US20080091545A1 - System and method for detecting fraudulent use of stored value instruments - Google Patents

System and method for detecting fraudulent use of stored value instruments Download PDF

Info

Publication number
US20080091545A1
US20080091545A1 US11/956,250 US95625007A US2008091545A1 US 20080091545 A1 US20080091545 A1 US 20080091545A1 US 95625007 A US95625007 A US 95625007A US 2008091545 A1 US2008091545 A1 US 2008091545A1
Authority
US
United States
Prior art keywords
stored
request
value instrument
value
identifier
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
US11/956,250
Inventor
Kenneth Jennings
John McDonough
Peter Pridgeon
Keith Newbrough
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
First Data Corp
Original Assignee
First Data Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by First Data Corp filed Critical First Data Corp
Priority to US11/956,250 priority Critical patent/US20080091545A1/en
Assigned to FIRST DATA CORPORATION reassignment FIRST DATA CORPORATION ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: NEWBROUGH, KEITH, JENNINGS, KENNETH E., JR., MCDONOUGH, JOHN K., PRIDGEON, PETER A.
Publication of US20080091545A1 publication Critical patent/US20080091545A1/en
Abandoned legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/401Transaction verification
    • G06Q20/4016Transaction verification involving fraud or risk level assessment in transaction processing
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/08Payment architectures
    • G06Q20/20Point-of-sale [POS] network systems
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists

Definitions

  • This application relates generally to stored-value instruments. More specifically, this application relates to methods and systems for detecting fraudulent use of stored value cards.
  • Pre-paid metered accounts associated with debits cards are well-known for providing access to goods and services.
  • gift cards may be purchased from various merchants such as Target®, Wal-Mart®, Starbucks®, Sears®, Blockbuster®, and the like.
  • Pre-paid debit cards are also frequently purchased for telephone services.
  • the purchase and usage of pre-paid debit cards has continued to increase in recent years to the point that the sale of pre-paid debit cards today is a multi-billion dollar industry.
  • Pre-paid cards, such as gift cards issued by a merchant are advantageous to the merchant because customers using them are more likely to shop the merchant and also more likely to spend beyond the initial value of the gift card.
  • Other prepaid cards may be issued by a bank or money transfer office, and may be used like a credit card to make purchases, up to the balance maintained within the card account.
  • pre-paid debit cards are printed and issued with a predetermined value and balance, and typically sold as a retail item.
  • An example of one such a card is a pre-paid gift card which provides an individual with a set dollar amount for the purchase of goods from a particular merchant.
  • a gift card may be printed without a predetermined value, but when it is purchased and activated the customer pays for the amount of money to be “loaded” onto the card.
  • Clearinghouse arrangements have been set up to handle gift card accounts on behalf of merchants.
  • ValueLink L.L.C.
  • a unit of First Data Corporation provides database services that merchants may access for activating and maintaining gift card accounts.
  • the card is electronically read (e.g., by reading a magnetic stripe and/or printed bar code on the card) by the merchant to activate the account at the database.
  • the card is used to make purchases (redemptions) by reading the card at the time of purchase and debiting the purchase amount from the account.
  • stored-value cards have become increasingly popular among consumers.
  • the steadily increasing demand for such cards, in the form of prepaid gift cards and other types of stored-value cards, has resulted in an increased number of merchants offering stored-value cards for sale.
  • This success in marketing stored-value cards has, however, spawned a variety of fraudulent practices related to these cards.
  • the present invention provides systems and methods for detecting the unauthorized or fraudulent use of stored-value instruments.
  • a method for detecting potential unauthorized or fraudulent use of a stored value instrument generally comprise: receiving at least one request related to at least one stored value instrument identifier; compiling predetermined information concerning the request based on the type of request made; processing the compiled information through a predetermined rule set to thereby determine whether there is a likelihood of potential unauthorized or fraudulent use of the at least one stored value instrument based on the predetermined rule set; and setting a flag if potentially unauthorized or fraudulent use of a stored-value instrument is detected in accordance with the predetermined rule set.
  • the flagging may result in a hold being placed on the stored-value instrument identifier or deactivation of the stored-value identifier.
  • the flag may result in the source of the request being blocked from making further requests.
