US20070192249A1 - System, method and computer program product for authorizing transactions using enhanced authorization data - Google Patents

System, method and computer program product for authorizing transactions using enhanced authorization data Download PDF

Info

Publication number
US20070192249A1
US20070192249A1 US11/303,018 US30301805A US2007192249A1 US 20070192249 A1 US20070192249 A1 US 20070192249A1 US 30301805 A US30301805 A US 30301805A US 2007192249 A1 US2007192249 A1 US 2007192249A1
Authority
US
United States
Prior art keywords
authorization data
transaction
computer
enhanced
risk
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
US11/303,018
Inventor
Janet Biffle
Danielle Domenica
Chanderpreet Duggal
Kristin Gomes
Stuart Goulden
Chin Khor
Vernon Marshall
Sabyasachi Mohanty
Ian Webb
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Liberty Peak Ventures LLC
Original Assignee
American Express Travel Related Services Co Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by American Express Travel Related Services Co Inc filed Critical American Express Travel Related Services Co Inc
Priority to US11/303,018 priority Critical patent/US20070192249A1/en
Assigned to AMERICAN EXPRESS TRAVEL RELATED SERVICES COMPANY, INC. reassignment AMERICAN EXPRESS TRAVEL RELATED SERVICES COMPANY, INC. ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: MOHANTY, SABYASACHI, WEBB, IAN R., DUGGAL, CHANDERPREET, MARSHALL, VERNON, DOMENICA, DANIELLE, GOULDEN, STUART, BIFFLE, JANET L., GOMES, KRISTIN HOYNE, KHOR, CHIN H.
Publication of US20070192249A1 publication Critical patent/US20070192249A1/en
Assigned to III HOLDINGS 1, LLC reassignment III HOLDINGS 1, LLC ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: AMERICAN EXPRESS TRAVEL RELATED SERVICES COMPANY, INC.
Assigned to LIBERTY PEAK VENTURES, LLC reassignment LIBERTY PEAK VENTURES, LLC ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: III HOLDINGS 1, LLC
Abandoned legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/08Payment architectures
    • G06Q20/12Payment architectures specially adapted for electronic shopping systems
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/02Reservations, e.g. for tickets, services or events
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/22Payment schemes or models
    • G06Q20/24Credit schemes, i.e. "pay after"
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/401Transaction verification
    • G06Q20/4016Transaction verification involving fraud or risk level assessment in transaction processing
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/06Buying, selling or leasing transactions

Definitions

  • the present invention generally relates to fraud detection and more particularly to reducing fraudulent transactions.
  • a transaction instrument may be used to make a purchase in-person, for example, at a retail store, a restaurant, or a hotel by physically presenting a merchant with the transaction instrument.
  • a transaction instrument may also be used to make a purchase without physically presenting the transaction instrument by relaying information associated with the transaction instrument, such as account number, account name, expiration date, and billing address, to a merchant. Examples of merchants that accept transaction instruments as payment without physically receiving the transaction instrument include Internet, telephone and mail order merchants.
  • transaction instruments provide a convenient means for making payments, they are vulnerable to fraud.
  • a transaction instrument may be copied, or information about a transaction instrument necessary to make purchases may be stolen. While the card member and card issuer are unsuspecting of any fraudulent activity, numerous fraudulent purchases may be charged to the card member's transaction instrument.
  • a card issuer may employ a risk analysis when a merchant requests authorization to receive a transaction instrument as payment. Risk analysis is utilized to evaluate the risks of a purchase being fraudulent. If the risks are determined to be, unacceptable, the card issuer may deny the merchant's request to receive the transaction instrument as payment. For example, if a transaction instrument is reported as being lost, risk analysis may indicate an unacceptable level of risk for any further purchases involving the transaction instrument. The card issuer may then deny any requests made by merchants for authorization to accept the transaction instrument as payment.
  • Conventional risk analysis reduces incidences of fraud, its ability to distinguish genuine and fraudulent purchases is limited because only a limited amount of information about a purchase is provided to a card issuer from the merchant.
  • Conventional risk analysis is based on transaction account information and payment information.
  • Transaction account information may include, for example, account number, account name, expiration date, billing address, and credit card verification (CCV) number.
  • Payment information may include, for example, payment amount and payment recipient.
  • Conventional risk analysis does not utilize other information associated with a purchase such as, for example, a ship-to-address, an email address of the purchaser, an IP address of the machine from which the purchase was initiated, etc.
  • Enhanced authorization data includes information associated with a purchase other than transaction account information and payment information.
  • the enhanced authorization data may be received from a merchant in a request for authorization to accept a transaction instrument as payment.
  • a decision to approve, deny, or refer the request is made based, at least in part, on the enhanced authorization data.
  • the authorization decision is then provided to the merchant.
  • Examples of enhanced authorization data include an automatic number identification (ANI), an information identifier (II), an email address, a contact telephone number, a ship-to-name, a ship-to-address, an Internet Protocol (IP) address, and a seller identification.
  • ANI automatic number identification
  • II information identifier
  • IP Internet Protocol
  • Enhanced authorization data may be specific to a particular industry or category of merchants. For example, merchants dealing in airline tickets may provide information such as a passenger name, a travel date and/or a destination city as enhanced authorization data.
  • Enhanced authorization data is collected, for example, by a merchant in the course of fulfilling a purchase desired by a purchaser.
  • risk analysis is performed using the enhanced authorization data to calculate the risks of the purchase being fraudulent.
  • enhanced authorization data may be compared with historical transaction information as well as with information stored for a card member associated with the request.
  • Historical transaction information includes information about previous transactions.
  • Historical transaction data may be compared to determine, for example, if the enhanced authorization data was provided previously in fraudulent purchases.
  • Historical transactions may also be examined to determine the rate, also referred to as velocity, at which transactions associated with an enhanced authorization data are initiated to evaluate the risks of the request being fraudulent.
  • a risk is calculated for a request, it is compared with a range of acceptable risks to make an authorization decision. If the risk is acceptable, an authorization decision is made to approve the request. If the risk is not acceptable, an authorization decision to deny or to refer the request is made.
  • the authorization decision is provided to the merchant in response to the merchant's request for authorization. If the request is approved, the merchant may complete the purchase by accepting the transaction instrument as payment. If the request is denied, the merchant may ask for another form of payment from the purchaser to complete the purchase. If the request is referred, the merchant or the purchaser may be asked to contact the card issuer to provide additional information so that the request may be approved.
  • a request may be determined as being fraudulent, for example, by contacting a card member of the transaction instrument associated with the request to confirm the validity of the transaction or purchase.
  • An advantage of the present invention is that a more sophisticated risk analysis may be performed since enhanced authorization data provides additional information that can be used to distinguish between requests for genuine transactions and fraudulent transactions. Furthermore, since enhanced authorization data is typically captured by a merchant during the ordinary course of processing a purchase, the purchaser is not burdened with providing information other than those the purchaser is ordinarily asked to provide. Another advantage of the present invention is that since enhanced authorization data is independent of transaction account information, it may be used to correlate fraudulent activity patterns experienced across multiple card members and merchants.
  • FIG. 1 is a system diagram of an exemplary environment in which the present invention can be implemented.
  • FIG. 2 is a flowchart illustrating an example authorization process.
  • FIG. 3 is a diagram illustrating an example of risk analysis based on the velocity of transactions.
  • FIG. 4 is a block diagram of a first exemplary financial transaction network for processing financial transactions involving the purchase of airline tickets.
  • FIG. 5 is a flowchart illustrating a first exemplary method for processing a financial transaction involving the purchase of airline tickets using enhanced transaction variables.
  • FIG. 6 is a block diagram of a second exemplary financial transaction network for processing financial transactions involving the purchase of airline tickets.
  • FIG. 7 is a flowchart illustrating a second exemplary method for processing a financial transaction involving the purchase of airline tickets using enhanced transaction variables.
  • FIG. 8 is a block diagram of an exemplary computer system useful for implementing the present invention.
  • references to “one embodiment”, “an embodiment”, “an example embodiment”, etc. indicate that the embodiment described may include a particular feature, structure, or characteristic, but every embodiment may not necessarily include the particular feature, structure, or characteristic. Moreover, such phrases are not necessarily referring to the same embodiment. Further, when a particular feature, structure, or characteristic is described in connection with an embodiment, it is submitted that it is within the knowledge of one skilled in the art to effect such feature, structure, or characteristic in connection with other embodiments whether or not explicitly described. After reading the following description, it will be apparent to one skilled in the relevant art(s) how to implement the following invention in alternative embodiments.
  • business or “merchant” may be used interchangeably with each other and shall mean any person, entity, distributor system, software and/or hardware that is a provider, broker and/or any other entity in the distribution chain of goods or services.
  • a merchant may be a grocery store, a retail store, a travel agency, a service provider, an on-line merchant or the like.
  • a “transaction account” as used herein refers to an account associated with an open account or a closed account system (as described below).
  • the transaction account may exist in a physical or non-physical embodiment.
  • a transaction account may be distributed in non-physical embodiments such as an account number, frequent-flyer account, telephone calling account or the like.
  • a physical embodiment of a transaction account may be distributed as a financial instrument.
  • a financial transaction instrument may be traditional plastic transaction cards, titanium-containing, or other metal-containing, transaction cards, clear and/or translucent transaction cards, foldable or otherwise unconventionally-sized transaction cards, radio-frequency enabled transaction cards, or other types of transaction cards, such as credit, charge, debit, pre-paid or stored-value cards, or any other like financial transaction instrument.
  • a financial transaction instrument may also have electronic functionality provided by a network of electronic circuitry that is printed or otherwise incorporated onto or within the transaction instrument (and typically referred to as a “smart card”), or be a fob having a transponder and an RFID reader.
  • Open cards are financial transaction cards that are generally accepted at different merchants. Examples of open cards include the American Express®, Visa®, MasterCard® and Discover® cards, which may be used at many different retailers and other businesses. In contrast, “closed cards” are financial transaction cards that may be restricted to use in a particular store, a particular chain of stores or a collection of affiliated stores. One example of a closed card is a pre-paid gift card that may only be purchased at, and only be accepted at, a clothing retailer, such as The Gap® store.
  • Stored value cards are forms of transaction instruments associated with transaction accounts, wherein the stored value cards provide cash equivalent value that may be used within an existing payment/transaction infrastructure.
  • Stored value cards are frequently referred to as gift, pre-paid or cash cards, in that money is deposited in the account associated with the card before use of the card is allowed. For example, if a customer deposits ten dollars of value into the account associated with the stored value card, the card may only be used for payments up to ten dollars.
  • an “account,” “account number” or “account code”, as used herein, may include any device, code, number, letter, symbol, digital certificate, smart chip, digital signal, analog signal, biometric or other identifier/indicia suitably configured to allow a consumer to access, interact with or communicate with a financial transaction system.
  • the account number may optionally be located on or associated with any financial transaction instrument (e.g., rewards, charge, credit, debit, prepaid, telephone, embossed, smart, magnetic stripe, bar code, transponder or radio frequency card).
  • card member “card holder,” and/or the plural form of these terms are used interchangeably throughout herein to refer to those persons or entities that own or are authorized to use a transaction account.
  • FIG. 1 a system diagram of an exemplary system 100 in which the present invention can be implemented is shown.
  • System 100 includes a purchaser 102 , a merchant 104 , an authorization system 106 , a card member database 108 , and a transaction database 110 .
  • Purchaser 102 interacts with merchant 104 to make a purchase with a transaction instrument.
  • Merchant 104 asks for authorization to accept the transaction instrument as payment by sending a request to authorization system 106 .
  • Authorization system 106 performs risk analysis on the request using information, for example, from card member database 108 and transaction database 110 . Based on the risk analysis, authorization system 106 makes an authorization decision to approve, deny or refer the request. The authorization decision is provided to merchant 104 .
  • Merchant 104 completes the purchase if the request is approved or asks for an alternative form of payment from the purchaser if the request is denied. If the request is referred, merchant 104 may contact the card issuer or ask the purchaser to contact the card issuer to provide additional information to have the request approved.
  • Purchaser 102 may interact with merchant 104 in person (e.g., at the box office), telephonically, or electronically (e.g., from a user computer via the Internet) to make a purchase.
  • purchaser 102 may physically present a transaction instrument to merchant 104 as a form of payment.
  • purchaser 102 may provide information associated with a transaction instrument, such as account number, expiration date, account name, and billing address, to merchant 104 to make a payment using the transaction instrument.
  • purchaser 102 may provide additional information to merchant 104 while making a purchase. For example, purchaser 102 may provide a ship-to-address or a ship-to-name that is different than a name or billing address associated with the transaction instrument. Purchaser 102 may provide an email address or a contact telephone number to merchant 104 so that purchaser 102 may be updated with the status of a purchase.
  • merchant 104 may obtain additional information about purchaser 102 from other sources while interacting with purchaser 102 .
  • merchant 104 may receive an automatic number identification (ANI) and a corresponding information identifier (II) for purchaser 102 from a telephone company.
  • ANI provides the telephone number of the telephone used by purchaser 102 to communicate with merchant 104 .
  • II identifies the type of telephone used by purchaser 102 such as, for example, a cellular telephone, coin-operated telephone, prison telephone, or a standard land-line telephone.
  • IP Internet Protocol
  • Merchant 104 is any entity or system capable of receiving a payment from purchaser 102 using a transaction instrument. Merchant 104 may offer goods and services in exchange for payment from purchaser 102 . Merchant 104 may be, for example, an Internet commerce, telephone order or mail order company. Merchant 104 may also be, for example, an aggregator or a third-party biller that facilitates transactions between purchaser 102 and a seller (not shown). Examples of aggregators or third-party billers include eBay® and PayPal®. If merchant 104 is an aggregator or a third-party biller, merchant 104 may capture information such as a seller identification and/or description of the type of goods or services sought to be purchased by purchaser 102 from the seller. Goods and services purchased through merchant 104 may be delivered physically (e.g., through the mail) or electronically (e.g., such as by downloading software over the Internet) to purchaser 102 .
  • merchant 104 makes a request to authorization system 106 for authorization to accept the transaction instrument as payment.
  • Merchant 104 formats the request using a computer device to include information about the transaction instrument, payment information, and enhanced authorization data.
  • enhanced authorization data include, for example, an ANI, an II, an email address, a contact telephone number, a ship-to-name, a ship-to-address, an IP address, and a seller identification.
  • the request is transmitted to authorization system 106 .
  • the request may be sent to authorization system 106 over, for example, a telephone network, intranet, the Internet, wireless communications, and/or the like.
  • Authorization system 106 receives the request for authorization to accept a transaction instrument as payment and performs a risk analysis to assess the risks of the request being associated with a fraudulent purchase. In assessing the risks, authorization system 106 may compare the information in the request with information in card member database 108 and transaction database 110 .
  • Card member database 108 includes information about card members and transaction instruments. For example, card member database 108 may include the billing address, email address, and contact telephone number of each card member.
  • Transaction database 110 includes information about previous transactions (e.g., purchases). For example, transaction database 110 may include information about previous requests for authorization, decisions made for the previous requests, and any subsequent information obtained for those requests, such as whether a purchase associated with a request was later reported as being fraudulent.
  • databases 108 and 110 are shown separately, as would be appreciated by one skilled in the relevant arts, the two databases may be implemented as a single or multiple databases. The risk analysis will be described in more detail below.
  • authorization system 106 makes an authorization decision to approve, deny, or refer the request and provides the decision to merchant 104 . If the request is approved, merchant 104 may accept the transaction instrument as payment. If the request is denied, merchant 104 may inform purchaser 102 that the request was denied and ask purchaser 102 for another form of payment to complete the purchase. If the request is referred, merchant 104 and/or purchaser 102 may be asked to contact a card issuer to provide additional information to have the request approved.
  • authorization system 106 may contact merchant 104 to reverse the approval. If merchant 104 has not yet completed the purchase, for example, by not shipping goods to purchaser 102 , merchant 104 may cancel the purchase.
  • FIG. 2 illustrates an example process 200 for authorizing a request to receive a transaction instrument as payment.
  • Process 200 begins at step 202 .
  • a request for authorization to accept a payment associated with a transaction instrument is received from a merchant such as merchant 104 .
  • the merchant makes a request when a purchaser provides the merchant with a transaction instrument or information about the transaction instrument to make a payment for a purchase.
  • the request may include enhanced authorization data such as, for example, an ANI, an II, an email address, a contact telephone number, a ship-to-name, a ship-to-address, an IP address, or a seller identification that was obtained by the merchant during the course of fulfilling the purchase.
  • Enhanced authorization data may be specific to a particular industry or category of merchants. For example, merchants dealing in airline tickets may provide as enhanced authorization data information such as passenger name, travel date, or destination city.
  • an authorization decision is made based, at least in part, upon the enhanced authorization data included in the request received in step 202 .
  • the authorization decision is based on a risk analysis performed using the information in the request. If the risks are within a range of acceptable risks, a decision to approve the request is made. If the risks are outside the range of acceptable risks, a decision to deny or refer the request is made.
  • enhanced authorization data may be compared with information stored about the transaction instrument or with information stored about a card member associated with the transaction instrument to assess risks. If the enhanced authorization data includes an email address, contact telephone number, or a ship-to-name, each can be compared with stored values of the card member's email address, telephone numbers, and name, respectively. If the comparisons match, less risk is assigned to the request. In another example, if the enhanced authorization data includes an IP address, it can be compared with the IP address, for example, of the machine the card member uses to access the card issuer's bank website. If the IP addresses match, less risk is assigned to the request.
  • Historical transaction information may also be compared with enhanced authorization data to calculate risks. Historical transaction information includes information about previous transactions. For example, if enhanced authorization data includes a ship-to-address, it may be compared with prior ship-to-addresses used in historical transactions. If the ship-to-address is associated with numerous historical transactions that were reported as being fraudulent, more risk is assigned to the request.
  • transaction information associated with other card members and other merchants may be used to calculate risks. For example, if the enhanced authorization data includes a seller identification, an ANI, or an II information, this information may be compared with historical transactions across multiple card members and merchants. If the seller identification, ANI, or II information provided in the request is associated with fraudulent activity across multiple card members and merchants, a greater level of risk may be assigned to the request.
  • the velocity of transactions is the rate at which transactions are initiated in a designated period of time. For example, if an IP address is included as part of an enhanced authorization data, the velocity of prior transactions which are also associated with the IP address can be measured. If the velocity is atypically high for the IP address, a greater level of risk may be associated with the request. Assessing risks based on the velocity of transactions is explained in greater detail herein with respect to FIG. 3 .
  • enhanced authorization data such as an ANI, II, an email address, a contact telephone number, a ship-to-name, a ship-to-address, an IP address, or a seller identification may be used in different ways to assess the risks of an authorization request being associated with a fraudulent purchase.
  • step 206 the authorization decision made in step 204 is sent to the merchant that provided the request in step 202 .
  • the merchant proceeds according to the authorization decision. If the request is approved, the merchant completes the purchase. If the request is denied, the merchant may inform the purchaser that the transaction instrument was denied and/or ask the purchaser for another form of payment to complete the purchase. If the request is referred, the merchant may contact the card issuer or ask the purchaser to contact the card issuer to provide additional information to have the request approved.
  • FIG. 3 illustrates a diagram 300 that shows an example of risk analysis based on the velocity of transactions.
  • Diagram 300 includes a purchaser 302 , merchants 304 , 306 and 308 , authorization system 106 , and request data 314 , 316 , and 318 .
  • Diagram 300 depicts examples of three requests for authorization to accept transaction instruments as payment from three different merchants 304 , 306 , and 308 .
  • request data 314 a first request for authorization to accept a transaction instrument as payment was made by merchant 304 on Sep. 7, 2004 at 5:05 PM.
  • transaction account information associated with the transaction instrument such as the name of the account holder (e.g., Joe White) and billing address (e.g., 2213 E. Main St) was provided by merchant 304 in the request.
  • enhanced authorization data such as the email address of the purchaser (e.g., funstuff@abc.com) and IP address of the machine with which the purchaser initiated the purchase (e.g., 123.22.15.18) was also provided by merchant 304 to authorization system 106 in the request.
  • request data 316 A second request for authorization to accept a transaction instrument as payment, as shown by request data 316 , was made by merchant 306 just 27 minutes after the first request (e.g., Sep. 7, 2004 at 5:32 PM).
  • request data 316 includes transaction account information such as the name of the account holder (e.g., Stan Rogers) and billing address (e.g., 555 Bermuda Ave).
  • Request data 316 further includes an email address of the purchaser (e.g., funstuff@abc.com) as enhanced authorization data.
  • Request data 318 includes a date and time (e.g., Sep. 7, 2004 at 6:01 PM), name of the account holder (e.g., Jennifer Saks) and billing address (e.g., 3133 S Central Ave.).
  • Request data 318 further includes, as enhanced authorization data 320 , an email address of the purchaser (e.g., funstuff@abc.com).
  • authorization system 106 examines historical transactions that are associated with enhanced authorization data received in the request such as, for example, enhanced authorization data 320 .
  • Request data 314 and request data 316 are examined since they both contain enhanced authorization data 320 (e.g., funstuff@abc.com). The velocity of these requests is considered by authorization system 106 in assessing the risks of the third request being associated with a fraudulent purchase.
  • authorization system 106 may assign a greater level of risk for the third request. If the transaction accounts associated with the three requests do not have a history of being associated with enhanced authorization data 320 , the velocity of transactions as depicted in FIG. 3 may suggest that purchaser 302 is making fraudulent purchases using transaction instruments belonging to several people (e.g., Joe White, Stan Rogers, and Jennifer Saks).
  • authorization system 106 Based on the risk analysis performed by authorization system 106 for the third request, authorization system 106 provides an authorization decision to merchant 308 .
  • Card members associated with transaction instruments provided in the first, second, and third requests may be contacted to determine the validity of the requests. If a request is determined to be associated with a fraudulent purchase, the appropriate merchant may be contacted to cancel a purchase associated with the request.
  • An example embodiment, according to the present invention, is provided below with reference to enhanced authorization data as it relates to merchants dealing with airline travel tickets.
  • Financial institutions currently have existing transaction networks over which financial transactions between its account holders and various merchants may be completed. Financial institutions are therefore uniquely positioned to offer advanced risk identification and prevention measures to its customers, merchants and partners by leveraging these existing networks, or by establishing new networks where these capabilities are provided.
  • the processes introduced herein enable financial institutions to make improved fraud risk management decisions for transactions, particularly those involving travel tickets such as airline tickets.
  • By capturing and analyzing certain additional information at the point of authorization of a charge the risk that the transaction is fraudulent may be more accurately evaluated before the ticket purchase is authorized.
  • real-time fraud risk decisions are based on an evaluation of the data traditionally provided in an authorization request plus ten additional transaction variables that have routinely been captured by the merchant and are now transmitted to the financial institution with a real-time authorization request.
  • the additional transaction variables provided with respect to the purchase of airline tickets may include: an airline reservation code for the ticket; the passenger name listed on the ticket; an origin airport for the ticket; a destination airport for the ticket; a travel date for the ticket; a description of routing airports or city codes of the airline ticket (e.g., New York to Miami returning to New York: JFK-MIA-MIA-JFK); a class of service (e.g., first class, business class, or coach class, including fare basis information and ticket designator information); an indicator of whether the airline ticket is an electronic ticket; a number of passengers for which tickets are purchased; and a code corresponding to an airline carrier for which the ticket is booked.
  • an airline reservation code for the ticket the passenger name listed on the ticket
  • an origin airport for the ticket e.g., a destination airport for the ticket
  • a travel date for the ticket e.g., a description of routing airports or city codes of the airline ticket (e.g., New York to Miami returning to New York: JFK
  • these ten variables are typically captured in various transactions by airlines and other airline ticket merchants, such as travel agencies and online travel web sites.
  • these transaction variables have not previously been provided as part of real-time authorization requests to financial institutions that maintain account holder accounts, and such transaction variables have not been used for fraud risk screening by financial institutions prior to or during the real-time authorization of a transaction.
  • one or more of the additional transaction variables are now transmitted from the merchant to a financial institution in an automated manner and in a standardized format over the financial transaction network during a transaction initiation and authorization process so that standard authorization times (based on all types of financial transactions using similar payment vehicles) are not affected.
  • the received transaction variables (traditional plus additional) are immediately presented to one or more software-implemented fraud-risk models maintained by the financial institution, which are well-known in the relevant art(s), but must now account for additional variables as described below with respect to FIG. 5 .
  • Such software-implemented fraud-risk models would then evaluate the received transaction variables, and from this, an immediate risk decision (e.g., to accept or refer the transaction for further identification, or a request to contact the financial institution) based on a determined risk factor can be made.
  • an immediate risk decision e.g., to accept or refer the transaction for further identification, or a request to contact the financial institution
  • the transaction variables may be used in combination with standard information utilized by financial institutions to authorize transactions (e.g., amount of transaction, status of account holder account, purchases and transaction history of the particular account holder, available credit for the financial account, and a transaction history of the particular merchant).
  • standard information utilized by financial institutions to authorize transactions (e.g., amount of transaction, status of account holder account, purchases and transaction history of the particular account holder, available credit for the financial account, and a transaction history of the particular merchant).
  • standard authorization decision-making criteria will provide enhanced fraud risk assessment before the ticket or service is authorized for payment on a payment vehicle. This, in turn, will reduce the incidence of fraudulent transactions and reduce processing costs for charge backs and the like.
  • FIG. 4 there is depicted a conceptual block diagram of a first exemplary transaction network 400 , over which the processes of the present disclosure may be performed.
  • an account holder 402 may initiate a transaction with an airline carrier server 404 for the purchase of airline tickets in any standard manner.
  • the airline carrier server 404 may communicate with a financial institution server 406 of the financial institution that maintains the account corresponding to the payment vehicle.
  • the account holder 402 may communicate with the airline carrier over the Internet using a computer terminal or the like, via telephone, or in person.
  • the account holder 402 may use a credit card, charge card, stored value card, debit card or other type of payment vehicle for the transaction.
  • the airline carrier server 404 may be any type of computer server, or group of distributed servers, that include appropriate processors, memory and network communication devices, as well as application and operating systems software that includes processing instructions and programming for performing the processes disclosed herein.
  • the airline carrier server 404 may communicate with the financial server 406 using any existing transaction processing network, with little need for changes to existing network hardware.
  • Merchants and financial institutions may require certain software changes to capture and transmit the ten transaction variables with authorization requests for ticket purchases in an acceptable format.
  • the transaction variables can be sent in the AMERICAN EXPRESS Authorization ISO 8583 Version 1 Specification format.
  • FIG. 5 there is depicted a flowchart of an exemplary method 500 for processing a financial transaction involving the purchase of airline tickets using enhanced transaction variables.
  • the method 500 commences when an account holder initiates a transaction with an airline carrier for a purchase of an airline ticket (step 502 ).
  • the airline receives certain of the transaction variable information from the account holder, including the account holder name; a passenger name; an origin airport for the ticket; a destination airport for the ticket; a travel date for the ticket; a description of routing airports or city codes of the airline ticket (e.g., New York to Miami returning to New York: JFK-MIA-MIA-JFK); a class of service (e.g., first class, business class, or coach class, including fare basis information and ticket designator information); an indicator of whether the airline ticket is an electronic ticket.
  • the airline may also determine a reservation code for the ticket and supply its airline carrier code (step 504 ).
  • the airline Upon agreement of the terms of the ticket, the airline receives a method of payment from the account holder, and then contacts the financial institution maintaining the account holder's account. The airline then transmits the enhanced transaction variables, in addition to the variables traditionally provided, to the financial institution in a standard format with a request to authorize the transaction for payment (step 506 ).
  • the financial institution processes the received transaction variables through at least one fraud-risk model in order to determine the risk of fraud presented by the transaction variables using historical transaction data. Any transactions identified as high risk may be referred for further identification or in case of extreme risk declined. Such a result may occur where the risk models determine that the probability of fraud is within a range of unacceptable values. This range may be established based on historical data so that legitimate transactions are not unduly prevented by the fraud-risk models. The range may be adjusted over time as more historical data is collected and analyzed.
  • the financial institution may instead transmit a request to be contacted by the account holder by telephone or the like (referred to herein as a call referral message) before the transaction can be authorized.
  • a call referral message a request to be contacted by the account holder by telephone or the like
  • the transaction may then continue to be processed in a standard manner.
  • the financial institution replies to the authorization request with an approval, declination or call referral message based on the outcome of the fraud-risk model along with standard authorization decision-making criteria (step 510 ).
  • the airline then processes the transaction in accordance with the reply received from the financial institution (step 512 ), after which process 500 ends.
  • the fraud-risk model or models may be generated from collected data regarding fraudulent and/or legitimate transactions over a large group of account holders on a national or international scale.
  • a risk value may be determined for each collected transaction variable or for inter-comparisons between the received transaction variables, using such historical transaction data. These empirically-determined, risk values may be applied within the risk models in any of a variety of useful manners to determine an overall risk for a given transaction.
  • the received transaction variable data can be applied to historical data in any of a wide variety of useful ways using a wide number of formulas and other forms of risk models. Since historical financial transaction data is used to determine the risk, these values and formulas will be largely dependent on the empirical data used. The formulas may further be refined over time by examining changes in historical data patterns as time progresses, as will be readily apparent to one of ordinary skill in the art.
  • transactions in which a reservation code is provided may have less risk of fraud than transactions in which no reservation code is provided.
  • the fraud-risk model may then apply a risk value to a received transaction based on whether a reservation code has been provided and the historical data on prior transactions in which a reservation code has not been received.
  • historical data may reveal that fraudulent transactions are more likely for tickets of a certain type of routing (e.g., one-way ticket purchases may have a greater risk of being fraudulent than round-trip purchases), a certain class of service, or for certain airline carriers. Appropriate risk values will then be applied to these individual transaction variables for each transaction received.
  • a certain type of routing e.g., one-way ticket purchases may have a greater risk of being fraudulent than round-trip purchases
  • a certain class of service e.g., one-way ticket purchases may have a greater risk of being fraudulent than round-trip purchases
  • Appropriate risk values will then be applied to these individual transaction variables for each transaction received.
  • a transaction is received in which the transaction variable “Passenger Name” is not the same as the transaction variable “Account Holder Name.”
  • the risk value based on such inter-comparison of received transaction variables may be determined based on data of prior fraudulent transactions. For example, it may be that the historical data shows that 5% of transactions in which the Passenger Name does not match the account holder name are fraudulent.
  • a risk value of 0.05 for this transaction variable may accordingly be applied within the fraud-risk models for any transaction in which this is the case, and this value may be added, multiplied or combined with similar determinations for other risk values regarding the remaining transaction variables to determine an overall risk factor for the transaction.
  • a second exemplary transaction network 600 may include the account holder 402 , in communication with a travel agency server 602 or other third-party merchant.
  • the travel agency server 602 may communicate with the financial institution via a third-party processing system 604 , such as may be provided by existing Global Distribution Service (GDS) providers.
  • GDS Global Distribution Service
  • the third-party processors can capture and transmit additional variables for fraud risk screening.
  • the payment vehicle is maintained by AMERICAN EXPRESS
  • the travel agencies and Global Distribution System providers must be able to send this information to AMERICAN EXPRESS in the authorization request using the ISO 8583 Version 1 Specification format.
  • Other third-party processors who assist in transferring authorization requests to American Express or other financial institutions (i.e., issuers of payment vehicles used for such transactions) on behalf of airlines or GDS's must also be able to accept and transfer this information in the authorization stream as specified therein.
  • FIG. 7 there is depicted a flowchart of an exemplary method 700 for processing a financial transaction involving the purchase of airline tickets from a travel agency or other third-party merchant.
  • the method 700 is similar to the method 500 described above.
  • the method 700 commences when an account holder initiates a transaction with the merchant for the purchase of an airline ticket (step 702 ).
  • the travel agency captures the transaction variables (the variables in a traditional authorization request and the ten listed above) for the transaction as received from the airline and the account holder (step 704 ) and transmits them to the financial institution - in almost all cases via the airline or a GDS—in a standard format with the request for authorization of the transaction (step 706 ).
  • the financial institution processes the received transaction variables against at least one fraud-risk model (step 708 ) and, in various embodiments, applies standard authorization decision-making criteria as well.
  • the financial institution replies to the authorization request real-time with an approval, declination or call referral message based on outcome of the fraud-risk model and standard decisioning criteria (step 710 ).
  • the travel agency then processes the transaction in accordance with the received reply (step 712 ), after which the process 700 ends.
  • the enhanced processes disclosed herein are an important tool that can be consistently implemented for all airline transactions in which the enhanced data (i.e., the additional transaction variables) is transmitted to a card issuer in the real-time authorizations request.
  • Such data is already collected by airlines, travel agencies and GDS's for other purposes, and can be transmitted onwards to issuers with only minor adjustments to current software and without requiring the replacement of network hardware currently used in many systems.
  • Airline ticket merchants will also spend less time serving fraudulent customers or investigating charge backs, resulting in reduced operational expenses. Additionally, the system makes it harder for a card holder that legitimately enters into a transaction from later claiming that the transaction was fraudulent. In this manner, the card issuer, card holder and airline vendors each benefit from the security provided by the disclosed processes.
  • the card issuer may secure the collected enhanced transaction data in a variety of known and effective manners so that card member information cannot be obtained or used by unauthorized third parties.
  • the disclosed enhancements to financial transaction processing have applicability to various types of transactions involving travel tickets (e.g., train tickets, cruise tickets, car rentals and the like) other than the specific examples involving airlines as described herein, as will be apparent to one of ordinary skill in the art.
  • travel tickets e.g., train tickets, cruise tickets, car rentals and the like
  • the risk values and overall ranges of acceptable risk values may be the same or different for different transaction types.
  • the type of ticket purchased can be readily identified based on the merchant or the carrier code received with the transaction variables.
  • the present invention may be implemented using hardware, software or a combination thereof and may be implemented in one or more computer systems or other processing systems.
  • the manipulations performed by the present invention were often referred to in terms, such as adding or comparing, which are commonly associated with mental operations performed by a human operator. No such capability of a human operator is necessary, or desirable in most cases, in any of the operations described herein which form part of the present invention. Rather, the operations are machine operations.
  • Useful machines for performing the operation of the present invention include general purpose digital computers or similar devices.
  • the invention is directed toward one or more computer systems capable of carrying out the functionality described herein.
  • An example of a computer system 800 is shown in FIG. 8 .
  • Computer system 800 includes one or more processors, such as processor 804 .
  • Processor 804 is connected to a communication infrastructure 806 (e.g., a communications bus, cross-over bar, or network).
  • a communication infrastructure 806 e.g., a communications bus, cross-over bar, or network.
  • Computer system 800 can include a display interface 802 that forwards graphics, text, and other data from communication infrastructure 806 (or from a frame buffer not shown) for display on display unit 816 .
  • Computer system 800 also includes a main memory 808 , preferably random access memory (RAM), and may also include a secondary memory 810 .
  • Secondary memory 810 may include, for example, a hard disk drive 812 and/or a removable storage drive 814 , representing a floppy disk drive, a magnetic tape drive, an optical disk drive, etc.
  • Removable storage drive 814 reads from and/or writes to a removable storage unit 818 in a well known manner.
  • Removable storage unit 818 represents a floppy disk, magnetic tape, optical disk, etc. which is read by and written to by removable storage drive 814 .
  • removable storage unit 818 includes a computer usable storage medium having stored therein computer software and/or data.
  • secondary memory 810 may include other similar devices for allowing computer programs or other instructions to be loaded into computer system 800 .
  • Such devices may include, for example, a removable storage unit 822 and an interface 820 .
  • Examples of such may include a program cartridge and cartridge interface (such as that found in video game devices), a removable memory chip (such as an erasable programmable read only memory (EPROM), or programmable read only memory (PROM)) and associated socket, and other removable storage units 822 and interfaces 820 , which allow software and data to be transferred from removable storage unit 822 to computer system 800 .
  • EPROM erasable programmable read only memory
  • PROM programmable read only memory
  • Computer system 800 may also include a communications interface 824 .
  • Communications interface 824 allows software and data to be transferred between computer system 800 and external devices. Examples of communications interface 824 may include a modem, a network interface (such as an Ethernet card), a communications port, a Personal Computer Memory Card International Association (PCMCIA) slot and card, etc.
  • Software and data transferred via communications interface 824 are in the form of signals 828 which may be electronic, electromagnetic, optical or other signals capable of being received by communications interface 824 . These signals 828 are provided to communications interface 824 via a communications path (e.g., channel) 826 . This channel 826 carries signals 828 and may be implemented using wire or cable, fiber optics, a telephone line, a cellular link, an radio frequency (RF) link and other communications channels.
  • RF radio frequency
  • computer program medium and “computer usable medium” are used to generally refer to media such as removable storage drive 814 , a hard disk installed in hard disk drive 812 , and signals 828 .
  • These computer program products provide software to computer system 800 .
  • the invention is directed to such computer program products.
  • Computer programs are stored in main memory 808 and/or secondary memory 810 . Computer programs may also be received via communications interface 824 . Such computer programs, when executed, enable computer system 800 to perform the features of the present invention, as discussed herein. In particular, the computer programs, when executed, enable processor 804 to perform the features of the present invention. Accordingly, such computer programs represent controllers of computer system 800 .
  • the software may be stored in a computer program product and loaded into computer system 800 using removable storage drive 814 , hard drive 812 or communications interface 824 .
  • the control logic when executed by processor 804 , causes processor 804 to perform the functions of the invention as described herein.
  • the invention is implemented primarily in hardware using, for example, hardware components such as application specific integrated circuits (ASICs).
  • ASICs application specific integrated circuits
  • the invention is implemented using a combination of both hardware and software.

