Abstract:
A message processing server includes a message processor, a network interface, and a memory storing a token database of multi-layer tokens. Each token in the database includes a plurality of encrypted data layers. The message processor receives, via the network interface, at least one authorization message that identifies one of the tokens, derives a first decrypted data layer from the first encrypted data layer of the token, and extracts from the first decrypted data layer a second pointer to a secondary database that stores a predetermined data value. The message processor excises the predetermined data value from the secondary database.
Abstract:
A method and system for recommending a physical location at which to complete an electronic activity are disclosed. In some examples, the system identifies an incomplete portion of an electronic activity initiated at a first device, and identifies a plurality of candidate locations for completion of the electronic activity based on at least one characteristic of the incomplete portion. When a prior location of the first device is closer to a first one of the candidate locations than to a second one of the candidate locations, the system selects the first candidate location for the completion of the electronic activity and provides activity data characterizing the electronic activity to a second device disposed at the first candidate location.
Abstract:
An event monitoring processor includes a processor and at least one memory. The memory stores a database of cohort definitions. Each cohort definition defines a respective cohort. The processor is configured to receive particulars of a member event initiated by a member of one of the cohorts, generate an additional cohort definition from the particulars of the member event, and save the additional cohort definition in the cohort definitions database. The processor is also configured to receive member data associated with the cohort member, select one of the cohorts in the cohort definitions database from a correlation between the member data and the cohort definitions, and save in a cohort member database a member record that identifies a correlation between the member event and an event defined in the selected one cohort.
Abstract:
The disclosed embodiments include methods, systems, system terminals, and point-of-sale terminals for authenticating a user. The disclosed embodiments include, for example, a method for receiving, by one or more processors, authentication data from an authentication network, the authentication data including an authentication code identifying an authentication transaction associated with an authenticating partner system. The method may also include validating, by the one or more processors, the authentication data, the validating comprising comparing the authentication data with validation data corresponding to a prior authentication event associated with the user. The method may also include generating, by the one or more processors, validation information based on the validating, the validation information comprising a determination whether to validate the user for the authentication transaction. The method may also include providing, by the one or more processors, the validation information to the authentication network.
Abstract:
A message processing server includes a message processor, a network interface, and a memory storing a token database of multi-layer tokens. Each token in the database includes a plurality of encrypted data layers. The message processor receives, via the network interface, at least one authorization message that identifies one of the tokens, derives a first decrypted data layer from the first encrypted data layer of the token, and extracts from the first decrypted data layer a second pointer to a secondary database that stores a predetermined data value. The message processor excises the predetermined data value from the secondary database.
Abstract:
The present disclosure involves systems and computer implemented methods for generating a virtual or augmented reality-based oversight system of business processes at a location remote from where the business process is executed. In one example, system operations include identifying a process-based operation performed at a physical first location, where the operation is associated with a request for oversight from a remote second location. A current state of the operation at the first location is identified, and at least one input source at the first location is identified. A simulation of the current state of the operation at the first location incorporating input from the input source(s) is generated for presentation at the second location. An action performed at the first location in the current state of the operation is identified, and the second location is then transmitted a request to authorize the identified action.
Abstract:
A method of effecting an incentive transaction involves a computer server receiving a notification message that identifies a financial transaction. The server is in communication with a database of incentive plans, each comprising a plan definition that defines an incentive transaction. Each plan is associated with plan participants by participant identifiers. Each participant identifier is uniquely associated with their plan participant. The notification message includes a product code and the participant identifier of one plan participant. The server identifies an incentive plan applicable to the financial transaction from a correlation with the participant identifier, determines an incentive amount from the product code and the incentive plan definition of the applicable incentive plan, and initiates the incentive transaction for the incentive amount with a first financial account associated with the one plan participant and with a second financial account associated with another of the plan participants of the applicable incentive plan.
Abstract:
The disclosed embodiments include methods and systems that provide secure data transmission between networked computing systems by obfuscating sensitive customer account data with placeholder account data generated in real-time and without customer intervention. The disclosed embodiments may include a computerized device that monitors user input to detect an initiation of a purchase transaction at a merchant, and upon detection of the initiated purchase transaction, may obtain a placeholder account suitable for use in the purchase transaction and capable of masking a user's sensitive account information without user intervention. In some instances, a system of a financial institution may activate and fund the placeholder account in real time and in an amount consistent with a transaction amount of the purchase transaction. Devices consistent with the disclosed embodiments may request execution of the initiated purchase transaction in accordance with the activated and funded placeholder account.
Abstract:
A system, method and computer program product is capable of proactive assessment of transactions and communication of alerts based on pre-set rules to increase transaction integrity and mitigate fraud. Unauthorized transactions may be stopped before processing through an account to enhance the security of transactions and decrease fraudulent transactions without the account holder seeing a negative transaction in their account. Chip-enabled cards may be configured to alert account holders of transactions prior to being processed through an account based on pre-set rules stored on the chip or in a remote data store. The transaction can be stopped until the account holder authorizes the transaction based on the alert. The alert can be sent through the merchant system or wirelessly from the chip-enabled card.
Abstract:
A system, method and computer program product is capable of proactive assessment of transactions and communication of alerts based on pre-set rules to increase transaction integrity and mitigate fraud. Unauthorized transactions may be stopped before processing through an account to enhance the security of transactions and decrease fraudulent transactions without the account holder seeing a negative transaction in their account. Chip-enabled cards may be configured to alert account holders of transactions prior to being processed through an account based on pre-set rules stored on the chip or in a remote data store. The transaction can be stopped until the account holder authorizes the transaction based on the alert. The alert can be sent through the merchant system or wirelessly from the chip-enabled card.