Abstract:
A computer-implemented method of providing enriched transaction data for a transaction requiring an authorization is provided, the transaction performed using a computer system having a processor and a memory device. The method includes storing transaction data received from an input channel, the transaction data including a transaction identifier. An execution plan is retrieved based at least in part on the transaction identifier. The transaction data is processed across an enrichment processor based on the execution plan to generate at least one fraud score for the transaction. The transaction data is enriched to include at least one of the fraud score and an enriched data object. The enriched data is transmitted to an authorizing party for authorization.
Abstract:
An automatic billing updater (ABU) manager computing device for managing an account information data source and tracking access to the account information data source is provided. The ABU manager computing device receives account data from an issuing party, stores the account information in an account information data source, and provides the account data to requesting parties. The ABU manager computing device tracks access to the stored account data via an ABU traffic data source. ABU manager computing device may also track transaction-related messages corresponding to the stored account data in a transaction traffic data source. In certain embodiments, ABU manager computing device may generate and transmit notifications based on data stored in one or more of the stored account data, the ABU traffic data source, and the transaction traffic data source.
Abstract:
A computing device for enhancing cybersecurity in electronic networks is provided. The computing device includes one or more processors in communication with one or more memory devices, where the one or more processors are configured to receive, from an authentication webpage executing on a user computing device, a request to enroll into a secure application, and apply a plurality of rules to the device attribute data to determine an authentication confidence level of the request. The one or more processors are further configured to retrieve, from the one or more memory devices and based on the determined authentication confidence level, an enrollment procedure instruction from a plurality of enrollment procedure instructions for enrollment into the secure application, and transmit the enrollment procedure instruction to the user computing device to complete the enrollment into the secure application.
Abstract:
A pre-chargeback computer network for processing pre-chargeback dispute messages includes a dispute analyzer (DA) computing device. The DA computing device is configured to receive a dispute message identifying a disputed transaction from an issuer portal over a first communication link, the dispute message including transaction data associated with the disputed transaction and dispute data. The DA computing device is further configured to analyze the transaction data and the dispute data, and route the dispute message over the pre-chargeback network or a separate chargeback network based on the analysis.
Abstract:
A computer system including a first network-based portal, a second network-based portal, and an analyzer computing device including at least one processor is provided. The at least one processor is configured to: (i) receive an initial data message including data elements, (ii) analyze, using machine learning tools, the data elements to determine to route the initial data message to the second network-based portal or to a processing computing device, (iii) in response to determining to route the initial data message to the second network-based portal, route the initial data message to the second network-based portal via a first network communication link, and (iv) in response to determining to route the initial data message to the processing computing device via a second network communication link, reformat the initial data message into a different protocol compatible with the second network communication link, and transmit the reformatted message to the processing computing device.
Abstract:
A computer-implemented method of providing enriched transaction data for a transaction requiring an authorization is provided, the transaction performed using a computer system having a processor and a memory device. The method includes storing transaction data received from an input channel, the transaction data including a transaction identifier. An execution plan is retrieved based at least in part on the transaction identifier. The transaction data is processed across an enrichment processor based on the execution plan to generate at least one fraud score for the transaction. The transaction data is enriched to include at least one of the fraud score and an enriched data object. The enriched data is transmitted to an authorizing party for authorization.
Abstract:
A computer-based method for verifying a new user during enrollment to a digital wallet application is provided. The method is implemented using a digital wallet computing device including one or more processors in communication with one or more memory devices. The method includes receiving, from the new user, an enrollment request to the digital wallet application. The enrollment request including attribute data associated with the new user. Calculating an authentication level of the enrollment request based on the attribute data, wherein the authentication level represents a level of confidence that the enrollment request is not fraudulent. The method also includes performing a lookup in the one or more member devices and retrieving an enrollment procedure from a plurality of enrollment procedures for the new user based on the calculated authentication level, and transmitting the enrollment procedure to the new user.
Abstract:
An automatic billing updater (ABU) manager computing device for managing an account information data source and tracking access to the account information data source is provided. The ABU manager computing device receives account data from an issuing party, stores the account information in an account information data source, and provides the account data to requesting parties. The ABU manager computing device tracks access to the stored account data via an ABU traffic data source. ABU manager computing device may also track transaction-related messages corresponding to the stored account data in a transaction traffic data source. In certain embodiments, ABU manager computing device may generate and transmit notifications based on data stored in one or more of the stored account data, the ABU traffic data source, and the transaction traffic data source.
Abstract:
A computer-implemented method of providing enriched transaction data for a transaction requiring an authorization is provided, the transaction performed using a computer system having a processor and a memory device. The method includes storing transaction data received from an input channel, the transaction data including a transaction identifier. An execution plan is retrieved based at least in part on the transaction identifier. The transaction data is processed across an enrichment processor based on the execution plan to generate at least one fraud score for the transaction. The transaction data is enriched to include at least one of the fraud score and an enriched data object. The enriched data is transmitted to an authorizing party for authorization.
Abstract:
A regulated computing device for regulating an information data source and verifying access to the information data source is provided. The regulated computing device receives account data from an issuer, the account data corresponding to a cardholder, and stores the account data in the information data source based on an account identifier associated with the cardholder. The regulated computing device receives an update request from a merchant, the update request including the account identifier and requesting the account data of the cardholder, and verifies the update request in response to receiving the update request by applying at least one verification rule and determining that the merchant is a verified merchant. The regulated computing device also generates an update response, the update response including the account data of the cardholder, and transmits the update response to the verified merchant.