Abstract

The present invention provides systems, methods and computer program products for authorizing transactions based on, at least in part on, enhanced authorization data. In one embodiment, enhanced authorization data is received in a request for authorization to accept a transaction instrument as payment. Examples of enhanced authorization data include an automatic number identification, an information identifier, an email address, a contact telephone number, a ship-to-name, ship-to-address, an Internet Protocol address, and a seller identification. A risk analysis is performed based, at least in part, on the enhanced authorization data to determine the risk of the request being associated with a fraudulent purchase. The risk may be calculated by comparing the enhanced authorization data with information stored about the transaction instrument or with historical transaction information. Furthermore, the velocity of transactions associated with the enhanced authorization data may be measured in calculating the risk.

Description

    CROSS REFERENCE TO RELATED APPLICATIONS
  • This application is a continuation-in-part of Patent Cooperation Treaty Application No. PCT/US05/004135, filed Feb. 9, 2005, and titled “System And Method Using Enhanced Authorization Data To Reduce Travel-Related Transaction Fraud,” which claims the benefit of U.S. Provisional Patent Application Ser. No. 60/543,044, filed Feb. 9, 2004, and titled “Enhanced Airline Authorization Data For Fraud Control,” which are all hereby incorporated by reference herein in their entireties.
  • BACKGROUND OF THE INVENTION
  • 1. Field of the Invention
  • The present invention generally relates to fraud detection and more particularly to reducing fraudulent transactions.
  • 2. Related Art
  • Credit cards, charge cards, and other transaction instruments are commonly accepted today as a form of payment under a variety of circumstances. A transaction instrument may be used to make a purchase in-person, for example, at a retail store, a restaurant, or a hotel by physically presenting a merchant with the transaction instrument. A transaction instrument may also be used to make a purchase without physically presenting the transaction instrument by relaying information associated with the transaction instrument, such as account number, account name, expiration date, and billing address, to a merchant. Examples of merchants that accept transaction instruments as payment without physically receiving the transaction instrument include Internet, telephone and mail order merchants.
  • Although transaction instruments provide a convenient means for making payments, they are vulnerable to fraud. A transaction instrument may be copied, or information about a transaction instrument necessary to make purchases may be stolen. While the card member and card issuer are unsuspecting of any fraudulent activity, numerous fraudulent purchases may be charged to the card member's transaction instrument.
  • To counteract fraudulent purchases, a card issuer may employ a risk analysis when a merchant requests authorization to receive a transaction instrument as payment. Risk analysis is utilized to evaluate the risks of a purchase being fraudulent. If the risks are determined to be, unacceptable, the card issuer may deny the merchant's request to receive the transaction instrument as payment. For example, if a transaction instrument is reported as being lost, risk analysis may indicate an unacceptable level of risk for any further purchases involving the transaction instrument. The card issuer may then deny any requests made by merchants for authorization to accept the transaction instrument as payment.
  • Although conventional risk analysis reduces incidences of fraud, its ability to distinguish genuine and fraudulent purchases is limited because only a limited amount of information about a purchase is provided to a card issuer from the merchant. Conventional risk analysis is based on transaction account information and payment information. Transaction account information may include, for example, account number, account name, expiration date, billing address, and credit card verification (CCV) number. Payment information may include, for example, payment amount and payment recipient. Conventional risk analysis does not utilize other information associated with a purchase such as, for example, a ship-to-address, an email address of the purchaser, an IP address of the machine from which the purchase was initiated, etc.
  • Given the foregoing, what is needed is a system, method and computer program product that accepts a greater amount of purchase-related information than that used by conventional risk analysis to further reduce incidences of fraud.
  • BRIEF DESCRIPTION OF THE INVENTION
  • Systems, methods and computer program products for authorizing transactions based at least in part on enhanced authorization data are provided. Enhanced authorization data includes information associated with a purchase other than transaction account information and payment information. The enhanced authorization data may be received from a merchant in a request for authorization to accept a transaction instrument as payment. A decision to approve, deny, or refer the request is made based, at least in part, on the enhanced authorization data. The authorization decision is then provided to the merchant.
  • Examples of enhanced authorization data include an automatic number identification (ANI), an information identifier (II), an email address, a contact telephone number, a ship-to-name, a ship-to-address, an Internet Protocol (IP) address, and a seller identification. Enhanced authorization data may be specific to a particular industry or category of merchants. For example, merchants dealing in airline tickets may provide information such as a passenger name, a travel date and/or a destination city as enhanced authorization data.
  • Enhanced authorization data is collected, for example, by a merchant in the course of fulfilling a purchase desired by a purchaser. When enhanced authorization data is provided with a request for authorization to accept a transaction instrument as payment, risk analysis is performed using the enhanced authorization data to calculate the risks of the purchase being fraudulent.
  • In performing risk analysis, enhanced authorization data may be compared with historical transaction information as well as with information stored for a card member associated with the request. Historical transaction information includes information about previous transactions. Historical transaction data may be compared to determine, for example, if the enhanced authorization data was provided previously in fraudulent purchases. Historical transactions may also be examined to determine the rate, also referred to as velocity, at which transactions associated with an enhanced authorization data are initiated to evaluate the risks of the request being fraudulent.
  • Once a risk is calculated for a request, it is compared with a range of acceptable risks to make an authorization decision. If the risk is acceptable, an authorization decision is made to approve the request. If the risk is not acceptable, an authorization decision to deny or to refer the request is made.
  • The authorization decision is provided to the merchant in response to the merchant's request for authorization. If the request is approved, the merchant may complete the purchase by accepting the transaction instrument as payment. If the request is denied, the merchant may ask for another form of payment from the purchaser to complete the purchase. If the request is referred, the merchant or the purchaser may be asked to contact the card issuer to provide additional information so that the request may be approved.
  • If a request is approved and it is later determined to be associated with a fraudulent purchase, the merchant may be contacted to reverse the authorization. If the purchase has not yet been fulfilled, for example, because the purchased item has not yet been shipped, the merchant may cancel the purchase. A request may be determined as being fraudulent, for example, by contacting a card member of the transaction instrument associated with the request to confirm the validity of the transaction or purchase.
  • An advantage of the present invention is that a more sophisticated risk analysis may be performed since enhanced authorization data provides additional information that can be used to distinguish between requests for genuine transactions and fraudulent transactions. Furthermore, since enhanced authorization data is typically captured by a merchant during the ordinary course of processing a purchase, the purchaser is not burdened with providing information other than those the purchaser is ordinarily asked to provide. Another advantage of the present invention is that since enhanced authorization data is independent of transaction account information, it may be used to correlate fraudulent activity patterns experienced across multiple card members and merchants.
  • Further features and advantages of the present invention as well as the structure and operation of various embodiments of the present invention are described in detail below with reference to the accompanying drawings.
  • BRIEF DESCRIPTION OF THE DRAWINGS
  • The features and advantages of the present invention will become more apparent from the detailed description set forth below when taken in conjunction with the drawings in which like reference numbers indicate identical or functionally similar elements. Additionally, the left-most digit of a reference number identifies the drawing in which the reference number first appears.
  • FIG. 1 is a system diagram of an exemplary environment in which the present invention can be implemented.
  • FIG. 2 is a flowchart illustrating an example authorization process.
  • FIG. 3 is a diagram illustrating an example of risk analysis based on the velocity of transactions.
  • FIG. 4 is a block diagram of a first exemplary financial transaction network for processing financial transactions involving the purchase of airline tickets.
  • FIG. 5 is a flowchart illustrating a first exemplary method for processing a financial transaction involving the purchase of airline tickets using enhanced transaction variables.
  • FIG. 6 is a block diagram of a second exemplary financial transaction network for processing financial transactions involving the purchase of airline tickets.
  • FIG. 7 is a flowchart illustrating a second exemplary method for processing a financial transaction involving the purchase of airline tickets using enhanced transaction variables.
  • FIG. 8 is a block diagram of an exemplary computer system useful for implementing the present invention.
  • DETAILED DESCRIPTION I. OVERVIEW AND TERMINOLOGY
  • Systems, methods and computer program products for authorizing transactions based at least in part on enhanced authorization data are provided. In the detailed description of the invention that follows, references to “one embodiment”, “an embodiment”, “an example embodiment”, etc., indicate that the embodiment described may include a particular feature, structure, or characteristic, but every embodiment may not necessarily include the particular feature, structure, or characteristic. Moreover, such phrases are not necessarily referring to the same embodiment. Further, when a particular feature, structure, or characteristic is described in connection with an embodiment, it is submitted that it is within the knowledge of one skilled in the art to effect such feature, structure, or characteristic in connection with other embodiments whether or not explicitly described. After reading the following description, it will be apparent to one skilled in the relevant art(s) how to implement the following invention in alternative embodiments.
  • The terms “business” or “merchant” may be used interchangeably with each other and shall mean any person, entity, distributor system, software and/or hardware that is a provider, broker and/or any other entity in the distribution chain of goods or services. For example, a merchant may be a grocery store, a retail store, a travel agency, a service provider, an on-line merchant or the like.
  • A “transaction account” as used herein refers to an account associated with an open account or a closed account system (as described below). The transaction account may exist in a physical or non-physical embodiment. For example, a transaction account may be distributed in non-physical embodiments such as an account number, frequent-flyer account, telephone calling account or the like. Furthermore, a physical embodiment of a transaction account may be distributed as a financial instrument.
  • A financial transaction instrument may be traditional plastic transaction cards, titanium-containing, or other metal-containing, transaction cards, clear and/or translucent transaction cards, foldable or otherwise unconventionally-sized transaction cards, radio-frequency enabled transaction cards, or other types of transaction cards, such as credit, charge, debit, pre-paid or stored-value cards, or any other like financial transaction instrument. A financial transaction instrument may also have electronic functionality provided by a network of electronic circuitry that is printed or otherwise incorporated onto or within the transaction instrument (and typically referred to as a “smart card”), or be a fob having a transponder and an RFID reader.
  • “Open cards” are financial transaction cards that are generally accepted at different merchants. Examples of open cards include the American Express®, Visa®, MasterCard® and Discover® cards, which may be used at many different retailers and other businesses. In contrast, “closed cards” are financial transaction cards that may be restricted to use in a particular store, a particular chain of stores or a collection of affiliated stores. One example of a closed card is a pre-paid gift card that may only be purchased at, and only be accepted at, a clothing retailer, such as The Gap® store.
  • Stored value cards are forms of transaction instruments associated with transaction accounts, wherein the stored value cards provide cash equivalent value that may be used within an existing payment/transaction infrastructure. Stored value cards are frequently referred to as gift, pre-paid or cash cards, in that money is deposited in the account associated with the card before use of the card is allowed. For example, if a customer deposits ten dollars of value into the account associated with the stored value card, the card may only be used for payments up to ten dollars.
  • An “account,” “account number” or “account code”, as used herein, may include any device, code, number, letter, symbol, digital certificate, smart chip, digital signal, analog signal, biometric or other identifier/indicia suitably configured to allow a consumer to access, interact with or communicate with a financial transaction system. The account number may optionally be located on or associated with any financial transaction instrument (e.g., rewards, charge, credit, debit, prepaid, telephone, embossed, smart, magnetic stripe, bar code, transponder or radio frequency card).
  • The terms “card member,” “card holder,” and/or the plural form of these terms are used interchangeably throughout herein to refer to those persons or entities that own or are authorized to use a transaction account.
  • The terms “user,” “consumer,” “purchaser,” and/or the plural form of these terms are used interchangeably throughout herein to refer to those persons or entities that are alleged to be authorized to use a transaction account.
  • The terms “payment vehicle,” “financial transaction instrument,” “transaction instrument” and/or the plural form of these terms are used interchangeably throughout to refer to a financial instrument.
  • II. SYSTEM
  • Referring to FIG. 1, a system diagram of an exemplary system 100 in which the present invention can be implemented is shown.
  • System 100 includes a purchaser 102, a merchant 104, an authorization system 106, a card member database 108, and a transaction database 110. Purchaser 102 interacts with merchant 104 to make a purchase with a transaction instrument. Merchant 104 asks for authorization to accept the transaction instrument as payment by sending a request to authorization system 106. Authorization system 106 performs risk analysis on the request using information, for example, from card member database 108 and transaction database 110. Based on the risk analysis, authorization system 106 makes an authorization decision to approve, deny or refer the request. The authorization decision is provided to merchant 104. Merchant 104 completes the purchase if the request is approved or asks for an alternative form of payment from the purchaser if the request is denied. If the request is referred, merchant 104 may contact the card issuer or ask the purchaser to contact the card issuer to provide additional information to have the request approved.
  • Purchaser 102 may interact with merchant 104 in person (e.g., at the box office), telephonically, or electronically (e.g., from a user computer via the Internet) to make a purchase. When interacting in person, purchaser 102 may physically present a transaction instrument to merchant 104 as a form of payment. When communicating with merchant 104 through a telephone or a computer (e.g., using a web enabled computer, kiosk, terminal or the like), purchaser 102 may provide information associated with a transaction instrument, such as account number, expiration date, account name, and billing address, to merchant 104 to make a payment using the transaction instrument.
  • Along with providing a transaction instrument as payment, purchaser 102 may provide additional information to merchant 104 while making a purchase. For example, purchaser 102 may provide a ship-to-address or a ship-to-name that is different than a name or billing address associated with the transaction instrument. Purchaser 102 may provide an email address or a contact telephone number to merchant 104 so that purchaser 102 may be updated with the status of a purchase.
  • Furthermore, merchant 104 may obtain additional information about purchaser 102 from other sources while interacting with purchaser 102. For example, if purchaser 102 is communicating with merchant 104 over a telephone, merchant 104 may receive an automatic number identification (ANI) and a corresponding information identifier (II) for purchaser 102 from a telephone company. ANI provides the telephone number of the telephone used by purchaser 102 to communicate with merchant 104. II identifies the type of telephone used by purchaser 102 such as, for example, a cellular telephone, coin-operated telephone, prison telephone, or a standard land-line telephone. In another example, if purchaser 102 is communicating with merchant 104 over the Internet, the Internet Protocol (IP) address of the machine that purchaser 102 used to initiate the purchase may be captured by whatever Internet-based commerce system utilized by merchant 104.
  • Merchant 104 is any entity or system capable of receiving a payment from purchaser 102 using a transaction instrument. Merchant 104 may offer goods and services in exchange for payment from purchaser 102. Merchant 104 may be, for example, an Internet commerce, telephone order or mail order company. Merchant 104 may also be, for example, an aggregator or a third-party biller that facilitates transactions between purchaser 102 and a seller (not shown). Examples of aggregators or third-party billers include eBay® and PayPal®. If merchant 104 is an aggregator or a third-party biller, merchant 104 may capture information such as a seller identification and/or description of the type of goods or services sought to be purchased by purchaser 102 from the seller. Goods and services purchased through merchant 104 may be delivered physically (e.g., through the mail) or electronically (e.g., such as by downloading software over the Internet) to purchaser 102.
  • When purchaser 102 wishes to make a payment using a transaction instrument, merchant 104 makes a request to authorization system 106 for authorization to accept the transaction instrument as payment. Merchant 104 formats the request using a computer device to include information about the transaction instrument, payment information, and enhanced authorization data. Examples of enhanced authorization data include, for example, an ANI, an II, an email address, a contact telephone number, a ship-to-name, a ship-to-address, an IP address, and a seller identification. The request is transmitted to authorization system 106. The request may be sent to authorization system 106 over, for example, a telephone network, intranet, the Internet, wireless communications, and/or the like.
  • Authorization system 106 receives the request for authorization to accept a transaction instrument as payment and performs a risk analysis to assess the risks of the request being associated with a fraudulent purchase. In assessing the risks, authorization system 106 may compare the information in the request with information in card member database 108 and transaction database 110. Card member database 108 includes information about card members and transaction instruments. For example, card member database 108 may include the billing address, email address, and contact telephone number of each card member. Transaction database 110 includes information about previous transactions (e.g., purchases). For example, transaction database 110 may include information about previous requests for authorization, decisions made for the previous requests, and any subsequent information obtained for those requests, such as whether a purchase associated with a request was later reported as being fraudulent. Although databases 108 and 110 are shown separately, as would be appreciated by one skilled in the relevant arts, the two databases may be implemented as a single or multiple databases. The risk analysis will be described in more detail below.
  • After risk analysis is performed for the request, authorization system 106 makes an authorization decision to approve, deny, or refer the request and provides the decision to merchant 104. If the request is approved, merchant 104 may accept the transaction instrument as payment. If the request is denied, merchant 104 may inform purchaser 102 that the request was denied and ask purchaser 102 for another form of payment to complete the purchase. If the request is referred, merchant 104 and/or purchaser 102 may be asked to contact a card issuer to provide additional information to have the request approved.
  • If at a later time a purchase that was approved by authorization system 106 is determined to be fraudulent, authorization system 106 or a card issuer may contact merchant 104 to reverse the approval. If merchant 104 has not yet completed the purchase, for example, by not shipping goods to purchaser 102, merchant 104 may cancel the purchase.
  • III. PROCESS
  • FIG. 2 illustrates an example process 200 for authorizing a request to receive a transaction instrument as payment. Process 200 begins at step 202.
  • In step 202, a request for authorization to accept a payment associated with a transaction instrument is received from a merchant such as merchant 104. The merchant makes a request when a purchaser provides the merchant with a transaction instrument or information about the transaction instrument to make a payment for a purchase. The request may include enhanced authorization data such as, for example, an ANI, an II, an email address, a contact telephone number, a ship-to-name, a ship-to-address, an IP address, or a seller identification that was obtained by the merchant during the course of fulfilling the purchase. Enhanced authorization data may be specific to a particular industry or category of merchants. For example, merchants dealing in airline tickets may provide as enhanced authorization data information such as passenger name, travel date, or destination city.
  • In step 204, an authorization decision is made based, at least in part, upon the enhanced authorization data included in the request received in step 202. The authorization decision is based on a risk analysis performed using the information in the request. If the risks are within a range of acceptable risks, a decision to approve the request is made. If the risks are outside the range of acceptable risks, a decision to deny or refer the request is made.
  • Various risk analysis may be performed using the enhanced authorization data provided in a request. For example, enhanced authorization data may be compared with information stored about the transaction instrument or with information stored about a card member associated with the transaction instrument to assess risks. If the enhanced authorization data includes an email address, contact telephone number, or a ship-to-name, each can be compared with stored values of the card member's email address, telephone numbers, and name, respectively. If the comparisons match, less risk is assigned to the request. In another example, if the enhanced authorization data includes an IP address, it can be compared with the IP address, for example, of the machine the card member uses to access the card issuer's bank website. If the IP addresses match, less risk is assigned to the request.
  • Historical transaction information may also be compared with enhanced authorization data to calculate risks. Historical transaction information includes information about previous transactions. For example, if enhanced authorization data includes a ship-to-address, it may be compared with prior ship-to-addresses used in historical transactions. If the ship-to-address is associated with numerous historical transactions that were reported as being fraudulent, more risk is assigned to the request.
  • In evaluating enhanced authorization data with historical transaction information, transaction information associated with other card members and other merchants may be used to calculate risks. For example, if the enhanced authorization data includes a seller identification, an ANI, or an II information, this information may be compared with historical transactions across multiple card members and merchants. If the seller identification, ANI, or II information provided in the request is associated with fraudulent activity across multiple card members and merchants, a greater level of risk may be assigned to the request.
  • Furthermore, historical transactions may be examined to determine the velocity of transactions associated with an enhanced authorization data to calculate risks. The velocity of transactions is the rate at which transactions are initiated in a designated period of time. For example, if an IP address is included as part of an enhanced authorization data, the velocity of prior transactions which are also associated with the IP address can be measured. If the velocity is atypically high for the IP address, a greater level of risk may be associated with the request. Assessing risks based on the velocity of transactions is explained in greater detail herein with respect to FIG. 3.
  • As would be appreciated by persons skilled in the relevant arts, enhanced authorization data such as an ANI, II, an email address, a contact telephone number, a ship-to-name, a ship-to-address, an IP address, or a seller identification may be used in different ways to assess the risks of an authorization request being associated with a fraudulent purchase.
  • In step 206, the authorization decision made in step 204 is sent to the merchant that provided the request in step 202. The merchant proceeds according to the authorization decision. If the request is approved, the merchant completes the purchase. If the request is denied, the merchant may inform the purchaser that the transaction instrument was denied and/or ask the purchaser for another form of payment to complete the purchase. If the request is referred, the merchant may contact the card issuer or ask the purchaser to contact the card issuer to provide additional information to have the request approved.
  • FIG. 3 illustrates a diagram 300 that shows an example of risk analysis based on the velocity of transactions. Diagram 300 includes a purchaser 302, merchants 304, 306 and 308, authorization system 106, and request data 314, 316, and 318. Diagram 300 depicts examples of three requests for authorization to accept transaction instruments as payment from three different merchants 304, 306, and 308.
