Abstract:
A digitized card data structure is stored in association with a digital card environment. The digitized card data structure corresponds to a card issued to a card holder. The digitized card data structure has a component for providing output to the card holder. Under a first condition the component provides a first output and under a second condition, the component provides a second output different from the first output.
Abstract:
A computer system for identifying merchant category code misclassifications includes at least one processor in communication with a transaction database and a high-risk merchant database. The transaction database stores transaction records by a plurality of account holders. The high-risk merchant database stores high-risk merchant records each associated with high-risk merchants. The processor queries the transaction database for transaction records and calculates a high-risk cardholder metric for each of the account numbers. The at least one processor further queries the transaction database for transaction records including (i) the account number of high-risk cardholders, and (ii) a merchant identifier associated with other than the plurality of high-risk merchants, to retrieve a second set of transaction records. The at least one processor further calculates a high-risk merchant metric for each of the merchant identifiers, identifying a MCC misclassified merchant.
Abstract:
Systems and methods are provided for managing personal identifying information (PII). An exemplary method includes receiving, from a requestor, a request to remove PII for at least one individual from multiple service providers. In response, a computing device authenticates the requestor, determines whether a restriction on the PII or the individual applies to the request, and broadcasts the request to the service providers. The computing device receives a response to the request from each of the service providers indicating removal of the PII and compiles a reply to the request, based on each response, where the reply includes a confirmation of removal of the PII. The computing device then transmits the reply to the requestor and logs the request from the requestor and the response from each of the services providers in an audit data structure, thereby permitting compliance with PII controls to be demonstrated.
Abstract:
Systems and methods are provided for managing personal identifying information (PII). An exemplary method includes receiving, from a requestor, a request related to PII for an individual. In connection therewith, a computing device determines whether a restriction on the PII or the individual applies to the request, and then broadcasts the request, subject to the determined restriction, to a service provider of a service associated with the individual where the service provider is a controller of PII of the individual. The computing device also compiles a reply to the request, based on a response from the service provider, where the reply includes the PII, and transmits the reply to the requestor. The computing device then logs multiple interactions related to the request in an audit data structure, thereby permitting compliance with PII controls to be demonstrated.
Abstract:
Systems and methods for use in authenticating business partners, in connection with requests by the partners for various products and/or services, are disclosed. An exemplary method generally includes receiving a request from a business partner for a product and/or a service where the product and/or service relates, for example, at least partly, to transaction data, or other data. The method also generally includes assigning a risk score to the business partner, comparing the risk score assigned to the business partner to a sensitivity threshold associated with the requested product and/or service, and distributing the product and/or service to the business partner, when the risk score satisfies the sensitivity threshold.
Abstract:
A computer system for identifying merchant category code misclassifications includes at least one processor in communication with a transaction database and a merchant database. The transaction database stores transaction records by a plurality of account holders. The processor generates a first MCC profile including at least one transaction characteristic representative of merchants properly classified as the first MCC and comparing the first MCC profile to a second set of transaction records. If the comparison satisfies a comparison threshold for the first MCC the processor identifies the corresponding selected merchant as being MCC misclassified.
Abstract:
A computer system for identifying merchant category code misclassifications includes at least one processor in communication with a transaction database and a merchant database. The transaction database stores transaction records by a plurality of account holders. The processor generates a first MCC profile including at least one transaction characteristic representative of merchants properly classified as the first MCC and comparing the first MCC profile to a second set of transaction records. If the comparison satisfies a comparison threshold for the first MCC the processor identifies the corresponding selected merchant as being MCC misclassified.
Abstract:
A computer system for identifying merchant category code misclassifications includes at least one processor in communication with a transaction database and a high-risk merchant database. The transaction database stores transaction records by a plurality of account holders. The high-risk merchant database stores high-risk merchant records each associated with high-risk merchants. The processor queries the transaction database for transaction records and calculates a high-risk cardholder metric for each of the account numbers. The at least one processor further queries the transaction database for transaction records including (i) the account number of high-risk cardholders, and (ii) a merchant identifier associated with other than the plurality of high-risk merchants, to retrieve a second set of transaction records. The at least one processor further calculates a high-risk merchant metric for each of the merchant identifiers, identifying a MCC misclassified merchant.
Abstract:
Systems, apparatuses and methods may provide for technology to determine that first details associated with a first electronic payment process are absent and identify that second details are selected by a user. The second details may be associated with a second electronic payment process and further the second details may be associated with the first details. The technology may also determine that the first details are to be retrieved based on the second details and cause the second details to be transmitted.
Abstract:
Systems and methods are provided for managing personal identifying information (PII). An exemplary method includes receiving, from a requestor, a request to remove PII for at least one individual from multiple service providers. In response, a computing device authenticates the requestor, determines whether a restriction on the PII or the individual applies to the request, and broadcasts the request to the service providers. The computing device receives a response to the request from each of the service providers indicating removal of the PII and compiles a reply to the request, based on each response, where the reply includes a confirmation of removal of the PII. The computing device then transmits the reply to the requestor and logs the request from the requestor and the response from each of the services providers in an audit data structure, thereby permitting compliance with PII controls to be demonstrated.