Patent classifications
G06Q20/4014
Intraday alert volume adjustments based on risk parameters
Intraday alert volume adjustment based on risk parameters is disclosed. A set of alerts associated with user transactions can be displayed to one or more human reviewers for processing. The set of alerts can be analyzed to determine whether or not the volume of alerts exceeds a threshold capacity level, which is based on a number of human reviewers available to process alerts. If the volume of alerts exceeds the threshold capacity level, alerts in the set of alerts can be prioritized based on risk in descending order and displayed to the human reviewers. In one instance, alerts below a threshold can be hidden from view of the human reviewers and optionally automatically approved. Further, prioritization can be performed dynamically as new alerts are added to the set.
Device for launching multiple peer to peer cashless payment applications on mobile devices
A device includes one or more NFC chips that are preprogrammed to provide a payee's identification and information for launching any of several P2P cashless payment applications to which the payee is subscribed, to a mobile phone of a payor. When a mobile device of a payor is brought to the vicinity of an NFC chip of the device, the mobile device launches a corresponding P2P cashless payment application. The P2P cashless payment application shows the payee's information and the payor may proceed to make a payment to the payee. The device may include an NFC chip that is preprogrammed to provide the payee's identification and the information for launching a single application on the mobile device of the payor to display the P2P cashless payment applications to which the payee is subscribed. The payor may then proceed to make a payment to the payee using the payor's mobile device.
Systems and methods for identifying a MCC-misclassified merchant
A computer system for identifying merchant category code misclassifications includes at least one processor in communication with a transaction database and a high-risk merchant database. The transaction database stores transaction records by a plurality of account holders. The high-risk merchant database stores high-risk merchant records each associated with high-risk merchants. The processor queries the transaction database for transaction records and calculates a high-risk cardholder metric for each of the account numbers. The at least one processor further queries the transaction database for transaction records including (i) the account number of high-risk cardholders, and (ii) a merchant identifier associated with other than the plurality of high-risk merchants, to retrieve a second set of transaction records. The at least one processor further calculates a high-risk merchant metric for each of the merchant identifiers, identifying a MCC misclassified merchant.
IDENTITY AND LICENSE VERIFICATION SYSTEM FOR WORKING WITH HIGHLY SENSITIVE DATA
The system has a unique identifier (2) stored in client's hardware (1). Via a transfer environment (3) using a higher layer protocol (4), the unique identifier (2) is coupled to a server (5), where, in an evaluation module (6), it is connected to a substitution and calculation module (7). A w polynomial system (8) stored in the persistent memory (9) of the server (5) is also connected to the substitution and calculation module (7), the output of which is a calculated key (10). At the same time, the client's hardware (1) stores a local key (11) which is via the transfer environment (3) using the higher layer protocol (4) connected to a key comparison module (12) to which the calculated key (10) is also connected. The key comparison module (12) is through its positive output (13) and negative output (14) connected via the transfer environment (3) using the higher layer protocol (4) to a response processing module (15) which is stored in the client's hardware (1). The system, at high security levels, provides the required response speed even for a large number of users and/or licenses without significantly increasing the space/memory requirements of computing resources.
System and Computer Implemented Method for Generating and Transmitting Tokenized Card Information
The present disclosure relates to a method and a tokenization server for generating and transmitting tokenized card information to a token requestor. In some non-limiting embodiments or aspects, the method includes receiving, from the token requestor, a request for a token corresponding to a payment card. The token may include a plurality of characters. Further, the method includes generating a token key corresponding to the token based on location information associated with a plurality of files stored in a user device. Subsequently, the method includes transmitting the token key, including location information within the plurality of files in the user device, to the token requestor. Here, the location information may include a location embedded with a character of the plurality of characters of the token. Thus, the present disclosure provides a secure method of generating, storing, and transmitting the tokenized card information.
SYSTEM AND METHOD FOR CONDUCTING TRANSACTIONS USING A MACHINE ACCOUNT ACTIVATED USING A MACHINE'S CREDENTIAL
A system and method are disclosed that generate a profile for a machine and continuously identify and validate the machine to allow a machine to be associated with a machine account for conducting transactions. The system and method use information or data provided by the machine for authentication. The data provided by the machine includes any combination of sensor data, historical data, activity data, location data, transaction data and any other data related to the machine and its actions. The machine sends or initiates requests for transactions. The requests are analyzed and allowed to be completed or the requests are declined.
SYSTEM AND METHOD FOR FRAUD PREVENTION WHEN USING A MACHINE ACCOUNT FOR A MACHINE CONDUCTING TRANSACTIONS
A system and method are disclosed that prevent fraudulent transactions involving a machine and a machine account. The system and method generate a profile for a machine and continuously identify and validate the machine to allow a machine account to be used for conducting transactions. The system and method use information or data provided by the machine for authentication. The data provided by the machine includes any combination of sensor data, historical data, activity data, location data, transaction data and any other data related to the machine and its actions. The machine sends or initiates requests for transactions. The requests are analyzed and allowed to be completed or the requests are declined.
INTEGRATED PAYMENT TRAVEL MANAGEMENT SYSTEM
Methods, systems, and computer program products for implementing a payment integration process for travel management systems. A payment integration request associated with a payment identification from a travel provider system is received. Payment transaction data associated with the payment identification from a payment gateway using the payment identification is obtained. Travel records data associated with the payment identification from a reservation system is obtained. Payment integration data associated with the payment identification is determined by performing a sanity check of the payment transaction data and the travel record data, validating the payment transaction data and the travel record data, and generating the payment integration data based on the sanity check and the validation of the payment transaction data and the travel record data. Payment integration data to be integrated into the travel record is provided.
SYSTEMS AND METHODS FOR CONTACTLESS BILLING AND PAYMENT
Systems and methods for contactless payment are disclosed. The system and methods may include performing steps of: receiving user information from a user device, the user information including at least authentication information and payment information; receiving check information from a venue, the check information including at least a check identifier and initial order information; generating a check identifier for wirelessly communicating the check information to the user device; displaying the check identifier on a display on the user device; receiving a check close command; and requesting a payment from a user based on the user information and check information.
PROVIDING IRREVOCABLE EVIDENCE OF PHYSICAL PRESENCE USING PROXIMITY TECHNOLOGY AND A DISTRIBUTED LEDGER
Aspects described herein include using proximity technology such as beacon devices or geofences to detect physical presence at a physical location. Presence information may be generated and included in a non-fungible token (NFT). The NFT may be provided to a digital wallet. The identity of an individual associated with the digital wallet may be authenticated. A distributed ledger may record the transaction that provides the NFT to the digital wallet.