System and method using superkeys and subkeys

a technology of superkeys and subkeys, applied in the field of system and method using superkeys and subkeys, can solve the problems of not being able to provide customized reports or analysis of transaction level data according to internal needs, and the current risk assessment network cannot provide transaction level data aggregates across multiple accounts

Inactive Publication Date: 2010-05-20
VISA INT SERVICE ASSOC
View PDF100 Cites 87 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Benefits of technology

[0004]At step 15, the network sends a file with contents of the user inquiry to one or more data sources. In response to the file, the one or more data sources send account level data and the network receives the account level data at step 20. In many conventional risk assessment systems, account level data can include a number of account numbers associated with the user indicated in the user inquiry. Using the account level data, usually the account numbers, the network queries a transaction database for transaction level data in step 25. Such transaction level data can include details of individual transactions conducted with each of the accounts associated with the user. The network then analyzes the transaction level data to determine the risk assessment summary or credit score according to internal network protocols, policies and algorithms in step 30. Finally, in step 35 the network sends the risk assessment summary or credit score to the information requester.

Problems solved by technology

Such standardization of risk assessment summaries and credit scores, while providing consistent and concise metrics of risk, do not allow for a means to provide customized reports or analysis of the transaction level data according to internal needs of each information request.
Current risk assessment networks cannot provide transaction level data aggregates across multiple accounts customized to the requirements of an individual information requester.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • System and method using superkeys and subkeys
  • System and method using superkeys and subkeys
  • System and method using superkeys and subkeys

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0019]The present invention is directed to systems and methods for efficiently and cost-effectively reporting aggregated user, account and transaction level information to multiple information requesters. For example, embodiments of the present invention can be used to report user information and aggregated transaction data to multiple credit account issuers for the purpose of anticipating or managing the risk of user bankruptcy or other account risks.

[0020]FIG. 1B depicts a flow chart of a method 100B for processing user inquiries from multiple information requesters according to one embodiment of the present invention. Method 100B can be performed by any appropriate computer or server system running appropriate computer readable code in a network for processing account applications and / or transactions. In step 1, the network receives a plurality of user inquiries from multiple information requesters. As examples, information requesters can be banks or other credit issuing institut...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

Systems and methods for providing aggregated transaction level data for a particular user to multiple information requesters are disclosed. Subkeys are assigned to user inquiries from multiple information requesters and a super key is assigned to those subkeys to link them to one or more user identifiers such as a username or Social Security number. Account level data is provided based on the super key and the user identifiers. Duplicate requests for aggregated transaction level data contained in the user inquiries can be deleted. User inquiry response files containing transaction level aggregate data can be sent to the information requesters based on the assigned subkeys.

Description

CROSS-REFERENCES TO RELATED APPLICATIONS[0001]This Application claims priority to U.S. Provisional Patent Application No. 61 / 116,207 filed on Nov. 19, 2008, and is related to U.S. Non-Provisional Patent Application 12 / 616,048 filed on Nov. 10, 2009. All applications (provisional and non-provisional) are herein incorporated by reference in their entirety for all purposes.BACKGROUND[0002]Various tools, systems and products exist to assist various entities assess the risk, marketing value, success of marketing efforts, consumer loyalty and detect fraud. Such tools are especially useful for helping credit issuers when assessing the initial and continued credit worthiness of a user with regard to a credit account, targeting offers and evaluating the chances of a user declaring bankruptcy. The methodology of a conventional system for providing risk assessment or scoring is illustrated in the flowchart depicted in FIG. 1A.[0003]Starting at step 10, a risk assessment network receives a user...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(United States)
IPC IPC(8): G06F17/30
CPCG06Q10/067G06Q30/02G06Q40/02G06Q40/08G07F7/08G06Q20/4037G06F16/24556G06Q40/03
Inventor BARRETT, MELYSSASCOTT, JOEHILGERS, NANCYSIEGEL, KEVIN
Owner VISA INT SERVICE ASSOC
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products