Abstract:
A system, method and computer program product is capable of proactive assessment of transactions and communication of alerts based on pre-set rules to increase transaction integrity and mitigate fraud. Unauthorized transactions may be stopped before processing through an account to enhance the security of transactions and decrease fraudulent transactions without the account holder seeing a negative transaction in their account. Chip-enabled cards may be configured to alert account holders of transactions prior to being processed through an account based on pre-set rules stored on the chip or in a remote data store. The transaction can be stopped until the account holder authorizes the transaction based on the alert. The alert can be sent through the merchant system or wirelessly from the chip-enabled card.
Abstract:
A system, method and computer program product is capable of proactive assessment of transactions and communication of alerts based on pre-set rules to increase transaction integrity and mitigate fraud. Unauthorized transactions may be stopped before processing through an account to enhance the security of transactions and decrease fraudulent transactions without the account holder seeing a negative transaction in their account. Chip-enabled cards may be configured to alert account holders of transactions prior to being processed through an account based on pre-set rules stored on the chip or in a remote data store. The transaction can be stopped until the account holder authorizes the transaction based on the alert. The alert can be sent through the merchant system or wirelessly from the chip-enabled card.
Abstract:
The disclosed embodiments include methods, systems, system terminals, and point-of-sale terminals for authenticating a user. The disclosed embodiments include, for example, a method for receiving, by one or more processors, authentication data from an authentication network, the authentication data including an authentication code identifying an authentication transaction associated with an authenticating partner system. The method may also include validating, by the one or more processors, the authentication data, the validating comprising comparing the authentication data with validation data corresponding to a prior authentication event associated with the user. The method may also include generating, by the one or more processors, validation information based on the validating, the validation information comprising a determination whether to validate the user for the authentication transaction. The method may also include providing, by the one or more processors, the validation information to the authentication network.
Abstract:
The disclosed embodiments include methods and systems for validating, funding, activating, and reloading one or more configurable multicards. The disclosed embodiments may include a method that may include obtaining user authentication information relating to a first user associated with an inactivated multicard that is configurable for use for purchases and is configured with a zero multicard account balance amount. The method may include obtaining multicard configuration information including a unique multicard identification information that identifies the inactivated multicard and a first multicard account balance amount for the inactivated multicard. The method may also include validating the inactivated multicard using the unique multicard identification information and associating the inactivated multicard with a multicard account having the first multicard account balance that is funded from a financial account associated with the first user.
Abstract:
A method and system for recommending a physical location at which to complete an electronic activity are disclosed. In some examples, initiation of the electronic activity by a user at a first physical location is detected, that the electronic activity is to be completed at a physical location different from the first physical location is determined, one or more portions of the electronic activity that remain incomplete are determined, a second physical location at which to complete the one or more incomplete portions of the electronic activity is identified, and information about the electronic activity is provided to the second physical location. In some examples, the identification of the second physical location is based on at least characteristics of the electronic activity, the user, and/or the second physical location.
Abstract:
A payment processing method involves a server receiving a payee identifier, and linking the payee identifier to a device identifier identifying a payee device. The server receives from a payor device a payment initiation request identifying a specified payment amount and a payor identifier, links a unique token to the specified payment amount and to the payor identifier, and provides the payor device with the token. The token excludes the payor identifier and particulars of the associated payor. The server receives a payment completion request including the payee identifier and the token, and excluding the payment amount, the payor identifier and payor particulars. The server uses the payee identifier to confirm that the payment completion request was signed with the device identifier, uses the payee identifier to locate a payee account, and uses the token to determine the specified payment amount and a payor account associated with the payor identifier.
Abstract:
The disclosed embodiments include, for example, systems and methods for providing recommendations of one or more alternative products to a user based on investment portfolio data. In one aspect, the disclosed embodiments may include a system that is configured to obtain information associated with one or more products of interest to the user. In certain aspects, the obtained information may identify a product previously purchased by the user, one or more products that form a shopping list of the user, and/or a product identified by the user as a potential purchase. The system may be configured to identify one or more alternative products that are similar to the products of interest and that are related to one or more securities associated with an investment portfolio of the user. In one aspect, the system may be configured to generate one or more instructions to transmit information identifying the one or more alternatives product to a device of the user.
Abstract:
A method of controlling issuance of alerts involves a server receiving notification of occurrence of an event at an account, saving in an events history the event occurrence, receiving device information from a mobile device associated with the account, and determining a position and/or speed from the device information. The server maintains at least one event definition defining particulars of suspension of notifications of events at an account. Upon the position or speed correlating with one of the event definitions, the server saves in the events history an occurrence of at least one additional event occurring at the account subsequent to the event, and suspends notification of the saved occurrences to the mobile device. The server transmits to the mobile device a notification of the occurrences saved in the events history and clears the events history upon the position and speed no longer correlating with any of the event definitions.
Abstract:
A method of identifying potentially fraudulent electronic transactions at an electronic transaction device may involve the transaction device receiving a transaction request for an electronic transaction. The transaction request may include a biometric credential sample and an authentication credential. Upon locating in the transaction history (i) no entry corresponding to the biometric credential sample or (ii) an entry comprising the biometric credential sample in association with the authentication credential, the electronic transaction device may insert into the transaction history a new entry comprising the biometric credential sample in association with the authentication credential and initiates completion of the electronic transaction. Otherwise, the transaction device may insert into the transaction history a new entry comprising the biometric credential sample in association with the authentication credential and generates an alarm signal identifying the electronic transaction as potentially fraudulent.