Search

EP-4736100-A1 - SYSTEMS AND METHODS FOR LOCATION BASED VIRTUAL CERTIFICATION NUMBER USE

EP4736100A1EP 4736100 A1EP4736100 A1EP 4736100A1EP-4736100-A1

Abstract

Systems and methods include secure virtual certification number (VCN) use, and include receiving a VCN generation request comprising a primary account number (PAN) and a location identifier, generating a VCN based on the PAN, the VCN being associated with a geographical location corresponding to the location identifier, receiving a VCN use request from an external entity, the VCN use request comprising the VCN, receiving a use location data associated with the VCN use request, comparing the use location data to the geographical location associated with the VCN, and providing one of a VCN use authorization or a VCN use denial based on comparing the use location data to the geographical location.

Inventors

  • Fenichel, Allison
  • SNEIDER, Amanda

Assignees

  • Capital One Services, LLC

Dates

Publication Date
20260506
Application Date
20240618

Claims (20)

  1. 1 . A method for secure virtual certification number (VCN) use, the method comprising: receiving a VCN generation request comprising a primary account number (PAN) and a location identifier; generating a VCN based on the PAN, the VCN being associated with a geographical location corresponding to the location identifier; receiving a VCN use request from an external entity, the VCN use request comprising the VCN; receiving a use location data associated with the VCN use request; comparing the use location data to the geographical location associated with the VCN; and providing one of a VCN use authorization or a VCN use denial based on comparing the use location data to the geographical location.
  2. 2. The method of claim 1 , wherein the use location data is generated based on sensor data from a sensor of a user device.
  3. 3. The method of claim 2, further comprising: triggering the VCN use request based on communication from the user device to an external device associated with the external entity; and receiving the sensor data from the sensor of the user device in response to triggering the VCN use request.
  4. 4. The method of claim 1 , wherein the use location data is generated based on sensor data from a sensor of an external device associated with the external entity.
  5. 5. The method of claim 4, further comprising: triggering the VCN use request based on communication from a user device to the external device; and receiving the sensor data from the sensor of the external device in response to triggering the VCN use request.
  6. 6. The method of claim 1 , wherein the use location data is based on a physical location of one of a user device or an external device associated with the external entity, as determined by a location sensor configured to detect the physical location of the one of the user device or the external device.
  7. 7. The method of claim 6, wherein the location sensor is configured to detect the physical location of the one of the user device or the external device based on one or more of a satellite communication, a triangulation, or a location positioning.
  8. 8. The method of claim 1 , wherein the VCN use request further comprises transaction data and further comprising: mapping the transaction data to a point of sale source device having source device data comprising point of sale source device location information; comparing the source device location information to the geographical location; and providing the one of the VCN use authorization or the VCN use denial further based on comparing the source device location to the geographical location.
  9. 9. The method of claim 1 , wherein the VCN generation request further comprises a time value and further comprising: receiving a timestamp associated with the VCN use request; comparing the time value to the timestamp; and providing the one of the VCN use authorization or the VCN use denial further based on comparing the time value to the timestamp.
  10. 10. The method of claim 1 , wherein the VCN generation request further comprises a rule and further comprising: receiving transaction data associated with the VCN use request; extracting a rule property associated with the rule from the transaction data; comparing the rule property to the rule; and providing the one of the VCN use authorization or the VCN use denial further based on comparing the rule property to the rule.
  11. 11 .A method for secure virtual certification number (VCN) use, the method comprising: receiving a VCN use request from an external entity, the VCN use request comprising a VCN generated based on a primary account number (PAN) and associated with a geographical location; receiving a use location data associated with the VCN use request; comparing the use location data to the geographical location associated with the VCN; and providing one of a VCN use authorization or a VCN use denial based on comparing the use location data to the geographical location.
  12. 12. The method of claim 11 , wherein the VCN is generated based on a VCN generation request comprising the PAN and a location identifier associated with the geographical location.
  13. 13. The method of claim 11 , wherein the use location data is based on a physical location of one of a user device or an external device associated with the external entity, as determined by a location sensor configured to detect the physical location of the one of the user device or the external device.
  14. 14. The method of claim 13, wherein the location sensor is configured to detect the physical location of the one of the user device or the external device based on one or more of a satellite communication, a triangulation, or a location positioning.
  15. 15. The method of claim 11 , wherein providing one of the VCN use authorization or the VCN use denial is further based on at least one of comparing a VCN source identifier associated with the VCN to a transaction source identifier associated with the VCN use request, comparing a time value associated with the VCN to a timestamp associated with the VCN use request, or comparing a rule associated with the VCN to a rule property associated with the VCN use request.
  16. 16. A method for secure virtual certification number (VCN) use, the method comprising: receiving, at an external device, an indication to initiate a VCN based transaction with an external entity; providing a VCN in response to receiving the indication, the VCN generated based on a VCN generation request comprising a PAN and a location identifier associated with a geographical location; providing a use location data based on sensor data from a sensor of the external device; and receiving one of a VCN use authorization or a VCN use denial, in response to providing the VCN and the use location data.
  17. 17. The method of claim 16, wherein the indication to initiate the VCN based transaction is provided via one of a user input or an interaction between the external device and source device associated with a source.
  18. 18. The method of claim 16, further comprising initiating the external device using a user device, the initiating comprising causing the VCN to be stored at the external device.
  19. 19. The method of claim 18, wherein the external device is at least one of a wearable device, a near field communication (NFC) device, or an RFID device.
  20. 20. The method of claim 16, wherein the sensor is configured to generate the sensor data based on a physical location of the external device based on one or more of a satellite communication, a triangulation, or a location positioning.