  • As shown by request data 314, a first request for authorization to accept a transaction instrument as payment was made by merchant 304 on Sep. 7, 2004 at 5:05 PM. Along with the date and time, transaction account information associated with the transaction instrument such as the name of the account holder (e.g., Joe White) and billing address (e.g., 2213 E. Main St) was provided by merchant 304 in the request. Furthermore enhanced authorization data such as the email address of the purchaser (e.g., funstuff@abc.com) and IP address of the machine with which the purchaser initiated the purchase (e.g., 123.22.15.18) was also provided by merchant 304 to authorization system 106 in the request.
  • A second request for authorization to accept a transaction instrument as payment, as shown by request data 316, was made by merchant 306 just 27 minutes after the first request (e.g., Sep. 7, 2004 at 5:32 PM). In addition to the date and time information, request data 316 includes transaction account information such as the name of the account holder (e.g., Stan Rogers) and billing address (e.g., 555 Bermuda Ave). Request data 316 further includes an email address of the purchaser (e.g., funstuff@abc.com) as enhanced authorization data.
  • When a third request for authorization, as shown by request data 318, is received by authorization system 106, the velocity of historical transactions may be examined to assess the risk of the third request being associated with a fraudulent purchase. Request data 318 includes a date and time (e.g., Sep. 7, 2004 at 6:01 PM), name of the account holder (e.g., Jennifer Saks) and billing address (e.g., 3133 S Central Ave.). Request data 318 further includes, as enhanced authorization data 320, an email address of the purchaser (e.g., funstuff@abc.com). To determine the velocity of transactions, authorization system 106 examines historical transactions that are associated with enhanced authorization data received in the request such as, for example, enhanced authorization data 320. Request data 314 and request data 316 are examined since they both contain enhanced authorization data 320 (e.g., funstuff@abc.com). The velocity of these requests is considered by authorization system 106 in assessing the risks of the third request being associated with a fraudulent purchase. In the example depicted in diagram 300, considering that all three requests occurred within one hour of each other, each request is associated with a different transaction instrument, and all requests point to a single purchaser 302 as identified by the enhanced authorization data 320, authorization system 106 may assign a greater level of risk for the third request. If the transaction accounts associated with the three requests do not have a history of being associated with enhanced authorization data 320, the velocity of transactions as depicted in FIG. 3 may suggest that purchaser 302 is making fraudulent purchases using transaction instruments belonging to several people (e.g., Joe White, Stan Rogers, and Jennifer Saks).
  • Based on the risk analysis performed by authorization system 106 for the third request, authorization system 106 provides an authorization decision to merchant 308. Card members associated with transaction instruments provided in the first, second, and third requests may be contacted to determine the validity of the requests. If a request is determined to be associated with a fraudulent purchase, the appropriate merchant may be contacted to cancel a purchase associated with the request.
  • IV. EXAMPLE EMBODIMENT
  • An example embodiment, according to the present invention, is provided below with reference to enhanced authorization data as it relates to merchants dealing with airline travel tickets.
  • Financial institutions currently have existing transaction networks over which financial transactions between its account holders and various merchants may be completed. Financial institutions are therefore uniquely positioned to offer advanced risk identification and prevention measures to its customers, merchants and partners by leveraging these existing networks, or by establishing new networks where these capabilities are provided.
  • The processes introduced herein enable financial institutions to make improved fraud risk management decisions for transactions, particularly those involving travel tickets such as airline tickets. By capturing and analyzing certain additional information at the point of authorization of a charge, the risk that the transaction is fraudulent may be more accurately evaluated before the ticket purchase is authorized. In an embodiment, real-time fraud risk decisions are based on an evaluation of the data traditionally provided in an authorization request plus ten additional transaction variables that have routinely been captured by the merchant and are now transmitted to the financial institution with a real-time authorization request.
  • The processes will be described throughout with reference to airline tickets. However, it should be readily apparent that the processes may be used regarding any transaction in which similar data may be captured and evaluated. In an embodiment, the additional transaction variables provided with respect to the purchase of airline tickets may include: an airline reservation code for the ticket; the passenger name listed on the ticket; an origin airport for the ticket; a destination airport for the ticket; a travel date for the ticket; a description of routing airports or city codes of the airline ticket (e.g., New York to Miami returning to New York: JFK-MIA-MIA-JFK); a class of service (e.g., first class, business class, or coach class, including fare basis information and ticket designator information); an indicator of whether the airline ticket is an electronic ticket; a number of passengers for which tickets are purchased; and a code corresponding to an airline carrier for which the ticket is booked. Advantageously, these ten variables are typically captured in various transactions by airlines and other airline ticket merchants, such as travel agencies and online travel web sites. However, these transaction variables have not previously been provided as part of real-time authorization requests to financial institutions that maintain account holder accounts, and such transaction variables have not been used for fraud risk screening by financial institutions prior to or during the real-time authorization of a transaction.
  • According to the present disclosure then, one or more of the additional transaction variables are now transmitted from the merchant to a financial institution in an automated manner and in a standardized format over the financial transaction network during a transaction initiation and authorization process so that standard authorization times (based on all types of financial transactions using similar payment vehicles) are not affected. The received transaction variables (traditional plus additional) are immediately presented to one or more software-implemented fraud-risk models maintained by the financial institution, which are well-known in the relevant art(s), but must now account for additional variables as described below with respect to FIG. 5. Such software-implemented fraud-risk models would then evaluate the received transaction variables, and from this, an immediate risk decision (e.g., to accept or refer the transaction for further identification, or a request to contact the financial institution) based on a determined risk factor can be made.
  • In various embodiments, the transaction variables may be used in combination with standard information utilized by financial institutions to authorize transactions (e.g., amount of transaction, status of account holder account, purchases and transaction history of the particular account holder, available credit for the financial account, and a transaction history of the particular merchant). The combination of the processes introduced herein with standard authorization decision-making criteria will provide enhanced fraud risk assessment before the ticket or service is authorized for payment on a payment vehicle. This, in turn, will reduce the incidence of fraudulent transactions and reduce processing costs for charge backs and the like.
  • Turning now to FIG. 4, there is depicted a conceptual block diagram of a first exemplary transaction network 400, over which the processes of the present disclosure may be performed. In the network 400, an account holder 402 may initiate a transaction with an airline carrier server 404 for the purchase of airline tickets in any standard manner. When the account holder wishes to pay for the tickets using a payment vehicle, the airline carrier server 404, in turn, may communicate with a financial institution server 406 of the financial institution that maintains the account corresponding to the payment vehicle.
  • In various embodiments, the account holder 402 may communicate with the airline carrier over the Internet using a computer terminal or the like, via telephone, or in person. The account holder 402 may use a credit card, charge card, stored value card, debit card or other type of payment vehicle for the transaction.
  • The airline carrier server 404 may be any type of computer server, or group of distributed servers, that include appropriate processors, memory and network communication devices, as well as application and operating systems software that includes processing instructions and programming for performing the processes disclosed herein. The airline carrier server 404 may communicate with the financial server 406 using any existing transaction processing network, with little need for changes to existing network hardware. Merchants and financial institutions may require certain software changes to capture and transmit the ten transaction variables with authorization requests for ticket purchases in an acceptable format. When the transaction involves an AMERICAN EXPRESS card, for example, the transaction variables can be sent in the AMERICAN EXPRESS Authorization ISO 8583 Version 1 Specification format.
  • Turning now to FIG. 5, there is depicted a flowchart of an exemplary method 500 for processing a financial transaction involving the purchase of airline tickets using enhanced transaction variables. The method 500 commences when an account holder initiates a transaction with an airline carrier for a purchase of an airline ticket (step 502). During the course of the transaction, the airline receives certain of the transaction variable information from the account holder, including the account holder name; a passenger name; an origin airport for the ticket; a destination airport for the ticket; a travel date for the ticket; a description of routing airports or city codes of the airline ticket (e.g., New York to Miami returning to New York: JFK-MIA-MIA-JFK); a class of service (e.g., first class, business class, or coach class, including fare basis information and ticket designator information); an indicator of whether the airline ticket is an electronic ticket. During the course of the transaction, the airline may also determine a reservation code for the ticket and supply its airline carrier code (step 504).
  • Upon agreement of the terms of the ticket, the airline receives a method of payment from the account holder, and then contacts the financial institution maintaining the account holder's account. The airline then transmits the enhanced transaction variables, in addition to the variables traditionally provided, to the financial institution in a standard format with a request to authorize the transaction for payment (step 506).
  • Next, at step 508, the financial institution processes the received transaction variables through at least one fraud-risk model in order to determine the risk of fraud presented by the transaction variables using historical transaction data. Any transactions identified as high risk may be referred for further identification or in case of extreme risk declined. Such a result may occur where the risk models determine that the probability of fraud is within a range of unacceptable values. This range may be established based on historical data so that legitimate transactions are not unduly prevented by the fraud-risk models. The range may be adjusted over time as more historical data is collected and analyzed.
  • Alternatively, or in addition thereto, where the fraud-risk models indicate a risk factor within a certain range of unacceptable values for the transaction, the financial institution may instead transmit a request to be contacted by the account holder by telephone or the like (referred to herein as a call referral message) before the transaction can be authorized. Alternatively, when the fraud-risk models indicate that the risk is within a range of acceptable values, the transaction may then continue to be processed in a standard manner.
  • The financial institution replies to the authorization request with an approval, declination or call referral message based on the outcome of the fraud-risk model along with standard authorization decision-making criteria (step 510). The airline then processes the transaction in accordance with the reply received from the financial institution (step 512), after which process 500 ends.
  • The fraud-risk model or models may be generated from collected data regarding fraudulent and/or legitimate transactions over a large group of account holders on a national or international scale. A risk value may be determined for each collected transaction variable or for inter-comparisons between the received transaction variables, using such historical transaction data. These empirically-determined, risk values may be applied within the risk models in any of a variety of useful manners to determine an overall risk for a given transaction.
  • The received transaction variable data can be applied to historical data in any of a wide variety of useful ways using a wide number of formulas and other forms of risk models. Since historical financial transaction data is used to determine the risk, these values and formulas will be largely dependent on the empirical data used. The formulas may further be refined over time by examining changes in historical data patterns as time progresses, as will be readily apparent to one of ordinary skill in the art.
  • In one example, transactions in which a reservation code is provided may have less risk of fraud than transactions in which no reservation code is provided. The fraud-risk model may then apply a risk value to a received transaction based on whether a reservation code has been provided and the historical data on prior transactions in which a reservation code has not been received.
  • In another example, historical data may reveal that fraudulent transactions are more likely for tickets of a certain type of routing (e.g., one-way ticket purchases may have a greater risk of being fraudulent than round-trip purchases), a certain class of service, or for certain airline carriers. Appropriate risk values will then be applied to these individual transaction variables for each transaction received.
  • In a further example, a transaction is received in which the transaction variable “Passenger Name” is not the same as the transaction variable “Account Holder Name.” The risk value based on such inter-comparison of received transaction variables may be determined based on data of prior fraudulent transactions. For example, it may be that the historical data shows that 5% of transactions in which the Passenger Name does not match the account holder name are fraudulent. A risk value of 0.05 for this transaction variable may accordingly be applied within the fraud-risk models for any transaction in which this is the case, and this value may be added, multiplied or combined with similar determinations for other risk values regarding the remaining transaction variables to determine an overall risk factor for the transaction.
  • It is important that the introduction of this fraud risk decision-making process to financial transaction authorization processes not substantially impact the standard time it currently takes to authorize a credit transaction with airlines or travel agencies, and does not unduly impact the identification and processing of legitimate transactions. That is, legitimate transactions should never be misidentified as fraudulent. Appropriate values and formulas for the risk values and the fraud-risk models, as well as range of acceptable and unacceptable values for transaction risk, may be designed with this goal in mind and refined over time by continuously analyzing historical transaction data to ensure that this goal is achieved.
  • Another embodiment of the present disclosure, shown in FIG. 6, involves the case where the merchant selling the ticket is a travel agent or other third-party, and not the travel carrier engaging in a direct sale. Accordingly, a second exemplary transaction network 600 may include the account holder 402, in communication with a travel agency server 602 or other third-party merchant. The travel agency server 602, in turn, may communicate with the financial institution via a third-party processing system 604, such as may be provided by existing Global Distribution Service (GDS) providers.
  • In such existing systems, only minor hardware and software changes may be needed to accommodate the processes disclosed herein, so that the third-party processors can capture and transmit additional variables for fraud risk screening. In examples where the payment vehicle is maintained by AMERICAN EXPRESS, the travel agencies and Global Distribution System providers must be able to send this information to AMERICAN EXPRESS in the authorization request using the ISO 8583 Version 1 Specification format. Other third-party processors who assist in transferring authorization requests to American Express or other financial institutions (i.e., issuers of payment vehicles used for such transactions) on behalf of airlines or GDS's must also be able to accept and transfer this information in the authorization stream as specified therein.
  • Turning now to FIG. 7, there is depicted a flowchart of an exemplary method 700 for processing a financial transaction involving the purchase of airline tickets from a travel agency or other third-party merchant. The method 700 is similar to the method 500 described above.
  • The method 700 commences when an account holder initiates a transaction with the merchant for the purchase of an airline ticket (step 702). The travel agency captures the transaction variables (the variables in a traditional authorization request and the ten listed above) for the transaction as received from the airline and the account holder (step 704) and transmits them to the financial institution - in almost all cases via the airline or a GDS—in a standard format with the request for authorization of the transaction (step 706).
  • The financial institution processes the received transaction variables against at least one fraud-risk model (step 708) and, in various embodiments, applies standard authorization decision-making criteria as well. The financial institution replies to the authorization request real-time with an approval, declination or call referral message based on outcome of the fraud-risk model and standard decisioning criteria (step 710). The travel agency then processes the transaction in accordance with the received reply (step 712), after which the process 700 ends.
  • The enhanced processes disclosed herein are an important tool that can be consistently implemented for all airline transactions in which the enhanced data (i.e., the additional transaction variables) is transmitted to a card issuer in the real-time authorizations request. Such data is already collected by airlines, travel agencies and GDS's for other purposes, and can be transmitted onwards to issuers with only minor adjustments to current software and without requiring the replacement of network hardware currently used in many systems.
  • Airlines that participate in providing this enhanced data will realize fewer fraudulent airline tickets charged back to them since the fraud models used have a higher probability of detecting and preventing fraudulent transactions than in existing systems. Airline ticket merchants will also spend less time serving fraudulent customers or investigating charge backs, resulting in reduced operational expenses. Additionally, the system makes it harder for a card holder that legitimately enters into a transaction from later claiming that the transaction was fraudulent. In this manner, the card issuer, card holder and airline vendors each benefit from the security provided by the disclosed processes.
  • The card issuer may secure the collected enhanced transaction data in a variety of known and effective manners so that card member information cannot be obtained or used by unauthorized third parties.
  • The disclosed enhancements to financial transaction processing have applicability to various types of transactions involving travel tickets (e.g., train tickets, cruise tickets, car rentals and the like) other than the specific examples involving airlines as described herein, as will be apparent to one of ordinary skill in the art. The risk values and overall ranges of acceptable risk values may be the same or different for different transaction types. The type of ticket purchased can be readily identified based on the merchant or the carrier code received with the transaction variables.
  • Although the best methodologies of the invention have been particularly described in the foregoing disclosure, it is to be understood that such descriptions have been provided for purposes of illustration only, and that other variations both in form and in detail can be made thereupon by those skilled in the art without departing from the spirit and scope thereof, which is defined first and foremost by the appended claims.
  • V. EXAMPLE IMPLEMENTATIONS
  • The present invention may be implemented using hardware, software or a combination thereof and may be implemented in one or more computer systems or other processing systems. However, the manipulations performed by the present invention were often referred to in terms, such as adding or comparing, which are commonly associated with mental operations performed by a human operator. No such capability of a human operator is necessary, or desirable in most cases, in any of the operations described herein which form part of the present invention. Rather, the operations are machine operations. Useful machines for performing the operation of the present invention include general purpose digital computers or similar devices.
  • In fact, in one embodiment, the invention is directed toward one or more computer systems capable of carrying out the functionality described herein. An example of a computer system 800 is shown in FIG. 8.
  • Computer system 800 includes one or more processors, such as processor 804. Processor 804 is connected to a communication infrastructure 806 (e.g., a communications bus, cross-over bar, or network). Various software embodiments are described in terms of this exemplary computer system. After reading this description, it will become apparent to a person skilled in the relevant art(s) how to implement the invention using other computer systems and/or architectures.
  • Computer system 800 can include a display interface 802 that forwards graphics, text, and other data from communication infrastructure 806 (or from a frame buffer not shown) for display on display unit 816.
  • Computer system 800 also includes a main memory 808, preferably random access memory (RAM), and may also include a secondary memory 810. Secondary memory 810 may include, for example, a hard disk drive 812 and/or a removable storage drive 814, representing a floppy disk drive, a magnetic tape drive, an optical disk drive, etc. Removable storage drive 814 reads from and/or writes to a removable storage unit 818 in a well known manner. Removable storage unit 818 represents a floppy disk, magnetic tape, optical disk, etc. which is read by and written to by removable storage drive 814. As will be appreciated, removable storage unit 818 includes a computer usable storage medium having stored therein computer software and/or data.
  • In alternative embodiments, secondary memory 810 may include other similar devices for allowing computer programs or other instructions to be loaded into computer system 800. Such devices may include, for example, a removable storage unit 822 and an interface 820. Examples of such may include a program cartridge and cartridge interface (such as that found in video game devices), a removable memory chip (such as an erasable programmable read only memory (EPROM), or programmable read only memory (PROM)) and associated socket, and other removable storage units 822 and interfaces 820, which allow software and data to be transferred from removable storage unit 822 to computer system 800.
  • Computer system 800 may also include a communications interface 824. Communications interface 824 allows software and data to be transferred between computer system 800 and external devices. Examples of communications interface 824 may include a modem, a network interface (such as an Ethernet card), a communications port, a Personal Computer Memory Card International Association (PCMCIA) slot and card, etc. Software and data transferred via communications interface 824 are in the form of signals 828 which may be electronic, electromagnetic, optical or other signals capable of being received by communications interface 824. These signals 828 are provided to communications interface 824 via a communications path (e.g., channel) 826. This channel 826 carries signals 828 and may be implemented using wire or cable, fiber optics, a telephone line, a cellular link, an radio frequency (RF) link and other communications channels.
  • In this document, the terms “computer program medium” and “computer usable medium” are used to generally refer to media such as removable storage drive 814, a hard disk installed in hard disk drive 812, and signals 828. These computer program products provide software to computer system 800. The invention is directed to such computer program products.
  • Computer programs (also referred to as computer control logic) are stored in main memory 808 and/or secondary memory 810. Computer programs may also be received via communications interface 824. Such computer programs, when executed, enable computer system 800 to perform the features of the present invention, as discussed herein. In particular, the computer programs, when executed, enable processor 804 to perform the features of the present invention. Accordingly, such computer programs represent controllers of computer system 800.
  • In an embodiment where the invention is implemented using software, the software may be stored in a computer program product and loaded into computer system 800 using removable storage drive 814, hard drive 812 or communications interface 824. The control logic (software), when executed by processor 804, causes processor 804 to perform the functions of the invention as described herein.
  • In another embodiment, the invention is implemented primarily in hardware using, for example, hardware components such as application specific integrated circuits (ASICs). Implementation of the hardware state machine so as to perform the functions described herein will be apparent to persons skilled in the relevant art(s).
  • In yet another embodiment, the invention is implemented using a combination of both hardware and software.
  • VI. CONCLUSION
  • While various embodiments of the present invention have been described above, it should be understood that they have been presented by way of example, and not limitation. It will be apparent to persons skilled in the relevant art(s) that various changes in form and detail can be made therein without departing from the spirit and scope of the present invention. Thus, the present invention should not be limited by any of the above described exemplary embodiments, but should be defined only in accordance with the following claims and their equivalents.
  • In addition, it should be understood that the figures illustrated in the attachments, which highlight the functionality and advantages of the present invention, are presented for example purposes only. The architecture of the present invention is sufficiently flexible and configurable, such that it may be utilized (and navigated) in ways other than that shown in the accompanying figures.
  • Further, the purpose of the foregoing Abstract is to enable the U.S. Patent and Trademark Office and the public generally, and especially the scientists, engineers and practitioners in the art who are not familiar with patent or legal terms or phraseology, to determine quickly from a cursory inspection the nature and essence of the technical disclosure of the application. The Abstract is not intended to be limiting as to the scope of the present invention in any way.

