Patent classifications
G06Q20/16
MONEY TRANSFER BY USE OF A PAYMENT PROXY
In some examples, a payment service system receives a request to associate a proxy identifier with a user account of a charity. The proxy identifier is individually distinguishable from other proxy identifiers associated with user accounts of other users, and has a syntax including a symbol and a string of one or more characters. The symbol and the string are concatenated such that the symbol appears immediately before the string. The payment service system receives, via an application on a user device of a user, an input associated with the proxy identifier, and performs a database lookup to identify the user account associated with the proxy identifier. Information associated with the user account of the charity is presented via a user interface presented by the application. The user interface enables the user to donate funds from a financial account of the user to the user account of the charity.
MONEY TRANSFER BY USE OF A PAYMENT PROXY
In some examples, a payment service system receives a request to associate a proxy identifier with a user account of a charity. The proxy identifier is individually distinguishable from other proxy identifiers associated with user accounts of other users, and has a syntax including a symbol and a string of one or more characters. The symbol and the string are concatenated such that the symbol appears immediately before the string. The payment service system receives, via an application on a user device of a user, an input associated with the proxy identifier, and performs a database lookup to identify the user account associated with the proxy identifier. Information associated with the user account of the charity is presented via a user interface presented by the application. The user interface enables the user to donate funds from a financial account of the user to the user account of the charity.
SYSTEM AND METHOD FOR PROVIDING GIFTING SERVICE BETWEEN COUNTRIES
A system and a method for providing a gifting service between a first country and a second country can include a service server of a first country receives a gift-giving request from a buyer client of the first country; the service server of the first country provides a plurality of product lists for each brand to the buyer client of the first country; the service server of the first country receives a selection of a specific product from the plurality of product lists from the buyer client of the first country; the service server of the first country requests payment for the specific product to the buyer client of the first country; and upon completion of payment, the service server of the first country requests a gift-giving of the specific product to a service server of a second country.
Method for Payment of an Order to be Forwarded to one of a Plurality of Client Establishments
An intelligent interface responds to a received order by initiating payment from an electronic wallet. An IP network interface receives requests. From the requests, an order program receives an order destined to a client establishment. A response is generated with payment options from an electronic wallet associated with the source phone number. Selection of one of the payment options in the response causes the order program to process the payment for the order from the electronic wallet and forward the order to the client establishment.
Method for Payment of an Order to be Forwarded to one of a Plurality of Client Establishments
An intelligent interface responds to a received order by initiating payment from an electronic wallet. An IP network interface receives requests. From the requests, an order program receives an order destined to a client establishment. A response is generated with payment options from an electronic wallet associated with the source phone number. Selection of one of the payment options in the response causes the order program to process the payment for the order from the electronic wallet and forward the order to the client establishment.
GRANULAR PROCESS FAULT DETECTION
A method includes obtaining a series of more than two Boolean events, each respective Boolean event having either a first value indicating that reimbursement for a respective overpayment of a service was timely received or a second value indicating reimbursement was not timely received. The method includes determining an actual number of switch events in the series of Boolean events and determining an expected number of switch events. The method includes determining a confidence interval for the expected number of switch events, and determining a score based on the actual number of switch events, the expected number of switch events, and the confidence interval. The score is indicative of a fault in a process generating the series of Boolean events. The method includes generating an alert based on the score being greater than or equal to a threshold score.
GRANULAR PROCESS FAULT DETECTION
A method includes obtaining a series of more than two Boolean events, each respective Boolean event having either a first value indicating that reimbursement for a respective overpayment of a service was timely received or a second value indicating reimbursement was not timely received. The method includes determining an actual number of switch events in the series of Boolean events and determining an expected number of switch events. The method includes determining a confidence interval for the expected number of switch events, and determining a score based on the actual number of switch events, the expected number of switch events, and the confidence interval. The score is indicative of a fault in a process generating the series of Boolean events. The method includes generating an alert based on the score being greater than or equal to a threshold score.
Authentication circle shared expenses with extended family and friends
Systems and methods for providing authentication circles to pursue financial goals and/or share expenses with others are provided. One or more provider computing systems are communicatively coupled to one or more user devices. Users may join a circle and make contributions via electronic messages that may allow for acceptance in a one-click fashion. Members may, for example, plan for and share expenses for a trip and compare the expenses with budgets.
Authentication circle shared expenses with extended family and friends
Systems and methods for providing authentication circles to pursue financial goals and/or share expenses with others are provided. One or more provider computing systems are communicatively coupled to one or more user devices. Users may join a circle and make contributions via electronic messages that may allow for acceptance in a one-click fashion. Members may, for example, plan for and share expenses for a trip and compare the expenses with budgets.
Enhanced security for transaction requests utilizing automatic source identification
Described herein are methods and systems for enhancing security of transaction requests from POS terminals by utilizing ANI-DNIS information. The header of the transaction request can include automatic source information (“ASI”), which can be extracted from the header by the line handler. The ASI information can be provided to the front end interface, which can compare the ASI information with known customer information. The comparison can provide information indicating whether the transaction is legitimate or fraudulent. If fraudulent, the transaction request can be declined. The ASI information can further be stored in a security analysis database and further queried to identify larger threats including denial of service attacks.