CA1252566A - Transaction system with off-line risk assessment - Google Patents
Transaction system with off-line risk assessmentInfo
- Publication number
- CA1252566A CA1252566A CA000508109A CA508109A CA1252566A CA 1252566 A CA1252566 A CA 1252566A CA 000508109 A CA000508109 A CA 000508109A CA 508109 A CA508109 A CA 508109A CA 1252566 A CA1252566 A CA 1252566A
- Authority
- CA
- Canada
- Prior art keywords
- transaction
- terminal
- card
- data
- issuer
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Expired
Links
- 238000012502 risk assessment Methods 0.000 title claims abstract description 32
- 238000011156 evaluation Methods 0.000 claims abstract description 21
- 230000005291 magnetic effect Effects 0.000 claims description 11
- 238000000034 method Methods 0.000 claims description 7
- 238000013479 data entry Methods 0.000 claims 1
- 238000013475 authorization Methods 0.000 abstract description 13
- 238000004891 communication Methods 0.000 description 18
- 238000013459 approach Methods 0.000 description 12
- 230000006870 function Effects 0.000 description 8
- 230000005540 biological transmission Effects 0.000 description 4
- 230000002349 favourable effect Effects 0.000 description 4
- 238000010586 diagram Methods 0.000 description 2
- 230000008569 process Effects 0.000 description 2
- 241000905957 Channa melasoma Species 0.000 description 1
- AWJGUZSYVIVZGP-YUMQZZPRSA-N Pro-Val Chemical compound CC(C)[C@@H](C(O)=O)NC(=O)[C@@H]1CCCN1 AWJGUZSYVIVZGP-YUMQZZPRSA-N 0.000 description 1
- 238000001514 detection method Methods 0.000 description 1
- 230000009977 dual effect Effects 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 230000008520 organization Effects 0.000 description 1
- 108010053725 prolylvaline Proteins 0.000 description 1
- 230000009467 reduction Effects 0.000 description 1
- 230000004044 response Effects 0.000 description 1
- 238000010200 validation analysis Methods 0.000 description 1
- 238000012795 verification Methods 0.000 description 1
Classifications
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07F—COIN-FREED OR LIKE APPARATUS
- G07F7/00—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus
- G07F7/08—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/40—Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
- G06Q20/403—Solvency checks
Abstract
Abstract of the Disclosure TRANSACTION SYSTEM WITH OFF-LINE RISK ASSESSMENT
The subject invention relates to a transaction system wherein the issuer of transaction cards can regulate the type of authorization requests transmitted from the point of transaction. The system includes a plurality of transaction cards, each of which are provided with risk assessment data associated with each cardholder. The system further includes a plurality of terminals, each terminal having the ability to read the information placed on the transaction cards. In operation, the risk assessment data is compared to the transaction amount by the terminal. If the transaction is approved, the terminal will issue an automatic, off-line authorization. If the transaction does not fall within the approval range, the terminal will function to transmit the transaction information to the issuer for evaluation. The issuer can then determine whether to authorize the transaction based on its own data base.
The subject invention relates to a transaction system wherein the issuer of transaction cards can regulate the type of authorization requests transmitted from the point of transaction. The system includes a plurality of transaction cards, each of which are provided with risk assessment data associated with each cardholder. The system further includes a plurality of terminals, each terminal having the ability to read the information placed on the transaction cards. In operation, the risk assessment data is compared to the transaction amount by the terminal. If the transaction is approved, the terminal will issue an automatic, off-line authorization. If the transaction does not fall within the approval range, the terminal will function to transmit the transaction information to the issuer for evaluation. The issuer can then determine whether to authorize the transaction based on its own data base.
Description
Description TRANSACTION S~STEM WITH OFF-LI~E RISK ASSESSME~T
~ = _ _ . .. _ . .. _ .. . _ . . .. , .. _ , . _ .
Technical Field The subject invention relates to a transaction system wherein the issuer of a transaction card can regulate the costs of transmission of authorizaton requests. Specifically, the system permits an issuer to specify, for each cardholder, the type of transactions that may be authorized at a remote location. By this arrangement, the number of authorization requests which must be transmitted to a remote approval site is reduced, thereby r~ducing communications costs.
Back4round of the Invention ., _ In recent years, the use of transaction cards has substantially increased. In many cases, transaction cards are used as a substitute for cash when purchasing goods or services. These transaction cards may be in the form of credit cards where a record of the transaction is kept and later billed to the card holder. In some more recent systems~ the card holder will fund an account which is debited for the amount of the transaction directly. These latter type of accounts are known as "debit cards". The banking industry has also begun utilizing transaction cards enablin~ common banking functions to be performed without a teller, using an automatic terminal.
As the use of these transaction cards has increasedt so have losses related to fraud. Cards which have been lost or stolen are frequently used to - purchase goods or services without the approval of the rightful owner. In addition, many counterfeit cards have been produced for unauthorized purchases. The industry has responded with a number of approaches ~¢
;6 ~ -2-designed to reduce the losses associated with such fraudulent transactions.
One of the initial approaches in the transaction card industry was to periodically print and distribute lists of lost or stolen cards. ~hen a card is presented ~or a transaction, the card number is checked against this list prior to approval of the transaction.
Unfortunately, this approach is time-consuming and prone to error. More importantly, because the information is distributed periodically, this system will not detect the fraudulent use of a card, prior to the time it has been reported lost, stolen or counterfeited and thereafter listed in the~bulletin.
Recently, there have been developed various automatic "on-line" verification systems. In these systems, information about the cardholder and the transaction is transmitted via a communciation link to a central control center for approval or further routing. In some cases~ the central control center will be supplied with information about the cardholder and can make an ap~roval decision. In some s.naller transaction syste~s, the central station will be equivalent to the issuer of the card. In larger systems, where there are many card issuers, the ~5 transaction information may have to be routed from the central station to one of the outl~in~ issuers ~or final approval.
~ hen the first automatic systems were developed, the transaction information was typically entered into 3n the approval network by the merchant, by telephoning a local receiver who would enter the data in a terminal.
More recently, numerous electronic terminals have been designed that automate the process. These terminals, which are placed at the merchant locations, are designed to receive the transaction information directly.
~ 3 The terminals are provided with a means for reading the transaction card. For example, many transaetion eards are provided with a magnetie stripe that is encoded with in~ormation, sueh as the aceount number of the eardholder and the institution whieh issued the eard. These terminals will have a magnetie transducer for reading this inEormation. The terminal will transmit the data on the magnetic stripe, along with other particulars of the transaction, sueh as the transaetion amount, into the authorization system. The approval steps will then be taken, as outlined above.
As ean be appreeiated, where the issuer of the transaetion card is remote from the point Q~f transactlon, siqnificant communication costs can be ineurred for each approvalO In addition, the approvals are time-consuming and slow down the sales ~rocess.
While the eleetronie approval proeess is suitable from the standpoint of redueing fraud, it would be desirable to balanee the ris~ of .raud with the eost of approving every transaetion.
One approach for redueing the eosts of eommunieation in an approval network is diselosed in ~.~. Patent 4,4~5,300, issued November 27, 19~4 to Peiree. The invention therein is direeted toward a large transaetion eard systeln with multiple issuers of eards and a central data communication center. ~rior to the invention disclosed therein, each transaction was routed hy the eontrol eenter to the respective issuers for approval. ~n order to reduee the need for the latter step, an approaeh was provided wherein various parameters were supplied to the eontrol eenter.
These parameters would define the type of transaction whieh could be approved directly by the control center, rather than transmitting the authorization request to the issuer.
i66 ~ -4- ~-These parameters are based on the general type of cardholder accounts of the issuer. For example, if the issuing institution has a small group of highly credit worthy customers, it can afford to set the transaction parameters relatively high. ~In this case, only higher dollar amount transactions need be referred back to the issuer for approval. In contrast, where an issuer has a large number of customers that represent high risk, the parameters would be set relatively low, to minimize the potential for credit and fraud losses. In the latter case, communications costs would be higher, however, these would presumably be offset by a reduction in losses. As can be seen, the ~ssuer is able to make the decision based on its own needs.
The above described system has proved very successful in enablin~ an issuer to balance its communication costs with its credit and fraud losses.
However, the latter approach still requires communciation of the transaction parameters, from the merchant, to the central control station where the decision-ma]~ing process is carried out. In addi~ion, the ~arameters supplied to the data control center are based on a general evaluation of the cardholders of the issuer. Stated differently, these parameters are not keyed to the credit worthiness of each individual cardholder, but only represent an overall evaluation.
Based on the above, it would be desirable to provide a system where various transactions can be approved at the site of the transaction without incurring any communication costs. The decision should be under the control of the issuer and preferably based upon the credit worthiness of each individual cardholder.
Accordingly, it is an object of the subject ,, invention to provide a new and improved system wherein ~ -5-the issuer can re~ulate the type of a~thorization requests, transmitted from the Point of transaction.
It is another object of the subject invention to provide a new and improved system wherein an approval S of a transaction can be generated off-line, at a remote terminal, based on criteria supplied by the issuer of the transaction card.
It is a further object of the subject invention to provide a new and improved system ~herein issuers of cards can encode information on a transaction card to permit the evaluation of each transaction at a remote terminal.
It is another object of the subject i~vention to provide an approval system where communic~tion costs are substantially reduced.
Summarv of the Invention In accordance witn these and many other objects, the subject invention provides for a transaction system where the issuer of a transaction card can regulate the type of authorization requests which are transmitted from the point o~ transaction. In this system, a file means is ~enerated containing cardholder information.
This file is maintained at a point remote from the point of transaction, such as at the issuer location.
A subset of this information can also be located at a data control center, in the manner described in the above-cited U.S. Patent 4,485,300.
I~ accordance with the subject invention, each transaction card is provided with Aata identi~ying the cardholder as well as data representative of risk assessment information associated with that specific cardholder. The risk assessment information is intended to provide an evaluation of the potential credit worthiness or in more qeneral terms, the ~r~ potential liability associated with that cardholder.