  • the rule set may comprise: (i) no more than a predetermined, selectable number of balance inquiries related to a single stored-value instrument identifier during a predetermined, selectable period of time; (ii) no more than a predetermined, selectable number of balance inquiries from a single ANI designation or IP address during a predetermined, selectable period of time; (iii) no more than a predetermined, selectable number of transactions of a predetermined, selectable value in a predetermined, selectable geographic locale during a predetermined, selectable period of time; (iv) no more than a predetermined, selectable number of transaction requests related to an inactive stored-value instrument identifier; (v) no more than a predetermined, selectable number of transaction requests related to a stored-value instrument identifier associated with a zero balance; (vi) no more than a predetermined, selectable number of transaction requests related to a single stored-value instrument identifier from POS terminals during a predetermined, selectable period of time; and (vii
  • Systems of the invention generally comprise: means for receiving at least one request related to at least one stored-value instrument identifier number; means for capturing predetermined information concerning the at least one request based on the type of request made; a database comprising a predetermined rule set useful to determine whether there is a likelihood of potential unauthorized or fraudulent use of the at least one stored value instrument based on the predetermined rule set; and means for setting a flag if potential unauthorized or fraudulent use of the stored-value instrument is detected in accordance with the predetermined rule set.
  • the means for receiving at least one request may be an automated telephone balance inquiry system, an on-line balance inquiry system, a POS terminal, or a combination thereof.
  • the means for capturing information may comprise ANI, IP address capture, and combinations thereof.
  • the means for flagging may comprise a database comprising the captured information related to the request, and the flag may comprise a data flag set in the database if potential unauthorized or fraudulent use of a stored-value instrument is detected in accordance with the predetermined rule set.
  • FIG. 1A illustrates a typical point-of-service (POS) type system for use in connection with the present invention.
  • POS point-of-service
  • FIG. 1B illustrates an exemplary system in accordance with the present invention.
  • FIG. 2 illustrates an exemplary method in accordance with the present invention.
  • FIG. 3 illustrates an exemplary instrument-authority system of the invention.
  • a stored-value instrument can be any instrument (tangible or intangible) that may be associated with a debit account and/or may otherwise be presented for payment for goods and/or services, used to transfer money, etc.
  • Particular embodiments of stored-value instruments comprise stored-value cards, which may have a form factor similar to that of credit cards, etc.
  • stored-value instruments such as cards may be packaged in a manner described in detail in U.S. patent application Ser. No. 10/665,984, filed Sep. 19, 2003 by McGee et al. and entitled “Financial Presentation Instruments with Integrated Holder and Methods for Use,” the entire disclosure of which is incorporated herein by reference.
  • a stored-value instrument will generally comprise some form of identifier, which may be sufficient to uniquely identify the stored-value instrument.
  • a stored-value instrument may comprise a magnetic stripe and/or a bar code.
  • the stored-value identifier which might be a serial number and/or other string of text and/or numbers, then, might be encoded onto the magnetic stripe and/or represented by the bar code.
  • Those skilled in the art will appreciate the variety of methods that can be used to encode/decode a magnetic stripe and/or translate a bar code. Further, those skilled in the art will appreciate that there are a number of ways known in the art to store information associated with a stored value instrument, and any of them may be used as appropriate to store the first and/or second identifiers.
  • the first and/or second identifier may be stored in various ways (such as RFID tag or chips embedded in the card, holograms, etc.) and/or any appropriate scanner, RFID reader and/or hardware may be used to obtain and/or input the first and/or second identifier. Bar codes, track data, account information, etc. may also be printed on the card, as known in the art.
  • the stored-value instrument may comprise both a magnetic stripe and a bar code.
  • the magnetic stripe may be used to store a first identifier (such as an account number associated with the instrument and/or the like), which may also be printed, embossed, etc. on the instrument.
  • the bar code may represent a second identifier, which may have some relation to the first identifier, or may incorporate a personal account number, a personal identification number, etc.
  • the bar code may be a Code 128 bar code known in the art.
  • the identifier may also be encrypted.
  • the encrypted value representing the identifier can be derived using any appropriate technique, of which many are known in the art.
  • An exemplary technique may comprise 3DES encryption.
  • a stored-value instrument identifier can be any single identifier or combination of identifiers, such as a first identifier, second identifier, etc., or any combination thereof.
  • FIG. 1A An overview of a typical point-of-sale (POS) system that may be used to activate or perform certain transaction requests utilizing stored-value instruments is illustrated schematically in FIG. 1A .
  • Other systems are described in U.S. patent application Ser. No. 10/405,043, filed Sep. 26, 2003 by McGee et al. and entitled “Methods and Systems for Processing Unrestricted Stored-Value Instruments,” the entire disclosure of which is incorporated herein by reference.
  • the invention is not so limited, and any known systems may be used in connection with the present invention, as understood by those skilled in the art.
