 610 transmits at least some of the data in the .AReq message (e.g., the authentication data) to RBA engine 612.
  • RBA engine 612 analyzes the data in the AReq message to generate RBA result data. For example, RBA engine 6'12 may compare the data in the AReq message to one or more long term variables (“LTV”).
  • LTV long term variables
  • the one or more LTV may include historical authenticatiori data associated with the PAN at issue, historical authorization data associated with the PAN, other historical data associated with the PAN, etc.
  • the LTV may be associated with both card present and card not present historical transactions.
  • the LTV may include cardholder shipping address, cardholder billing address, cardholder email address, cardholder phone number:, merchant name, merchant category, merchant locution and ci at letkd one eimnmtnt-1 dated ⁇ anal de ⁇ e g dewtt details biwAsei details) including device ID, IP address, device channel, etc.
  • the LTV may be stored in a database accessible by RBA engine 612 and opemted by interchange network 28. In some embodiments, the LTV data will be hashed prior to storing to pr otect the security of this personally identifia ble information.
  • the data in the AReq message may also be compared to oilier parameters. For example, io monitor consistency and changes in behavior, the data may be compared to short term (e g.. on the ordei of minutes, hours, or days) PAN velocities and ratios, including velocities and ratios of PAN authorization and authentication. This may include comparing to recent transaction frequency, amount spent, declines, historical risk scores, etc.
  • the data in the AReq message may be analyzed using any suitable techniques to generate RBA result data, as described herein.
  • the RBA result data generated by RBA engine 612 includes a risk score, a risk analysis, and at least one reason code.
  • the risk score is a score representing a determined riskiness of the transaction, with lower scores indicating lower risk and higher scores indicating higher risk.
  • the risk score represents a likelihood that the suspect cardholder (e.g., the person attempting to perform a transaction) is the legitimate cardholder having the privileges to use tire payment card to perform a payment transaction.
  • the risk score may be represented by a number from G-999 and/or by a risk threshold category from 0-19.
  • risks assessments that will be shared, such as through the authorization field of one or more messages will be quantified on a scale of 0-9. Those of skill in the art will appreciate that any suitable risk score may be used.
  • the risk analysis is a description of a level of risk corresponding to the risk score (e.g,, low risk, medium risk, dr high risk).
  • the reason codes include one or more factors that influenced the risk score.
  • the reason codes are affected by rules and' or a combination of the rules and the model.
  • RBA engine 612 transmits the RBA result data to RBA-enabled directory server 610.
  • the reason codes are generated based on a plurality of reason code categories and associated anchors, hi some embodiments, the reason codes are affected by rules and/or a combination of the rules and the model.
  • RBA engine 612 may activate one or more anchors.
  • the reason codes are then generated based on which anchors (and how many anchors) are activated. In some embodiments, the reason codes are affected by rules and/or a combmation of the rules and the model.
  • three risk code categories are established: cardholder, merchant, and environment.
  • the cardholder category is associated with five anchors (shipping address, PAN. billing address, email, and phone)
  • the merchant category is associated with tiiree anchors (merchant name, merchant category , ami merchant criustyX
  • the: environment category is associated with three anchors (device info, IP address, and device channel).
  • additional and/or alternative anchors may be established.
  • RB A engine 612 may activate at least one anchor.
  • RBA engine 612 may activate the shipping address anchor. Further, RBA engine 612 may activate the PAN anchor of the cardholder category if the PAN has had successful authentications in past transactions.
  • one or more anchors may be activated based fraud rates for the merchant, decline rates for the merchant, and noil-cleared transaction rates for the merchant. Further, one or more anchors may be activated whea RBA engine 612 determines the merchant category and merchant location for the transaction are consistent with historical transactions for that .
  • the IP address anchor may be activated if the IP address is known and is not. on a list of “bad” IP addresses. Further, the device anchor may be activa ted if the device is known and is not on a list of “bad” devices, the device has had successful autlrentications in past transactions, and/or tile device has scared well in past transactions.
  • the shipping address anchor is activated if the shipping address has been used with the PAN in past transactions, the shipping address is the same as the billing address on file, the shipping address is not on a list of “bad” shipping addresses, and the shipping address is unchanged from a prior transaction.
  • the shipping address anchor, the billing address anchor, and the PAN anchor i.e. , all anchors for the cardholder category
  • the shipping address anchor, the billing address anchor, and the PAN anchor are activated when the shipping address is consistent with previous transactions, the billing address is consistent with previous transactions, the PAN has historical positive association with the cardholder , and the purchase amount, da te, and time are consistent with previous transactions.
  • anchors for both the cardholder category and the merchant category are activated when the contact information for the cardholder is consistent with previous transactions, the cardholder is a trusted cardholder, the merchant is a trusted merchant, and the PAN shows established activity and authentication history at tire merchant.
  • the anchors may be activated based on any suitable conditions.
  • the reasons codes are generated based on the activated anchors, and are loosely structured in a Ineias chical order based oil connections between anchors in different categories. For example, if at least one anchor in the cardholder category is activated, a. positive reason code (i.e., indicating relatively tow risk) is generated. If, instead, at least one anchor in the cardholder category is activated and at least one anchor in the merchant category is also activated, a stronger positive reason code related to both categories is generated. Similarly, if at least one anchor in the cardholder category is activated, at least one anchor in the merchant category is activated, and at least one anchor in. the environment category is activated, an even stronger positive reason code related to all three categories is generated.
  • Table 3 lists of number of example reason codes.
  • RBA engine 612 After RBA engine 612 generates the RBA result data (including the reason codes), RBA-enabled directory server 610 embeds the RBA result data into the AReq message to generate an enhanced AReq message.
  • the RBA result data is appended to the AReq message as an extensible markup language (XML) extension of the AReq message.
  • XML extensible markup language
  • the extension may have the following format;
  • score is the risk score
  • decision is Ore risk analysis
  • the mason codes are transmitted as a single leter each. In oilier embodiments, the reason codes may be represented in different methods.
  • rea.sonCode2 is transmitted by the merchant to provide the merchant’s assessment of the transaction.
  • the RBA result data may be embedded into the AReq message to generate an enhanced AReq message using any suitable process.
  • the enhanced AReq message is then transmitted from RBA-enab led directory server 616 to ACS 512.
  • ACS 512 then analyzes the RBA result data in the enhanced AReq message to make an authentication decision That is, in the example embodhent, ACS 512 may determine to folly authenticate the transaetion, deny authentication for the transaction, or perform additional authentication (e,g. , by issuing a step-up challenge to the cardholder) for the transaction, based on at least one of the risk score, the risk analysis, and the reason codes.
  • ACS 512 does not perform the RBA analysis, but is still able to leverage the results of that analysis to make an authentication decision (e g., by using the results in their own fraud analysis platform), generally resulting in more approvals wife less fraud.
  • RBA- enabled directory sewer 616 and RBA engine 612 perform the RB A analysis on behalf of ACS 512.
  • the ACS 512 receives authentication data from a plurality of sources.
  • RB A-enabled directory server 610 folly authenticates the transaction itself Specifically, when the determined riskiness of tire transaction is low enough, RB A-enabled directory sewer 610 automatically generates an ARes that indicates the transaction has been folly authenticated, and transmits the ARes message to 3DS server 506, RBA-enabled directory server 610 determines that the riskiness of the transaction is low by coinpai’mg at least one of the risk score and the risk analysis to a predeterniined threshold.
  • the predetermined threshold may be specified, for example, by ACS 512.
  • ACS 512 is able to control which transactions will fee fully authenticated without all transactions being forwarded to ACS 512.
  • Bypassing ACS 512 for low risk transactions reduces tire overall message volume on the payment network. This in him frees up network resources, hupfoving transmission speed and overall capability of the payment network.
  • RBA-enabled directory server 610 determines if ACS 512 is available, In some situations, ACS 512 may be offline or unavailable. If the ACS 512 is available, then the RBA-enabled directory server 610 may route the enhanced AReq message including the RBA result data to the ACS 512. If rhe ACS 512 is not available, RBA-enabled directory server 610 may perform the authentication processing.
  • FIG. 7 is a flow diagram of an example method 700 for authenticating an online user on behalf of an access control server (ACS). Method 700 may be implemented, for example, using authentication platform 614 (shown in FIG. 6). Method 700 includes receiving 702 an authentication request message, the authentication request message includes authentication data.
  • Method 700 forfher includes extracting 704 Hie aufoeimcaiion data from the autlienticatiou request message.
  • Method 700 further includes 706 generating, based at least in pari on the extracted authentication data, RBA result data including a risk score, a risk analysis, and at least one reason code.
  • method 700 includes embedding 708 the RBA result data into the authentication request message to generate an enhanced authentication request message
  • method 706 includes transmitting 710 the enhanced autheutication request message to the ACS to enable the ACS to make an authentication decision based on the RBA result data.
  • FIG. 8 is a flow diagram of another example method 800 for authenticating an online user.
  • Method 800 may be implemented, for example, using authentication platform 614 (shown in FIG. 6).
  • autheimcatian platfoim 614 receives 802 an authentication request message including authentication. data, as described herein.
  • Authentication platform 614 performs 804 RBA to generate RB A result data including a risk score, a risk analysis, and at least one reason code.
  • the risk score is a score representing a determined riskiness of the transaction, with lower scores indicating lower risk and higher scores indicating higher risk. In other words, the risk score represents a likelihood that the suspect cardholder (e.g., the person attempting to perform a transaction) is the legitiruate cardholder having the privileges to use the payment, card to perform a payment transaction.
  • the risk score may be represented by a number from 0-999 and/or by a risk threshold category from 0-19,
  • the risk score is represented between 0 and 950 in twenty increments of 50 (te., tire poten tial risk scores 'are 0. 50, 100, 150, ..., 950),
  • risks assessments that will be shared, such as through the authorization field of one or more messages will be quantified on a scale of 0-9.
  • the risk analysis is a description of a risk level corresponding to the risk score (e.g., low risk, medium nsk, or high ink s
  • the leason codes include eut oi moie factoid that influenced the risk score.
  • authentication platform 614 compares the RBA result data to a stored authentication profile.
  • the aathemicatiou profile contains a plurality of rules for the processing of authentic ation requests.
  • the authentication profile is provided by the issuer computing device 514 (shown in Fig. 5). Examples of the rules include, but are not limited to, how to proceed when die - ⁇ CS >12 ⁇ shown m Th ⁇ 5) is unavailable mfonnation to include in the RBA, risk level thresholds for the risk score and risk levels, decision making risk thresholds, and specialized rules (such, as all cross-border transactions are to be submited to the ACS 512).
  • the authentication profile is stored at the RBA platform 34, and can be accessed whenever a risk score is determined.
  • authentication platform 614 compares the RBA result data to the aiithentication profde to determine the risk level associated with the transaction associated with the authentication request, hi some einbodiineuts, authentication platform 614 compares the risk score to one or more thresholds in the authentication profile to determine the risk level associated with the transaction, hi other embodiments, authentication platform 614 compares tire risk analysis, the reason codes, and/or any other combination of data from the RBA result data arid potentially some or all of the authentication data to the authentication profile to determine the risk level associated with this transaction.
  • a risk score of 350 or less may be considered low risk
  • a risk score above 350 and less than 850 may be considered medium risk
  • a risk score above 850 may be considered high risk
  • any suitable risk score thresholds and any number of risk levels may be used.
  • authentication platform 614 determines 806 if die risk level is high risk. For example, authentication platfonu 614 may determine 806 that the transaction is clearly fraudulent. In. which case, authentication platform 614 fails the authentication, i.e., denies 808 foil authentication o f the transaction. Authentication platform 614 transmits an authentication response (ARes) message indicating tire foiled authentication to. 3DS server 506 (shown in FIG. 5).
  • ARes authentication response
  • the 3DS server 506 may transnrit the Ares message indicating the failed authentication to the merchant, and the merchant may determine whether or net to proceed with the authorization process in the absence of foil alsoeuiicaiion.
  • the merchant assumes the risk for the transaction if it is authorized by the issuer .
  • authentication platform 614 determines the transaction is clearly fraudulent, authentication plat&mr 614 denies the transaction without sending on authentication data (e.g. to the ACS and/or issuer). Specifically, authentication platform 614 fails the authentication and communicates the failure to the authentication requestor in the ARes message.
  • authentication platform 614 may notify the issuer and/or merchant that the transaction was clearly fraudulent, enabling the issuer and/or merchant to take appropriate action (e.g., flagging the associated account number and/or cardholder). fo some cases, authentication platform 614 determines 810 that the transaction is medium risk or low risk.
  • authentication platform 614 may folly authenticate 814 the transaction and fraiisnnt an authentication response (ARes) message indicating the foil authentication to 3DS server 506, where at least one of the 3 DS server 506 and the merchant may initiate foe authorization process. If the transaction is medium risk, authentication platform 614 may issue 812 a step-up challenge to the cardholder 22 (shown in FIG, 1). Based on the results of the step-up challenge, authentication platform 614 may felly autiimticate, or otherwise deny fell authentication, of the transaction .
  • ARes authentication response
  • autiienticatfou platform 614 transmits the RB A result data to ACS 512, so that the AC'S 512 will perform the step-up challenge
  • authentication platform 614 may take different steps at different risk levels and have additional or fewer risk levels to analyze based on the authentication profile.
  • FIG. 9 is a flow diagram of another example method 900 for authenticating an online user.
  • Method 900 may be implemented, for example, using autiientieation platform 614 (shown in FIG, 6),
  • Method 900 includes storing 902 an authentication profile, bubble authentication profile contains a plurality of rules for the processing of authentication requests .
  • the method 900 also includes receiving 904 an authentication request message, the authentication request message includes authentication data.
  • Method 900 further includes exiiaeting 906 the authentication data from the authentication request message.
  • Method 900 further includes generating 908, based at least in part on the extracted autiientieation data, RBA result data including a risk score, a risk analysis, and at least one reason code.
  • method 900 includes routing 910 the RB A result data based on the autiientication profile and the RBA result data.
  • the authentication platform 6.14 transmits the RBA result data to a sourc e of the autiientieation request message, such as the 3DS server 506 (show in. FIG. 5).
  • a merchant operating the 3DS server 506 may request and receive the RBA result data, including a risk score, a risk analysis, and at least one reason code as described herein.
  • the merchant may use the RBA result data to update the merchant’s own risk models, and may also compare the RBA result data to risk analysis results generated independently by the merchant to determine whether the RBA result data is generally consistent with the merchant-generated risk analysis results.
  • the authentication request message is associated with an online payment card transaction.
  • the authentication profile is associated with an issuer bank 30 (shown in FIG. 1). And the source of the authentication request message is the issuer computing device 514 (shown in FIG. 5). Accordingly, in some embodiments, the authentication platform 614 transmits the RBA result data directly to the issuer computing device 514, and handles authentication with the issuer computing deVice 514. For example, the issuer bank 30 may enroll a range of card numbers with the authentication platform 614, and request that the authentication platform 614 work directly •with the issuer computing device 514 for authentication of transactions involving card numbers in the enrolled range.
  • the authentication platfonn 614 determines whether an access control server (ACS) 512 (shown in FIG. 5) is available. If the ACS 5 i 2 is available, the autlienticatiou platform 614 embeds the RBA result data into the au thentication request message to generate an enhanced au thentication request message. The authentication phuform 614 transmits the enhanced authentication request message to the ACS 512 to enable die ACS 512 to make an authentication decision based on the RB A result data. If the ACS 512 is unavailable, the autlieiitieation platform 614 generates an authentication decision based on the RBA result data and the authentication profile.
  • ACS access control server
  • the authentication platform 614 determines a risk level based on the RBA result data and the authentication profile.
  • the risk level includes at least a low risk, a medium risk and a high risk for the transaction associate with the authentication request
  • the authentication platform 614 transmits an authentication approval message to the 3DS server 506, if the risk level is lo w.
  • the authentication platform 614 transmits a step-up challenge to the online user 22 (shown in FIG. I) if the risk level is medium.
  • the authentication platform 614 receives a response to the step-up challenge from the online user 22.
  • the authentication platform 614 determines an authentication decision based on the response to the step-up challenge and the RBA result data.
  • the authentication platform 614 transmits the RBA result data to the AC’S 512 if the risk level is medium.
  • the ACS 512 performs the step-up challenge with the online user 22.
  • the authentication platfoim 614 transmits an aathenficaiion-failed message to the 3DS server 506.
  • FIG. 10 is a flo w diagram of a further example method 1000 for authenticating an online user on behalf of an access control server (ACS) 512 (shown in FIG. 5).
  • Method 1000 may be implemented, for example, using authentication platform 614 (shown in FIG. 6).
  • Method 1000 includes receiving 1002 an authentication request message for a transaction.
  • the authentication request message includes authentication data.
  • the method 1000 also includes exacting 1004 the authentication data from the authentication request message.
  • the method 1000 further includes determining 1006 if the ACS 512 is available to process the transaction.
  • the method inrissas generating 1008, based at least in part on the extracted authentication data, risk-based authentication (RBA) result data including a risk score and at least one reason code that indicates at least one factor that influenced the generated risk score. If the ACS 512 is unavailable, the method also includes transmittiug 1010 an authentication response message based on the RBA. result data. In some embodiments, the authentication platform 614 generates an authentication decision based on the RBA result data and embeds the authentication decision in the authentication response message.
  • RBA risk-based authentication
  • transactions are categorized “merchant only''’ or "fully authenticated.” “Fully authenticated” rmnsaetions are generally considered to be low risk transactions that have been authenticated. “Merchant only” transactions are more risky transactions. In some embodiments, “merchant only” transactions have been authenticated. In the example embodiment, one or more indicators in the authentication response indicate whether a transaction is “merchant only''’ or "fully authenticated.” One or more indicators may also indicate whether or not authentication was attempted on ilte transaction. This information is used by the merchant to determine whether or not to begin the authorization process for the transaction.
  • this information is also stored in the database 120 (shown in FIG, 2 ) and is referred to by at least one of the interchange network 28 and the issuer bank 36 during the authorization process 29 (all shown in FIG. 1).
  • the authentication platfoim 614 performs the autheiitieation process on the transaction, including RBA. This analysis is based on a machine learning model where, overtime, the authentication platform 614 is capable of improving its ability to determine the risk level associated With transactions, The authentication platform 614 analyzes transactions that are authenticated by the ACS 512 and compares these transactions with historical data to generate a risk model for each issuer bank 30.
  • the risk model By comparing ths data points in each transaction, the risk model will indicate the amount of risk associated with each transaction based on the authentication data in the corresponding authentication requests. This allows the authentication platfoim 614 to analyze transactions when the ACS 512 is unavailable and perform authentication on these transactions to provide a response to te authentication request. Accordingly, the authentication platform 614 may determine that a received authorization request is substantially similar to a previous transaction that the ACS 512 scored at low risk. Thus allowing the authentication platform 614 to determine that the received transaction is low risk with a degree of certainty ,
  • the authentication platform 614 determines Whether or not the AC'S 512 available by transmitting the authentication request message to tire ACS 512. In these embodiments, the authentication platform 614 resits a predetermined per iod of time for a response from the ACS 512. The authentication platform 614 determines that the ACS 512 is unavailable if no response is received from the ACS 512 after the predetermined period of time. Alternatively, tire engineerentieation platform 614 may receive a response from the ACS 512 that indicates that the ACS 512 is unable to perform authentication.
  • the response from the ACS 512 may indicate that the online user is not enrolled with the ACS 512, that the ACS 512 is currently unavailable, or that the ACS 512 was unable to authenticate the online user. This indication may be contained in the response message from the ACS 512.
  • the authentication platform 614 may transmit periodic Status check messages to the ACS 512 to determine whether or not the ACS 512 is available.
  • the authentication platform 614 determines that Use online user is not associated with the ACS 512 based on the extracted authentication data. In these embodiments, the issuer associated with the online user has not registered with an ACS 512. In these embodiments, tire authentication platform 614 generates an authentication decision based on the RBA result data. hi some further embodiments, the authentication platform 614 determines whether the authentication request message complies with the 3 DS 2 Protocol or subsequent versions of the 3 DS Protocol. If the authentication request message does not comply with the appropriate 3DS Protocols, the authentication platform 614 bypasses determining if the ACS 512 is available .
  • the authentieation platform 614 transmits an authentication response message mdicaimg that the transaction is considered merchant only and that no authentication was atempted.
  • authentication platform 614 may be enabled to act as a stand-in for ACS 512 for some authentications.
  • the authentication platform 614 determines a risk level based on the RBA result data. If the risk level is low, the authentication platform 614 embeds an indicator in the authentication response message indicating that the transaction is “felly an&eniicated.” If the risk level is not low, the authentication platform 614 embeds one or more indicators in the authentication response message indicating that the transaction is a merchant only transaction and that authentication was attempted.
  • FIGS. 11 A and 1 IB are swim-lane diagrams illustrating additional example embodiments involving conditional SCA evaluation on transactions associated with a regulated market. FIG. 11 A is directed to transactions that, are allowed to avoid regulator-imposed SCA step-up challenges when the transactions are determined to be of sufficiently low risk and low value FIG.
  • the cardholder 22 initiates an online transaction with a merchant, represented here by 3DS server 506, via their computing device, represented here by 3DS client 502.
  • 3DS server 506 generates and transmits an AReq message 1102 to directory server 619 at step 1112 and extracts transaction data from AReq message (e.g,, as described above with respect to FIG. 6).
  • AReq message 1102 includes a transaction value for the transaction, as well as other authentication data associated with the transaction (e g,, as a 3DS AReq message).
  • Directory server 610 receives AReq message 1102 and determines that the transaction involves a market regulated by a regulatory entity, such as a central bank of a particular country associated with the transaction (e.g., based on the identity or location of cardholder 22, merchant 24, merchant bank 26, or issuer bank 30).
  • a regulatory entity such as a central bank of a particular country associated with the transaction (e.g., based on the identity or location of cardholder 22, merchant 24, merchant bank 26, or issuer bank 30).
  • Transactions in some regulated markets may be subject to forced SCA for all or most transactions.
  • the regulated market for this example transaction has opted into conditional SCA as described herein.
  • regulators may generally mandate SCA on transactions, but may allow transactions to be authenticated without SCA in particular circumstances.
  • directory server 610 identifies a transaction limit and a risk threshold for conditional SCA Of that particular regulated market.
  • the transaction limit represents a threshold transaction value below which SCA may be avoided if the risk threshold is also satisfied, fit the embodiments described herein, the transaction limit may be.
  • the transaction limit may be defined by parameters other than a monetary value of the transaction. Those of skill in the art will appreciate that any suitable type of transaction limit may be established.
  • the risk threshold represents a level of risk of fraud associated with the transaction (e g.. as deteimmed oi “scored. ' by RBA engine 6121. hi othei words. and for example, if the risk level of the transaction is “low” (e.g., below a risk score threshold) and the transaction is a “tow-value” transaction (e.g., below the transaction threshold value), then SCA may not be mandated by the regulated entity. If the transaction value is not a low-value transaction (e.g., at or above the transaction threshold value) or if the transaction is not a low-risk transaction (e.g., at or above a risk score threshold), then SCA may be mandated by the regulated entity.
  • Directory server 610 compares the transaction value to the transaction limit set by the regulatory entity and, in this example, determines that the transaction value is less than the transaction limit (e.g., the transaction is a “tow-value” transaction). As such, directory server 610 engages RBA engine 612 at Step 1114 to evaluate risk associated with AReq RBA engine 612 evaluates risk associated with tlie transaction using die authentication data and oilier transaction data associated with AReq, as described above. RBA engine 612 generates risk-based auilientication result data that includes a risk score for the transaction.
  • RBA engine 612 compares the risk score generated for this transaction to the risk threshold identified for this regulated market and determines that the risk of fraud in this transaction is below the risk tln eshold.
  • the risk score and the risk threshold may be integer values that may be compared to determine whether tlie risk score is more or less than the risk threshold.
  • the risk threshold may be a category of a tiered set of categories (e.g., “low”, “medium”, “high”) and the risk score may be of that same tiered set of categories, or the risk score may be a value that is mapped into that tiered set of categories (e.g., with regulator-, issuer-, or system-defined ranges for each category).
  • RBA engine 612 may allow the regulators for this market to define the “low risk” category as being any transaction score below 400 (e.g., as evaluated under 3DS 2 by RBA engine 612).
  • RBA engine 612 has determined, at step
  • tile transaction is both “low” and “'below.”
  • the transaction is -both a low-value transaction as well as below tire regulator's transaction threshold.
  • the transaction is not mandated to have SCA performed.
  • some issuers may have more stringent requirements for SCA step-up, or may have other reasons for rejecting authentication regardless of SCA step-up considerations.
  • some issuers may reject any CHP transaction evaluating to a “high” risk.
  • flow and rejections are not expressly illustrated. in FIGS. 11 A and 1 IB. Rather, FIGS. 11 A and I I B focus on scenarios involving when SCA is mandated or allowed to be avoided.
  • the authentication platform (e.g., directory server 610 and RBA engine 612) may be entrusted to perform authentication processing on behalf of issuer 514. In other scenarios, authentication may be performed by ACS 512. As such, at test 1116, if the authentication platform is acting on behalf of issuer
  • RBA engine 612 generates an ARes message 1106 approving the transaction at step 1118 (presuming no other reason for authentication rejection) and transmits ARes 1106 to 3DS server 506 at step 1120 without having performed SCA step-tip authentication on consumer 22. If, at test 1116, the authentication platform does not perform authentication on behalf of issuer 514 (e.g., issuer 514 has ACS 512 perform authentication services), then RBA engine 612 transmits an enhanced AReq message 1108 to ACS 512 at step 1122.
  • Enhanced AReq may include, In addition to the additional RBA data described above associated with 3DS 2, a data field indicating that SC A step-up is not mandated by the involved market(s) for this transaction.
  • issuer 514 or ACS 512 may otherwise determine to perform SCA on the transaction (e.g., if preferred by the issuer for certain types of transactions or other considerations). If, at test 1130, ACS 512 does not prompt SCA step-up, then ACS 512 returns an ARes message 1132 to the authentication platform at step 1134 approving authentication of the transaction.
  • ACS 512 If, at test 1130, ACS 512 detennmes to prompt SCA step-up, then ACS 512 prompts step-up 1138 via 3DS server 506 (or 3DS client 502) at step 1136. Consumer 22 provides step-up input 1142 back to 3DS server 506 (or directly to ACS 512) and. upon successful step-up, ACS 512 transmits the ARes message 1132 to the authentication service. at step 1146.
  • the authentication platform determines that the transaction does not meet the requirements to avoid SCA step-up and, as such, SCA step-up is mandated.
  • RBA engine 612 determines, at step 1150, that either tire transac tion value is above the tiaasaciton limit set by the regulators 7 entity 7 , or that the transaction risk does not satisfy the risk threshold set by fire regulatory entity, or both. If at test 1152, the authentication platform is acting on behalf of issuer 514, and presuming no other reason for denying authentication of the transaction, RB A engine 612 prompts step-up
  • step 1156 of consumer 22 at step 1154 Consumer 22 responds with step-up input 1142 at step 1140, either directly with directory server 610 or via 3DS server 506 at step 1158 and, upon successful step-up challenge, 3DS server 506 transmits ARes message 1106 to 3DS server 506 approving authentication of the transaction. If at test 1152, ACS 512 is acting on behalf of issuer 514, RB A engine
  • AReq 1108 transmits, at step 1154, the enhanced AReq 1108 (represented here by 1162) along with an indication to force SCA step-up challenge of consumer 22 for this transaction.
  • Enhanced AReq may include, in addition to the additional RBA data described above associated with3DS2, a data field mandating ACS 512 to perform SCA step-up for the transaction (e.g., if the transaction is otherwise deemed to be approved for authentication by ACS 512),
  • AReq 1108 serves to inform ACS 512 tlrat tire transaction may not be authenticated without SCA. Presuming no other reason to rej ect authentication of the transaction.
  • ACS 512 identifies that the transaction is subject to a mandated SCA step-up and prompts step- up 1138 in steps 1136, 1140, 1144. and transmits ARes 1132 approving the transaction in steps 1146 and 1120, as described above.
  • the authentication platform provides a graphical user interface (GUI) dashboard (not shown) for use by the regulators.
  • GUI graphical user interface
  • the GUI may, for example, allow the regulators to view and evaluate fraud data associated with their inarket.
  • the GUI dashboard may be configured to display his torical fraud data indicating a level of fraud present in transactions not mandated to be authenticated with SCA by RBA engine 612 when satisfying the risk threshold and tiaiisactioii limit set by the regulatory entity (e.g., a percentage of “fiictionless transactions’’ within RBA, perhaps including approval rates or basis points of fraud), hi one embodiment, the GUI dashboard may be configiued to display historical fraud data indicating a level of fraud present in transactions mandated to be authenticated with SCA by the RBA engine 612 when not satisfying one or more of the risk threshold or transaction limit (e,g., percentage of transactions stepped-up within RBA, perhaps with the type of step-up, approval rates, basis points of fend).
  • Such data may include an electronic gross dollar value (eGDV), an eTransaction count, or growth over time for such metrics.
  • eGDV electronic gross dollar value
  • eTransaction count or growth over time for such metrics.
  • data may also be presented by channel.
  • eGDV electronic gross dollar value
  • Such data may be limited to mobile device fensactiens, browser-based transactions, telephone transactions, and marl transactions.
  • the GUI may allow the regulators to determine how then current settings are impacting fraud in these fypes of transactions.
  • the GUI allows the regulators to adjust conditional SCA settings associated with their market.
  • the GUI may allow the regulators to alter the risk threshold required to avoid SCA, or to alter the transaction limit for transactions that can avoid SCA.
  • the GUI provides simulation analysis of prospective changes to the conditional SCA settings. For example, using historical data, the GUI may provide a familial impact analysis to a proposed higher risk threshold, or to a proposed higher transaction limit, perhaps estimating a predicted level of sociald at the proposed setimgs. As such, the GUI may allow the regulators to determine potential impacts or potential results based on prospective changes.
  • FIG. 12 is a flow diagram of an advanced authentication process 1200 for increasing approvals, reducing fraud, and improving consumer experience.
  • Authentication process 1200 may be implemented, for example, using the systems and methods described herein.
  • authentication data 1202 is transmitted to an authentication platform 1206 (such as autiicitocation platform 614) through a smart interface 1204.
  • authentication data 1202 under the 3DS 2 Protocol includes approximately ten times the amount of transaction data to be gathered, analyzed, and utilized to prevent fid.
  • anihentication platfonu 1206 uses authentication data 1202, anihentication platfonu 1206 performs smart authentication 1208 (as described herein) to generate RBA results data.
  • Decision intelligence (DI) 1210 uses other sources of data (i.e., a separate model) to influence authorization decisions.
  • the RBA results data maybe incorporated into DI 1210.
  • Auflientication process 1200 enables authenticating an online user as a legitimate user of a payment account without having to ask additional questions of the user (e.g,, as part of a step-up challenge) or having to request additional inputs from the user.
  • authenticati on process 1200 assesses a risk of fraud without creating any additional friction for the user that may cause the user to terminate a transaction.
  • FIG. 13 is a schematic diagram illustrating transaction flow in another example auflientication system 1300 that uses the 3DS 2 Protocol (or subsequent versions of the 3DS Protocol) for authentication, and that performs RBA on behalf of ACS providers that are unable to perform RBA.
  • components of authentication system 1300 are substantially similar to those of authentication, system 500 (shown in FIG. 5) and 600 (shown in FIG. 6).
  • Authentication system 1300 again includes RBA-enabled directory server 610, which in this embodiment is communicatively coupled to a RBA engine 1312 (which may be collectively referred to as an auiheniication platfoim 1314), RBA-enabled directory server 610 and RBA engine 1312 facilitate performing RBA behalf of ACS providers, as described herein.
  • RBA-enabled directory server 610 and RBA engine 1312 may be ope/ated. for example, by interchange network 28 (shown in FIG. I).
  • authentication platform 1314 is similar to RBA platform 34 (shown in FIG. I) and authentication server 112 (shown in FIG. 2),
  • RBA-enabled directory server 610 receives an AReq message from 3DS server 506, then RBA-enabled directory server 610 transmits at least some of the data in the AReq message (e.g., the authentication data) to RB A engine 1312,
  • RBA engine 1312 analyzes the data in the AReq message in a similar fashion to the analysis performed by RBA engine 612 to generate RBA result data. For example, RBA engine 1312 may again compare the data in the AReq message to one or more long term variables f ‘LTV’) and/or short, term PAN velocities and ratios, which again may inente comparing to recent transaction frequency, amount spent, declines, historical risk scores, etc.
  • LTV long term variables
  • the data in the AReq message may be analyzed using any suitable technique to generate RBA result data.
  • the RBA result data generated by RBA engine 1312 again may include a risk score, a risk analysis, and at least one reason code as described above, such as the shxgle-character reason codes described above with respect to Table 3. Additionally or alternatively, however, RBA engine 1312 generates enhanced reason codes .
  • each enhanced reason code consists of multiple bytes of data that provide more detailed insight, as compared to the single character reason codes described above with respect to Table 3, with respect to the underlying factors that affect the risk analysis.
  • the enhanced reason codes are again generated based on a plurality of reason code categories arid associa ted anchors, and again may be affected by rules and/or a combination of the rules and the model, as described above.
  • the multiple-byte enhanced reason code includes far more possibilities for rmanced descriptions of the combination of activated anchors and/or risk events that are identified by RBA engine 1312. Based on the analysis of the data m the AReq message. RBA engine 1312 again may adn ate one or more anchors in one or more of the categories.
  • the enhanced reason code is then generated based on winch anchors (and how many anchors) are activated, and based further on other specific risk events detected for the transaction.
  • each, byte is assigned an alphanumeric eliaracter, for 36 possibilities per byte.
  • the enhanced reason code includes any suitable number of bytes (such as four, five, or ten bytes), and/dr each byte is assigned a value from among any suitable range of values (e.g., an integer between 0 arid 255).
  • the ability to embed significant additional detail in the enhanced reason code, while still utilizing a very small number of bytes (e.g., three bytes), enables RBA engine 1312 to provide a particular technical advantage with respect to providing information for real-time transaction authentication to issuers that do not contract with an ACS, and/or to merchants or issuers when an ACS becomes temporarily unavailable, as will be discussed herein.
  • RBA engine 1312 the ability to embed significant additional detail m the enhanced reason code, while still utilizing a very small number of bytes (e.g., three bytes), enables RBA engine 1312 to provide a particular technical advantage with respect to back- office analy sis of past transactions by issuers or merchants, as will be discussed herein.
  • the reason code categories are again the cardholder, merchant, and environment categories as described above.
  • any suitable number and/or type of categories is implemented by RBA engine 1312.
  • the cardholder category is associated with fi ve anchors (shipping address, PAN, billing address, email, and phone)
  • the merchant category is associated with three anchors (merchant name, merchant category, and merchant country)
  • the environment category is associated with three anchors (device into, IP address, and device channel).
  • RBA engine 1312 may activate at least one anchor in one or more of the three categories. For example, for the cardholder category, if RBA engine 1312 determines that a shipping address for die transaction has been used with the PAN in past transactions and/or the shipping address is unchanged from prior transactions, RB A engine 1312 may activate the shipping address anchor. Further, RBA engine 1312 may activate the PAN anchor of the cardholder category if the PAN has had successful authentications in past transactions.
  • one or more anchors may be activated based fraud rates for the merchant, decline rates for the merchant, and lion-cleared transaction rates for the merchant. Further, one or more anchors may be activated when RBA engine 1312 determines the merchant category and merchant location for the transaction are consistent with historical transactions for that merchant. For the environment category, RBA engine 1312 njay activate the IP address anchor if the IP address is known and is not on a list of “bad” IP addresses.