Description

SYSTEMS AND METHODS FOR LOCATION BASED VIRTUAL CERTIFICATION NUMBER USE CROSS-REFERENCE TO RELATED APPLICATIONS [0001] This application claims the benefit of priority from U.S. Nonprovisional Application No. 18/343,030, filed on June 28, 2023, which is incorporated by reference herein in its entirety. TECHNICAL FIELD [0002] Various embodiments of the present disclosure relate generally to use of a virtual certification number (VCN), and more particularly, to systems and methods for generating one or more location specific VCNs and/or authorizing transactions based on location specific VCNs. BACKGROUND [0003] Users often use one or more certification sources (e.g., payment mechanisms) such as credit cards, debit cards, or the like, to complete transactions, such as online transactions. There has been an increase in fraud, spam, and/or theft related to certification sources. Such fraud, spam, and/or theft is often related to a fraudulent party obtaining access to certification sources (e.g., credit card numbers, payment mechanisms, or parts thereof). Such access is often obtained as a result of a user using a certification source where the fraudulent party can capture and/or use information associated with the certification source. [0004] The present disclosure is directed to addressing one or more of the above-referenced challenges. The background description provided herein is for the purpose of generally presenting the context of the disclosure. Unless otherwise indicated herein, the materials described in this section are not prior art to the claims in this application and are not admitted to be prior art, or suggestions of the prior art, by inclusion in this section. SUMMARY OF THE DISCLOSURE [0005] According to certain aspects of the disclosure, methods and systems are disclosed for virtual certification number (VCN) generation and use. [0006] According to an aspect, a method for secure virtual certification number (VCN) use includes receiving a VCN generation request comprising a primary account number (PAN) and a location identifier; generating a VCN based on the PAN, the VCN being associated with a geographical location corresponding to the location identifier; receiving a VCN use request from an external entity, the VCN use request comprising the VCN; receiving a use location data associated with the VCN use request; comparing the use location data to the geographical location associated with the VCN; and providing one of a VCN use authorization or a VCN use denial based on comparing the use location data to the geographical location. [0007] According to another aspect, a method for secure virtual certification number (VCN) use includes, receiving a VCN use request from an external entity, the VCN use request comprising a VCN generated based on a primary account number (PAN) and associated with a geographical location; receiving a use location data associated with the VCN use request; comparing the use location data to the geographical location associated with the VCN; and providing one of a VCN use authorization or a VCN use denial based on comparing the use location data to the geographical location. [0008] According to another aspect, a method for secure virtual certification number (VCN) use includes receiving, at an external device, an indication to initiate a VCN based transaction with an external entity; providing a VCN in response to receiving the indication, the VCN generated based on a VCN generation request comprising a PAN and a location identifier associated with a geographical location; providing a use location data based on sensor data from a sensor of the external device; and receiving one of a VCN use authorization or a VCN use denial, in response to providing the VCN and the use location data. [0009] It is to be understood that both the foregoing general description and the following detailed description are exemplary and explanatory only and are not restrictive of the disclosed embodiments, as claimed. BRIEF DESCRIPTION OF THE DRAWINGS [0010] The accompanying drawings, which are incorporated in and constitute a part of this specification, illustrate various exemplary embodiments and together with the description, serve to explain the principles of the disclosed embodiments. [0011] FIG. 1 depicts an exemplary setting for virtual certification number (VCN) implementation, according to one or more embodiments. [0012] FIG. 2 depicts an environment for VCN implementation, according to one or more embodiments. [0013] FIG. 3 depicts a flowchart for determining VCN authorizations, according to one or more embodiments. [0014] FIG. 4 depicts a diagram for VCN use based on location information, according to one or more embodiments. [0015] FIG. 5 depicts a flow diagram for training a machine learning model, according to one or more embodiments. [0016] FIG. 6 depicts an example of a computing device, according to one or more embodiments. DETAILED DESCRIPTION OF EMBODIMENTS [0017] Accordin