  • a stored-value instrument may be purchased by a purchaser 102 at a merchant location 112 .
  • Each merchant location 112 may include one or more point-of-sale (POS) terminals 108 having a capacity for reading information from the stored-value instrument.
  • POS terminal 108 may be configured for interacting with an instrument-authority system 140 via a network 104 , optionally through a host system 116 configured to interface directly with each of the POS terminals 108 at a particular merchant location 112 .
  • the host system 116 may be configured to perform the functions attributed herein to the instrument-authority system.
  • the host system 116 may be omitted and/or the instrument-authority system 140 may be configured to communicate directly with the point-of-sale terminals 108 via a network 104 ).
  • the network 114 may comprise a wired, wireless, modern, and/or other type of interfacing connection (e.g., internet, telephony, etc.) and permits data to be exchanged between the host system 116 , instrument-authority system 140 , point-of-sale terminals 108 , etc.
  • POS devices that include multiple capabilities are provided in the following commonly assigned applications, the entire disclosures of which are incorporated herein by reference for all purposes: U.S. Prov. Pat. Appl. No. 60/147,889, entitled “Integrated Point Of Sale Device,” filed Aug. 9, 1999 by Randy J. Templeton et al.; U.S. patent application Ser. No. 09/634,901, entitled “Point Of Sale Payment System,” filed Aug. 9, 2000 by Randy J. Templeton et al.; U.S. patent application Ser. No. 10/116,689, entitled “Systems And Methods For Performing Transactions At A Point-Of-Sale,” filed Apr. 3, 2002 by Eamey Stoutenburg et al.; U.S. patent application Ser.
  • the instrument-authority system 140 illustrated in FIG. 1A may be adapted to detect potential unauthorized or fraudulent use of the stored-value instruments as described in further detail below.
  • the instrument-authority system may comprise or be in communication with a database that includes a predetermined rule set designed to detect potential unauthorized or fraudulent use of stored-value instruments.
  • system 100 can be implemented in a network environment (generally indicated by reference number 104 ).
  • Network 104 can be any network capable of supporting communication between different computing devices.
  • network 104 could be a local area network, an intra-network, the internet and/or any other telecommunications network, a wireless network and the like.
  • Exemplary system 100 comprises an instrument-authority system 140 in communication with at least one request means, e.g., 106 , 108 , 110 , perhaps through network 104 .
  • request means 106 may, for example, be an automated telephone inquiry system which may be used to make automated balance and transaction inquiries for stored-value instruments. Suitable automated telephone inquiry systems include known interactive voice recognition (IVR) systems known in the art.
  • request means 108 may, for example, be a POS terminal.
  • request means 110 may, for example, be a computer connected via a network, e.g., the internet, to an automated inquiry system which may be used to make automated balance and transaction inquiries for stored-value instruments.
  • request means 110 may be back-office software, batch files processes , mainframe processes, etc.
  • Instrument-authority system 140 may generally be configured as a server, however, it is understood that it may be any device that includes a processor and is capable of reading input data, processing the data in accordance with a predetermined rule set, and writing output data, as described in further detail in the embodiments below.
  • instrument-authority system 140 can be a mainframe computer such as an IBMTM System/390TM, a mid range system such as an IBMTM AS/400TM, and/or server running a UNIXTM or UNIX-like operating system (including, for example, AIXTM, SolarisTM, and/or LinuxTM).
  • instrument-authority system 140 can be a personal computer, perhaps running one of a variety of MicrosoftTM operating systems, and/or can be an AppleTM computer.
  • instrument-authority system 140 may be a specifically configured, stand-alone unit for on-site merchant use.
  • system 100 also includes one or more databases 118 , 120 , 122 , 124 , etc. which can be used to store a variety of information related to the inventive methods discussed herein.
  • databases 118 , 120 , 122 , 124 are illustrated separately on FIG. 1B , other embodiments of the invention might incorporate all of the stored data within a single database and/or organize data structures differently than as illustrated herein.
  • databases 118 , 120 , 122 , 124 may alternatively be housed within instrument-authority system 140 (as indicated by the dashed line in FIG. 1B ).
  • instrument-authority system 140 including or comprising a database
  • the database may be within the computer housing itself, or may be a separate structure in communication with instrument-authority system 140 .
  • databases 118 , 120 , 122 , 124 may be pushed and/or pulled from the bus, allowing for data acquisition from a wide variety of sources.
  • Databases 118 , 120 , 122 , 124 can be in communication with instrument-authority system 140 either through network 104 (as illustrated on FIG. 1B ), through direct communication (e.g., SCSI connection, etc.) and/or through any other method known in the art, so long as instrument-authority system 140 can access the information stored within databases 118 , 120 , 122 , 124 .