~2~
6- ~
For e~ample, if the cardholder has a history of losing his cards, a greater risk would be associated with that account. Similarl~, a history of exceeding credit limits would be considered in computing the risk assessmen~ information. In contrast, if the cardholder has a high credit limit and no history of past difficulties, the risk assessment information would be designed to reflect that status.
This risk assessment information can be encoded onto the magnetic stripe of the transaction card. The information can be cryptographically encoded so that it cannot be read by unauthorized users. As can be appreciated, transaction cards are beiny d~veloped which do not utilize a magnetic stripe to store cardholder information. For example, various "smart cards" have been developed where the information is held in a computer memory in a card. The subject invention is intended to cover these types of transaction cards and any others where the risk '~ assessment information, which is supplied by the issuer, is placed on the card in a manner to be readable by the transaction terminal.
The subject invention further includes a terminal which is located at the point of transaction and, as ; stated above, includes a means for reading the data carried on the transaction card. The terminal includes a processor means for evaluating the transaction based on the risk assessment information carried on the card.
If the particular transaction falls within the 3~ parameters set by the issuer, the terminal itself can issue an a~proval. If, however, the transaction falls without the bounds set by the issuer, the authorization request will then be sent on to the communication ~etwork for approval at a site remote Erom the transaction. As discussed above, this approval may 6~
-7- 26~69-20 take place at a control center or at the issuer of the trans-action card.
In the preferred embodiment of the subject invention, each transaction terminal will be provided with a transaction dollar limit. In this embodiment, the risk assessment information carried on the card will take the form of a multiplier to be used in evaluating the transac-tion. Specifically, the multiplier on the card will be used to modify the dollar limit in the terminal, to arrive at an amount, above which the transaction would be trans-mitted for approval.
In summary, the present invention provides a systemwherein an issuer of transaction cards can influence the type of transaction that can be approved at the point of transaction, said system comprising: primary processor means including a file means containing cardholder information, supplied by the issuer, for evaluating a transaction; a transaction card carrying data iden-tifying the cardholder, said card further including nonmonetary data supplied by the issuer and representative of risk assessment information associated with the cardholder; and remote terminal means located at the point of transaction and connected to said primary processor means, said terminal means having monetary data stored therein, said terminal means having a means for read-ing the data carried on said card and a means for entering the amount of the transaction, said terminal means further includ-ing a remote processor means for deriving a transaction dollar limit based on the risk assessment information carried on said ~25Z5~6 -7a- 26~69-20 card and the monetary data stored in the terminal means, with said remote processor means cornparing the transaction amount and the derived transaction dollar limit to determine if -the transaction can be approved locally at the terminal or should be forwarded to the primary processor for further evaluation.
Further objects and advantages of the subject invention will become apparent from the following detailed description taken in conjunction with the drawings in which:
Brief Description of the Drawings Figure 1 is a block diagram illustrating the new and improved transaction system of the subject invention.
Figure 2 is a block diagram illustrating the arrange-ment typically encountered in a large transaction card system.
Detailed Descrlption of the Preferred Embodiments Turning now to Figure 1, there is illustrated, in block form, the basic elements of the transaction system 10 of the subject invention. In this system, an organization, denoted as the "issuer" 20, distributes transaction cards 30 to a number of customers. The issuer 20 may be a bank or other financial insti-tution. Often, the issuer will collect information from the card-holder to make an evaluation and assign a credit limit to the cardholder. This credit limit, along with associated cardholder identification information is ~ -8- ~
stored in a rnetnory 22 located at the issuer. This information can be used to determine whether a particular transaction should be approved.
There are a number of different types of transaction cards now in use, but by far the most prevalent in the United States is a plastic card having raised emhossments thereon. In addition, the card is provided with a magnetic stripe which can be encoded with various account information. The parameters for these cards have been standardized. For exam~le, the dimensions of the card are specified in ISO Document ISO/TC97/SC17/WG4-N95. The format for an encoded magnetic stripe is also standardized and c~n be found in ISO Standards 3554 and 4909.
The ty~e of card and the method of assigning data thereto is not critical to the suhject invention. For example, it is possible to utilize the newer type of smart cards wherein information related to the cardholder is stored in an internal memory, rather than on an magnetic stripe. In the suhject invention, it is only necessary that transaction cards be capable of carrying data representative of the risk assessment associated with the cardholder.
In the basic embodiment of the subject invention, the issuer is connected via communication lines 24 to a plurality of transaction terminals 40. The terminals 40 are located at the point of the transaction. These transaction terminals are typically located at merchant locations where sales or services are being sought.
However, they may also be available in banks or airports, where cash or traveller's checks are being dispensed.
The transaction terminal 40 of the subject invention has many elements si~ilar to the automatic transaction terninals presently available. I`~ore specifically, the present ooint-of-transaction ii2~
_g ~-terminals have a means for reading the information encoded on the cards. Typically, the means includes a transducer for reading the information encoded on ~he .-nagnetic stripe. Alternatively, the terminal could have contacts for interfacing with the mechanical contacts oE a smart card. The terminal will also have a p~ocessor ~or controlling operation such as basic formating steps, dialing and transmission of the information to the issuer. Typically, the terminal will also have a key pad input for receiving additional information relating to the transaction, such as the transaction amount.
In accordance with the subject invention, the processor in the terminal will be programmed to provide a comparison function for evaluating the transaction based upon risk assessment information placed on the card. A preferred embodiment of this comparison function will be discussed below. A terminal having suitable electronics to perform all of the functions disclosed herein is manu~actured by INTERMATIONAL
VERIFACT, INC., Terminus llodel. The latter terminal, ~` which operates with an Intel 80C31 microprocessor, is designed to perform many transaction functions. This terminal could be readily modified to perform the functions disclosed herein by adding software instructions. The terminal may also be adjusted to read information encoded on a different track of the magnetic stripe where the risk assessment information can be placed. Additional hardware can be supplied to ~ermit the detection of various secure card properties such as Watermark Magnetics, if other security features are desired.
In operation of the prior art system outlined above, a cardholder would present his card 3~ to a merchAnt. The merchant ~ould run the card through the terminal enabling the terminal to read the information 6~
r -10-on the card. The merchant would then enter the transaction amount and this information would then be transmitted along communications line 24 to the issuer.
The issuer would com~are the information sent by the terminal with the cardholder~information stored in memory 22. If the evaluation was favorable, an approval code would be sent back to the merchant, who would complete the transaction. If the evaluation was unfavorable, the transaction would be declined. As can be appreciated, this approach was time-consuming and required significant communication costs.
In the prior art, some of the communication costs were reduced by providing a nlinimum or flo~r limit in the terminals. More specifically, the terminal could be programmed in a simple manner to automatically approve any transaction which fell below a certain dollar limit. This approach was geared to an evaluation of the merchant. Soecifically, if the merchant was reputable, the type of transactions which would be automatically aporoved could be set at a relatively hi~h level.
Unfortunately, this approach would not allow for any control based on an evaluation of the cardholder.
Furthermore, and as discussed below, in larger systems, the dollar amount is controlled by a "merchant member,"
rather than the issuer. Accordingly, it would be desirable to allo~ the issuer of the card to control the costs of communication and to control its risk of loss.
To satisfy these objectivess, each transaction card is ~rovided with data representative of ris~
assessment information 32. This risk assessment data may be encoded on a magnetic stripe on the card. As noted above, this information can also he stored in a `-i card mernory or provided in any other suitable Eashion.
The risk assessment data 32 is designed to define the potential liability of the cardholder. Thus, a customer having a good credit rating would be afforded a fairly high assessment value. In contrast, a card holder having a poor credit history would be supplied with a lower assessment value. Each issuer could make its decision based on the histories o~ its own individual cardholders.
In accordance with the subject invention, the processor in the terminal would have the capability of reading the risk assessment information on the card and comparing this information to the transaction amount.
This information is compared to determine ~f an approval can be granted ~ithout communicating with the issuer. If the evaluation is favorable, the terminal will generate an approval "off-line." If the evaluation falls beyond the li~its recorded on the card, an authorization request would be sent along communications lines ~4 to the issuer 20.
In the preferred embodiment, the terminal is provic~ed with a transaction dollar limit 42. This value will ~e stored in the memory of the processor of the terminal. The amount of tne transaction dollar limit will be, in part, a function of the potential liabi]ity of the merchant or the particular location where the terminal is ~laced. In this case, the risk assessment data on the card will be defined by a multiplier which is used to increase (or reduce) the transaction dollar limit stored in the terminal.
For example, the issuer may assign a risk assessment value of "2" to the cardholder. The terminal ~0, after reading the card, will multiply this value times the transaction dollar limit stored in the terminal. Thus, if the transaction dollar limit is 50 dollars, the result of the multiplication ~Jould be 100 dollars. If the amount of the transaction in progress .~2~2~6~
~ 12- ~
was less than 100 dollars, an automatic approval would be generated~ If the transaction amount exceeded 100 dollars, the authorization request would be routed to the issuer. The value of the ~ultiplier can be selected to be less than one, thereby reducing the value stored in the terminal. The value of the multiplier could also be set to zero so that all transactions, ~or that cardholder, are sent to the issuer for authorization.
As can be appreciated, the subject s~stem allows the issuer to have control over which requests are transmitted. In a system where the issuer is char~ed for such communication requests, costs can~be balanced against the possibility of credit and fraud losses.
To further enhance security, it is desirable to assiqn a secret code or personal identification number (PIM) to each card. During a transaction, the cardholder would be reauired to enter his PIN, in order to secure an approval to the transaction. Such secret ~0 code systems are well-kno~n in the prior art.
Typically, the issuer will store a list of the secret nu~.bers in memorv 32 for use when the PIN is to be verified.
