Abstract:
A payment processing method involves a server receiving a payee identifier, and linking the payee identifier to a device identifier identifying a payee device. The server receives from a payor device a payment initiation request identifying a specified payment amount and a payor identifier, links a unique token to the specified payment amount and to the payor identifier, and provides the payor device with the token. The token excludes the payor identifier and particulars of the associated payor. The server receives a payment completion request including the payee identifier and the token, and excluding the payment amount, the payor identifier and payor particulars. The server uses the payee identifier to confirm that the payment completion request was signed with the device identifier, uses the payee identifier to locate a payee account, and uses the token to determine the specified payment amount and a payor account associated with the payor identifier.
Abstract:
The disclosed embodiments include systems and methods for administering actual and virtual investment portfolios based on transaction data associated with one or more users. The disclosed embodiments may be configured to modify an investment risk tolerance of a user based on transaction data identifying one or more first products purchased by the user and one or more prior financial services transactions associated with the user. The disclosed embodiments may also be configured to identify one or more first securities based on a portion of the transaction data and the modified investment risk tolerance. In certain aspects, the identified first securities may be related to at least one of the purchased products.
Abstract:
The disclosed embodiments include methods, systems, system terminals, and point-of-sale terminals for authenticating a user. The disclosed embodiments include, for example, a method for receiving, by one or more processors, authentication data from an authentication network, the authentication data including an authentication code identifying an authentication transaction associated with an authenticating partner system. The method may also include validating, by the one or more processors, the authentication data, the validating comprising comparing the authentication data with validation data corresponding to a prior authentication event associated with the user. The method may also include generating, by the one or more processors, validation information based on the validating, the validation information comprising a determination whether to validate the user for the authentication transaction. The method may also include providing, by the one or more processors, the validation information to the authentication network.
Abstract:
A method of effecting an incentive transaction involves a computer server receiving a transaction notification message that identifies a financial transaction. The server is in communication with a database of incentive plans, each comprising a plan definition that defines an incentive transaction to be transacted with an incentive account. Each plan is associated with plan participants by participant identifiers. Each participant identifier is uniquely associated with their plan participant. The incentive account is jointly associated with the plurality of plan participants. The notification message includes a product code and the participant identifier of one plan participant. The server identifies an incentive plan applicable to the financial transaction from a correlation with the participant identifier, determines an incentive amount from the product code and the incentive plan definition of the applicable incentive plan, and initiates the incentive transaction for the incentive amount with the incentive account of the applicable incentive plan.
Abstract:
Online reviews present a wealth of information for consumers to consider when making purchase decisions. Consumers however, can be disadvantaged by an inability to determine the usefulness of reviews, the wealth of information thus providing marginal utility. Where consumers can establish an affinity or trust with a reviewer, the usefulness of a review can be vetted against the perspective of the consumer, assisting consumers in making purchase decisions with greater confidence and reliability. Social media further supports consumers by providing a convenient pool of reviewers with whom a consumer may already have pre-existing relationships or familiarity with, bolstering the ability of the consumer to establish an affinity or trust with the reviewer. An adaptive influence process provides a method for consumers to adapt such a collection of reviews, and tailor them to the consumer's own perspective to assist in making purchase decisions with greater confidence.
Abstract:
A system, method and computer program product that is capable of determining respective merchant behaviour scores and consumer behaviour scores. Merchant locations (e.g. point of purchase or other geographic or virtual locations), in association with which merchants and consumers conduct transactions, can be used to enhance behaviour scoring capabilities. A merchant location may be attributed a merchant behaviour score such as one determined in accordance with consumer behaviour/financial/risk metrics of consumers who conduct transactions with the location. A specific consumer may be attributed a consumer behaviour score determined in accordance with the respective merchant behaviour scores of locations with which the specific consumer conducts transactions.
Abstract:
A method and system for recommending a physical location at which to complete an electronic activity are disclosed. In some examples, the system identifies an incomplete portion of an electronic activity initiated at a first device, and identifies a plurality of candidate locations for completion of the electronic activity based on at least one characteristic of the incomplete portion. When a prior location of the first device is closer to a first one of the candidate locations than to a second one of the candidate locations, the system selects the first candidate location for the completion of the electronic activity and provides activity data characterizing the electronic activity to a second device disposed at the first candidate location.
Abstract:
The disclosed embodiments include methods, systems, system terminals, and point-of-sale terminals for authenticating a user. The disclosed embodiments include, for example, a method for receiving, by one or more processors, authentication data from an authentication network, the authentication data including an authentication code identifying an authentication transaction associated with an authenticating partner system. The method may also include validating, by the one or more processors, the authentication data, the validating comprising comparing the authentication data with validation data corresponding to a prior authentication event associated with the user. The method may also include generating, by the one or more processors, validation information based on the validating, the validation information comprising a determination whether to validate the user for the authentication transaction. The method may also include providing, by the one or more processors, the validation information to the authentication network.
Abstract:
A method of effecting an incentive transaction involves a computer server receiving a notification message that identifies a financial transaction. The server is in communication with a database of incentive plans, each comprising a plan definition that defines an incentive transaction. Each plan is associated with plan participants by participant identifiers. Each participant identifier is uniquely associated with their plan participant. The notification message includes a product code and the participant identifier of one plan participant. The server identifies an incentive plan applicable to the financial transaction from a correlation with the participant identifier, determines an incentive amount from the product code and the incentive plan definition of the applicable incentive plan, and initiates the incentive transaction for the incentive amount with a first financial account associated with the one plan participant and with a second financial account associated with another of the plan participants of the applicable incentive plan.
Abstract:
The disclosed embodiments include methods and systems that provide secure data transmission between networked computing systems by obfuscating sensitive customer account data with placeholder account data generated in real-time and without customer intervention. The disclosed embodiments may include a computerized device that monitors user input to detect an initiation of a purchase transaction at a merchant, and upon detection of the initiated purchase transaction, may obtain a placeholder account suitable for use in the purchase transaction and capable of masking a user's sensitive account information without user intervention. In some instances, a system of a financial institution may activate and fund the placeholder account in real time and in an amount consistent with a transaction amount of the purchase transaction. Devices consistent with the disclosed embodiments may request execution of the initiated purchase transaction in accordance with the activated and funded placeholder account.