  • the device anchor may be activated when RBA engine 1312 detennin.es the device is known and is not on a list of “bad” devices, the device has had successful authentications in past transactions, and/or the device has scored well in past tKnisactioiis, Hie additional examples of criteria for activating anchors for the different categories as described above for RBA engine 612 jn»y -also be applied for RBA engine 1312.
  • the anchors may be activated based on any suitable conditions.
  • RBA engine 1312 may detect one or more specific ri sk events associated with one or more of the anchors. For example, RBA engine 1312 may detect that the device profile of the device used io initiate the. transaction does not match the device profile used to initiate previous online transactions associated with the payment account in the historical data.
  • the bytes of the enhanced reason code are generated based on the activated anchors and the detected risk events, and in some embodiments are structured in a hierarchical order based on connections between anchors in different categories. For example, if at least one anchor in the cardholder category is activated, a positive enhanced reason code (i.e., indicating relatively low risk) is generated. If, instead, at least one anchor in the cardholder category is activated and at least one anchor in the merchant category is also activated, a stronger positive enhanced reason code related to both categories is generated. Similarly, if at least one anchor in the cardholder category is activated, at least one anchor in the merchant category is activated, and at least one anchor in the environment category is activated, an even stronger positive enhanced reason code related to all three categories is generated. Conversely, if one or more risk events are detected, a less positive, or negative, enhanced reason code is generated which further indicates the one or more detected risk events.
  • the Areq message may indicate that the transaction was initiated using one or more -particular comnumication modes, such as a payment initiated using a voice-coiitroiled personal assistant (e,g., Shi®, which is a registered trademark of Apple Inc. located in Cupertino, CA) for a buy-online, curbside pickup order.
  • a voice-coiitroiled personal assistant e.g., Shi®, which is a registered trademark of Apple Inc. located in Cupertino, CA
  • Certain values of the enhanced reason code may indicate a risk event was detected because the use of Siri to initiate purchases by the associated cardholder and/or device identifier is rare, and additionally or alternatively because buy-online, curbside pickup orders are rare for the associated cardholder and/or device identifier.
  • the ability of RBA engine 1312 to convev risk events for each transaction at such levels of granularity represents a technical advantage of the enhanced reason codes.
  • RBA engine 1312 After RBA. engine 1312 generates the RBA result data (including the enhanced reason code), RBA engine 1312 transmits the RBA result data to RBA- enabled directory server 610.
  • RBA-enabled directory server 610 again embeds the RB A result data into the AReq message to generate an enhanced AReq message, as discussed above, and the enhanced AReq message is then transmitted from RBA-enabled directory server 610 to ACS 512.
  • ACS 512 then analyzes the RBA result data in the enhanced AReq message to make an alslrentication decision, such as one of determining to fully authenticate the transaction, denying authentication for the transaction, or perfbnning additional authentication (e.g., by issuing a step-up challenge to the cardholder) for the transaction, based on at least one of the risk score, the risk analysis, and the enhanced reason code. Accordingly, ACS 512 does not perform the RB A analysis, but is still able to leverage the results of that analy sis to make an authentication decision (e.g,, by using the results in their own fraud analysis platform), generally resulting in more approvals with less fraud. Thus, in such embodiments, RBA-enabled directory server 610 and RBA engine 1312 perform the RBA analysis on behalf of ACS 512. In some embodiments, the ACS 512 receives authentication data from a plurality of sources.
  • RBA-enabled directory server 610 when tire determined riskiness of the transa ction is low enough, and/or if RB A - enabled directory server 610 determines if ACS 512 is unavailable, RBA-enabled directory server 610 performs a hill authentication process for the transaction instead of generating and transmitting an enhanced AReq message to ACS 512, as described above.
  • authentication platform 1314 is configui'ed to cause 3DS server 506 to embed the enhanced reason code in an authorization request message routed to issuer 514 via payment network 522, which enables issuer 514, which is the ultimate decision-maker in authorizing the payment transaction, to consider the authentication risk events identified by the enhanced reason code directly in the authorization process.
  • payment network 522 is configured to process and route messages formated according to a set of proprietary communications standards promulgated by the payment network for the exchange of financial transaction data arid the settlement of hinds between financial institutions that are members of the payment network.
  • proprietary communications standards have a tightly constrained data format for messages, such as ISO 8583 compliant messages and/or ISO 20022 compliant : messages.
  • 'ISO' refers to a series of standards approved by the International Organization for Standardization (ISO is a registered trademark of the International Organization for Standardization of Geneva, Switzerland), hydrogen constrained format defines acceptable message types, data element locations, and data element values.
  • ISO 8583 compliant messages are constrained by the ISO 8583 standard, which governs financial transaction card originated messages.
  • ISO 20022 compliant messages are constrained by the ISO 20022 standard.
  • ISO 20022 compliant messages may include acceptor to issuer card messages (ATICA).
  • the rich detail in the RBA result data can only be leveraged by issuer 514 through the use of ACS 512 via the authentication requestiresponse convolticatiaii path, in part because the ability to add significant amounts of additional information Within the legacy messaging architecture of payment processing network 522 in the separate authorization (e.g., ISO 8583) messaging path is severely limited.
  • the enhanced reason code is capable of providing significant additional detail about the fac tors affecting authentication of the underlying payment transaction, while utilizing only a very small number of bytes: (e.g., three bytes).
  • authentication platform 1314 transmits the enhanced AReq message (including the enhanced reason code, as discussed above) via the directory server 610 back to the requestor 3DS server 506, which is configured to embed the enhanced reason code into a payment request for the transaction sent io the acquirer 520, which provides a gateway to payment network 522.
  • Acquirer 520 then routes a formatted authorization request message (e.g., an ISO 8583 authorization request message) for the transaction via payment network 522 to issuer 514.
  • directory server 610 has a direct communication link (not shown) to a payment network server computing device that is part of the implementation of payment network 522.
  • Direc tory server 610 transmits tire enhanced reason code, along with linking information usable to identify the authorization request message for the underlying payment transaction, directly to the payment network server computing device.
  • the payment network server computing device receives the formatted authorization request message for the transaction as foiwarded by acquirer 520, the payment network server computing device recognizes the authorization request message based on the linking information, and embeds the enhanced reason code into the authorization request message prior to forwarding the authorization request message to issuer 514. Accordingly, the rich RBA.
  • result data encoded by the enhanced reason code reaches the sender computing system of issuer 514, which is the decisioning server, via the separate authorization (e.g., ISO 8583) messaging path for use in the real-time authorization decision executed by the issuer server on the underlying payment transaction, regardless of whether issuer 514 has contracted with ACS 512 or whether, if contracted, ACS 512 is nevertheless unavailable at a given time.
  • the sender computing system of issuer 514 which is the decisioning server
  • the separate authorization e.g., ISO 8583
  • the three byte enhanced reason code may be included in data element 48, subeleineat 56 of the ISO 8583 authorization request message. Issuei 514 configures its authorization computing system to receive alphaniuneric values in the fields of subelemerit 56 as follows: wherein the value of ‘ARA” (authentication risk analysis) in subfieid I is an example of a fixed value that identifies fire contents of subfield 2 as an enhanced reason code.
  • ARA authentication risk analysis
  • FIG. 14 is an example graphic visualization 1400 generated by a visualization engine 1310 (shown in FIG. 13) in communication with authentication platform 1314 and/or payment network 522.
  • Visualization engine 1310 may be hosted on one or more computers that are communicatively coupled to the Internet, and that may be implemented by a server computing device amhitecture such as that illustrated by server system 301 (shown in FIG. 3).
  • server system 301 shown in FIG. 3
  • visualization engine 1310 includes a server application configured to interact with a client application executable on an analyst computing device of any of issuer 514, merchant euviromnent 1304, acquirer 520, payment network 522, or another party.
  • the server application Upon request by the client application, the server application causes the client application to display , to a user of the analy st computing device, graphic visualization 1400 based on current and or historical RBA result data generated by RBA engine 1312, stored, and subsequently obtained by visualization engine 1310.
  • the RBA result data generated in real-time with respect to each payment transaction is stored as historical RBA result data by RBA engine 1312 in a database accessible to visualization engine 1310.
  • the RBA result data generated in real-time with respect to each payment transaction is einbedded in the authorization request message routed via payment network 522 as described above, and payment network 522 stores the RBA result data from each authorization reqnest message as the historical RB A result data in a database accessible to visualization engine 1310
  • Tire analyst computing device may be implemented by a client computing device architecture such as that illustrated by client computing device 402 (shown in FIG. 4), and the client application may include a web browser or a dedicated so ttware application configured to access visualization engine 1310 using the Internet or other network.
  • client computing device architecture such as that illustrated by client computing device 402 (shown in FIG. 4)
  • the client application may include a web browser or a dedicated so ttware application configured to access visualization engine 1310 using the Internet or other network.
  • graphic visualization 1400 includes icons that represent each of the reason code categories.
  • the illustrated embodiment includes a cardholder (or payor) icon 1402, an environment (or device) icon 1404, and a merchant (or payee) icon 1406.
  • graphic visualization 1400 includes icons that represent any suitable number or type of reason code categories.
  • graphic visualization 1400 includes icons that represent the anchors associated with each of the reason code categories.
  • the illustrated embodiment includes a shipping address icon 1410, a PAN icon 1412, a billing address icon 1414 , an email icon 1416, anda phone icon 1418 connected to, grouped around, or otherwise visually associated wills cardholder icon 1402.
  • graphic visualization 1400 includes icons that represent any suitable anchors for each of the displayed reason code categories. For each selected, transaction, graphic visualization 1400 is coirfigured to visually highlight icons corresponding to anchors that are activated (i.e. , verified as eoiTesponding well to historical data) for the selected transaction.
  • the client application executing on the analyst computing device may display to the analyst a list of reports from cardholders identifying potentially fraudulent transactions (e.g., each cardholder noticed an unrecognized transaction on the cardholder ’s monthly billing statement).
  • the analyst may ‘"click on” of otherwise select a transaction on the list to initiate a request, via die client application executing on the analyst computing device, for a display of stored RBA result data with respect to the transaction using graphic visualization 1400.
  • Visualization engine 1310 responds to the request by retrieving the stored RBA result data previously generated by RBA engine 1312 for the selected transaction.
  • visualization engine 1310 then detects which anchors (if any) were acfivatedwerified for the transaction based on tire retrieved single-character reason code (e.g. using rules and/or a stored version of a table such as Table 3), or alternatively based on the enhanced reason code (e.g. using rules and/or a stored version of a table such as Table 4), and causes the client application to highlight the icon(s) -corresponding to the activated anchors on graphic visualization 1400.
  • tire retrieved single-character reason code e.g. using rules and/or a stored version of a table such as Table 3
  • the enhanced reason code e.g. using rules and/or a stored version of a table such as Table 4
  • the icons corresponding to the activated/verified anchors are highlighted by changing one or more of a fill color, a border color, a border thickness, and an element size of the icon corresponding to the anchor.
  • the icons can also be highlighted by “graying out” or otherwise visually deemphasizing the icons corresponding to the umaetivated anchors.
  • icons corresponding to tire activated anchors for the transaction are highlighted in any suitable fashion on graphic visualization 1400.
  • graphic visualization 1400 may be viewed as a “chart” with a static arrangement of icons. As rhe analyst, moves through the list of potentially fraudulent transactions, the highlighting of the icons changes to reflect tiie stored RB A result data. Thus, the analyst may quickly learn to recognize a meaning of specific highlighting patterns and/or to draw inferences as to which fhwfaleirt transactions may be related to the same source of fiaudulent conduct.
  • Graphic visualization 1400 caused to be displayed by visualization engine 1310 provides a technical advantage by enabling an analyst using the analyst computing device to quickly observe and evaluate which factors were most relevant to the authentication analysis for each historical transaction. In one example, if several icons are highlighted on graphic visualization 1400. the analyst may quickly determine that the cardholder dispute is likely without merit . Thus, if the analyst computing device represents issuer 514, i ssuer 514 may determine not to initiate a chargeback request for the disputed transaction and/or may ask the cardholder to provide additional information to support the dispute. Similarly, if the analyst computing device represents acquirer 520 hrvesiigating a chargeback request already submitted by issuer 514, acquirer 520 rnay determine to reject tire chargeback request as likely not meritorious.
  • the analyst may quickly determine that the cardholder dispute likely has merit.
  • issuer 514 may determine to initiate a chargeback request for tire disputed transaction without requiring the cardholder to provide additional inforniation to support the dispute, whereas if tire analy st computing device represents acquirer 520 investigating a chargeback request already submitted by issuer 514, acquirer 520 may determine to honor the chargeback request .
  • graphic visualization 1400 to pack a wide array of information regarding a traiisaction into a single-screen, easily comprehensible icon-based chart format is a technical improvement over conventional transaction-dispute analysis systems, which require the user to scroll through individual pieces of data and mentally re-constoict the underlying factors represented by the da ta .
  • FIG. 15 A is another example graphic visualization 1500 generated by visualization engine 1310 in conmmnication with aniiientication platform 1314 and/or payment network 522.
  • the server application implementing visualization engine 1310 additionally or alternatively provides Application Progranmiing Interface (API) ftinctiouahty available to be invoked via API calls from the client application executable on the analyst computing device of any of issuer 514, merchant environment 1304, acquirer 520, payment network 522, or another party to cause graphic visualization 1500 to be displayed on the client computing device.
  • API Application Progranmiing Interface
  • visualization engine 1310 can embed code for further API calls into graphic visualization 1500, such that the analyst can “click on” or otherwise select a portion of graphic visualization 1500 to obtain an additional graphic visualization of oilier relevant data.
  • the client application executing on the analyst computing device may again display to the analyst a list of reports from cardholders identifying potentially fraudulent tmnsactions (e.g., each cardholder noticed an unrecognized transaction on the cardholder’s monthly billing statement),
  • the client application when tire analyst “clicks’ ’ or otherwise selects a transaction on the list, the client application generates an API call to visualization engine 1310.
  • visualization engine 1310 retrieves the stored RBA result data, previously generated by RBA engine 1312 for the selected transaction.
  • visualization engine 1310 uses the retrieved enhanced reason code for the transaction (e.g.
  • Visualization engine 1310 then causes the client application to display icons for only a subset. (e.g., fewer than all) of the categories and anchors evaluated by RB A engine 1312, including those categories and anchors identified by the enhanced reason code as being the most relevant to the authentication risk for the transaction.
  • graphic visualization 1500 dynamically updates the displayed icons for each transaction based on the information captured in the enhanced reason code.
  • visualization engine 1310 retrieves an erd jamed i eason code of ZAA that was generated by RBA engine 1312, and uses the rules author the stored table to determine that the value ZAA corresponds to a. verification that the shipping address anchor was activated (e.g., because the shipping address input during the transaction had a prior history established), that the merchant was assessed overall as a low fraud risk, that a risk event was identified for the device profile anchor of tire environment category due to a change in device or device profile information as compared to previous transactions, and that as a result RBA engine 1312 tagged suspicious account (i.e., PAN) activity and scored the transaction as high risk.
  • PAN suspicious account
  • visualization engine 1310 causes graphic visualization 1500 to mclude only a subset of icons , including shipping address icon 1410 , merchant icon 1406, PAN icon 1412, and device profile icon 1420 corresponding to the categories and anchors identified by the enhanced reason code as eontribtitmg most heavily to tire authentication risk analysis.
  • visualization engine 1310 dynamically adds additional icons to the subset that may be of interest based on the initially identified risk events. For example, in the illustrated embodiment, visualization engine 1310 fiirther causes graphic visualization 1500 to include billing address icon 1414, email icon 1416, and IP address. icon 1422 because the fact that the corresponding anchors were not activated by RBA engine 1312 for the displayed transaction may further support a conclusion of suspicious account activity, despite the absence of a specific detected risk event for these anchors. Alternatively, visualization engine 1310 causes graphic visualization 1500 to include icons solely for the anchors and categories specifically associated with the value of the enhanced reason code.
  • graphic visualization 1500 is configured to visually highlight icons con'espondiag to anchors or categories that are activated/verified for a selected transaction in a first highlight mode, and to visually liighliglit icons corresponding to anchors or categories that are- associated with risk events for a selected transaction in a second highlight mode.
  • graphic visualization 1500 includes shipping address icon 1410 and merchant icon 1406 highlighted in the first highlight mode because they correspond respectively to the activated/verified shipping address anchor and the overall low-risk assessment of the merchant, arid also includes PAN icon 1412 and device pi of He icon 1420 highlighted in the second highlight n lode because they correspond respectively to the risk event identified for the device profile anchor and the tagged su-.piciuus account u e PAN s acfnitv Mnew ei the additional icon'- added to the subset, associated with neither a validation nor a risk event, are displayed in a neutral mode that differs from both the first highlight mode and the secund highlight mode.
  • the subset of icons is displayed as an array around a central lean, and respective connector lines 1510 are displayed between the central icon and each of the icons in the array, giving graphic visualization 1500 the appearance of a connected graph, as is implemented in additional embodiments described below.
  • graphic visualization 1500 does not include connector lines 1510.
  • the first highlight mode includes a first change in one or more of a connector line color, a connector line thickness, a fill color, a border color, a border thickness, and an element size of the icon corresponding to the anchor or category
  • the second highlight mode includes a second change in one or more of file connector line color, the connector line thickness , file fill color, the border color, the border thickness, and the element size of the icon eonesponding to the anchor or category.
  • the first highlight mode includes thickening the border of, and using a green color for, at least one of the icon and the connector as the first highlight mode
  • the second highlight mode includes thickening die border of and using a red color for, at least one of the icon and the connector as the second highlight mode.
  • graphic visualization 1500 fiutiier includes a textual display including the value 1515 of the enhanced reason code and summary captions 1520 for any activated-' verified anchors and/or risk events associated with the selected transaction.
  • graphic visualization 1500 does not include at least one of value 1515 and summary captions 1520.
  • FIG, 15B is another example of graphic visualization 1500 shewn in FIG. 15A.
  • the stored RBA result data for the transaction selected for display includes the enhanced reason code having a value of 4£ ZBA.”
  • the activated/verified anchors and detected risk events associated with ZB A are similar to those for the value ZAA shown in FIG. 1:5 A, except ZB A further reflects that RBA engine 1312 detected not just a cliange in device or device profile information as compared to previous transactions , but specifically that the device operating system changed to an earlier version as compared to previous transactions. Which is more serious risk event (i.e.
  • changed device information as in ZAA may be innocuous if the authentic user installed an tipdate, but it is comparatively rare that an authentic user update would change a device to an earlier version of the operating system as in ZBA).
  • Graphic visualization 1500 is configured to present the summary caption 1520 tor this more serious risk event in a separate area 1522 highlighted in the second highlight mode.
  • ZBA fiuther reflects that RB A engine 1312 detected that the device used in the transaction was associated with an ongoing coordinated fraud attack at tire time of the transaction.
  • Graphic visualization 15U0 is likewise configured to present the summary caption 1520 for this serious risk event in the separate area 1522 liiglilighted hi the second highlight mode.
  • graphic visualization 1500 is configured to represent this connection of the device to activity outside the displayed transaction by adding an additional connector 1512 to the displayed connectors 1510. More specifically, connector 1512 extends from device profile icon 1420, corresponding to the risk event, towards an outside edge of the graph to reflect the connection to other transaction activity ⁇
  • Graphic visualization 1500 is further configured to highlight connector 1512 in the second highlight mode.
  • visualization engine 1310 is configured to dynamically update the displayed graph in graphic visualization 1500 to include more, fewer, and/or different graphic elements.
  • Graphic visualization 1500 caused to be displayed by visualization engine 1310 provides a technical advantage by dynamically updating the displayed graphic elements to focus on the most important anchors and risk events encoded in the enhanced reason code for the particular selected transaction. For example, this enables an analyst using the analyst computing device to quickly focus on the factors that were most relevant to the authentication analysis for each historical transaction.
  • Tire ability of graphic visualization 1500 to dymamically locus on the most relevant information from among a wide array of information regarding a transaction within a single-screen, easily comprehensible icon-based (and, in some embodiments, connector-based) gr aphic format is a technical improvement over conventional transaction-dispute analysis systems, which require the user to scroll through individual pieces of data and mentally re-construct the underlying factors represented by the data.
  • FIG. 16 is another example graphic visualization 1600 generated by visualization engine 1310 in communication with authentication platform 1314 and/or payment network 522.
  • the serv er application implementing x isuahzatiou engine 1310 piox ides API foneuonality available to be invoked via API calls from the client application executable on the analyst' computing device of any of issuer 514, merchant environment 1.304, acquirer 520, payment network 522, or another party to cause graphic visualization 1600 to be displayed on the client computing device.
  • the API architecture provides a technical advantage as discussed above with respect to FIG.
  • Grapliic visualization 1600 enables an analyst using the client application executing on the analyst computing device to investigate links between stored authentication data for a transaction of interest and stored authentication data for other transactions processed by authentication platform 1314. For example, the analyst may select a particular transaction that was confirmed (e,g,, via an investigation after a cardholder complaint) to be fraudulent after the authentication process was completed.
  • the user interface provided by graphic visualization 1600 provides a technical advantage by facilitating ah identification by the analyst of other transactions that may have been, fraudulent, and/or a deteimination by the analyst as to where and when the cardholder 's account infonnation was fraudulently obtained, i.e., as to a source of a breach of cardholder account information.
  • the client application sends an API call to invoke graphic visualization 1600 in response to the analyst selecthig a historical transaction (e.g., a historical transaction that was subsequently confirmed to be fraudulent; fbt link investigation.
  • a historical transaction e.g., a historical transaction that was subsequently confirmed to be fraudulent; fbt link investigation.
  • the analyst selects the transaction by selecting a control provided on graphic visualization 1400 or graphic visualization 1500 while the analyst is viewing the fransaction therein.
  • visualization engine 1310 causes graphic visualization 1600 to display, on the client computing device, a selected-transaction icon 1602 corresponding to the selected transaction .
  • graphic visualization 1600 also includes a list 1606 of selectable time intervals for the link analysis.
  • the client application When the analyst “clicks” or otherwise selects a time interval from, the list 1606, the client application generates an API call to visualization engine 1310; In response to the API call, visualization engine 1310 retrieves stored authentication data previously generated by RBA engine 1312 for transactions occurring within the selected time interval.
  • graphic visualization 1600 does not include time interval list 1606 and/or visualization engine 1310 automatically applies a default time interval for retrieving the data.
  • Visualization engine 131 b analyzes rhe rem eved data ro identify' ‘linked’' transactions, i.e., transactions in the applicable time interval that have values in one or more anchor fields that match the values in the corresponding anchor fields for the selected transaction.
  • graphic visualization 1600 includes a respective linked-transaction icon 1604 for each of the identified linked transactions .
  • graphic visualization 1600 includes the respective linked-transaction icon 1604 solely for a subset of the identified linked transactions.
  • visualization engine 1310 selects the subset to include the linked transactions having the most data fields in common with the selected transaction.
  • each transaction icon 1602, 1604 is accompanied by an icon labelled DTI/ ATA io illustrate that stored RBA result data is available for the transaction.
  • graphic visualization 1600 displays selected-tiansaction icon 1602 and liaked-tansactioB icons 1604 as nodes in a connected graph.
  • Tire connections or “edges” between each pan of nodes represent the number of common values in the anchor fields for the corresponding pair of transactions, aggregated with respect to each of the reason code categories.
  • the reason code categories are again cardholder (or payor), environment (or device), and merchant (or payee), and thus there are tip to three comiecti.ons displayed between each pair of nodes : payor connections 1610, environment connections 1612, and payee connections 1614.
  • graphic visualization 1600 includes any suitable number and/or types of connections. For example, a single type of connection may be used between each node to represent a total number of common values in anchor fields aggregated across all reason code categories.
  • the types of connections 1610, 1612 , and 1614 are distinguished visually, for example by using different colors, line types, and/or thicknesses for each type of edge 1610, 1612, and 1614.
  • Graphic visualization 1600 may include a legend or key 1620 to identify the distinguishing visual characteristics.
  • a numeric value, representing the number of common values in each category appears next to each coimection. Altefnativeiy . the number of common Values in the category corresponding to the coimection is indicated in another suitable fashion, such as by a thickness of the connection, or is not indicated. In the example embodiment, if there are zero common values between a pair of transactions in a given reason code category, the connection 1610, 1612, or 1614 for that category is not displayed between the corresponding pair of nodes.
  • graphic visualization 1600 includes selected-transaction icon 1602, also labelled as “TXT” (i.e., transaction 1) and two linked-tiaiisactioii icons 1604, also labelled as “1 X2” and “TX3” respectively.
  • Payor connection 1610 between TX 1 and TX2. is labelled with a “2,” indicating two common values in the anchor fields associated with the cardholder/payor reason code category.
  • Payor connection 1610 between TX2 and TX3 is also labelled with a “2,” indicating two common values in the anchor fields associated with the cardliolder/payor reason code category.
  • Payor coimection 1610 is not displayed between TXI and TX3.
  • enviroimient connection 1612 between TXI and TX3 is labelled with a “3,” indicating three common values in the anchor fields associated with the euvironmeut/device reason code category, and environment connection 1612 is not displayed between TXI and TX2 or between TX2 and TX3, indicating zero common values in the anchor fields associated with the environmeuhdevice reason code category.
  • payee connection lr 14 between TXI and 1X2 is labelled with a 'T , ' indicating one common valise- in the anchor fields associated with the merehaut/payee reason code category, and payee connection 1614 is not displayed between TXI and TX3 or between TX2 and TX3, indicating zero common values in tire anchor fields associated with the merchant/payee reason code category.
  • an analyst might conclude that the high number of commonalities in the environment category between TXI and TX3 suggests that TX3 was initiated by a Itandster using the same device/etivironmeat as the confirmed fraudulent transaction TX1.
  • GUI visualization 1600 to pack a wide array of information regarding multiple linked transactions into a single- screen, easily comprehensible connected graph format is a technical improvement over conventional transactiondispute analysis systems, which require the user to scroll through individual pieces of data and mentally re-constiact the underlying factors represented by the data.
  • FIG. 17 is another example graphic visualization 1700 generated by visualization engine 1310 in commumcatiou with authentication platform 1314 and/or payment network 522.
  • the server application implementing visualization engine 1310 provides API fimctionatity available t o be invoked via API calls from the client application executable on the analyst computing device of any of issuer 514, merchant environment 1304, acquirer 520, payment network 522, or another .party to cause graphic visualization 1700 to be displayed on the client computing device.
  • the API architecture provides a technical advantage as discussed above with respect to FIG. 15A.
  • Graphic visnahzation 1700 enables an analyst using the client application executing on the analyst computing device to investigate links between stored authentication data for transactions involving a payment account of interest and stored authentication data for other transactions processed by authentication platform 1314. For example, the analyst may select a particular payment account that was confnmed (e.g., via an investigation after a cardholder complaint) to be stolen.
  • foe user interface provided by graphic visualization 1700 provides a technical advantage by facilitating an identification by the analyst of other transactions that may have been fraudulent, and/or a determination by the analyst as to where and when tile payment account information was fiaodalently obtained, i.e., as to a source of a breach of cardholder account information.
  • other potentially fraudulent completed transactions may be identified, and/or future fraudulent transactions may be prevented from being authenticated and authorized.
  • the client application sends an API call to invoke graphic visualization 1700 in response to the analyst selecting a payment account (e.g., a payment account that has been confirmed as initiating fi’auduleni transactions) for link investigation.
  • a payment account e.g., a payment account that has been confirmed as initiating fi’auduleni transactions
  • the analyst selects the payment account by double-clicking or otherwise selecting P AN icon 1412 provided on graphic visualization 1400 or graphic visualization 1500 while the analyst is viewing a transaction therein, in response, visualization engine 1310 causes graphic Msuahzaram l ⁇ 00 to display on the chenr computing device, a selecred-accouiH icon 1702 corresponding to (lie selected payment account.
  • graphic visualization 1700 again includes list 1606 of selectable time intervals for the link analysis.
  • visualization engine 1310 retrieves stored authenticaifon data previously generated by RBA engine 1312 for transactions occiffimg within the selected time interval.
  • graphic visualization 1700 does not include time interval list 1606 and/or visualization engine 1310 automatically applies a default time interval for retrieving the data.
  • Visualization engine 1310 analyzes the retrieved data to identify “linked” transactions for the selected payment account, including transactions initiated by the selected payment account in the applicable time interval, as well as transactions in the applicable time interval tint t have values in one or more anchor fields that match the values in the corresponding anchor fields for the transactions initiated by the selected payment account.
  • graphic visualization 1700 displays, as a node in a connected graph, anchor- value icons 1704 conesponding to values that appear in the anchor fields of the linked transactions .
  • graphic vtisualization 1700 includes a respective anchor-value icon 1704 for each of the distinct values that appear in the anchor fields of the stored authentica tion data for the linked transactions.
  • graphic visualization 1700 includes the respective anchor- value icon 1704 solely for a subset of the identified distinct values. For example, visualization engine 1310 selects the subset to include the distinct values that appear across the greatest number of transactions.
  • connections 1710 or ‘"edges” between each pair of nodes represent the number of common transactions for the pair of nodes , i.e,, the number of transactions in which the values represented by the pair of nodes both appear in the stored authentication data for the transaction. Moreover, a nnmeric value, representing the number of common transactions between the two nodes, appears next to each connection 1710. Alternatively, the number o f c o mm on transactions corresponding to the connection 1710 is indicated in another suitable fashion, such as by a thickness of the connection 1710, or is not indicated. In the example embodiment, if there are zero common transactions between a pair of values , the connection 1710 is not displayed between the corresponding pair of nodes.
  • the connected graph embodied by graphic visualization 1700 may facilitate the analyst in tracing second- and third-order connections between selected-account icon 1702 and other anchor- value icons 1704, in order to quickly locate other values that may be compromised along with the payment account corresponding to selected-account icon 1702.
  • an anchor-value icon 1706 associated with another payment account is a second-order connection of selected- account icon 1702 via anchor- value icon 1708.
  • the number “2” displayed along comiection 1710 between selected-sccoimt icon 1702 and anchor- value icon 1708 indicates the selected payment account was used in two tinnsactimis involving anchor-value Icon 170S
  • the number “1” displayed along connection 1710 between anchor- value icon 1706 and anchor-value icon 1708 indicates the other payment account was also used in a transaction involving anchor-value icon 1708, which indicates that the other payment account may have been exposed in a common account breach with the selected payment account.
  • connections 1710 emanating from selected-account icon 1702 are visually highlighted relative to other connections 1710. For example, the highlighting of direct connections to selected-account icon
  • the anchor-value icons 1704 for anchors in different reason code categories are distinguished visually, for example by using different fill colors, border colors, and/or border line types for anchor-value icons 1704.
  • the reason code categories are again cardholder (or payor), environment (or device), and merchant (or payee), and anchor-value icons 1704 for anchors in die payor category are displayed with a red border, anchor-value icons 1704 for anchors in the environment category are displayed with a yellow border, and anchor-value icons 1704 for anchors in the payee category are displayed with a green border.
  • Graphic visualization 1700 may include a legend or key 1720 to identify the distinguishing visual characteristics. This additional information conveyed by graphic visualization 1700 may further aid the analyst in tracing sources and progress of fraudulent activity. Hie ability of graphic visualization 1700 to pack a wide array of information regarding multiple linked transactions into a single-screen, easily comprehensible connected graph format is a technical improvement over couvemional fransaction-dispute analysis systems, which require the user to scroll through individual pieces of data and mentally re-construct the underlying factors represented by the data.
  • a processor or a processing element may employ artificial intelligence Md/or be trained using supervised or unsupervised maclime learfiing
  • the machine learning program may employ a neural network, which may be a convolutional neural network, a deep learning neural network, or a combined learning module or program that learns in two or more fields or areas of interest.
  • Machine learning may involve identifying and recognizing patterns in existing data in order to facilitate making predictions for subsequent data. Models may be created based upon, example inputs in order to make valid and reliable predictions for novel inputs.
  • the machine learning programs may be trained by hrputting sample data sets or certain data into the programs, such as image data, text data, report data, and/or numerical analysis.
  • the machine learning programs may utilize deep learning algorithms that may be primarily focused on pattern recognition, and may be trained after processing multiple examples.
  • the machine learning programs may include Bayesian program learning (BPL), voice recognition and synthesis. Image or object recognition, optical character recognition, and/or natural language processing - either individually or in combination.
  • BPL Bayesian program learning
  • the machine learning programs may also include natural language processing, semantic analysis, automatic reasoning, and/or machine learning .
  • a processing element may be provided with example inputs and their associated otitputs, and may seek to discover a general rale that maps inputs to outputs, so that when subsequent novel inputs are provided the processing element may, based upon the discovered rule, accurately predict the correct output.
  • the processing element may be required to find its own structure in unlabeled example inputs.
  • machine learning techniques may be used to extract data about the computer device, the user of the computer device, the computer network hosting the computer device, services executing on the computer device, and/or other data. Based upon these analyses, the processing element may learn how to identify characteristics and patterns that may then be applied to training models, analyzing transaction and authentication data, arid detecting and analyzing risk.
  • non-transitoiy computer-readable media is intended to be representative of any tangible computer-based device implemented in any method or reclmufogy foi short-term and long-term storage of information, such as, computer-readable instructions, data structures, program modules and submodules. or other data in any device ⁇ Therefore, tire methods described herein may be encoded as executable instructions embodied in a tangible, nbn-transitory, computer readable medium, including, without Ihnitation, a storage device and/or a memoiy device.
  • riion-transitory computer-readable media includes all tangible, computer- readable media, including, without limitation, non-transitoiy computer storage devices, including, without limitation, volatile and nonvolatile media, and removable anduon-removable media such, as a firmware, physical and virtual storage, CD- ROMs, DVDs, and any other digital source such as a network or the Internet as well as yet to be developed digital means, with the sole exception being a transitory, propagating signal
  • This written description uses examples to disclose the disclosure, including the best mode, and also to enable auy person skilled in the art to practice the embodiments, inehiding making and using any devices or systems and performing any incorporated methods.