Claims (30)

1. A method for authorizing a financial transaction, comprising:
receiving, from a device associated with a merchant, a request for authorization to accept a transaction instrument as payment for a purchase, the request including enhanced authorization data;
making an authorization decision for the request based, at least in part, upon the enhanced authorization data; and
sending the authorization decision to the device.
2. The method of claim 1, wherein the enhanced authorization data includes at least one of: an automatic number identification or an information identifier.
3. The method of claim 1, wherein the enhanced authorization data includes at least one of: an email address; a contact telephone number; a ship-to-name; a ship-to-address; an Internet Protocol (IP) address; or a seller identification.
4. The method of claim 1, wherein the enhanced authorization data includes at least one of: a passenger name; a travel date; a routing description; an electronic ticket indicator; an origin city; a destination city; a class of service; a number of passengers; a reservation code; or carrier code.
5. The method of claim 1, wherein the making step comprises:
calculating a risk based, at least in part, on the enhanced authorization data; and
comparing the risk with a range of acceptable risks.
6. The method of claim 5, wherein the calculating step comprises:
calculating the risk based, at least in part, on a historical transaction associated with the enhanced authorization data.
7. The method of claim 6, wherein the historical transaction is associated with another transaction instrument.
8. The method of claim 5, wherein the calculating step comprises:
calculating the risk based, at least in part, on the velocity of transactions associated with the enhanced authorization data.
9. The method of claim 5, wherein the calculating step comprises:
calculating the risk based, at least in part, on a comparison between the enhanced authorization data and information stored by a card issuer about a card member associated with the transaction instrument.
10. The method of claim 1, further comprising:
receiving an indication from a card member that the purchase is fraudulent; and
reversing the authorization decision.
11. A system for authorizing a financial transaction comprising:
a processor; and
a memory in communication with the processor, wherein the memory stores a plurality of processing instructions for directing the processor to:
receive, from a device associated with a merchant, a request for authorization to accept a transaction instrument as payment for a purchase, the request including enhanced authorization data;
make an authorization decision for the request based, at least in part, upon the enhanced authorization data; and
send the authorization decision to the device.
12. The system of claim 11, wherein the enhanced authorization data includes at least one of: an automatic number identification or an information identifier.
13. The system of claim 11, wherein the enhanced authorization data includes at least one of: an email address; a contact telephone number; a ship-to-name; a ship-to-address; an Internet Protocol (IP) address; or a seller identification.
14. The system of claim 11, wherein the enhanced authorization data includes at least one of: a passenger name; a travel date; a routing description; an electronic ticket indicator; an origin city; a destination city; a class of service; a number of passengers; a reservation code; or carrier code.
15. The system of claim 11, wherein the processing instructions for directing the processor to make an authorization decision include instructions for directing the processor to:
calculate a risk based, at least in part, on the enhanced authorization data; and
compare the risk with a range of acceptable risks.
16. The system of claim 15, wherein the processing instructions for directing the processor to calculate a risk include instructions for directing the processor to:
calculate the risk based, at least in part, on a historical transaction associated with the enhanced authorization data.
17. The system of claim 16, wherein the historical transaction is associated with another transaction instrument.
18. The system of claim 15, wherein the processing instructions for directing the processor to calculate a risk include instructions for directing the processor to:
calculate the risk based, at least in part, on the velocity of transactions associated with the enhanced authorization data.
19. The system of claim 15, wherein the processing instructions for directing the processor to calculate a risk include instructions for directing the processor to:
calculate the risk based, at least in part, on a comparison between the enhanced authorization data and information stored by a card issuer about a card member associated with the transaction instrument.
20. The system of claim 11, wherein the plurality of processing instructions includes instructions for directing the processor to:
receive an indication from a card member that the purchase is fraudulent; and
reverse the authorization decision.
21. A computer program product comprising a computer usable medium having control logic stored therein for causing a computer to associate a reference magnetic signature with a transaction instrument, said control logic comprising:
first computer readable program code means for causing the computer to receive, from a device associated with a merchant, a request for authorization to accept a transaction instrument as payment for a purchase, the request including enhanced authorization data;
second computer readable program code means for causing the computer to make an authorization decision for the request based, at least in part, upon the enhanced authorization data; and
third computer readable program code means for causing the computer to send the authorization decision to the device.
22. The computer program product of claim 21, wherein the enhanced authorization data includes at least one of: an automatic number identification or an information identifier.
23. The computer program product of claim 21, wherein the enhanced authorization data includes at least one of: an email address; a contact telephone number; a ship-to-name; a ship-to-address; an Internet Protocol (EP) address; or a seller identification.
24. The computer program product of claim 21, wherein the enhanced authorization data includes at least one of: a passenger name; a travel date; a routing description; an electronic ticket indicator; an origin city; a destination city; a class of service; a number of passengers; a reservation code; or carrier code.
25. The computer program product of claim 21, wherein the second computer readable program code means comprises:
fourth computer readable program code means for causing the computer to calculate a risk based, at least in part, on the enhanced authorization data; and
fifth computer readable program code means for causing the computer to compare the risk with a range of acceptable risks.
26. The computer program product of claim 25, wherein the fourth computer readable program code means comprises:
sixth computer readable program code means for causing the computer to calculate the risk based, at least in part, on a historical transaction associated with the enhanced authorization data.
27. The computer program product of claim 26, wherein the historical transaction is associated with another transaction instrument.
28. The computer program product of claim 25, wherein the fourth computer readable program code means comprises:
sixth computer readable program code means for causing the computer to calculate the risk based, at least in part, on the velocity of transactions associated with the enhanced authorization data.
29. The computer program product of claim 25, wherein the fourth computer readable program code means comprises:
sixth computer readable program code means for causing the computer to calculate the risk based, at least in part, on a comparison between the enhanced authorization data and information stored by a card issuer about a card member associated with the transaction instrument.
30. The system of claim 21, further comprising:
fourth computer readable program code means for causing the computer to receive an indication from a card member that the purchase is fraudulent; and
fifth computer readable program code means for causing the computer to reverse the authorization decision.
US11/303,018 2004-02-09 2005-12-16 System, method and computer program product for authorizing transactions using enhanced authorization data Abandoned US20070192249A1 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
US11/303,018 US20070192249A1 (en) 2004-02-09 2005-12-16 System, method and computer program product for authorizing transactions using enhanced authorization data

