Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Mobile directory number and email verification of financial transactions

a technology of financial transactions and mobile directory numbers, applied in the field of mobile directory numbers and email verification of financial transactions, can solve problems such as identity risk valu

Inactive Publication Date: 2012-05-24
VISA INT SERVICE ASSOC
View PDF16 Cites 146 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Benefits of technology

[0010]An object of an embodiment of the present invention is to provide a system, and its methods of use, to detect fraudulent transactions based on information derived from a payment network pertaining to payment transactions, information derived from a wireless network pertaining to particular wireless device IDs (e.g. mobile directory numbers) and information derived from a financial institution pertaining to cardholders associated with financial accounts. The invention relates generally to protecting the identity of a cardholder and detecting identity theft by using the wireless device ID of the cardholder's wireless device (e.g. mobile phone) and validating that wireless device ID using data obtained from a payment network and a financial institution pertaining to the cardholder. This data may be used to validate the wireless device ID obtained from the payment network where such validation may be used for a variety of applications, such as assisting in the detection and prevention of identity theft, fraudulent behavior or activity that may be engaged in by a purported cardholder.
[0011]Another object of an embodiment of the present invention is to provide a system, and its methods of use, to detect fraudulent transactions based on information derived from a payment network pertaining to payment transactions, information derived from a wireless network pertaining to particular wireless device IDs (e.g. MDNs) and information derived from a financial institution pertaining to cardholders associated with financial accounts. Data pertaining to the wireless device ID obtained from a wireless network 102 and data pertaining to the cardholder obtained from a financial institution can be used as the basis for a statistical analysis, resulting in an identity risk value. Data that may be obtained and derived include the wireless device ID (e.g. the MDN) itself, other telephone numbers (directory numbers) associated with the account, location data of the wireless device identified by the wireless device ID, supplementary subscription data associated with the wireless device, the format and characteristics of the wireless device ID and the format and characteristics of other directory numbers. All location data obtained or otherwise derived from telephone directory numbers provides utility for fraud detection as irregular or anomalous locations associated with an individual may be indicative of financial fraud. Furthermore, supplementary subscription data associated with the wireless device, such as the network serving the wireless device, age of the subscription, name on the subscription, porting history of the directory number, and subscribed supplementary features (e.g. call forwarding), may be indicative of financial fraud. This data may be used for a variety of applications, such as assisting in the detection and prevention of identity theft, fraudulent behavior or activity that may be engaged in by a purported cardholder.
[0012]Yet another object of an embodiment of the present invention is to provide a system, and its methods of use, to detect fraudulent transactions based on information derived from a payment network pertaining to payment transactions, information derived from a financial institution pertaining to cardholders associated with financial accounts and information derived from an email service provider pertaining to particular email addresses and Internet Protocol (IP) data pertaining to cardholders associated with email accounts. This data may be used to validate the email address data obtained from the payment network where such validation may be used for a variety of applications, such as assisting in the detection and prevention of identity theft, fraudulent behavior or activity that may be engaged in by a purported cardholder.
[0013]Yet another object of an embodiment of the present invention is to provide a system, and its methods of use, to detect fraudulent transactions based on information derived from a payment network pertaining to payment transactions, information derived from a financial institution pertaining to cardholders associated with financial accounts and information derived from an email service provider pertaining to particular email addresses and Internet Protocol (IP) data pertaining to cardholders associated with email accounts. Data pertaining to the email addresses obtained from a financial institution and data pertaining to the cardholder obtained from an email service provider can be used as the basis for a statistical analysis, resulting in an identity risk value. Data that may be obtained and derived include the email address, IP address data associated with the email address and the format and characteristics of the email address itself. All location data obtained or otherwise derived from IP address data provides utility for fraud detection as irregular or anomalous locations associated with an individual may be indicative of financial fraud as IP address data may be indicative of location data where an email account has been accessed by an individual. This data may be used for a variety of applications, such as assisting in the detection and prevention of identity theft, fraudulent behavior or activity that may be engaged in by a purported cardholder.

Problems solved by technology

Furthermore, supplementary subscription data associated with the wireless device, such as the network serving the wireless device, age of the subscription, name on the subscription, porting history of the directory number, and subscribed supplementary features (e.g. call forwarding), may be indicative of financial fraud.
Data pertaining to the email addresses obtained from a financial institution and data pertaining to the cardholder obtained from an email service provider can be used as the basis for a statistical analysis, resulting in an identity risk value.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Mobile directory number and email verification of financial transactions
  • Mobile directory number and email verification of financial transactions
  • Mobile directory number and email verification of financial transactions

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0028]FIG. 1 depicts the functional entities and modules of an exemplary Mobile Directory Number and Email Transaction Verification System 100. FIG. 1 shows a block diagram of a system for Mobile Directory Number and Email Transaction Verification. (The System 100 may also be referred to as a Mobile Directory Number and Email Transaction Verification System.) Embodiments of the Mobile Directory Number and Email Transaction Verification System 100, based upon information received from a payment network 118, a wireless network 102, an account holder profile at a financial institution 116 and an account holder profile at an email service provider 114, and optionally other information, assess the likelihood that a financial transaction is fraudulent.

[0029]Examples of financial transactions that may cause information to be received from a payment network 118 include the purchase of a product or service using a credit card or the like, where the product or service is purchased by an accou...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

Systems and methods for verifying a financial transaction based on an account number, a mobile directory number associated with the financial transaction, a mobile directory number associated with the account number, an email address associated with the account number, internet protocol address data associated with the financial transaction, and internet protocol address data associated with accesses of the email address.

Description

CROSS REFERENCE TO RELATED APPLICATIONS[0001]This patent application claims the benefit of U.S. Provisional Patent Application Ser. No. 61 / 223,671 filed Jul. 7, 2009, and entitled, “Mobile Directory Number Verification of Financial Transactions” and U.S. Provisional Patent Application Ser. No. 61 / 223,677 filed Jul. 7, 2009, and entitled, “Email Verification of Financial Transactions,” both of which are hereby incorporated by reference in their entirety.BACKGROUND OF THE INVENTION[0002]Card-not-present (CNP) and card-present (CP) financial fraud is an increasing problem that plagues the financial industry. For CNP transactions, the customer's card is not physically available for a merchant to inspect. The merchant must rely on the cardholder (or someone purporting to be the cardholder) to present the information on the card by some indirect means, whether by mail, telephone or over the Internet when the cardholder is not present at the point of sale. Although more and more CNP fraud ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06Q20/40G06Q20/32G06Q20/00
CPCG06Q20/32G06Q20/4014G06Q20/40G06Q20/3223G06Q20/3224G06Q20/4016G06Q20/425
Inventor SNYDER, RANDALL A.GINTER, THOMAS S.BUHRMANN, MICHAEL F.
Owner VISA INT SERVICE ASSOC
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products