As can be apPreciated, since the subject invention provides for remote, off-line authorization, a PIN
a~proach must be selected which ~ermits authorization of the PIN in the terminal. This re~uirement can be satisfied by placina a portion of the personal identification number (partial PIN) on the card. This partial PIN can then be compared with the full PIN
entered at the terminal. Of course, if the authorization request is sent back to the issuer, the full PIN, entered hy the user, can be checked with the full PIN stored at the issuer. The details of implementing one type of ~artial PIN validation system can be found in the Interhank Card Association PIN
Manual at Page 56. If the PINs are to be enscripted, an off-line cryptographic key management system would be necessary. In the preferred embodiment of the subject invention, risk assessment information and a partial PIN are both encoded onto the card.
Turning now to Figure 2, there is illustrated a full scale transaction card system. While the subject system will find use in the simplified schematic shown in Figure 1, its savings will be most significant in a larger system where communication costs are greatly increased. For example, the full scale system shown in Figure 2 is implemented nationwide and, at the present time, is expanding rapidly into overseas markets.
As illustrated in Figure 2, a large scale system will include a number of issuers 120A, B and C. Each issuer will dis-tribute cards to its own cardholders. Thus, in this example, each issuer will maintain files 122A, B and C, respectively, for storing cardholder information. The cards of each of the issuers will include data identifying the cardholder, the issuing institution, and the risk assessment data.
In the system shown in Figure 2, there will generally be a number of "merchant members." For clarity, only one merchant member 50 is shown. Typically, a merchant member 50 will be another financial institution which is respons~ble for signing up various merchants. Many issuers play the dual role of a merchant member. The illustration is shown to indicate that an issuer and the majority of its cardholders can be located in New York, while the merchant memher and its associated merchants are located in California.
:r ~
Each merchant member 50 would sign up or recruit a number of merchants 60A, B and C. Each rnerchant 60 would be ~rovided with one or more terminals of the type ~iscussed above with reference to Figure 1. When the merchant 60 is signed up; the merchant member 50 would determine the potential for fraudulent transactions. ~ased on this evaluation, the terminal supplied to the merchant would be provided with a transaction dollar limit designed to strike a compromise between communication costs and the potential for loss. Such a transaction dollar limit can be periodically updated depending upon the performance of the merchant ~0. ~
In the illustrated embodiment, a data control center 70 is shown. The data control center acts as a network switch for routing transaction information. In a typical prior transaction, the cardholder data and transaction amount would be entered by the merchant at the merchant location. This information would i~e ~n routed to the merchant member 50O If the merchant member and the issuer of the card were identical, the transaction could be approved at that location.
-~owever, the issuer and the merchant are typically not the same and the transaction information is then ~5 supplied to tne data control center 70. In this situation, the data control center will determine the identit~ of the issuer of the card. The transaction information is then supplied to the proper issuer 120 for comParison with its own cardhol~er information 122.
As discussed above, the issuer will ma~e a determination whether to approve the transaction and return the response to the merchant.
As can be appreciated, the above approach can result in extremely high com~unication costs. One ~-~ method for reducing this cost is disclosed in Patent ~o. 4,~85,300. In this patent, each issuer supplies ~2~
- ~ -15-the data control center 70 with issuer parameters 72.
These parameters are based on the general cardholder performance for that issuer. Thus, if the issuer has relatively credit worthy customers, the parameters can be set at high level, enabling the data control center to issue a number of automatic approvals. ~hile this approach is successful in reducing costs, it will be apparent that the subject invention has additional advantages. Specifically, many transactions will be approved right at the merchant location, without ever having to be communicate with the data control center.
Further!nore, the risk assessment information can be tailored directly to the individual cardho~ders.
The operation oE the subject invention as shown in ~igure 2 is essentially the same as ~hat in ~igure 1.
r5ore specificallv, when a customer presents nis card to the merchant, the data carried thereon is read hv a terminal. The merchant will also enter the transaction amount. In the preferred embodiment, the processor will function to multiply the risk assessment value on the card times the transaction dollar amount stored in the terminal. The transaction amount will then be comPared to determine if the transaction can be approved without transmission beyond the terminal. If the transaction is approved, the terninal will issue the approval directly. If the transaction is not approved, it will be sent throu~h the system ~or subsequent evaluation.
In the preferred embodiment, the ter~inal can be programmed to add additional security features. For examPle, a random selector in the processor can be used to automatically designate certain transactions for transmission, no matter what was the result of the evaluation. In this manner, a fraudulent user who carefully selects transactions that fall below an estimated level would be periodically checked 5Çi~
~ -16-Another feature would be to include a geographical evaluation. More specifically, if the terminal determines that the issuer is located in a geographically close region, it can automatically route a higher percentage of those~transactions thereto since communication costs are low. If, however, the terminal determines that the issuer is at a remote location, a different dollar amount can be utilized to reduce long distance communication.
In summary, there has been provided a new and improved approach for a transaction system. In this approach, the issuer of transaction cards can control communication costs based on its own asses~ment of its cardholders. In this svstem, each transaction card is provided with risk assessment information supplied by the issuer. ~he terrninal is provided with a means for evaluating this infor~ation in com~arison with the present transaction. If the evaluation is favorable, tne transac~ion can ~e ap?roved at the terminal. If the transaction is .not favorable, the terminal will forward the transaction information to the issuer for approval.
While the subject invention has been lefined ~ith reference to preferred embodiments, it should be understood that various other changes and modifications could be made therein, by one skilled in the art, without varying from the scope and spirit of the subject invention as defined hy the appended claims.
~ = _ _ . .. _ . .. _ .. . _ . . .. , .. _ , . _ .
Technical Field The subject invention relates to a transaction system wherein the issuer of a transaction card can regulate the costs of transmission of authorizaton requests. Specifically, the system permits an issuer to specify, for each cardholder, the type of transactions that may be authorized at a remote location. By this arrangement, the number of authorization requests which must be transmitted to a remote approval site is reduced, thereby r~ducing communications costs.
Back4round of the Invention ., _ In recent years, the use of transaction cards has substantially increased. In many cases, transaction cards are used as a substitute for cash when purchasing goods or services. These transaction cards may be in the form of credit cards where a record of the transaction is kept and later billed to the card holder. In some more recent systems~ the card holder will fund an account which is debited for the amount of the transaction directly. These latter type of accounts are known as "debit cards". The banking industry has also begun utilizing transaction cards enablin~ common banking functions to be performed without a teller, using an automatic terminal.
As the use of these transaction cards has increasedt so have losses related to fraud. Cards which have been lost or stolen are frequently used to - purchase goods or services without the approval of the rightful owner. In addition, many counterfeit cards have been produced for unauthorized purchases. The industry has responded with a number of approaches ~¢
;6 ~ -2-designed to reduce the losses associated with such fraudulent transactions.
One of the initial approaches in the transaction card industry was to periodically print and distribute lists of lost or stolen cards. ~hen a card is presented ~or a transaction, the card number is checked against this list prior to approval of the transaction.
Unfortunately, this approach is time-consuming and prone to error. More importantly, because the information is distributed periodically, this system will not detect the fraudulent use of a card, prior to the time it has been reported lost, stolen or counterfeited and thereafter listed in the~bulletin.
Recently, there have been developed various automatic "on-line" verification systems. In these systems, information about the cardholder and the transaction is transmitted via a communciation link to a central control center for approval or further routing. In some cases~ the central control center will be supplied with information about the cardholder and can make an ap~roval decision. In some s.naller transaction syste~s, the central station will be equivalent to the issuer of the card. In larger systems, where there are many card issuers, the ~5 transaction information may have to be routed from the central station to one of the outl~in~ issuers ~or final approval.
~ hen the first automatic systems were developed, the transaction information was typically entered into 3n the approval network by the merchant, by telephoning a local receiver who would enter the data in a terminal.
More recently, numerous electronic terminals have been designed that automate the process. These terminals, which are placed at the merchant locations, are designed to receive the transaction information directly.
~ 3 The terminals are provided with a means for reading the transaction card. For example, many transaetion eards are provided with a magnetie stripe that is encoded with in~ormation, sueh as the aceount number of the eardholder and the institution whieh issued the eard. These terminals will have a magnetie transducer for reading this inEormation. The terminal will transmit the data on the magnetic stripe, along with other particulars of the transaction, sueh as the transaetion amount, into the authorization system. The approval steps will then be taken, as outlined above.
As ean be appreeiated, where the issuer of the transaetion card is remote from the point Q~f transactlon, siqnificant communication costs can be ineurred for each approvalO In addition, the approvals are time-consuming and slow down the sales ~rocess.
While the eleetronie approval proeess is suitable from the standpoint of redueing fraud, it would be desirable to balanee the ris~ of .raud with the eost of approving every transaetion.
One approach for redueing the eosts of eommunieation in an approval network is diselosed in ~.~. Patent 4,4~5,300, issued November 27, 19~4 to Peiree. The invention therein is direeted toward a large transaetion eard systeln with multiple issuers of eards and a central data communication center. ~rior to the invention disclosed therein, each transaction was routed hy the eontrol eenter to the respective issuers for approval. ~n order to reduee the need for the latter step, an approaeh was provided wherein various parameters were supplied to the eontrol eenter.
These parameters would define the type of transaction whieh could be approved directly by the control center, rather than transmitting the authorization request to the issuer.
i66 ~ -4- ~-These parameters are based on the general type of cardholder accounts of the issuer. For example, if the issuing institution has a small group of highly credit worthy customers, it can afford to set the transaction parameters relatively high. ~In this case, only higher dollar amount transactions need be referred back to the issuer for approval. In contrast, where an issuer has a large number of customers that represent high risk, the parameters would be set relatively low, to minimize the potential for credit and fraud losses. In the latter case, communications costs would be higher, however, these would presumably be offset by a reduction in losses. As can be seen, the ~ssuer is able to make the decision based on its own needs.
The above described system has proved very successful in enablin~ an issuer to balance its communication costs with its credit and fraud losses.
However, the latter approach still requires communciation of the transaction parameters, from the merchant, to the central control station where the decision-ma]~ing process is carried out. In addi~ion, the ~arameters supplied to the data control center are based on a general evaluation of the cardholders of the issuer. Stated differently, these parameters are not keyed to the credit worthiness of each individual cardholder, but only represent an overall evaluation.