Applications Claiming Priority (3)

Application Number Priority Date Filing Date Title
US54304404P 2004-02-09 2004-02-09
PCT/US2005/004135 WO2005077066A2 (en) 2004-02-09 2005-02-09 System and method to reduce travel-related transaction fraud
US11/303,018 US20070192249A1 (en) 2004-02-09 2005-12-16 System, method and computer program product for authorizing transactions using enhanced authorization data

Related Parent Applications (1)

Application Number Title Priority Date Filing Date
PCT/US2005/004135 Continuation-In-Part WO2005077066A2 (en) 2004-02-09 2005-02-09 System and method to reduce travel-related transaction fraud

Publications (1)

Publication Number Publication Date
US20070192249A1 true US20070192249A1 (en) 2007-08-16

Family

ID=34860368

Family Applications (2)

Application Number Title Priority Date Filing Date
US10/588,811 Expired - Fee Related US8386376B2 (en) 2004-02-09 2005-02-09 System and method using enhanced authorization data to reduce travel-related transaction fraud
US11/303,018 Abandoned US20070192249A1 (en) 2004-02-09 2005-12-16 System, method and computer program product for authorizing transactions using enhanced authorization data

Family Applications Before (1)

Application Number Title Priority Date Filing Date
US10/588,811 Expired - Fee Related US8386376B2 (en) 2004-02-09 2005-02-09 System and method using enhanced authorization data to reduce travel-related transaction fraud

Country Status (2)

Country Link
US (2) US8386376B2 (en)
WO (1) WO2005077066A2 (en)

Cited By (148)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20040210519A1 (en) * 2002-05-31 2004-10-21 Carole Oppenlander System and method for authorizing transactions
US20070284433A1 (en) * 2006-06-08 2007-12-13 American Express Travel Related Services Company, Inc. Method, system, and computer program product for customer-level data verification
US20080054065A1 (en) * 2006-08-29 2008-03-06 Metavante Corporation Combined payment/access-control instrument
US20080302869A1 (en) * 2005-05-09 2008-12-11 Mullen Jeffrey D Dynamic credit card with magnetic stripe and embedded encoder and methods for using the same to provide a copy-proof credit card
US20080314977A1 (en) * 2006-06-08 2008-12-25 American Express Travel Related Services Company, Inc. Method, System, and Computer Program Product for Customer-Level Data Verification
US20090313134A1 (en) * 2008-05-02 2009-12-17 Patrick Faith Recovery of transaction information
US20100179891A1 (en) * 2009-01-12 2010-07-15 Visa U.S.A. Inc. Non-financial transactions in a financial transaction network
US7784687B2 (en) 2007-12-24 2010-08-31 Dynamics Inc. Payment cards and devices with displays, chips, RFIDS, magnetic emulators, magnetic decoders, and other components
US20100287099A1 (en) * 2009-05-07 2010-11-11 Frederick Liu Risk assessment rule set application for fraud prevention
US20110016052A1 (en) * 2009-07-16 2011-01-20 Scragg Ernest M Event Tracking and Velocity Fraud Rules for Financial Transactions
US20110016041A1 (en) * 2009-07-14 2011-01-20 Scragg Ernest M Triggering Fraud Rules for Financial Transactions
US20110022517A1 (en) * 2009-07-22 2011-01-27 Ayman Hammad Apparatus including data bearing medium for authorizing a payment transaction using seasoned data
US20110022518A1 (en) * 2009-07-22 2011-01-27 Ayman Hammad Apparatus including data bearing medium for seasoning a device using data obtained from multiple transaction environments
US20110022483A1 (en) * 2009-07-22 2011-01-27 Ayman Hammad Apparatus including data bearing medium for reducing fraud in payment transactions using a black list
US20110066493A1 (en) * 2009-09-11 2011-03-17 Faith Patrick L System and Method Using Predicted Consumer Behavior to Reduce Use of Transaction Risk Analysis and Transaction Denials
USD643063S1 (en) 2010-07-09 2011-08-09 Dynamics Inc. Interactive electronic card with display
US8066191B1 (en) 2009-04-06 2011-11-29 Dynamics Inc. Cards and assemblies with user interfaces
USD651238S1 (en) 2010-07-09 2011-12-27 Dynamics Inc. Interactive electronic card with display
USD651237S1 (en) 2010-07-09 2011-12-27 Dynamics Inc. Interactive electronic card with display
USD651644S1 (en) 2010-07-09 2012-01-03 Dynamics Inc. Interactive electronic card with display
USD652076S1 (en) 2010-07-09 2012-01-10 Dynamics Inc. Multiple button interactive electronic card with display
USD652075S1 (en) 2010-07-02 2012-01-10 Dynamics Inc. Multiple button interactive electronic card
USD652450S1 (en) 2010-07-09 2012-01-17 Dynamics Inc. Multiple button interactive electronic card
USD652448S1 (en) 2010-07-02 2012-01-17 Dynamics Inc. Multiple button interactive electronic card
USD652449S1 (en) 2010-07-02 2012-01-17 Dynamics Inc. Multiple button interactive electronic card
USD652867S1 (en) 2010-07-02 2012-01-24 Dynamics Inc. Multiple button interactive electronic card
USD653288S1 (en) 2010-07-09 2012-01-31 Dynamics Inc. Multiple button interactive electronic card
US20120054101A1 (en) * 2010-09-01 2012-03-01 American Express Travel Related Services Company, Inc. Application program interface based fraud mitigation
US8226001B1 (en) 2010-06-23 2012-07-24 Fiteq, Inc. Method for broadcasting a magnetic stripe data packet from an electronic smart card
US8231063B2 (en) 2005-03-26 2012-07-31 Privasys Inc. Electronic card and methods for making same
USD665022S1 (en) 2010-07-09 2012-08-07 Dynamics Inc. Multiple button interactive electronic card with light source
USD665447S1 (en) 2010-07-09 2012-08-14 Dynamics Inc. Multiple button interactive electronic card with light source and display
USD666241S1 (en) 2010-07-09 2012-08-28 Dynamics Inc. Multiple button interactive electronic card with light source
USD670332S1 (en) 2011-05-12 2012-11-06 Dynamics Inc. Interactive card
USD670330S1 (en) 2011-05-12 2012-11-06 Dynamics Inc. Interactive card
USD670329S1 (en) 2011-05-12 2012-11-06 Dynamics Inc. Interactive display card
USD670331S1 (en) 2011-05-12 2012-11-06 Dynamics Inc. Interactive display card
USD670759S1 (en) 2010-07-02 2012-11-13 Dynamics Inc. Multiple button interactive electronic card with light sources
US8317103B1 (en) 2010-06-23 2012-11-27 FiTeq Method for broadcasting a magnetic stripe data packet from an electronic smart card
US8322623B1 (en) 2010-07-26 2012-12-04 Dynamics Inc. Systems and methods for advanced card printing
USD672389S1 (en) 2010-07-02 2012-12-11 Dynamics Inc. Multiple button interactive electronic card with light sources
USD673606S1 (en) 2012-08-27 2013-01-01 Dynamics Inc. Interactive electronic card with display and buttons
USD674013S1 (en) 2010-07-02 2013-01-08 Dynamics Inc. Multiple button interactive electronic card with light sources
US8348172B1 (en) 2010-03-02 2013-01-08 Dynamics Inc. Systems and methods for detection mechanisms for magnetic cards and devices
US20130013512A1 (en) * 2010-09-01 2013-01-10 American Express Travel Related Services Company, Inc. Software development kit based fraud mitigation
USD675256S1 (en) 2012-08-27 2013-01-29 Dynamics Inc. Interactive electronic card with display and button
USD676487S1 (en) 2012-08-27 2013-02-19 Dynamics Inc. Interactive electronic card with display and buttons
USD676904S1 (en) 2011-05-12 2013-02-26 Dynamics Inc. Interactive display card
US8393545B1 (en) 2009-06-23 2013-03-12 Dynamics Inc. Cards deployed with inactivated products for activation
US8393546B1 (en) 2009-10-25 2013-03-12 Dynamics Inc. Games, prizes, and entertainment for powered cards and devices
US20130103577A1 (en) * 2011-10-24 2013-04-25 Fiserv, Inc. Systems and methods for optimizing financial transactions
US8485446B1 (en) 2011-03-28 2013-07-16 Dynamics Inc. Shielded magnetic stripe for magnetic cards and devices
USD687095S1 (en) 2012-08-27 2013-07-30 Dynamics Inc. Interactive electronic card with buttons
USD687094S1 (en) 2010-07-02 2013-07-30 Dynamics Inc. Multiple button interactive electronic card with light sources
USD687490S1 (en) 2012-08-27 2013-08-06 Dynamics Inc. Interactive electronic card with display and button
USD687488S1 (en) 2012-08-27 2013-08-06 Dynamics Inc. Interactive electronic card with buttons
USD687489S1 (en) 2012-08-27 2013-08-06 Dynamics Inc. Interactive electronic card with buttons
USD687487S1 (en) 2012-08-27 2013-08-06 Dynamics Inc. Interactive electronic card with display and button
USD687887S1 (en) 2012-08-27 2013-08-13 Dynamics Inc. Interactive electronic card with buttons
US8511574B1 (en) 2009-08-17 2013-08-20 Dynamics Inc. Advanced loyalty applications for powered cards and devices
USD688744S1 (en) 2012-08-27 2013-08-27 Dynamics Inc. Interactive electronic card with display and button
US8523059B1 (en) 2009-10-20 2013-09-03 Dynamics Inc. Advanced payment options for powered cards and devices
US8540165B2 (en) 2005-03-26 2013-09-24 Privasys, Inc. Laminated electronic card assembly
US8554631B1 (en) * 2010-07-02 2013-10-08 Jpmorgan Chase Bank, N.A. Method and system for determining point of sale authorization
US8561894B1 (en) 2010-10-20 2013-10-22 Dynamics Inc. Powered cards and devices designed, programmed, and deployed from a kiosk
USD692053S1 (en) 2012-08-27 2013-10-22 Dynamics Inc. Interactive electronic card with display and button
US8567679B1 (en) 2011-01-23 2013-10-29 Dynamics Inc. Cards and devices with embedded holograms
US8579203B1 (en) 2008-12-19 2013-11-12 Dynamics Inc. Electronic magnetic recorded media emulators in magnetic card devices
USD694322S1 (en) 2012-08-27 2013-11-26 Dynamics Inc. Interactive electronic card with display buttons
US8602312B2 (en) 2010-02-16 2013-12-10 Dynamics Inc. Systems and methods for drive circuits for dynamic magnetic stripe communications devices
USD695636S1 (en) 2012-08-27 2013-12-17 Dynamics Inc. Interactive electronic card with display and buttons
US8622309B1 (en) 2009-04-06 2014-01-07 Dynamics Inc. Payment cards and devices with budgets, parental controls, and virtual accounts
US8628022B1 (en) 2011-05-23 2014-01-14 Dynamics Inc. Systems and methods for sensor mechanisms for magnetic cards and devices
US8650120B2 (en) 2012-03-02 2014-02-11 American Express Travel Related Services Company, Inc. Systems and methods for enhanced authorization fraud mitigation
US20140058767A1 (en) * 2012-08-23 2014-02-27 Mastercard International Incorporated Reservation realization scoring system and method
US20140067672A1 (en) * 2012-08-31 2014-03-06 Fiserv, Inc. Systems and methods for performing financial transactions
US8684267B2 (en) 2005-03-26 2014-04-01 Privasys Method for broadcasting a magnetic stripe data packet from an electronic smart card
US8727219B1 (en) 2009-10-12 2014-05-20 Dynamics Inc. Magnetic stripe track signal having multiple communications channels
US8827153B1 (en) 2011-07-18 2014-09-09 Dynamics Inc. Systems and methods for waveform generation for dynamic magnetic stripe communications devices
US20140297503A1 (en) * 2010-05-03 2014-10-02 Joseph Murphy Methods and system for visually designing trading strategies and execution thereof
US8888009B1 (en) 2012-02-14 2014-11-18 Dynamics Inc. Systems and methods for extended stripe mechanisms for magnetic cards and devices
US8931703B1 (en) 2009-03-16 2015-01-13 Dynamics Inc. Payment cards and devices for displaying barcodes
US8960545B1 (en) 2011-11-21 2015-02-24 Dynamics Inc. Data modification for magnetic cards and devices
US8966065B2 (en) 2004-11-30 2015-02-24 Iii Holdings 1, Llc Method and apparatus for managing an interactive network session
US9010644B1 (en) 2012-11-30 2015-04-21 Dynamics Inc. Dynamic magnetic stripe communications device with stepped magnetic material for magnetic cards and devices
US9010647B2 (en) 2012-10-29 2015-04-21 Dynamics Inc. Multiple sensor detector systems and detection methods of magnetic cards and devices
USD729871S1 (en) 2012-08-27 2015-05-19 Dynamics Inc. Interactive electronic card with display and buttons
USD729870S1 (en) 2012-08-27 2015-05-19 Dynamics Inc. Interactive electronic card with display and button
US9033218B1 (en) 2012-05-15 2015-05-19 Dynamics Inc. Cards, devices, systems, methods and dynamic security codes
USD729869S1 (en) 2012-08-27 2015-05-19 Dynamics Inc. Interactive electronic card with display and button
USD730439S1 (en) 2012-08-27 2015-05-26 Dynamics Inc. Interactive electronic card with buttons
USD730438S1 (en) 2012-08-27 2015-05-26 Dynamics Inc. Interactive electronic card with display and button
US9053398B1 (en) 2010-08-12 2015-06-09 Dynamics Inc. Passive detection mechanisms for magnetic cards and devices
US9064195B2 (en) 2012-06-29 2015-06-23 Dynamics Inc. Multiple layer card circuit boards
CN104732393A (en) * 2013-12-23 2015-06-24 国际商业机器公司 Method and system for managing payment card fraud
USD737373S1 (en) 2013-09-10 2015-08-25 Dynamics Inc. Interactive electronic card with contact connector
USD750167S1 (en) 2013-03-04 2016-02-23 Dynamics Inc. Interactive electronic card with buttons
USD750166S1 (en) 2013-03-04 2016-02-23 Dynamics Inc. Interactive electronic card with display and buttons
USD750168S1 (en) 2013-03-04 2016-02-23 Dynamics Inc. Interactive electronic card with display and button
USD751639S1 (en) 2013-03-04 2016-03-15 Dynamics Inc. Interactive electronic card with display and button
USD751640S1 (en) 2013-03-04 2016-03-15 Dynamics Inc. Interactive electronic card with display and button
US9306666B1 (en) 2009-10-08 2016-04-05 Dynamics Inc. Programming protocols for powered cards and devices
US9329619B1 (en) 2009-04-06 2016-05-03 Dynamics Inc. Cards with power management
US9386078B2 (en) * 2014-05-30 2016-07-05 Ca, Inc. Controlling application programming interface transactions based on content of earlier transactions
USD764584S1 (en) 2013-03-04 2016-08-23 Dynamics Inc. Interactive electronic card with buttons
USD765173S1 (en) 2013-03-04 2016-08-30 Dynamics Inc. Interactive electronic card with display and button
USD765174S1 (en) 2013-03-04 2016-08-30 Dynamics Inc. Interactive electronic card with button
USD767024S1 (en) 2013-09-10 2016-09-20 Dynamics Inc. Interactive electronic card with contact connector
USD777252S1 (en) 2013-03-04 2017-01-24 Dynamics Inc. Interactive electronic card with buttons
US9619741B1 (en) 2011-11-21 2017-04-11 Dynamics Inc. Systems and methods for synchronization mechanisms for magnetic cards and devices
US9646240B1 (en) 2010-11-05 2017-05-09 Dynamics Inc. Locking features for powered cards and devices
US9659246B1 (en) 2012-11-05 2017-05-23 Dynamics Inc. Dynamic magnetic stripe communications device with beveled magnetic material for magnetic cards and devices
US9710745B1 (en) 2012-02-09 2017-07-18 Dynamics Inc. Systems and methods for automated assembly of dynamic magnetic stripe communications devices
USD792512S1 (en) 2010-07-09 2017-07-18 Dynamics Inc. Display with font
USD792513S1 (en) 2010-07-09 2017-07-18 Dynamics Inc. Display with font
USD792511S1 (en) 2010-07-09 2017-07-18 Dynamics Inc. Display with font
US9734669B1 (en) 2012-04-02 2017-08-15 Dynamics Inc. Cards, devices, systems, and methods for advanced payment game of skill and game of chance functionality
US9747598B2 (en) 2007-10-02 2017-08-29 Iii Holdings 1, Llc Dynamic security code push
EP3223204A1 (en) * 2016-03-25 2017-09-27 Accenture Global Services Limited Dynamic offline card authorization
US9818125B2 (en) 2011-02-16 2017-11-14 Dynamics Inc. Systems and methods for information exchange mechanisms for powered cards and devices
US9836680B1 (en) 2011-03-03 2017-12-05 Dynamics Inc. Systems and methods for advanced communication mechanisms for magnetic cards and devices
US9916992B2 (en) 2012-02-20 2018-03-13 Dynamics Inc. Systems and methods for flexible components for powered cards and devices
US10022884B1 (en) 2010-10-15 2018-07-17 Dynamics Inc. Systems and methods for alignment techniques for magnetic cards and devices
US10032049B2 (en) 2016-02-23 2018-07-24 Dynamics Inc. Magnetic cards and devices for motorized readers
US10055614B1 (en) 2010-08-12 2018-08-21 Dynamics Inc. Systems and methods for advanced detection mechanisms for magnetic cards and devices
US10062024B1 (en) 2012-02-03 2018-08-28 Dynamics Inc. Systems and methods for spike suppression for dynamic magnetic stripe communications devices
USD828870S1 (en) 2012-08-27 2018-09-18 Dynamics Inc. Display card
US10078839B1 (en) * 2017-08-30 2018-09-18 Square, Inc. Centralized system for data retrieval
US10095970B1 (en) 2011-01-31 2018-10-09 Dynamics Inc. Cards including anti-skimming devices
US10108891B1 (en) 2014-03-21 2018-10-23 Dynamics Inc. Exchange coupled amorphous ribbons for electronic stripes
US10127557B2 (en) 2016-03-25 2018-11-13 Accenture Global Solutions Limited Dynamic offline card authorization
US10185946B2 (en) 2014-12-31 2019-01-22 Fiserv, Inc. Facilitating presentation of content relating to a financial transaction
US10255561B2 (en) 2015-05-14 2019-04-09 Mastercard International Incorporated System, method and apparatus for detecting absent airline itineraries
US20190279209A1 (en) * 2010-02-19 2019-09-12 Visa International Service Association System and method for financial transaction authentication using travel information
US10504105B2 (en) 2010-05-18 2019-12-10 Dynamics Inc. Systems and methods for cards and devices operable to communicate to touch sensitive displays
US10657502B2 (en) 2012-12-31 2020-05-19 Fiserv, Inc. Systems and methods for performing financial transactions
US10671980B2 (en) * 2014-10-20 2020-06-02 Mastercard International Incorporated Systems and methods for detecting potentially compromised payment cards
US10693263B1 (en) 2010-03-16 2020-06-23 Dynamics Inc. Systems and methods for audio connectors for powered cards and devices
US10949627B2 (en) 2012-12-20 2021-03-16 Dynamics Inc. Systems and methods for non-time smearing detection mechanisms for magnetic cards and devices
US11100431B2 (en) 2011-05-10 2021-08-24 Dynamics Inc. Systems and methods for mobile authorizations
US20210279728A1 (en) * 2013-06-25 2021-09-09 Square, Inc. Integrated Online and Offline Inventory Management
US11126997B1 (en) 2012-10-02 2021-09-21 Dynamics Inc. Cards, devices, systems, and methods for a fulfillment system
US11405781B2 (en) 2007-03-16 2022-08-02 Visa International Service Association System and method for mobile identity protection for online user authentication
US11409971B1 (en) 2011-10-23 2022-08-09 Dynamics Inc. Programming and test modes for powered cards and devices
US11418483B1 (en) 2012-04-19 2022-08-16 Dynamics Inc. Cards, devices, systems, and methods for zone-based network management
US11488170B1 (en) * 2018-03-19 2022-11-01 Worldpay, Llc Systems and methods for automated fraud detection and analytics using aggregated payment vehicles and devices
US11551046B1 (en) 2011-10-19 2023-01-10 Dynamics Inc. Stacked dynamic magnetic stripe commmunications device for magnetic cards and devices
CN115936636A (en) * 2023-02-27 2023-04-07 长沙城市发展集团有限公司 Parking space right-determining and uplink method and system based on pre-epsilon-ABRF algorithm

