US20120066132A1 - Scored negative file system and method - Google Patents

Scored negative file system and method Download PDF

Info

Publication number
US20120066132A1
US20120066132A1 US13/296,713 US201113296713A US2012066132A1 US 20120066132 A1 US20120066132 A1 US 20120066132A1 US 201113296713 A US201113296713 A US 201113296713A US 2012066132 A1 US2012066132 A1 US 2012066132A1
Authority
US
United States
Prior art keywords
risk
payments
financial account
risk score
application
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
US13/296,713
Inventor
Michael R. Bates
Gregory A. Nelson
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Card Monroe Corp
Efunds Corp
Original Assignee
Efunds Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Efunds Corp filed Critical Efunds Corp
Priority to US13/296,713 priority Critical patent/US20120066132A1/en
Publication of US20120066132A1 publication Critical patent/US20120066132A1/en
Assigned to CARD-MONROE CORP. reassignment CARD-MONROE CORP. ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: MATHEWS, RICKY E.
Abandoned legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • G06Q40/03Credit; Loans; Processing thereof

Definitions

  • the present invention relates to validating payments during transactions.
  • embodiments of the invention relate to validating check payments presented during transactions.
  • a traditional negative file consists of account holders (i.e., individuals or organizations with checking accounts) that currently have outstanding returned checks at a retailer that is a member of the shared check authorization network (“SCAN”). Whenever an account holders presents a check to a retailer, the retailer determines whether the account holder has any unpaid returned checks by cross-referencing the negative file. Many of the account holders listed in the negative file, however, unintentionally write checks with insufficient funds in their checking accounts. Account holders may have incomplete or inaccurate knowledge concerning the balance in their account or may have forgotten to transfer or deposit money to cover recent checks. Many of the account holders listed in the negative file may pay off their returned checks quickly, and frequently will have money in their account to cover future issued checks.
  • account holders i.e., individuals or organizations with checking accounts
  • SCAN shared check authorization network
  • Some embodiments of the invention provide a system for assigning a risk score to a financial account.
  • the system can include an account information application that stores characteristics regarding the financial account, and a scoring application configured to obtain the characteristics, determine a risk score for the financial account, and store the risk score and an identifier of the financial account in a storage location.
  • Additional embodiments of the invention provide a method of validating a payment.
  • the method can include obtaining a first account identifier; accessing a database containing a plurality of risk scores, each one of the plurality of risk scores being associated with one of a plurality of account identifiers; obtaining a first risk score from the plurality of risk scores, the first risk score being associated with the first account identifier; and determining an acceptance decision by comparing the first risk score against a risk threshold value.
  • FIG. 1 illustrates a system for determining a risk score for a financial account according to one embodiment of the invention.
  • FIG. 2 is a flow chart illustrating a process of determining a risk score for a financial account according to one embodiment of the invention.
  • FIG. 3 is a decision tree for applying a risk score to a financial account according to one embodiment of the invention.
  • FIG. 4 is a system for validating a payment by evaluating the risk score associated with the payment according to one embodiment of the invention.
  • FIG. 5 is a flow chart illustrating a process of validating a payment by evaluating the risk score associated with the payment according to one embodiment of the invention.
  • FIG. 6 is a flow chart illustrating a process of adjusting a risk threshold value according to one embodiment of the invention.
  • embodiments of the invention include both hardware and electronic components or modules that, for purposes of discussion, may be illustrated and described as if the majority of the components were implemented solely in hardware.
  • the electronic based aspects of the invention may be implemented in software.
  • a plurality of hardware and software based devices, as well as a plurality of different structural components may be utilized to implement the invention.
  • the specific configurations illustrated in the drawings are intended to exemplify embodiments of the invention and that other alternative configurations are possible.
  • FIG. 1 illustrates a scoring system 10 according to one embodiment of the invention.
  • the scoring system 10 can be configured to assign a risk score to a financial account of an account holder.
  • the scoring system 10 can include an account information application 12 , a scoring application 14 , and a scored negative file 16 .
  • the account information application can be an application configured to provide information regarding a financial account.
  • the account information application 12 can be executed by a computer, database, server, etc., and can be operated or managed by a bank, credit union, or other institution capable of issuing and maintaining financial accounts.
  • a retail computer such as a cash register or point-of-sale (“POS”) terminal, can also execute the account information application 12 .
  • POS point-of-sale
  • the account information application 12 can generate messages when activity occurs on a financial account. For example, the account information application 12 can transmit characteristics of the financial account to the scoring application 14 when a new account is opened at the financial institution, when a deposit or withdrawal is made on the financial account, when a check for the financial account successfully clears, when a check for the financial account gets returned for insufficient funds, etc.
  • the account information application 12 can transmit characteristics to the scoring application 14 over a direct link or indirectly through any suitable network, such as a local area network (“LAN”) or the Internet. The characteristics can also be manually delivered to the scoring application 14 .
  • LAN local area network
  • FIG. 1 illustrates a direct connection between the account information application 12 and the scoring application 14
  • intermediary devices and applications can be positioned between the account information application 12 and the scoring application 14 , such as various routers, gateways, and other transmitting and processing applications.
  • the intermediary applications can perform simple forwarding or routing functionality or can process the transmitted data.
  • An adapter application for example, can obtain data from the account information application 12 and can convert or translate the obtained data into a format or structure that is understood by the scoring application 14 .
  • Data transmitted by the account information application 12 can include confidential information, such as financial account numbers, social security numbers, account holder names, etc.
  • the account information application 12 or an intermediary processing application, can encrypt the transmitted data to keep confidential and sensitive data secure.
  • the scoring application 14 can be executed by a retail or financial institution computer, server, database, etc., and can be configured to obtain data from the account information application 12 . Although only one account information application 12 is illustrated in FIG. 1 , the scoring application 14 can be configured to obtain data from a number of account information applications 12 or other applications capable of transmitting account data.
  • the scoring application 14 can be part of the shared check authorization network (“SCAN”) and can serve as a central processing location for a number of financial institutions.
  • SCAN shared check authorization network
  • the scoring application 14 can be configured to assign a risk score to a financial account. After the scoring application 14 determines a risk score, the scoring application 14 can be configured to transmit the risk score to the scored negative file 16 .
  • the scoring application 14 can transmit a financial account identifier associated with each risk score.
  • the financial account identifier can be a checking account number, a check card number, a driver's license number, a personally-chosen identifier, etc.
  • the scored negative file 16 can also include other information, such as the number of checks returned for insufficient funds, the date of last deposit, the date of the last returned check, the amount of the last deposit, the number of checks awaiting processing, etc.
  • the scoring application 14 can be configured to transmit all of the data received regarding a financial account to the scored negative file 16 .
  • the scored negative file 16 can include only the risk score and an account identifier for each financial account.
  • the data used to arrive at the risk score such as the data received from the account information application 12 , can be stored in a separate archive or storage location (not shown).
  • the scored negative file 16 can be stored in a database or other data storage device.
  • the scored negative file 16 can also be printed by an image processing apparatus, such as a printer, and physically stored or filed by the retailer.
  • a number of intermediary devices and/or applications can be positioned between the scoring application 14 and the scoring negative file 16 .
  • the scoring application 14 can transmit account data and the associated risk score to a data manager application (not shown) that adds the data to a database or writes a modified file to a disk.
  • a data manager application can also be used to authenticate submitting devices, such as the scoring application 14 , before data is added to or modified in the database or the file.
  • the scoring application 14 or other intermediary application can encrypt the data before storing the scored negative file 16 in a database or a file. Encrypting the data can allow only authenticated applications to access or view data contained within the scored negative file 16 .
  • FIG. 2 illustrates a process of assigning a risk score to a financial account according to one embodiment of the invention.
  • the process can be executed by the scoring system 10 as described in FIG. 1 , although other system configurations are possible.
  • the account information application 12 can obtain (at 20 ) information regarding a financial account.
  • the account information application 12 can access other applications or systems in order to obtain the financial account information.
  • the account information application 12 can access banking systems or archives to obtain information regarding a particular financial account.
  • Other devices and applications can be configured to transmit financial account information to the account information application 12 .
  • the financial account information can be internally held by the account information application 12 .
  • the account information application 12 can be configured to obtain or calculate supplemental data based on the information obtained or maintained for a financial account.
  • the account information application 12 can transmit (at 22 ) the information to the scoring application 14 .
  • the scoring application 14 can alternatively directly obtain the financial account information by accessing a data storage location of the account information application 12 .
  • the scoring application 14 can also be configured to receive information from a number of account information applications 12 and combine all the information related to a particular financial account.
  • the scoring application 14 can be configured to process the received information.
  • the scoring application 14 can process the received information by structuring the data into a particular format or by validating the received data and issuing errors or messages if the received information is incomplete or inaccurate.
  • the scoring application 14 can determine (at 24 ) a risk score for the financial account.
  • Various decision and predictive applications can be used to determine the risk score.
  • the scoring application 14 can use a decision tree to determine the risk score for a financial account.
  • the scoring application 14 can store (at 28 ) the risk score along with an account identifier in the scored negative file 16 .
  • the scoring application 14 can store all of the risk scores and associated account identifiers in the scored negative file 16 or can only store a subset of risk scores and account identifiers. For example, in some embodiments, the scoring application 14 can only store risk scores for those accounts assigned a risk score over a certain value. In some embodiments, the scoring application 14 only receives account data for delinquent accounts from the account information application 12 , in which case only those financial accounts with a delinquent risk score are stored in the scored negative file 16 .
  • the delinquent risk score can be a high value or a low value, depending on the particular calculations made and the particular threshold values.
  • the risk scores for the financial accounts can be updated when necessary so that the scored negative file 16 accurately indicates the current risk of a check being returned from the financial account.
  • the account information application 12 can determine (at 30 ) whether any information or characteristic associated with the particular financial account has been updated or modified. When the information or characteristics of a financial account are updated or modified, a new risk score can be calculated and stored so that the current risk associated with the financial account is accurately indicated in the scored negative file 16 . For example, a deposit into a financial account may result in a new risk score indicating less risk associated with the financial account.
  • the new risk score can allow the account holder to use a check as a form of payment, even if the old score would have caused a retailer to reject a check from the account holder. It is in the best interest of both retailers and account holders to have risk scores recalculated when a financial account experiences activity.
  • the account information application 12 can obtain (at 20 ) updated or modified financial account information for the financial account.
  • the account information application 12 can transmit (at 22 ) the updated or modified account information to the scoring application 14 , and the scoring application 14 can determine (at 24 ) and store (at 28 ) a new risk value.
  • New risk scores may overwrite existing risk scores or may be stored as a history of risk scores (e.g., kept over time and associated with particular dates).
  • Events warranting the recalculation of the risk scores include, but are not limited to, the return of an unfinanced check for the financial account, the clearing of a financed check for the financial account, the observing of no or little activity on the financial account over a certain number of days, or the elapsing of a certain number of days without payment on a returned check.
  • the account information application 12 can continue to wait for information to be added or modified.
  • the scoring application 14 can be configured to query the account information application 12 for updated account information. For example, the scoring application 14 can be configured to periodically cycle through a list of known financial accounts and request a status check from the account information application 12 . In one embodiment, the scoring application 14 can request account information each day from the account information application 12 for all accounts listed in the scored negative file 16 . Similarly, the account information application 12 can be configured to periodically send account information to the scoring application 14 , regardless of whether the account information has been modified since the previous time the scoring application 14 received the account information. In other embodiments, the addition or modification of account information can trigger the transmitting of the new account information to the scoring application 14 without the account information application 12 or scoring application 14 querying or waiting for updates or requests.
  • FIG. 3 illustrates a decision tree 40 for use with the scoring system 10 in some embodiments of the invention.
  • the scoring application 14 can use the decision tree 40 to determine a risk score for a financial account.
  • the decision tree 40 can use as an input an object described by a set of attributes or characteristics and can return a predicated output value for the input.
  • the decision tree 40 reaches an output by performing a sequence of tests at a series of internal nodes. Each internal node in the decision tree 40 corresponds to a test of the value of one or more of the attributes or characteristics.
  • 3 includes a number of internal nodes that test various financial account characteristics, such as the number of open or unpaid payments (“# Open”), the number of paid or financed payments (“# Paid”), the maximum number of days a payment has been unpaid (“Days Open”), the number of days the most recent unpaid payment has remained unpaid (“Days Since Last Open”), the highest number or identifier for an issued payment (“Max Check #), etc.
  • the branches from the nodes correspond to the possible results of the test. Each branch may indicate a single test result or may specify a range of possible results.
  • the branches illustrated in FIG. 4 are labeled with a range of possible values. Some of the branch labels have been omitted to aid the clarity and readability of the figure.
  • the branches lead to other internal nodes or to leaf nodes. Each leaf node in the decision tree 40 marks a final decision and specifies the value to be returned, or the output, if that leaf node is reached.
  • the input to the decision tree 40 can include attributes or characteristics of a financial account.
  • the attributes or characteristics can include the number of paid or cleared checks, the number of returned or unfinanced checks, the days the first returned check has remained unfinanced, the date of the last cleared check, the average number of days returned checks remain unfinanced, the date and time when the last risk score was calculated, etc.
  • the scoring application 14 can obtain the attribute or characteristics from the account information application 12 , can calculate any corresponding data internally, or can internally store the information. For example, the scoring application 14 can receive the dates of all paid and returned checks and can calculate the average number of days that returned checks remain unfinanced.
  • the scoring application 14 can receive all the data required directly from the account information application 12 or another input device or application, without having to perform any calculations. In some embodiments, the scoring application 14 can internally store and access a portion of the attribute or characteristic information, such as the date of the last the risk score calculation. This information can be stored in the scored negative file 16 or another associated archive.
  • the decision tree 40 shown in FIG. 3 includes a root node 42 that represents the starting location of the decision tree 40 .
  • the scoring application 14 can input the account information into the decision tree 40 starting at the root node 42 .
  • the decision tree 40 can examine the number of open or returned checks for the financial account. Four branches leading to other nodes extend from the root node 42 , creating four possible results or outcomes for the test presented at the root node 42 . Each branch is marked with an option for the open or returned check count.