Based on the above, it would be desirable to provide a system where various transactions can be approved at the site of the transaction without incurring any communication costs. The decision should be under the control of the issuer and preferably based upon the credit worthiness of each individual cardholder.
Accordingly, it is an object of the subject ,, invention to provide a new and improved system wherein ~ -5-the issuer can re~ulate the type of a~thorization requests, transmitted from the Point of transaction.
It is another object of the subject invention to provide a new and improved system wherein an approval S of a transaction can be generated off-line, at a remote terminal, based on criteria supplied by the issuer of the transaction card.
It is a further object of the subject invention to provide a new and improved system ~herein issuers of cards can encode information on a transaction card to permit the evaluation of each transaction at a remote terminal.
It is another object of the subject i~vention to provide an approval system where communic~tion costs are substantially reduced.
Summarv of the Invention In accordance witn these and many other objects, the subject invention provides for a transaction system where the issuer of a transaction card can regulate the type of authorization requests which are transmitted from the point o~ transaction. In this system, a file means is ~enerated containing cardholder information.
This file is maintained at a point remote from the point of transaction, such as at the issuer location.
A subset of this information can also be located at a data control center, in the manner described in the above-cited U.S. Patent 4,485,300.
I~ accordance with the subject invention, each transaction card is provided with Aata identi~ying the cardholder as well as data representative of risk assessment information associated with that specific cardholder. The risk assessment information is intended to provide an evaluation of the potential credit worthiness or in more qeneral terms, the ~r~ potential liability associated with that cardholder.
~2~
6- ~
For e~ample, if the cardholder has a history of losing his cards, a greater risk would be associated with that account. Similarl~, a history of exceeding credit limits would be considered in computing the risk assessmen~ information. In contrast, if the cardholder has a high credit limit and no history of past difficulties, the risk assessment information would be designed to reflect that status.
This risk assessment information can be encoded onto the magnetic stripe of the transaction card. The information can be cryptographically encoded so that it cannot be read by unauthorized users. As can be appreciated, transaction cards are beiny d~veloped which do not utilize a magnetic stripe to store cardholder information. For example, various "smart cards" have been developed where the information is held in a computer memory in a card. The subject invention is intended to cover these types of transaction cards and any others where the risk '~ assessment information, which is supplied by the issuer, is placed on the card in a manner to be readable by the transaction terminal.
The subject invention further includes a terminal which is located at the point of transaction and, as ; stated above, includes a means for reading the data carried on the transaction card. The terminal includes a processor means for evaluating the transaction based on the risk assessment information carried on the card.
If the particular transaction falls within the 3~ parameters set by the issuer, the terminal itself can issue an a~proval. If, however, the transaction falls without the bounds set by the issuer, the authorization request will then be sent on to the communication ~etwork for approval at a site remote Erom the transaction. As discussed above, this approval may 6~
-7- 26~69-20 take place at a control center or at the issuer of the trans-action card.
In the preferred embodiment of the subject invention, each transaction terminal will be provided with a transaction dollar limit. In this embodiment, the risk assessment information carried on the card will take the form of a multiplier to be used in evaluating the transac-tion. Specifically, the multiplier on the card will be used to modify the dollar limit in the terminal, to arrive at an amount, above which the transaction would be trans-mitted for approval.
In summary, the present invention provides a systemwherein an issuer of transaction cards can influence the type of transaction that can be approved at the point of transaction, said system comprising: primary processor means including a file means containing cardholder information, supplied by the issuer, for evaluating a transaction; a transaction card carrying data iden-tifying the cardholder, said card further including nonmonetary data supplied by the issuer and representative of risk assessment information associated with the cardholder; and remote terminal means located at the point of transaction and connected to said primary processor means, said terminal means having monetary data stored therein, said terminal means having a means for read-ing the data carried on said card and a means for entering the amount of the transaction, said terminal means further includ-ing a remote processor means for deriving a transaction dollar limit based on the risk assessment information carried on said ~25Z5~6 -7a- 26~69-20 card and the monetary data stored in the terminal means, with said remote processor means cornparing the transaction amount and the derived transaction dollar limit to determine if -the transaction can be approved locally at the terminal or should be forwarded to the primary processor for further evaluation.
Further objects and advantages of the subject invention will become apparent from the following detailed description taken in conjunction with the drawings in which:
Brief Description of the Drawings Figure 1 is a block diagram illustrating the new and improved transaction system of the subject invention.
Figure 2 is a block diagram illustrating the arrange-ment typically encountered in a large transaction card system.
Detailed Descrlption of the Preferred Embodiments Turning now to Figure 1, there is illustrated, in block form, the basic elements of the transaction system 10 of the subject invention. In this system, an organization, denoted as the "issuer" 20, distributes transaction cards 30 to a number of customers. The issuer 20 may be a bank or other financial insti-tution. Often, the issuer will collect information from the card-holder to make an evaluation and assign a credit limit to the cardholder. This credit limit, along with associated cardholder identification information is ~ -8- ~
stored in a rnetnory 22 located at the issuer. This information can be used to determine whether a particular transaction should be approved.
There are a number of different types of transaction cards now in use, but by far the most prevalent in the United States is a plastic card having raised emhossments thereon. In addition, the card is provided with a magnetic stripe which can be encoded with various account information. The parameters for these cards have been standardized. For exam~le, the dimensions of the card are specified in ISO Document ISO/TC97/SC17/WG4-N95. The format for an encoded magnetic stripe is also standardized and c~n be found in ISO Standards 3554 and 4909.
The ty~e of card and the method of assigning data thereto is not critical to the suhject invention. For example, it is possible to utilize the newer type of smart cards wherein information related to the cardholder is stored in an internal memory, rather than on an magnetic stripe. In the suhject invention, it is only necessary that transaction cards be capable of carrying data representative of the risk assessment associated with the cardholder.
In the basic embodiment of the subject invention, the issuer is connected via communication lines 24 to a plurality of transaction terminals 40. The terminals 40 are located at the point of the transaction. These transaction terminals are typically located at merchant locations where sales or services are being sought.
However, they may also be available in banks or airports, where cash or traveller's checks are being dispensed.
The transaction terminal 40 of the subject invention has many elements si~ilar to the automatic transaction terninals presently available. I`~ore specifically, the present ooint-of-transaction ii2~
_g ~-terminals have a means for reading the information encoded on the cards. Typically, the means includes a transducer for reading the information encoded on ~he .-nagnetic stripe. Alternatively, the terminal could have contacts for interfacing with the mechanical contacts oE a smart card. The terminal will also have a p~ocessor ~or controlling operation such as basic formating steps, dialing and transmission of the information to the issuer. Typically, the terminal will also have a key pad input for receiving additional information relating to the transaction, such as the transaction amount.
In accordance with the subject invention, the processor in the terminal will be programmed to provide a comparison function for evaluating the transaction based upon risk assessment information placed on the card. A preferred embodiment of this comparison function will be discussed below. A terminal having suitable electronics to perform all of the functions disclosed herein is manu~actured by INTERMATIONAL
VERIFACT, INC., Terminus llodel. The latter terminal, ~` which operates with an Intel 80C31 microprocessor, is designed to perform many transaction functions. This terminal could be readily modified to perform the functions disclosed herein by adding software instructions. The terminal may also be adjusted to read information encoded on a different track of the magnetic stripe where the risk assessment information can be placed. Additional hardware can be supplied to ~ermit the detection of various secure card properties such as Watermark Magnetics, if other security features are desired.
In operation of the prior art system outlined above, a cardholder would present his card 3~ to a merchAnt. The merchant ~ould run the card through the terminal enabling the terminal to read the information 6~
r -10-on the card. The merchant would then enter the transaction amount and this information would then be transmitted along communications line 24 to the issuer.
The issuer would com~are the information sent by the terminal with the cardholder~information stored in memory 22. If the evaluation was favorable, an approval code would be sent back to the merchant, who would complete the transaction. If the evaluation was unfavorable, the transaction would be declined. As can be appreciated, this approach was time-consuming and required significant communication costs.
In the prior art, some of the communication costs were reduced by providing a nlinimum or flo~r limit in the terminals. More specifically, the terminal could be programmed in a simple manner to automatically approve any transaction which fell below a certain dollar limit. This approach was geared to an evaluation of the merchant. Soecifically, if the merchant was reputable, the type of transactions which would be automatically aporoved could be set at a relatively hi~h level.
Unfortunately, this approach would not allow for any control based on an evaluation of the cardholder.
Furthermore, and as discussed below, in larger systems, the dollar amount is controlled by a "merchant member,"
rather than the issuer. Accordingly, it would be desirable to allo~ the issuer of the card to control the costs of communication and to control its risk of loss.
To satisfy these objectivess, each transaction card is ~rovided with data representative of ris~
assessment information 32. This risk assessment data may be encoded on a magnetic stripe on the card. As noted above, this information can also he stored in a `-i card mernory or provided in any other suitable Eashion.
The risk assessment data 32 is designed to define the potential liability of the cardholder. Thus, a customer having a good credit rating would be afforded a fairly high assessment value. In contrast, a card holder having a poor credit history would be supplied with a lower assessment value. Each issuer could make its decision based on the histories o~ its own individual cardholders.
In accordance with the subject invention, the processor in the terminal would have the capability of reading the risk assessment information on the card and comparing this information to the transaction amount.
This information is compared to determine ~f an approval can be granted ~ithout communicating with the issuer. If the evaluation is favorable, the terminal will generate an approval "off-line." If the evaluation falls beyond the li~its recorded on the card, an authorization request would be sent along communications lines ~4 to the issuer 20.
In the preferred embodiment, the terminal is provic~ed with a transaction dollar limit 42. This value will ~e stored in the memory of the processor of the terminal. The amount of tne transaction dollar limit will be, in part, a function of the potential liabi]ity of the merchant or the particular location where the terminal is ~laced. In this case, the risk assessment data on the card will be defined by a multiplier which is used to increase (or reduce) the transaction dollar limit stored in the terminal.