Families Citing this family (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8386376B2 (en) * 2004-02-09 2013-02-26 American Express Travel Related Services Company, Inc. System and method using enhanced authorization data to reduce travel-related transaction fraud
EP1843290A1 (en) * 2006-04-07 2007-10-10 Amadeus s.a.s Improved global distribution system for searching best travel deals
US8626663B2 (en) * 2010-03-23 2014-01-07 Visa International Service Association Merchant fraud risk score
US9412108B2 (en) 2014-12-11 2016-08-09 Mastercard International Incorporated Systems and methods for fraud detection by transaction ticket size pattern
US11941632B2 (en) * 2015-07-10 2024-03-26 Dyron Clower Instant funds availability risk assessment and real-time fraud alert system and method
US20190095921A1 (en) * 2017-09-26 2019-03-28 Mastercard International Incorporated Method and system for transaction scoring via social media integration
US11113696B2 (en) * 2019-03-29 2021-09-07 U.S. Bancorp, National Association Methods and systems for a virtual assistant
US11699199B2 (en) * 2020-11-10 2023-07-11 Capital One Services, Llc Computer-based systems for determining a travel time to an airport departure point and methods of use thereof
US11443312B2 (en) 2021-02-16 2022-09-13 Capital One Services, Llc Enhanced feedback exposure for merchants based on transaction metadata
US11182797B1 (en) * 2021-02-16 2021-11-23 Capital One Services, Llc Direct data share
US11893633B2 (en) * 2021-08-17 2024-02-06 Capital One Services, Llc Adjustment of card configurations for flight interruptions

Citations (71)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4864557A (en) * 1987-01-30 1989-09-05 Northern Telecom Limited Automatic refresh of operating parameters in equipment with volatile storage
US5602933A (en) * 1995-03-15 1997-02-11 Scientific-Atlanta, Inc. Method and apparatus for verification of remotely accessed data
US5648647A (en) * 1992-12-31 1997-07-15 Seiler; Dieter G. Anti-fraud credit card dispatch system
US5696952A (en) * 1995-08-03 1997-12-09 Pontarelli; Mark C. Dynamic speed switching software for power management
US5768602A (en) * 1995-08-04 1998-06-16 Apple Computer, Inc. Sleep mode controller for power management
US5812668A (en) * 1996-06-17 1998-09-22 Verifone, Inc. System, method and article of manufacture for verifying the operation of a remote transaction clearance system utilizing a multichannel, extensible, flexible architecture
US5832283A (en) * 1995-03-06 1998-11-03 Intel Corporation Method and apparatus for providing unattended on-demand availability of a computer system
US5850446A (en) * 1996-06-17 1998-12-15 Verifone, Inc. System, method and article of manufacture for virtual point of sale processing utilizing an extensible, flexible architecture
US5913202A (en) * 1996-12-03 1999-06-15 Fujitsu Limited Financial information intermediary system
US5949045A (en) * 1997-07-03 1999-09-07 At&T Corp. Micro-dynamic simulation of electronic cash transactions
US5996076A (en) * 1997-02-19 1999-11-30 Verifone, Inc. System, method and article of manufacture for secure digital certification of electronic commerce
US6023679A (en) * 1994-10-04 2000-02-08 Amadeus Global Travel Distribution Llc Pre- and post-ticketed travel reservation information management system
US6029154A (en) * 1997-07-28 2000-02-22 Internet Commerce Services Corporation Method and system for detecting fraud in a credit card transaction over the internet
US6160874A (en) * 1997-10-21 2000-12-12 Mci Communications Corporation Validation gateway
US6223289B1 (en) * 1998-04-20 2001-04-24 Sun Microsystems, Inc. Method and apparatus for session management and user authentication
US6256019B1 (en) * 1999-03-30 2001-07-03 Eremote, Inc. Methods of using a controller for controlling multi-user access to the functionality of consumer devices
US6347339B1 (en) * 1998-12-01 2002-02-12 Cisco Technology, Inc. Detecting an active network node using a login attempt
US6349335B1 (en) * 1999-01-08 2002-02-19 International Business Machines Corporation Computer system, program product and method for monitoring the operational status of a computer
US20020035548A1 (en) * 2000-04-11 2002-03-21 Hogan Edward J. Method and system for conducting secure payments over a computer network
US6374145B1 (en) * 1998-12-14 2002-04-16 Mark Lignoul Proximity sensor for screen saver and password delay
US20020052852A1 (en) * 2000-10-30 2002-05-02 Bozeman William O. Universal positive pay match, authentication, authorization, settlement and clearing system
US20020091554A1 (en) * 2001-01-09 2002-07-11 Rodger Burrows Methods and apparatus for electronically storing travel agents coupons
US20020138418A1 (en) * 2001-03-20 2002-09-26 Zarin Marjorie Faith Method and apparatus for providing pre-existing and prospective customers with an immediately accessible account
US6463474B1 (en) * 1999-07-02 2002-10-08 Cisco Technology, Inc. Local authentication of a client at a network device
US20020165954A1 (en) * 2001-05-04 2002-11-07 Kave Eshghi System and method for monitoring browser event activities
US6484174B1 (en) * 1998-04-20 2002-11-19 Sun Microsystems, Inc. Method and apparatus for session management and user authentication
US20020174335A1 (en) * 2001-03-30 2002-11-21 Junbiao Zhang IP-based AAA scheme for wireless LAN virtual operators
US20020174065A1 (en) * 2001-05-18 2002-11-21 Chalice Coward Multi-currency electronic payment system and terminal emulator
US6490624B1 (en) * 1998-07-10 2002-12-03 Entrust, Inc. Session management in a stateless network system
US20020188573A1 (en) * 2001-01-08 2002-12-12 Calhoon Gordon W. Universal electronic tagging for credit/debit transactions
US20030061157A1 (en) * 2001-07-24 2003-03-27 Hirka Jeffrey L. Multiple account advanced payment card and method of routing card transactions
US6560322B2 (en) * 1998-05-15 2003-05-06 Minolta Co., Ltd. Centralized management unit receiving data from management unit of different communication methods
US6560711B1 (en) * 1999-05-24 2003-05-06 Paul Given Activity sensing interface between a computer and an input peripheral
US20030105707A1 (en) * 2001-11-30 2003-06-05 Yves Audebert Financial risk management system and method
US20030120615A1 (en) * 2000-02-04 2003-06-26 B. Todd Patterson Process and method for secure online transactions with calculated risk and against fraud
US6615244B1 (en) * 1998-11-28 2003-09-02 Tara C Singhal Internet based archive system for personal computers
US20030167226A1 (en) * 2002-03-04 2003-09-04 First Data Corporation Method and system for improving fraud prevention in connection with a newly opened credit account
US6631405B1 (en) * 1996-11-22 2003-10-07 Atabok, Inc. Smart internet information delivery system which automatically detects and schedules data transmission based on status of client's CPU
US20030195963A1 (en) * 2002-04-10 2003-10-16 Yu Song Session preservation and migration among different browsers on different devices
US6658393B1 (en) * 1997-05-27 2003-12-02 Visa Internation Service Association Financial risk prediction systems and methods therefor
US20030225687A1 (en) * 2001-03-20 2003-12-04 David Lawrence Travel related risk management clearinghouse
US20040059930A1 (en) * 2002-09-19 2004-03-25 Difalco Robert A. Computing environment and apparatuses with integrity based fail over
US6732919B2 (en) * 2002-02-19 2004-05-11 Hewlett-Packard Development Company, L.P. System and method for using a multiple-use credit card
US20040167854A1 (en) * 2003-02-21 2004-08-26 Knowles W. Jeffrey System and method of currency conversion in financial transaction process
US20040232225A1 (en) * 2002-09-12 2004-11-25 American Express Travel Related Services Company, System and method for re-associating an account number to another transaction account
US20050108178A1 (en) * 2003-11-17 2005-05-19 Richard York Order risk determination
US6926203B1 (en) * 1997-06-24 2005-08-09 Richard P. Sehr Travel system and methods utilizing multi-application traveler devices
US20050240522A1 (en) * 2002-01-30 2005-10-27 Mastercard International Incorporated System and method for conducting secure payment transaction
US20060026076A1 (en) * 2004-08-02 2006-02-02 Raymond James M Method and apparatus for providing an online ordering system of a retail establishment
US20060026689A1 (en) * 2004-07-30 2006-02-02 Research In Motion Limited Method and system for coordinating client and host security modules
US6999943B1 (en) * 2000-03-10 2006-02-14 Doublecredit.Com, Inc. Routing methods and systems for increasing payment transaction volume and profitability
US7024556B1 (en) * 2000-06-02 2006-04-04 3Com Corporation Distributed system authentication
US20060106738A1 (en) * 2004-11-17 2006-05-18 Paypal. Inc. Automatic address validation
US7051002B2 (en) * 2002-06-12 2006-05-23 Cardinalcommerce Corporation Universal merchant platform for payment authentication
US7100203B1 (en) * 2000-04-19 2006-08-29 Glenayre Electronics, Inc. Operating session reauthorization in a user-operated device
US20060212387A1 (en) * 2005-03-21 2006-09-21 Genzen Ltd. Method and system for administrating funding of product development
US7136835B1 (en) * 1998-03-25 2006-11-14 Orbis Patents Ltd. Credit card system and method
US20070215698A1 (en) * 2006-03-14 2007-09-20 Perry Daniel D Credit card security system and method
US20070282674A1 (en) * 2004-02-09 2007-12-06 American Express Travel Related Services Company, Inc. System and Method Using Enhanced Authorization Data to Reduce Travel-Related
US20070284433A1 (en) * 2006-06-08 2007-12-13 American Express Travel Related Services Company, Inc. Method, system, and computer program product for customer-level data verification
US7331518B2 (en) * 2006-04-04 2008-02-19 Factortrust, Inc. Transaction processing systems and methods
US7337210B2 (en) * 2000-01-13 2008-02-26 International Business Machines Corporation Method and apparatus for determining availability of a user of an instant messaging application
US20080275821A1 (en) * 2005-04-04 2008-11-06 American Express Travel Related Services Company, Inc. Systems and methods for risk triggering values
US20080314977A1 (en) * 2006-06-08 2008-12-25 American Express Travel Related Services Company, Inc. Method, System, and Computer Program Product for Customer-Level Data Verification
US20090313134A1 (en) * 2008-05-02 2009-12-17 Patrick Faith Recovery of transaction information
US7640185B1 (en) * 1995-12-29 2009-12-29 Dresser, Inc. Dispensing system and method with radio frequency customer identification
US7660756B2 (en) * 2001-05-09 2010-02-09 Sony Corporation Client terminal device, storage medium product, bank server apparatus, information transmitting method, information transmitting program, and information transmitting/receiving program
US20100100484A1 (en) * 2005-01-04 2010-04-22 Loc Nguyen Product level payment network acquired transaction authorization
US20100257068A1 (en) * 2009-04-01 2010-10-07 American Express Travel Related Services Co. Inc. Authorization Request for Financial Transactions
US7904332B1 (en) * 2003-01-10 2011-03-08 Deere & Company Integrated financial processing system and method for facilitating an incentive program
US8214292B2 (en) * 2009-04-01 2012-07-03 American Express Travel Related Services Company, Inc. Post-authorization message for a financial transaction

Patent Citations (72)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4864557A (en) * 1987-01-30 1989-09-05 Northern Telecom Limited Automatic refresh of operating parameters in equipment with volatile storage
US5648647A (en) * 1992-12-31 1997-07-15 Seiler; Dieter G. Anti-fraud credit card dispatch system
US6023679A (en) * 1994-10-04 2000-02-08 Amadeus Global Travel Distribution Llc Pre- and post-ticketed travel reservation information management system
US5832283A (en) * 1995-03-06 1998-11-03 Intel Corporation Method and apparatus for providing unattended on-demand availability of a computer system
US5602933A (en) * 1995-03-15 1997-02-11 Scientific-Atlanta, Inc. Method and apparatus for verification of remotely accessed data
US5696952A (en) * 1995-08-03 1997-12-09 Pontarelli; Mark C. Dynamic speed switching software for power management
US5768602A (en) * 1995-08-04 1998-06-16 Apple Computer, Inc. Sleep mode controller for power management
US7640185B1 (en) * 1995-12-29 2009-12-29 Dresser, Inc. Dispensing system and method with radio frequency customer identification
US5812668A (en) * 1996-06-17 1998-09-22 Verifone, Inc. System, method and article of manufacture for verifying the operation of a remote transaction clearance system utilizing a multichannel, extensible, flexible architecture
US5850446A (en) * 1996-06-17 1998-12-15 Verifone, Inc. System, method and article of manufacture for virtual point of sale processing utilizing an extensible, flexible architecture
US6631405B1 (en) * 1996-11-22 2003-10-07 Atabok, Inc. Smart internet information delivery system which automatically detects and schedules data transmission based on status of client's CPU
US5913202A (en) * 1996-12-03 1999-06-15 Fujitsu Limited Financial information intermediary system
US5996076A (en) * 1997-02-19 1999-11-30 Verifone, Inc. System, method and article of manufacture for secure digital certification of electronic commerce
US6658393B1 (en) * 1997-05-27 2003-12-02 Visa Internation Service Association Financial risk prediction systems and methods therefor
US6926203B1 (en) * 1997-06-24 2005-08-09 Richard P. Sehr Travel system and methods utilizing multi-application traveler devices
US5949045A (en) * 1997-07-03 1999-09-07 At&T Corp. Micro-dynamic simulation of electronic cash transactions
US6029154A (en) * 1997-07-28 2000-02-22 Internet Commerce Services Corporation Method and system for detecting fraud in a credit card transaction over the internet
US6160874A (en) * 1997-10-21 2000-12-12 Mci Communications Corporation Validation gateway
US7136835B1 (en) * 1998-03-25 2006-11-14 Orbis Patents Ltd. Credit card system and method
US6484174B1 (en) * 1998-04-20 2002-11-19 Sun Microsystems, Inc. Method and apparatus for session management and user authentication
US6223289B1 (en) * 1998-04-20 2001-04-24 Sun Microsystems, Inc. Method and apparatus for session management and user authentication
US6560322B2 (en) * 1998-05-15 2003-05-06 Minolta Co., Ltd. Centralized management unit receiving data from management unit of different communication methods
US6490624B1 (en) * 1998-07-10 2002-12-03 Entrust, Inc. Session management in a stateless network system
US6615244B1 (en) * 1998-11-28 2003-09-02 Tara C Singhal Internet based archive system for personal computers
US6347339B1 (en) * 1998-12-01 2002-02-12 Cisco Technology, Inc. Detecting an active network node using a login attempt
US6374145B1 (en) * 1998-12-14 2002-04-16 Mark Lignoul Proximity sensor for screen saver and password delay
US6349335B1 (en) * 1999-01-08 2002-02-19 International Business Machines Corporation Computer system, program product and method for monitoring the operational status of a computer
US6256019B1 (en) * 1999-03-30 2001-07-03 Eremote, Inc. Methods of using a controller for controlling multi-user access to the functionality of consumer devices
US6560711B1 (en) * 1999-05-24 2003-05-06 Paul Given Activity sensing interface between a computer and an input peripheral
US6609154B1 (en) * 1999-07-02 2003-08-19 Cisco Technology, Inc. Local authentication of a client at a network device
US6463474B1 (en) * 1999-07-02 2002-10-08 Cisco Technology, Inc. Local authentication of a client at a network device
US7337210B2 (en) * 2000-01-13 2008-02-26 International Business Machines Corporation Method and apparatus for determining availability of a user of an instant messaging application
US20030120615A1 (en) * 2000-02-04 2003-06-26 B. Todd Patterson Process and method for secure online transactions with calculated risk and against fraud
US6999943B1 (en) * 2000-03-10 2006-02-14 Doublecredit.Com, Inc. Routing methods and systems for increasing payment transaction volume and profitability
US20020035548A1 (en) * 2000-04-11 2002-03-21 Hogan Edward J. Method and system for conducting secure payments over a computer network
US7100203B1 (en) * 2000-04-19 2006-08-29 Glenayre Electronics, Inc. Operating session reauthorization in a user-operated device
US7024556B1 (en) * 2000-06-02 2006-04-04 3Com Corporation Distributed system authentication
US20020052852A1 (en) * 2000-10-30 2002-05-02 Bozeman William O. Universal positive pay match, authentication, authorization, settlement and clearing system
US20020188573A1 (en) * 2001-01-08 2002-12-12 Calhoon Gordon W. Universal electronic tagging for credit/debit transactions
US20020091554A1 (en) * 2001-01-09 2002-07-11 Rodger Burrows Methods and apparatus for electronically storing travel agents coupons
US20020138418A1 (en) * 2001-03-20 2002-09-26 Zarin Marjorie Faith Method and apparatus for providing pre-existing and prospective customers with an immediately accessible account
US20030225687A1 (en) * 2001-03-20 2003-12-04 David Lawrence Travel related risk management clearinghouse
US20020174335A1 (en) * 2001-03-30 2002-11-21 Junbiao Zhang IP-based AAA scheme for wireless LAN virtual operators
US20020165954A1 (en) * 2001-05-04 2002-11-07 Kave Eshghi System and method for monitoring browser event activities
US7660756B2 (en) * 2001-05-09 2010-02-09 Sony Corporation Client terminal device, storage medium product, bank server apparatus, information transmitting method, information transmitting program, and information transmitting/receiving program
US20020174065A1 (en) * 2001-05-18 2002-11-21 Chalice Coward Multi-currency electronic payment system and terminal emulator
US20030061157A1 (en) * 2001-07-24 2003-03-27 Hirka Jeffrey L. Multiple account advanced payment card and method of routing card transactions
US20030105707A1 (en) * 2001-11-30 2003-06-05 Yves Audebert Financial risk management system and method
US20050240522A1 (en) * 2002-01-30 2005-10-27 Mastercard International Incorporated System and method for conducting secure payment transaction
US6732919B2 (en) * 2002-02-19 2004-05-11 Hewlett-Packard Development Company, L.P. System and method for using a multiple-use credit card
US20030167226A1 (en) * 2002-03-04 2003-09-04 First Data Corporation Method and system for improving fraud prevention in connection with a newly opened credit account
US20030195963A1 (en) * 2002-04-10 2003-10-16 Yu Song Session preservation and migration among different browsers on different devices
US7051002B2 (en) * 2002-06-12 2006-05-23 Cardinalcommerce Corporation Universal merchant platform for payment authentication
US20040232225A1 (en) * 2002-09-12 2004-11-25 American Express Travel Related Services Company, System and method for re-associating an account number to another transaction account
US20040059930A1 (en) * 2002-09-19 2004-03-25 Difalco Robert A. Computing environment and apparatuses with integrity based fail over
US7904332B1 (en) * 2003-01-10 2011-03-08 Deere & Company Integrated financial processing system and method for facilitating an incentive program
US20040167854A1 (en) * 2003-02-21 2004-08-26 Knowles W. Jeffrey System and method of currency conversion in financial transaction process
US20050108178A1 (en) * 2003-11-17 2005-05-19 Richard York Order risk determination
US20070282674A1 (en) * 2004-02-09 2007-12-06 American Express Travel Related Services Company, Inc. System and Method Using Enhanced Authorization Data to Reduce Travel-Related
US20060026689A1 (en) * 2004-07-30 2006-02-02 Research In Motion Limited Method and system for coordinating client and host security modules
US20060026076A1 (en) * 2004-08-02 2006-02-02 Raymond James M Method and apparatus for providing an online ordering system of a retail establishment
US20060106738A1 (en) * 2004-11-17 2006-05-18 Paypal. Inc. Automatic address validation
US20100100484A1 (en) * 2005-01-04 2010-04-22 Loc Nguyen Product level payment network acquired transaction authorization
US20060212387A1 (en) * 2005-03-21 2006-09-21 Genzen Ltd. Method and system for administrating funding of product development
US20080275821A1 (en) * 2005-04-04 2008-11-06 American Express Travel Related Services Company, Inc. Systems and methods for risk triggering values
US20070215698A1 (en) * 2006-03-14 2007-09-20 Perry Daniel D Credit card security system and method
US7331518B2 (en) * 2006-04-04 2008-02-19 Factortrust, Inc. Transaction processing systems and methods
US20070284433A1 (en) * 2006-06-08 2007-12-13 American Express Travel Related Services Company, Inc. Method, system, and computer program product for customer-level data verification
US20080314977A1 (en) * 2006-06-08 2008-12-25 American Express Travel Related Services Company, Inc. Method, System, and Computer Program Product for Customer-Level Data Verification
US20090313134A1 (en) * 2008-05-02 2009-12-17 Patrick Faith Recovery of transaction information
US20100257068A1 (en) * 2009-04-01 2010-10-07 American Express Travel Related Services Co. Inc. Authorization Request for Financial Transactions
US8214292B2 (en) * 2009-04-01 2012-07-03 American Express Travel Related Services Company, Inc. Post-authorization message for a financial transaction