Abstract

A computer-implemented method for authenticating an online user includes steps including receiving, from a requestor server in communication with a merchant website, an authentication request message including authentication data collected 'from a user computing device during an online interaction with the merchant website. The steps also include extracting the authentication data from the authentication request message, and applying a risk-based authentication (RBA) engine to the authentication data to obtain RBA result data including a reason code that includes no more than three bytes of data... The steps further include causing the reason code to be embedded hi an authorization request message generated during the online interaction and routed to a decisioning server via a payment network. The authorization request message is formatted according to a set of proprietary communications standards promulgated by the payment network for exchange of data between institutions that are members of the payment network.

Description

SYSTEMS AND METHODS FOR AUTHENTICATING ONLINE
USERS AND PROVIDING GRAPHIC VISUALIZATIONS OF AN
AUTHENTICATION PROCESS
CROSS REFERENCE TO RELATED APPLICATION
This application claims the benefit of CIS.. Patent Application No.
17/567^015, which was filed on December 31, 2021, the entire contents of Which are hereby hieoiporated by reference for all purposes.
BACKGROUND The present application relates generally to authenticating online users over an electronic network, and more particularly, to. authenticating online users with an access control server using risk-based aritheiitication.
Transactions conducted over electronic payment networks are growing exponentially. For card-noLpraseat transactions (e.g., transactions in which the consumer does not actually provide a payment card to the merchant), fraud is markedly higher. Accordingly, for such transactions, authentication procedures are often implemented to verify that the alleged cardholder is, in fact, the actual or legitimate cardholder.
In at least some known authentication systems, the bank that issued the payment card for the transaction (referred to as the issuer) contracts with an access control server (ACS) for authentication services. Specifically, the ACS analyzes at least some of the data associated with the transaction, determines whether or not it is likely that the alleged cardholder is, in fact, the actual or legitimate cardholder, and reports that determination to the issuer. However, contracting with an ACS for authentication services may be relatively expensive for an issuer. Further, different issuers may contract with different ACSs. Accordingly, the amount of data that a particular ACS is able to leverage when performing authentication services may be fairly limited, as that ACS may only have access to a relatively small number of transactions. Further, at least some ACSs do not have the capability to perform more sophisticated (and thus more accurate) autiienticatioa procedures. In addition, ACSs that, are able io provide some level of fraud detection capability may temporarily lose such capability (e.g., due to equipment malfimction), directly impacting their ability to successMly authenticate online users.
Some authentication systems may also implement strong consumer authentication (SCA) (or just “strong anilieiiticatiou”) for certain traiisactious. For example, an issuing bank may insist on authenticating consumers during online tRuisactions (e.g,, witli a username and password, or by SMS text message). Such tools may help issuers verify identity and authenticate cardholders, but they may also increase fiiction with the cardholders, which sometimes leads to transactions being abandoned. This can result in losses to the merchant and to the tmderiying payment card network. Further, some SCA methods such as passwords may be less trtistworihy than others, which may lead to increased risk in transactions.
In some markets., regulators may require SCA on digital transactions. For example, the Reserve Bank of India (RBI), India’s central bank, requires that certain classes of digital transactions (e.g., those involving more than 2,000 Rupees) air authenticated using SCA. While these regulations have reduced hand in India, they create considerable friction during the check-out experience. C'ardliolders get frustrated with having to provide a password or being timed out of the transaction, and merchants are dissatisfied when cardholders abandon transactions due to their finstrations.
Accordingly, it is desirable to have a coinputer-impleinented authentication platform th at is capable of performing sophisticated authentication services on behalf of ACSs that are unable to do so.
BRIEF DESCRIPTION
In one aspect, a computer-implemented method for authenticating an online user is provided. Hie method is implemented using a computing system including at least one processor and a memory device. The method includes steps performed by the at least one processor including receiving, from a requestor server in caiiimunication with a merchant website, an authentication reques t message including authentication data collected from a user computing device during an online interaction with the merchant website. The steps also include extracimg the authentication data from the authentication request message, and applying a riskbased authentication (RBA) engine to the autlieuticatiou data to obtain RBA result data including a reason code. The reason code includes no more than three bytes of data. The steps further indude causing the reason code to be embedded in an authorization request message generated during die online interaction and routed to a decisioning server via a payment network. The authorization request message is formatted according to a set of proprietary conmiunications standards promulgated by the payment network for exchange of data between institutions that are members of the payment network.
In another aspect, a computing system for authenticating an online user is provided. The computing system includes at least one processor and a memory device. The at least one processor is programmed to perform steps including receiving, from a requestor server in communication with a merchant website, an an&enticatioH request message including authentication data collected from a user computing device during an online interaction with the merchant website. The steps also include extracting the authentication data from the. authentication request message, and applying a risk-based authentication (RBA). engine to the authentication data to obtain RBA result data including a reason code. The reason code includes no more than three bytes of data. The steps further include causing the reason code to be embedded in an authorization request message generated during the online interaction and routed to a decisioning server via a payment network. The authorization request message is formatted according to a set of proprietary communications standards promulgated by the payment network for exchange of data between institutions that are member's of the payment network.
In another aspect, at least one non-transitory computer-readable medium inchiding instructions stored thereon for authenticating an online user is provided. The instructions are executable by at least oile processor to cause the at least one processor to perform steps including receiving, from a requestor server in communication with a merchant website, an authentication request message including authentication data collected fr om a user computing device during an online interaction with the merchant website. The steps also include extracting the autlieutication data from the authentication request message, and applying a risk- based authentication (RBA) engine to the authentication data to obtain RBA result data including a reason code. The reason code includes no more than three bytes of data, The steps further include causing the reason code to be embedded in an authorization request message generated during the online interaction and routed to a decisioning server via a payment network. The authorization request message is formated according to a set of proprietary communications standards promulgated by the payment network for exchange of data between institutions that are members of the payment network.
BRIEF DESCRIPTION OF THE DRAWINGS FIGS. 1 - 17 show example embodiments of the methods and systems described herein.
FIG. 1 is a schematic diagram illustrating an example RB A platform in communication with a multi-party payment card system for processing payment transactions iu accordance with one embodiment of the present disclosure. FIG . 2 is an expanded block diagram of an example embodiment of a computer system used in processing pawent transactions that includes a server system in accordance with one example embodiment of the present disclosure.
FIG. 3 illustrates an exampleconfiguration of a server system such .as the server system shown in FIG. 2. FIG. 4 illustrates an example configuration of a client system shown in
FIG. 2.
FIG. 5 is a schematic diagram illustrating transaction flow m an example authentication system.
FIG. 6 is a schematic diagram illustrating transaction flow in snoilier example authentication system.
FIG. 7 is a flow diagram of au example method for authenticating a riser on behalf of an access control server (ACS).
FIG. 8 is a data flow diagram of another example method for authenticating an online user. FIG. 9 is a flow diagram of another example method for authenticating an online user.
FIG. 10 is a flow diagram of a further example method for authenticating an online user.
FIG. 1 I A is a swim-lane diagrams illustrating additional example embodiments involving conditional SC A evaluation on transactions associated with a regulated market.
FIGS. 11 B is a continuation of the swim-lane diagram shown in FIG.
11A. FIG. 12 is a flow diagram of a further example advanced autheiitication process for autheiiticatirrg; an online user and for increasing approvals, reducing fraud, and improving consumer experience.
FIG, 13 is a schematic diagram illustrating transaction flow in another example authentication system.
FIG. 14 is an example of a gr aphic visualization generated by a visualization engine in commmiication with the authentication system.
FIG. 15A is another example of a grapliic visualization generated by the visualization engine. FIG. 15B is another example of the graphic visualization shown in
FlG. 15 A.
FIG. 16 is another example of a graphic visualization generated by the visualization engine.
FIG. 17 is another example of a graphic visualization generated by the visualization engine.
Although specific features of various embodiments may be shown in some drawings and not in others, this is for convenience only. Any feature of any drawing may be referenced and/or claimed in combination with any feature of any other drawing.
DETAILED DESCRIPTION Hie systems and methods described herein are directed to authenticating an online riser on behalf of an access control server (ACS). A riskbased authentication enabled (RBA-enabled) directory server receives an authentication request message, the authentication request message includes authentication data. The RBA-enabled directory sei ver extracts the authentication data from the authentication request message, and transmits the extracted authentication data to an RBA engine. The RBA engine then generates, based at least in part on the extracted autlienticatiou data, RBA result data including a risk score, a risk analysis, and at least one reason code, and transmits the RB A result data to the RBA-enabled directory server. Tire RBA-enabled directory server embeds the RBA result data into the authentication request message to generate an enhanced authentication request message, and tiansmits the enhanced auilientication request message to the ACS to enable the ACS to make an authentication decision based on the RBA result data. As noted above, in at least some known authentication systems, a bank that issued a payment card for a transaction (referred to as the issuer) contracts with an ACS for authentication services. Specifically, the ACS analyzes at least some of the data associated with the transaction, determines whether or not it is likely that the alleged cardholder is, hi fact, the actual or legitimate cardholder, and reports that determination to the issuer, hi some markets, regulator’s may mandate strong consumer authentication on certain types of transactions, such as card-not-preseut (CNP) transactions. Such regulation is directed at reducing online fraud, but often at the expense of cus tomer and merchant satisfaction . For example, forcing customers to provide password or pin information or respond to a text message for 100% of transactions within feat market increases friction in online purchasing environments, leading to increased rates of abandonment due to the customers’ frustrations. However, in at least some known authentication systems, contracting with an ACS for authentication services may be relatively expensive for an issuer.
Further, different issuers .may contract with different ACSs. Accordingly, the amount of data that a particular ACS is able to leverage when performing authentication services may be fairly limited, as that ACS may only have access to a relatively small number of transactions . Further, at least some ACSs do not have the capability to perforin more sophisticated (and thus more accurate) authentication procedures. In addition, ACSs feat are able to provide some level of fraud detection capability may temporarily lose those capabilities te g._ due to equipment malfunction), direcdy impacting their ability to successfully authenticate online users. Further, at least some ACSs rely on their associated issuers for updated and accurate fraud information. Accordingly, those ACSs can only improve their fraud detection and authentication procedures if they receive fee necessary data from those issuers. Also, at least some ACSs do not have sufficient resources to develop more sophisticated authentication procedures, and accordingly, are unable to compete with more sophisticated entities. hr addition, some issuers only contract with an ACS for specific ranges of payment card numbers . Therefore, a specific payment card involved in a transaction might not be enrolled on the directory server wife a vendor authentication solution or issuer implemented authentication solution, such as an ACS. In some situations, the ACS may be unavailable for authentication processing. This may be due to network connectivity issues between the directory server and the ACS. The ACS may be shut down. The ACS may also be overloaded and unable to process authentications in a timely manner. In some embodiments, the ACS may not return a response from any request in a timely manner . In other embodiments, the ACS may return a response indicating that it was unable to authenticate the cardholder. This response may indicate that the cardholder is not enrolled with the ACS or that the ACS is unavailable.
Accordingly, to address these limitations of known authentication systems, the systems and methods described herein allow the authentication process to be perfonued whether or not an ACS is available and allow an ACS to realize the benefits of RB A procedures, even if the ACS lacks the capability to perform more sophisticated authentication procedures, such as RBA. Furthennore, the systems and methods described herein allow for reduced messaging traffic and processing load on the ACS by filtering the authentications to determine if the AC S is necessary to the authentication process.
In example embodiments described herein, the RBA-enabled directory server allows low-risk, low-value transactions to avoid SCA step-up challenges to the consumer, while forcing SCA for transactions above a particular transaction value (e.g., above 2,000 rupees), or for transactions that are above a particular risk threshold
(e.g., !imedinm” or ‘‘high” risk transactions).
More specifically, in an example embodiment, the RBA-enabled directory server allows regulators to set both a transaction value threshold and a risk threshold lor when SCA may be avoided. Some regulators may agree that, for certain low-risk, low-value transactions, the increased friction that SCA adds to the tiausaetion process may not be worth the marginal reduction in fraud in those situations. For example, the occmTence of fraud in low-value transactions may be relatively small and, with the value of those transactions being low, the amount of loss due to low-value transactions may also be relatively small. Further, if transactions can be evaluated for risk by a risk-based decision engine, those transactions with a low le vel of risk may represent only a small fraction of fraud, thereby further marginalizing their contribution to overall fraud. As such, regulators may configure the RBA-enabled directory server to avoid SCA when the transaction value is low ami when the risk that the transaction is fraudulent is determined to be low. In some embodiments, the RBA-enabled directory server provides a graphical user interface (GUI) to the regulators that provides an insight into fraud within their regulated market, and may allow the regulators to directly configure operational aspects of the RBA-enabled directory server, such as changing threshold values used in the conditional SCA process for their market. The GUI may allow the regulators to evaluate current performance of existing thresholds, displaying and comparing fraud data on transactions above or below the configured thresholds, such as the basis points of fraud lost during a particular period of time. The GUI may also allow regulators to evaluate potential threshold values, providing an estimate of fraud levels based on a set of prospective threshold values. As such, regulators may use such simulations to detennine how they may set or change threshold values for their market.
As described herein, RBA refers to performing authentication on transactions using a rich, comprehensive data set that is generally not available to an issuer or ACS. For example, as described herein, RB A may include performing authentication using the 3DS 2 Protocol (for example versions 2.0, 2.1. 2.2, arid subsequent versions of the 3 DS Protocol). The 3DS Protocols are owned and updated by EMVCo. Further, as described herein, RBA may be performed by an authentication platform that is operated by a payment processing network. Thus, for authentication purposes, the authentica tion platform is capable of leveraging large volumes of historical transaction data for all transactions previously processed by the payment processing network (as compared to the relatively small number of transactions processed by a particular ACS).
Specifically, in the systems and methods described hemin, the authentication system uses the 3 DS 2 Protocol (or subsequent versions of the 3DS Protocol) for authentication, and performs RBA and potentially authentication on behalf of ACS providers that am unable to perform RBA. An RBA-enabled directory server is communicatively coupled to a RBA engine (which may be collectively referred to as an aw&enticatioH platfoim). The RBA-enabled directory server and the RB A engine facilitate performing RB A behalf of ACS provider s, as described herein.
Tire RBA-enabled directory server and the RBA engine may be operated, for example, by an interchange network (e g., a payment processing network).
The RBA-enabled directory server receives an authentication request (AReq) message from a IDS server. However, instead of immediately forwarding the AReq message to an ACS, the RBA-enabled directory server transmits at least some of the data in the AReq message (e.g„ autlieuticatiou data) to the RBA engine. Alternatively, the RBA-enabled directory server may evaluate the transaction to determine with which inarket(s) the transaction is associated (e,g., based on merchant, merchant bank, issuing bank, consumer , and so forth) . If the transaction is associated with a regulated market that is configured for “conditional SCA1’ as described herein, then foe RBA-enabled directory server compares the transaction value wifo the configured transaction value threshold set by the regulators of the associated market. If the transaction value is below the transaction value threshold, then the RBA engine evaluates foe risk of the transaction using transaction data and other data available to the RBA-enabled directory server.
In some embodiments, the RBA-enabled directory server determines whether or not the ACS available by transmitting the authentication request message to the ACS. In these embodiments, the RBA-enabled directory server waits a predetermined period of time for a response from the ACS . The RB A-euabled directory server determines that the ACS is unavailable if no response is received from the ACS after the predetermined period of time. Alternatively, the RBA-enabled directory server may receive a response from the ACS that indicates (hat foe ACS is unable to perform authentication. The response from foe ACS may indicate that the online user is not enrolled with the ACS, that foe ACS is currently unavailable, or that the ACS was unable to authenticate the online user. In other embodiments, the RBA- enabled directory' server may transmit periodic status cheek messages to the ACS to determine whether or not the ACS is available.
In the example embodiment, foe RB A engine analyzes the data in the AReq message to generate RBA result data. For example, the RBA engine may compare the data in the AReq message to one or more long term variables (“LTV’’). The one or more LTV may include liistorical authentication data associated with the paynnent account number (PAN) at issue, historical authorization data associated with the PAN, other liistorical data associated wifo the PAN, etc. The LTV may be associated with both card present and card not present historical transactions. For example, the LTV may include cardholder shipping address, cardholder billing address, cardholder email address, cardholder phone number, merchant name, merchant category, merchant location, and/or at least one envirormient-related variable (e.g., device details, browser details) including device ID, IP address, device channel, etc. Further, the LTV may be stored in a database accessible by the RBA engine and operated by tlie interchange network. In some embodiments, the LTV data vvijl be hashed prior to storing to protect the security of this personally identifiable hifomiation, In addition, the data in the AReq message may also be compared to other parameters, For example, to monitor consistency mid changes in behavior, the data may be compared to short term variables (e.g., on the order of minutes, hours, or days), inchiding velocities and ratios of PAN authorization and authentication. This may include comparing to recent transaction frequency, amount spent, declines, historical risk scores, etc. Alternatively, the data in the AReq message may be analyzed using any suitable techniques to generate RB A result data, as described herein.
In the example embodiment, the RBA result data generated by the RBA engine includes a risk score, a risk analysis, and at least one reason code. The risk score is a score representing a determined riskiness of the transaction., with lower semes indicating lower risk and higher scores indicating higher risk. In oilier words, the risk score represents a likelihood that the suspect cardholder (e.g., the person attempting to perform a transaction) is the legitimate cardholder having the privileges to use the payment card to perform a payment transaction. For example, the risk score may be represented by a number from 0-999 and/or by a risk threshold category from 0-19. In certain embodiments, the risk score is represented between 0 and 950 in twenty increments of 50 (i.e., the potential risk scores are 0, 50, 100, 150, ..., 950). In some embodiments, risks assessments that will be shared, such as through the authorization field of one or mere messages will be quantified on a scale of 0-9. Tho se of skill in the art will appreciate that any sui table risk score may be used.
The risk analysis is a description of a level of risk coroespomlmg to the risk score (e.g., low risk, medium risk, or high risk). Further the reason codes include one or more factors that influenced the risk score. In some embodiments, the reason codes are generated using reason code categories and anchors, as described herein. In some embodiments, the reason codes are affected by nrf.es and/or a combination of the rules and the model. The RBA engine transmits the RBA result data to the RBA-enabled directory server.
Hie RBA-enabled directory server embeds the RBA result data info the AReq message to generate an enhanced or enriched AReq message. For example, in some embodiments, the RB A result data is appended to the AReq message as an extensible markup language (XML) extension of the AReq message . For example, the extension may have the following format:
Figure imgf000013_0001
where "seme" is the risk score, "decision" is the risk analysis, and "reasonCode 1" and "reasoii€ode2" are the reason codes. In the exemplary embodiment, the mason codes ate transmited as a single leter each. In other embodiments, the reason codes may be represented in different methods. In some embodiments, reasonCode2 is transmitted by the merchant to provide the merchant’s assessment of the transaction.
Additionally or alternatively, additional bytes may be used to inchide codes from an additional reviewing platform and/or a field signifier to identify the platform that provided the code in reasonCode I , reasonCode2, and/or another code field.
Alternatively, the RBA result data may be embedded into the AReq message to generate an enhanced or enriched AReq message using any suitable process.
The enhanced AReq message is then transmitted from the RBA- enabied directory server to the ACS. The ACS then analyzes the RBA result data in the enhanced AReq message to make an authentication decision. That is, in the example embodiment, the ACS may determine to folly authenticate the transaction, deny authentication for the transaction, or perform additional authentication (e.g., by issuing a step-up challenge to the cardholder) for the transaction, based on at least one of a risk score, the risk analysis, and the reason codes. Accordingly, the ACS does notperform the RBA analysis, but is still able to leverage the results of that analysis to make an authentication decision (e.g. , by using the results in their own fraud analysis platform), generally resulting in more approvals with less fraud. Thus, the RBA-enahled directory server and the RBA engine perform the RBA analysis on behalf of the ACS . In some embodiments, the ACS receives atitlientication data fi om a plurality of sources.
In an example embodiment, the authentication platform compares the RBA result data io a stored authentication profile. The autlientieatiou profile contains a plurality of rules for the processing of authentication repnests, hi some embodiments, the authentication profile is provided by an issuer computing device associated with an issuer bank. Examples of the rules include, but are not limited to. how to proceed when the ACS is unavailable, information to include in the RBA, risk level thresholds for the risk score and risk levels, decision making risk thresholds, and specialized rules (such as all cross-border transactions are to be submitted to the ACS). In some embodiments, the authentication profile may include regulator- imposed threshold values for risk categories or transaction threshold values for particular markets that define wlien SC A is mandated. The authentication profile is stored at the RBA platform, and can be accessed whenever a risk score is determined. bran example embodiment, the authentication piatibnn compares the RBA result data to the authentication profile to determine the risk level associated with the transaction associated with tire aniiientieatiofi request. In some embodiments, the authentication platform compares the nsk score to one or more thresholds in the authentication profile to determine the risk level associated with the transaction. In other embodiments, tire authentication platform compares the risk analysis, the reason codes, and/or any other combination of data from the RBA result data and potentially some or all of the authentication data to the authentication profile to determine the risk level associated with this transaction. For example, a risk score of 900 or less may be considered tow risk, a risk score between 900 and 980 may be considered medium risk, and a risk score above 980 may be considered high risk. Those skilled in the art will appreciate that any suitable risk score thresholds and any number of risk levels may be used. In. an example embodiment, the authentication platform determines it? the risk level is high risk, hi the example embodiment, in the ease of a high risk transaction, the authentication platform may not folly authenticate the transaction. The autlieiiticatiou platform may transmit an autlieatication response (ARes) message indicating the failed authentication to the 3 DS server. The 3DS server may transmit the Ar es message indicating the Med authentication to the merchant ami the merchant determines whether or not to proceed with the airthorization process in the absence of fell authentication. In these circumstances, the nierchaiit’s acquirer or the merchant may decide to forgo authentication and submit the transaction to authorization. If authorization is approved, liability remains with the merchant (i.e., the merchant assumes the risk for the transaction) since there is no successful authentication.
In oilier cases the authentication platfornr determines that the transaction is medium risk or low risk. If the transaction is low risk, the authentication platform may fully authenticate the transaction and transmit an authentication response (AR.es) message indicating the foil authentication io the 3 DS server, where at least one of the 3DS server and the merchant may initiate the authorization process. In some embodiments, if th e transaction is subject to a regulated market, the transaction may be authorized without SCA if the transaction is below the transaction value tluesliold for that market, or the transaction may be mandated to be subject to SCA if the transaction value is above the threshold for that market. If the transaction is medium risk, Hie antientication platform may issue a step-up challenge to the cardholder. If the transaction is subject to a regulated market, SCA may be mandated iu that market. Based on the results of the step-up challenge, the authentication platform may folly authenticate or fail to folly authenticate the transaction. In some embodiments, if the transaction is medium risk, the authentication platform transmits the RBA result data to the ACS, so that the ACS will perform the step-up challenge. In other embodiments, the authentication platform may take different steps at different risk levels and have additional or fewer risk levels to analyze based on the authentication profile.
In some embodiments, the authentication platform determines that the online user is not associated with the ACS based on the extracted authentication data. In these embodiments, the issuer associated with the online user has not registered with an ACS . In these embodiments, the authentication platform generates an authentication decision based on the RBA result data.
The 3DS 2 Protocol ( and subsequent versions of the 3 DS Pro tocol) provides a number of benefi ts to cardholders, issuers, and merchants. It reduces risk of unauthorized transactions through an approach that incorporates a rich, comprehensive set of data to make au thentication decisions. For cardholders, it provides a simple, secure, and familiar online authentication experience, regardless of payment channel or device. For issuers, it allows for “fiictionless” authentication, in which an explicit cardholder step-up authentication is not requir ed or performed. This enables more intelligent risk assessment decisions and the ability to selectively challenge the cardholder as needed. This also improves cardholder experience and overall cardholder lovaltv to issuers. For merchants, the 3DS 2 Protoco .l decreases fraud on all authenticated transactions, and increases revenue potential from reduced friction and reduced cart abandonment (i.e., cardholders deciding not to complete a transaction after they have already selected one or more items to be purchased), especially for mobile payment channels. This also improves cardholder experience and overall cardholder loyalty to merchants. The 3DS 2 Protocol and RBA may support additional payment channels, such as, but not limited to , card-on-trle, wallet, mobile, in-app, and Internet of Things (loT). Using 3DS 2 Protocol (or subsequent versions of the 3DS Protocol), payment networks see 100% of all authentication requests globally on all cards on their brands, bto other party, including issuers and ACS providers, is able to provide- this global visibility. Uris global visibility may be leveraged to provide a consistent, staudards-based risk analysis of transactions on behal f of issuers , enabling a market- wide risk-based authentication approach.
As compared to previous authentication methods (e.g., 3DS 1.0), the 3DS 2 Protocol (and subsequent versions of the 3DS Protocol) allows for approximately ten times the amount of transaction data to be gathered, analyzed, and utilized to prevent fraud. The additional data included in the 3DS Protocol increases data exchange between merchants and issuers, and improves risk-based authentication
(RBA) decisionmg. RBA allows issuers to examine every authentication request through transaction risk analysis, while focusing fraud prevention efforts on transactions that prevent the most risk. Further, RBA utilizes both behavioral and transactional inputs in conjunction with a risk engine to determine riskiness of a transaction. The RBA method of cardholder aitthemicatioii dynamically calculates a. risk assessment for any given e-conmierce transaction m real time. The assessment can then be used to authenticate the cardholder in a frictionless manner.
The RBA methodology includes tliree components that work together to provide authentication of cardholders. First, the underlying data model is used to provide a basis for tire authentication. The underlying data model may include 3DS data, which may include cardholder data, behavioral data, location data, merchant data, and device data. The underlying data model may also include interchange network data, such as, but not limited to, past risk scores, authentication approvals, authorization history, chargeback data, and fraud data.
The RBA methodology may use in tile underlying data model in one or more measurement methodologies. The measurement methodologies may include shortterm velocities and ratios, mchtding measuring behavior consistency and changes, such as frequency, amount spent, time, location, and device. The measurement methodologies may also include long term velocities and ratios, which include measurement of behavior and anomaly detection. The measurement methodologies may further include continuous measurement across the payment network.
The RBA methodology may then use the underlying data model and the measurement methodology in a rules engine. Tire rules engine may include thresholds for interpreting measurement results, rules for combining results of measurements, arid rules for combining other data with models and measurements.
Transactions deemed safe or low risk are silently authenticated (i.e., so-called “frictiouless” authentication), while higher risk transactions are subjected to step-up authentication. When a low risk transaction is silently authenticated, so much data has already been gathered that further authentication adds little to no value. Accordingly, RBA effectively replaces the need for an explicit interaction with the cardholder for every transaction, but transactions are still fully authenticated, with liability resting with the issuer. Thus, more transaetions are completed with minimal cardholder disruption, aiding e-commerce growth.
An example of a safe (or low-risk) tirmsaetioii may include, where the cardholder has a positive transaction history, is performing the transaction with a known device with a positive association with the cardholder, the cardholder is in a typical geolocation, the device is using a typical IP address, the ti'atlsaction fits within a typical behavimal and transaction pattern, and the shipping address has been used with the payment aecoimt number (PAM) and is the same as the last transaction. The cardholder buys a present to be delivered to his house. An example of a medium risk transaction may include, where the cardholder has a positive transaction history, is using an unknown device with no known association with the cardholder, the device is at a non-typical geolocation and IP address, but is typical behavioral, cardholder, and transaction pattern, I- or example, the cardholder is on travel and purchases Internet Access at a hotel. An example of a liigh risk transaction may iachide, where there are anomalous velocities detected with the cardholder in network, is using an unknown device with no faiown association with the cardholder, the device is at a noil-typical geolocation and IP address, and there is anomalous behavior patterns detected. The cardholder purchases over $600 of clothing in Texas right after the cardholder purchased lunch in St. Louis.
One goal of RBA is to nrimntize the number of transactions that require active (i.e,, step-up) authentication, while keeping fraud to a minimum and improving consumer friction points during the transaction process. The goal of RBA is to silently eliminate unnecessary friction on low risk transactions. In markets where authentication is widely used for a representative range of transactions, approximately 90% of transactions are deemed low risk and would then be authenticated without any action and would proceed to the Authorization process. This greatly decreases the amornit of processing and message traffic necessary to authenticate transactions. 5-8% of transactions would be considered medium risk arid the cardholder would be asked to authenticate themselves, such as through a step-up challenge. Then 1-2% of transactions would be deemed high risk and would fail authentication. With RBA, the mthrmation gathered enables transaction scoring and classification into low, medium, and high risk, allowing the issuer and ACS to take appropriate action.
