Abstract:
Intelligent advice and transaction handling systems and methods. An embodiment includes a merchant device, a merchant server computer, a consumer mobile device, and a smart preferences computer having a decision engine operably connected to a storage device. The storage device stores instructions configured to cause the decision engine to receive service call data associated with a purchase transaction, and determine that a cardholder associated with the purchase transaction is a registered smart preferences user. The process includes accessing smart preferences cardholder profile data, determining a recommendation including at least a first choice payment card account and a second choice payment card account, and then transmitting the first choice payment card account data to the merchant device for purchase transaction processing when the cardholder profile data includes a permission indication. However, the recommendation is transmitted to the cardholder device when the permission indication is not found.
Abstract:
Disclosed are methods, apparatus and systems for providing an intelligent shopping cart service that operates to alert a consumer when a product or service is not aligned with the consumer's preferences, criteria or requirements before a purchase transaction is consummated. In some embodiments, a consumer device includes a processor that stores intelligent shopping cart software in a memory, and that uses the intelligent shopping cart software to detect product or service identification data when a consumer adds a product or service to a shopping cart. The processor then determines, based on the product or service identification data, that the product or service is a mismatch when compared to predetermined consumer preferences, criteria or requirements. An alert indication is then provided to the consumer via an output component before a purchase transaction is consummated.
Abstract:
Systems and methods for permitting a consumer to consummate a purchase transaction when the purchase transaction amount exceeds an available credit limit and that consumer has assets to cover the overage amount. Thus, in some embodiments a net worth confirmation platform receives transaction information, transmits the transaction information to an Issuer financial institution (FI), receives an indication from the Issuer FI that the that the transaction is unauthorized, and determines that at least one business rule applies to the transaction and an overage amount. The net worth confirmation platform also determines a net worth estimate of the consumer based on at least one asset of the consumer, and transmits a transaction authorization message to the merchant when the business rule(s) is or are satisfied.
Abstract:
According to some embodiments, an asset confirmation platform may receive transaction information about a purchase being made by a customer from a merchant. Responsive to the received transaction information, the asset confirmation platform may automatically determine a monetary value of at least one asset owned by the customer. The asset might be associated with, for example, stocks owned by the customer in a trading account. An indication associated with the monetary value of the asset may then be transmitted.
Abstract:
Systems, methods and apparatus are described for securely authenticating a user at an appropriate level of security depending on context. A system embodiment includes a meta-wallet system platform, a user mobile device, and a plurality of entity computers. A meta-wallet processor receives a user authentication request from a user mobile device including a meta-wallet identifier, an entity identifier, a context identifier, and at least one of user biometric data, user personal assets data, and user social media data. The meta-wall processor then determines that the user is a registered meta-wallet user, defined at least one security protocol, and is engaging in a predetermined type of activity. A security protocol is then selected, and a determination made that a combination of personally identifiable assets data and user biometric data and/or user social media data matches stored data and satisfies the security protocol. The meta-wallet processor then transmits a user authentication confirmation message to the user mobile device and/or to an entity computer.
Abstract:
Methods, apparatus and systems are described for securely authenticating a person at an appropriate level of security depending on context without having to enter any passwords. In some embodiments, a meta-wallet processor receives a request for user authentication from a user device which includes a meta-wallet identifier, an entity identifier, a context identifier and user biometric data and/or user personal assets data, and/or user social media data. The meta-wallet processor determines that the user is registered meta-wallet user and is engaging in a predetermined type of activity, selects an authentication protocol, determines that the user biometric data and/or user personal assets data, and/or user social media data matches stored personal meta-wallet data and satisfies the authentication protocol, and then transmits a user authentication confirmation message to one of the user device and an entity computer associated with the entity identifier.
Abstract:
Systems and methods are provided for use in deploying an application to one or more different regions. One exemplary method includes selecting, at a deployment device, a stack defining the application. The stack includes metadata and incorporates at least one user interface and at least one application programming interface (API). The exemplary method further includes adapting, by the deployment device, the selected stack to a region based on the metadata and the region; and deploying the application to be accessible to at least a consumer in said region.
Abstract:
Systems, methods and apparatus are described for securely authenticating a user at an appropriate level of security depending on context. A system embodiment includes a meta-wallet system platform, a user mobile device, and a plurality of entity computers. A meta-wallet processor receives a user authentication request from a user mobile device including a meta-wallet identifier, an entity identifier, a context identifier, and at least one of user biometric data, user personal assets data, and user social media data. The meta-wall processor then determines that the user is a registered meta-wallet user, defined at least one security protocol, and is engaging in a predetermined type of activity. A security protocol is then selected, and a determination made that a combination of personally identifiable assets data and user biometric data and/or user social media data matches stored data and satisfies the security protocol. The meta-wallet processor then transmits a user authentication confirmation message to the user mobile device and/or to an entity computer.
Abstract:
Methods, apparatus and systems include an intelligent decision engine that analyzes data associated with the payment card accounts of a consumer along with other information regarding a particular transaction, and then provides a recommendation to a cardholder concerning which payment card account(s) to use to maximize value. In an embodiment, a processor receives service call data associated with a purchase transaction, determines that a cardholder is a registered smart preferences user, and accesses smart preferences cardholder profile data. The processor then determines a recommendation of at least one payment card account to select for use in the purchase transaction, and transmits the recommendation to a device for consideration and selection of a payment card account by the cardholder.
Abstract:
Systems and methods are provided for use in deploying an application to one or more different regions. One exemplary method includes selecting, at a deployment device, a stack defining the application. The stack includes metadata and incorporates at least one user interface and at least one application programming interface (API). The exemplary method further includes adapting, by the deployment device, the selected stack to a region based on the metadata and the region; and deploying the application to be accessible to at least a consumer in said region.