Cited By (272)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20040210519A1 (en) * 2002-05-31 2004-10-21 Carole Oppenlander System and method for authorizing transactions
US8966065B2 (en) 2004-11-30 2015-02-24 Iii Holdings 1, Llc Method and apparatus for managing an interactive network session
US8231063B2 (en) 2005-03-26 2012-07-31 Privasys Inc. Electronic card and methods for making same
US8286889B2 (en) 2005-03-26 2012-10-16 Privasys, Inc Electronic financial transaction cards and methods
US8302871B2 (en) 2005-03-26 2012-11-06 Privasys, Inc Method for conducting a transaction between a magnetic stripe reader and an electronic card
US8360332B2 (en) 2005-03-26 2013-01-29 Privasys Electronic card
US8480002B2 (en) 2005-03-26 2013-07-09 Mark Poidomani Conducting a transaction with an electronic card
US8500019B2 (en) 2005-03-26 2013-08-06 Mark Poidomani Electronic cards and methods for making same
US8540165B2 (en) 2005-03-26 2013-09-24 Privasys, Inc. Laminated electronic card assembly
US8684267B2 (en) 2005-03-26 2014-04-01 Privasys Method for broadcasting a magnetic stripe data packet from an electronic smart card
US9053399B2 (en) 2005-03-26 2015-06-09 Privasys Method for broadcasting a magnetic stripe data packet from an electronic smart card
US7828220B2 (en) 2005-05-09 2010-11-09 Dynamics Inc. Dynamic credit card with magnetic stripe and embedded encoder and methods for using the same to provide a copy-proof credit card
US20080302876A1 (en) * 2005-05-09 2008-12-11 Mullen Jeffrey D Dynamic credit card with magnetic stripe and embedded encoder and methods for using the same to provide a copy-proof credit card
US20080302869A1 (en) * 2005-05-09 2008-12-11 Mullen Jeffrey D Dynamic credit card with magnetic stripe and embedded encoder and methods for using the same to provide a copy-proof credit card
US7954705B2 (en) 2005-05-09 2011-06-07 Dynamics Inc. Dynamic credit card with magnetic stripe and embedded encoder and methods for using the same to provide a copy-proof credit card
US7793851B2 (en) 2005-05-09 2010-09-14 Dynamics Inc. Dynamic credit card with magnetic stripe and embedded encoder and methods for using the same to provide a copy-proof credit card
US20090308921A1 (en) * 2005-05-09 2009-12-17 Mullen Jeffrey D Dynamic credit card with magnetic stripe and embedded encoder and methods for using the same to provide a copy-proof credit card
US7931195B2 (en) 2005-05-09 2011-04-26 Dynamics Inc. Dynamic credit card with magnetic stripe and embedded encoder and methods for using the same to provide a copy-proof credit card
US9195985B2 (en) 2006-06-08 2015-11-24 Iii Holdings 1, Llc Method, system, and computer program product for customer-level data verification
US20080314977A1 (en) * 2006-06-08 2008-12-25 American Express Travel Related Services Company, Inc. Method, System, and Computer Program Product for Customer-Level Data Verification
US9892389B2 (en) 2006-06-08 2018-02-13 Iii Holdings I, Llc Method, system, and computer program product for customer-level data verification
US20070284433A1 (en) * 2006-06-08 2007-12-13 American Express Travel Related Services Company, Inc. Method, system, and computer program product for customer-level data verification
US7757943B2 (en) * 2006-08-29 2010-07-20 Metavante Corporation Combined payment/access-control instrument
US20080054065A1 (en) * 2006-08-29 2008-03-06 Metavante Corporation Combined payment/access-control instrument
US11405781B2 (en) 2007-03-16 2022-08-02 Visa International Service Association System and method for mobile identity protection for online user authentication
US9747598B2 (en) 2007-10-02 2017-08-29 Iii Holdings 1, Llc Dynamic security code push
US9004368B2 (en) 2007-12-24 2015-04-14 Dynamics Inc. Payment cards and devices with enhanced magnetic emulators
US8973824B2 (en) 2007-12-24 2015-03-10 Dynamics Inc. Cards and devices with magnetic emulators with zoning control and advanced interiors
US9639796B2 (en) 2007-12-24 2017-05-02 Dynamics Inc. Cards and devices with magnetic emulators with zoning control and advanced interiors
US9684861B2 (en) 2007-12-24 2017-06-20 Dynamics Inc. Payment cards and devices with displays, chips, RFIDs, magnetic emulators, magnetic decoders, and other components
US9697454B2 (en) 2007-12-24 2017-07-04 Dynamics Inc. Payment cards and devices with displays, chips, RFIDs, magnetic emulators, magnetic encoders, and other components
US9547816B2 (en) 2007-12-24 2017-01-17 Dynamics Inc. Cards and devices with multifunction magnetic emulators and methods for using same
US9704088B2 (en) 2007-12-24 2017-07-11 Dynamics Inc. Cards and devices with multifunction magnetic emulators and methods for using same
US9704089B2 (en) 2007-12-24 2017-07-11 Dynamics Inc. Systems and methods for programmable payment cards and devices with loyalty-based payment applications
US9384438B2 (en) 2007-12-24 2016-07-05 Dynamics, Inc. Cards with serial magnetic emulators
US9361569B2 (en) 2007-12-24 2016-06-07 Dynamics, Inc. Cards with serial magnetic emulators
US10496918B2 (en) 2007-12-24 2019-12-03 Dynamics Inc. Cards and devices with multifunction magnetic emulators and methods for using the same
US9727813B2 (en) 2007-12-24 2017-08-08 Dynamics Inc. Credit, security, debit cards and the like with buttons
US10579920B2 (en) 2007-12-24 2020-03-03 Dynamics Inc. Systems and methods for programmable payment cards and devices with loyalty-based payment applications
US8517276B2 (en) 2007-12-24 2013-08-27 Dynamics Inc. Cards and devices with multifunction magnetic emulators and methods for using same
US8074877B2 (en) 2007-12-24 2011-12-13 Dynamics Inc. Systems and methods for programmable payment cards and devices with loyalty-based payment applications
US9805297B2 (en) 2007-12-24 2017-10-31 Dynamics Inc. Systems and methods for programmable payment cards and devices with loyalty-based payment applications
US8608083B2 (en) 2007-12-24 2013-12-17 Dynamics Inc. Cards and devices with magnetic emulators with zoning control and advanced interiors
US7784687B2 (en) 2007-12-24 2010-08-31 Dynamics Inc. Payment cards and devices with displays, chips, RFIDS, magnetic emulators, magnetic decoders, and other components
US10467521B2 (en) 2007-12-24 2019-11-05 Dynamics Inc. Payment cards and devices with gift card, global integration, and magnetic stripe reader communication functionality
US10430704B2 (en) 2007-12-24 2019-10-01 Dynamics Inc. Payment cards and devices with displays, chips, RFIDs, magnetic emulators, magnetic encoders, and other components
US8286876B2 (en) 2007-12-24 2012-10-16 Dynamics Inc. Cards and devices with magnetic emulators and magnetic reader read-head detectors
US8020775B2 (en) 2007-12-24 2011-09-20 Dynamics Inc. Payment cards and devices with enhanced magnetic emulators
US11494606B2 (en) 2007-12-24 2022-11-08 Dynamics Inc. Cards and devices with magnetic emulators with zoning control and advanced interiors
US8011577B2 (en) 2007-12-24 2011-09-06 Dynamics Inc. Payment cards and devices with gift card, global integration, and magnetic stripe reader communication functionality
US11238329B2 (en) 2007-12-24 2022-02-01 Dynamics Inc. Payment cards and devices with gift card, global integration, and magnetic stripe reader communication functionality
US8668143B2 (en) 2007-12-24 2014-03-11 Dynamics Inc. Payment cards and devices with gift card, global integration, and magnetic stripe reader communication functionality
US8302872B2 (en) 2007-12-24 2012-11-06 Dynamics Inc. Advanced dynamic credit cards
US10032100B2 (en) 2007-12-24 2018-07-24 Dynamics Inc. Cards and devices with multifunction magnetic emulators and methods for using same
US10095974B1 (en) 2007-12-24 2018-10-09 Dynamics Inc. Payment cards and devices with displays, chips, RFIDs, magnetic emulators, magnetic encoders, and other components
US10169692B2 (en) 2007-12-24 2019-01-01 Dynamics Inc. Credit, security, debit cards and the like with buttons
US9010630B2 (en) 2007-12-24 2015-04-21 Dynamics Inc. Systems and methods for programmable payment cards and devices with loyalty-based payment applications
US10325199B2 (en) 2007-12-24 2019-06-18 Dynamics Inc. Payment cards and devices with displays, chips, RFIDs, magnetic emulators, magentic decoders, and other components
US8733638B2 (en) 2007-12-24 2014-05-27 Dynamics Inc. Payment cards and devices with displays, chips, RFIDs, magnetic emulators, magentic decoders, and other components
US10198687B2 (en) 2007-12-24 2019-02-05 Dynamics Inc. Cards and devices with multifunction magnetic emulators and methods for using same
US10997489B2 (en) 2007-12-24 2021-05-04 Dynamics Inc. Cards and devices with multifunction magnetic emulators and methods for using same
US10223631B2 (en) 2007-12-24 2019-03-05 Dynamics Inc. Cards and devices with multifunction magnetic emulators and methods for using same
US11062195B2 (en) 2007-12-24 2021-07-13 Dynamics Inc. Cards and devices with multifunction magnetic emulators and methods for using same
US11055600B2 (en) 2007-12-24 2021-07-06 Dynamics Inc. Cards with serial magnetic emulators
US8382000B2 (en) 2007-12-24 2013-02-26 Dynamics Inc. Payment cards and devices with enhanced magnetic emulators
US11037045B2 (en) 2007-12-24 2021-06-15 Dynamics Inc. Cards and devices with magnetic emulators with zoning control and advanced interiors
US8881989B2 (en) 2007-12-24 2014-11-11 Dynamics Inc. Cards and devices with magnetic emulators with zoning control and advanced interiors
US8875999B2 (en) 2007-12-24 2014-11-04 Dynamics Inc. Payment cards and devices with gift card, global integration, and magnetic stripe reader communication functionality
US8413892B2 (en) 2007-12-24 2013-04-09 Dynamics Inc. Payment cards and devices with displays, chips, RFIDs, magnetic emulators, magnetic encoders, and other components
US8424773B2 (en) 2007-12-24 2013-04-23 Dynamics Inc. Payment cards and devices with enhanced magnetic emulators
US10255545B2 (en) 2007-12-24 2019-04-09 Dynamics Inc. Cards and devices with multifunction magnetic emulators and methods for using same
US8459548B2 (en) 2007-12-24 2013-06-11 Dynamics Inc. Payment cards and devices with gift card, global integration, and magnetic stripe reader communication functionality
US8485437B2 (en) 2007-12-24 2013-07-16 Dynamics Inc. Systems and methods for programmable payment cards and devices with loyalty-based payment applications
US20090313134A1 (en) * 2008-05-02 2009-12-17 Patrick Faith Recovery of transaction information
US8579203B1 (en) 2008-12-19 2013-11-12 Dynamics Inc. Electronic magnetic recorded media emulators in magnetic card devices
US20100179891A1 (en) * 2009-01-12 2010-07-15 Visa U.S.A. Inc. Non-financial transactions in a financial transaction network
US8762239B2 (en) 2009-01-12 2014-06-24 Visa U.S.A. Inc. Non-financial transactions in a financial transaction network
US8931703B1 (en) 2009-03-16 2015-01-13 Dynamics Inc. Payment cards and devices for displaying barcodes
US9928456B1 (en) 2009-04-06 2018-03-27 Dynamics Inc. Cards and assemblies with user interfaces
US8757499B2 (en) 2009-04-06 2014-06-24 Dynamics Inc. Laminated cards with manual input interfaces
US8066191B1 (en) 2009-04-06 2011-11-29 Dynamics Inc. Cards and assemblies with user interfaces
US8282007B1 (en) 2009-04-06 2012-10-09 Dynamics Inc. Laminated cards with manual input interfaces
US8622309B1 (en) 2009-04-06 2014-01-07 Dynamics Inc. Payment cards and devices with budgets, parental controls, and virtual accounts
US10948964B1 (en) 2009-04-06 2021-03-16 Dynamics Inc. Cards with power management
US10176419B1 (en) 2009-04-06 2019-01-08 Dynamics Inc. Cards and assemblies with user interfaces
US8172148B1 (en) 2009-04-06 2012-05-08 Dynamics Inc. Cards and assemblies with user interfaces
US9329619B1 (en) 2009-04-06 2016-05-03 Dynamics Inc. Cards with power management
US8590796B1 (en) 2009-04-06 2013-11-26 Dynamics Inc. Cards having dynamic magnetic stripe communication devices fabricated from multiple boards
US10140616B2 (en) 2009-05-07 2018-11-27 Visa International Service Association Risk assessment rule set application for fraud prevention
US20100287099A1 (en) * 2009-05-07 2010-11-11 Frederick Liu Risk assessment rule set application for fraud prevention
US8924279B2 (en) 2009-05-07 2014-12-30 Visa U.S.A. Inc. Risk assessment rule set application for fraud prevention
US9064255B1 (en) 2009-06-23 2015-06-23 Dynamics Inc. Cards deployed with inactivated products for activation
US11144909B1 (en) 2009-06-23 2021-10-12 Dynamics Inc. Cards deployed with inactivated products for activation
US8393545B1 (en) 2009-06-23 2013-03-12 Dynamics Inc. Cards deployed with inactivated products for activation
US8757483B1 (en) 2009-06-23 2014-06-24 Dynamics Inc. Cards deployed with inactivated products for activation
US20110016041A1 (en) * 2009-07-14 2011-01-20 Scragg Ernest M Triggering Fraud Rules for Financial Transactions
US20110016052A1 (en) * 2009-07-16 2011-01-20 Scragg Ernest M Event Tracking and Velocity Fraud Rules for Financial Transactions
US10685338B2 (en) 2009-07-22 2020-06-16 Visa International Service Association Authorizing a payment transaction using seasoned data
US10796310B2 (en) 2009-07-22 2020-10-06 Visa International Service Association Apparatus including data bearing medium for reducing fraud in payment transactions using a black list
US9396465B2 (en) 2009-07-22 2016-07-19 Visa International Service Association Apparatus including data bearing medium for reducing fraud in payment transactions using a black list
US20110022518A1 (en) * 2009-07-22 2011-01-27 Ayman Hammad Apparatus including data bearing medium for seasoning a device using data obtained from multiple transaction environments
US11030593B2 (en) 2009-07-22 2021-06-08 Visa International Service Association Processing authorization request using seasoned data
US10438181B2 (en) 2009-07-22 2019-10-08 Visa International Service Association Authorizing a payment transaction using seasoned data
US20110022483A1 (en) * 2009-07-22 2011-01-27 Ayman Hammad Apparatus including data bearing medium for reducing fraud in payment transactions using a black list
US20110022517A1 (en) * 2009-07-22 2011-01-27 Ayman Hammad Apparatus including data bearing medium for authorizing a payment transaction using seasoned data
US9852368B1 (en) 2009-08-17 2017-12-26 Dynamics Inc. Advanced loyalty applications for powered cards and devices
US11003970B1 (en) 2009-08-17 2021-05-11 Dynamics Inc. Advanced loyalty applications for powered cards and devices
US9953255B1 (en) 2009-08-17 2018-04-24 Dynamics Inc. Advanced loyalty applications for powered cards and devices
US8511574B1 (en) 2009-08-17 2013-08-20 Dynamics Inc. Advanced loyalty applications for powered cards and devices
US8620798B2 (en) 2009-09-11 2013-12-31 Visa International Service Association System and method using predicted consumer behavior to reduce use of transaction risk analysis and transaction denials
US20110066493A1 (en) * 2009-09-11 2011-03-17 Faith Patrick L System and Method Using Predicted Consumer Behavior to Reduce Use of Transaction Risk Analysis and Transaction Denials
US9306666B1 (en) 2009-10-08 2016-04-05 Dynamics Inc. Programming protocols for powered cards and devices
US8727219B1 (en) 2009-10-12 2014-05-20 Dynamics Inc. Magnetic stripe track signal having multiple communications channels
US8814050B1 (en) 2009-10-20 2014-08-26 Dynamics Inc. Advanced payment options for powered cards and devices
US8523059B1 (en) 2009-10-20 2013-09-03 Dynamics Inc. Advanced payment options for powered cards and devices
US10181097B1 (en) 2009-10-20 2019-01-15 Dynamics Inc. Advanced payment options for powered cards and devices
US9292843B1 (en) 2009-10-20 2016-03-22 Dynamics Inc. Advanced payment options for powered cards and devices
US9652436B1 (en) 2009-10-25 2017-05-16 Dynamics Inc. Games, prizes, and entertainment for powered cards and devices
US8393546B1 (en) 2009-10-25 2013-03-12 Dynamics Inc. Games, prizes, and entertainment for powered cards and devices
US9373069B2 (en) 2010-02-16 2016-06-21 Dynamics Inc. Systems and methods for drive circuits for dynamic magnetic stripe communications devices
US8602312B2 (en) 2010-02-16 2013-12-10 Dynamics Inc. Systems and methods for drive circuits for dynamic magnetic stripe communications devices
US9875437B2 (en) 2010-02-16 2018-01-23 Dynamics Inc. Systems and methods for drive circuits for dynamic magnetic stripe communications devices
US10706419B2 (en) * 2010-02-19 2020-07-07 Visa International Service Association System and method for financial transaction authentication using travel information
US20190279209A1 (en) * 2010-02-19 2019-09-12 Visa International Service Association System and method for financial transaction authentication using travel information
US10482363B1 (en) 2010-03-02 2019-11-19 Dynamics Inc. Systems and methods for detection mechanisms for magnetic cards and devices
US8348172B1 (en) 2010-03-02 2013-01-08 Dynamics Inc. Systems and methods for detection mechanisms for magnetic cards and devices
US8746579B1 (en) 2010-03-02 2014-06-10 Dynamics Inc. Systems and methods for detection mechanisms for magnetic cards and devices
US8573503B1 (en) 2010-03-02 2013-11-05 Dynamics Inc. Systems and methods for detection mechanisms for magnetic cards and devices
US10693263B1 (en) 2010-03-16 2020-06-23 Dynamics Inc. Systems and methods for audio connectors for powered cards and devices
US9152996B2 (en) * 2010-05-03 2015-10-06 KnowVera, LLC Methods and system for visually designing trading strategies and execution thereof
US20140297503A1 (en) * 2010-05-03 2014-10-02 Joseph Murphy Methods and system for visually designing trading strategies and execution thereof
US11120427B2 (en) 2010-05-18 2021-09-14 Dynamics Inc. Systems and methods for cards and devices operable to communicate via light pulsing
US10504105B2 (en) 2010-05-18 2019-12-10 Dynamics Inc. Systems and methods for cards and devices operable to communicate to touch sensitive displays
US8226001B1 (en) 2010-06-23 2012-07-24 Fiteq, Inc. Method for broadcasting a magnetic stripe data packet from an electronic smart card
US8317103B1 (en) 2010-06-23 2012-11-27 FiTeq Method for broadcasting a magnetic stripe data packet from an electronic smart card
USD674013S1 (en) 2010-07-02 2013-01-08 Dynamics Inc. Multiple button interactive electronic card with light sources
USD652075S1 (en) 2010-07-02 2012-01-10 Dynamics Inc. Multiple button interactive electronic card
USD670759S1 (en) 2010-07-02 2012-11-13 Dynamics Inc. Multiple button interactive electronic card with light sources
USD652448S1 (en) 2010-07-02 2012-01-17 Dynamics Inc. Multiple button interactive electronic card
US8554631B1 (en) * 2010-07-02 2013-10-08 Jpmorgan Chase Bank, N.A. Method and system for determining point of sale authorization
USD652449S1 (en) 2010-07-02 2012-01-17 Dynamics Inc. Multiple button interactive electronic card
USD687094S1 (en) 2010-07-02 2013-07-30 Dynamics Inc. Multiple button interactive electronic card with light sources
USD672389S1 (en) 2010-07-02 2012-12-11 Dynamics Inc. Multiple button interactive electronic card with light sources
US9111278B1 (en) 2010-07-02 2015-08-18 Jpmorgan Chase Bank, N.A. Method and system for determining point of sale authorization
USD652867S1 (en) 2010-07-02 2012-01-24 Dynamics Inc. Multiple button interactive electronic card
USD792513S1 (en) 2010-07-09 2017-07-18 Dynamics Inc. Display with font
USD665447S1 (en) 2010-07-09 2012-08-14 Dynamics Inc. Multiple button interactive electronic card with light source and display
USD651237S1 (en) 2010-07-09 2011-12-27 Dynamics Inc. Interactive electronic card with display
USD651644S1 (en) 2010-07-09 2012-01-03 Dynamics Inc. Interactive electronic card with display
USD665022S1 (en) 2010-07-09 2012-08-07 Dynamics Inc. Multiple button interactive electronic card with light source
USD652076S1 (en) 2010-07-09 2012-01-10 Dynamics Inc. Multiple button interactive electronic card with display
USD652450S1 (en) 2010-07-09 2012-01-17 Dynamics Inc. Multiple button interactive electronic card
USD792512S1 (en) 2010-07-09 2017-07-18 Dynamics Inc. Display with font
USD643063S1 (en) 2010-07-09 2011-08-09 Dynamics Inc. Interactive electronic card with display
USD653288S1 (en) 2010-07-09 2012-01-31 Dynamics Inc. Multiple button interactive electronic card
USD651238S1 (en) 2010-07-09 2011-12-27 Dynamics Inc. Interactive electronic card with display
USD666241S1 (en) 2010-07-09 2012-08-28 Dynamics Inc. Multiple button interactive electronic card with light source
USD792511S1 (en) 2010-07-09 2017-07-18 Dynamics Inc. Display with font
US8322623B1 (en) 2010-07-26 2012-12-04 Dynamics Inc. Systems and methods for advanced card printing
US9053398B1 (en) 2010-08-12 2015-06-09 Dynamics Inc. Passive detection mechanisms for magnetic cards and devices
US10055614B1 (en) 2010-08-12 2018-08-21 Dynamics Inc. Systems and methods for advanced detection mechanisms for magnetic cards and devices
US20130013512A1 (en) * 2010-09-01 2013-01-10 American Express Travel Related Services Company, Inc. Software development kit based fraud mitigation
US20120054101A1 (en) * 2010-09-01 2012-03-01 American Express Travel Related Services Company, Inc. Application program interface based fraud mitigation
US10022884B1 (en) 2010-10-15 2018-07-17 Dynamics Inc. Systems and methods for alignment techniques for magnetic cards and devices
US8561894B1 (en) 2010-10-20 2013-10-22 Dynamics Inc. Powered cards and devices designed, programmed, and deployed from a kiosk
US9646240B1 (en) 2010-11-05 2017-05-09 Dynamics Inc. Locking features for powered cards and devices
US10176423B1 (en) 2011-01-23 2019-01-08 Dynamics Inc. Cards and devices with embedded holograms
US9721201B1 (en) 2011-01-23 2017-08-01 Dynamics Inc. Cards and devices with embedded holograms
US8944333B1 (en) 2011-01-23 2015-02-03 Dynamics Inc. Cards and devices with embedded holograms
US8567679B1 (en) 2011-01-23 2013-10-29 Dynamics Inc. Cards and devices with embedded holograms
US10095970B1 (en) 2011-01-31 2018-10-09 Dynamics Inc. Cards including anti-skimming devices
US9818125B2 (en) 2011-02-16 2017-11-14 Dynamics Inc. Systems and methods for information exchange mechanisms for powered cards and devices
US10990867B1 (en) 2011-03-03 2021-04-27 Dynamics Inc. Systems and methods for advanced communication mechanisms for magnetic cards and devices
US9836680B1 (en) 2011-03-03 2017-12-05 Dynamics Inc. Systems and methods for advanced communication mechanisms for magnetic cards and devices
US8485446B1 (en) 2011-03-28 2013-07-16 Dynamics Inc. Shielded magnetic stripe for magnetic cards and devices
US11501217B2 (en) 2011-05-10 2022-11-15 Dynamics Inc. Systems and methods for a mobile electronic wallet
US11100431B2 (en) 2011-05-10 2021-08-24 Dynamics Inc. Systems and methods for mobile authorizations
USD670329S1 (en) 2011-05-12 2012-11-06 Dynamics Inc. Interactive display card
USD670332S1 (en) 2011-05-12 2012-11-06 Dynamics Inc. Interactive card
USD676904S1 (en) 2011-05-12 2013-02-26 Dynamics Inc. Interactive display card
USD670331S1 (en) 2011-05-12 2012-11-06 Dynamics Inc. Interactive display card
USD670330S1 (en) 2011-05-12 2012-11-06 Dynamics Inc. Interactive card
US8628022B1 (en) 2011-05-23 2014-01-14 Dynamics Inc. Systems and methods for sensor mechanisms for magnetic cards and devices
US9881245B1 (en) 2011-05-23 2018-01-30 Dynamics Inc. Systems and methods for sensor mechanisms for magnetic cards and devices
US10936926B1 (en) 2011-05-23 2021-03-02 Dynamics Inc. Systems and methods for sensor mechanisms for magnetic cards and devices
US9349089B1 (en) 2011-05-23 2016-05-24 Dynamics Inc. Systems and methods for sensor mechanisms for magnetic cards and devices
US8827153B1 (en) 2011-07-18 2014-09-09 Dynamics Inc. Systems and methods for waveform generation for dynamic magnetic stripe communications devices
US11551046B1 (en) 2011-10-19 2023-01-10 Dynamics Inc. Stacked dynamic magnetic stripe commmunications device for magnetic cards and devices
US11409971B1 (en) 2011-10-23 2022-08-09 Dynamics Inc. Programming and test modes for powered cards and devices
US20150142663A1 (en) * 2011-10-24 2015-05-21 Fiserv, Inc. Systems and methods for optimizing financial transactions
US20130103577A1 (en) * 2011-10-24 2013-04-25 Fiserv, Inc. Systems and methods for optimizing financial transactions
US9619741B1 (en) 2011-11-21 2017-04-11 Dynamics Inc. Systems and methods for synchronization mechanisms for magnetic cards and devices
US11941469B1 (en) 2011-11-21 2024-03-26 Dynamics Inc. Systems and methods for synchronization mechanisms for magnetic cards and devices
US10169693B1 (en) 2011-11-21 2019-01-01 Dynamics Inc. Data modification for magnetic cards and devices
US8960545B1 (en) 2011-11-21 2015-02-24 Dynamics Inc. Data modification for magnetic cards and devices
US10062024B1 (en) 2012-02-03 2018-08-28 Dynamics Inc. Systems and methods for spike suppression for dynamic magnetic stripe communications devices
US9710745B1 (en) 2012-02-09 2017-07-18 Dynamics Inc. Systems and methods for automated assembly of dynamic magnetic stripe communications devices
US8888009B1 (en) 2012-02-14 2014-11-18 Dynamics Inc. Systems and methods for extended stripe mechanisms for magnetic cards and devices
US9916992B2 (en) 2012-02-20 2018-03-13 Dynamics Inc. Systems and methods for flexible components for powered cards and devices
US9665869B2 (en) 2012-03-02 2017-05-30 American Express Travel Related Services Company, Inc. Systems and methods for enhanced authorization fraud mitigation
US10789595B2 (en) 2012-03-02 2020-09-29 American Express Travel Related Services Company, Inc. Pseudo authorization messages
US8650120B2 (en) 2012-03-02 2014-02-11 American Express Travel Related Services Company, Inc. Systems and methods for enhanced authorization fraud mitigation
US8719167B2 (en) 2012-03-02 2014-05-06 American Express Travel Related Services Company, Inc. Systems and methods for enhanced authorization fraud mitigation
US9734669B1 (en) 2012-04-02 2017-08-15 Dynamics Inc. Cards, devices, systems, and methods for advanced payment game of skill and game of chance functionality
US11418483B1 (en) 2012-04-19 2022-08-16 Dynamics Inc. Cards, devices, systems, and methods for zone-based network management
US10395156B1 (en) 2012-05-15 2019-08-27 Dynamics Inc. Cards, devices, systems, methods and dynamic security codes
US9033218B1 (en) 2012-05-15 2015-05-19 Dynamics Inc. Cards, devices, systems, methods and dynamic security codes
US9064195B2 (en) 2012-06-29 2015-06-23 Dynamics Inc. Multiple layer card circuit boards
US20140058767A1 (en) * 2012-08-23 2014-02-27 Mastercard International Incorporated Reservation realization scoring system and method
USD687095S1 (en) 2012-08-27 2013-07-30 Dynamics Inc. Interactive electronic card with buttons
USD729870S1 (en) 2012-08-27 2015-05-19 Dynamics Inc. Interactive electronic card with display and button
USD687490S1 (en) 2012-08-27 2013-08-06 Dynamics Inc. Interactive electronic card with display and button
USD729871S1 (en) 2012-08-27 2015-05-19 Dynamics Inc. Interactive electronic card with display and buttons
USD676487S1 (en) 2012-08-27 2013-02-19 Dynamics Inc. Interactive electronic card with display and buttons
USD675256S1 (en) 2012-08-27 2013-01-29 Dynamics Inc. Interactive electronic card with display and button
USD687488S1 (en) 2012-08-27 2013-08-06 Dynamics Inc. Interactive electronic card with buttons
USD687489S1 (en) 2012-08-27 2013-08-06 Dynamics Inc. Interactive electronic card with buttons
USD687487S1 (en) 2012-08-27 2013-08-06 Dynamics Inc. Interactive electronic card with display and button
USD729869S1 (en) 2012-08-27 2015-05-19 Dynamics Inc. Interactive electronic card with display and button
USD687887S1 (en) 2012-08-27 2013-08-13 Dynamics Inc. Interactive electronic card with buttons
USD673606S1 (en) 2012-08-27 2013-01-01 Dynamics Inc. Interactive electronic card with display and buttons
USD688744S1 (en) 2012-08-27 2013-08-27 Dynamics Inc. Interactive electronic card with display and button
USD828870S1 (en) 2012-08-27 2018-09-18 Dynamics Inc. Display card
USD692053S1 (en) 2012-08-27 2013-10-22 Dynamics Inc. Interactive electronic card with display and button
USD694322S1 (en) 2012-08-27 2013-11-26 Dynamics Inc. Interactive electronic card with display buttons
USD730439S1 (en) 2012-08-27 2015-05-26 Dynamics Inc. Interactive electronic card with buttons
USD730438S1 (en) 2012-08-27 2015-05-26 Dynamics Inc. Interactive electronic card with display and button
USD695636S1 (en) 2012-08-27 2013-12-17 Dynamics Inc. Interactive electronic card with display and buttons
US20140067672A1 (en) * 2012-08-31 2014-03-06 Fiserv, Inc. Systems and methods for performing financial transactions
US11126997B1 (en) 2012-10-02 2021-09-21 Dynamics Inc. Cards, devices, systems, and methods for a fulfillment system
US9010647B2 (en) 2012-10-29 2015-04-21 Dynamics Inc. Multiple sensor detector systems and detection methods of magnetic cards and devices
US9659246B1 (en) 2012-11-05 2017-05-23 Dynamics Inc. Dynamic magnetic stripe communications device with beveled magnetic material for magnetic cards and devices
US10922597B1 (en) 2012-11-05 2021-02-16 Dynamics Inc. Dynamic magnetic stripe communications device with beveled magnetic material for magnetic cards and devices
US10311349B1 (en) 2012-11-30 2019-06-04 Dynamics Inc. Dynamic magnetic stripe communications device with stepped magnetic material for magnetic cards and devices
US11023796B1 (en) 2012-11-30 2021-06-01 Dynamics Inc. Dynamic magnetic stripe communications device with stepped magnetic material for magnetic cards and devices
US9646750B1 (en) 2012-11-30 2017-05-09 Dynamics Inc. Dynamic magnetic stripe communications device with stepped magnetic material for magnetic cards and devices
US9010644B1 (en) 2012-11-30 2015-04-21 Dynamics Inc. Dynamic magnetic stripe communications device with stepped magnetic material for magnetic cards and devices
US10949627B2 (en) 2012-12-20 2021-03-16 Dynamics Inc. Systems and methods for non-time smearing detection mechanisms for magnetic cards and devices
US10657502B2 (en) 2012-12-31 2020-05-19 Fiserv, Inc. Systems and methods for performing financial transactions
USD750166S1 (en) 2013-03-04 2016-02-23 Dynamics Inc. Interactive electronic card with display and buttons
USD777252S1 (en) 2013-03-04 2017-01-24 Dynamics Inc. Interactive electronic card with buttons
USD751640S1 (en) 2013-03-04 2016-03-15 Dynamics Inc. Interactive electronic card with display and button
USD764584S1 (en) 2013-03-04 2016-08-23 Dynamics Inc. Interactive electronic card with buttons
USD751639S1 (en) 2013-03-04 2016-03-15 Dynamics Inc. Interactive electronic card with display and button
USD750168S1 (en) 2013-03-04 2016-02-23 Dynamics Inc. Interactive electronic card with display and button
USD765174S1 (en) 2013-03-04 2016-08-30 Dynamics Inc. Interactive electronic card with button
USD750167S1 (en) 2013-03-04 2016-02-23 Dynamics Inc. Interactive electronic card with buttons
USD765173S1 (en) 2013-03-04 2016-08-30 Dynamics Inc. Interactive electronic card with display and button
US20210279728A1 (en) * 2013-06-25 2021-09-09 Square, Inc. Integrated Online and Offline Inventory Management
US11842298B2 (en) * 2013-06-25 2023-12-12 Block, Inc. Integrated database for expediting transaction processing
USD737373S1 (en) 2013-09-10 2015-08-25 Dynamics Inc. Interactive electronic card with contact connector
USD767024S1 (en) 2013-09-10 2016-09-20 Dynamics Inc. Interactive electronic card with contact connector
CN104732393A (en) * 2013-12-23 2015-06-24 国际商业机器公司 Method and system for managing payment card fraud
US20150178733A1 (en) * 2013-12-23 2015-06-25 International Business Machines Corporation Payment card fraud protection
US10115107B2 (en) * 2013-12-23 2018-10-30 International Business Machines Corporation Payment card fraud protection
US10943236B2 (en) 2013-12-23 2021-03-09 International Business Machines Corporation Payment card fraud protection
US11062188B1 (en) 2014-03-21 2021-07-13 Dynamics Inc Exchange coupled amorphous ribbons for electronic stripes
US10108891B1 (en) 2014-03-21 2018-10-23 Dynamics Inc. Exchange coupled amorphous ribbons for electronic stripes
US9386078B2 (en) * 2014-05-30 2016-07-05 Ca, Inc. Controlling application programming interface transactions based on content of earlier transactions
US11893549B2 (en) 2014-10-20 2024-02-06 Mastercard International Incorporated Systems and methods for detecting potentially compromised payment cards
US10671980B2 (en) * 2014-10-20 2020-06-02 Mastercard International Incorporated Systems and methods for detecting potentially compromised payment cards
US10185946B2 (en) 2014-12-31 2019-01-22 Fiserv, Inc. Facilitating presentation of content relating to a financial transaction
US10255561B2 (en) 2015-05-14 2019-04-09 Mastercard International Incorporated System, method and apparatus for detecting absent airline itineraries
US10032049B2 (en) 2016-02-23 2018-07-24 Dynamics Inc. Magnetic cards and devices for motorized readers
EP3223204A1 (en) * 2016-03-25 2017-09-27 Accenture Global Services Limited Dynamic offline card authorization
US10410204B2 (en) 2016-03-25 2019-09-10 Accenture Global Solutions Limited Dynamic offline card authorization
US11037166B2 (en) 2016-03-25 2021-06-15 Accenture Global Solutions Limited Dynamic offline card authorization
US10127557B2 (en) 2016-03-25 2018-11-13 Accenture Global Solutions Limited Dynamic offline card authorization
US10078839B1 (en) * 2017-08-30 2018-09-18 Square, Inc. Centralized system for data retrieval
US11488170B1 (en) * 2018-03-19 2022-11-01 Worldpay, Llc Systems and methods for automated fraud detection and analytics using aggregated payment vehicles and devices
US11587089B2 (en) 2018-03-19 2023-02-21 Worldpay, Llc Systems and methods for automated fraud detection and analytics using aggregated payment vehicles and devices
CN115936636A (en) * 2023-02-27 2023-04-07 长沙城市发展集团有限公司 Parking space right-determining and uplink method and system based on pre-epsilon-ABRF algorithm

