Patent classifications
G06Q20/4093
Programmatic approvals of corporate spend and employee expense
A method of approving expenditures in real-time, comprising receiving an expenditure request initiated by a user associated with an organization for transferring funds of the organization in exchange for one or more products and/or services, identifying request attribute(s) relating to the user, the value, the funds, the product, the service, a time of reception of the expenditure request and/or a geographical location of the user, analyzing scheduling data obtained from one or more online data sources which is indicative of one or more activity attributes of activity(s) scheduled for the user, automatically determining compliance between the request attribute(s) and one or more expenditure rules predefined for the product(s) and/or service(s) with respect to the activity attribute(s) and transmitting a response to the expenditure request according to the determination which includes approval of the expenditure request in case of compliance and rejection in case of incompliance.
TERMINAL DEVICE, PERSONAL AUTHENTICATION SYSTEM AND PERSONAL AUTHENTICATION METHOD
A technology which is highly safe and furthermore highly convenient in personal authentications via a mobile terminal is provided. A terminal device 200 of the present invention includes: a position determining section 271 that determines a position of the terminal device 200 at predetermined time intervals, and accumulates the position as position information; a movement history generating section 272 that generates a movement history by using the position information accumulated in a predetermined period, and stores the movement history as movement history information; a registration processing section 276 that transmits, for registration, the movement history information to a personal authentication apparatus; and an authentication requesting section 279 that makes an authentication request to the personal authentication apparatus 310 by using the movement history information stored after the transmission by the registration processing section 276 to the personal authentication apparatus 310.
TRANSACTION CARDS AND COMPUTER-BASED SYSTEMS THAT PROVIDE FRAUD DETECTION AT POS DEVICES BASED ON ANALYSIS OF FEATURE SETS AND METHODS OF USE THEREOF
Transaction cards, systems and methods for performing fraud detection at POS devices based on analysis of feature sets are disclosed. In one embodiment, an exemplary transaction card may comprise one or more sensors configured to collect pre-card-use sensor data regarding a user of the card, circuitry that assembles such data into feature sets and performs fraud detection, and data storage. According to some aspects, the fraud detection may include comparing user specific sensor data, collected for a current transaction, to a user-specific risk profile validation model to determine a risk score for the current transaction, and transmitting the risk score to a card transacting device when a card is presented during a transaction. In some implementations, the risk score may enable the card transacting device to evaluate a risk associated with accepting the transaction card to complete the attempted transaction.
AUTHORIZATION CONTROL NETWORK AND METHOD OF VALIDATING AN AUTHORIZATION REQUEST
An authorization control network includes a limit profile database and at least one computer server. The server(s) receives an account identifier and a datum from a communications device, and associates the datum with the account identifier in a limit profile record of the limit profile database. The server(s) also receives the account identifier and a transaction limit, and associates the transaction limit with the account identifier in the limit profile record. The server(s) then receives from a POS device an authorization request that includes the account identifier and an authorization amount. If the server(s) confirms that the authorization amount does not exceed the transaction limit that is associated with the account identifier in the limit profile record and does not exceed an available credit limit that is associated with the account identifier, the server(s) transmits to the POS device an authorization response that confirms authorization of the authorization amount.
SYSTEMS AND METHODS FOR DISTRIBUTING DATA
Systems and methods are provided for distributing data to multiple data centers within a network based on unique information associated with the data. One example computer-implemented method includes receiving a request, from a service provider, for data stored at a data center and generating a group identifier based on the device ID specific to a device of a user. The method also includes identifying the data center based on the first group identifier and directing the request to the identified data center. The method then includes retrieving the data from the data center and returning the retrieved data to the service provider, in response to the request.
Secure and safe method to disabling payment functionality on lost or stolen transaction cards
The disclosure includes systems and methods for disabling a payment function of a transaction card. The system receives payment account data from a transaction card and transmits a payment authorization request message to a card issuer associated with the transaction card. The system receives, from the card issuer, an authorization request response message. The authorization request response message declines the transaction and includes a status response code corresponding to a status of the transaction card. The system determines whether the status response code indicates that the transaction card is to be captured, and if so, disables the payment function of the transaction card via activation of a disabling system.
Systems and methods for incorporating breach velocities into fraud scoring models
A method and system for detecting fraudulent network events in a payment card network by incorporating breach velocities into fraud scoring models are provided. A potential compromise event is detected, and payment cards that transacted at a compromised entity associated with the potential compromise event are identified. Subsequent transaction activity for the payment cards is reviewed, and a data structure for the payment cards are generated. The data structure sorts subsequent transaction activity into fraud score range stripes. The data structure is parsed over a plurality of time periods, and at least one cumulative metric is calculated for each of the time periods in each fraud score range stripe. A plurality of ratio striping values are determined, and a set of feature inputs is generated using the ratio striping values. The feature inputs are applied to a scoring model used to score future real-time transactions initiated using the payment cards.
Stage-specific pipeline view using prediction engine
Techniques for displaying a stage-specific pipeline view with a prediction engine are disclosed. A system displays a plurality of regions representing various stages of completion for a plurality of transactions. The system determines a stage of completion for each of the plurality of transactions at a first point-in-time, and generates and displays visualizations representing each of the plurality of transactions in one of the plurality of regions based on the respective current stage of completion. Generating a visualization representing a first transaction includes determining a likelihood of the first transaction completing a stage associated with the first transaction. The likelihood may be determined by selecting attributes associated with the first transaction and identifying prior transactions with similar attributes. The system may compute the likelihood of the first transaction completing the stage based on completion rates associated with the prior transactions, and select the visualization based on the computed likelihood.
Digital passport with verified data provenance
Systems and methods for accurately and securely assembling, storing, and leveraging travel data are provided. A method may include detecting a travel event of a user. The method may include recording the travel event in a travel map that is stored in a database. The travel map may be a temporal- and spatial-based record of one or more travel events of the user. The travel map may be stored as a blockchain ledger. The method may include tokenizing sensitive information associated with the user in the database, and calculating a hazard vector. The method may include updating, based at least in part on the hazard vector, a status index associated with the user, and providing the user and a system administrator access to the travel map and the status index. Access may be provided via an online portal configured to be viewed via an application running on a mobile device.
Payment service authentication for a transaction using a generated dynamic verification value
Methods and systems for dynamically generating a verification value for a transaction and for utilizing such value to verify the authenticity of the payment service application. The dynamically created verification value may be generated on a payment device, such as an integrated circuit credit card or smart card, embedded into the payment data, and transmitted to a point of sale terminal. Alternatively, payment data is sent by a payment device to a point of sale terminal, which generates a verification value and embeds it into the payment data. The embedded verification value is used by a service provider to verify the authenticity of the transaction. The methods and systems may be used in a contactless (wireless) environment or a non-wireless environment.