For example, the issuer may assign a risk assessment value of "2" to the cardholder. The terminal ~0, after reading the card, will multiply this value times the transaction dollar limit stored in the terminal. Thus, if the transaction dollar limit is 50 dollars, the result of the multiplication ~Jould be 100 dollars. If the amount of the transaction in progress .~2~2~6~
~ 12- ~
was less than 100 dollars, an automatic approval would be generated~ If the transaction amount exceeded 100 dollars, the authorization request would be routed to the issuer. The value of the ~ultiplier can be selected to be less than one, thereby reducing the value stored in the terminal. The value of the multiplier could also be set to zero so that all transactions, ~or that cardholder, are sent to the issuer for authorization.
As can be appreciated, the subject s~stem allows the issuer to have control over which requests are transmitted. In a system where the issuer is char~ed for such communication requests, costs can~be balanced against the possibility of credit and fraud losses.
To further enhance security, it is desirable to assiqn a secret code or personal identification number (PIM) to each card. During a transaction, the cardholder would be reauired to enter his PIN, in order to secure an approval to the transaction. Such secret ~0 code systems are well-kno~n in the prior art.
Typically, the issuer will store a list of the secret nu~.bers in memorv 32 for use when the PIN is to be verified.
As can be apPreciated, since the subject invention provides for remote, off-line authorization, a PIN
a~proach must be selected which ~ermits authorization of the PIN in the terminal. This re~uirement can be satisfied by placina a portion of the personal identification number (partial PIN) on the card. This partial PIN can then be compared with the full PIN
entered at the terminal. Of course, if the authorization request is sent back to the issuer, the full PIN, entered hy the user, can be checked with the full PIN stored at the issuer. The details of implementing one type of ~artial PIN validation system can be found in the Interhank Card Association PIN
Manual at Page 56. If the PINs are to be enscripted, an off-line cryptographic key management system would be necessary. In the preferred embodiment of the subject invention, risk assessment information and a partial PIN are both encoded onto the card.
Turning now to Figure 2, there is illustrated a full scale transaction card system. While the subject system will find use in the simplified schematic shown in Figure 1, its savings will be most significant in a larger system where communication costs are greatly increased. For example, the full scale system shown in Figure 2 is implemented nationwide and, at the present time, is expanding rapidly into overseas markets.
As illustrated in Figure 2, a large scale system will include a number of issuers 120A, B and C. Each issuer will dis-tribute cards to its own cardholders. Thus, in this example, each issuer will maintain files 122A, B and C, respectively, for storing cardholder information. The cards of each of the issuers will include data identifying the cardholder, the issuing institution, and the risk assessment data.
In the system shown in Figure 2, there will generally be a number of "merchant members." For clarity, only one merchant member 50 is shown. Typically, a merchant member 50 will be another financial institution which is respons~ble for signing up various merchants. Many issuers play the dual role of a merchant member. The illustration is shown to indicate that an issuer and the majority of its cardholders can be located in New York, while the merchant memher and its associated merchants are located in California.
:r ~
Each merchant member 50 would sign up or recruit a number of merchants 60A, B and C. Each rnerchant 60 would be ~rovided with one or more terminals of the type ~iscussed above with reference to Figure 1. When the merchant 60 is signed up; the merchant member 50 would determine the potential for fraudulent transactions. ~ased on this evaluation, the terminal supplied to the merchant would be provided with a transaction dollar limit designed to strike a compromise between communication costs and the potential for loss. Such a transaction dollar limit can be periodically updated depending upon the performance of the merchant ~0. ~
In the illustrated embodiment, a data control center 70 is shown. The data control center acts as a network switch for routing transaction information. In a typical prior transaction, the cardholder data and transaction amount would be entered by the merchant at the merchant location. This information would i~e ~n routed to the merchant member 50O If the merchant member and the issuer of the card were identical, the transaction could be approved at that location.
-~owever, the issuer and the merchant are typically not the same and the transaction information is then ~5 supplied to tne data control center 70. In this situation, the data control center will determine the identit~ of the issuer of the card. The transaction information is then supplied to the proper issuer 120 for comParison with its own cardhol~er information 122.
As discussed above, the issuer will ma~e a determination whether to approve the transaction and return the response to the merchant.
As can be appreciated, the above approach can result in extremely high com~unication costs. One ~-~ method for reducing this cost is disclosed in Patent ~o. 4,~85,300. In this patent, each issuer supplies ~2~
- ~ -15-the data control center 70 with issuer parameters 72.
These parameters are based on the general cardholder performance for that issuer. Thus, if the issuer has relatively credit worthy customers, the parameters can be set at high level, enabling the data control center to issue a number of automatic approvals. ~hile this approach is successful in reducing costs, it will be apparent that the subject invention has additional advantages. Specifically, many transactions will be approved right at the merchant location, without ever having to be communicate with the data control center.
Further!nore, the risk assessment information can be tailored directly to the individual cardho~ders.
The operation oE the subject invention as shown in ~igure 2 is essentially the same as ~hat in ~igure 1.
r5ore specificallv, when a customer presents nis card to the merchant, the data carried thereon is read hv a terminal. The merchant will also enter the transaction amount. In the preferred embodiment, the processor will function to multiply the risk assessment value on the card times the transaction dollar amount stored in the terminal. The transaction amount will then be comPared to determine if the transaction can be approved without transmission beyond the terminal. If the transaction is approved, the terninal will issue the approval directly. If the transaction is not approved, it will be sent throu~h the system ~or subsequent evaluation.
In the preferred embodiment, the ter~inal can be programmed to add additional security features. For examPle, a random selector in the processor can be used to automatically designate certain transactions for transmission, no matter what was the result of the evaluation. In this manner, a fraudulent user who carefully selects transactions that fall below an estimated level would be periodically checked 5Çi~
~ -16-Another feature would be to include a geographical evaluation. More specifically, if the terminal determines that the issuer is located in a geographically close region, it can automatically route a higher percentage of those~transactions thereto since communication costs are low. If, however, the terminal determines that the issuer is at a remote location, a different dollar amount can be utilized to reduce long distance communication.
In summary, there has been provided a new and improved approach for a transaction system. In this approach, the issuer of transaction cards can control communication costs based on its own asses~ment of its cardholders. In this svstem, each transaction card is provided with risk assessment information supplied by the issuer. ~he terrninal is provided with a means for evaluating this infor~ation in com~arison with the present transaction. If the evaluation is favorable, tne transac~ion can ~e ap?roved at the terminal. If the transaction is .not favorable, the terminal will forward the transaction information to the issuer for approval.
While the subject invention has been lefined ~ith reference to preferred embodiments, it should be understood that various other changes and modifications could be made therein, by one skilled in the art, without varying from the scope and spirit of the subject invention as defined hy the appended claims.
Claims (9)
PROPERTY OR PRIVILEGE IS CLAIMED ARE DEFINED AS FOLLOWS
1. A system wherein an issuer of transaction cards can influence the type of transactions that can be approved at the point of transaction, said system comprising: primary processor means including a file means containing cardholder information, supplied by the issuer, for evaluating a transaction; a trans-action card carrying data identifying the cardholder, said card further including nonmonetary data supplied by the issuer and representative of risk assessment information associated with the cardholder; and remote terminal means located at the point of transaction and connected to said primary processor means, said terminal means having monetary data stored therein, said terminal means having a means for reading the data carried on said card and a means for entering the amount of the transaction, said terminal means further including a remote processor means for deriving a transaction dollar limit based on the risk assessment information carried on said card and the monetary data stored in the terminal means, with said remote processor means comparing the transaction amount and the derived transaction dollar limit to determine if the transaction can be approved locally at the terminal or should be forwarded to the primary processor for further evaluation.
2. A system as recited in claim 1 wherein said transaction card includes a magnetic stripe.
3. A system as recited in claim 2 wherein the risk assess ment information is encoded onto said magnetic stripe.
4. A system as recited in claim 1 further including a data control center connected between said terminal means and said primary processor means.
5. A system as recited in claim 4 wherein said data control center includes a network processor means and evaluation para-meters supplied by the issuer, such that the data control center will only forward the transaction information to the first pro-cessor means if the transaction does not fall within the parameters maintained at the data control center.
6. A system as recited in claim 1 wherein said non-monetary data on the card is defined by numeric information and wherein said transaction dollar limit is derived by multiplying the numeric information with the monetary data in said terminal.
7. A system as recited in claim 1 wherein said monetary data stored in the terminal means is based on the location of said terminal means.
8. A method of operating a transaction system, said trans-action system including a primary processor for evaluating trans-actions, a plurality of transaction cards, each card carrying data identifying the cardholder and nonmonetary data based on a risk assessment of the cardholder, said system further including a terminal located at the point of the transaction and having data entry capabilities, said terminal having monetary data stored therein, said monetary data being unrelated to the risk assessment of individual cardholders, said method comprising the steps of:
entering the cardholder identification and nonmonetary data from the card into the terminal; entering the amount of the transaction into the terminal; deriving a transaction dollar limit based on the nonmonetary data from the card which corresponds to the risk assessment of the cardholder and the monetary data from the terminal which is unrelated to the risk assessment of the cardholder; and comparing the amount of the transaction and the derived trans-action dollar limit to determine if the transaction can be approved locally at the terminal or should be forwarded to the primary processor for further evaluation.
entering the cardholder identification and nonmonetary data from the card into the terminal; entering the amount of the transaction into the terminal; deriving a transaction dollar limit based on the nonmonetary data from the card which corresponds to the risk assessment of the cardholder and the monetary data from the terminal which is unrelated to the risk assessment of the cardholder; and comparing the amount of the transaction and the derived trans-action dollar limit to determine if the transaction can be approved locally at the terminal or should be forwarded to the primary processor for further evaluation.
9. A method as recited in claim 8 wherein said nonmonetary data on the card is defined by numeric information and wherein said transaction dollar limit is derived by multiplying the numeric information with the monetary data from the terminal.
