G07B17/00

Cost item life cycle viewer with configurable document traversal options

A method, system, and computer program product for enterprise accounting software applications. The computer implemented method commences upon receiving a single user-specified indication of a subject cost item. Then, responsive to the single user-specified indication, the method traverses from the subject cost item to at least one of a successor cost item or a predecessor cost item. Then, still responsive to the single user-specified indication of a subject cost item, the method proceeds to automatically retrieve information from the successor cost item or from the predecessor cost item. Then, still responsive to the single user-specified indication, the method invokes operations for displaying a representation of the subject cost item in a juxtaposition to the automatically traversed-to items. A user can configure traversing from a purchase requisition to a purchase order, and/or traversing from a purchase order to a payable invoice, and/or traversing from a payable invoice to a project expenditure.

Systems and methods for establishing the colors of a customized stamp
09799148 · 2017-10-24 · ·

The field of the invention relates to online postage systems, and more particularly to systems and methods for establishing the colors of a customized stamp purchased through an online postage system. In one embodiment, a method is employed for customizing the colors of a customized stamp having a panel and an image. The method includes the steps of enabling a user to select a region of the image, retrieving a color value corresponding to the region of the image, and applying the retrieved color value to a visual feature of the panel, such as the background and text of the panel. The method also maintains a minimum amount of contrast in brightness and color between the background and the text of the panel.

Recommender engine for collections treatment selection

A system for automatically recommending treatments for delinquent accounts in collections is provided. The system includes one or more sub-models for analyzing and scoring delinquent accounts and comparing them to historical accounts to identify similar historical accounts. The system can select and recommend one or more treatments for the delinquent account based on treatments for the historical accounts that may have previously provided a favorable outcome for a similar account. The system may test the efficacy of new treatments and incorporate the results into the memory, thereby learning and adapting to new treatments and account behavior.

Data excavator

The present invention is directed to a system that updates files with updated financial data. The system of the present invention is configured to receive from a user one or more selections of files (e.g., datastores of financial data utilized and/or referenced by financial reporting application for purposes of generating up-to-date financial reports) to be updated with updated financial data. The user is further enabled by the system of the present invention to schedule importations of updated financial data into each selected file. The system of the present invention also is configured to generate a report of complete file updates so that the user may more effectively monitor and review the file-updating processes.

Evaluating image values
09786101 · 2017-10-10 · ·

Images of items are evaluated. A first image of the item, having a view of two or more of its surfaces, is captured at a first time. A measurement of at least one dimension of one or more of the surfaces is computed and stored. A second image of the item, having a view of at least one of the two or more surfaces, is captured at a second time, subsequent to the first time. A measurement of the dimension is then computed and compared to the stored first measurement. The computed measurement is evaluated based on the comparison.

System and method for identifying and preventing on-line fraud

The present invention is directed to systems and methods which identify fraudulent situations during the transaction phase. In one embodiment, such detection is accomplished by monitoring for situations either outside the range of normal for the general population or outside the range of normal for this particular user. The normal range could be rule driven and, for example, could include size of a given purchase, frequency of purchases, identity of use equipment being utilized for the current transaction, etc. The rule could be relaxed or tightened, at least in part, based on the length of time that the user has been a customer and the user's past payment history. In one embodiment, device ids are used to detect fraudulent users. These device (or software) ids could, for example, be a “fingerprint” of the user's equipment, or a “cookie” previously downloaded to the user that identifies the user to the fulfillment system. In situations where fraud is detected downloading the value to the user is interrupted.

Invoice financing and repayment

A payment processing system for processing point-of-sale transactions and extending financing to merchants for invoice payment is disclosed. The payment processing system receives a request from a first merchant to generate an invoice for a second merchant. The payment processing system calculates financing terms for payment of the invoice, wherein the financing terms include repayment terms designating a portion of each transaction processed by the payment processing system for the second merchant to withhold for payment of the invoice. The payment processing system may advance payment of the invoice to the first merchant and take repayment from the portion of the withheld portion of transactions or transmit the withheld portion to the first merchant for payment of the invoice.

Transaction-history driven counterfeit fraud risk management solution

Transaction data is gathered for a plurality of successful payment device transactions in a first environment. The transaction data is filtered to identify successful payment device transactions associated with payment devices for which offline authentication is not supported, to obtain a whitelist. The whitelist is made available to at least one of (1) a merchant in a second, different environment, and (2) a third party acting on behalf of such a merchant.

Induction unit and label generator

Systems described herein for controlling, requesting, and coordinating the creation and generation of labels can be a label broker, providing a centralized location for storing label information created by various entities, and managing the requests for generation of physical labels coming from various sources and entities.

Cloud-based address processing
09741180 · 2017-08-22 · ·

Mail processing systems and methods. A method includes receiving a plurality of mailpieces in the mail processing system and associating a unique identifier with each of the plurality of mailpieces. The method includes obtaining destination address information for each of the plurality of mailpieces and comparing the destination address information with a potential move table to determine destination addresses for which there is a potential change of address. The method includes sending the destination address information to a change of address (COA) server and receiving COA results from the COA server. The method includes printing destination information on each mailpiece according to the COA results.