  • the top branch leading from the root node 42 is followed if the financial account has 1 to 2 returned checks
  • the second branch is followed if the account has 2 to 3 returned checks
  • the third branch is followed if the account has 3 to 4 returned checks
  • the fourth or bottom branch is followed if the account has 4 to 76 returned checks.
  • the bottom branch can be followed from the root node 42 to node 44 .
  • the number of paid or cleared checks associated with the financial account is determined.
  • Node 44 has two branches leading from it. The top branch is followed for accounts having 0 to 9 paid checks, while the bottom branch is followed for accounts having 9 to 121 paid checks. If the financial account has 10 paid checks (or another number within the range from 9 to 121), the bottom branch is followed to a leaf node 46 .
  • the leaf node 46 represents a final decision of the decision tree 40 , because no additional paths are available.
  • the leaf node boxes shown in FIG. 3 include numbers, with each number representing a risk score. In some embodiments, other markers or identifiers can be used to specify a risk score.
  • financial account risk scores can be a numerical value, a character string, a binary string, a graphical pattern, or any combination thereof.
  • the decision tree 40 has thirty leaf nodes representing thirty possible risk scores.
  • Leaf node 46 is marked with the number 25 indicating that the financial account whose attributes lead to leaf node 46 in the decision tree 40 has been assigned a risk score of 25.
  • a financial account with 5 open or returned checks and 10 paid or cleared checks would be assigned a risk score of 25. If, however, the financial account had 5 open or returned checks and had 7 paid checks, the top branch would be followed to a leaf node 48 where the financial account would be assigned a risk score of 30.
  • the higher the risk score the higher the risk that an account holder will write an unfinanced bad check.
  • a risk score of 30 can be associated with more risk score than 25, because accounts with the same number of returned checks, but fewer paid checks, can pose a higher risk of repeated unfinanced check writing.
  • a risk score scale can be generated in such a way that the lower the risk score, the higher the risk that an account holder will write an unfinanced check.
  • the effectiveness of the decision tree 40 can be evaluated and modified in some embodiments of the invention.
  • the risk scores assigned by the decision tree 40 can be reviewed to ensure that accurate scores are being determined for financial accounts and that a financial account is not receiving too high of a risk score or too low of a risk score.
  • An unnecessarily high risk score can prohibit an account holder from presenting a payment for a transaction, and an inaccurately low risk score can allow an unfinanced payment for a transaction to be accepted by a retailer.
  • the decision tree 40 can be modified by changing the ranges specified on the branches and the score values placed at the leaf node. New tests can also be added to the decision tree 40 such as the difference between the first check number and the most recent check number, the date of the last deposit, etc.
  • FIG. 4 illustrates a validating system 60 according to one embodiment of the invention.
  • the validating system 60 can be configured to validate or authorize an account holder presenting a check for payment.
  • the validating system 60 can include a payment processing application 62 , a payment validation application 64 , and a scored negative file 66 .
  • a POS terminal or a cash register can execute the payment processing application 62 .
  • another suitable hardware or software apparatus can be configured to obtain financial account data during a transaction.
  • the payment processing application 62 can also be executed by a retail clerk or cashier.
  • Data obtained by the payment processing application 62 can be sent to the payment validation application 64 .
  • the payment processing application 62 and payment validation application 64 can communicate over direct links or over a network such as the Internet. Multiple intermediary devices can also be connected between the payment processing application 62 and the payment validation application 64 .
  • a POS terminal, cash register, or other suitable device can execute the payment validation application 64 .
  • the payment validation application 64 can be executed on the same device or apparatus as the payment processing application 62 . In some embodiments, the functionality of the payment processing application 62 and the payment validation application 64 can be combined and executed as a single application. In some embodiments, the payment validation application 64 can be executed by a central payment validating computer, server, database, etc.
  • the payment validation application 64 can be configured to determine an acceptance decision for payments presented by an account holder. The acceptance decision can specify whether the payment should be accepted or declined. The acceptance decision can be based on whether the financial account associated with the payment matches a financial account (or a financial account identifier) listed in the scored negative file 66 . In some embodiments, the acceptance decision can be based on a risk score associated with the financial account and a risk threshold value, in addition to the fact that the financial account is listed in the scored negative file 66 .
  • each retailer can individually set a risk threshold value to establish an acceptable risk limit for payment processing.
  • the risk threshold value can provide a limit on risk scores that will be accepted by a retailer or a transaction provider.
  • Financial accounts listed in the scored negative file 66 can still be accepted by a retailer, if the financial account has a risk score within a predetermined amount of the risk threshold value.
  • the predetermined amount can accommodate situations in which the risk score is equal to the risk threshold value or less than or greater than the risk threshold value by a particular amount.
  • the predetermined amounts can specify that payments from accounts with risk scores less than the risk threshold value will be accepted, that payments from accounts with risk scores equal to the risk threshold value will be accepted, that payments from accounts with risk scores greater than the risk threshold value will be accepted, that payments from accounts with risk scores within a certain number of points of the risk threshold value will be accepted, or any combination thereof.
  • each retailer can set an individual risk threshold value to establish a suitable balance between rejecting all payments and accepting all payments. Accepting all payments can lead to lost sales through returned checks, but can increase total sales by accepting checks that are ultimately financed from the financial accounts listed in the scored negative file 16 . Alternatively, rejecting all payments linked to financial accounts listed in the scored negative file 16 can result in lost sales if an account holder does not have alternate payment methods, but can increase total sales by decreasing the amount of lost revenue due to returned checks.
  • a retailer who cannot afford a large number of returned checks or who is currently experiencing a large number of returned checks and losing revenue can set a high risk threshold value (e.g., only those financial accounts with a low risk will be accepted). Alternatively, a retailer can set a low risk threshold value (e.g., those financial accounts with low and high risks will be accepted) hoping that the increase in total sales by accepting more payments will be greater than the amount of sales lost by accepting checks that are later returned.
  • the risk threshold value can be a dynamic value that is easily changed by each retailer or that changes automatically based on information regarding sales and/or previous returned checks.
  • the risk threshold value can be set by the retailer associated with the payment processing application 62 , can be a standard value accepted by all retailers, or can be a specific risk threshold value for a particular market. For example, a grocery store may be able to set its own risk threshold value, may be required to adopt a risk threshold value used by all retailers, or may be required to adopt a risk threshold value used by all grocery-related retailers.
  • a payment validation application 64 can be individually configured for a particular retailer. Multiple retailers can also share one payment validation application 64 .
  • the payment validation application 64 can be managed by SCAN and can be used by a number of payment processing applications 62 .
  • retailers can have individually-configured payment validation applications that transmit payment validation requests to a global or central payment validation application configured to provide payment validation information to a number of retailers.
  • the payment validation application 64 uses the scored negative file 66 to determine an acceptance decision.
  • the scored negative file 66 illustrated in FIG. 4 can be the same scored negative file 16 illustrated in FIG. 2 or can be an individually-tailored scored negative file 66 for the payment validation application 64 .
  • the scored negative file 66 can be a subset of the scored negative file 16 based on a particular risk threshold value.
  • the scored negative file 66 can include a subset of financial accounts listed in the scored negative file 16 whose risk scores are above, below, or equal to the particular risk threshold value.
  • the scored negative file 66 can further be specialized to include only financial accounts having other particular attributes or characteristics, such as only those financial accounts having returned checks within a particular market.
  • the payment validation application 64 can receive the scored negative file 66 from a second payment validation application (not shown) configured to receive risk threshold values, configured to access the stored scored negative file 16 , and configured to generate a list of financial accounts appearing in the scored negative file 16 that are above, below, or at a particular risk threshold value.
  • the payment validation application 64 can also access the scored negative file 16 directly to generate the individually-tailored scored negative file 66 .
  • the scored negative file 66 can be stored locally in a data storage location managed by the payment validating application 64 or can be stored in a centrally-located storage location such as a database, server, etc.
  • the payment validation application 64 can be configured to use the entire scored negative file 16 .
  • the payment validation application 64 can first determine whether the financial account in question is listed in the scored negative file 16 , and then can determine whether the financial account has a risk score that varies from the risk threshold value.
  • the payment validation application 64 can be further configured to report back to the payment processing application 62 in order to indicate whether the payment is accepted or declined.
  • FIG. 5 is a flow chart illustrating a process of validating a payment presented by an account holder for a transaction according to one embodiment of the invention.
  • the payment processing application 62 can obtain (at 70 ) a financial account identifier from an account holder.
  • the payment processing application 62 can obtain the financial account identifier by obtaining information from a form of payment or a form of identification presented to the payment processing application 62 , such as a check card, a driver's license, a paper check, etc.
  • the payment processing application 62 can obtain the information by scanning or reading the presented form of payment or identification. Alternatively, a retail clerk or cashier can request or read the information and can enter the information into the payment processing application 62 . Otherwise, the account holder presenting the payment can enter the information into the payment processing application 62 him or herself.
  • the payment processing application 62 can transmit (at 72 ) the financial account identifier to the payment validation application 64 .
  • the payment validation application 64 can use the account identifier to search the scored negative file 66 to determine (at 74 ) whether the financial account associated with the payment currently being processed is listed in the scored negative file 66 .
  • the account identifier provided by the payment processing application 62 may identify more than one financial account. For example, a driver's license number can identify a number of financial accounts associated with a single individual or organization.
  • the payment validation application 64 can search the scored negative file 66 for any financial account linked to the account identifier, regardless of the particular financial account the current payment is originating from. An individual or organization having a high risk score on one financial account can be at a higher risk for returned checks on any account he or she owns, and thus, all payments from this individual or organization can be declined.
  • the payment validation application 64 can transmit the account identifier to a second payment validation application (not shown).
  • the second payment validation application can return a risk score from the scored negative file 16 .
  • the second payment validation application can allow the first payment validation application 64 to determine whether the risk score is above or below the risk threshold value.
  • the second payment validation application can make the acceptance decision for the payment validation application 64 .
  • the second payment validation application can instruct the first payment validation application 64 to either accept or deny the payment by returning an acceptance decision.
  • the second payment validation application can determine the acceptance decision by comparing the risk score for the financial account to the risk threshold value.
  • the secondary payment validation application can return more than one risk score or can return only one of the multiple risk scores. For example, the secondary payment validation application can determine an acceptance decision based on the highest risk score or can return the highest risk score to the payment validation application 64 .
  • the payment validation application 64 can decline (at 76 ) the payment. Alternatively, if the financial account is not listed in the scored negative file 66 or if the risk score is less than the risk threshold value, the payment validation application 64 can accept (at 78 ) the payment. Regardless of whether the payment validation application 64 accepts or declines the payment, the payment validation application 64 can be configured to record (at 80 ) the decision. Recording the decision can include storing information regarding the type of payment that was presented, the transaction the payment was presented for, and/or whether the payment was accepted or declined.
  • Recorded data can be stored locally by the payment validation application 64 , by the payment processing application 62 , or by other applications managed by the retailer. Otherwise, recorded data can be tracked and stored at a data storage location located external to the various applications managed by the retailer.
  • a payment authorization application can be configured to track decisions for a number of retailers. Recording the payments accepted and the payments declined, along with their associated transactions, allows retailers to track their individual risk threshold value, and allows retailers to adjust their individual risk threshold value, as will be described below.
  • FIG. 6 is a flow chart illustrating a process of adjusting a risk threshold value according to one embodiment of the invention.
  • a retailer can track payment acceptance decisions and can adjust the risk threshold value based on previous decisions and their outcomes.
  • a retailer can set (at 90 ) a risk threshold value.
  • a retailer can set the risk threshold value by inputting the selected value into a computer or other application such as the payment validation application 64 .
  • a retailer can also set a risk threshold value by manually informing a central payment authorization application or organization of a desired risk threshold value. For example, a retailer can call a payment authorization application or organization and voice the desired risk threshold value.
  • the payment authorization application can record the risk threshold value and can generate the scored negative file 66 for the payment validation application 64 of the retailer based on the retailer's individual risk threshold value.
  • the retailer can process (at 92 ) payments as shown and described with respect to FIG. 5 .
  • a record can be recorded to an internal or remote data storage location as previously described with respect to FIG. 5 .
  • the record can include the financial account identifier, the payment issued, the characteristics of the transaction, the acceptance decision, etc.
  • the retailer in some embodiments, can view (at 94 ) historical data for processed payments.
  • the retailer can internally store the information or can request the historical data from a remote storage location.
  • the payment validation application 64 can be configured to obtain and process the historical data, although the retailer can use other applications to track payment processing.
  • the historical data can be presented to the retailer in a number of forms, such as, graphical or chart form, summary form, raw data from, etc.
  • the historical data can indicate sales lost due to declined payments, revenue lost due to the acceptance of unfinanced payments, etc.
  • the retailer can use the historical data to determine whether the risk threshold value is creating an acceptable balance between lost sales and lost revenue.
  • the retailer can determine (at 96 ) whether to adjust the risk threshold value based on past payment processing. If the retailer has accepted a number of unfinanced payments that resulted in lost revenue, the retailer can raise the risk threshold value so that only checks from low-risk-score accounts are accepted.
  • the retailer can reduce the risk threshold value to accept more checks from high-risk-score accounts in an effort to increase sales.
  • the retailer can keep the risk threshold value constant if the retailer feels that the risk threshold value is properly discriminating between high-risk-score accounts and low-risk-score accounts.
  • the retailer can set (at 90 ) the threshold value to a new value and can begin to process (at 92 ) payments using the new risk threshold value. If the retailer does not modify the risk threshold value, the retailer returns to processing (at 92 ) payments. In some embodiments, the retailer can adjust the risk threshold value at any time and as many times as warranted.
  • Other devices and applications in addition retailer or transaction provider applications and devices can access the scored negative files 16 and 66 to determine the financial stability of an account holder.
  • a credit card or credit issuing organization can use the scored negative files 16 or 66 to determine whether an account holder has been diligent in writing financed checks and can adjust a credit limit based on the risk score assigned to the account holder.
  • embodiments of the invention are described with respect to checking accounts, embodiments of the invention are not limited to specific types of financial accounts. Credit card accounts, savings accounts, and other financial accounts, for example, can utilize embodiments of the invention as described above. Checking accounts are used for illustrative purposes because negative files are traditionally used to validation check payments. It should also be understood that reference to “writing a check” or other similar phrases can include not only the physical writing of a check, but also using a debit card to make a point-of-sale purchase or to alter the financial account in any manner (such as by making an ATM withdrawal).