The 3DS 2 Protocol (and subsequent versions of the 3DS Protocol) enables a market-wide level risk analysis of all traiisactions that reach directory server 510. Each transaction can be scored and/or flagged based on the global data available using the 3DS 2 Protocol (and subsequent versions of the 3DS Protocol), Additionally, the payment processor operating the directory server 51.0 has the ability to see cardholder activity across the digital and phy sical domains, and can utilize this expanded view to improve scaring. In contrast, traditional authentication service providers may only address the digital domain. For example, a payment processor could indicate if a particular device is associated with fraud, and flag that device for issuers in future transactions. The issuer may then reject transactions involving that device or prompt for additional authentication (e,g.? through two-factor authentication).
The following Table 1 lists a number of the data elements that are used in the 3 DS 2 Protocol for authentication- Far example, at least some of these data elements may be included in the authentication data included in the AReq sent to directory server 510. The eighteen data elements that are also part of the 3 DS 1.0 Protocol are bolded in Table I . Those of skill in the art will apprecia te that the number of rich data elements could grow beyond those listed below (e. g., in firture versions of the 3DS Ifrotocol), and could include over one hundred and seventy- data elements. Further, an app-based transaction (e.g., carried out using a. mobile: computing device) could provide even more data elements than browser-based transactions. In addition, a transaction performed using an Android device could have over one hunched and thirty' additional elements. The authentication data may also be divided by category, such as: transaction data (amount, currency, date, and time), device data (IP address, device info, and channel data), cardholder data (account number and shipping address), and merchant data (name, category, and country).
Figure imgf000019_0001
Figure imgf000020_0001
Figure imgf000021_0001
Figure imgf000022_0001
Figure imgf000023_0001
TABLE I
Ill the example embodiment, transactions are categorized ‘"merchant only” or “fully authenticated.” “Fully authenticated” transactions are generally considered to be low risk transactions that have been authenticated. " Merchant only” transactions are more risky transactions. In some embodiments, “mercliaui only” transactions have been authenticated. In the example embodiment, one or more indicators in the authentication response indicate whether a transaction is “merchant only” or “fully authenticated.” One or more indicators may also indicate whether or not authentication was attempted on the transaction. This information is used by the merchant to determine whether or not to begin the authorization process for the transaction. In some embodiments, this infonnation is also stored in a database and is referred to by at least one of the inferchange .network and the issuer processor dining the authorization process.
In some further embodiments, the authentication platform determines whether the authentication request message complies with the 3DS 2 Protocol or subsequent versions of the 3 DS Protocol . If the authentication request message does not. comply with the appropriate 3 DS Protocols, the authentication platform bypasses determining if the AC S is available. lit this situation, the authentication platform transmits an authentication response message indicating that the transaction is considered merchant only and that no aiitiienticatioii was attempted. In some embodiments, the authentication platform determines a risk level based on the RBA result data. If the risk level is low. the authentication platform embeds an indicator in the authentication response message indicating that the transaetion is “fully authenticated,” If the risk level is not low, die authentication platform embeds one or more indicators in the authentication response message indicating that the transaction is a merchant only transaction and that authentication was attempted.
In the example embodiment, the authentication platform performs the authentication process on the transaction, including RBA. This analysis is based on a machine learning model where over tune, rhe authentication platform is capable of improving its ability to determine tire risk level associated with transactions. The authentication platform analyzes transactions that are authenticated by the ACS and compares these transactions with historical data to generate a risk model for each issuer. Dv comparing the data points m each transaction, the risk model u ill indicate the amount of risk associated with each transaction based on the authentication data in the. corresponding authentication requests. This allows the authentication platform to analyze transactions when die ACS is unavailable and perfonn authentication on these transactions to provide a response to the authentication request. Accordingly, the authentication platform may determine that a received authorization request is substantially similar to a previous transaction that die ACS scored at low risk. Tims allowing the authentication platform to determine that the received transaction is low risk with a degree of certainty .
A technical effect of the sy stems and proces ses described herein is achieved by performing at least one of the following steps : (i) store, in a memory device, an authentication profile for at least one PAN of the plurality' of pans; (h) receive an authentication request message, the authentication request message including authentication data; (iii) extract, the authentication data, from the authentication .request message; (iv) compare the authentication data to at least one long term variable and. at least one short term variable, wherein the at least one long term variable includes historical authentication data and historical authorization data;
(v) generate, based at least in part on the extracted authentication data, risk-based authentication (RBA) result data including a risk score and at least one reason code that indicates at least one factor that influenced the generated risk score; (vi) route the RBA result data based on the authentication profile and the RBA result data; (vii) frausnnt the RBA result data to a source of the authentication request message; (yiii) determine whether an access control server (ACS) is available; (ix) if the ACS is available, (a) embed the RBA result data into the authentication request message to generate an enhanced authentication request message; and (b) transmit the enhanced auflieiiticatioii request message to the ACS to enable the ACS to make an authentication decision based on the RBA result data; (x) generate an authentication decision based on the RBA result data and the authentication profile if the ACS is unavailable; (xi) determine a risk level based on the RB A result da ta and the authentication profile ; (xii) if the risk level is low , transmit an authentication approval; (xiii) if the ri sk level is medium, (a) transmit a step-up challenge to the online user; (b) receive a response to the step-up challenge from the online user; and (cl determine an authentication decision based on the response to the step-up challenge and fire RBA result data; (xiv) if the risk level is medium, transmit the RBA result data to an access control server ( ACS) if the risk level is medium, wherein the ACS is configured to per form a step -up challenge; and (xv) if the risk level is high, transmit an authentication denied message if the risk level is high.
A technical effect of the systems and processes described herein is achieved by performing at least one of the following steps: (i) receiving, at a riskbased authentication enabled (RBA-enabled) directory server, an authentication request message, the authentication request message including authentication data: (ii) extracting, using the RBA-enabled directory server, the authentication data from the authentication request message; (iii) transmitting the extracted authentication data to an RBA engine; (iy) generating, using the RBA engine, based at least in part on the extracted authentication data, RBA result data including a risk score, a risk analysis, and at least one reason code; (v) transmiting the RBA result data to the RBA-euabied directoiy server; (vi) embedding, using the RBA-enabled directory server, the RBA result data into the anflieirticatioH request message to generate an enhanced authentication request message; and (vli) transmitting the enhanced authentication request message to the ACS to enable the ACS to slake an authentication decision based on the RBA result data.
Another technical problems addressed by this system includes: (i) high network load based at least in part on step-up challenging most or all card-not-present transactions winch results in network delays and reduced bandwidth; (ii) allowing fraudulent transactions to be successfitlly processed if there is no step-up challenge of a card-not-present transaction . ( IU > consumer inconvenience during caid-not-present transactions based at least in pan on having to answer an additional authentication challenge during a transaction; (iv) abandonment of transactions by consumers when faced with a step-ap challenge, thus leading to lost sales for merchants and lost processing fees for the other network parties based on those abandoned transactions; (v) unavailability of customizable fraud-related services to merdiants and/or merchant acquirers; (vrt met eased risk with merchant liability for fraudulent nausactions. (vui digital wallet-related fraud; (viii) issuers having limited access to some data that may be used to fraud-score transactions; (ix) reducing the network load by reducing network traffic to and from the ACS; (x) increasing the speed of the authentication process by reducing the number of steps required; (xi) reducing the processing load of the ACS by pre-filtering authentication requests to prevent redundant or unnecessary processing; (xii) improved transaction approval rates.
Yet another technical effect of the systems and processes described herein is achieved by performing at least one of the following steps: (i) receive an authentication request message for a transaction, the authentication request message including autlieutication data; (ii) extract the authentication data from die authentication request message; (iii) determine If the ACS is available to process the transaction; (iv) if the ACS is unavailable, the at least one processor programmed to: (a) generate, based at least in part on the extracted authentication data, risk-based authentication (UBA) result data including a risk score and at feast one reason code that indicates at least one factor that influeneed the generated risk score; (b) compare the authentication data to at least one long term variable and at feast one short term variable, wherein the at least one long term variable includes historical authentication data and historical authorization data; and (c) transmit an authentication response message based su the RBA. result data; (v) determine that the online user is not associated with the ACS based on the extracted anthenticaiion data; (vi) generate an authentication decision based on the RBA result data; (vii) determine a risk level based on the RBA result data; (viii) embed an indicator in the authentication response message indicating that the transaction is felly authenticated if the risk level is low;
(ix) embed one or more indicators in the authentication response message indicating that the transaction is a merchant only transaction and that authentication was attempted if the risk level is not low; (x) determine whether the authentication request message complies with the 3DS 2 Protocol or subsequent versions of the 3 DS Protocol; mid (xi) bypass determining if the ACS is available if the authentication request message does not comply.
In some embodiments, the authentication platform determines that the online user is not associated with foe ACS based on the extracted authenticatfon data. In these embodiments, the issuer associated with the online user has not registered with an ACS . In these embodiments, the authentication platfbnn generates an authentication decision based on the RBA result data.
As will be appreciated, based on the description herein the technical improvement in the authentication system as described herein is a computer-based solution to a technical deficiency or problem that is itself rooted in computer technology (e.g., the problem itself derives itom the use of computer technology). More specifically, fraud is significant problem for transactions conducted over an electronic payment network, especially for card-not-present transactions. Advanced fiand detection methodologies (e.g.. RBA) exist, but at least some ACSs are unable to execute those methodologies and furthermore eomniunication with ACSs increases network traffic and processing load, and in addition the ACS may be unavailable. Accordingly. to address this problem, the systems and methods described herein address this technical problem by using an RBA-enabled directory server and RBA engine to perform RBA and filter the results to determine which authentications need to be forwarded to an ACS and to forward the results of the RBA to the ACS to enable the ACS to make an authentication decision.
The following detailed description of the embodiments of foe disclosure refers to the accompanying drawings. The same reference numbers in different drawings may identify the same or similar elements. Also., the following detailed description does not limit the claims. Described herein are computer systems such as authentication computer systems. As described herein, all such computer systems include a processor and a memory However, any processor in. a computet device referred to herein may also refer to one or more processors wherein the processor may be in one computing device or a plurality of computing devices acting in parallel. Additionally, any memory in a computer device referred to herein may also refer to one or more memories wherein the memories may be in one computing device or a plurality of computing devices acting in parallel.
As used herein, a processor may include any programmable system inchiding systems using niicro-eonbxillers, reduced instruction set circuits (RISC), application specific integrated circuits (ASICs), logic circuits, and any other circuit or processor capable of executing the functions described herein . The above examples are example only, and are thus not intended to limit in any way die definition and/or meaning of the term “processor.” As used herein, the term ‘‘database” may refer to either a body of data, a relational database management system t RDBMS), or to both. As used herein, a database may include any collection of data including hierarchical databases, relational databases, flat file databases, object-relational databases, object oriented databases, and any other structured collection of records or data that is stored in a computer system. The above examples are example only, and thus are not intended to limit in any way the definition and/or meaning of the term database. Examples of RDBMS’s include, but are not limited to including, Oracle® Database, MySQL, IBM® DB2, Microsoft® SQL Server, Sybase®, and PostgieSQL. However, any database may be used that enables the systems and methods described herein. (Oracle is a registered trademark of Oracle Corporation, Redwood Shores, California; IBM is a registered trademark of International Business Machines Corporation, Armonk, New York; Microsoft is a registered trademark of Microsoft Corporation, Redmond, Washington' and Sybase is a registered trademark of Sybase, Dublin, California.) hi one embodiment, a computer program is provided, and the program is embodied on a computer readable medium. Ih an example embodiment, the system is executed on a single computer system, without requiring a connection to a sever computer, hi a further embodiment, the system is being nm in a Windows® environment (Windows is a registered trndemark of Microsoft Corporation, Redmond, Washington). In yet another embodiment, the system is run on a mainframe environment and a UNIX® server environment (UNIX is a registered trademark of X/Open Company Limited located in Reading, Berkshire, United Kingdom). In a flirtlrer embodiment, the system is run on an iOS® environment (iOS is a registered trademark of Cisco Systems, Inc. located in San Jose, CA). In yet a further embodiment, the system is ran on. a Mac OS® environment (Mae OS is a registered trademark of Apple Ine. located in Cupertino, CA). In still yet a foither embodiment, the system is nin on Android® OS (Android is a registered trademark of Google, Inc. of Mountain View, CA). In another embodiment, lire sy stem is ran on Linux® OS (Linux is a registered trademark of Linas Torvalds of Boston, MA). The application is flexible and designed to ran in various different environments without compromising any major functionality . In some embodiments, tile system includes multiple components distributed among a plurality of computing devices. One or more components may be in tiie form of computer-executable instructions embodied In a computer-readable medium. As used herein, an element or step recited in the singular and proceeded with the word “a” or “an” should be understood as not excluding plural elements or steps, unless such exclusion is explicitly recited. Furthermore, references to “example embodiment” or “one embodiment” of the present disclosure are not intended to be interpreted as excluding the existence of additional embodiments that also incorporate the recited features. As used herein, the terms “software” and “firmware” are interchangeable, and include any computer program stored in memory for execution by a processor, including RAM memory, ROM memory, EPROM memory, EEPROM memory, and non-volatile RAM (NVRAM) memory. The above memory 'Wes are example only, and are thus not limiting as to the types of memory usable for storage of a computer program.
As used herein, the terms “paymetit device,” “‘transaction card,” “financial transaction card,” and “payment card” refer to any suitable transaction card, such as a credit card, a debit card, a prepaid card, a charge card, a membership card, a promotional card, a frequent flyer card, an identification card, a prepaid card, a gift card, and/or any other device that may hold payment account information, such as mobile phones, Smartphones, personal digital, assistants (PD As), wearable computing devices, key fobs, and/or any other computing devices capable of providing account information. Moreover, these terms may refer to payments made directly from or iising bank accounts, stored valued accounts, mobile, wallets, etc. , and accordingly are not limited to physical devices but rather refer generally to payment credentials. Each type of payment device can be used as a method of payment for performing a transaction, hi addition, consumer card account behavior can include but is not limited to purchases, management activities (e.g., balance checking), bill payments, achievement of targets (meeting account balance goals, paying bills on time), and/or product registrations (e.g., mobile application downloads).
The systems and processes are not limited to the specific embodiments described herein, hi addition, components of each system and each process can be practiced independent and separate from other components and processes described herein. Each component and process also can be used in combination with other assembly packages and processes.
The following detailed description illustrates embodiments of tire diwloxme bs na\ ut example and not bx nax of limitation It is contemplated dial the disclosure has general application to authenticating users for transactions conducted over an electronic payment, network.
FIG. 1 is a schematic diagram illustrating an example RBA platform
34 in eormminication with a multi-party payment card system 20 for processing payment transactions in accordance with one embodiment of the present disclosure. FIG. 1 depicts a flow of data in a financial transaction through system 20.
Embodiments described herein may relate to a transaction card system, such as a credit card payment system using 'the MASTERCARD® interchange network. The MASTERCARD® interchange network is a set of proprietary communications standards promulgated by Mastercard International Incoiporated® for the exchange of financial transaction data and the settlement of fiinds between financial institutions that are members of Mastercard Intemaiional Incorporated®. (MASTERCARD® is a registered tr ademark of Mastercard International Incorporated located in Purchase, New York),
In the exemplary transaction card system, a financial institution called the “issuer” issues a transaction card, such as a credit card, to a consumer or cardholder 22, who uses the transaction card to tender payment for a purchase from a merchant 24. Cardholder 22 may purchase goods and services ‘products”) at merchant 24. Cardholder 22 may make such purchases using virtual forms of the tiansaetfon card and, more specifically, by providing data related to the transaction card (e.g., the transaction card number, expiration date, associated postal code, and security code) to initiate transactions. To accept payment with the tiansaction card or virtual forms of the transaction card, merchant 24 must normally establish an account with a financial institution that is part of the financial payment system. This financial institution is usually called the “merchant bank,” the “acquiring bank,” or the
‘‘acquirer?’ When cardholder 22 tenders payment for a purchase with a transaction card or virtual transaction card, merchant 24 requests authentication of the cardholder 22 and authorization from a merchant bank 26 for the amount of the purchase. The request may be performed over the telephone or electronically, but is usually performed through the use of a point-of-sale terminal, which reads cardholder’s 22 account information from a magnetic stripe, a chip, or embossed characters on the transaction card and communicates Electronically with the transaction processing computers of merchant bank 26. Merchant 24 receives cardholder’s 22 account information as provided by cardholder 22, Alternatively, merchant bank 26 may authorize a third party to perform transaction processing on its behalf. In tills case, the point-of-sale terminal will be configured to communicate with the third party. Such a third party is usually called a “merchant processor?’ an “acquiring processor,” or a “third party processor.”
Using an in terchange network 28, computer's of merchant bank 26 or merchant processor will communicate with computers of an issuer bank 30 to determine whether the alleged cardholder is actually legitimate cardholder 22 (i.e., authentication), Whether cardholder’s 22 account 32 is in good standing, and whether the purchase is covered by cardholder’s 22 available credit line. Based on these determinations, the requests for authentication and authorization will be declined or accepted. Authentication may be performed prior to authorization. If the requests are accepted, an authorization code is issued to merchant 24. hi tlie exemplary embodiment, the payment card system 20 includes or is in commumcation with a risk-based authentication (RBA) server 34. In this embodiment, the RBA platfoim 34 provides enhanced meta-data collection to capture information, including meta-data hum the payment transactions processed by the payment card system 20, The RBA platform 34 steres this meta-data to use to provide as Ihstorical data when performing an authentication process prior to performing an authorization process, hr the exemplary embodiment, the RBA platform 34 may receive historical data from one or more of the acquirer bank 26, the interchange network 28, and the issuer bank 30. Examples of this data include one or more long tenn variables (“LTV”), The one or more LTV may include historical authorization data associated with a plurality of PANs, other historical data associated with the plurality of PANs, etc. The LTV may be associated with both card present and card not present historical transactions. For example, the LTV may include cardholder shipping address, cardholder billing address, cardholder email address, cardholder phone mrniber, merchant name, merchant category, merchant location, and/or ai least one euvironmem-related variable (e.g., device details, browser details) htcluding device ID, IP address, device channel, etc. Further, the LTV may be stored in a database accessible by RBA platform 34 and operated by an interchange network 28. hr some embodiments, the LTV data will be hashed prior to storing to protect the security of this personally identifiable information.
When a request for authorization is accepted, the available credit line of cardholder’s 22 account 32 is decreased. Normally, a charge for a pawent card transaction is not posted immediately to cardholder’s 22 account 32 because bankcard associations, such as Mastercard International Incorporated®, have .promulgated rules that do not allow merchant 24 to charge, or “capture,” a transaction until products are shipped or services are delivered. However, with respect to at least some debit card transactions, a charge may be posted at the time of the transaction. When merchant 24 ships or delivers the products or services, merchant 24 captures the transaction by, for example, appropriate data entry procedures on the point-of-sale terminal. This may include bundling of approved transactions daily for standard retail purchases. If cardholder 22 cancels a transaction before it. is captured, a “void” is generated. If cardholder 22 returns products after the transaction lias been captured, a “credit” is generated. Interchange network 28 and-' or issuer bank 30 stems the transaction card hifoimation, such as a type of merchant, amount of purchase, date of purchase, in a database 120 (shown in FIG. 2).
After a purchase has been made, a clearing process occurs to transfer additional transaction data related to the purchase among the parties to the transaction, such as merchant bank 26, interchange network 28, and issuer bank 30. More specifically, during and/or after the clearing process, additional data, such as a . time of purchase, a merchant name, a ripe of merchant, purchase information, cardholder account information, a type of transaction, information regarding the purcltased item and/or service, and/or other suitable information, is associated with a transaction and transmitted between. parties to the transaction as transaction data, and may be stored by any of the parties to the transaction. After a transaction is authorized and cleared, the tramaction is settled among merchant 24, merchant bank 26, and issuer bank 30. Setlement refers to the transfer of financial data or fimds among merchant’s 24 account, merchant bank 26, and issuer bank: 30 related to the transaction. Usually, transactions are captured and accumulated into a ‘"batch?’ which is settled as a group. More specifically, a transaction may be settled between issuer bank 30 and interchange network 28, and then between interchange network 28 and merchant bank 26, and then between merchant bank 26 and merchant 24. As described below in more detail, risk-based authentication (RE A) may be performed by the RBA platform 34 on behalf of an access control server (ACS) or issuer bank 30 in the context of multi-party payment card system 20, Although the systems described herein are not intended to be limited to facilitate such applications, the systems are described as such for example purposes, FIG. 2 is an expanded block diagram of an example embodiment of a computer system 100 used in authenticating payment transactions. In the exemplary embodiment, system 100 may be used for authenticating payment transactions either in concert with an ACS or in place of the ACS.
In the exemplary' embodiment, cardholder computing devices 102 are computers that include a web browser or a software application, which enables cardholder computing devices 102 to access remote computer devices, such as merchant website 104, using the Internet or other network. More specifically, cardholder computing devices 102 may be communicatively coupled to the Internet through many interfaces including, but not limited to, at least one of a network, such as the Internet, a local, area: network. (LAN), a wide area network (WAN), or an integrated services digital network (ISDN), a dial-up-coisnection, a digital subscriber line (DSL), a cellular phone connection, and a cable modem. Cardholder computing devices 102 may be any device capable of accessing the Internet including, but not limited to, a desktop computer, a laptop computer, a personal digital assistant (FDA), a cellular phone, a smartphone, a tablet, a phablet, wearable electronics, smart watch, or other web-based connectable equipment or mobile devices, hi the exemplary embodiment, cardholder computing devices 102 are associated with individual cardholders 22 (shown in FIG. 1). In the exemplaiy embodiment, merchant website 104 is an online shopping website that is reaehable through computers that include a web browser or a software application, such as cardholder computing devices 102, using the Internet or other network. More specifically, merchant website 104 may be hosted OH one or more computers that are commitnieatively coupled to the Internet through many interfaces including, but not limited to, at least one of a network, such as the Internet, a local area network (LAN), a wide area network (WAN), or an integrated services digital network (ISDN), a dial-iip-connection, a digital subscriber line (DSL), a cellular phone connection, and a cable modem. Computing devices hosting merchant website 104 may be any device capable of accessing the Internet including, but not limited to, a desktop computer, a laptop computer, a personal digital assistant (PDA), a cellular phone, a smartphone, a tablet, a phablet, wearable electronics, smart watch, or other web-based connectable equipment or mobile devices, hi the exemplary embodiment, merchant website 104 is associated with merchant 24 (shown in FIG. 1). In the exemplary embodiment, merchant website 104 allows cardholder 22 to purchase goods and/or sendees using cardholder computing device 102. In some embodiments, payment transactions performed through merchant website 104 are considered card not present transactions.
In the exemplary embodiment, data gathering computer devices 106 ate computers first include a web browser or a software application, which enables data gathering computer devices 106 to access remote computer devices, such as merchant website 104 and authentication server 112, using the Internet or other network, More specifically, data gathering computing devices 106 may be communicatively coupled to Hie Internet through many interfaces including, but not limited to, at least one of a network, such as the Internet, a local area network (LAN), a wide area network (WAN), or an integrated services digital network (ISDN), a dialup-connection, a digital subscriber line (DSL), a cellular phone connection, and a cable modem. Data gathering computer devices 106 may be any device capable of accessing the internet including, but not limited to, a desktop computer; a laptop computer, a personal digital assistant i PDA), a cellular phone, a smartphone, a tablet, a phablet, wearable electronics, smart watch, or other web-based coimectabie equipment or mobile devices. In some embodiments, the data gathering computer devices 106 are associated with a 3DS server or service, fir other embodiments, data gathering computer devices 106 are associated with acquirer bank 26 (shown in FIG. 1).
In the exemplary embodiments, authentication server 112 is in communication with a plurality of data: gathering computer devices 106 and one or more access control servers (ACS) 108. In some embodiments, authentication server 112 is similar io RBA platform 34 (shown in FIG. 1). In the exemplary embodiment, authentication server 112 receives data from data gathering computer device 106 and uses that data to perform authentication of payment transactions. hi some embodiments, authentication server 112 performs authentication with ACS IOS, In oilier embodiments, authentication server 112 replaces the ACS 108 in the autlieiuication process. In the exemplary embodiment, authentication server 112 is associated with the interchange network 28 (shown in FIG. I). Ip other embodiments, tiie autlientication server 112 is merely in communication with tire interchange network. 28 In the exemplary embodiment, issuer computing devices 110 are computers that include a web browser dr a software application, which enables issuer computing devices 110 to access remote computer devices, such as ACS 108 and authentication server 112, using the Internet or other network. More specifically, issuer computing devices 110 may be cornnmnicatively coupled to the Internet through many interfaces including, but not limited to, at least one of a network, such as the Internet, a local area network (LAN), a wide area network (WAN), or an integrated services digital network (ISDN), a dial-up-coimection, a digital subscriber line (DSL), a cellular phone connection, and a cable modem. Issuer computing de vices 110 may be any device capable of accessing the Internet including, but not limited to, a desktop computer, a laptop computer, a personal digital assistant (PDA), a cellular phone, a smartphone, a tablet, a phablet. Wearable electronics, smart wateh, or other web-based connectable equipment or mobile devices. In the exemplary embodiment, issuer computing devices 110 are associated with the issuer bank 30 (shown in FIG. 1). A database server 116 is connected to database 120. In one embodiment, centralized database 120 is stored on server system 112 and can be accessed by potential users at one of client systems (not shown) by logging onto au thentication server 112 tiuough one of client systems. In an alternative embodiment, database 120 is stored remotely from authentication server 112 and may be lion-centralized, Database 120 may be a database configured to store information used by aiithenticatiou server 112 mcluding, for example, historical payment transaction records.
Database 120 may include a single database having separated sections dr partitions, or may include multiple databases, each being separate from each other. Database 120 may store transaction data generated over the processing network including data relating to merchants, consumers, account holders, prospective customers, issuers, acquirers, and/or purchases made. Database 120 may also store account data including at least one of a cardholder name, a cardholder address, an account number, other account identifiers, and transaction iiifoimation. Database 120 may also store merchant information including a merchant identifier that identifies each memhant registered to use the nenxoik, and instructions tor settling trail sinuous including merchant bank account information. Database 120 may also store purchase data associated with items being purchased by a cardholder fr om a merchant, and authentieatioH and. authorization request data. Database 120 may store one or more authentication profiles, where each authentication profile includes one or more authentication rules , one or more risk level thresholds, and one or more routing rules based on the risk level thresholds.
FIG. 3 illustrates an example configuration of a server system 301 such as RBA platform 34 (shown in FIG. i), in accordance with one example embodiment of the present disclosure, Server system 301 may also include, but is not limited to, merchant website 104, data gathering computer device 106, ACS 108, issuer computing device 110, authentication server 112, and database server 116 (all shown in FIG. 2). In the example embodiment, server system 301 determines and analyzes characteristics of devices used in payment transactions, as described below.
Server system 301 includes a processor 305 for executing mstmctions. Instructions may be stored in a memory area 310, for example. Processor 305 may include one or more processing units (e.g., in a multi-core configuration) for executing instructions. The instructions may be executed withm a variety’ of different operating systems on the server system 301, such as UNIX, LINUX, Microsoft Windows®, etc. It should also be appreciated that upon initiation of a computer- based method, various instructions may be executed during initialization . Some operations may be required in order to perform one or more processes described herein, while other operations may be more general and/or specific to a particular programnung language (e.g,, C, C#, C++, Java, or other • suitable prograniming languages, etc,).
Processor 305 is operatively coupled to a communication interface 315 such that server system 301 is capable of coimnunicating with a ternate device such as a user system or another server system.301. For example, commumcation interface 315 may receive requests from a client system (not shown) via the Internet. as illustrated in FIG, 2.
Processor 305 may also be operatively coupled to a storage device 334.
Storage device 334 is any computer-operated hardware suitable for storing and/or retrieving data. In some embodiments, storage device 334 is integrated in server system 301. For example, server system 301 may include one or more hard disk drives as storage device 334. hi other embodiments, storage device 334 is external to server system 301 and may be accessed by a plurality of server systems 301. For example, storage device 334 may include multiple storage units such as hard disks or solid state disks in a redundant array of inexpensive disks (RAID) configuration.