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US730,309 | 1985-05-02 | ||
US06/730,309 US4734564A (en) | 1985-05-02 | 1985-05-02 | Transaction system with off-line risk assessment |
Publications (1)
Publication Number | Publication Date |
---|---|
CA1252566A true CA1252566A (en) | 1989-04-11 |
Family
ID=24934795
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CA000508109A Expired CA1252566A (en) | 1985-05-02 | 1986-05-01 | Transaction system with off-line risk assessment |
Country Status (6)
Country | Link |
---|---|
US (1) | US4734564A (en) |
EP (1) | EP0200343B2 (en) |
AT (1) | ATE69903T1 (en) |
AU (1) | AU589851B2 (en) |
CA (1) | CA1252566A (en) |
DE (1) | DE3682608D1 (en) |
Cited By (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6330546B1 (en) | 1992-09-08 | 2001-12-11 | Hnc Software, Inc. | Risk determination and management using predictive modeling and transaction profiles for individual transacting entities |
US7251624B1 (en) | 1992-09-08 | 2007-07-31 | Fair Isaac Corporation | Score based decisioning |
US7587348B2 (en) | 2006-03-24 | 2009-09-08 | Basepoint Analytics Llc | System and method of detecting mortgage related fraud |
US7668769B2 (en) | 2005-10-04 | 2010-02-23 | Basepoint Analytics, LLC | System and method of detecting fraud |
US7966256B2 (en) | 2006-09-22 | 2011-06-21 | Corelogic Information Solutions, Inc. | Methods and systems of predicting mortgage payment risk |
US8489499B2 (en) | 2010-01-13 | 2013-07-16 | Corelogic Solutions, Llc | System and method of detecting and assessing multiple types of risks related to mortgage lending |
Families Citing this family (150)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US4924434A (en) * | 1985-10-15 | 1990-05-08 | International Business Machines Corporation | Sharing word-processing functions among multiple processors |
US4822985A (en) * | 1987-01-06 | 1989-04-18 | Visa International Service Association | Transaction approval system |
US4795892A (en) * | 1987-12-09 | 1989-01-03 | Cic Systems, Inc. | Pre-paid commodity system |
FR2633411B1 (en) * | 1988-06-28 | 1991-09-27 | Schlumberger Ind Sa | PORTABLE INFORMATION MEDIA MANAGEMENT SYSTEM |
US4992939A (en) * | 1988-08-05 | 1991-02-12 | Tyler Brian G | Method of producing narrative analytical report |
GB2222714A (en) * | 1988-09-09 | 1990-03-14 | Avery Ltd W & T | Cashless payment system |
US5083272A (en) * | 1988-11-02 | 1992-01-21 | Britcanus Corporation | Interactive telephone lottery system with a verification code |
US5206488A (en) * | 1989-06-07 | 1993-04-27 | Mordechai Teicher | Credit card system including a central unit and a plurality of local units for conducting low-cost transactions |
US6003767A (en) | 1989-09-06 | 1999-12-21 | Fujitsu Limited | Cashless medium for an electronic cashless system |
US6926200B1 (en) | 1989-09-06 | 2005-08-09 | Fujitsu Limited | Electronic cashless system |
FR2651903B1 (en) * | 1989-09-12 | 1991-12-06 | Michaud Andre | METHOD FOR LIMITING THE RISKS ATTACHED TO A COMPUTER TRANSACTION. |
ES2076482T3 (en) | 1990-01-30 | 1995-11-01 | Visa Int Service Ass | INTERNATIONAL AUTHORIZATION SYSTEM. |
US5231569A (en) * | 1990-06-12 | 1993-07-27 | Sears Payment Systems, Inc. | Account transaction system |
US5177342A (en) * | 1990-11-09 | 1993-01-05 | Visa International Service Association | Transaction approval system |
US5285382A (en) * | 1991-02-25 | 1994-02-08 | Keyosk Corporation | System and method for processing credit and debit card validity and funds transactions from vending machines and similar terminals |
FR2673477B1 (en) * | 1991-03-01 | 1993-06-18 | Cedicam | METHOD AND INSTALLATION FOR CONTROLLING THE ACCESS OF A USER TO A COMPUTER SYSTEM AT AN ACCESS POINT AMONG SEVERAL POSSIBLE. |
WO1992017852A1 (en) * | 1991-03-29 | 1992-10-15 | First Data Resources Inc. | Interactive sequencing method for etc systems |
US10361802B1 (en) | 1999-02-01 | 2019-07-23 | Blanding Hovenweep, Llc | Adaptive pattern recognition based control system and method |
US5655089A (en) * | 1992-04-10 | 1997-08-05 | Bucci; Joseph J. | Method for the consolidation summarization and transmission of a plurality of mailable materials |
US5384449A (en) * | 1992-04-28 | 1995-01-24 | Visa International Service Association | Authorization matching system |
US5954583A (en) * | 1992-11-05 | 1999-09-21 | Com21 Limited | Secure access control system |
FR2716549B1 (en) * | 1994-02-18 | 1996-05-31 | Poste | Method for detecting fraud in payment by prepaid card. |
US5479510A (en) * | 1994-11-15 | 1995-12-26 | Olsen; Kurt B. | Automated data card payment verification method |
US5679938A (en) * | 1994-12-02 | 1997-10-21 | Telecheck International, Inc. | Methods and systems for interactive check authorizations |
US5732400A (en) * | 1995-01-04 | 1998-03-24 | Citibank N.A. | System and method for a risk-based purchase of goods |
US5790677A (en) | 1995-06-29 | 1998-08-04 | Microsoft Corporation | System and method for secure electronic commerce transactions |
EP0775990A3 (en) * | 1995-11-21 | 2000-08-23 | Hitachi, Ltd. | IC card automated transaction terminal and IC card used therein |
US5822410A (en) * | 1996-01-11 | 1998-10-13 | Gte Telecom Services Inc | Churn amelioration system and method therefor |
US6968319B1 (en) | 1996-10-18 | 2005-11-22 | Microsoft Corporation | Electronic bill presentment and payment system with bill dispute capabilities |
US6070150A (en) * | 1996-10-18 | 2000-05-30 | Microsoft Corporation | Electronic bill presentment and payment system |
US6018723A (en) | 1997-05-27 | 2000-01-25 | Visa International Service Association | Method and apparatus for pattern generation |
US6119103A (en) | 1997-05-27 | 2000-09-12 | Visa International Service Association | Financial risk prediction systems and methods therefor |
US7403922B1 (en) * | 1997-07-28 | 2008-07-22 | Cybersource Corporation | Method and apparatus for evaluating fraud risk in an electronic commerce transaction |
US6029154A (en) * | 1997-07-28 | 2000-02-22 | Internet Commerce Services Corporation | Method and system for detecting fraud in a credit card transaction over the internet |
US7096192B1 (en) | 1997-07-28 | 2006-08-22 | Cybersource Corporation | Method and system for detecting fraud in a credit card transaction over a computer network |
US6128603A (en) * | 1997-09-09 | 2000-10-03 | Dent; Warren T. | Consumer-based system and method for managing and paying electronic billing statements |
US5991750A (en) * | 1997-10-24 | 1999-11-23 | Ge Capital | System and method for pre-authorization of individual account transactions |
US6226624B1 (en) | 1997-10-24 | 2001-05-01 | Craig J. Watson | System and method for pre-authorization of individual account remote transactions |
US5943656A (en) * | 1997-12-03 | 1999-08-24 | Avista Advantage, Inc. | Methods and systems for computerized bill consolidating, billing and payment authorization, computerized utility bill consolidating, utility billing access and payment and utility provider consolidated billing systems |
US5930773A (en) * | 1997-12-17 | 1999-07-27 | Avista Advantage, Inc. | Computerized resource accounting methods and systems, computerized utility management methods and systems, multi-user utility management methods and systems, and energy-consumption-based tracking methods and systems |
US6014635A (en) * | 1997-12-08 | 2000-01-11 | Shc Direct, Inc. | System and method for providing a discount credit transaction network |
US6856974B1 (en) * | 1998-02-02 | 2005-02-15 | Checkfree Corporation | Electronic bill presentment technique with enhanced biller control |
US20050197957A1 (en) * | 1998-06-08 | 2005-09-08 | Microsoft Corporation | Parcel manager for distributed electronic billing system |
US20020065772A1 (en) * | 1998-06-08 | 2002-05-30 | Saliba Bassam A. | System, method and program for network user access |
US6304857B1 (en) | 1998-06-08 | 2001-10-16 | Microsoft Corporation | Distributed electronic billing system with gateway interfacing biller and service center |
SG120861A1 (en) * | 1998-09-11 | 2006-04-26 | Ebs Dealing Resources Inc | Communication of credit filtered prices in an electronic brokerage system |
US7236950B2 (en) | 1998-10-29 | 2007-06-26 | Universal Card Services Corp. | Method and system of combined billing of multiple accounts on a single statement |
US7047416B2 (en) * | 1998-11-09 | 2006-05-16 | First Data Corporation | Account-based digital signature (ABDS) system |
US6820202B1 (en) * | 1998-11-09 | 2004-11-16 | First Data Corporation | Account authority digital signature (AADS) system |
CA2291920A1 (en) * | 1998-12-11 | 2000-06-11 | Karuna Ganesan | Technique for conducting secure transactions over a network |
US6678664B1 (en) * | 1999-04-26 | 2004-01-13 | Checkfree Corporation | Cashless transactions without credit cards, debit cards or checks |
EP1049056A3 (en) | 1999-04-26 | 2001-06-13 | CheckFree Corporation | Electronic bill presentment and/or payment clearinghouse |
US7194437B1 (en) | 1999-05-14 | 2007-03-20 | Amazon.Com, Inc. | Computer-based funds transfer system |
US7685067B1 (en) | 1999-05-14 | 2010-03-23 | Amazon.Com, Inc. | Computer-assisted funds transfer system |
US7603311B1 (en) | 1999-11-29 | 2009-10-13 | Yadav-Ranjan Rani K | Process and device for conducting electronic transactions |