Abstract

System and method for validating a payment. The method can include obtaining a first account identifier, accessing a database containing a plurality of risk scores, each one of the plurality of risk scores being associated with one of a plurality of account identifiers, obtaining a first risk score from the plurality of risk scores, the first risk score being associated with the first account identifier, and determining an acceptance decision by comparing the first risk score against a risk threshold value.

Description

    BACKGROUND OF THE INVENTION
  • The present invention relates to validating payments during transactions. In particular, embodiments of the invention relate to validating check payments presented during transactions.
  • A traditional negative file consists of account holders (i.e., individuals or organizations with checking accounts) that currently have outstanding returned checks at a retailer that is a member of the shared check authorization network (“SCAN”). Whenever an account holders presents a check to a retailer, the retailer determines whether the account holder has any unpaid returned checks by cross-referencing the negative file. Many of the account holders listed in the negative file, however, unintentionally write checks with insufficient funds in their checking accounts. Account holders may have incomplete or inaccurate knowledge concerning the balance in their account or may have forgotten to transfer or deposit money to cover recent checks. Many of the account holders listed in the negative file may pay off their returned checks quickly, and frequently will have money in their account to cover future issued checks. When this type of account holder gets turned down for a transaction because they appear in the negative file, the retailer loses a sale and potentially creates a customer service issue, when, in reality, the retailer may have declined a valid form of payment and may have lost a sale unnecessarily.
  • SUMMARY OF THE INVENTION
  • Some embodiments of the invention provide a system for assigning a risk score to a financial account. The system can include an account information application that stores characteristics regarding the financial account, and a scoring application configured to obtain the characteristics, determine a risk score for the financial account, and store the risk score and an identifier of the financial account in a storage location.
  • Additional embodiments of the invention provide a method of validating a payment. The method can include obtaining a first account identifier; accessing a database containing a plurality of risk scores, each one of the plurality of risk scores being associated with one of a plurality of account identifiers; obtaining a first risk score from the plurality of risk scores, the first risk score being associated with the first account identifier; and determining an acceptance decision by comparing the first risk score against a risk threshold value.
  • BRIEF DESCRIPTION OF THE DRAWINGS
  • FIG. 1 illustrates a system for determining a risk score for a financial account according to one embodiment of the invention.
  • FIG. 2 is a flow chart illustrating a process of determining a risk score for a financial account according to one embodiment of the invention.
  • FIG. 3 is a decision tree for applying a risk score to a financial account according to one embodiment of the invention.
  • FIG. 4 is a system for validating a payment by evaluating the risk score associated with the payment according to one embodiment of the invention.
  • FIG. 5 is a flow chart illustrating a process of validating a payment by evaluating the risk score associated with the payment according to one embodiment of the invention.
  • FIG. 6 is a flow chart illustrating a process of adjusting a risk threshold value according to one embodiment of the invention.
  • DETAILED DESCRIPTION
  • Before any embodiments of the invention are explained in detail, it is to be understood that the invention is not limited in its application to the details of construction and the arrangement of components set forth in the following description or illustrated in the following drawings. The invention is capable of other embodiments and of being practiced or of being carried out in various ways. Also, it is to be understood that the phraseology and terminology used herein is for the purpose of description and should not be regarded as limited. The use of “including,” “comprising” or “having” and variations thereof herein is meant to encompass the items listed thereafter and equivalents thereof as well as additional items. The terms “mounted,” “connected” and “coupled” are used broadly and encompass both direct and indirect mounting, connecting and coupling. Further, “connected” and “coupled” are not restricted to physical or mechanical connections or couplings, and can include electrical connections or couplings, whether direct or indirect.
  • In addition, it should be understood that embodiments of the invention include both hardware and electronic components or modules that, for purposes of discussion, may be illustrated and described as if the majority of the components were implemented solely in hardware. However, one of ordinary skill in the art, and based on a reading of this detailed description, would recognize that, in at least one embodiment, the electronic based aspects of the invention may be implemented in software. As such, it should be noted that a plurality of hardware and software based devices, as well as a plurality of different structural components may be utilized to implement the invention. Furthermore, and as described in subsequent paragraphs, the specific configurations illustrated in the drawings are intended to exemplify embodiments of the invention and that other alternative configurations are possible.
  • FIG. 1 illustrates a scoring system 10 according to one embodiment of the invention. The scoring system 10 can be configured to assign a risk score to a financial account of an account holder. The scoring system 10 can include an account information application 12, a scoring application 14, and a scored negative file 16. The account information application can be an application configured to provide information regarding a financial account. The account information application 12 can be executed by a computer, database, server, etc., and can be operated or managed by a bank, credit union, or other institution capable of issuing and maintaining financial accounts. A retail computer, such as a cash register or point-of-sale (“POS”) terminal, can also execute the account information application 12.
  • The account information application 12 can generate messages when activity occurs on a financial account. For example, the account information application 12 can transmit characteristics of the financial account to the scoring application 14 when a new account is opened at the financial institution, when a deposit or withdrawal is made on the financial account, when a check for the financial account successfully clears, when a check for the financial account gets returned for insufficient funds, etc. The account information application 12 can transmit characteristics to the scoring application 14 over a direct link or indirectly through any suitable network, such as a local area network (“LAN”) or the Internet. The characteristics can also be manually delivered to the scoring application 14.
  • Although FIG. 1 illustrates a direct connection between the account information application 12 and the scoring application 14, other intermediary devices and applications can be positioned between the account information application 12 and the scoring application 14, such as various routers, gateways, and other transmitting and processing applications. The intermediary applications can perform simple forwarding or routing functionality or can process the transmitted data. An adapter application, for example, can obtain data from the account information application 12 and can convert or translate the obtained data into a format or structure that is understood by the scoring application 14. Data transmitted by the account information application 12 can include confidential information, such as financial account numbers, social security numbers, account holder names, etc. As a result, the account information application 12, or an intermediary processing application, can encrypt the transmitted data to keep confidential and sensitive data secure.
  • The scoring application 14 can be executed by a retail or financial institution computer, server, database, etc., and can be configured to obtain data from the account information application 12. Although only one account information application 12 is illustrated in FIG. 1, the scoring application 14 can be configured to obtain data from a number of account information applications 12 or other applications capable of transmitting account data. The scoring application 14 can be part of the shared check authorization network (“SCAN”) and can serve as a central processing location for a number of financial institutions.
  • The scoring application 14 can be configured to assign a risk score to a financial account. After the scoring application 14 determines a risk score, the scoring application 14 can be configured to transmit the risk score to the scored negative file 16. The scoring application 14 can transmit a financial account identifier associated with each risk score. The financial account identifier can be a checking account number, a check card number, a driver's license number, a personally-chosen identifier, etc. The scored negative file 16 can also include other information, such as the number of checks returned for insufficient funds, the date of last deposit, the date of the last returned check, the amount of the last deposit, the number of checks awaiting processing, etc. The scoring application 14 can be configured to transmit all of the data received regarding a financial account to the scored negative file 16. However, in some embodiments, the scored negative file 16 can include only the risk score and an account identifier for each financial account. The data used to arrive at the risk score, such as the data received from the account information application 12, can be stored in a separate archive or storage location (not shown).
  • The scored negative file 16 can be stored in a database or other data storage device. The scored negative file 16 can also be printed by an image processing apparatus, such as a printer, and physically stored or filed by the retailer. As noted, a number of intermediary devices and/or applications can be positioned between the scoring application 14 and the scoring negative file 16. For example, the scoring application 14 can transmit account data and the associated risk score to a data manager application (not shown) that adds the data to a database or writes a modified file to a disk. A data manager application can also be used to authenticate submitting devices, such as the scoring application 14, before data is added to or modified in the database or the file.
  • In some embodiments, the scoring application 14 or other intermediary application can encrypt the data before storing the scored negative file 16 in a database or a file. Encrypting the data can allow only authenticated applications to access or view data contained within the scored negative file 16.
  • FIG. 2 illustrates a process of assigning a risk score to a financial account according to one embodiment of the invention. The process can be executed by the scoring system 10 as described in FIG. 1, although other system configurations are possible. The account information application 12 can obtain (at 20) information regarding a financial account. The account information application 12 can access other applications or systems in order to obtain the financial account information. For example, the account information application 12 can access banking systems or archives to obtain information regarding a particular financial account. Other devices and applications can be configured to transmit financial account information to the account information application 12. The financial account information can be internally held by the account information application 12. The account information application 12 can be configured to obtain or calculate supplemental data based on the information obtained or maintained for a financial account.
  • After the account information application 12 has obtained the financial account information, the account information application 12 can transmit (at 22) the information to the scoring application 14. However, the scoring application 14 can alternatively directly obtain the financial account information by accessing a data storage location of the account information application 12. The scoring application 14 can also be configured to receive information from a number of account information applications 12 and combine all the information related to a particular financial account. The scoring application 14 can be configured to process the received information. The scoring application 14 can process the received information by structuring the data into a particular format or by validating the received data and issuing errors or messages if the received information is incomplete or inaccurate.
  • After the scoring application 14 has obtained the financial account information, the scoring application 14 can determine (at 24) a risk score for the financial account. Various decision and predictive applications can be used to determine the risk score. In some embodiments, the scoring application 14 can use a decision tree to determine the risk score for a financial account.
  • The scoring application 14 can store (at 28) the risk score along with an account identifier in the scored negative file 16. The scoring application 14 can store all of the risk scores and associated account identifiers in the scored negative file 16 or can only store a subset of risk scores and account identifiers. For example, in some embodiments, the scoring application 14 can only store risk scores for those accounts assigned a risk score over a certain value. In some embodiments, the scoring application 14 only receives account data for delinquent accounts from the account information application 12, in which case only those financial accounts with a delinquent risk score are stored in the scored negative file 16. The delinquent risk score can be a high value or a low value, depending on the particular calculations made and the particular threshold values.
