Financial fraud has evolved significantly with digital transformation, generating losses exceeding $41 billion annually across payment networks. Modern fraud schemes operate at scale, leveraging automated tools to process thousands of transactions per hour while adapting to detection patterns—making traditional rule-based systems increasingly ineffective at identifying sophisticated attack patterns.

The fundamental challenge lies in detecting fraudulent activities in real-time while maintaining acceptably low false positive rates across billions of daily transactions.

This page brings together solutions from recent research—including behavioral modeling systems that adapt to user contexts, distributed fraud detection architectures that preserve privacy, multi-tiered detection frameworks that identify group-level patterns, and reinforcement learning approaches for cash return fraud. These and other approaches focus on practical implementation in high-volume transaction environments while maintaining computational efficiency.

1. Real-Time Transaction Approval System with Machine Learning-Based Named Entity Restrictions

RAMP BUSINESS CORP, 2025

Real-time transaction approval process that improves speed and stability of approving transactions by using named entity restrictions based on machine learning models. The process involves identifying entities involved in transactions from past data, creating rules specifying authorized entities, and iteratively training machine learning models to accurately identify entities in real-time. The identified entities are compared against the rules to approve transactions. This allows faster approval compared to manual review while still enforcing entity restrictions.

US2025165713A1-patent-drawing

2. Graph Attention Network-Based System for Virtual Asset Wallet Address Blacklist Generation

BONANZA FACTORY CO LTD, 2025

Generating a virtual asset wallet address blacklist using graph attention networks (GAT) to proactively detect high-risk virtual asset wallets that are prone to illegality. The blacklist is generated by training a GAT model using full node indices, common transaction data, and an existing blacklist. The model calculates scores for wallet addresses based on their connections and transactions. Addresses with high scores are added to the GAT blacklist.

US2025165959A1-patent-drawing

3. Parallel Metaverse System for Fraud Detection and Transaction Verification with Encrypted NFT Asset Transfers

BANK OF AMERICA CORP, 2025

Real-time monitoring and prevention of fraudulent transactions in metaverses using parallel metaverses. When a suspicious transaction is detected in a metaverse, a parallel metaverse is created. The original transaction is analyzed in the parallel metaverse to scrutinize it further. Encrypted NFTs representing assets are transferred between users in both metaverses. If the parallel metaverse confirms the transaction, it proceeds in the original metaverse. If fraud is suspected, the original metaverse can freeze activities and temporarily deactivate financial institutions.

US2025165972A1-patent-drawing

4. Transaction Data Sharing System with Common ID Generation Based on Machine Learning Confidence Scoring

VISA INTERNATIONAL SERVICE ASSOCIATION, 2025

Sharing transaction-related data between entities of a payment network using a common transaction ID. The method involves generating a confidence score indicating the likelihood that two transactions are the same using a machine learning model. If the confidence score exceeds a threshold, a common transaction ID is generated based on the attributes of one transaction. This common ID is then used to request additional transaction data from the other entity referencing the common ID.

US2025165973A1-patent-drawing

5. Identification Item Fraud Detection Using Temporal Analysis of Partial Code Matches

NSURE.AI PAYMENT ASSURANCE LTD, 2025

Detecting potential fraudulent use of identification items like credit cards by estimating if multiple events using cards with identical partial codes are from the same card or different cards based on the time elapsed between events. This allows detecting fraud without exposing full card numbers. It's unlikely for multiple cards with matching partials to be used in quick succession, so a short time gap indicates potential fraud.

US2025165979A1-patent-drawing

6. Cryptocurrency Wallet Detection and Freezing System with Transaction Tracing and Pattern Recognition

BANK OF AMERICA CORP, 2025

Automated system to detect and freeze cryptocurrency wallets used for laundering illicit funds. The system traces cryptocurrency transactions through mixing organizations to identify all their wallets. It then initiates secondary transfers between known wallets using the mixing wallets. By monitoring these transfers, it can detect patterns indicative of obfuscating illicit funds transfers. Suspect wallets are then frozen.