US7356498B2 (en) | 1999-12-30 | 2008-04-08 | Chicago Board Options Exchange, Incorporated | Automated trading exchange system having integrated quote risk monitoring and integrated quote modification services |
US9727916B1 (en) | 1999-12-30 | 2017-08-08 | Chicago Board Options Exchange, Incorporated | Automated trading exchange system having integrated quote risk monitoring and integrated quote modification services |
US7822683B2 (en) | 2000-01-21 | 2010-10-26 | Microsoft Corporation | System and method for secure third-party development and hosting within a financial services network |
US7588180B1 (en) * | 2000-01-28 | 2009-09-15 | International Apparel Group, Llc | Multi-application smart card with currency exchange, location tracking, and personal identification capabilities |
US6999943B1 (en) | 2000-03-10 | 2006-02-14 | Doublecredit.Com, Inc. | Routing methods and systems for increasing payment transaction volume and profitability |
US8775284B1 (en) * | 2000-04-07 | 2014-07-08 | Vectorsgi, Inc. | System and method for evaluating fraud suspects |
US7343339B2 (en) * | 2000-05-03 | 2008-03-11 | Shelton E. Harrison, Jr. | Electronic bond and guaranty process and business method |
US7587368B2 (en) | 2000-07-06 | 2009-09-08 | David Paul Felsher | Information record infrastructure, system and method |
US7082533B2 (en) * | 2000-08-04 | 2006-07-25 | First Data Corporation | Gauging risk in electronic communications regarding accounts in ABDS system |
US7552333B2 (en) * | 2000-08-04 | 2009-06-23 | First Data Corporation | Trusted authentication digital signature (tads) system |
US7010691B2 (en) * | 2000-08-04 | 2006-03-07 | First Data Corporation | ABDS system utilizing security information in authenticating entity access |
US7096354B2 (en) * | 2000-08-04 | 2006-08-22 | First Data Corporation | Central key authority database in an ABDS system |
US6978369B2 (en) * | 2000-08-04 | 2005-12-20 | First Data Corporation | Person-centric account-based digital signature system |
US6983368B2 (en) * | 2000-08-04 | 2006-01-03 | First Data Corporation | Linking public key of device to information during manufacture |
US6789189B2 (en) * | 2000-08-04 | 2004-09-07 | First Data Corporation | Managing account database in ABDS system |
US7558965B2 (en) * | 2000-08-04 | 2009-07-07 | First Data Corporation | Entity authentication in electronic communications by providing verification status of device |
CA2418050C (en) * | 2000-08-04 | 2014-05-20 | First Data Corporation | Linking public key of device to information during manufacture |
US6882986B1 (en) * | 2000-08-07 | 2005-04-19 | Tymetrix | Method for automatic processing of invoices |
US20050165681A1 (en) * | 2000-08-07 | 2005-07-28 | Tymetrix, Inc. | Method for automatic processing of invoices |
US6427912B1 (en) | 2000-08-16 | 2002-08-06 | Coin Acceptors, Inc. | Off-line credit card transaction system and method for vending machines |
US20020087468A1 (en) * | 2000-12-28 | 2002-07-04 | Ravi Ganesan | Electronic payment risk processing |
US7899722B1 (en) | 2001-03-20 | 2011-03-01 | Goldman Sachs & Co. | Correspondent bank registry |
US20020138417A1 (en) * | 2001-03-20 | 2002-09-26 | David Lawrence | Risk management clearinghouse |
US8209246B2 (en) | 2001-03-20 | 2012-06-26 | Goldman, Sachs & Co. | Proprietary risk management clearinghouse |
US8121937B2 (en) | 2001-03-20 | 2012-02-21 | Goldman Sachs & Co. | Gaming industry risk management clearinghouse |
US20110131136A1 (en) * | 2001-03-20 | 2011-06-02 | David Lawrence | Risk Management Customer Registry |
US20040006532A1 (en) * | 2001-03-20 | 2004-01-08 | David Lawrence | Network access risk management |
US7958027B2 (en) * | 2001-03-20 | 2011-06-07 | Goldman, Sachs & Co. | Systems and methods for managing risk associated with a geo-political area |
US20030233319A1 (en) * | 2001-03-20 | 2003-12-18 | David Lawrence | Electronic fund transfer participant risk management clearing |
US8285615B2 (en) | 2001-03-20 | 2012-10-09 | Goldman, Sachs & Co. | Construction industry risk management clearinghouse |
US20030225687A1 (en) * | 2001-03-20 | 2003-12-04 | David Lawrence | Travel related risk management clearinghouse |
US20040193532A1 (en) * | 2001-03-20 | 2004-09-30 | David Lawrence | Insider trading risk management |
US8140415B2 (en) | 2001-03-20 | 2012-03-20 | Goldman Sachs & Co. | Automated global risk management |
US7548883B2 (en) * | 2001-03-20 | 2009-06-16 | Goldman Sachs & Co | Construction industry risk management clearinghouse |
US7904361B2 (en) * | 2001-03-20 | 2011-03-08 | Goldman Sachs & Co. | Risk management customer registry |
US8069105B2 (en) * | 2001-03-20 | 2011-11-29 | Goldman Sachs & Co. | Hedge fund risk management |
US7181017B1 (en) | 2001-03-23 | 2007-02-20 | David Felsher | System and method for secure three-party communications |
US20020143562A1 (en) * | 2001-04-02 | 2002-10-03 | David Lawrence | Automated legal action risk management |
US7865427B2 (en) | 2001-05-30 | 2011-01-04 | Cybersource Corporation | Method and apparatus for evaluating fraud risk in an electronic commerce transaction |
US20040128508A1 (en) * | 2001-08-06 | 2004-07-01 | Wheeler Lynn Henry | Method and apparatus for access authentication entity |
US6975996B2 (en) * | 2001-10-09 | 2005-12-13 | Goldman, Sachs & Co. | Electronic subpoena service |
CA2475440A1 (en) * | 2001-11-28 | 2003-09-18 | Goldman, Sachs & Co. | Transaction surveillance |
US7577585B2 (en) * | 2001-12-07 | 2009-08-18 | American Express Travel Related Services Company, Inc. | Method and system for completing transactions involving partial shipments |
US6901387B2 (en) * | 2001-12-07 | 2005-05-31 | General Electric Capital Financial | Electronic purchasing method and apparatus for performing the same |
US20090177563A1 (en) * | 2001-12-07 | 2009-07-09 | American Express Travel Related Services Company, Inc. | Authorization refresh system and method |
US7805376B2 (en) * | 2002-06-14 | 2010-09-28 | American Express Travel Related Services Company, Inc. | Methods and apparatus for facilitating a transaction |
FR2834841B1 (en) * | 2002-01-17 | 2004-05-28 | France Telecom | CRYPTOGRAPHIC REVOCATION PROCESS USING A CHIP CARD |
US20030222138A1 (en) * | 2002-05-31 | 2003-12-04 | Carole Oppenlander | System and method for authorizing transactions |
US20070239614A1 (en) * | 2002-07-10 | 2007-10-11 | Union Beach, L.P. | System and method for the storage of data in association with financial accounts |
US7526448B2 (en) * | 2002-11-01 | 2009-04-28 | Checkfree Corporation | Matching consumers with billers having bills available for electronic presentment |
US20040139011A1 (en) * | 2002-11-01 | 2004-07-15 | Kozee Casey W. | Technique for identifying probable payees of a consumer |
US20040133513A1 (en) * | 2002-11-01 | 2004-07-08 | Mccoy Randal | Identity protection technique in matching consumers with electronic billers |
US20040133509A1 (en) * | 2002-11-01 | 2004-07-08 | Mccoy Randal A. | Technique for making payments for a non-subscriber payor |
US20040088235A1 (en) * | 2002-11-01 | 2004-05-06 | Ziekle William D. | Technique for customizing electronic commerce user |
US8073773B2 (en) * | 2002-11-01 | 2011-12-06 | Checkfree Corporation | Technique for identifying probable billers of a consumer |
US7395243B1 (en) | 2002-11-01 | 2008-07-01 | Checkfree Corporation | Technique for presenting matched billers to a consumer |
US20040133515A1 (en) * | 2002-11-01 | 2004-07-08 | Mccoy Randal A. | Distributed matching of consumers with billers having bills available for electronic presentment |
US7729996B2 (en) * | 2002-11-01 | 2010-06-01 | Checkfree Corporation | Reuse of an EBP account through alternate authentication |
US7702574B2 (en) * | 2002-11-14 | 2010-04-20 | Goldman Sachs & Co. | Independent research consensus earnings estimates and methods of determining such |
US9818136B1 (en) | 2003-02-05 | 2017-11-14 | Steven M. Hoffberg | System and method for determining contingent relevance |
WO2004091170A2 (en) * | 2003-03-31 | 2004-10-21 | Visa U.S.A. Inc. | Method and system for secure authentication |
US7413112B2 (en) * | 2004-03-16 | 2008-08-19 | American Express Travel Related Services Company, Inc. | Method and system for manual authorization |
US8082207B2 (en) * | 2004-06-17 | 2011-12-20 | Certegy Check Services, Inc. | Scored negative file system and method |
US8762191B2 (en) * | 2004-07-02 | 2014-06-24 | Goldman, Sachs & Co. | Systems, methods, apparatus, and schema for storing, managing and retrieving information |
US8442953B2 (en) | 2004-07-02 | 2013-05-14 | Goldman, Sachs & Co. | Method, system, apparatus, program code and means for determining a redundancy of information |
US8510300B2 (en) | 2004-07-02 | 2013-08-13 | Goldman, Sachs & Co. | Systems and methods for managing information associated with legal, compliance and regulatory risk |
US8996481B2 (en) * | 2004-07-02 | 2015-03-31 | Goldman, Sach & Co. | Method, system, apparatus, program code and means for identifying and extracting information |
US7685064B1 (en) | 2004-11-30 | 2010-03-23 | Jp Morgan Chase Bank | Method and apparatus for evaluating a financial transaction |
US20060195395A1 (en) * | 2005-02-28 | 2006-08-31 | Checkfree Corporation | Facilitating electronic payment on behalf of a customer of electronic presented bills |