  • The risk scores for the financial accounts can be updated when necessary so that the scored negative file 16 accurately indicates the current risk of a check being returned from the financial account. After an initial risk score has been stored in the scored negative file 16, the account information application 12 can determine (at 30) whether any information or characteristic associated with the particular financial account has been updated or modified. When the information or characteristics of a financial account are updated or modified, a new risk score can be calculated and stored so that the current risk associated with the financial account is accurately indicated in the scored negative file 16. For example, a deposit into a financial account may result in a new risk score indicating less risk associated with the financial account. The new risk score can allow the account holder to use a check as a form of payment, even if the old score would have caused a retailer to reject a check from the account holder. It is in the best interest of both retailers and account holders to have risk scores recalculated when a financial account experiences activity.
  • If an event has occurred warranting the recalculation of the risk score, the account information application 12 can obtain (at 20) updated or modified financial account information for the financial account. The account information application 12 can transmit (at 22) the updated or modified account information to the scoring application 14, and the scoring application 14 can determine (at 24) and store (at 28) a new risk value. New risk scores may overwrite existing risk scores or may be stored as a history of risk scores (e.g., kept over time and associated with particular dates).
  • Events warranting the recalculation of the risk scores include, but are not limited to, the return of an unfinanced check for the financial account, the clearing of a financed check for the financial account, the observing of no or little activity on the financial account over a certain number of days, or the elapsing of a certain number of days without payment on a returned check. In the absence of account activity or events, the account information application 12 can continue to wait for information to be added or modified.
  • In some embodiments, the scoring application 14 can be configured to query the account information application 12 for updated account information. For example, the scoring application 14 can be configured to periodically cycle through a list of known financial accounts and request a status check from the account information application 12. In one embodiment, the scoring application 14 can request account information each day from the account information application 12 for all accounts listed in the scored negative file 16. Similarly, the account information application 12 can be configured to periodically send account information to the scoring application 14, regardless of whether the account information has been modified since the previous time the scoring application 14 received the account information. In other embodiments, the addition or modification of account information can trigger the transmitting of the new account information to the scoring application 14 without the account information application 12 or scoring application 14 querying or waiting for updates or requests.
  • FIG. 3 illustrates a decision tree 40 for use with the scoring system 10 in some embodiments of the invention. The scoring application 14 can use the decision tree 40 to determine a risk score for a financial account. The decision tree 40 can use as an input an object described by a set of attributes or characteristics and can return a predicated output value for the input. The decision tree 40 reaches an output by performing a sequence of tests at a series of internal nodes. Each internal node in the decision tree 40 corresponds to a test of the value of one or more of the attributes or characteristics. The decision tree 40 illustrated in FIG. 3 includes a number of internal nodes that test various financial account characteristics, such as the number of open or unpaid payments (“# Open”), the number of paid or financed payments (“# Paid”), the maximum number of days a payment has been unpaid (“Days Open”), the number of days the most recent unpaid payment has remained unpaid (“Days Since Last Open”), the highest number or identifier for an issued payment (“Max Check #), etc.
  • The branches from the nodes correspond to the possible results of the test. Each branch may indicate a single test result or may specify a range of possible results. The branches illustrated in FIG. 4 are labeled with a range of possible values. Some of the branch labels have been omitted to aid the clarity and readability of the figure. The branches lead to other internal nodes or to leaf nodes. Each leaf node in the decision tree 40 marks a final decision and specifies the value to be returned, or the output, if that leaf node is reached.
  • When used by the scoring application 14, the input to the decision tree 40 can include attributes or characteristics of a financial account. The attributes or characteristics can include the number of paid or cleared checks, the number of returned or unfinanced checks, the days the first returned check has remained unfinanced, the date of the last cleared check, the average number of days returned checks remain unfinanced, the date and time when the last risk score was calculated, etc. The scoring application 14 can obtain the attribute or characteristics from the account information application 12, can calculate any corresponding data internally, or can internally store the information. For example, the scoring application 14 can receive the dates of all paid and returned checks and can calculate the average number of days that returned checks remain unfinanced. In other embodiments, the scoring application 14 can receive all the data required directly from the account information application 12 or another input device or application, without having to perform any calculations. In some embodiments, the scoring application 14 can internally store and access a portion of the attribute or characteristic information, such as the date of the last the risk score calculation. This information can be stored in the scored negative file 16 or another associated archive.
  • The decision tree 40 shown in FIG. 3 includes a root node 42 that represents the starting location of the decision tree 40. Upon receiving account information for a financial account, the scoring application 14 can input the account information into the decision tree 40 starting at the root node 42. At the root node 42, the decision tree 40 can examine the number of open or returned checks for the financial account. Four branches leading to other nodes extend from the root node 42, creating four possible results or outcomes for the test presented at the root node 42. Each branch is marked with an option for the open or returned check count. For example, the top branch leading from the root node 42 is followed if the financial account has 1 to 2 returned checks, the second branch is followed if the account has 2 to 3 returned checks, the third branch is followed if the account has 3 to 4 returned checks, and the fourth or bottom branch is followed if the account has 4 to 76 returned checks. The ranges assigned to any of the branches and/or nodes described herein are provided as example ranges only. Various other ranges than those shown and described can be assigned.
  • If, for example, a financial account has 5 open or returned checks, the bottom branch can be followed from the root node 42 to node 44. At node 44, the number of paid or cleared checks associated with the financial account is determined. Node 44 has two branches leading from it. The top branch is followed for accounts having 0 to 9 paid checks, while the bottom branch is followed for accounts having 9 to 121 paid checks. If the financial account has 10 paid checks (or another number within the range from 9 to 121), the bottom branch is followed to a leaf node 46. The leaf node 46 represents a final decision of the decision tree 40, because no additional paths are available. The leaf node boxes shown in FIG. 3 include numbers, with each number representing a risk score. In some embodiments, other markers or identifiers can be used to specify a risk score. For example, financial account risk scores can be a numerical value, a character string, a binary string, a graphical pattern, or any combination thereof.
  • In one embodiment, the decision tree 40 has thirty leaf nodes representing thirty possible risk scores. Leaf node 46 is marked with the number 25 indicating that the financial account whose attributes lead to leaf node 46 in the decision tree 40 has been assigned a risk score of 25. In the example presented above, a financial account with 5 open or returned checks and 10 paid or cleared checks would be assigned a risk score of 25. If, however, the financial account had 5 open or returned checks and had 7 paid checks, the top branch would be followed to a leaf node 48 where the financial account would be assigned a risk score of 30.
  • In some embodiments, the higher the risk score, the higher the risk that an account holder will write an unfinanced bad check. From the above example, a risk score of 30 can be associated with more risk score than 25, because accounts with the same number of returned checks, but fewer paid checks, can pose a higher risk of repeated unfinanced check writing. Alternatively, a risk score scale can be generated in such a way that the lower the risk score, the higher the risk that an account holder will write an unfinanced check.
  • The effectiveness of the decision tree 40 can be evaluated and modified in some embodiments of the invention. The risk scores assigned by the decision tree 40 can be reviewed to ensure that accurate scores are being determined for financial accounts and that a financial account is not receiving too high of a risk score or too low of a risk score. An unnecessarily high risk score can prohibit an account holder from presenting a payment for a transaction, and an inaccurately low risk score can allow an unfinanced payment for a transaction to be accepted by a retailer. The decision tree 40 can be modified by changing the ranges specified on the branches and the score values placed at the leaf node. New tests can also be added to the decision tree 40 such as the difference between the first check number and the most recent check number, the date of the last deposit, etc.
  • FIG. 4 illustrates a validating system 60 according to one embodiment of the invention. The validating system 60 can be configured to validate or authorize an account holder presenting a check for payment. The validating system 60 can include a payment processing application 62, a payment validation application 64, and a scored negative file 66. A POS terminal or a cash register can execute the payment processing application 62. In other embodiments, another suitable hardware or software apparatus can be configured to obtain financial account data during a transaction. The payment processing application 62 can also be executed by a retail clerk or cashier.
  • Data obtained by the payment processing application 62 can be sent to the payment validation application 64. The payment processing application 62 and payment validation application 64 can communicate over direct links or over a network such as the Internet. Multiple intermediary devices can also be connected between the payment processing application 62 and the payment validation application 64.
  • In some embodiments, a POS terminal, cash register, or other suitable device, can execute the payment validation application 64. The payment validation application 64 can be executed on the same device or apparatus as the payment processing application 62. In some embodiments, the functionality of the payment processing application 62 and the payment validation application 64 can be combined and executed as a single application. In some embodiments, the payment validation application 64 can be executed by a central payment validating computer, server, database, etc. The payment validation application 64 can be configured to determine an acceptance decision for payments presented by an account holder. The acceptance decision can specify whether the payment should be accepted or declined. The acceptance decision can be based on whether the financial account associated with the payment matches a financial account (or a financial account identifier) listed in the scored negative file 66. In some embodiments, the acceptance decision can be based on a risk score associated with the financial account and a risk threshold value, in addition to the fact that the financial account is listed in the scored negative file 66.
  • In some embodiments, each retailer can individually set a risk threshold value to establish an acceptable risk limit for payment processing. The risk threshold value can provide a limit on risk scores that will be accepted by a retailer or a transaction provider. Financial accounts listed in the scored negative file 66 can still be accepted by a retailer, if the financial account has a risk score within a predetermined amount of the risk threshold value. The predetermined amount can accommodate situations in which the risk score is equal to the risk threshold value or less than or greater than the risk threshold value by a particular amount. The predetermined amounts can specify that payments from accounts with risk scores less than the risk threshold value will be accepted, that payments from accounts with risk scores equal to the risk threshold value will be accepted, that payments from accounts with risk scores greater than the risk threshold value will be accepted, that payments from accounts with risk scores within a certain number of points of the risk threshold value will be accepted, or any combination thereof.