7. Fraud Detection System with Dual Machine Learning Models for Transaction and User-Level Analysis

STRIPE INC, 2025

Fraud detection in service provider systems using machine learning models. The system involves using two machine learning models to improve fraud detection. The first model is a transaction-level model that determines fraud probability based on transaction features. The second model is a user-level model that determines user fraud probability based on user behavior patterns. The system combines the outputs of both models to make a final fraud decision. If the transaction-level model indicates high fraud probability but the user-level model indicates low fraud probability, it is a potential false positive. Similarly, if the transaction-level model indicates low fraud probability but the user-level model indicates high fraud probability, it is a potential false negative. In such cases, the system performs additional checks or escalates the transaction for manual review to mitigate errors.

US2025165978A1-patent-drawing

8. Machine Learning Model for Detection of Abnormal Attribute Combinations in Devices and Transactions

ROKU INC, 2025

Using machine learning to identify combinations of attributes that cause abnormal behavior in devices or payment transactions. The approach involves training a machine learning model on historical data to correlate combinations of attribute values with abnormal outcomes. Then, for new devices or transactions, if the model indicates a high rate of abnormality for their attribute combination, it can flag them as potential issues. This allows faster and more scalable detection of problematic attribute combinations compared to brute force scanning.

9. Image-Based Analysis System for Authenticating Payment Cards at Transaction Terminals

BANK OF AMERICA CORP, 2025

Detecting suspicious payment cards at point-of-sale terminals and ATMs to prevent card cloning fraud. The technique involves capturing images of inserted payment cards and analyzing them to determine if they are authentic or cloned. The images are compared against known characteristics of genuine cards to detect deviations. Factors like bank logos, card designs, and wear patterns are analyzed. If a card is flagged as suspicious, an alert is generated and the transaction can be blocked.

10. Gaming Machine Usage Monitoring System with Machine Learning-Based Pattern Analysis for Suspicious Activity Detection

ALTIWOOD LLC, 2025

System for detecting money laundering through gaming machines by monitoring and analyzing machine usage patterns. The system uses machine learning models to identify potential money laundering activity by generating inferences from learned patterns. It monitors gaming machines for behaviors indicative of money laundering and notifies the casino if likely laundering is detected. The models analyze factors like win/loss ratios, betting patterns, and transaction volumes to identify suspicious activity.

US12307856B1-patent-drawing

11. Fraud Detection System Utilizing Device Signature Analysis for Identifying Suspicious Activity

CAPITAL ONE SERVICES LLC, 2025

Counter fraud system that uses device signatures to proactively detect and prevent fraud. The system compares a device's identifying parameters to signatures of devices associated with fraud. If similarities are found, it raises suspicion and can initiate security measures like 2FA or transaction denial. The device signatures are built by analyzing parameters of devices used in fraud.

12. Electronic Transaction Monitoring System Utilizing Device and Transaction Location Discrepancy Detection

SPRIV LLC, 2025

Monitoring electronic transactions to detect potential fraud by comparing the location of the user's device to the transaction location. When a transaction is initiated, the device location is checked against the last known location from cached data. If they don't match, an alert is generated. This leverages the fact that a user's device usually stays nearby during a transaction. If the device is far away, it could indicate fraud.

US12309311B2-patent-drawing

13. Fraud Detection System with Event Prioritization Using Variable Importance Scoring

PINDROP SECURITY INC, 2025

Dynamic fraud detection system that prioritizes important fraud events based on factors like fraud type, activity, and temporal information. The system uses a fraud importance engine to calculate scores for fraud events that are fed into the fraud detection engine. This allows the detection engine to prioritize important frauds and optimize performance metrics. The fraud importance scores are generated from user-defined parameters like fraud type, cross-channel activity, etc.

US12309316B2-patent-drawing

14. System for Extracting and Verifying Data Elements from Unstructured Invoices Using Optical Character Recognition and Database Cross-Referencing

EFTSURE PTY LTD, 2025

Verification of unstructured data like invoices using optical character recognition (OCR) and database lookup to accurately extract and analyze data elements like account numbers, company registrations, and signatures. The method involves identifying predetermined data elements in unstructured sources like invoices using OCR, then using those elements to access a database and retrieve verified data. This verified data can then be used for further analysis of the unstructured data. The system can also check for fake invoices by analyzing signatures and cross-referencing with a database.

