Systems and methods for identifying a MCC-misclassified merchant

    公开(公告)号:US11514533B2

    公开(公告)日:2022-11-29

    申请号:US16718737

    申请日:2019-12-18

    Abstract: A computer system for identifying merchant category code misclassifications includes at least one processor in communication with a transaction database and a high-risk merchant database. The transaction database stores transaction records by a plurality of account holders. The high-risk merchant database stores high-risk merchant records each associated with high-risk merchants. The processor queries the transaction database for transaction records and calculates a high-risk cardholder metric for each of the account numbers. The at least one processor further queries the transaction database for transaction records including (i) the account number of high-risk cardholders, and (ii) a merchant identifier associated with other than the plurality of high-risk merchants, to retrieve a second set of transaction records. The at least one processor further calculates a high-risk merchant metric for each of the merchant identifiers, identifying a MCC misclassified merchant.

    Systems and Methods for Authenticating Business Partners, in Connection With Requests by the Partners for Products and/or Services
    5.
    发明申请
    Systems and Methods for Authenticating Business Partners, in Connection With Requests by the Partners for Products and/or Services 审中-公开
    用于验证业务伙伴的系统和方法,与产品和/或服务合作伙伴的请求相关联

    公开(公告)号:US20160371698A1

    公开(公告)日:2016-12-22

    申请号:US15184660

    申请日:2016-06-16

    CPC classification number: G06Q20/4016 G06Q20/4014

    Abstract: Systems and methods for use in authenticating business partners, in connection with requests by the partners for various products and/or services, are disclosed. An exemplary method generally includes receiving a request from a business partner for a product and/or a service where the product and/or service relates, for example, at least partly, to transaction data, or other data. The method also generally includes assigning a risk score to the business partner, comparing the risk score assigned to the business partner to a sensitivity threshold associated with the requested product and/or service, and distributing the product and/or service to the business partner, when the risk score satisfies the sensitivity threshold.

    Abstract translation: 公开了与合作伙伴对各种产品和/或服务的请求相关的用于鉴定业务伙伴的系统和方法。 一种示例性方法通常包括从产品和/或产品和/或服务涉及的商业伙伴接收例如至少部分地涉及交易数据或其他数据的请求。 该方法还通常包括将风险分数分配给业务伙伴,将分配给业务伙伴的风险分数与与所请求的产品和/或服务相关联的灵敏度阈值进行比较,并将产品和/或服务分发给业务伙伴, 当风险分数满足灵敏度阈值时。

    SYSTEMS AND METHODS FOR IDENTIFYING A MCC-MISCLASSIFIED MERCHANT

    公开(公告)号:US20210192640A1

    公开(公告)日:2021-06-24

    申请号:US16718737

    申请日:2019-12-18

    Abstract: A computer system for identifying merchant category code misclassifications includes at least one processor in communication with a transaction database and a high-risk merchant database. The transaction database stores transaction records by a plurality of account holders. The high-risk merchant database stores high-risk merchant records each associated with high-risk merchants. The processor queries the transaction database for transaction records and calculates a high-risk cardholder metric for each of the account numbers. The at least one processor further queries the transaction database for transaction records including (i) the account number of high-risk cardholders, and (ii) a merchant identifier associated with other than the plurality of high-risk merchants, to retrieve a second set of transaction records. The at least one processor further calculates a high-risk merchant metric for each of the merchant identifiers, identifying a MCC misclassified merchant.

    MANAGEMENT SYSTEMS FOR PERSONAL IDENTIFYING DATA, AND METHODS RELATING THERETO

    公开(公告)号:US20210133300A1

    公开(公告)日:2021-05-06

    申请号:US17145155

    申请日:2021-01-08

    Abstract: Systems and methods are provided for managing personal identifying information (PII). An exemplary method includes receiving, from a requestor, a request to remove PII for at least one individual from multiple service providers. In response, a computing device authenticates the requestor, determines whether a restriction on the PII or the individual applies to the request, and broadcasts the request to the service providers. The computing device receives a response to the request from each of the service providers indicating removal of the PII and compiles a reply to the request, based on each response, where the reply includes a confirmation of removal of the PII. The computing device then transmits the reply to the requestor and logs the request from the requestor and the response from each of the services providers in an audit data structure, thereby permitting compliance with PII controls to be demonstrated.

Patent Agency Ranking