  • In some embodiments of the invention, each retailer can set an individual risk threshold value to establish a suitable balance between rejecting all payments and accepting all payments. Accepting all payments can lead to lost sales through returned checks, but can increase total sales by accepting checks that are ultimately financed from the financial accounts listed in the scored negative file 16. Alternatively, rejecting all payments linked to financial accounts listed in the scored negative file 16 can result in lost sales if an account holder does not have alternate payment methods, but can increase total sales by decreasing the amount of lost revenue due to returned checks. A retailer who cannot afford a large number of returned checks or who is currently experiencing a large number of returned checks and losing revenue, can set a high risk threshold value (e.g., only those financial accounts with a low risk will be accepted). Alternatively, a retailer can set a low risk threshold value (e.g., those financial accounts with low and high risks will be accepted) hoping that the increase in total sales by accepting more payments will be greater than the amount of sales lost by accepting checks that are later returned.
  • In some embodiments, the risk threshold value can be a dynamic value that is easily changed by each retailer or that changes automatically based on information regarding sales and/or previous returned checks. In other embodiments, the risk threshold value can be set by the retailer associated with the payment processing application 62, can be a standard value accepted by all retailers, or can be a specific risk threshold value for a particular market. For example, a grocery store may be able to set its own risk threshold value, may be required to adopt a risk threshold value used by all retailers, or may be required to adopt a risk threshold value used by all grocery-related retailers.
  • In some embodiments, a payment validation application 64 can be individually configured for a particular retailer. Multiple retailers can also share one payment validation application 64. For example, the payment validation application 64 can be managed by SCAN and can be used by a number of payment processing applications 62. In other embodiments, retailers can have individually-configured payment validation applications that transmit payment validation requests to a global or central payment validation application configured to provide payment validation information to a number of retailers.
  • In some embodiments, the payment validation application 64 uses the scored negative file 66 to determine an acceptance decision. The scored negative file 66 illustrated in FIG. 4 can be the same scored negative file 16 illustrated in FIG. 2 or can be an individually-tailored scored negative file 66 for the payment validation application 64. In other embodiments, the scored negative file 66 can be a subset of the scored negative file 16 based on a particular risk threshold value. For example, the scored negative file 66 can include a subset of financial accounts listed in the scored negative file 16 whose risk scores are above, below, or equal to the particular risk threshold value. The scored negative file 66 can further be specialized to include only financial accounts having other particular attributes or characteristics, such as only those financial accounts having returned checks within a particular market. In some embodiments, the payment validation application 64 can receive the scored negative file 66 from a second payment validation application (not shown) configured to receive risk threshold values, configured to access the stored scored negative file 16, and configured to generate a list of financial accounts appearing in the scored negative file 16 that are above, below, or at a particular risk threshold value. The payment validation application 64 can also access the scored negative file 16 directly to generate the individually-tailored scored negative file 66.
  • The scored negative file 66 can be stored locally in a data storage location managed by the payment validating application 64 or can be stored in a centrally-located storage location such as a database, server, etc.
  • Rather than using the scored negative file 66 with the subset of financial accounts, the payment validation application 64 can be configured to use the entire scored negative file 16. The payment validation application 64 can first determine whether the financial account in question is listed in the scored negative file 16, and then can determine whether the financial account has a risk score that varies from the risk threshold value.
  • After determining whether a payment is associated with a financial account listed in the scored negative file 66, the payment validation application 64 can be further configured to report back to the payment processing application 62 in order to indicate whether the payment is accepted or declined.
  • FIG. 5 is a flow chart illustrating a process of validating a payment presented by an account holder for a transaction according to one embodiment of the invention. In some embodiments, the components of the validating system 60, as illustrated in FIG. 4, are configured to execute the steps of the process illustrated in FIG. 5. The payment processing application 62 can obtain (at 70) a financial account identifier from an account holder. The payment processing application 62 can obtain the financial account identifier by obtaining information from a form of payment or a form of identification presented to the payment processing application 62, such as a check card, a driver's license, a paper check, etc. The payment processing application 62 can obtain the information by scanning or reading the presented form of payment or identification. Alternatively, a retail clerk or cashier can request or read the information and can enter the information into the payment processing application 62. Otherwise, the account holder presenting the payment can enter the information into the payment processing application 62 him or herself.
  • After obtaining the financial account identifier, the payment processing application 62 can transmit (at 72) the financial account identifier to the payment validation application 64. The payment validation application 64 can use the account identifier to search the scored negative file 66 to determine (at 74) whether the financial account associated with the payment currently being processed is listed in the scored negative file 66. In some situations, the account identifier provided by the payment processing application 62 may identify more than one financial account. For example, a driver's license number can identify a number of financial accounts associated with a single individual or organization. The payment validation application 64 can search the scored negative file 66 for any financial account linked to the account identifier, regardless of the particular financial account the current payment is originating from. An individual or organization having a high risk score on one financial account can be at a higher risk for returned checks on any account he or she owns, and thus, all payments from this individual or organization can be declined.
  • Alternatively, the payment validation application 64 can transmit the account identifier to a second payment validation application (not shown). The second payment validation application can return a risk score from the scored negative file 16. The second payment validation application can allow the first payment validation application 64 to determine whether the risk score is above or below the risk threshold value. In some embodiments, the second payment validation application can make the acceptance decision for the payment validation application 64. For example, the second payment validation application can instruct the first payment validation application 64 to either accept or deny the payment by returning an acceptance decision. The second payment validation application can determine the acceptance decision by comparing the risk score for the financial account to the risk threshold value.
  • If the account identifier is associated with more than one financial account, the secondary payment validation application can return more than one risk score or can return only one of the multiple risk scores. For example, the secondary payment validation application can determine an acceptance decision based on the highest risk score or can return the highest risk score to the payment validation application 64.
  • If the account identified by the account identifier is listed in the scored negative file 66 or if the risk score is greater than the risk threshold value, the payment validation application 64 can decline (at 76) the payment. Alternatively, if the financial account is not listed in the scored negative file 66 or if the risk score is less than the risk threshold value, the payment validation application 64 can accept (at 78) the payment. Regardless of whether the payment validation application 64 accepts or declines the payment, the payment validation application 64 can be configured to record (at 80) the decision. Recording the decision can include storing information regarding the type of payment that was presented, the transaction the payment was presented for, and/or whether the payment was accepted or declined. Recorded data can be stored locally by the payment validation application 64, by the payment processing application 62, or by other applications managed by the retailer. Otherwise, recorded data can be tracked and stored at a data storage location located external to the various applications managed by the retailer. A payment authorization application can be configured to track decisions for a number of retailers. Recording the payments accepted and the payments declined, along with their associated transactions, allows retailers to track their individual risk threshold value, and allows retailers to adjust their individual risk threshold value, as will be described below.
  • FIG. 6 is a flow chart illustrating a process of adjusting a risk threshold value according to one embodiment of the invention. After a retailer individually sets a risk threshold value, the retailer can track payment acceptance decisions and can adjust the risk threshold value based on previous decisions and their outcomes. Referring to FIG. 6, a retailer can set (at 90) a risk threshold value. A retailer can set the risk threshold value by inputting the selected value into a computer or other application such as the payment validation application 64. A retailer can also set a risk threshold value by manually informing a central payment authorization application or organization of a desired risk threshold value. For example, a retailer can call a payment authorization application or organization and voice the desired risk threshold value. The payment authorization application can record the risk threshold value and can generate the scored negative file 66 for the payment validation application 64 of the retailer based on the retailer's individual risk threshold value.
  • Once the risk threshold value has been set, the retailer can process (at 92) payments as shown and described with respect to FIG. 5. With each payment processed, a record can be recorded to an internal or remote data storage location as previously described with respect to FIG. 5. The record can include the financial account identifier, the payment issued, the characteristics of the transaction, the acceptance decision, etc.
  • The retailer, in some embodiments, can view (at 94) historical data for processed payments. The retailer can internally store the information or can request the historical data from a remote storage location. The payment validation application 64 can be configured to obtain and process the historical data, although the retailer can use other applications to track payment processing.
  • The historical data can be presented to the retailer in a number of forms, such as, graphical or chart form, summary form, raw data from, etc. The historical data can indicate sales lost due to declined payments, revenue lost due to the acceptance of unfinanced payments, etc. The retailer can use the historical data to determine whether the risk threshold value is creating an acceptable balance between lost sales and lost revenue. The retailer can determine (at 96) whether to adjust the risk threshold value based on past payment processing. If the retailer has accepted a number of unfinanced payments that resulted in lost revenue, the retailer can raise the risk threshold value so that only checks from low-risk-score accounts are accepted. Alternatively, if the retailer has experienced a drop in sales and an increase in declined payments, the retailer can reduce the risk threshold value to accept more checks from high-risk-score accounts in an effort to increase sales. The retailer can keep the risk threshold value constant if the retailer feels that the risk threshold value is properly discriminating between high-risk-score accounts and low-risk-score accounts.
  • If the retailer decides to modify the risk threshold value, the retailer can set (at 90) the threshold value to a new value and can begin to process (at 92) payments using the new risk threshold value. If the retailer does not modify the risk threshold value, the retailer returns to processing (at 92) payments. In some embodiments, the retailer can adjust the risk threshold value at any time and as many times as warranted.
  • Other devices and applications in addition retailer or transaction provider applications and devices can access the scored negative files 16 and 66 to determine the financial stability of an account holder. For example, a credit card or credit issuing organization can use the scored negative files 16 or 66 to determine whether an account holder has been diligent in writing financed checks and can adjust a credit limit based on the risk score assigned to the account holder.
  • Although embodiments of the invention are described with respect to checking accounts, embodiments of the invention are not limited to specific types of financial accounts. Credit card accounts, savings accounts, and other financial accounts, for example, can utilize embodiments of the invention as described above. Checking accounts are used for illustrative purposes because negative files are traditionally used to validation check payments. It should also be understood that reference to “writing a check” or other similar phrases can include not only the physical writing of a check, but also using a debit card to make a point-of-sale purchase or to alter the financial account in any manner (such as by making an ATM withdrawal).
  • Various features and advantages of the invention are set forth in the following claims.

