Systems and methods herein generally relate to facial recognition, and more particularly, to methods for identifying perpetrators of ATM fraud.
Currently there are multiple forms of ATM fraud. In most cases however, debit card information available on the magnetic stripe as well as the PIN number must be obtained in order to access a cardholder's account on the machine. Typically, in order to withdraw funds from a compromised account, a fraudster will go to a physical ATM location, enter a duplicate card with the copied card magnetic information and enter the PIN code. While many ATMs have video cameras observing transactions, the video turns out to be not too useful because there is no linkage between the video and methods by which to identify the perpetrator. Currently, the video is used primarily to ascertain whether the actual cardholder conducted the transaction. Catching the actual perpetrator of the fraud usually falls on the card issuing institution. Generally, the card issuing institution would rely on disabling the card to limit further loss as opposed to finding and prosecuting the perpetrator. Furthermore, since an ATM used to dispense funds is frequently not the issuing bank and since the location of the ATM does not have any financial impact from the fraud action if it is not the issuing bank, there is little incentive to expend resources needed to provide the video for prosecution purposes.
According to one exemplary system herein, an automated transaction system comprises a camera device acquiring facial data from a person located within visual range of the camera device during a transaction between the person and the automated transaction system. The facial data comprises an image obtained by the camera device. A server is operatively connected to the automated transaction system. The server receives the facial data from the automated transaction system. The server links the facial data to a transaction identifier associated with the transaction. The transaction identifier comprises at least time and location of the transaction. A centralized repository is operatively connected to the server. A first network connects the server with the centralized repository. The centralized repository stores the facial data and the transaction identifier. A facial recognition processor is operatively connected to the centralized repository. A second network connects the facial recognition processor to public and law enforcement databases. Upon receiving a request from an authorized subscriber to identify the person based on the transaction identifier, the facial recognition processor compares the facial data associated with the transaction identifier to facial profiles from the public and law enforcement databases. The facial recognition processor generates potential identity matches based on the facial profiles. The facial recognition processor outputs the potential identity matches to the authorized subscriber.
According to an exemplary method, facial data is acquired from a person conducting a transaction with an automated transaction system. The automated transaction system comprises a camera device. The facial data comprises an image obtained by the camera device. The facial data is linked to a transaction identifier associated with the transaction. The transaction identifier comprises at least time and location of the transaction. The facial data and the transaction identifier are stored in a centralized repository connected to the automated transaction system. The facial data associated with the transaction identifier is compared to facial profiles from public and law enforcement databases. Potential identity matches are generated based on the facial profiles.
According to another exemplary method, a subscription fee is collected for defined services for collecting, processing, and analyzing facial data. Facial data is acquired from a person conducting a transaction with an automated transaction system. The automated transaction system comprises a camera device. The facial data comprises an image obtained by the camera device. The facial data is linked to a transaction identifier associated with the transaction. The transaction identifier comprises at least time and location of the transaction. The facial data and the transaction identifier are stored in a centralized repository connected to the automated transaction system. A request from an authorized subscriber is received to identify the person based on the transaction identifier. The transaction is deemed fraudulent. The facial data associated with the transaction identifier is compared to facial profiles obtained from public and law enforcement databases. Potential identity matches are generated based on the facial profiles. The potential identity matches are output to the authorized subscriber for further prosecutorial and/or investigative actions.
According to a computer system for enabling a method for identifying perpetrators of ATM fraud, the computer system comprises a program product comprising a tangible computer readable storage medium having program code embodied therewith. The program code is readable and executable by a computer to provide an application to perform a method. According to the method, facial data is acquired from a person conducting a transaction with an automated transaction system. The automated transaction system comprises a camera device. The facial data comprises an image obtained by the camera device. The facial data is linked to a transaction identifier associated with the transaction. The transaction identifier comprises at least time and location of the transaction. The facial data and the transaction identifier are stored in a centralized repository connected to the automated transaction system. The facial data associated with the transaction identifier is compared to facial profiles from public and law enforcement databases. Potential identity matches are generated based on the facial profiles.
These and other features are described in, or are apparent from, the following detailed description.
Various examples of the systems and methods are described in detail below, with reference to the attached drawing figures, which are not necessarily drawn to scale and in which:
For a general understanding of the features of the disclosure, reference is made to the drawings. In the drawings, like reference numerals have been used throughout to identify identical elements. While the disclosure will be described hereinafter in connection with specific devices and methods thereof, it will be understood that limiting the disclosure to such specific devices and methods is not intended. On the contrary, it is intended to cover all alternatives, modifications, and equivalents as may be included within the spirit and scope of the disclosure as defined by the appended claims.