US20060195396A1 (en) * | 2005-02-28 | 2006-08-31 | Checkfree Corporation | Centralized customer care for electronic payments and other transactions via a wide area communications network |
US20060195397A1 (en) * | 2005-02-28 | 2006-08-31 | Checkfree Corporation | Centralized electronic bill presentment |
US7445147B2 (en) | 2005-03-25 | 2008-11-04 | Wal-Mart Stores, Inc. | Stored value card validation |
US8291224B2 (en) | 2005-03-30 | 2012-10-16 | Wells Fargo Bank, N.A. | Distributed cryptographic management for computer systems |
US8104675B2 (en) * | 2005-04-04 | 2012-01-31 | American Express Travel Related Services Company, Inc. | Systems and methods for risk triggering values |
US7398918B1 (en) * | 2005-04-04 | 2008-07-15 | American Express Travel Related Services Company, Inc. | Systems and method for risk triggering values |
US7925578B1 (en) | 2005-08-26 | 2011-04-12 | Jpmorgan Chase Bank, N.A. | Systems and methods for performing scoring optimization |
US8874477B2 (en) | 2005-10-04 | 2014-10-28 | Steven Mark Hoffberg | Multifactorial optimization system and method |
US7225093B1 (en) * | 2005-11-21 | 2007-05-29 | Agilent Technologies, Inc. | System and method for generating triggers based on predetermined trigger waveform and a measurement signal |
US7949867B2 (en) * | 2006-07-19 | 2011-05-24 | Rel-Id Technologies, Inc. | Secure communications |
US20070100773A1 (en) * | 2006-08-11 | 2007-05-03 | Regions Asset Company | Transaction security system having user defined security parameters |
US8336770B2 (en) * | 2006-10-26 | 2012-12-25 | Mastercard International, Inc. | Method and apparatus for wireless authorization |
US7606766B2 (en) * | 2006-12-21 | 2009-10-20 | American Express Travel Related Services Company, Inc. | Computer system and computer-implemented method for selecting invoice settlement options |
US20080208748A1 (en) * | 2006-12-22 | 2008-08-28 | Frank Ozment | Transaction system and method |
US7866551B2 (en) * | 2007-02-15 | 2011-01-11 | Visa U.S.A. Inc. | Dynamic payment device characteristics |
US20100106585A1 (en) * | 2007-04-17 | 2010-04-29 | American Express Travel Related Services Company, Inc. | System and method for evaluating positive behavior and offering incentives based upon limited use identifier transactions |
US10008067B2 (en) * | 2008-06-16 | 2018-06-26 | Visa U.S.A. Inc. | System and method for authorizing financial transactions with online merchants |
US11348150B2 (en) | 2010-06-21 | 2022-05-31 | Paypal, Inc. | Systems and methods for facilitating card verification over a network |
US20110313898A1 (en) * | 2010-06-21 | 2011-12-22 | Ebay Inc. | Systems and methods for facitiating card verification over a network |
US20140025571A1 (en) * | 2012-07-23 | 2014-01-23 | Its, Inc. | System and method for dual message consumer authentication value-based eft transactions |
US9954848B1 (en) | 2014-04-04 | 2018-04-24 | Wells Fargo Bank, N.A. | Central cryptographic management for computer systems |
US10614452B2 (en) | 2014-09-16 | 2020-04-07 | Mastercard International Incorporated | Systems and methods for providing risk based decisioning service to a merchant |
US11012536B2 (en) | 2015-08-18 | 2021-05-18 | Eventbrite, Inc. | Event management system for facilitating user interactions at a venue |
US11784981B2 (en) | 2021-06-04 | 2023-10-10 | Bank Of America Corporation | Data processing transactions using machine to machine (M2M) data transfer |
US11792165B2 (en) | 2021-06-04 | 2023-10-17 | Bank Of America Corporation | Supporting data processing transactions using machine to machine (M2M) data transfer |
US11265370B1 (en) | 2021-07-27 | 2022-03-01 | Bank Of America Corporation | Machine to machine (M2M) data transfer between data servers |
Family Cites Families (12)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US3566081A (en) * | 1967-12-05 | 1971-02-23 | Telecredit | Monetary transaction regulation apparatus |
US3604900A (en) * | 1969-07-07 | 1971-09-14 | Sprague Electric Co | Electronic credit card |
US3949191A (en) * | 1972-05-18 | 1976-04-06 | Optical Data Systems, Inc. | Data storage and retrieval system |
US3941977A (en) * | 1972-09-01 | 1976-03-02 | The Mosler Safe Company | Off-line cash dispenser and banking system |
US3982103A (en) * | 1973-10-12 | 1976-09-21 | Telecredit, Inc. | Credit verification system |
JPS50108995A (en) * | 1974-02-01 | 1975-08-27 | ||
US4114027A (en) * | 1976-09-13 | 1978-09-12 | The Mosler Safe Company | On-line/off-line automated banking system |
US4091448A (en) * | 1976-10-29 | 1978-05-23 | Clausing Martin B | Off-line, one-level/on-line, two-level timeshared automated banking system |
JPS5931746B2 (en) * | 1977-04-28 | 1984-08-03 | オムロン株式会社 | Transaction processing method |
US4485300A (en) * | 1982-03-18 | 1984-11-27 | Visa U.S.A., Inc. | Loss control system |
JPS614257U (en) * | 1984-06-11 | 1986-01-11 | オムロン株式会社 | card reader |
JPS6143397A (en) * | 1984-08-08 | 1986-03-01 | 東芝テック株式会社 | Merchandize selling data processing system |
-
1985
- 1985-05-02 US US06/730,309 patent/US4734564A/en not_active Expired - Lifetime
-
1986
- 1986-03-21 EP EP86302120A patent/EP0200343B2/en not_active Expired - Lifetime
- 1986-03-21 AT AT86302120T patent/ATE69903T1/en not_active IP Right Cessation
- 1986-03-21 DE DE8686302120T patent/DE3682608D1/en not_active Expired - Lifetime
- 1986-04-23 AU AU56546/86A patent/AU589851B2/en not_active Expired
- 1986-05-01 CA CA000508109A patent/CA1252566A/en not_active Expired
Cited By (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6330546B1 (en) | 1992-09-08 | 2001-12-11 | Hnc Software, Inc. | Risk determination and management using predictive modeling and transaction profiles for individual transacting entities |
US7251624B1 (en) | 1992-09-08 | 2007-07-31 | Fair Isaac Corporation | Score based decisioning |
US7668769B2 (en) | 2005-10-04 | 2010-02-23 | Basepoint Analytics, LLC | System and method of detecting fraud |
US7587348B2 (en) | 2006-03-24 | 2009-09-08 | Basepoint Analytics Llc | System and method of detecting mortgage related fraud |
US8065234B2 (en) | 2006-03-24 | 2011-11-22 | Corelogic Information Solutions, Inc. | Methods and systems of predicting mortgage payment risk |
US8121920B2 (en) | 2006-03-24 | 2012-02-21 | Corelogic Information Solutions, Inc. | System and method of detecting mortgage related fraud |
US7966256B2 (en) | 2006-09-22 | 2011-06-21 | Corelogic Information Solutions, Inc. | Methods and systems of predicting mortgage payment risk |
US8489499B2 (en) | 2010-01-13 | 2013-07-16 | Corelogic Solutions, Llc | System and method of detecting and assessing multiple types of risks related to mortgage lending |
US8639618B2 (en) | 2010-01-13 | 2014-01-28 | Corelogic Solutions, Llc | System and method of detecting and assessing multiple types of risks related to mortgage lending |
Also Published As
Publication number | Publication date |
---|---|
ATE69903T1 (en) | 1991-12-15 |
EP0200343A2 (en) | 1986-11-05 |
EP0200343B2 (en) | 1996-12-18 |
EP0200343A3 (en) | 1988-06-08 |
EP0200343B1 (en) | 1991-11-27 |
AU5654686A (en) | 1986-11-06 |
AU589851B2 (en) | 1989-10-19 |
US4734564A (en) | 1988-03-29 |
DE3682608D1 (en) | 1992-01-09 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CA1252566A (en) | Transaction system with off-line risk assessment | |
US4812628A (en) | Transaction system with off-line risk assessment | |
US5384449A (en) | Authorization matching system | |
US4304990A (en) | Multilevel security apparatus and method | |
US7765162B2 (en) | Method and system for conducting off-line and on-line pre-authorized payment transactions | |
US7280984B2 (en) | Money card system, method and apparatus | |
US4485300A (en) | Loss control system | |
US6330978B1 (en) | Electronic purse card value system card security method | |
US6182894B1 (en) | Systems and methods for authorizing a transaction card | |
US8635687B2 (en) | Method and device for control by consumers over personal data | |
US8712892B2 (en) | Verification of a portable consumer device in an offline environment | |
US4752676A (en) | Reliable secure, updatable "cash" card system | |
KR0147360B1 (en) | Payment or information transfer system using an electronic memory card as wallet | |
US8939357B1 (en) | System and method for combining disparate commercial transactions under a single identification mechanism | |
US4328414A (en) | Multilevel security apparatus and method | |
US5352876A (en) | Method and apparatus for transaction settlement | |
US20030168510A1 (en) | Anonymous electronic bearer instrument method and apparatus | |
WO1995012169A1 (en) | A method and apparatus for disbributing currency | |
US20020029195A1 (en) | E-commerce payment system | |
US7472092B2 (en) | Money order device with identity verification and method | |
US20110320251A1 (en) | System And Method For Performing A Redemption Transaction On A Point Of Sale Terminal | |
KR102244358B1 (en) | Method for paying with IC card | |
US20100237146A1 (en) | Card authentication system and method | |
KR100551558B1 (en) | Method for using IC card over the mobile phone with card slot | |
JPH0448273B2 (en) |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
MKEX | Expiry |