Claims (25)

1.-13. (canceled)
14. A method of adjusting a risk score for a financial account, the method comprising:
obtaining a plurality of characteristics regarding the financial account;
applying the plurality of characteristics to a decision tree to determine a first risk score;
storing the risk score and an identifier for the financial account in a storage location;
reviewing the plurality of characteristics when at least one of the plurality of characteristics changes;
re-applying the plurality of characteristics to the decision tree to determine a second risk score; and
updating the first risk score with the second risk score.
15. The method as claimed in claim 14, wherein the plurality of characteristics includes a number of returned payments.
16. The method as claimed in claim 14, wherein the plurality of characteristics includes a number of cleared payments.
17. The method as claimed in claim 14, wherein the plurality of characteristics includes an account balance.
18. The method as claimed in claim 14, wherein the plurality of characteristics includes a date of last activity.
19. The method as claimed in claim 14, wherein the plurality of characteristics includes a time duration for a returned payment.
20. The method as claimed in claim 14, and further comprising assigning one of thirty possible risk scores.
21. A method of adjusting a risk threshold value for the acceptance of unfinanced payments, the method comprising:
choosing a risk threshold value;
receiving a plurality of payments;
obtaining a risk score for each one of the plurality of payments;
determining an acceptance decision for each one of the plurality of payments by comparing the risk score for each one of the plurality of payments against the risk threshold value; and
adjusting the risk threshold value in order to adjust the risk level for the acceptance of unfinanced payments.
22. The method as claimed in claim 21, further comprising accepting a first quantity of the plurality of payments in which the risk score is less than the risk threshold value.
23. The method as claimed in claim 21, further comprising recording the acceptance decision for each one of the plurality of payments.
24. The method as claimed in claim 22, further comprising declining a second quantity of the plurality of payments in which the risk score is greater than the risk threshold value.
25. The method as claimed in claim 24, further comprising recording a third quantity of payments that are unfinanced.
26. The method as claimed in claim 25, wherein adjusting the risk threshold value in order to adjust the risk level for the acceptance of unfinanced payments includes evaluating the first quantity of payments, the second quantity of payments, and the third quantity of payments.
27. A system for assigning a risk score to a financial account, the system comprising:
an account information application configured to store characteristics regarding the financial account; and
a scoring application configured to obtain the characteristics, determine a risk score for the financial account, and store the risk score and an identifier of the financial account in a storage location.
28. The system as claimed in claim 27, wherein the scoring application is further configured to request characteristics regarding the financial account from the account information application.
29. The system as claimed in claim 27, wherein the account information application is further configured to transmit the characteristics to the scoring application.
30. The system as claimed in claim 27, wherein the scoring application is further configured to store the characteristics in the storage location.
31-46. (canceled)
47. A computer readable medium containing instructions for adjusting a risk threshold value, the instructions comprising:
setting a first risk threshold value;
obtaining a plurality of financial account identifiers for a plurality of payments associated with a plurality of transactions;
obtaining a risk score for each of the plurality of financial account identifiers;
determining an acceptance decision for each risk score by comparing each risk score against the first risk threshold value;
recording each acceptance decision and each associated transaction;
evaluating the acceptance decisions and the associated transactions; and
setting a second risk threshold value based on the accepted decisions and the associated transactions.
48. The computer readable medium as claimed in claim 47, further comprising instructions for recording a plurality of transactions associated with unfinanced payments.
49. A scored negative file configured to provide information regarding the activity of a financial account in order to validate a payment, the file comprising:
a plurality of financial account identifiers, wherein each financial account identifier includes a risk score specifying a predicted level of risk that an unfinanced payment will result for a particular financial account.
50. The scored negative file as claimed in claim 49, further comprising a plurality of characteristics for each one of the plurality of financial account identifiers.
51. The scored negative file as claimed in claim 50, wherein the plurality of characteristics define financial account activity.
52. The scored negative file as claimed in claim 50, wherein the characteristics are used to generate the risk score.
US13/296,713 2004-06-17 2011-11-15 Scored negative file system and method Abandoned US20120066132A1 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
US13/296,713 US20120066132A1 (en) 2004-06-17 2011-11-15 Scored negative file system and method

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US10/870,554 US8082207B2 (en) 2004-06-17 2004-06-17 Scored negative file system and method
US13/296,713 US20120066132A1 (en) 2004-06-17 2011-11-15 Scored negative file system and method

Related Parent Applications (1)

Application Number Title Priority Date Filing Date
US10/870,554 Continuation US8082207B2 (en) 2004-06-17 2004-06-17 Scored negative file system and method

Publications (1)

Publication Number Publication Date
US20120066132A1 true US20120066132A1 (en) 2012-03-15

Family

ID=35481799

Family Applications (2)

Application Number Title Priority Date Filing Date
US10/870,554 Expired - Fee Related US8082207B2 (en) 2004-06-17 2004-06-17 Scored negative file system and method
US13/296,713 Abandoned US20120066132A1 (en) 2004-06-17 2011-11-15 Scored negative file system and method

Family Applications Before (1)

Application Number Title Priority Date Filing Date
US10/870,554 Expired - Fee Related US8082207B2 (en) 2004-06-17 2004-06-17 Scored negative file system and method

Country Status (3)

Country Link
US (2) US8082207B2 (en)
CA (1) CA2571251A1 (en)
WO (1) WO2006009541A1 (en)

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20130006701A1 (en) * 2011-07-01 2013-01-03 International Business Machines Corporation Assessing and managing risks of service related changes based on dynamic context information
WO2014071263A1 (en) * 2012-11-01 2014-05-08 Double Check Solutions, Llc Financial measure of good action metric system
US10692057B1 (en) 2017-03-03 2020-06-23 Wells Fargo Bank, N.A. Prepayment validation by originator and beneficiary
US11144917B1 (en) 2021-02-26 2021-10-12 Double Check Solutions, Llc Alert management system with real-time remediation and integration with the exception originating system
US11615420B1 (en) 2022-07-08 2023-03-28 Double Check Solutions, Inc. Alert management system with real-time remediation and integration with the overdraft allowance originating system
US11935063B1 (en) 2022-07-08 2024-03-19 Double Check Solutions, Inc. Fraud alert management system with real-time remediation and integration with the originating system