Database 122 includes any database or any set of records or data that the computer 111 desires to retrieve. Database 122 may be any organized collection of data operating with any type of database management system. The database 122 may contain matrices of datasets comprising multi-relational data elements.
The database 122 may communicate with the computer 111 directly. Alternatively, the database 122 may communicate with the computer 111 over network 133. The network 133 comprises a communication network either internal or external, for affecting communication between the computer 111 and the database 122. For example, network 133 may comprise a local area network (LAN) or a global computer network, such as the Internet.
Disclosed herein are methods and systems to provide an ATM or Point of Sale video storage process/facility that will many a transaction identifier, which may include location, transaction time, and transaction number for a particular transaction, with a video for the transaction. If a financial institution reports an ATM fraud, the transaction information can be used to retrieve video based on the time, ATM location, and transaction identifier. Facial recognition is performed on that video and the images are compared to privately and publicly available databases, such as Facebook, as well as law enforcement agency databases. A ranked listing of links to potential matches is then generated. The list of potential matches and the original video and/or images can then be forwarded to human intelligence to further investigate and identify the identity of the face. Financial institutions will have financial incentive to participate due to two sources of revenue. One source is reduction of their own losses by reducing fraud through deterrence and through restitution of prosecuted cases. Another source of revenue is a percentage of recovered fees for video obtained from the financial institution's ATM, but perpetrated on another financial institution.
Every time a debit card or credit card is used, there is an exchange of data between the terminal and the card management service. The process of reading the card may involve passing the magnetic stripe over a magnetic reading head or bringing a chip in contact or near contact with a card reader. The information from the card itself including such things as the card number, expiration date, and others, is married to information from the device containing the card reader. According to systems and methods herein, the device may be any automated transaction system, such as a point of sale (POS) terminal or automatic teller machine (ATM), such that a data stream is created containing the card information as well is information about the requested transaction. Such information about the requested transaction may include a specific transaction identifier that includes at least the location of the terminal and the time of the transaction. Other information may include the terminal ID, a transaction code, the value of the transaction, etc. The data stream is forwarded to the card management agency. Upon receipt of the data stream, the transaction is logged into a database and given an authorization code. The data from the data stream may be further entered into a database for a specific financial institution, given a transaction identifier, and stored for archival purposes.
ATM fraud occurs through a variety of methods. One such method is “skimming”. This is where a magnetic reader is “piggy-backed” to the actual reader and a method is employed to obtain the associated PIN. Such method may be as simple as peering over a shoulder or sophisticated, such as use of a concealed video camera. Using this one method as an example, the fraud perpetrator obtains both the card magnetic information and the PIN. There are other methods to obtain this information, as well. Once the fraudster has this information, they can program a magnetic stripe on another card, visit a physical ATM location, and withdraw funds from the account.
Various methods may be used to combat this type of fraud. For example, at the card processing company, as transactions are recorded, authentication rules may be run that assess fraudulent trends on the card. For instance, a balance inquiry followed by multiple large withdrawals may trigger an alert to a fraud specialist, which would then trigger a possible suspension of the card. Unfortunately, this is a reactionary mode in that the fraud has already occurred and the fraudster has obtained some of the balance, which is a loss to the card issuer. The purpose of such reaction is to protect the remaining balance in the account on which the fraud has occurred. This does not have any impact on recuperating the losses other than through discussions with the legitimate cardholder (i.e., if the cardholder knows who used the card and made the withdrawal).
One way that fraudsters may attempt to avoid being traced is to try to conceal their identity at the ATM. A facemask or other device to conceal their facial features may be employed. Methods exist that use facial recognition processes internal to the ATM to determine if an actual or obstructed face is present. This may be accomplished by a variety of methods. One such method utilizes two cameras within the ATM machine. The two cameras are set at different angles to adjust for issues related to backlighting and angles to the subject's face, etc. A software program running internal to the ATM determines valid facial features using facial recognition algorithms in which the subject's facial features are compared to a known set of faces as a training set. Here, the goal is not to identify the actual face, but rather to determine if it is a face. In this method, a face that is covered by a ski mask, a novelty mask, or Halloween mask would be compared to known facial features and be determined to have a low probability that the subjects face is a real face. If it is determined that the probability of being a real face is low, an audible alarm or other warning would request that the subject make their face easier to see. After the obscuring device is removed, the algorithm run again. If a low probability of being a real face is detected again, the requested funds may not be dispensed.