15. Fraud Detection System with Precomputed Feature Caching and Dynamic Feature Computation

STRIPE INC, 2025

Reducing resource consumption and latency of fraud detection systems in commerce platforms with high transaction volumes. The method involves leveraging feature extraction and machine learning techniques to optimize fraud detection. Instead of generating and communicating all features for each transaction, a subset of critical features are identified and precomputed offline. These precomputed features are then cached and reused for similar transactions, reducing the resource-intensive feature generation and communication. The remaining features are dynamically computed on-the-fly. This partial feature reuse and dynamic computation reduces resource consumption and latency compared to generating all features for each transaction. The precomputed features are based on machine learning models that identify critical feature combinations for efficient fraud detection.

16. Asynchronous Transaction Scoring System with Cached Risk Evaluation for Card Testing Attack Detection

STRIPE INC, 2025

Detecting and blocking card testing attacks (CTAs) in financial transactions without introducing excessive latency. The technique involves asynchronously scoring transactions for CTA risk using separate ML models and storing the CTA scores in a cache. When a transaction comes in, the stored CTA scores are retrieved and used to adjust the blocking score thresholds. The transaction is then evaluated against the adjusted thresholds to determine if it's allowed or blocked. This allows efficient CTA detection without adding latency to the charge path.

US2025156870A1-patent-drawing

17. Machine Learning-Based Detection System for First Party Fraud Using Temporal Aggregation of Normalized User Activity Attributes

CAPITAL ONE SERVICES LLC, 2025

Early detection of first party fraud in financial transactions by predicting future fraud instances. The method involves aggregating normalized attributes of multiple activities associated with a user from different sources over time, then feeding those normalized attributes into a machine learning model trained to output the likelihood of a future fraud instance for that user based on normalized attributes of past fraud instances. If the predicted likelihood exceeds a threshold, an alert is sent. This allows detecting potential fraud schemes before they become apparent by identifying users with elevated fraud risk based on patterns in their activity.

US2025156872A1-patent-drawing

18. Transaction Analysis System Utilizing Sequential Feature Tokenization for Machine Learning Model Training

MASTERCARD INTERNATIONAL INC, 2025

Using machine learning to analyze past transactions to optimize network efficiency, enhance approval rates, mitigate fraud, and enrich customer profiles. The method involves converting groups of transactions into sequences of transaction features, generating tokens based on those sequences, feeding the tokens to an ML model to estimate future transactions, and using those estimates to approve new transactions. The ML model learns to predict transactions based on historical patterns.

US2025156874A1-patent-drawing

19. Graph Neural Network-Based System for Merchant Settlement Risk Identification in Electronic Payment Processing

VISA INTERNATIONAL SERVICE ASSOCIATION, 2025

Using graph neural networks to analyze transaction and external data to identify merchants with negative settlement risk in electronic payment processing. The method involves generating a graph data structure with nodes representing merchants, transactions, etc., and edges connecting related nodes. Text representations of transaction and external data are concatenated to generate node embeddings. Risk scores are propagated through the graph to identify merchants with negative settlement risk. This allows proactive risk mitigation and transaction authorization based on graph analysis rather than just transaction parameters.

US2025156875A1-patent-drawing

20. Payment Card Fraud Prevention System with User-Defined and Adaptive Rule Management

WELLS FARGO BANK NA, 2025

Proactive fraud prevention system for payment cards that allows users to define and control rules for their cards. The system automatically creates rules based on transaction history and demographics, allows users to view and modify the rules, and enforces them to allow or restrict payments. It sends alerts when rules are triggered and updates rules in real-time based on user input.

US2025156878A1-patent-drawing

21. Heuristic Algorithm-Based Fraud Detection in Unstructured Transaction Data Sets

22. Method for Money Laundering Detection Using Dimensionality Reduction and Clustering in Financial Data

23. Statistical Analysis and AI-Based Fraud Detection System for Casino Table Games

24. System for Consolidating and Comparing Multi-Source Data Lists for Detecting False Data Entities

25. System for Automated Detection of Outlier Electronic Data Using Term Pattern Analysis with Machine Learning Term Embeddings

Get Full Report

Access our comprehensive collection of 462 documents related to this technology