Families Citing this family (40)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2000038095A2 (en) 1998-12-23 2000-06-29 The Chase Manhattan Bank System and method for integrating trading operations including the generation, processing and tracking of and trade documents
US8793160B2 (en) 1999-12-07 2014-07-29 Steve Sorem System and method for processing transactions
US7831467B1 (en) 2000-10-17 2010-11-09 Jpmorgan Chase Bank, N.A. Method and system for retaining customer loyalty
US20040236673A1 (en) 2000-10-17 2004-11-25 Eder Jeff Scott Collaborative risk transfer system
US8849716B1 (en) 2001-04-20 2014-09-30 Jpmorgan Chase Bank, N.A. System and method for preventing identity theft or misuse by restricting access
AU2002312381A1 (en) 2001-06-07 2002-12-16 First Usa Bank, N.A. System and method for rapid updating of credit information
US7266839B2 (en) 2001-07-12 2007-09-04 J P Morgan Chase Bank System and method for providing discriminated content to network users
US8020754B2 (en) 2001-08-13 2011-09-20 Jpmorgan Chase Bank, N.A. System and method for funding a collective account by use of an electronic tag
US7987501B2 (en) 2001-12-04 2011-07-26 Jpmorgan Chase Bank, N.A. System and method for single session sign-on
US20040122736A1 (en) 2002-10-11 2004-06-24 Bank One, Delaware, N.A. System and method for granting promotional rewards to credit account holders
US8301493B2 (en) 2002-11-05 2012-10-30 Jpmorgan Chase Bank, N.A. System and method for providing incentives to consumers to share information
US8306907B2 (en) 2003-05-30 2012-11-06 Jpmorgan Chase Bank N.A. System and method for offering risk-based interest rates in a credit instrument
US8175908B1 (en) 2003-09-04 2012-05-08 Jpmorgan Chase Bank, N.A. Systems and methods for constructing and utilizing a merchant database derived from customer purchase transactions data
US7401731B1 (en) 2005-05-27 2008-07-22 Jpmorgan Chase Bank, Na Method and system for implementing a card product with multiple customized relationships
US7925578B1 (en) 2005-08-26 2011-04-12 Jpmorgan Chase Bank, N.A. Systems and methods for performing scoring optimization
US7513418B2 (en) * 2005-12-20 2009-04-07 First Data Corporation Systems and methods for performing a simplified risk assessment
US20090006230A1 (en) 2007-06-27 2009-01-01 Checkfree Corporation Identity Risk Scoring
US20090132404A1 (en) * 2007-11-21 2009-05-21 Marie King Apportioning fraud liability
US8622308B1 (en) 2007-12-31 2014-01-07 Jpmorgan Chase Bank, N.A. System and method for processing transactions using a multi-account transactions device
US20110131131A1 (en) * 2009-12-01 2011-06-02 Bank Of America Corporation Risk pattern determination and associated risk pattern alerts
US8554631B1 (en) 2010-07-02 2013-10-08 Jpmorgan Chase Bank, N.A. Method and system for determining point of sale authorization
US8713684B2 (en) 2012-02-24 2014-04-29 Appthority, Inc. Quantifying the risks of applications for mobile devices
US8918881B2 (en) 2012-02-24 2014-12-23 Appthority, Inc. Off-device anti-malware protection for mobile devices
US20130339244A1 (en) * 2012-06-13 2013-12-19 Certegy Check Services, Inc. Methods and systems for check cashing risk analysis
US8819772B2 (en) * 2012-06-25 2014-08-26 Appthority, Inc. In-line filtering of insecure or unwanted mobile device software components or communications
US20190019246A1 (en) * 2013-02-01 2019-01-17 HelloWallet, LLC Systems and methods for assessing financial stability and preparedness
US9058626B1 (en) 2013-11-13 2015-06-16 Jpmorgan Chase Bank, N.A. System and method for financial services device usage
US10607226B2 (en) 2015-04-14 2020-03-31 Samsung Electronics Co., Ltd. System and method for fraud detection in a mobile device
WO2016167544A1 (en) * 2015-04-14 2016-10-20 Samsung Electronics Co., Ltd. Apparatus and method for fraud detection in a mobile device
US9823958B2 (en) 2016-02-08 2017-11-21 Bank Of America Corporation System for processing data using different processing channels based on source error probability
US10460296B2 (en) 2016-02-08 2019-10-29 Bank Of America Corporation System for processing data using parameters associated with the data for auto-processing
US10437778B2 (en) 2016-02-08 2019-10-08 Bank Of America Corporation Archive validation system with data purge triggering
US10437880B2 (en) 2016-02-08 2019-10-08 Bank Of America Corporation Archive validation system with data purge triggering
US9952942B2 (en) 2016-02-12 2018-04-24 Bank Of America Corporation System for distributed data processing with auto-recovery
US10067869B2 (en) 2016-02-12 2018-09-04 Bank Of America Corporation System for distributed data processing with automatic caching at various system levels
US10122889B1 (en) 2017-05-08 2018-11-06 Bank Of America Corporation Device for generating a resource distribution document with physical authentication markers
US10958422B2 (en) * 2017-06-01 2021-03-23 Cotiviti, Inc. Methods for disseminating reasoning supporting insights without disclosing uniquely identifiable data, and systems for the same
CN108805580A (en) * 2018-06-21 2018-11-13 上海银赛计算机科技有限公司 Account number analysis method, device and storage medium
US11538040B2 (en) * 2020-02-12 2022-12-27 Jpmorgan Chase Bank, N.A. Systems and methods for account validation
CN111768290A (en) * 2020-06-23 2020-10-13 中国工商银行股份有限公司 Method and device for determining risk weight coefficient of service

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6119103A (en) * 1997-05-27 2000-09-12 Visa International Service Association Financial risk prediction systems and methods therefor
US6581043B1 (en) * 1999-12-29 2003-06-17 First Data Corporation Routing number variable and indexes
US6783065B2 (en) * 2001-03-12 2004-08-31 First Data Corporation Purchasing card transaction risk model
US7165045B1 (en) * 1999-05-19 2007-01-16 Miral Kim-E Network-based trading system and method
US7209924B2 (en) * 2002-06-28 2007-04-24 Microsoft Corporation System and method for handling a continuous attribute in decision trees