As mentioned, if fraud has been determined to have occurred, a typical response would be to have a fraud specialist from the card processor contact the cardholder and attempt to determine who the perpetrator was. If the cardholder does not know who the perpetrator was and if the ATM is not owned by the card processing agency, there is little incentive to further investigate who the perpetrator may be.
Referring to
The server 213 is operatively connected to a centralized repository 219, which may include a database 222. The database 222 may be any organized collection of the facial data 210. Additionally, the database 222 may have a database management system designed to allow the definition, creation, querying, update, and administration of database 222. In some cases, the database may comprise a relational database, with an appropriate query language, as would be known by one of ordinary skill in the art. A first network 225 connects the server 213 with the centralized repository 219. The centralized repository 219 stores the facial data 210 and the transaction identifier 216. A facial recognition processor 228 is operatively connected to the centralized repository 219. A second network 231 connects the facial recognition processor 228 to external databases 234, which may include private, public, and law enforcement databases. As used herein, either or both of the first network 225 and second network 231 may comprise, for example, the Internet, a local area network (LAN), a wide area network (WAN), and/or a wireless network. The external databases 234 may include various web sources, including but not limited to, Facebook, Instagram, photobucket, etc., as well as police agencies' databases (e.g., mug shots). The facial recognition processor 228 can compare the facial data 210 associated with the transaction identifier 216 to facial profiles from the public and law enforcement databases 234.
Facial recognition is a process for automatically identifying or verifying a person from an image or a video frame from a picture source. Typically, the image or video frame is in a digital format. One of the ways in which facial recognition may be accomplished in to compare selected facial features from the image with images in a facial database. Some facial recognition processes identify faces by extracting landmarks, or features, from an image of the subject's face.
According to exemplary systems and methods herein, a particular facial recognition process may analyze the relative position, size, and/or shape of the subject's eyes, nose, cheekbones, jaw, ears, hair, etc. These features may then be used to search for other images with matching features. Other facial recognition processes normalize a gallery of face images and then compress the face data, only saving the data in the image that is useful for face detection. A probe image is then compared with the face data. One of the earliest, successful systems is based on template matching techniques applied to a set of salient facial features, providing a sort of compressed face representation. In general, facial recognition processes can be divided into two main approaches. The first approach is a geometric method that may look at distinguishing features of an image. The second approach is a statistical photometric method that that may distill an image into values and comparing the values with templates to eliminate variances.
The facial recognition processor 228 generates potential identity matches based on the facial profiles obtained from the public and law enforcement databases 234. The facial recognition processor 228 can then output the potential identity matches to an authorized subscriber.
According to exemplary systems and methods herein, the facial data 210, which may be video or image files from ATM or POS locations, can be routinely [real-time or on a schedule] stored in the centralized repository 219. Alternatively, the facial data 210 can be uploaded on demand to the centralized repository 219. The server 213 ensures that the facial data 210 is tagged with the location and time the image was acquired. If a fraud has been determined to occur, a card processing company who has contracted with the owner of the centralized repository 219 can ask for an analysis related to a specific time and location. The facial data 210 from that time and location is then processed for facial recognition. A face that is identified is then compared using standard facial recognition and matching technologies to images available on various web sources and police mug shots. Based on the analysis, a listing of possible matches is created. The list may be sent to the originator of the request for further use, or further analysis may be done via human interaction at the centralized repository 219 in order to try to ascertain the identification of the matched images via traditional web investigations. If a reasonable identification is made, the information can then be sent to the proper authorities for further prosecutorial and investigative actions.
As shown in
In one example, as shown with reference to card issuer 1 (301) in
In another example, as shown with reference to card issuer 2 (302) in
Several financial models are contemplated for monetizing services as described herein. For example, if, as described above, the contact information is forwarded to the proper authorities for further investigation and prosecution and the prosecution results in restitution, a percentage of funds reclaimed may be sent to the institution that provided the photographs and/or videos. In another example, if prosecution results in restitution, a percentage of the funds reclaimed may be sent to the data warehouse (centralized repository 219) and a percentage of reclaimed funds may be sent to the merchant, bank, or other appropriate institution that provided the photographs and/or videos. In some case, a percentage of reclaimed funds may be sent to the manufacturer of the ATM. In yet another example, if prosecution results in restitution, a percentage of the funds reclaimed may sent to the data warehouse (centralized repository 219) and the institution providing the video may be paid a flat fee or a per picture/video fee by the data warehouse (centralized repository 219), as illustrated with reference to card issuer 3 (303) in
As described above, one possible financial model contemplated by the exemplary systems and methods herein is that the ATM video holders provide the videos to the video data warehouse without charge (i.e., free). The card processor/fraud center may pay a nominal flat fee for each investigation undertaken. The facial recognition processing facility receives a percentage of recovered funds and the video provider receives a percentage of the recovered funds. The card processing agency retains the remainder. This way the card processing agency has more control over which fraud actions they deem worthwhile to pursue and prosecute. Other financial models can also be envisioned.