Storage device 334 may include a storage area network (SAN) and/or a network attached storage (NAS) system. hi some embodiments, processor 305 is operatively coupled to storage device 334 via a storage interface 320. Storage interface 320 is any component capable of providing processor 305 with access to storage device 334. Storage interface 320 may include, for example, an Advanced Technology Atachment (ATA) adapter, a Serial ATA (SATA) adapter, a Small Computer System Interface (SCSI) adapter, a RAID controller, a SAN adapter, a network adapter, and/or any component providing processor 305 with access to storage device 334.
Memory area 310 may include, but are not limited to, random, access memory (RAM) such as dynamic RAM (DRAM) or static RAM (SRAM), read-only memory (ROM), erasable programmable read-only memory (EPROM), electrically erasable programmable read-only memory (EEPROM), and non-volatile RAM (NVRAM). The above memaiy types are examples only, and are thus not limiting as to the types of memory usable for storage of a computer program .
FIG. 4 illustrates an example configuration of a client computing device 402, Client computing device 402 may include, but is not limited to, cardholder computing device 102 (shown in FIG, 1). Client computing device 402 includes a. processor 404 for executing instructions. In some embodiments, executable instructions are stored in a memory area 406. Processor 404 may include one or more processing units (e.g., in a multi-core conflguiation). Memory area 406 is any device allowing information such as executable instructions and/or other data to be stored and retrieved. Memory area 406 may include one or more eomputer- wadable media.
Client computing device 402 also includes at least one media output component 408 for presenting information to a user 400. Media output component 408 is any component capable of converting information to user 400. In some embodiments, media output component 408 includes an output adapter such as a video adapter and/or an audio adapter. An output adapter is operatively coupled to processor 404 and operatively couplable to an output device such as a display device (e.g.. a liquid crystal display (LCD), organic light emitting diode (QLED) display, cathode ray tube (CRT), or “electronic ink'’ display) or an audio output device (e.g., a speaker or headphones). In some embodiments, client computing device 402 includes an input device 410 for receiving input from user 400. Input device 410 may include, for example, a keyboard, a pointing device, a mouse, a stylus, a touch sensitive panel (e.g., a touch pad or a touch screen), a camera, a gyroscope, an accelerometer, a position detector, and/or an audio input device. A. single component such as a touch screen may fimction as both an output device of media output component 408 and input device 410.
Client computing device 402 may also include a commimieatiou interface 412, which is communicatively couplable to a remote device such as server system 301 or a web server operated by a merchant. Communication interface 412 may include, for example, a wired or wireless network adapter or a wireless data transceiver for use with a mobile phone network (e,g., Global System for Mobile: commuihcaiions (GSM), 3G, 4G or Bluetooth) or other mobile data network (e,g.. Worldwide Interoperability for Microwave Access (WIMAX)).
FIG. 5 is a schematic diagram illustrating transaction flow m an example authentication system 500 that uses the 3DS 2 Protocol (or subsequent versions of the 3DS Protocol) for authentication. Information regarding the 3DS Protocol, including the current version of the protocol, can be found at https://www.emvco.com. System 500 includes a directory server 510 that facilitates authenticating a cardholder for a transacfion, as described herein. Directory server 510 may be operated, for example, by interchange network 28 (shown in FIG. I),
A cardholder (e.g, cardholder 22, shown in FIG. 1) initiates- a transaction (e.g., an online transaction) on a cardholder computing device 102 (shown in FIG. 2), such as, for example, a mobile computing device. During initiation of the transaction, the cardholder provides authentication data that will ultimately be used to authenticate the cardholder. In the exemplary embodiment, this authentication data includes form data that the cardholder fills in to make the purchase and scraped data, Which is data about the cardholder, such as device details and browser details including device ID, IP address, device channel, etc.
The authentication data is transmitted from tire cardholder- computing device 102 to a 3DS client 502 within a 3DS requestor environment 504. The 3DS client 502 may be operated by a merchant (e.g., merchant 24, shown in FIG. 1). In some embodiments, 3 DS client 502 is a part of merchant website 104 (shown in FIG. 2). 3DS client 502 collects, from the cardholder computing device 102. information necessary to authenticate the cardholder using the 3DS 2 Protocol, including the authentication data.
The 3 DS client 502 collects information (including the authentication data) and transmits the collected information to a 3DS Server 506 for inclusion in an aufheiriication request message, also referred to herein as an AReq message. 3DS client 502 is also part of the 3DS requestor environment 504. 3DS client 502 and 3DS server 506 may eormnunicate with one another, for example, using application programming interfaces (APIs) or browser interactions. In some embodiments, the 3DS server 506 is similar to data gathering computer device 106 (shown in FIG. 2). Using the autlienrication data provided by the cardholder and other data collected within 3DS requestor enwomient 504, the 3DS server 506 generates the AReq message and transmits the AReq message to directory server 510, based on the payinent processor associated with the transaction card being used in the transaction. hi some embqdbiieuts, the directory server 510 is similar to the authentication server 112 (shown in FIG. .2). That is, different payment processors will generally have different directoiy servers for processing transact ions. When generating the AReq message, 3DS server 506 formats the data for secwity purposes. In this embodiment, directory server 510 forwards the .AReq message to an appropriate access control server (ACS) 512 , based on the issuer of the payment card, hi some embodiments, ACS 512 is similar to ACS 108 (shown in FIG. 2)
ACS 512 determines, based on the AReq message, whether authentication is required. Further, ACS 512 facilitates ensuring that any required authentication is properly carried out. ACS 512 performs these authentication operations on behalf of an issuer operating an issuer compiiting device 514.
In response to the AReq message, ACS 512 returns an authentication response (ARes) message to directory -server 510, which directory server 510 in turn forwards to 3 DS server 506. Before returning the ARes message, ACS 512 evaluates the data in the AReq message and performs risk-based authenncanon (RBA) on the transaction. Specifically, when ACS 512 determines that an explicit cardholder step- up authentication is not required (i.e.., when the transaction is determined to be low risk), ACS 512 determines authentication is complete and returns an ARes indicating the same. If, however, ACS 512 determines that cardholder step-up authentication is required, ACS 512 initiates a step-up challenge request. Hie results of the step-np challenge requests are transmitted (in the ARes message), to 3 DS server 506 (via directory sewer 510), and ultimately to the cardholder. If step-up authentication is required, ACS 512 controls the step-up authentication in accordance with methods used for cardholders of the issuer (e,g., biometric authentication, one time password (OTP) authentication, short message service (SMS) authentication, etc.). A 3 DS requestor 516 included in 3DS requestor environment 504 controls how the various components interact with one another in the example embodiment.
After the authentication process is complete (i.e., after the 3DS Protocol is finished), if the cardholder is successfully authenticated, payment authorization for the transaction is undertaken. That is, the authentication using the 3DS 2 Protocol (or subsequent versions of the 3DS Protocol) occurs before payment authorization for the transaction.
For payment authorization, the merchant (e g., using 3DS server 506) exchanges authorization data with an acquirer computing device 520 operated by an acquirer, such as merchant bank 26 (shown in FIG. 1 ) and a payment network 522, such as interchange network 28 (shown in FIG. 1), If appropriate, the merchant, acquirer, or payment network may submit an authorization request including information that indicates authentication occurred. Acquirer computing device 520 then processes the authorization with issuer -computing device 514 and returns the authorization remits to the merchant
The 3DS 2 Protocol (and subsequent versions of the 3DS Protocol) provides a number of benefits to cardholders, issuers, and merchants. It reduces risk of unauthorized transactions through an approach that incorporates a rich, comprehensive set of data to make authentication decisions. For cardholders, it provides a simple, secure, and familiar online authentication experience, regardless of payment channel or device. For issuers, it allows for “fiictionless” authentication, in which an explicit cardholder step-up authentication is hot required or performed. This enables more intelligent risk assessment decisions and the ability to selectively challenge the cardholder as needed. This also improves cardholder experience and overall cardholder lovaltv to issuers. For merchants, the 3DS 2 Protocol decreases fraud on all authenticated transactions, and increases revenue potential from reduced friction and reduced cart abandonment (i.e., cardlrolders deciding not to complete a transaction after they have already selected one or more items to be purchased), especially for mobile payment channels. This also improves cardholder experience and overall cardholder loyalty to merchants.
Using 3DS 2 Protocol (or subsequent versions of the 3DS Protocol), pawent networks see 100% of all authentication requests globally on all cards on their brands. No other party, including issuers and ACS providers, is able to provide this global visibility. This global visibility may be leveraged to provide a consistent, standards-based risk analysis of transactions on behalf of issuers, enabling a marketwide risk-based authentication approach.
As compared to previous authentication methods (e.g., 3 DS 1.0), the 3DS 2 Protocol (and subsequent versions of the 3DS Protocol) allows for approximately ten times the amount of transaction data to be gathered, analyzed, and utilized to prevent fraud. Tire additional data included in Ute 3DS Protocol increases data exchange between merchants and issuers, and improves risk-based authentication (RBA) decisioning. RB A allows issuers to examine every authentication request through transaction risk analysis, while focusing fraud prevention efforts on transactions that prevent the most risk. Further, RBA utilizes both behavioral and transactional inputs in conjunction with a risk engine to determine riskiness of a transaction. Transactions deemed safe or low risk are silently authenticated (i.e., so-called “frictiouless” autheuticatioii), while higher risk transactions are subjected to step-up authentication. When a low risk transaction is silently authenticated, so much data has already been gathered that further authentication adds little to no value. Accordingly, RBA effectively replaces the need for an explicit interaction with the cardholder for even- transaction, but transactions are still fully authenticated, with liability resting with the issuer. Thus, more transactions are completed with minimal cardholder disruption, aiding e-cornmerce growth.
One goal of RBA is to minimize the number of transactions that require active ( i.e.. step-up) authentication, while keeping fraud to a minimum and improving consumer friction points during the transaction process. With RBA, the information gathered enables transaction scoring and classification into low, medium, and high risk, allowing tire issuer and ACS 512 to take appropriate action.
The 3 DS 2 Protocol (and subsequent versions of the 3 DS Protocol) enables a market- wide level risk analysis of all transactions that reach directory server
5 ID. Each transaction can be scored and/or flagged based on the global data available using the 3 D S 2 Protocol (and subsequent versions of the 3 DS Protocol).
Additionally, the payment processor operating the directory server 510 has the ability to see cardholder activity7 across the digital and physical domains, and can utilize this expanded view to improve scoring, hi contrast, traditional autheiiticatioii service providers may only address the digital domain. For example, a payment processor could indicate if a particular device is associated with fraud, and flag that device for issuers in future transactions. The issuer may then reject transactions involving that device of prompt for additiouaiautlientication (e g., through two-factor authentication).
The following Table 2 lists a number of the data elements that are used in the 3DS 2 Protocol for authentication. For example, at least some o f these data elements may be included in the authentication data included in the AReq sent to directory’ server 510. The eighteen da ta elements that ar e also part of the 3 DS 1.0 Protocol are bolded in Table 2, Those of skill in the art will appreciate that the number of rich data elements could grow beyond those listed below (e.g„ in future versions of the 3DS Protocol), and could include over one hundred and seventy data elements. Further, an app-based transaction (e.g., carried out using a mobile computing device) could provide even more data elements than browser-based tansaetioHs. In addition, a tinnsaction performed using an Android device could have over one hundred and thirty additional elements.
Figure imgf000043_0001
Figure imgf000044_0001
Figure imgf000045_0001
Figure imgf000046_0001
Figure imgf000047_0001
TABLE 2
As explained above, in the embodiment shown in FIG. 5, ACS 512 performs autheutieation using RBA capabilities. However, many ACS providers that are issuer processors for authentication do not have RBA capabilities. Further, ACS providers with RBA capabilities may temporarily lose those capabilities (e.g., due to equipment malfunction). In light of the above-described advantages of the 3DS 2 Protocol (and subsequent versions of the 3DS Protocol), ACS providers without RBA capabilities risk losing customers to other ACS providers that have this capability. Accordingly, it would be desirable to facilitate 3DS 2 Protocol (and subsequent versions of the 3DS Protocol) authentication for ACS providers that do not have RBA capabilities.
FIG. 6 is a schematic diagram illustrating transaction flow in another example authentication system 600 that uses the 3DS 2 Protocol (or subsequent versions of the 3DS Protocol) for authentication, and that performs RB A on behalf of
ACS providers that are unable to perform RBA. Unless otherwise indicated, components of authentication system 600 are substantially similar to those of authentication system 500 (shown in FIG. 51.
Instead of directory server 510, authentication system 600 includes an RBA-enabled directory server 610 communicatively coupled to a RBA engine 612 (which may be collectively referred to as an authentication platform 614). RBA- enabled directory server 610 and RBA engine 612 facilitate performing RBA behalf of ACS providers, as described herein. RBA-enabled directory server 610 and RBA engine 612 may be operated, for example, by interchange network 28 (shown in FIG. I), In some embodiments, authentication platform 614 is similar to RB A platform 34
(shown in FIG. 1) mid authentication server 112 (shown in FIG. 2),
As in authentication system 500, RBA-enabled directory server 610 receives an AReq message from 3DS server 506. However, instead of immediately .forwarding the AReq message to ACS 512, RBA-enabled directory server 610 transmits at least some of the data in the .AReq message (e.g., the authentication data) to RBA engine 612.
In the example embodiment, RBA engine 612 analyzes the data in the AReq message to generate RBA result data. For example, RBA engine 6'12 may compare the data in the AReq message to one or more long term variables (“LTV”). The one or more LTV may include historical authenticatiori data associated with the PAN at issue, historical authorization data associated with the PAN, other historical data associated with the PAN, etc. The LTV may be associated with both card present and card not present historical transactions. For example, the LTV may include cardholder shipping address, cardholder billing address, cardholder email address, cardholder phone number:, merchant name, merchant category, merchant locution and ci at letkd one eimnmtnt-1 dated \ anal de ^e g dewtt details biwAsei details) including device ID, IP address, device channel, etc. Further, the LTV may be stored in a database accessible by RBA engine 612 and opemted by interchange network 28. In some embodiments, the LTV data will be hashed prior to storing to pr otect the security of this personally identifia ble information.
In addition, the data in the AReq message may also be compared to oilier parameters. For example, io monitor consistency and changes in behavior, the data may be compared to short term (e g.. on the ordei of minutes, hours, or days) PAN velocities and ratios, including velocities and ratios of PAN authorization and authentication. This may include comparing to recent transaction frequency, amount spent, declines, historical risk scores, etc. Alternatively, the data in the AReq message may be analyzed using any suitable techniques to generate RBA result data, as described herein. In the example embodiment, the RBA result data generated by RBA engine 612 includes a risk score, a risk analysis, and at least one reason code. The risk score is a score representing a determined riskiness of the transaction, with lower scores indicating lower risk and higher scores indicating higher risk. In other words, the risk score represents a likelihood that the suspect cardholder (e.g., the person attempting to perform a transaction) is the legitimate cardholder having the privileges to use tire payment card to perform a payment transaction. For example, the risk score may be represented by a number from G-999 and/or by a risk threshold category from 0-19. In some embodiments, risks assessments that will be shared, such as through the authorization field of one or more messages will be quantified on a scale of 0-9. Those of skill in the art will appreciate that any suitable risk score may be used.
The risk analysis is a description of a level of risk corresponding to the risk score (e.g,, low risk, medium risk, dr high risk). Further the reason codes include one or more factors that influenced the risk score. In some embodiments, the reason codes are affected by rules and' or a combination of the rules and the model. RBA engine 612 transmits the RBA result data to RBA-enabled directory server 610. hi some embodiments, the reason codes are generated based on a plurality of reason code categories and associated anchors, hi some embodiments, the reason codes are affected by rules and/or a combination of the rules and the model.
Specifically, different categories are established, and each category is associated with a plurality of acti va table anchors, as described herein. Based on the analysis of the data in the AReq message, RBA engine 612 may activate one or more anchors. The reason codes are then generated based on which anchors (and how many anchors) are activated. In some embodiments, the reason codes are affected by rules and/or a combmation of the rules and the model.
For example, in. one embodiment, three risk code categories are established: cardholder, merchant, and environment. In this example, the cardholder category is associated with five anchors (shipping address, PAN. billing address, email, and phone), the merchant category is associated with tiiree anchors (merchant name, merchant category , ami merchant criustyX
Figure imgf000049_0001
the: environment category is associated with three anchors (device info, IP address, and device channel). Those of skill m the art will appreciate that additional and/or alternative anchors may be established. Based on analysis of the da ta in the AReq message, RB A engine 612 may activate at least one anchor. For example, for Hie cardholder category, if RBA engine 612 determines that a stripping address for the transaction lias been used with the PAN in past transactions and/or the shipping address is unchanged from prior transaction, RBA engine 612 may activate the shipping address anchor. Further, RBA engine 612 may activate the PAN anchor of the cardholder category if the PAN has had successful authentications in past transactions.
For the merchant category, one or more anchors may be activated based fraud rates for the merchant, decline rates for the merchant, and noil-cleared transaction rates for the merchant. Further, one or more anchors may be activated whea RBA engine 612 determines the merchant category and merchant location for the transaction are consistent with historical transactions for that . merchant
For the environment category, the IP address anchor may be activated if the IP address is known and is not. on a list of “bad” IP addresses. Further, the device anchor may be activa ted if the device is known and is not on a list of “bad” devices, the device has had successful autlrentications in past transactions, and/or tile device has scared well in past transactions.
The following are some additional examples of criteria for activating anchors for the different categories. In one example, the shipping address anchor is activated if the shipping address has been used with the PAN in past transactions, the shipping address is the same as the billing address on file, the shipping address is not on a list of “bad” shipping addresses, and the shipping address is unchanged from a prior transaction. In a second example, the shipping address anchor, the billing address anchor, and the PAN anchor (i.e. , all anchors for the cardholder category) are activated when the shipping address is consistent with previous transactions, the billing address is consistent with previous transactions, the PAN has historical positive association with the cardholder , and the purchase amount, da te, and time are consistent with previous transactions. In a third example, anchors for both the cardholder category and the merchant category are activated when the contact information for the cardholder is consistent with previous transactions, the cardholder is a trusted cardholder, the merchant is a trusted merchant, and the PAN shows established activity and authentication history at tire merchant. Those of skill in the art will appreciate that the anchors may be activated based on any suitable conditions.
The reasons codes are generated based on the activated anchors, and are loosely structured in a Ineias chical order based oil connections between anchors in different categories. For example, if at least one anchor in the cardholder category is activated, a. positive reason code (i.e., indicating relatively tow risk) is generated. If, instead, at least one anchor in the cardholder category is activated and at least one anchor in the merchant category is also activated, a stronger positive reason code related to both categories is generated. Similarly, if at least one anchor in the cardholder category is activated, at least one anchor in the merchant category is activated, and at least one anchor in. the environment category is activated, an even stronger positive reason code related to all three categories is generated. The following Table 3 lists of number of example reason codes.
However, those of skill in the ait will appreciate that additional and/or alternative reason codes may be utilized in accordance with the embodiments described herein.
Figure imgf000051_0001
Figure imgf000052_0001
Figure imgf000053_0001
Figure imgf000054_0002
TABLE 3
After RBA engine 612 generates the RBA result data (including the reason codes), RBA-enabled directory server 610 embeds the RBA result data into the AReq message to generate an enhanced AReq message. For example, in some embodiments, the RBA result data is appended to the AReq message as an extensible markup language (XML) extension of the AReq message. For example, the extension may have the following format;
Figure imgf000054_0001
Figure imgf000055_0001
Where "score” is the risk score, "decision" is Ore risk analysis, and "reasoftCodel" and ''reasonCode2" are the reason codes. In the exemplary embodiment, the mason codes are transmitted as a single leter each. In oilier embodiments, the reason codes may be represented in different methods. In some embodiments, rea.sonCode2 is transmitted by the merchant to provide the merchant’s assessment of the transaction.
Alternatively, the RBA result data may be embedded into the AReq message to generate an enhanced AReq message using any suitable process.
The enhanced AReq message is then transmitted from RBA-enab led directory server 616 to ACS 512. ACS 512 then analyzes the RBA result data in the enhanced AReq message to make an authentication decision That is, in the example embodhnent, ACS 512 may determine to folly authenticate the transaetion, deny authentication for the transaction, or perform additional authentication (e,g. , by issuing a step-up challenge to the cardholder) for the transaction, based on at least one of the risk score, the risk analysis, and the reason codes. Accordingly, ACS 512 does not perform the RBA analysis, but is still able to leverage the results of that analysis to make an authentication decision (e g., by using the results in their own fraud analysis platform), generally resulting in more approvals wife less fraud. Thus, RBA- enabled directory sewer 616 and RBA engine 612 perform the RB A analysis on behalf of ACS 512. In some embodiments, the ACS 512 receives authentication data from a plurality of sources.
Tn some embodiments, when the determined ri skiness of the transaction is low enough, instead of generating and fransmitting an enhanced AReq message to ACS 512, RB A-enabled directory server 610 folly authenticates the transaction itself Specifically, when the determined riskiness of tire transaction is low enough, RB A-enabled directory sewer 610 automatically generates an ARes that indicates the transaction has been folly authenticated, and transmits the ARes message to 3DS server 506, RBA-enabled directory server 610 determines that the riskiness of the transaction is low by coinpai’mg at least one of the risk score and the risk analysis to a predeterniined threshold. The predetermined threshold may be specified, for example, by ACS 512. Accordingly ACS 512 is able to control which transactions will fee fully authenticated without all transactions being forwarded to ACS 512. Bypassing ACS 512 for low risk transactions reduces tire overall message volume on the payment network. This in him frees up network resources, hupfoving transmission speed and overall capability of the payment network.
Fur thermore, in some embodiments, RBA-enabled directory server 610 determines if ACS 512 is available, In some situations, ACS 512 may be offline or unavailable. If the ACS 512 is available, then the RBA-enabled directory server 610 may route the enhanced AReq message including the RBA result data to the ACS 512. If rhe ACS 512 is not available, RBA-enabled directory server 610 may perform the authentication processing. FIG. 7 is a flow diagram of an example method 700 for authenticating an online user on behalf of an access control server (ACS). Method 700 may be implemented, for example, using authentication platform 614 (shown in FIG. 6). Method 700 includes receiving 702 an authentication request message, the authentication request message includes authentication data. Method 700 forfher includes extracting 704 Hie aufoeimcaiion data from the autlienticatiou request message. Method 700 further includes 706 generating, based at least in pari on the extracted authentication data, RBA result data including a risk score, a risk analysis, and at least one reason code. In addition, method 700 includes embedding 708 the RBA result data into the authentication request message to generate an enhanced authentication request message Further, method 706 includes transmitting 710 the enhanced autheutication request message to the ACS to enable the ACS to make an authentication decision based on the RBA result data.
FIG. 8 is a flow diagram of another example method 800 for authenticating an online user. Method 800 may be implemented, for example, using authentication platform 614 (shown in FIG. 6).
In foe example embodiment autheimcatian platfoim 614 receives 802 an authentication request message including authentication. data, as described herein. Authentication platform 614 performs 804 RBA to generate RB A result data including a risk score, a risk analysis, and at least one reason code. The risk score is a score representing a determined riskiness of the transaction, with lower scores indicating lower risk and higher scores indicating higher risk. In other words, the risk score represents a likelihood that the suspect cardholder (e.g., the person attempting to perform a transaction) is the legitiruate cardholder having the privileges to use the payment, card to perform a payment transaction. For example, the risk score may be represented by a number from 0-999 and/or by a risk threshold category from 0-19, For another example, the risk score is represented between 0 and 950 in twenty increments of 50 (te., tire poten tial risk scores 'are 0. 50, 100, 150, ..., 950), In some ernbodhnents, risks assessments that will be shared, such as through the authorization field of one or more messages will be quantified on a scale of 0-9. The risk analysis is a description of a risk level corresponding to the risk score (e.g., low risk, medium nsk, or high ink s The leason codes include eut oi moie factoid that influenced the risk score.
In the example embodiment, authentication platform 614 compares the RBA result data to a stored authentication profile. The aathemicatiou profile contains a plurality of rules for the processing of authentic ation requests. In some embodiments, the authentication profile is provided by the issuer computing device 514 (shown in Fig. 5). Examples of the rules include, but are not limited to, how to proceed when die -\CS >12 {shown m Th} 5) is unavailable mfonnation to include in the RBA, risk level thresholds for the risk score and risk levels, decision making risk thresholds, and specialized rules (such, as all cross-border transactions are to be submited to the ACS 512). The authentication profile is stored at the RBA platform 34, and can be accessed whenever a risk score is determined.
Ill the example embodiment, authentication platform 614 compares the RBA result data to the aiithentication profde to determine the risk level associated with the transaction associated with the authentication request, hi some einbodiineuts, authentication platform 614 compares the risk score to one or more thresholds in the authentication profile to determine the risk level associated with the transaction, hi other embodiments, authentication platform 614 compares tire risk analysis, the reason codes, and/or any other combination of data from the RBA result data arid potentially some or all of the authentication data to the authentication profile to determine the risk level associated with this transaction. For example, a risk score of 350 or less may be considered low risk, a risk score above 350 and less than 850 may be considered medium risk, and a risk score above 850 may be considered high risk, Those skilled in the art will appreciate that any suitable risk score thresholds and any number of risk levels may be used.
In the example embodiment, authentication platform 614 determines 806 if die risk level is high risk. For example, authentication platfonu 614 may determine 806 that the transaction is clearly fraudulent. In. which case, authentication platform 614 fails the authentication, i.e., denies 808 foil authentication o f the transaction. Authentication platform 614 transmits an authentication response (ARes) message indicating tire foiled authentication to. 3DS server 506 (shown in FIG. 5).
The 3DS server 506 may transnrit the Ares message indicating the failed authentication to the merchant, and the merchant may determine whether or net to proceed with the authorization process in the absence of foil aufoeuiicaiion. In these embodiments, where the merchant begins the authorization process after having received the indication of the foiled authentication, the merchant assumes the risk for the transaction if it is authorized by the issuer . When authentication platform 614 determines the transaction is clearly fraudulent, authentication plat&mr 614 denies the transaction without sending on authentication data (e.g.. to the ACS and/or issuer). Specifically, authentication platform 614 fails the authentication and communicates the failure to the authentication requestor in the ARes message. Based on this failure, the merchant should not tiien submit the transaction for authorization, thus terminating the transaction. Accordingly, because the transaction is denied during authentication (and prior to authorization), no authorization messages are sent over the payment processing network. This protects the security of the payment processing network, because the payment processing network is never exposed to authorization data associated with the fraudulent transaction. Further, authentication platform 614 may notify the issuer and/or merchant that the transaction was clearly fraudulent, enabling the issuer and/or merchant to take appropriate action (e.g., flagging the associated account number and/or cardholder). fo some cases, authentication platform 614 determines 810 that the transaction is medium risk or low risk. If the transaction is low risk, authentication platform 614 may folly authenticate 814 the transaction and fraiisnnt an authentication response (ARes) message indicating the foil authentication to 3DS server 506, where at least one of the 3 DS server 506 and the merchant may initiate foe authorization process. If the transaction is medium risk, authentication platform 614 may issue 812 a step-up challenge to the cardholder 22 (shown in FIG, 1). Based on the results of the step-up challenge, authentication platform 614 may felly autiimticate, or otherwise deny fell authentication, of the transaction . In some embodiments, if the transaction is medium risk, autiienticatfou platform 614 transmits the RB A result data to ACS 512, so that the AC'S 512 will perform the step-up challenge, In other embodiments, authentication platform 614 may take different steps at different risk levels and have additional or fewer risk levels to analyze based on the authentication profile.
FIG. 9 is a flow diagram of another example method 900 for authenticating an online user. Method 900 may be implemented, for example, using autiientieation platform 614 (shown in FIG, 6), Method 900 includes storing 902 an authentication profile, lire authentication profile contains a plurality of rules for the processing of authentication requests . The method 900 also includes receiving 904 an authentication request message, the authentication request message includes authentication data. Method 900 further includes exiiaeting 906 the authentication data from the authentication request message. Method 900 further includes generating 908, based at least in part on the extracted autiientieation data, RBA result data including a risk score, a risk analysis, and at least one reason code. In addition, method 900 includes routing 910 the RB A result data based on the autiientication profile and the RBA result data.
In some embodiments, the authentication platform 6.14 transmits the RBA result data to a sourc e of the autiientieation request message, such as the 3DS server 506 (show in. FIG. 5). For example, in some embodiments, a merchant operating the 3DS server 506 may request and receive the RBA result data, including a risk score, a risk analysis, and at least one reason code as described herein. The merchant may use the RBA result data to update the merchant’s own risk models, and may also compare the RBA result data to risk analysis results generated independently by the merchant to determine whether the RBA result data is generally consistent with the merchant-generated risk analysis results. In some embodiments, the authentication request message is associated with an online payment card transaction. The authentication profile is associated with an issuer bank 30 (shown in FIG. 1). And the source of the authentication request message is the issuer computing device 514 (shown in FIG. 5). Accordingly, in some embodiments, the authentication platform 614 transmits the RBA result data directly to the issuer computing device 514, and handles authentication with the issuer computing deVice 514. For example, the issuer bank 30 may enroll a range of card numbers with the authentication platform 614, and request that the authentication platform 614 work directly •with the issuer computing device 514 for authentication of transactions involving card numbers in the enrolled range.
In some embodiments, the authentication platfonn 614 determines whether an access control server (ACS) 512 (shown in FIG. 5) is available. If the ACS 5 i 2 is available, the autlienticatiou platform 614 embeds the RBA result data into the au thentication request message to generate an enhanced au thentication request message. The authentication phuform 614 transmits the enhanced authentication request message to the ACS 512 to enable die ACS 512 to make an authentication decision based on the RB A result data. If the ACS 512 is unavailable, the autlieiitieation platform 614 generates an authentication decision based on the RBA result data and the authentication profile.
In some further embodiments, the authentication platform 614 determines a risk level based on the RBA result data and the authentication profile. In some of these embodiments, the risk level includes at least a low risk, a medium risk and a high risk for the transaction associate with the authentication request In these embodiments, the authentication platform 614 transmits an authentication approval message to the 3DS server 506, if the risk level is lo w.