Family Cites Families (85)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
USRE30580E (en) 1961-04-12 1981-04-14 Telecredit, Inc. Check authorization system
US4187498A (en) 1975-10-06 1980-02-05 1St National Bank Check verification system
US4460604A (en) 1976-06-03 1984-07-17 The Upjohn Company 4-Amino-4-aryl-cyclohexanones
US4319336A (en) 1979-02-02 1982-03-09 International Business Machines Corporation Transaction execution system with improved key function versatility
US4326259A (en) 1980-03-27 1982-04-20 Nestor Associates Self organizing general pattern class separator and identifier
US4376978A (en) 1980-07-29 1983-03-15 Merrill Lynch Pierce, Fenner & Smith Securities brokerage-cash management system
US4346442A (en) 1980-07-29 1982-08-24 Merrill Lynch, Pierce, Fenner & Smith Incorporated Securities brokerage-cash management system
US4774663A (en) 1980-07-29 1988-09-27 Merrill Lynch, Pierce, Fenner & Smith Incorporated Securities brokerage-cash management system with short term investment proceeds allotted among multiple accounts
US4597046A (en) 1980-10-22 1986-06-24 Merrill Lynch, Pierce Fenner & Smith Securities brokerage-cash management system obviating float costs by anticipatory liquidation of short term assets
MX155784A (en) 1981-01-16 1988-04-29 Salomon Frid Ran IMPROVEMENTS IN FINANCIAL DOCUMENT PROTECTION DEVICE
US4463250A (en) 1981-07-11 1984-07-31 Mcneight David L Method and apparatus for use against counterfeiting
JPS59153261A (en) 1983-02-18 1984-09-01 Omron Tateisi Electronics Co Transaction processor
US5025138A (en) 1984-02-27 1991-06-18 Vincent Cuervo Method and system for providing verifiable line of credit information
US4718009A (en) 1984-02-27 1988-01-05 Default Proof Credit Card System, Inc. Default proof credit card method system
US4851994A (en) 1984-08-03 1989-07-25 Sharp Kabushiki Kaisha Data I/O terminal equipment having mode setting functions for downloading various specified application programs from a host computer
US4727243A (en) 1984-10-24 1988-02-23 Telenet Communications Corporation Financial transaction system
US4868866A (en) 1984-12-28 1989-09-19 Mcgraw-Hill Inc. Broadcast data distribution system
US4736294A (en) 1985-01-11 1988-04-05 The Royal Bank Of Canada Data processing methods and apparatus for managing vehicle financing
US4812628A (en) 1985-05-02 1989-03-14 Visa International Service Association Transaction system with off-line risk assessment
US4734564A (en) 1985-05-02 1988-03-29 Visa International Service Association Transaction system with off-line risk assessment
US4672243A (en) * 1985-05-28 1987-06-09 American Telephone And Telegraph Company, At&T Bell Laboratories Zero standby current TTL to CMOS input buffer
US4774664A (en) 1985-07-01 1988-09-27 Chrysler First Information Technologies Inc. Financial data processing system and method
US4672377A (en) 1985-09-09 1987-06-09 Murphy Arthur J Check authorization system
US4804825A (en) 1986-06-17 1989-02-14 Casio Computer Co., Ltd. I C card system
US5053607A (en) 1986-10-06 1991-10-01 Carlson Steven R Point-of-sale device particularly adapted for processing checks
US4758714A (en) 1986-10-06 1988-07-19 Carlson Steven R Point-of-sale mechanism
US4943707A (en) 1987-01-06 1990-07-24 Visa International Service Association Transaction approval system
US4870259A (en) 1987-01-06 1989-09-26 Visa International Service Association Transaction approval system
US4953085A (en) 1987-04-15 1990-08-28 Proprietary Financial Products, Inc. System for the operation of a financial account
US5210687A (en) 1987-04-16 1993-05-11 L & C Family Partnership Business transaction and investment growth monitoring data processing system
US4989141A (en) 1987-06-01 1991-01-29 Corporate Class Software Computer system for financial analyses and reporting
US4810866A (en) 1987-08-07 1989-03-07 Lord Jr Miles Check validation/check writing system
US4872113A (en) 1987-08-27 1989-10-03 Jbs Associates, Inc. Credit check scanner data analysis system
US5276608A (en) 1988-04-05 1994-01-04 Sharp Kabushiki Kaisha Information processing system for teller machine for correcting registered transactions
JPH01255993A (en) 1988-04-05 1989-10-12 Sharp Corp Cash register
JPH0219963A (en) 1988-07-08 1990-01-23 Hitachi Ltd Method and system for monitoring real time state
US8700458B2 (en) 1989-05-01 2014-04-15 Catalina Marketing Corporation System, method, and database for processing transactions
US5201010A (en) 1989-05-01 1993-04-06 Credit Verification Corporation Method and system for building a database and performing marketing based upon prior shopping history
US5307481A (en) 1990-02-28 1994-04-26 Hitachi, Ltd. Highly reliable online system
US5023782A (en) 1990-03-26 1991-06-11 Mastercard International Inc. Travelers cheque transaction terminal
US5262941A (en) 1990-03-30 1993-11-16 Itt Corporation Expert credit recommendation method and system
US5231569A (en) 1990-06-12 1993-07-27 Sears Payment Systems, Inc. Account transaction system
EP0468229A3 (en) 1990-07-27 1994-01-26 Hnc Inc A neural network with expert system functionality
JP2507164B2 (en) * 1990-10-04 1996-06-12 三菱電機株式会社 Semiconductor memory device
US5325298A (en) 1990-11-07 1994-06-28 Hnc, Inc. Methods for generating or revising context vectors for a plurality of word stems
US5177342A (en) 1990-11-09 1993-01-05 Visa International Service Association Transaction approval system
US5231570A (en) 1990-12-11 1993-07-27 Lee Gerritt S K Credit verification system
US5175682A (en) 1990-12-14 1992-12-29 Verifone, Inc. Check system and method including prioritizing checks for transmission to banks for processing
US5274547A (en) 1991-01-03 1993-12-28 Credco Of Washington, Inc. System for generating and transmitting credit reports
US5323315A (en) 1991-08-02 1994-06-21 Vintek, Inc. Computer system for monitoring the status of individual items of personal property which serve as collateral for securing financing
US5239462A (en) 1992-02-25 1993-08-24 Creative Solutions Groups, Inc. Method and apparatus for automatically determining the approval status of a potential borrower
US5384449A (en) 1992-04-28 1995-01-24 Visa International Service Association Authorization matching system
US5446885A (en) 1992-05-15 1995-08-29 International Business Machines Corporation Event driven management information system with rule-based applications structure stored in a relational database
JPH05342191A (en) 1992-06-08 1993-12-24 Mitsubishi Electric Corp System for predicting and analyzing economic time sequential data
US5819226A (en) 1992-09-08 1998-10-06 Hnc Software Inc. Fraud detection using predictive modeling
US5361201A (en) 1992-10-19 1994-11-01 Hnc, Inc. Real estate appraisal using predictive modeling
US5479573A (en) 1992-11-24 1995-12-26 Pavilion Technologies, Inc. Predictive network with learned preprocessing parameters
US5350906A (en) 1992-11-25 1994-09-27 Brody Bill E Currency transfer system and method using fixed limit cards
US5326960A (en) 1992-11-25 1994-07-05 Tannenbaum David H Currency transfer system and method
GB9323489D0 (en) 1993-11-08 1994-01-05 Ncr Int Inc Self-service business system
US5797133A (en) 1994-08-31 1998-08-18 Strategic Solutions Group, Inc Method for automatically determining the approval status of a potential borrower
US5717923A (en) 1994-11-03 1998-02-10 Intel Corporation Method and apparatus for dynamically customizing electronic information to individual end users
US5679938A (en) * 1994-12-02 1997-10-21 Telecheck International, Inc. Methods and systems for interactive check authorizations
US5732400A (en) 1995-01-04 1998-03-24 Citibank N.A. System and method for a risk-based purchase of goods
US5649116A (en) 1995-03-30 1997-07-15 Servantis Systems, Inc. Integrated decision management system
US5719918A (en) 1995-07-06 1998-02-17 Newnet, Inc. Short message transaction handling system
US5862223A (en) 1996-07-24 1999-01-19 Walker Asset Management Limited Partnership Method and apparatus for a cryptographically-assisted commercial network system designed to facilitate and support expert-based commerce
US6164528A (en) 1996-12-31 2000-12-26 Chequemark Patent, Inc. Check writing point of sale system
US6018723A (en) 1997-05-27 2000-01-25 Visa International Service Association Method and apparatus for pattern generation
EP1080415B1 (en) * 1998-05-21 2017-01-18 Equifax Inc. System and method for authentication of network users
US6647376B1 (en) 1998-10-09 2003-11-11 Henry C. Farrar System and method for point-of-sale check authorization
US7110970B2 (en) 1999-12-30 2006-09-19 Ge Capital Commercial Finance, Inc. Methods and apparatus for rapid deployment of a valuation system
US7263506B2 (en) * 2000-04-06 2007-08-28 Fair Isaac Corporation Identification and management of fraudulent credit/debit card purchases at merchant ecommerce sites
US20020178112A1 (en) 2000-08-14 2002-11-28 Visa International Service Association Point of sale check service
US20020040344A1 (en) 2000-10-04 2002-04-04 Preiser Randall F. Check guarantee, verification, processing, credit reports and collection system and method awarding purchase points for usage of checks
US6862573B2 (en) 2001-03-22 2005-03-01 Clear Technology, Inc. Automated transaction management system and method
US20030130919A1 (en) * 2001-11-20 2003-07-10 Randy Templeton Systems and methods for selectively accessing financial account information
US7698182B2 (en) * 2002-04-29 2010-04-13 Evercom Systems, Inc. Optimizing profitability in business transactions
US7383227B2 (en) * 2002-05-14 2008-06-03 Early Warning Services, Llc Database for check risk decisions populated with check activity data from banks of first deposit
US20030217014A1 (en) 2002-05-17 2003-11-20 Cassandra Mollett Systems and methods for storing and using phone number validations
US7386503B2 (en) 2002-06-18 2008-06-10 First Data Corporation Profitability evaluation in transaction decision
CA2436319C (en) 2002-08-02 2014-05-13 Calin A. Sandru Payment validation network
US7003493B2 (en) 2003-01-22 2006-02-21 First Data Corporation Direct payment with token
US20050125338A1 (en) * 2003-12-09 2005-06-09 Tidwell Lisa C. Systems and methods for assessing the risk of a financial transaction using reconciliation information
US20060136329A1 (en) * 2004-12-21 2006-06-22 Daniel Ahles Systems and methods for processing promissory transactions as debit transactions

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6119103A (en) * 1997-05-27 2000-09-12 Visa International Service Association Financial risk prediction systems and methods therefor
US7165045B1 (en) * 1999-05-19 2007-01-16 Miral Kim-E Network-based trading system and method
US6581043B1 (en) * 1999-12-29 2003-06-17 First Data Corporation Routing number variable and indexes
US6783065B2 (en) * 2001-03-12 2004-08-31 First Data Corporation Purchasing card transaction risk model
US7209924B2 (en) * 2002-06-28 2007-04-24 Microsoft Corporation System and method for handling a continuous attribute in decision trees

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20130006701A1 (en) * 2011-07-01 2013-01-03 International Business Machines Corporation Assessing and managing risks of service related changes based on dynamic context information
WO2014071263A1 (en) * 2012-11-01 2014-05-08 Double Check Solutions, Llc Financial measure of good action metric system
US10692057B1 (en) 2017-03-03 2020-06-23 Wells Fargo Bank, N.A. Prepayment validation by originator and beneficiary
US11568374B1 (en) 2017-03-03 2023-01-31 Wells Fargo Bank, N.A. Prepayment validation by originator and beneficiary
US11144917B1 (en) 2021-02-26 2021-10-12 Double Check Solutions, Llc Alert management system with real-time remediation and integration with the exception originating system
US11610200B2 (en) 2021-02-26 2023-03-21 Double Check Solutions, Llc Alert management system with real-time remediation and integration with the exception originating system
US11615420B1 (en) 2022-07-08 2023-03-28 Double Check Solutions, Inc. Alert management system with real-time remediation and integration with the overdraft allowance originating system
US11935063B1 (en) 2022-07-08 2024-03-19 Double Check Solutions, Inc. Fraud alert management system with real-time remediation and integration with the originating system

Also Published As

Publication number Publication date
CA2571251A1 (en) 2006-01-26
WO2006009541A1 (en) 2006-01-26
US20050283429A1 (en) 2005-12-22
US8082207B2 (en) 2011-12-20

Similar Documents

Publication Publication Date Title
US8082207B2 (en) Scored negative file system and method
CA2436319C (en) Payment validation network
US8534551B2 (en) System and method for issuing digital receipts for purchase transactions over a network
US7346575B1 (en) Systems and methods for selectively delaying financial transactions
US7337953B2 (en) Negotiable instrument authentication systems and methods
USRE40220E1 (en) Check writing point of sale system
US20120330819A1 (en) System and method for locating and accessing account data
US20030135457A1 (en) Method and apparatus for providing online financial account services
US20120317013A1 (en) Computer-Implemented Systems And Methods For Scoring Stored Enterprise Data
US20040128240A1 (en) Method and system for managing financial transactions
US20070106558A1 (en) System and method of automatic insufficient funds notification and overdraft protection
US20050097019A1 (en) Method and system for validating financial instruments
US20160196605A1 (en) System And Method To Search And Verify Borrower Information Using Banking And Investment Account Data And Process To Systematically Share Information With Lenders and Government Sponsored Agencies For Underwriting And Securitization Phases Of The Lending Cycle
US20120317027A1 (en) Computer-Implemented Systems And Methods For Real-Time Scoring Of Enterprise Data
WO2001039589A2 (en) Method and apparatus for providing online financial account services
US20120317008A1 (en) Computer-Implemented Systems And Methods For Handling And Scoring Enterprise Data
US7575154B2 (en) System and method for issuing and managing a plurality of credit card accounts
US20030163417A1 (en) Methods and systems for processing transaction requests
US7020639B1 (en) Check verification system and method
US20030115135A1 (en) Method and apparatus for recording transactions
US20030187778A1 (en) Merchant application and underwriting systems and methods
CA2555265A1 (en) Account-owner verificaton database
KR20090036623A (en) System and method for processing realtime payment transaction using a cash card and recording medium
JP3624807B2 (en) Account information management method, recording medium recording the program, and account information management system
EP1096437A2 (en) Check verification system and method

Legal Events

Date Code Title Description
AS Assignment

Owner name: CARD-MONROE CORP., TENNESSEE

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:MATHEWS, RICKY E.;REEL/FRAME:033046/0065

Effective date: 20140605

STCB Information on status: application discontinuation

Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION