Patent classifications
G06Q20/405
Application Programming Interface (API)-enabled Automated Compliance Verification and Processing
Various aspects of the disclosure relate to automated compliance verification systems for authenticating and verifying compliance associated with electronic transactions. A compliance verification platform may be an intermediary between an application for managing and/or recording transactions and a transaction processing platform for processing a transaction. Based on successful compliance verification and authentication, the compliance verification platform may send notifications to the transaction processing platform to process a transaction requested via the application
System for a product bundle and related methods
A system for a product bundle for purchase may include a user device associated with a given user, and a promotional server. The promotional server may obtain historical online browsing data associated with the given user, and obtain historical shopping data associated with the given user. The promotional server may also generate the product bundle based upon the historical shopping data and the historical online browsing data. The product bundle may include complementary products for purchase each having a purchase price associated therewith. The product bundle may have a bundle price that is less than a sum of purchase prices of each of the complementary products. The promotional server may communicate the product bundle and the bundle price to the user device for display thereon, generate a digital promotion redeemable toward the purchase of the product bundle, and communicate the digital promotion to the user device.
System and Method for Monitoring Transaction Events
A system and method are provided for monitoring transaction events. The method includes connecting the event processor device with at least one payment services channel and listening for events provided by the at least one payment services channel. The method also includes detecting an event associated with a masked transaction being facilitated by a payment service that masks a payment card number. The method also includes determining from the masked transaction a user identifier associated with the transaction, determining from the user identifier the payment card number, and confirming that the payment card number is linked to the loyalty program with the loyalty partner. When the payment card number is linked to the loyalty program, the method includes sending a message to the loyalty partner to have the loyalty partner execute a loyalty program action associated with the transaction that would have otherwise been masked at the point of sale.
Systems and methods for improved verification of transactions
A method for implementing transactions includes receiving, by a first computing system, a transaction request from a second computing system, the transaction request indicating a first account number that is an alias of a transaction account having a second account number, and specifying a transaction. The method further includes determining the second account number by referencing a data structure that associates the first account number and the second account number, determining a verification policy associated with the second account number, and transmitting a verification challenge based on the verification policy. The method yet further includes receiving a response to the verification challenge, determining to authorize the transaction request based on the response to the verification challenge, and implementing the transaction involving the transaction account specified by the transaction request.
System and method for transferring funds
A method including receiving a request based on a sender initiating a funds transfer. The funds transfer can be for the sender to make a payment to a non-financial institution. The sender can have a sender account at a sender financial institution. The non-financial institution can have a recipient account at a recipient financial institution. The method also can include facilitating obtaining sender identifying information from the sender. The method additionally can include facilitating sending at least (a) the sender identifying information, (b) a recipient public identifier of the non-financial institution, and (c) a payment amount for the payment to the sender financial institution to cause the sender financial institution to (i) determine a funds availability of the sender account to make the funds transfer for the payment amount and (ii) send a funds transfer request to a computer-implemented funds transfer network to make the payment from the sender account at the sender financial institution to the recipient account at the recipient financial institution. The funds transfer request can include the recipient public identifier and the payment amount. The funds transfer request does not include an account number of the recipient account. The computer-implemented funds transfer network can include a first directory mapping the recipient public identifier to a recipient private identifier. The computer-implemented funds transfer network can be configured to send the recipient private identifier to the recipient financial institution to enable the recipient financial institution to map the recipient private identifier to the account number of the recipient account and make funds available to the recipient account in real-time for the payment. The computer-implemented funds transfer network can be operated by an entity that is different from the recipient financial institution and the sender financial institution. Other embodiments are disclosed.
Rule engine optimization via parallel execution
A first graph that includes a plurality of containers is accessed. The containers each contain one or more rules that each have corresponding computer code. The containers are configured for sequential execution by a rule engine. The computer code corresponding to the one or more rules in each of the containers is electronically scanned. Based on the electronic scan, an interdependency among the rules is determined. Based on the determined interdependency, a second graph is generated. The second graph includes all of the rules of the containers, but not the containers themselves. At least some of the rules are configured for parallel execution by the rule engine.
Secure elements broker (SEB) for application communication channel selector optimization
Systems and methods for managing concurrent secure elements on a mobile device to coordinate with an application or “app” running on the mobile device and an appropriate communications protocol for conducting transactions using the mobile device include: informing, by the processor, the reader device of a preferred app and a communication protocol usable by the preferred app; receiving, by the processor, information about which apps and communication protocols are supported by a reader for processing a transaction; locating, by the processor, a secure element supporting an app and a communication protocol supported by the reader; channeling the communication protocol for the specific configuration of the app and the supporting secure element; activating the secure element that supports the app; and processing, with the activated secure element, using the supported app and communication channel, the transaction with the reader.
Information processing method, apparatus, device, and storage medium
The present application discloses an information processing method. The method includes: acquiring a resource package parameter determined by a sender client; invoking an interface with a second server, and acquiring a current conversion rate that is between the first-type resource and a second-type resource and is issued by the second server; calculating a quantity of second-type resources equal in value to the first quantity of first-type resources according to the conversion rate, and using the quantity as a second quantity; deducting the second quantity of second-type resources from a second-type resource account of the sender client, and generating at least one resource package, a sum of quantities corresponding to the at least one resource package being equal to the first quantity; and distributing the at least one resource package to at least one receiver client by using the link information.
Systems and methods for identity graph based fraud detection
A method and apparatus for fraud detection during transactions using identity graphs are described. The method may include receiving, at a commerce platform system, a transaction from a user having initial transaction attributes and transaction data. The method may also include determining, by the commerce platform system, an identity associated with the user, wherein the identity is associated with additional transaction attributes not received with the transaction. Furthermore, the method may include accessing, by the commerce platform system, a feature set associated with the initial transaction attributes and the additional transaction attributes, wherein the feature set comprises machine learning (ML) model features for detecting transaction fraud. The method may also include performing, by the commerce platform system, a machine learning model analysis using the feature set and the transaction data to determine a likelihood that the transaction is fraudulent, and performing, by the commerce platforms system, the transaction when the likelihood that the transaction is fraudulent does not satisfy a transaction fraud threshold.
Systems and methods for processing digital experience information
In one implementation, systems and methods are provided for processing digital experience information. A computer-implemented system for processing digital experience information may comprise a central data location. The central data location may comprise a connector that may be configured to receive information belonging category from an information source; an event backbone that may be configured to route the information received by the connector based on the category; a translator that may be configured to transform the received information into a common data model; and a base that may be configured to store the received information. The event backbone may be further configured to send information to the connector from the event backbone and the database based on one or more criteria.