The above examples are described with reference to an ATM; it is contemplated that similar models apply to POS systems, as well. For example, financial incentives may be provided for photographs and/or videos from camera system owned and operated by a merchant, not specifically affiliated with a bank or card issuer. A merchant could own the fraud center, in this case. In another example, a card issuer who provides the camera with the card scanner could own a POS camera.
Aspects of the present disclosure are described herein with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems), and computer program products according to various systems and methods. It will be understood that each block of the flowchart illustrations and/or two-dimensional block diagrams, and combinations of blocks in the flowchart illustrations and/or block diagrams, can be implemented by computer program instructions. The computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions/acts specified in the flowchart and/or block diagram block or blocks.
According to a further system and method herein, an article of manufacture is provided that includes a tangible computer readable medium having computer readable instructions embodied therein for performing the steps of the computer implemented methods, including, but not limited to, the method illustrated in
The computer program instructions may be stored in a computer readable medium that can direct a computer, other programmable data processing apparatus, or other devices to function in a particular manner, such that the instructions stored in the computer readable medium produce an article of manufacture including instructions which implement the function/act specified in the flowchart and/or block diagram block or blocks.
Furthermore, the computer program instructions may also be loaded onto a computer, other programmable data processing apparatus, or other devices to cause a series of operational steps to be performed on the computer, other programmable apparatus or other devices to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide processes for implementing the functions/acts specified in the flowchart and/or block diagram block or blocks.
The input/output device 526 is used for communications to and from the computerized device 300. The controller/processor 524 controls the various actions of the computerized device. A non-transitory computer storage medium 520 (which can be optical, magnetic, capacitor based, etc.) is readable by the controller/processor 524 and stores instructions that the controller/processor 524 executes to allow the computerized device 500 to perform its various functions, such as those described herein. Thus, as shown in
In case of implementing the systems and methods herein by software and/or firmware, a program constituting the software may be installed into a computer with dedicated hardware, from a storage medium or a network, and the computer is capable of performing various functions if with various programs installed therein.
In the case where the above-described series of processing is implemented with software, the program that constitutes the software may be installed from a network such as the Internet or a storage medium such as the removable medium.
Those skilled in the art would appreciate that the storage medium is not limited to a peripheral device having the program stored therein, which is distributed separately from the device for providing the program to the user. Examples of a removable medium include a magnetic disk (including a floppy disk), an optical disk (including a Compact Disk-Read Only Memory (CD-ROM) and a Digital Versatile Disk (DVD)), a magneto-optical disk (including a Mini-Disk (MD) (registered trademark)), and a semiconductor memory. Alternatively, the computer storage medium 520 may be a hard disk, or the like, which has the program stored therein and is distributed to the user together with the device that contains them.
As will be appreciated by one skilled in the art, aspects of the devices and methods herein may be embodied as a system, method, or computer program product. Accordingly, aspects of the present disclosure may take the form of an entirely hardware system, an entirely software system (including firmware, resident software, micro-code, etc.) or an system combining software and hardware aspects that may all generally be referred to herein as a “circuit,” “module”, or “system.” Furthermore, aspects of the present disclosure may take the form of a computer program product embodied in one or more computer readable medium(s) having computer readable program code embodied thereon.
Any combination of one or more computer readable non-transitory medium(s) may be utilized. The computer readable medium may be a computer readable signal medium or a computer readable storage medium. The non-transitory computer storage medium stores instructions, and a processor executes the instructions to perform the methods described herein. A computer readable storage medium may be, for example, but not limited to, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, or device, or any suitable combination of the foregoing. More specific examples (a non-exhaustive list) of the computer readable storage medium include the following: an electrical connection having one or more wires, a portable computer diskette, a hard disk, a random access memory (RAM), a Read Only Memory (ROM), an Erasable Programmable Read Only Memory (EPROM or Flash memory), an optical fiber, a magnetic storage device, a portable compact disc Read Only Memory (CD-ROM), an optical storage device, a “plug-and-play” memory device, like a USB flash drive, or any suitable combination of the foregoing. In the context of this document, a computer readable storage medium may be any tangible medium that can contain, or store a program for use by or in connection with an instruction execution system, apparatus, or device.
