Patent classifications
G06Q20/342
Using transaction data from first transaction for second transaction
A computer-implemented method for providing payment account information in a user account by receiving payment card information by a card reader at a point of sale. An account can be created when the payment card information is read by the card reader. Optionally, a gift card can be scanned prior to the creation of the account, and the gift card information can be combined with the payment card information. The gift card can be an electronic gift card which can be personalized with textual, visual, video, and/or audio portions.
Data comparison efficiency for real-time data processing, monitoring, and alerting
According to embodiments, systems and methods for tracking gift card usage improve the speed and efficiency of anomalous transaction detection. Individual transaction data is enriched to form parent records that include indicators that the card is being used outside of established usage criteria or in a way that is otherwise abnormal. Machine learning can improve upon anomalous transactions more quickly using this enriched, parent-level information.
SYSTEMS AND METHODS FOR USING A TRANSACTION TO COLLECT ADDITIONAL TRANSACTION INFORMATION
Disclosed are systems and methods for using a transaction to collect additional transaction information. The method may include: receiving transaction information indicating that a transaction of one or more products and/or services has been made by a user from a merchant; when the transaction information is received, scanning a user e-mail account to identify a receipt for the transaction within an e-mail of the user e-mail account, wherein the receipt is indicative of a transaction price; when the receipt for the transaction is identified: extracting information of the one or more products and/or services from the receipt; and based on the extracted information, automatically generating and submitting a price adjustment claim for the one or more products and/or services when a price lower than the transaction price is found; and when the receipt for the transaction cannot be identified: automatically submitting information about a missing receipt to a fraud system.
PAYMENT CARD BENEFIT VALUE ESTIMATOR SYSTEM AND METHOD WITH TRANSACTION-BASED INDIVIDUAL CARDHOLDER RELEVANCE OF SELECTABLE BENEFITS
A payment card benefit assessment system and method includes a computing device accepting payment card benefit catalog information from a payment card issuer and payment card transaction data from a payment card processing network. The payment card transaction data is analyzed to group cardholders into one demographic clusters and to determine an estimated benefit value for each of the demographic clusters. Individualized payment card benefit options are presented to an individual cardholder based on the individual cardholder's payment card transactions and the determined estimated benefit value for a corresponding one of the plurality of demographic clusters.
Detachable radio frequency identification switch tag
A radio frequency identification (RFID) switch tag is disclosed. This RFID switch tag includes a base component having an ultra-high frequency (UHF) booster, and a detachable component having at least one UHF RFID module and a high frequency (HF) RFID module. In some embodiments, the detachable component is positioned in close proximity to the base component in a first configuration of the RFID switch tag such that the at least one UHF RFID module is sufficiently coupled to the UHF booster in the base component to form an UHF RFID system having a desired performance. The detachable component can also be separated from the base component to obtain a second configuration of the RFID switch tag, and the HF RFID module remains functional within the detached detachable component so that the detachable component can be used as a standalone HF RFID tag.
Computer System for Identifying Aberrant Activity on a Reward Card Platform
A reward card platform includes a database storing funding accounts, reward card purchase transactions, and aberrant activity rules. A first user interface enables purchasing reward cards, including controls to specify reward card parameters. A second user interface enables specifying rules to detect aberrant activity. The second user interface includes user interface controls to specify the rule parameters, including: specifying a moving window of time; specifying an aggregation type; specifying filtering; specifying aggregation grouping; and specifying a threshold value for triggering an alert. The platform includes a rules execution engine that runs periodically to evaluate each of the rules. For each rule, the engine identifies transactions whose timestamps fall within the moving window of time relative to a current time and satisfies the filters, then computes an aggregation of the transactions according to the aggregation type and aggregation grouping. When the aggregation exceeds the threshold value, the platform raises an alert.
Systems and methods for performing funds freeze and/or funds seizure with respect to prepaid payment cards
Systems, mechanisms and processes are provided to allow law-enforcement officials, when encountering the potential use of prepaid payment cards in the furtherance of a crime or in relation to criminal activities, to (1) attempt to check the balances on such prepaid payment cards, including the ability to perform aggregate balance checks on a group of such prepaid cards, (2) attempt to freeze the funds on such prepaid payment cards, and/or (3) attempt to seize the funds on such prepaid payment cards.
INTEGRATING MOBILE PAYMENT APPLICATION WITH OTHER MOBILE APPLICATIONS WHILE PREVENTING SECURITY EXPOSURES
A method, system and computer program product for integrating a mobile payment application with other mobile applications while preventing security exposures. A set of application programming interfaces of mobile applications that may possibly be utilized by a pass created by a mobile payment application is generated in response to receiving an indication that the pass was created. A “pass,” as used herein, refers to a form of mobile payment, such as a gift card. A selection of these application programming interfaces may then be received to interact with the created pass. In this manner, the existing mobile applications are seamlessly integrated with the features of passes. Furthermore, a virtual container is created for the created pass and the selected application programming interfaces to interface with the created pass. By creating such a container, the data to be exposed to the application layer can be controlled.
SYSTEM AND METHOD FOR PROVIDING A USER-LOADABLE STORED VALUE CARD
A system and method in accordance with example embodiments may provide a user-loadable stored value card. Additionally, a system and method in accordance with example embodiments may allow an institution to receive a user-loadable stored value card activation request from a sender, activate a user-loadable stored value card using the information received in the activation request, and provide card management capabilities to the sender.
TOKENIZATION PLATFORM
A method for integrating real-world items into video games is disclosed. The method includes receiving, by a video game instance, a digital token corresponding to a real-world item from a video game integration system, the digital token being linked with the item and corresponding to an in-game benefit that is provided to an owner of the token. The method also includes facilitating, by the video game instance, a transaction by the user for the item the video game, wherein in response to the user transacting for the item, ownership data of the digital token is updated on a cryptographic ledger to assign ownership of the digital token to the user. The method also includes conferring, by the video game instance, the in-game benefit to the user in the video game and revoking the in-game benefit in response to the digital token no longer being assigned to the user.