Abstract:
Stored value instruments and tools for their use and/or administration are disclosed. In an aspect, a stored value instrument is associated with a subaccount that has access to a portion of an amount stored value in a master account. There may be many such subaccounts associated with a master account, and each subaccount may have its own associated stored value instrument. Beneficially, this arrangement can allow a master account holder to assign a specific portion of the stored value in the master account for the use of each of the stored value instruments, while still maintaining the ability to administer the master account.
Abstract:
According to one embodiment of the invention, an architecture for a data processing system can be implemented that processes data for a service provider itself or a client of a service provider as in the case of a third party processor. The elements of the architecture can be managed separately. For example, the architecture can be organized around eight subject areas, such as account, party, communication point, presentation instrument, rules, balances, transactions, and product. Relationships between each of the subject areas as well as between sub-types of each subject area can be established to provide flexibility in the management of the data.
Abstract:
Methods, systems, and machine-readable media are disclosed for registering a mobile device for use in a mobile commerce system. According to one embodiment, a method of registering a mobile device for use in a mobile commerce system can comprise receiving at a service provider system a registration request from a user of the mobile device. A determination can be made with the service provider system whether to allow registration of the mobile device. In response to determining to allow registration of the mobile device, the registration request can be sent from the service provider system to an acquirer system.
Abstract:
Systems and methods for providing connectivity to a wireless network may include a point of sale device at a merchant location that is used to receive an account identifier that in turn is associated with a stored value account of a customer. The account identifier is transmitted along with transaction data to a financial network to permit the stored value account to be processed according to the transaction request. When needing to receive wireless access, a customer using a personal communications device transmits a request to obtain wireless access while he is at the merchant location. An evaluation is performed to confirm that the customer has performed a transaction involving the stored value account within a certain time period. Wireless access to the wireless network is provided if the customer has performed the transaction within the certain time period.
Abstract:
Methods and/or systems for providing preauthorization and transaction settlement for a transaction using a prepaid unit-based presentation instrument are disclosed, wherein the presentation instrument includes a unit balance. The method may include receiving a preauthorization request that includes a price-per-unit and a preauthorization amount. The methods and/or systems may then determine whether the unit balance is sufficient to cover the preauthorization amount. If the unit balance is sufficient to cover the preauthorization amount, the presentation instrument is authorized for the transaction. If the unit balance is insufficient to cover the preauthorization amount, a currency balance is determined from the unit balance and the price-per-unit, authorizing the presentation instrument for a transaction up to the currency balance and sending an indication that the currency balance is authorized for the transaction.
Abstract:
According to the invention, a method for identifying suspect financial transactions across multiple accounts is disclosed. The method may include receiving a plurality of data sets. Each data set may relate to a financial transaction, and the plurality of data sets may include a first data set related to a first financial transaction, where the first financial transaction is associated with a first account; and a second data set related to a second financial transaction, where the second financial transaction is associated with a second account. The method may also include flagging the first data set as relating to a fraudulent transaction; analyzing the plurality of data sets according to a first set of criteria, wherein the analysis indicates that the first financial transaction and second financial transaction are similar; and flagging the second data set as relating to a suspect transaction.
Abstract:
Systems and methods are described to provide an interface between distinct host service providers and one or more remotely programmable point-of-sale devices. A set of transaction data may be received from a point-of-sale device. Different subsets of the set of transaction data may be identified for each of the service providers. Each of the identified subsets may be transmitted to the appropriate service provider in a format readable by that service provider.
Abstract:
Systems for enrolling and authenticating transaction cards for PIN-less transactions are disclosed. Enrollment may include subjecting a cardholder to questions regarding previous transaction card transactions and then associating and storing a physical identifier with the transaction card. After enrollment, the cardholder may use the transaction card for PIN-less transactions, for example on the Internet, by successfully providing a physical identifier or pass code that matches the stored physical identifier that was used to enroll the transaction card. Different cardholders may send different types of physical identifier, for example, biometric samples, PC signatures and the like. In yet other embodiments, the system may direct a cardholder to the cardholder's financial institution webpage for authentication of a PIN-less transaction without requiring the cardholder to send a physical identifier. The financial institution may require any authentication they deem sufficient to permit a PIN-less transaction card transaction.
Abstract:
A suspect transaction dataset may be generated from screening a transaction dataset against a master suspect list. Often, this screening process results in a large percentage of false positives hits distributed among the data in the suspect transaction dataset. Among other things, embodiments of the invention provide systems and methods for removing the false positives from a suspect transaction dataset. Some embodiments of the invention use detailed decision matrices to generate, analyze, and cull the dataset. Other embodiments use multi-tiered screening with iterative feedback loops to perform those and other dataset functions.
Abstract:
A risk assessment system that performs a risk assessment of a financial transaction. The risk assessment system incorporates a profitability assessment scoring model that evaluates whether to approve or decline a financial transaction based on the potential profit or loss that can be generated by the transaction for the guarantor or merchant. The profitability scoring model uses an algorithm that is formulated to calculate a profitability score based on variables that have a direct correlation to the overall profit or loss of the transaction. The scoring model takes into consideration variables such as the per check fee charged, probability of collection, and collection fee. The risk assessment system determines whether to approve or decline a transaction based on the potential profit or loss that can be generated by the transaction.