Program code embodied on a computer readable medium may be transmitted using any appropriate medium, including, but not limited to, wireless, wireline, optical fiber cable, RF, etc., or any suitable combination of the foregoing.
Computer program code for carrying out operations for aspects of the present disclosure may be written in any combination of one or more programming languages, including an object oriented programming language such as Java, Smalltalk, C++, or the like and conventional procedural programming languages, such as the “C” programming language or similar programming languages. The program code may execute entirely on the user's computer, partly on the user's computer, as a stand-alone software package, partly on the user's computer and partly on a remote computer, or entirely on the remote computer or server. In the latter scenario, the remote computer may be connected to the user's computer through any type of network, including a local area network (LAN) or a wide area network (WAN), or the connection may be made to an external computer (for example, through the Internet using an Internet Service Provider).
The flowchart and block diagrams in the figures illustrate the architecture, functionality, and operation of possible implementations of systems, methods, and computer program products according to various devices and methods herein. In this regard, each block in the flowchart or block diagrams may represent a module, segment, or portion of code, which comprises one or more executable instructions for implementing the specified logical function(s). It should also be noted that, in some alternative implementations, the functions noted in the block might occur out of the order noted in the Figures. For example, two blocks shown in succession may, in fact, be executed substantially concurrently, or the blocks may sometimes be executed in the reverse order, depending upon the functionality involved. It will also be noted that each block of the block diagrams and/or flowchart illustration, and combinations of blocks in the block diagrams and/or flowchart illustration, can be implemented by special purpose hardware-based systems that perform the specified functions or acts, or combinations of special purpose hardware and computer instructions.
As shown in
Many computerized devices are discussed above. Computerized devices that include chip-based central processing units (CPU's), input/output devices (including graphic user interfaces (GUI), memories, comparators, processors, etc. are well-known and readily available devices produced by manufacturers such as Dell Computers, Round Rock Tex., USA and Apple Computer Co., Cupertino Calif., USA. Such computerized devices commonly include input/output devices, power supplies, processors, electronic storage memories, wiring, etc., the details of which are omitted herefrom to allow the reader to focus on the salient aspects of the systems and methods described herein. Similarly, scanners and other similar peripheral equipment are available from Xerox Corporation, Norwalk, Conn., USA and the details of such devices are not discussed herein for purposes of brevity and reader focus.
The terminology used herein is for the purpose of describing particular devices and methods only and is not intended to be limiting of this disclosure. As used herein, the singular forms “a”, “an”, and “the” are intended to include the plural forms as well, unless the context clearly indicates otherwise. It will be further understood that the terms “comprises” and/or “comprising,” when used in this specification, specify the presence of stated features, integers, steps, operations, elements, and/or components, but do not preclude the presence or addition of one or more other features, integers, steps, operations, elements, components, and/or groups thereof. Further, the terms ‘automated’ or ‘automatically’ mean that once a process is started (by a machine or a user), one or more machines perform the process without further input from any user.
The corresponding structures, materials, acts, and equivalents of all means or step plus function elements in the claims below are intended to include any structure, material, or act for performing the function in combination with other claimed elements as specifically claimed. The descriptions of the various devices and methods of the present disclosure have been presented for purposes of illustration, but are not intended to be exhaustive or limited to the devices and methods disclosed. Many modifications and variations will be apparent to those of ordinary skill in the art without departing from the scope and spirit of the described devices and methods. The terminology used herein was chosen to best explain the principles of the devices and methods, the practical application or technical improvement over technologies found in the marketplace, or to enable others of ordinary skill in the art to understand the devices and methods disclosed herein.
It will be appreciated that the above-disclosed and other features and functions, or alternatives thereof, may be desirably combined into many other different systems or applications. Those skilled in the art may subsequently make various presently unforeseen or unanticipated alternatives, modifications, variations, or improvements therein, which are also intended to be encompassed by the following claims. Unless specifically defined in a specific claim itself, steps or components of the systems and methods herein should not be implied or imported from any above example as limitations to any particular order, number, position, size, shape, angle, color, temperature, or material.