If the risk medium, the authentication platform 614 transmits a step-up challenge to the online user 22 (shown in FIG. I) if the risk level is medium. The authentication platform 614 receives a response to the step-up challenge from the online user 22. The authentication platform 614 determines an authentication decision based on the response to the step-up challenge and the RBA result data. In some other embodiments, if the risk is medium, the authentication platform 614 transmits the RBA result data to the AC’S 512 if the risk level is medium. The ACS 512 performs the step-up challenge with the online user 22.
If the risk is high, the authentication platfoim 614 transmits an aathenficaiion-failed message to the 3DS server 506.
FIG. 10 is a flo w diagram of a further example method 1000 for authenticating an online user on behalf of an access control server (ACS) 512 (shown in FIG. 5). Method 1000 may be implemented, for example, using authentication platform 614 (shown in FIG. 6). Method 1000 includes receiving 1002 an authentication request message for a transaction. The authentication request message includes authentication data. The method 1000 also includes exacting 1004 the authentication data from the authentication request message. The method 1000 further includes determining 1006 if the ACS 512 is available to process the transaction. If the ACS 512 is unavailable, the method inchides generating 1008, based at least in part on the extracted authentication data, risk-based authentication (RBA) result data including a risk score and at least one reason code that indicates at least one factor that influenced the generated risk score. If the ACS 512 is unavailable, the method also includes transmittiug 1010 an authentication response message based on the RBA. result data. In some embodiments, the authentication platform 614 generates an authentication decision based on the RBA result data and embeds the authentication decision in the authentication response message.
In the example embodiment, transactions are categorized “merchant only''’ or "fully authenticated.” “Fully authenticated" rmnsaetions are generally considered to be low risk transactions that have been authenticated. “Merchant only” transactions are more risky transactions. In some embodiments, “merchant only” transactions have been authenticated. In the example embodiment, one or more indicators in the authentication response indicate whether a transaction is “merchant only''’ or "fully authenticated.” One or more indicators may also indicate whether or not authentication was attempted on ilte transaction. This information is used by the merchant to determine whether or not to begin the authorization process for the transaction. In some embodiments, this information is also stored in the database 120 (shown in FIG, 2 ) and is referred to by at least one of the interchange network 28 and the issuer bank 36 during the authorization process 29 (all shown in FIG. 1). In the example embodiment, the authentication platfoim 614 performs the autheiitieation process on the transaction, including RBA. This analysis is based on a machine learning model where, overtime, the authentication platform 614 is capable of improving its ability to determine the risk level associated With transactions, The authentication platform 614 analyzes transactions that are authenticated by the ACS 512 and compares these transactions with historical data to generate a risk model for each issuer bank 30. By comparing ths data points in each transaction, the risk model will indicate the amount of risk associated with each transaction based on the authentication data in the corresponding authentication requests. This allows the authentication platfoim 614 to analyze transactions when the ACS 512 is unavailable and perform authentication on these transactions to provide a response to te authentication request. Accordingly, the authentication platform 614 may determine that a received authorization request is substantially similar to a previous transaction that the ACS 512 scored at low risk. Thus allowing the authentication platform 614 to determine that the received transaction is low risk with a degree of certainty ,
In some embodiments, the authentication platform 614 determines Whether or not the AC'S 512 available by transmitting the authentication request message to tire ACS 512. In these embodiments, the authentication platform 614 resits a predetermined per iod of time for a response from the ACS 512. The authentication platform 614 determines that the ACS 512 is unavailable if no response is received from the ACS 512 after the predetermined period of time. Alternatively, tire aufentieation platform 614 may receive a response from the ACS 512 that indicates that the ACS 512 is unable to perform authentication. The response from the ACS 512 may indicate that the online user is not enrolled with the ACS 512, that the ACS 512 is currently unavailable, or that the ACS 512 was unable to authenticate the online user. This indication may be contained in the response message from the ACS 512. In other embodiments, the authentication platform 614 may transmit periodic Status check messages to the ACS 512 to determine whether or not the ACS 512 is available.
In some embodiments, the authentication platform 614 determines that Use online user is not associated with the ACS 512 based on the extracted authentication data. In these embodiments, the issuer associated with the online user has not registered with an ACS 512. In these embodiments, tire authentication platform 614 generates an authentication decision based on the RBA result data. hi some further embodiments, the authentication platform 614 determines whether the authentication request message complies with the 3 DS 2 Protocol or subsequent versions of the 3 DS Protocol. If the authentication request message does not comply with the appropriate 3DS Protocols, the authentication platform 614 bypasses determining if the ACS 512 is available . In this situation, the authentieation platform 614 transmits an authentication response message mdicaimg that the transaction is considered merchant only and that no authentication was atempted. Alternatively when ACS 512 is unavailable or the message does not comply with protocols, in. some embodiments, authentication platform 614 may be enabled to act as a stand-in for ACS 512 for some authentications.
In some embodiments, the authentication platform 614 determines a risk level based on the RBA result data. If the risk level is low, the authentication platform 614 embeds an indicator in the authentication response message indicating that the transaction is “felly an&eniicated.” If the risk level is not low, the authentication platform 614 embeds one or more indicators in the authentication response message indicating that the transaction is a merchant only transaction and that authentication was attempted. FIGS. 11 A and 1 IB are swim-lane diagrams illustrating additional example embodiments involving conditional SCA evaluation on transactions associated with a regulated market. FIG. 11 A is directed to transactions that, are allowed to avoid regulator-imposed SCA step-up challenges when the transactions are determined to be of sufficiently low risk and low value FIG. 1 IB is directed to transactions that are forced into SCA step-up challenges when the transactions are more risky7 or when the transactions are of higher value. In such scenarios, any of the above-described systems and methods involving the RBA-enabled directory server (or just “directory server”) 610 and If B A. engine 612 may be employed in conjunction with conditional SCA. subject to the restrictions imposed by regulators as described herein.
Referring now to FIG. 11 A, in this example embodiment, at step .1110, the cardholder 22 initiates an online transaction with a merchant, represented here by 3DS server 506, via their computing device, represented here by 3DS client 502. 3DS server 506 generates and transmits an AReq message 1102 to directory server 619 at step 1112 and extracts transaction data from AReq message (e.g,, as described above with respect to FIG. 6). AReq message 1102 includes a transaction value for the transaction, as well as other authentication data associated with the transaction (e g,, as a 3DS AReq message). Directory server 610 receives AReq message 1102 and determines that the transaction involves a market regulated by a regulatory entity, such as a central bank of a particular country associated with the transaction (e.g., based on the identity or location of cardholder 22, merchant 24, merchant bank 26, or issuer bank 30).
Transactions in some regulated markets may be subject to forced SCA for all or most transactions. In the example embodiment, the regulated market for this example transaction has opted into conditional SCA as described herein. In such markets, regulators may generally mandate SCA on transactions, but may allow transactions to be authenticated without SCA in particular circumstances. As such, directory server 610 identifies a transaction limit and a risk threshold for conditional SCA Of that particular regulated market. The transaction limit represents a threshold transaction value below which SCA may be avoided if the risk threshold is also satisfied, fit the embodiments described herein, the transaction limit may be. for example, a monetary value for a particular transaction (e.g., 2000 rupees, 3(i Euro, etc.), a number of transactions (e.g., 5 fiictionless transactions), or a cumulative monetary value (e.g., 100 Euro). Accordingly , the transaction limit may be defined by parameters other than a monetary value of the transaction. Those of skill in the art will appreciate that any suitable type of transaction limit may be established.
The risk threshold represents a level of risk of fraud associated with the transaction (e g.. as deteimmed oi “scored. ' by RBA engine 6121. hi othei words. and for example, if the risk level of the transaction is “low” (e.g., below a risk score threshold) and the transaction is a “tow-value” transaction (e.g., below the transaction threshold value), then SCA may not be mandated by the regulated entity. If the transaction value is not a low-value transaction (e.g., at or above the transaction threshold value) or if the transaction is not a low-risk transaction (e.g., at or above a risk score threshold), then SCA may be mandated by the regulated entity.
Directory server 610 compares the transaction value to the transaction limit set by the regulatory entity and, in this example, determines that the transaction value is less than the transaction limit (e.g., the transaction is a “tow-value” transaction). As such, directory server 610 engages RBA engine 612 at Step 1114 to evaluate risk associated with AReq RBA engine 612 evaluates risk associated with tlie transaction using die authentication data and oilier transaction data associated with AReq, as described above. RBA engine 612 generates risk-based auilientication result data that includes a risk score for the transaction.
In this example, RBA engine 612 compares the risk score generated for this transaction to the risk threshold identified for this regulated market and determines that the risk of fraud in this transaction is below the risk tln eshold. In some embodiments, the risk score and the risk threshold may be integer values that may be compared to determine whether tlie risk score is more or less than the risk threshold. In other embodiments, the risk threshold may be a category of a tiered set of categories (e.g., “low”, “medium”, “high”) and the risk score may be of that same tiered set of categories, or the risk score may be a value that is mapped into that tiered set of categories (e.g., with regulator-, issuer-, or system-defined ranges for each category). For example, RBA engine 612 may allow the regulators for this market to define the “low risk” category as being any transaction score below 400 (e.g., as evaluated under 3DS 2 by RBA engine 612).
Continuing tins example, RBA engine 612 has determined, at step
1104, that tile transaction is both “low” and “'below.” In other words, the transaction is -both a low-value transaction as well as below tire regulator's transaction threshold. As such, as far as the regulator is concerned, the transaction is not mandated to have SCA performed. However, some issuers may have more stringent requirements for SCA step-up, or may have other reasons for rejecting authentication regardless of SCA step-up considerations. For example, some issuers may reject any CHP transaction evaluating to a “high” risk. For ease of description, such flow and rejections are not expressly illustrated. in FIGS. 11 A and 1 IB. Rather, FIGS. 11 A and I I B focus on scenarios involving when SCA is mandated or allowed to be avoided.
In some scenarios, the authentication platform (e.g., directory server 610 and RBA engine 612) may be entrusted to perform authentication processing on behalf of issuer 514. In other scenarios, authentication may be performed by ACS 512. As such, at test 1116, if the authentication platform is acting on behalf of issuer
514 for authentication, then RBA engine 612 generates an ARes message 1106 approving the transaction at step 1118 (presuming no other reason for authentication rejection) and transmits ARes 1106 to 3DS server 506 at step 1120 without having performed SCA step-tip authentication on consumer 22. If, at test 1116, the authentication platform does not perform authentication on behalf of issuer 514 (e.g., issuer 514 has ACS 512 perform authentication services), then RBA engine 612 transmits an enhanced AReq message 1108 to ACS 512 at step 1122. Enhanced AReq may include, In addition to the additional RBA data described above associated with 3DS 2, a data field indicating that SC A step-up is not mandated by the involved market(s) for this transaction.
However, issuer 514 or ACS 512 may otherwise determine to perform SCA on the transaction (e.g., if preferred by the issuer for certain types of transactions or other considerations). If, at test 1130, ACS 512 does not prompt SCA step-up, then ACS 512 returns an ARes message 1132 to the authentication platform at step 1134 approving authentication of the transaction.
If, at test 1130, ACS 512 detennmes to prompt SCA step-up, then ACS 512 prompts step-up 1138 via 3DS server 506 (or 3DS client 502) at step 1136. Consumer 22 provides step-up input 1142 back to 3DS server 506 (or directly to ACS 512) and. upon successful step-up, ACS 512 transmits the ARes message 1132 to the authentication service. at step 1146.
Retelling now to FIG. 1 IB, in this example, the authentication platform determines that the transaction does not meet the requirements to avoid SCA step-up and, as such, SCA step-up is mandated. In the example embodiment, RBA engine 612 determines, at step 1150, that either tire transac tion value is above the tiaasaciton limit set by the regulators7 entity7, or that the transaction risk does not satisfy the risk threshold set by fire regulatory entity, or both. If at test 1152, the authentication platform is acting on behalf of issuer 514, and presuming no other reason for denying authentication of the transaction, RB A engine 612 prompts step-up
1156 of consumer 22 at step 1154. Consumer 22 responds with step-up input 1142 at step 1140, either directly with directory server 610 or via 3DS server 506 at step 1158 and, upon successful step-up challenge, 3DS server 506 transmits ARes message 1106 to 3DS server 506 approving authentication of the transaction. If at test 1152, ACS 512 is acting on behalf of issuer 514, RB A engine
612 transmits, at step 1154, the enhanced AReq 1108 (represented here by 1162) along with an indication to force SCA step-up challenge of consumer 22 for this transaction. Enhanced AReq may include, in addition to the additional RBA data described above associated with3DS2, a data field mandating ACS 512 to perform SCA step-up for the transaction (e.g., if the transaction is otherwise deemed to be approved for authentication by ACS 512), In other words, AReq 1108: serves to inform ACS 512 tlrat tire transaction may not be authenticated without SCA. Presuming no other reason to rej ect authentication of the transaction. ACS 512 identifies that the transaction is subject to a mandated SCA step-up and prompts step- up 1138 in steps 1136, 1140, 1144. and transmits ARes 1132 approving the transaction in steps 1146 and 1120, as described above.
Tn some embodiments, the authentication platform provides a graphical user interface (GUI) dashboard (not shown) for use by the regulators. The GUI may, for example, allow the regulators to view and evaluate fraud data associated with their inarket. For example, in one embodiment, the GUI dashboard may be configured to display his torical fraud data indicating a level of fraud present in transactions not mandated to be authenticated with SCA by RBA engine 612 when satisfying the risk threshold and tiaiisactioii limit set by the regulatory entity (e.g., a percentage of “fiictionless transactions’’ within RBA, perhaps including approval rates or basis points of fraud), hi one embodiment, the GUI dashboard may be configiued to display historical fraud data indicating a level of fraud present in transactions mandated to be authenticated with SCA by the RBA engine 612 when not satisfying one or more of the risk threshold or transaction limit (e,g., percentage of transactions stepped-up within RBA, perhaps with the type of step-up, approval rates, basis points of fend). Such data may include an electronic gross dollar value (eGDV), an eTransaction count, or growth over time for such metrics. Such data may also be presented by channel. For example, such data may be limited to mobile device fensactiens, browser-based transactions, telephone transactions, and marl transactions. As such, the GUI may allow the regulators to determine how then current settings are impacting fraud in these fypes of transactions.
In some embortiments, the GUI allows the regulators to adjust conditional SCA settings associated with their market. For example, the GUI may allow the regulators to alter the risk threshold required to avoid SCA, or to alter the transaction limit for transactions that can avoid SCA. In some embodiments, the GUI provides simulation analysis of prospective changes to the conditional SCA settings. For example, using historical data, the GUI may provide a feud impact analysis to a proposed higher risk threshold, or to a proposed higher transaction limit, perhaps estimating a predicted level of feud at the proposed setimgs. As such, the GUI may allow the regulators to determine potential impacts or potential results based on prospective changes.
FIG. 12 is a flow diagram of an advanced authentication process 1200 for increasing approvals, reducing fraud, and improving consumer experience. Authentication process 1200 may be implemented, for example, using the systems and methods described herein. As shown in FIG . 12, authentication data 1202 is transmitted to an authentication platform 1206 (such as autiicitocation platform 614) through a smart interface 1204. As described above, as compared to previous authentication methods (e.g., 3DS 1.0) , authentication data 1202 under the 3DS 2 Protocol (and subsequent versions of the 3DS Protocol) includes approximately ten times the amount of transaction data to be gathered, analyzed, and utilized to prevent feud. Using authentication data 1202, anihentication platfonu 1206 performs smart authentication 1208 (as described herein) to generate RBA results data. Decision intelligence (DI) 1210 uses other sources of data (i.e., a separate model) to influence authorization decisions. In some embodiments, the RBA results data maybe incorporated into DI 1210. These assessments enable an interested party 1212 (e.g., the ACS, the merchant, and/or the issuer) to complete authentication (and authentication) of the transaction .
Auflientication process 1200 enables authenticating an online user as a legitimate user of a payment account without having to ask additional questions of the user (e.g,, as part of a step-up challenge) or having to request additional inputs from the user. Thus, authenticati on process 1200 assesses a risk of fraud without creating any additional friction for the user that may cause the user to terminate a transaction.
FIG. 13 is a schematic diagram illustrating transaction flow in another example auflientication system 1300 that uses the 3DS 2 Protocol (or subsequent versions of the 3DS Protocol) for authentication, and that performs RBA on behalf of ACS providers that are unable to perform RBA. Unless otherwise indicated, components of authentication system 1300 are substantially similar to those of authentication, system 500 (shown in FIG. 5) and 600 (shown in FIG. 6). Authentication system 1300 again includes RBA-enabled directory server 610, which in this embodiment is communicatively coupled to a RBA engine 1312 (which may be collectively referred to as an auiheniication platfoim 1314), RBA-enabled directory server 610 and RBA engine 1312 facilitate performing RBA behalf of ACS providers, as described herein. RBA-enabled directory server 610 and RBA engine 1312 may be ope/ated. for example, by interchange network 28 (shown in FIG. I). In some embodiments, authentication platform 1314 is similar to RBA platform 34 (shown in FIG. I) and authentication server 112 (shown in FIG. 2),
Similarly to authentication system 600, RBA-enabled directory server 610 receives an AReq message from 3DS server 506, then RBA-enabled directory server 610 transmits at least some of the data in the AReq message (e.g., the authentication data) to RB A engine 1312,
In the example embodiment, RBA engine 1312 analyzes the data in the AReq message in a similar fashion to the analysis performed by RBA engine 612 to generate RBA result data. For example, RBA engine 1312 may again compare the data in the AReq message to one or more long term variables f ‘LTV’) and/or short, term PAN velocities and ratios, which again may inchide comparing to recent transaction frequency, amount spent, declines, historical risk scores, etc.
Altenialively, the data in the AReq message may be analyzed using any suitable technique to generate RBA result data.
In the example embodiment the RBA result data generated by RBA engine 1312 again may include a risk score, a risk analysis, and at least one reason code as described above, such as the shxgle-character reason codes described above with respect to Table 3. Additionally or alternatively, however, RBA engine 1312 generates enhanced reason codes . In the example embodiment, each enhanced reason code consists of multiple bytes of data that provide more detailed insight, as compared to the single character reason codes described above with respect to Table 3, with respect to the underlying factors that affect the risk analysis.
More specifically, the enhanced reason codes are again generated based on a plurality of reason code categories arid associa ted anchors, and again may be affected by rules and/or a combination of the rules and the model, as described above. However, in contrast to the single-byte reason code (shown in Table 3), the multiple-byte enhanced reason code includes far more possibilities for rmanced descriptions of the combination of activated anchors and/or risk events that are identified by RBA engine 1312. Based on the analysis of the data m the AReq message. RBA engine 1312 again may adn ate one or more anchors in one or more of the categories. The enhanced reason code is then generated based on winch anchors (and how many anchors) are activated, and based further on other specific risk events detected for the transaction. In the example embodiment, the enhanced reason code includes three bytes of data, and each byte is assigned a letter from tire English alphabet, enabling the data space of the enhanced reason code to accommodate 26*26*26 = 17,576 different enhanced reason codes. Accordingly, with, a size increase of two bytes, the enhanced reason code increases the number of potential reason codes (as compared to a single byte reason code) by a factor of more than 600. In some embodiments, each, byte is assigned an alphanumeric eliaracter, for 36 possibilities per byte.
Alternatively, the enhanced reason code includes any suitable number of bytes (such as four, five, or ten bytes), and/dr each byte is assigned a value from among any suitable range of values (e.g., an integer between 0 arid 255). In some implementations, the ability to embed significant additional detail in the enhanced reason code, while still utilizing a very small number of bytes (e.g., three bytes), enables RBA engine 1312 to provide a particular technical advantage with respect to providing information for real-time transaction authentication to issuers that do not contract with an ACS, and/or to merchants or issuers when an ACS becomes temporarily unavailable, as will be discussed herein. Ip addition, the ability to embed significant additional detail m the enhanced reason code, while still utilizing a very small number of bytes (e.g., three bytes), enables RBA engine 1312 to provide a particular technical advantage with respect to back- office analy sis of past transactions by issuers or merchants, as will be discussed herein.
In the example embodiment, the reason code categories are again the cardholder, merchant, and environment categories as described above. Alternatively, any suitable number and/or type of categories is implemented by RBA engine 1312. In the example embodiment, the cardholder category is associated with fi ve anchors (shipping address, PAN, billing address, email, and phone), the merchant, category is associated with three anchors (merchant name, merchant category, and merchant country), and the environment category is associated with three anchors (device into, IP address, and device channel). Those of skill in the art will appreciate that additional and/or alternative anchors may be established,
B ased on analysis of the data in the AReq messa ge, RBA engine 1312 may activate at least one anchor in one or more of the three categories. For example, for the cardholder category, if RBA engine 1312 determines that a shipping address for die transaction has been used with the PAN in past transactions and/or the shipping address is unchanged from prior transactions, RB A engine 1312 may activate the shipping address anchor. Further, RBA engine 1312 may activate the PAN anchor of the cardholder category if the PAN has had successful authentications in past transactions.
For tire merchant category, one or more anchors may be activated based fraud rates for the merchant, decline rates for the merchant, and lion-cleared transaction rates for the merchant. Further, one or more anchors may be activated when RBA engine 1312 determines the merchant category and merchant location for the transaction are consistent with historical transactions for that merchant. For the environment category, RBA engine 1312 njay activate the IP address anchor if the IP address is known and is not on a list of “bad” IP addresses. Further, the device anchor may be activated when RBA engine 1312 detennin.es the device is known and is not on a list of “bad” devices, the device has had successful authentications in past transactions, and/or the device has scored well in past tKnisactioiis, Hie additional examples of criteria for activating anchors for the different categories as described above for RBA engine 612 jn»y -also be applied for RBA engine 1312. Those of skill in the art will appreciate that the anchors may be activated based on any suitable conditions. Moreover, RBA engine 1312 may detect one or more specific ri sk events associated with one or more of the anchors. For example, RBA engine 1312 may detect that the device profile of the device used io initiate the. transaction does not match the device profile used to initiate previous online transactions associated with the payment account in the historical data.
The bytes of the enhanced reason code are generated based on the activated anchors and the detected risk events, and in some embodiments are structured in a hierarchical order based on connections between anchors in different categories. For example, if at least one anchor in the cardholder category is activated, a positive enhanced reason code (i.e., indicating relatively low risk) is generated. If, instead, at least one anchor in the cardholder category is activated and at least one anchor in the merchant category is also activated, a stronger positive enhanced reason code related to both categories is generated. Similarly, if at least one anchor in the cardholder category is activated, at least one anchor in the merchant category is activated, and at least one anchor in the environment category is activated, an even stronger positive enhanced reason code related to all three categories is generated. Conversely, if one or more risk events are detected, a less positive, or negative, enhanced reason code is generated which further indicates the one or more detected risk events.
The following Table 4 li sts of number of example three-byte enhanced reason codes.
Figure imgf000071_0001
Figure imgf000072_0001
Figure imgf000073_0001
Figure imgf000074_0001
Figure imgf000075_0001
Figure imgf000076_0001
TABLE 4
Those of skill in the art will appreciate that additional and/or alternative enhanced reason codes may be utilized in accordance with the embodiments described herein, particularly in view of the number of distinct values available. For example, lire Areq message may indicate that the transaction was initiated using one or more -particular comnumication modes, such as a payment initiated using a voice-coiitroiled personal assistant (e,g., Shi®, which is a registered trademark of Apple Inc. located in Cupertino, CA) for a buy-online, curbside pickup order. Certain values of the enhanced reason code may indicate a risk event was detected because the use of Siri to initiate purchases by the associated cardholder and/or device identifier is rare, and additionally or alternatively because buy-online, curbside pickup orders are rare for the associated cardholder and/or device identifier. The ability of RBA engine 1312 to convev risk events for each transaction at such levels of granularity represents a technical advantage of the enhanced reason codes.
After RBA. engine 1312 generates the RBA result data (including the enhanced reason code), RBA engine 1312 transmits the RBA result data to RBA- enabled directory server 610. In some embodiments, RBA-enabled directory server 610 again embeds the RB A result data into the AReq message to generate an enhanced AReq message, as discussed above, and the enhanced AReq message is then transmitted from RBA-enabled directory server 610 to ACS 512. ACS 512 then analyzes the RBA result data in the enhanced AReq message to make an auflrentication decision, such as one of determining to fully authenticate the transaction, denying authentication for the transaction, or perfbnning additional authentication (e.g., by issuing a step-up challenge to the cardholder) for the transaction, based on at least one of the risk score, the risk analysis, and the enhanced reason code. Accordingly, ACS 512 does not perform the RB A analysis, but is still able to leverage the results of that analy sis to make an authentication decision (e.g,, by using the results in their own fraud analysis platform), generally resulting in more approvals with less fraud. Thus, in such embodiments, RBA-enabled directory server 610 and RBA engine 1312 perform the RBA analysis on behalf of ACS 512. In some embodiments, the ACS 512 receives authentication data from a plurality of sources.
Additionally or alternatively, in some embodiments, when tire determined riskiness of the transa ction is low enough, and/or if RB A - enabled directory server 610 determines if ACS 512 is unavailable, RBA-enabled directory server 610 performs a hill authentication process for the transaction instead of generating and transmitting an enhanced AReq message to ACS 512, as described above. In some embodiments, authentication platform 1314 is configui'ed to cause 3DS server 506 to embed the enhanced reason code in an authorization request message routed to issuer 514 via payment network 522, which enables issuer 514, which is the ultimate decision-maker in authorizing the payment transaction, to consider the authentication risk events identified by the enhanced reason code directly in the authorization process. As noted above, the ability to pack authentication risk event information at a high level of granularity into the small number of bytes embodied in the enhanced reason code is a particular teclmical advantage with respect to these embodiments. More specifically, as discussed above, payment network 522 is configured to process and route messages formated according to a set of proprietary communications standards promulgated by the payment network for the exchange of financial transaction data arid the settlement of hinds between financial institutions that are members of the payment network. Those of skill in the art will appreciate that such proprietary communications standards have a tightly constrained data format for messages, such as ISO 8583 compliant messages and/or ISO 20022 compliant : messages. As used herein, 'ISO'’ refers to a series of standards approved by the International Organization for Standardization (ISO is a registered trademark of the International Organization for Standardization of Geneva, Switzerland), lire constrained format defines acceptable message types, data element locations, and data element values. ISO 8583 compliant messages are constrained by the ISO 8583 standard, which governs financial transaction card originated messages. ISO 20022 compliant messages are constrained by the ISO 20022 standard. For example, ISO 20022 compliant messages may include acceptor to issuer card messages (ATICA).
In conventional systems, as discussed above, the rich detail in the RBA result data can only be leveraged by issuer 514 through the use of ACS 512 via the authentication requestiresponse conunuiticatiaii path, in part because the ability to add significant amounts of additional information Within the legacy messaging architecture of payment processing network 522 in the separate authorization (e.g., ISO 8583) messaging path is severely limited. However, as noted above, the enhanced reason code is capable of providing significant additional detail about the fac tors affecting authentication of the underlying payment transaction, while utilizing only a very small number of bytes: (e.g., three bytes).
More specifically, authentication platform 1314 in some embodiments transmits the enhanced AReq message (including the enhanced reason code, as discussed above) via the directory server 610 back to the requestor 3DS server 506, Which is configured to embed the enhanced reason code into a payment request for the transaction sent io the acquirer 520, which provides a gateway to payment network 522. Acquirer 520 then routes a formatted authorization request message (e.g., an ISO 8583 authorization request message) for the transaction via payment network 522 to issuer 514. In other such einbodiinents, directory server 610 has a direct communication link (not shown) to a payment network server computing device that is part of the implementation of payment network 522. Direc tory server 610 transmits tire enhanced reason code, along with linking information usable to identify the authorization request message for the underlying payment transaction, directly to the payment network server computing device. When the payment network server computing device receives the formatted authorization request message for the transaction as foiwarded by acquirer 520, the payment network server computing device recognizes the authorization request message based on the linking information, and embeds the enhanced reason code into the authorization request message prior to forwarding the authorization request message to issuer 514. Accordingly, the rich RBA. result data encoded by the enhanced reason code reaches the sender computing system of issuer 514, which is the decisioning server, via the separate authorization (e.g., ISO 8583) messaging path for use in the real-time authorization decision executed by the issuer server on the underlying payment transaction, regardless of whether issuer 514 has contracted with ACS 512 or whether, if contracted, ACS 512 is nevertheless unavailable at a given time.
In one example, the three byte enhanced reason code, with each byte configured to represent alphabetic values, may be included in data element 48, subeleineat 56 of the ISO 8583 authorization request message. Issuei 514 configures its authorization computing system to receive alphaniuneric values in the fields of subelemerit 56 as follows:
Figure imgf000079_0001
Figure imgf000080_0001
wherein the value of ‘ARA” (authentication risk analysis) in subfieid I is an example of a fixed value that identifies fire contents of subfield 2 as an enhanced reason code.
FIG. 14 is an example graphic visualization 1400 generated by a visualization engine 1310 (shown in FIG. 13) in communication with authentication platform 1314 and/or payment network 522. Visualization engine 1310 may be hosted on one or more computers that are communicatively coupled to the Internet, and that may be implemented by a server computing device amhitecture such as that illustrated by server system 301 (shown in FIG. 3). With reference to FIGs. 13 and 14, in some embodiments, visualization engine 1310 includes a server application configured to interact with a client application executable on an analyst computing device of any of issuer 514, merchant euviromnent 1304, acquirer 520, payment network 522, or another party. Upon request by the client application, the server application causes the client application to display , to a user of the analy st computing device, graphic visualization 1400 based on current and or historical RBA result data generated by RBA engine 1312, stored, and subsequently obtained by visualization engine 1310. In some embodiments, the RBA result data generated in real-time with respect to each payment transaction is stored as historical RBA result data by RBA engine 1312 in a database accessible to visualization engine 1310. Additionally or alternatively, the RBA result data generated in real-time with respect to each payment transaction is einbedded in the authorization request message routed via payment network 522 as described above, and payment network 522 stores the RBA result data from each authorization reqnest message as the historical RB A result data in a database accessible to visualization engine 1310