Also Published As

Publication number Publication date
US8386376B2 (en) 2013-02-26
US20070282674A1 (en) 2007-12-06
WO2005077066A3 (en) 2006-06-01
WO2005077066A2 (en) 2005-08-25

Similar Documents

Publication Publication Date Title
US20070192249A1 (en) System, method and computer program product for authorizing transactions using enhanced authorization data
US10706419B2 (en) System and method for financial transaction authentication using travel information
US9811832B2 (en) System, method, and computer program product for issuing and using debit cards
US9892389B2 (en) Method, system, and computer program product for customer-level data verification
US8600855B2 (en) Transaction data repository for risk analysis
US6736314B2 (en) Methods and systems for transferring funds
US8025223B2 (en) System and method for mass transit merchant payment
US7146344B2 (en) Method and system for making small payments using a payment card
US20070174208A1 (en) System and Method for Global Automated Address Verification
US20160086147A1 (en) System and method for leveraging a payment authorization environment for offering and fulfilling the cross selling of products to existing customers, up selling, and acquisition of new customers
EP1222582A1 (en) Tokenless biometric electronic rewards system
US20080314977A1 (en) Method, System, and Computer Program Product for Customer-Level Data Verification
AU2002247375A1 (en) Method and system for making small payments using a payment card
CA2728334A1 (en) Consumer spending threshold evaluation
US8336764B2 (en) Fraud control when granting instant credit
US20100161478A1 (en) Computer payment banking system and method
US20070226140A1 (en) Expedited Issuance and Activation of a Transaction Instrument

Legal Events

Date Code Title Description
AS Assignment

Owner name: AMERICAN EXPRESS TRAVEL RELATED SERVICES COMPANY,

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:BIFFLE, JANET L.;DOMENICA, DANIELLE;DUGGAL, CHANDERPREET;AND OTHERS;REEL/FRAME:017306/0898;SIGNING DATES FROM 20060209 TO 20060222

AS Assignment

Owner name: III HOLDINGS 1, LLC, DELAWARE

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:AMERICAN EXPRESS TRAVEL RELATED SERVICES COMPANY, INC.;REEL/FRAME:032722/0746

Effective date: 20140324

STCB Information on status: application discontinuation

Free format text: ABANDONED -- FAILURE TO PAY ISSUE FEE

AS Assignment

Owner name: LIBERTY PEAK VENTURES, LLC, TEXAS

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:III HOLDINGS 1, LLC;REEL/FRAME:045660/0060

Effective date: 20180315