Tire analyst computing device may be implemented by a client computing device architecture such as that illustrated by client computing device 402 (shown in FIG. 4), and the client application may include a web browser or a dedicated so ttware application configured to access visualization engine 1310 using the Internet or other network.
In some embodiments, graphic visualization 1400 includes icons that represent each of the reason code categories. For example, the illustrated embodiment includes a cardholder (or payor) icon 1402, an environment (or device) icon 1404, and a merchant (or payee) icon 1406. Alternatively, graphic visualization 1400 includes icons that represent any suitable number or type of reason code categories. Moreover, in certain embodiments, graphic visualization 1400 includes icons that represent the anchors associated with each of the reason code categories. For example, the illustrated embodiment includes a shipping address icon 1410, a PAN icon 1412, a billing address icon 1414 , an email icon 1416, anda phone icon 1418 connected to, grouped around, or otherwise visually associated wills cardholder icon 1402.
Similarly, the illustrated embodiment includes a device profile icon 1420. an IP address icon 1422, and a device channel icon 1424 visually associated with environment icon 1404, and a merchant name icon 1430, a merchant category icon 1432, and a merchant country icon 1434 visually associated with merchant icon 1406. Alternatively, graphic visualization 1400 includes icons that represent any suitable anchors for each of the displayed reason code categories. For each selected, transaction, graphic visualization 1400 is coirfigured to visually highlight icons corresponding to anchors that are activated (i.e. , verified as eoiTesponding well to historical data) for the selected transaction. For example, the client application executing on the analyst computing device may display to the analyst a list of reports from cardholders identifying potentially fraudulent transactions (e.g., each cardholder noticed an unrecognized transaction on the cardholder ’s monthly billing statement). The analyst may ‘"click on” of otherwise select a transaction on the list to initiate a request, via die client application executing on the analyst computing device, for a display of stored RBA result data with respect to the transaction using graphic visualization 1400. Visualization engine 1310 responds to the request by retrieving the stored RBA result data previously generated by RBA engine 1312 for the selected transaction. In some embodiments, visualization engine 1310 then detects which anchors (if any) were acfivatedwerified for the transaction based on tire retrieved single-character reason code (e.g. using rules and/or a stored version of a table such as Table 3), or alternatively based on the enhanced reason code (e.g. using rules and/or a stored version of a table such as Table 4), and causes the client application to highlight the icon(s) -corresponding to the activated anchors on graphic visualization 1400.
In some embodiments, the icons corresponding to the activated/verified anchors are highlighted by changing one or more of a fill color, a border color, a border thickness, and an element size of the icon corresponding to the anchor. Those of skill in the art will appreciate that the icons can also be highlighted by “graying out” or otherwise visually deemphasizing the icons corresponding to the umaetivated anchors. Alternatively, icons corresponding to tire activated anchors for the transaction are highlighted in any suitable fashion on graphic visualization 1400.
In some embodiments, graphic visualization 1400 may be viewed as a “chart” with a static arrangement of icons. As rhe analyst, moves through the list of potentially fraudulent transactions, the highlighting of the icons changes to reflect tiie stored RB A result data. Thus, the analyst may quickly learn to recognize a meaning of specific highlighting patterns and/or to draw inferences as to which fhwfaleirt transactions may be related to the same source of fiaudulent conduct.
Graphic visualization 1400 caused to be displayed by visualization engine 1310 provides a technical advantage by enabling an analyst using the analyst computing device to quickly observe and evaluate which factors were most relevant to the authentication analysis for each historical transaction. In one example, if several icons are highlighted on graphic visualization 1400. the analyst may quickly determine that the cardholder dispute is likely without merit . Thus, if the analyst computing device represents issuer 514, i ssuer 514 may determine not to initiate a chargeback request for the disputed transaction and/or may ask the cardholder to provide additional information to support the dispute. Similarly, if the analyst computing device represents acquirer 520 hrvesiigating a chargeback request already submitted by issuer 514, acquirer 520 rnay determine to reject tire chargeback request as likely not meritorious. In another example, if one or no icons are highlighted on graphic visualization 1400, the analyst may quickly determine that the cardholder dispute likely has merit. Thus, If the analyst computing device represents issuer 514, issuer 514 may determine to initiate a chargeback request for tire disputed transaction without requiring the cardholder to provide additional inforniation to support the dispute, whereas if tire analy st computing device represents acquirer 520 investigating a chargeback request already submitted by issuer 514, acquirer 520 may determine to honor the chargeback request . The ability of graphic visualization 1400 to pack a wide array of information regarding a traiisaction into a single-screen, easily comprehensible icon-based chart format is a technical improvement over conventional transaction-dispute analysis systems, which require the user to scroll through individual pieces of data and mentally re-constoict the underlying factors represented by the da ta .
FIG. 15 A is another example graphic visualization 1500 generated by visualization engine 1310 in conmmnication with aniiientication platform 1314 and/or payment network 522. With reference to FIGs. 13 and 15 A, in some embodiments, the server application implementing visualization engine 1310 additionally or alternatively provides Application Progranmiing Interface (API) ftinctiouahty available to be invoked via API calls from the client application executable on the analyst computing device of any of issuer 514, merchant environment 1304, acquirer 520, payment network 522, or another party to cause graphic visualization 1500 to be displayed on the client computing device. The API architecture pi ovides a technical advantage by enabling flexibility for any of issuer 514, merchant environment. 1304, acquirer 520, payment network 522, or another party to embed graphic visualization 1500 within its own application suite by simply coding in the appropriate API calls. Moreover, visualization engine 1310 can embed code for further API calls into graphic visualization 1500, such that the analyst can “click on” or otherwise select a portion of graphic visualization 1500 to obtain an additional graphic visualization of oilier relevant data.
The client application executing on the analyst computing device may again display to the analyst a list of reports from cardholders identifying potentially fraudulent tmnsactions (e.g., each cardholder noticed an unrecognized transaction on the cardholder’s monthly billing statement), In the example embodiment, when tire analyst “clicks’ ’ or otherwise selects a transaction on the list, the client application generates an API call to visualization engine 1310. In response to the API call, visualization engine 1310 retrieves the stored RBA result data, previously generated by RBA engine 1312 for the selected transaction. In some embodiments, visualization engine 1310 then uses the retrieved enhanced reason code for the transaction (e.g. using rules or a stored table such as Table 4) to detect which anchors (if any) were activated/verified for the transaction, as well as to identify any additional risk events memorialized in the enhanced reason code. Visualization engine 1310 then causes the client application to display icons for only a subset. (e.g., fewer than all) of the categories and anchors evaluated by RB A engine 1312, including those categories and anchors identified by the enhanced reason code as being the most relevant to the authentication risk for the transaction In other words, in contrast to the static '‘chart” arrangement of icons provided across transaetions in graphic visualization 1400, graphic visualization 1500 dynamically updates the displayed icons for each transaction based on the information captured in the enhanced reason code.
For example, hr the illustrated embodiment, in response to the API call for the selected transaction, visualization engine 1310 retrieves an erd jamed i eason code of ZAA that was generated by RBA engine 1312, and uses the rules author the stored table to determine that the value ZAA corresponds to a. verification that the shipping address anchor was activated (e.g., because the shipping address input during the transaction had a prior history established), that the merchant was assessed overall as a low fraud risk, that a risk event was identified for the device profile anchor of tire environment category due to a change in device or device profile information as compared to previous transactions, and that as a result RBA engine 1312 tagged suspicious account (i.e., PAN) activity and scored the transaction as high risk. In response to tills determination, visualization engine 1310 causes graphic visualization 1500 to mclude only a subset of icons , including shipping address icon 1410 , merchant icon 1406, PAN icon 1412, and device profile icon 1420 corresponding to the categories and anchors identified by the enhanced reason code as eontribtitmg most heavily to tire authentication risk analysis.
In some embodiments, visualization engine 1310 dynamically adds additional icons to the subset that may be of interest based on the initially identified risk events. For example, in the illustrated embodiment, visualization engine 1310 fiirther causes graphic visualization 1500 to include billing address icon 1414, email icon 1416, and IP address. icon 1422 because the fact that the corresponding anchors were not activated by RBA engine 1312 for the displayed transaction may further support a conclusion of suspicious account activity, despite the absence of a specific detected risk event for these anchors. Alternatively, visualization engine 1310 causes graphic visualization 1500 to include icons solely for the anchors and categories specifically associated with the value of the enhanced reason code. In some embodiments, graphic visualization 1500 is configured to visually highlight icons con'espondiag to anchors or categories that are activated/verified for a selected transaction in a first highlight mode, and to visually liighliglit icons corresponding to anchors or categories that are- associated with risk events for a selected transaction in a second highlight mode. For example, in the illustrated embodiment, graphic visualization 1500 includes shipping address icon 1410 and merchant icon 1406 highlighted in the first highlight mode because they correspond respectively to the activated/verified shipping address anchor and the overall low-risk assessment of the merchant, arid also includes PAN icon 1412 and device pi of He icon 1420 highlighted in the second highlight n lode because they correspond respectively to the risk event identified for the device profile anchor and the tagged su-.piciuus account u e PAN s acfnitv Mnew ei the additional icon'- added to the subset, associated with neither a validation nor a risk event, are displayed in a neutral mode that differs from both the first highlight mode and the secund highlight mode.
Further in the example embodiment, the subset of icons is displayed as an array around a central lean, and respective connector lines 1510 are displayed between the central icon and each of the icons in the array, giving graphic visualization 1500 the appearance of a connected graph, as is implemented in additional embodiments described below. Alternatively, graphic visualization 1500 does not include connector lines 1510.
In certain embodiments, the first highlight mode includes a first change in one or more of a connector line color, a connector line thickness, a fill color, a border color, a border thickness, and an element size of the icon corresponding to the anchor or category, and the second highlight mode includes a second change in one or more of file connector line color, the connector line thickness , file fill color, the border color, the border thickness, and the element size of the icon eonesponding to the anchor or category. For example, in the illustrated embodiment, the first highlight mode includes thickening the border of, and using a green color for, at least one of the icon and the connector as the first highlight mode, and the second highlight mode includes thickening die border of and using a red color for, at least one of the icon and the connector as the second highlight mode. hi the example embodiment, graphic visualization 1500 fiutiier includes a textual display including the value 1515 of the enhanced reason code and summary captions 1520 for any activated-' verified anchors and/or risk events associated with the selected transaction. Alternatively, graphic visualization 1500 does not include at least one of value 1515 and summary captions 1520.
FIG, 15B is another example of graphic visualization 1500 shewn in FIG. 15A. hi the illustrated example, the stored RBA result data for the transaction selected for display includes the enhanced reason code having a value of ZBA.” The activated/verified anchors and detected risk events associated with ZB A are similar to those for the value ZAA shown in FIG. 1:5 A, except ZB A further reflects that RBA engine 1312 detected not just a cliange in device or device profile information as compared to previous transactions , but specifically that the device operating system changed to an earlier version as compared to previous transactions. Which is more serious risk event (i.e. , changed device information as in ZAA may be innocuous if the authentic user installed an tipdate, but it is comparatively rare that an authentic user update would change a device to an earlier version of the operating system as in ZBA). Graphic visualization 1500 is configured to present the summary caption 1520 tor this more serious risk event in a separate area 1522 highlighted in the second highlight mode.
In addition, ZBA fiuther reflects that RB A engine 1312 detected that the device used in the transaction was associated with an ongoing coordinated fraud attack at tire time of the transaction. Graphic visualization 15U0 is likewise configured to present the summary caption 1520 for this serious risk event in the separate area 1522 liiglilighted hi the second highlight mode. Moreover, in some embodiments, graphic visualization 1500 is configured to represent this connection of the device to activity outside the displayed transaction by adding an additional connector 1512 to the displayed connectors 1510. More specifically, connector 1512 extends from device profile icon 1420, corresponding to the risk event, towards an outside edge of the graph to reflect the connection to other transaction activity^ Graphic visualization 1500 is further configured to highlight connector 1512 in the second highlight mode. Thus, in the example embodiment, visualization engine 1310 is configured to dynamically update the displayed graph in graphic visualization 1500 to include more, fewer, and/or different graphic elements.
Graphic visualization 1500 caused to be displayed by visualization engine 1310 provides a technical advantage by dynamically updating the displayed graphic elements to focus on the most important anchors and risk events encoded in the enhanced reason code for the particular selected transaction. For example, this enables an analyst using the analyst computing device to quickly focus on the factors that were most relevant to the authentication analysis for each historical transaction. Tire ability of graphic visualization 1500 to dymamically locus on the most relevant information from among a wide array of information regarding a transaction within a single-screen, easily comprehensible icon-based (and, in some embodiments, connector-based) gr aphic format is a technical improvement over conventional transaction-dispute analysis systems, which require the user to scroll through individual pieces of data and mentally re-construct the underlying factors represented by the data. Moreover, those of skit! in the art will appreciate that the enhanced reason codes that encode this variety and depth of information require, in the example embodiment, only three bytes of storage for each historical transaction, which provides a further technical advantage in the comparatively small amount of database storage space required to support the provision of graphic visualization 1500 for particular transactions, or sets of transactions, on demand from among an extremely large number of historical transactions processed by authentication platform 1314.
FIG. 16 is another example graphic visualization 1600 generated by visualization engine 1310 in communication with authentication platform 1314 and/or payment network 522. With reference to FIGs. 13 and 16, in some embodiments, as noted above, the serv er application implementing x isuahzatiou engine 1310 piox ides API foneuonality available to be invoked via API calls from the client application executable on the analyst' computing device of any of issuer 514, merchant environment 1.304, acquirer 520, payment network 522, or another party to cause graphic visualization 1600 to be displayed on the client computing device. The API architecture provides a technical advantage as discussed above with respect to FIG.
15 A.
Grapliic visualization 1600 enables an analyst using the client application executing on the analyst computing device to investigate links between stored authentication data for a transaction of interest and stored authentication data for other transactions processed by authentication platform 1314. For example, the analyst may select a particular transaction that was confirmed (e,g,, via an investigation after a cardholder complaint) to be fraudulent after the authentication process was completed. In some embodiments, the user interface provided by graphic visualization 1600 provides a technical advantage by facilitating ah identification by the analyst of other transactions that may have been, fraudulent, and/or a deteimination by the analyst as to where and when the cardholder 's account infonnation was fraudulently obtained, i.e., as to a source of a breach of cardholder account information. Thus, other potentially fraudulent completed transaetioas may be idenfified, and/oi fhmie fraudulent transactions may be prevented from being authenticated and authorized. hi the example embodiment, the client application sends an API call to invoke graphic visualization 1600 in response to the analyst selecthig a historical transaction (e.g., a historical transaction that was subsequently confirmed to be fraudulent; fbt link investigation. For example, the analyst selects the transaction by selecting a control provided on graphic visualization 1400 or graphic visualization 1500 while the analyst is viewing the fransaction therein. In response, visualization engine 1310 causes graphic visualization 1600 to display, on the client computing device, a selected-transaction icon 1602 corresponding to the selected transaction . In addition, in some embodiments, graphic visualization 1600 also includes a list 1606 of selectable time intervals for the link analysis. When the analyst “clicks” or otherwise selects a time interval from, the list 1606, the client application generates an API call to visualization engine 1310; In response to the API call, visualization engine 1310 retrieves stored authentication data previously generated by RBA engine 1312 for transactions occurring within the selected time interval. Alternatively, graphic visualization 1600 does not include time interval list 1606 and/or visualization engine 1310 automatically applies a default time interval for retrieving the data.
Visualization engine 131 b analyzes rhe rem eved data ro identify' ‘linked’' transactions, i.e., transactions in the applicable time interval that have values in one or more anchor fields that match the values in the corresponding anchor fields for the selected transaction.
In some embodiments, graphic visualization 1600 includes a respective linked-transaction icon 1604 for each of the identified linked transactions .
Alternatively , e.g., if a number of linked transactions is too large, graphic visualization 1600 includes the respective linked-transaction icon 1604 solely for a subset of the identified linked transactions. For example, visualization engine 1310 selects the subset to include the linked transactions having the most data fields in common with the selected transaction. In die illustrated embodiment, each transaction icon 1602, 1604 is accompanied by an icon labelled DTI/ ATA io illustrate that stored RBA result data is available for the transaction.
In the example embodiment, graphic visualization 1600 displays selected-tiansaction icon 1602 and liaked-tansactioB icons 1604 as nodes in a connected graph. Tire connections or “edges” between each pan of nodes represent the number of common values in the anchor fields for the corresponding pair of transactions, aggregated with respect to each of the reason code categories. For example, in the illustrated embodiment, the reason code categories are again cardholder (or payor), environment (or device), and merchant (or payee), and thus there are tip to three comiecti.ons displayed between each pair of nodes : payor connections 1610, environment connections 1612, and payee connections 1614. Alternatively, graphic visualization 1600 includes any suitable number and/or types of connections. For example, a single type of connection may be used between each node to represent a total number of common values in anchor fields aggregated across all reason code categories.
In some embodiments, the types of connections 1610, 1612 , and 1614 are distinguished visually, for example by using different colors, line types, and/or thicknesses for each type of edge 1610, 1612, and 1614. Graphic visualization 1600 may include a legend or key 1620 to identify the distinguishing visual characteristics. Moreover, a numeric value, representing the number of common values in each category, appears next to each coimection. Altefnativeiy . the number of common Values in the category corresponding to the coimection is indicated in another suitable fashion, such as by a thickness of the connection, or is not indicated. In the example embodiment, if there are zero common values between a pair of transactions in a given reason code category, the connection 1610, 1612, or 1614 for that category is not displayed between the corresponding pair of nodes.
Mote specifically, in the illustrated embodiment, graphic visualization 1600 includes selected-transaction icon 1602, also labelled as “TXT” (i.e., transaction 1) and two linked-tiaiisactioii icons 1604, also labelled as “1 X2” and “TX3” respectively. Payor connection 1610 between TX 1 and TX2. is labelled with a “2,” indicating two common values in the anchor fields associated with the cardholder/payor reason code category. Payor connection 1610 between TX2 and TX3 is also labelled with a “2,” indicating two common values in the anchor fields associated with the cardliolder/payor reason code category. Payor coimection 1610 is not displayed between TXI and TX3. indicating zero common values in the anchor fields associated with the cardliolder/payor reason code category. Similarly, enviroimient connection 1612 between TXI and TX3 is labelled with a “3,” indicating three common values in the anchor fields associated with the euvironmeut/device reason code category, and environment connection 1612 is not displayed between TXI and TX2 or between TX2 and TX3, indicating zero common values in the anchor fields associated with the environmeuhdevice reason code category. Finally, payee connection lr»14 between TXI and 1X2 is labelled with a 'T , ' indicating one common valise- in the anchor fields associated with the merehaut/payee reason code category, and payee connection 1614 is not displayed between TXI and TX3 or between TX2 and TX3, indicating zero common values in tire anchor fields associated with the merchant/payee reason code category. Based on the visual details provided by the connected, graph format of graphic visualization 1600, an analyst might conclude that the high number of commonalities in the environment category between TXI and TX3 suggests that TX3 was initiated by a Itandster using the same device/etivironmeat as the confirmed fraudulent transaction TX1. Accordingly, the analyst may initiate appropriate investigation and/or remedial action with respect to TX3. The ability of graphic visualization 1600 to pack a wide array of information regarding multiple linked transactions into a single- screen, easily comprehensible connected graph format is a technical improvement over conventional transactiondispute analysis systems, which require the user to scroll through individual pieces of data and mentally re-constiact the underlying factors represented by the data.
FIG. 17 is another example graphic visualization 1700 generated by visualization engine 1310 in commumcatiou with authentication platform 1314 and/or payment network 522. With reference to FIGs. 13 and 17, in some embodiments, as noted above, the server application implementing visualization engine 1310 provides API fimctionatity available t o be invoked via API calls from the client application executable on the analyst computing device of any of issuer 514, merchant environment 1304, acquirer 520, payment network 522, or another .party to cause graphic visualization 1700 to be displayed on the client computing device. The API architecture provides a technical advantage as discussed above with respect to FIG. 15A.
Graphic visnahzation 1700 enables an analyst using the client application executing on the analyst computing device to investigate links between stored authentication data for transactions involving a payment account of interest and stored authentication data for other transactions processed by authentication platform 1314. For example, the analyst may select a particular payment account that was confnmed (e.g., via an investigation after a cardholder complaint) to be stolen. In some embodiments, foe user interface provided by graphic visualization 1700 provides a technical advantage by facilitating an identification by the analyst of other transactions that may have been fraudulent, and/or a determination by the analyst as to where and when tile payment account information was fiaodalently obtained, i.e., as to a source of a breach of cardholder account information. Thus, other potentially fraudulent completed transactions may be identified, and/or future fraudulent transactions may be prevented from being authenticated and authorized.
In the example embodiment, the client application sends an API call to invoke graphic visualization 1700 in response to the analyst selecting a payment account (e.g., a payment account that has been confirmed as initiating fi’auduleni transactions) for link investigation. For example, the analyst selects the payment account by double-clicking or otherwise selecting P AN icon 1412 provided on graphic visualization 1400 or graphic visualization 1500 while the analyst is viewing a transaction therein, in response, visualization engine 1310 causes graphic Msuahzaram l~00 to display on the chenr computing device, a selecred-accouiH icon 1702 corresponding to (lie selected payment account. Is addition, in some embodiments, graphic visualization 1700 again includes list 1606 of selectable time intervals for the link analysis. When the analyst "‘clicks” or otherwise selects a time interval from the list 1606, the client application generates an API call to visualization engine 1310. In response to the API call, visualization engine 1310 retrieves stored authenticaifon data previously generated by RBA engine 1312 for transactions occiffimg within the selected time interval. Alternatively, graphic visualization 1700 does not include time interval list 1606 and/or visualization engine 1310 automatically applies a default time interval for retrieving the data. Visualization engine 1310 analyzes the retrieved data to identify “linked” transactions for the selected payment account, including transactions initiated by the selected payment account in the applicable time interval, as well as transactions in the applicable time interval tint t have values in one or more anchor fields that match the values in the corresponding anchor fields for the transactions initiated by the selected payment account. In the example embodiment, graphic visualization 1700 displays, as a node in a connected graph, anchor- value icons 1704 conesponding to values that appear in the anchor fields of the linked transactions . In some embodiments, graphic vtisualization 1700 includes a respective anchor-value icon 1704 for each of the distinct values that appear in the anchor fields of the stored authentica tion data for the linked transactions. Alternatively, e,g., if a number of di stinct values is too large, graphic visualization 1700 includes the respective anchor- value icon 1704 solely for a subset of the identified distinct values. For example, visualization engine 1310 selects the subset to include the distinct values that appear across the greatest number of transactions.
The connections 1710 or ‘"edges” between each pair of nodes represent the number of common transactions for the pair of nodes , i.e,, the number of transactions in which the values represented by the pair of nodes both appear in the stored authentication data for the transaction. Moreover, a nnmeric value, representing the number of common transactions between the two nodes, appears next to each connection 1710. Alternatively, the number o f c o mm on transactions corresponding to the connection 1710 is indicated in another suitable fashion, such as by a thickness of the connection 1710, or is not indicated. In the example embodiment, if there are zero common transactions between a pair of values , the connection 1710 is not displayed between the corresponding pair of nodes.
In some embodiments, the connected graph embodied by graphic visualization 1700 may facilitate the analyst in tracing second- and third-order connections between selected-account icon 1702 and other anchor- value icons 1704, in order to quickly locate other values that may be compromised along with the payment account corresponding to selected-account icon 1702. For example, in the illustrated embodiment, an anchor-value icon 1706 associated with another payment account is a second-order connection of selected- account icon 1702 via anchor- value icon 1708. More specifically, the number “2” displayed along comiection 1710 between selected-sccoimt icon 1702 and anchor- value icon 1708 indicates the selected payment account was used in two tinnsactimis involving anchor-value Icon 170S, and the number “1” displayed along connection 1710 between anchor- value icon 1706 and anchor-value icon 1708 indicates the other payment account was also used in a transaction involving anchor-value icon 1708, which indicates that the other payment account may have been exposed in a common account breach with the selected payment account.
In the example embodiment, connections 1710 emanating from selected-account icon 1702 are visually highlighted relative to other connections 1710. For example, the highlighting of direct connections to selected-account icon
1702 may further facilitate the analyst in tracing second- and tiiird-order connections between selected-account icon 1702 and other anchor-value icons 1704. hi some embodiments, the anchor-value icons 1704 for anchors in different reason code categories are distinguished visually, for example by using different fill colors, border colors, and/or border line types for anchor-value icons 1704. For example, in the illustrated embodiment, the reason code categories are again cardholder (or payor), environment (or device), and merchant (or payee), and anchor-value icons 1704 for anchors in die payor category are displayed with a red border, anchor-value icons 1704 for anchors in the environment category are displayed with a yellow border, and anchor-value icons 1704 for anchors in the payee category are displayed with a green border. Graphic visualization 1700 may include a legend or key 1720 to identify the distinguishing visual characteristics. This additional information conveyed by graphic visualization 1700 may further aid the analyst in tracing sources and progress of fraudulent activity. Hie ability of graphic visualization 1700 to pack a wide array of information regarding multiple linked transactions into a single-screen, easily comprehensible connected graph format is a technical improvement over couvemional fransaction-dispute analysis systems, which require the user to scroll through individual pieces of data and mentally re-construct the underlying factors represented by the data.
A processor or a processing element may employ artificial intelligence Md/or be trained using supervised or unsupervised maclime learfiing, and the machine learning program may employ a neural network, which may be a convolutional neural network, a deep learning neural network, or a combined learning module or program that learns in two or more fields or areas of interest. Machine learning may involve identifying and recognizing patterns in existing data in order to facilitate making predictions for subsequent data. Models may be created based upon, example inputs in order to make valid and reliable predictions for novel inputs. Addltionally or altentativefy, the machine learning programs may be trained by hrputting sample data sets or certain data into the programs, such as image data, text data, report data, and/or numerical analysis. The machine learning programs may utilize deep learning algorithms that may be primarily focused on pattern recognition, and may be trained after processing multiple examples. The machine learning programs may include Bayesian program learning (BPL), voice recognition and synthesis. Image or object recognition, optical character recognition, and/or natural language processing - either individually or in combination. The machine learning programs may also include natural language processing, semantic analysis, automatic reasoning, and/or machine learning .
In supervised machine learning, a processing element may be provided with example inputs and their associated otitputs, and may seek to discover a general rale that maps inputs to outputs, so that when subsequent novel inputs are provided the processing element may, based upon the discovered rule, accurately predict the correct output. In unsupervised machine learning, the processing element may be required to find its own structure in unlabeled example inputs. In one embodiment, machine learning techniques may be used to extract data about the computer device, the user of the computer device, the computer network hosting the computer device, services executing on the computer device, and/or other data. Based upon these analyses, the processing element may learn how to identify characteristics and patterns that may then be applied to training models, analyzing transaction and authentication data, arid detecting and analyzing risk.
As used herein, the term “non-transitoiy computer-readable media” is intended to be representative of any tangible computer-based device implemented in any method or reclmufogy foi short-term and long-term storage of information, such as, computer-readable instructions, data structures, program modules and submodules. or other data in any device^ Therefore, tire methods described herein may be encoded as executable instructions embodied in a tangible, nbn-transitory, computer readable medium, including, without Ihnitation, a storage device and/or a memoiy device. Such instructions, when executed by a processor, cause the processor to perform at least a portion of the methods described herein, Moreover, as used herein, the term riion-transitory computer-readable media” includes all tangible, computer- readable media, including, without limitation, non-transitoiy computer storage devices, including, without limitation, volatile and nonvolatile media, and removable anduon-removable media such, as a firmware, physical and virtual storage, CD- ROMs, DVDs, and any other digital source such as a network or the Internet as well as yet to be developed digital means, with the sole exception being a transitory, propagating signal This written description uses examples to disclose the disclosure, including the best mode, and also to enable auy person skilled in the art to practice the embodiments, inehiding making and using any devices or systems and performing any incorporated methods. The patentable scope of fie disclosure is defined by fie claims, and may include other examples that occur to those skilled in the art. Such oilier examples are intended to be within the scope of the claims if they have structural elements that do not differ from the literal language of fie claims, or if they include equivalent structural elements with insubstantial differences from fie literal language of the claims.

Claims

WHAT IS CLAIMED IS:
1. A computer-implemented method for authenticating an onlineuser, tiie method implemented using a computing system including at least one processor and a memory device, the method comprising steps performed by the at least one processor of: receiving, from a requestor server in communication wh a merchant website, an authentication request message including authentication data collected from a user computing device during an online interaction with the merchant website; extracting the authentication data from the authentication request message; applying a risk-based authentication (MBA) engine to the autiieniication data to obtain RBA result data including a reason code, the reason code including no more than three bytes of data; and causing tire reason code to be embedded in an au thorization request message generated during the online interaction and routed to a decisfonmg server via a payment network, the authorization request message formatted according to a set of prop! ietars cviunnimeahum standards piomulgafed b\ Hie p-wment nebs oil for exchange of data between institutions that are members of the payment network,
2, The coraputer-implemented method according to Claim 1, wherein causing the reason code to be embedded in the authorization request message comprises transmitting the RB A result data including the reason code to the requestor server, wherein lire requestor server is configured to embed the reason code into a pawent request sent to a gatevyay to the payment network.
3. Idle computer-implemented method according to Claim I , wherein causing the mason code to be embedded in the authorization request, message comprises transmitting the reason code dir ectly to a payment network server computing device, wherein the payment network server computing device is configured to embed the reason code into the authorization request message prior to forwarding the authorization request message to the decisioning setver.
4. The computer-implemented method according to Claim 1, wherein applying the RBA engine to the authentication data comprises: establishing a plurality of reason code categories, each reason code category including a plurality of anchors; identitying, based on the extracted authentic alien data, at least one of i) one or more verifications of the plurality of anchors, and ii) one or more risk events associated with one or more of the anchors ; and generating the reason code based on the identified at least one of the one or more verifications and tire one or more risk events.
5. The computer-implemented method according to Claim 4, further comprising; storing the RBA result data in a database accessible by a visualization engine; receiving, by the visualization engine from a client application executing on an analyst computing device, a request identitying a transaction associated with the extracted authentication data; retrieving the RBA result data from the database; and causing, in response to the request, the client application to display a graphic visualization including icons that represent the reason code categories and the plurality of anchors, wherein the icons corresponding to the identified at least one of the one or more verifications and the one or more risk e vents are lugldiglited,
6. The computer-implemented method according to Claim 4, firrther comprising; storing the RBA result da ta and fire authentication data in a database accessible by a visualization engine; receiving, by the visualization engine from a client application executing on an analyst computing device, an API call identifying a selected transaction associated with the extracted authentication data; retrieving, in response to the API call, the RB A result data and the authentication data from the database; identitying, in the database, linked transactions, wherein the linked transactions comprise historical transactions in an applicable time interval that have values in fields corresponding to one or more of the plurality of anchors that match values hi the coii'esponding fields for the selected transaction; and causing, in response to the API call, the client, application to display a graphic visualization comprising a connected graph including node icons that represent the identified transaction and the linked transactions, and connections between the node icons corresponding to a number of common values in the fields for the transactions represented by the node icons.
7. Hie computer-tinplemented method according to Claim 4, further comprising: storing the RBA result data and the authentication data in a database accessible by a visualization engine; receiving, by the visualization engine from a client application executing on an analyst computing device, an API call identifying a selected account associated with the extracted authentication data; retrieving, in response to the API call, the RBA result data and the authentication data from the database; identifying, in the database, linked transactions, wherein tile linked transactions comprise a first set of historical transactions in an applicable time interval that were initiated by the selected account, plus a second set of historical transac tions in the applicable time interval that have values in fields corresponding to one or more of the plurality of anchors that match values in tire corresponding fields for tire first set of his torical transactions; and causing, in response to the API call, the client application to display a graphic visualization comprising a connected graph including node icons that represent the values in the fields corresponding to one or more of the plurality of anchors, and connections between the node icons corresponding to a number of the linked transactions in which the values represented by the nodes appear in the corresponding stored authentication data.
8, A computing system for authenticating an online user, said computing system comprising at least one processor and a memory device, said at least one processor programmed to perform steps including: receiving, from a requestor server in communication with a merchant website, an authentication request message including authentication data collected from a user computing device during an online interaction with the merchant website; extracting the authentication data from the authentication request message; applying a risk-based authentication (RBA) engine to the authentication data to obtain. RBA result data inehRiing a reason code, the reason code inchiding no more than three bytes of data; and causing the reason code to be embedded in an authorization reques t message generated during the online interaction and routed to a decisioning server via a payment network, the authorization request message formatted according to- a set of proprietary communications standards promulgated by the payment network for exchange of data between institutions that are members of the payment network.
9. The computing system according to Claim 8, wherein said at least one processor is further programmed to cause the reason code to be embedded in the authorization request message by ti'ansniitting the RBA result data including the reason code to the requestor server, wherein the requestor server is configured to embed the reason code into a payment request sent to a gateway to the payment network.
10. The computing system according to Claim wherein said at least one processor is further programmed to cause the reason code to be embedded in the authorization request message by transmuting the reason code directly te a payment network server computing device, wherein the payment network server computing device is configured to embed the reason code into the authorization request message prior to forwarding the authorization request message to tire decisioning server.
11. Idle computing system according to Claim 8, wherein said at least one processor is further programmed to apply the RBA engine to the authentication data by: establishing a plurality of reason code categories, each reason code category including a plurality of anchors ; identifying, based on the extracted authentication data, at. least one of t) one or more verifications of the plurality of anchors, and if) one or more risk events associated with one or more of the anchors; and generating the reason code based on the identified at least one of the one or more verifications and the one or more risk events.
12. The computing system according to Claim 11 , wherein said at least one processor is further programmed to perform additional steps including: storing the RBA result data in a database accessible by a visualization engine; receiving, by the visualization engine from a client application executing on an analyst computing device, a request identifying a transaction associated with the extracted authentication data; retrieving the RBA result data from the database; and causing, in response to the request, the client application to display a graphic visualization including icons that represent the reason code categories and the plurality of anchors, wherein the icons corresponding to the identified at least one of the one or more verifications and the one or more risk events are highlighted.
13. The computing system according to Claim 11 , wherein said at least one processor is finther programmed to perform additional steps including; storing the RBA result data and the authentication data in a database accessible by a. visualization engine; receiving, by the visualization engine from a client application executing on an analyst comiWing device, an API call Identifying a selected transaction associated with the extracted authentication data; retrieving, in response to tire API call, tire RB A result data and the authentication data from the database; identifying, in the database, linked transactions, wherein the linked transactions comprise historical transactions in an applicable time interval that have values in fields corresponding to one or more of the plurality of anchors that match values in the corresponding fields for the selected tranxaction; and causing, in response to the API call, the client application to display a graphic visualization comprising a connected graph including node icons that represent the identified transaction and the linked transactions, and connections between the node icons correspondhig to a number of common values in the fields for the transactions represented by the node icons.
14. The computing system according to Claim 11, wherein said at least one processor is birther prograimned to perform additional steps including: storing the RBA result data and the authentication data in a database accessible by a visualization engine; receiving, by the visualization engine from a client application executing on an analyst computing device, an API call identifying a selected account associated with die extracted authentication data; retrieving, in response to the API call the RB A result data and the authentication data from the database; identifying, in the database, linked transactions, wherein the linked transactions comprise a first set of historical transactions in an applicable time interval that were initiated by the selected account, plus a second set of historical transactions in the applicable time interval that have values in fields corresponding to one ar more of the plurality of anchors that match values in the corresponding fields for the first set of historical transactions: and causing, in response to the API call, the client applicatioii to display a
.graphic visualization comprising a connected graph including node icons that represent the values in the fields corresponding tp one or more of the plurality of anchors, and connections between the node icons corresponding to a number of the linked transactions in which the vahies represented by tire nodes appear in tire corresponding stored authentication data.
15. At least one non-tiansitory computer-readable medium comprising instructions stored thereon for authenticating an online user, the instructions executable by at least one processor to cause die at least one processor programmed to perform steps including: receiving, from a requestor server 'in commwiication with a merchant website, an authentication request message including authentication data collected from a user computing device during an online interaction with the merchant website; exteacting the atohentication data from the authentication request message; applying a risk-based authentication (RBA) engine to the authentication data to obtain RBA result data including a reason code, the reason code includmg no more than three bytes of data; and causing the reason code to be embedded in an authorization r equest message generated during toe online interaction and routed to a decisioning server via a payment network, the authorization request message formatted according to a set of proprietary communications standar ds promulgated by the payment network for exchange of data between institutions that are members of the payment network.
16. The at least one non-trapsitory computer-readable medium according to Claim 15, wherein said instructions further cause the at least one processor to cause the reason code to be embedded in the authorization request message by transmitting the RBA result data including toe reason code to the requestor server, wherein the requestor server is configured to embed the reason code into a payment request sent to a gateway to the payment network.
17. The at least one non-transitory computer-readable medium according to Claim 15, wherein said instructions further cause die at least one processor to cause the reason code to be embedded in the authorization request, message by transmitting the reason code directly to a payment network server computing device, wherein the payment network server computing device is configured to embed the reason code into the authorization request message prior io forwarding the authorization request message to the decisioning server.
18. Hie at least one nun-transitory computer-readable medium according to Claim 15, wherein said instructions further cause the at least one processor to apply the RBA engine to the authentication data by: establishing a plurality of reason code categories, each reason code category including a plurality of anchors; identifying, based on the extracted authentication data, at least one of i) one or more verifications of the plurality of anchors, and ii) one or more risk events associated with one or more of the anchors; and generating the reason code based on the identified at feast one of the one or more verifications and the one or more risk events .
19. Hie at least one non-transitory computer-readable medium according to Claim 18, wherein said instructions fiirther cause the at least one processor to perform additional steps including: storing the RBA result data in a database accessible by a visualization engine: receiving, by the visualization engine from a client application executing on an analyst computing device, a request identifying a transaction associated with die extracted authentication data: retrieving the RBA result data from the database; and causing, in response to the request, die client application to display a graphic visualization including icons that represent the reason code categories and the plurality of anchors, wherein the icons corresponding to tire identified at feast one of the one or more verifications and the one or more risk events are highlighted.
20, The at least one non-transiiory computer-readable medium according io Claim 18, wherein said instructions further cause the at least one processor to perform additional steps including: storing the RBA result data and the authentication data in a database accessible by a visualization engine; receiving, by the visualization engine from a client application executing on an analyst computing device, an API call identifying a selected transaction associated with the extracted authentication data; retrieving, in response to the API call, the RB A result data and the authentication data front the database: identifying, in the database, linked transactions, wherein the linked transaciioiis comprise historical transactions in an applicable time interval that have values in fields coiresponding to one or more of the plurality of anchors that match values in the conesponding fields for the selected transaction; and causing, in response to the API call, the client application to display agraphic visualization comprising a connected graph including node icons that represent the identified transaction arid the linked transactions, and connections betweea the node icons corresponding to a number of common values in the fields for the transactions represented by the node icons.
PCT/US2022/052201 2021-12-31 2022-12-08 Systems and methods for authenticating online users and providing graphic visualizations of an authentication process WO2023129354A1 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US17/567,015 US20220122087A1 (en) 2018-06-22 2021-12-31 Systems and methods for authenticating online users and providing graphic visualizations of an authentication process
US17/567,015 2021-12-31

Publications (1)

Publication Number Publication Date
WO2023129354A1 true WO2023129354A1 (en) 2023-07-06

Family

ID=87000225

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/US2022/052201 WO2023129354A1 (en) 2021-12-31 2022-12-08 Systems and methods for authenticating online users and providing graphic visualizations of an authentication process

Country Status (1)

Country Link
WO (1) WO2023129354A1 (en)

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20090144213A1 (en) * 2007-11-30 2009-06-04 Ebay Inc. Graph pattern recognition interface
US9330416B1 (en) * 2013-12-30 2016-05-03 Emc Corporation Visualization of fraud patterns
US9779236B2 (en) * 2014-05-21 2017-10-03 Microsoft Technology Licensing, Llc Risk assessment modeling
US10515366B1 (en) * 2013-12-24 2019-12-24 EMC IP Holding Company LLC Network neighborhood topology as a predictor for fraud and anomaly detection
US20190392449A1 (en) * 2018-06-22 2019-12-26 Mastercard International Incorporated Systems and methods for authenticating online users
US20220122087A1 (en) * 2018-06-22 2022-04-21 Mastercard International Incorporated Systems and methods for authenticating online users and providing graphic visualizations of an authentication process

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20090144213A1 (en) * 2007-11-30 2009-06-04 Ebay Inc. Graph pattern recognition interface
US10515366B1 (en) * 2013-12-24 2019-12-24 EMC IP Holding Company LLC Network neighborhood topology as a predictor for fraud and anomaly detection
US9330416B1 (en) * 2013-12-30 2016-05-03 Emc Corporation Visualization of fraud patterns
US9779236B2 (en) * 2014-05-21 2017-10-03 Microsoft Technology Licensing, Llc Risk assessment modeling
US20190392449A1 (en) * 2018-06-22 2019-12-26 Mastercard International Incorporated Systems and methods for authenticating online users
US20220122087A1 (en) * 2018-06-22 2022-04-21 Mastercard International Incorporated Systems and methods for authenticating online users and providing graphic visualizations of an authentication process

Similar Documents

Publication Publication Date Title
US11875349B2 (en) Systems and methods for authenticating online users with an access control server
US20220122087A1 (en) Systems and methods for authenticating online users and providing graphic visualizations of an authentication process
US11792176B1 (en) Scalable risk-based authentication methods and systems
US11880842B2 (en) United states system and methods for dynamically determined contextual, user-defined, and adaptive authentication
US11494780B2 (en) Methods and systems for verifying cardholder authenticity when provisioning a token
US11392953B2 (en) Data analysis systems and methods for identifying recurring payment programs
EP3588421A1 (en) Systems and methods for authenticating online users in regulated environments
US11715106B2 (en) Systems and methods for real-time institution analysis based on message traffic
US20190188720A1 (en) Systems and methods for enhanced authorization processes
US11379807B2 (en) Methods and systems for initiating a financial transaction by a cardholder device
US11631083B2 (en) Systems and methods for identifying fraudulent common point of purchases
US20180121907A1 (en) Systems and methods for enhanced verification of new users to a network based service
EP3588419B1 (en) Systems and methods for authenticating online users with an access control server
US20210233088A1 (en) Systems and methods to reduce fraud transactions using tokenization
US20230137734A1 (en) Systems and methods for improved detection of network attacks
CN110633986B (en) System and method for authenticating an online user
US20220138754A1 (en) Systems and methods for detecting suspect activity over a computer network
EP3588420A1 (en) Systems and methods for authenticating online users
US11948189B2 (en) Systems and methods for identifying full account numbers from partial account numbers
WO2023129354A1 (en) Systems and methods for authenticating online users and providing graphic visualizations of an authentication process

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 22917178

Country of ref document: EP

Kind code of ref document: A1