  • databases 118 , 120 , 122 , 124 may comprise various combinations of data, predetermined rule sets, instructions, etc. for use in connection with the methods of the present invention.
  • databases 118 , 120 , 122 , 124 may comprise captured information concerning stored-value instrument identifiers, date and time of requests, request types, request mode, geographic location of request POS identifier, automatic number identification (ANI) designations, internet protocol (IP) address information, predetermined rule set definitions, “flag” status associated with a stored-value instrument identifier, ANI designation or IP address, etc.
  • database 118 , 120 , 122 , 124 can be incorporated within a software package, and instrument-authority system 140 can be configured to interface with such software package in order to assess the information stored in the database(s).
  • instrument-authority system 140 might interface with database 118 , 120 , 122 , 124 .
  • instrument-authority system 140 can access information in database 118 , 120 , 122 , 124 on a periodic basis or on demand.
  • Various standardized (e.g., OOBC, SQL, XML, etc.) and/or proprietary data access methodologies known in the art may be used to access databases 118 , 120 , 122 , 124 .
  • data may either be pushed from a database or “pulled” by instrument-authority system 140 .
  • databases 118 , 120 , 122 , 124 and/or instrument-authority system 140 can engage in a practice known in the art as “push-pull” data warehousing, whereby information can be shared with and/or pulled from another source.
  • data warehousing can be done within an enterprise or between multiple enterprises and can be performed using any of a variety of methods known to those skilled in the art including, merely by way of example, XML data transfers.
  • embodiments of the present invention as discussed above, can interface with an information bus operation on an intra-company or inter-company basis, and can both pull information from that bus and push information to the information bus.
  • systems in accordance with embodiments of the invention can easily integrate with other data management systems in the provider's network, for example by utilizing the information bus methodology described briefly herein and known to those skilled in the art.
  • system 100 can include a computing device 132 that can be in communication with instrument-authority system 140 and that can be used, inter alia, to provide configuration and operational instructions to instrument-authority system 140 .
  • Computing device 132 can be any device known in the art that is capable of communicating with instrument-authority system 140 , including, for example, a personal computer (perhaps running a MicrosoftTM and/or AppleTM operating system), a personal digital assistant, a mini-computer, a workstation, a cell phone, and/or the like.
  • Communication with instrument-authority system 140 can be through network 104 as illustrated in FIG. 1B , or alternatively, can be through some other means of communication including wireless communication, direct connection and the like.
  • Device 132 can be used to add, delete and/or modify any of the information contained within databases 118 , 120 , 122 , 124 .
  • device 132 can be used to add, delete, or modify rule set parameters stored in one or more databases 118 , 120 , 122 , 124 .
  • databases 118 , 120 , 122 , 124 will be populated automatically, e.g., via an information bus, through the activities of other software applications or data capture services, as described below.
  • methods for detecting potential unauthorized or fraudulent use of stored-value instruments are provided.
  • the methods generally involve processing request activity through a predetermined rule set to ascertain whether the activity is potentially unauthorized or fraudulent.
  • the methods of the invention allow for real-time monitoring of request activity for potentially unauthorized or fraudulent use of stored-value instruments.
  • instrument-authority system 140 may monitor activity via request means 106 , 108 , 110 , etc. and flag potentially unauthorized or fraudulent activity. Certain embodiments will be discussed in more detail below with reference to FIG. 2 .
  • Block 210 at least one request related to at least one stored-value instrument identifier is received via, e.g., request means 106 , 108 , 110 , etc. Based on the type of request, certain predetermined information is captured at Block 220 and compiled at Block 240 in one or more databases (e.g., database 118 , 120 , etc.).
  • databases e.g., database 118 , 120 , etc.
  • the predetermined information may be captured at Block 220 in any suitable manner known in the art, depending on the type of information to be captured, e.g., automatic number identification (ANI), internet protocol (IP) address identification, POS terminal identification, etc. Further, depending on the type of request, the information which is captured at Block 220 and compiled at Block 240 may include any combination of: stored-value instrument identifier, date of request, time of request, request type (e.g., balance inquiry, debit request, purchase request, deposit request, etc.), mode of request (e.g., automated inquiry system via telephone, internet, POS, etc.), geographic location, POS identifier, ANI designation, IP address, etc.
  • ANI automatic number identification
  • IP internet protocol
  • POS terminal identification e.g., etc.
  • the information which is captured at Block 220 and compiled at Block 240 may include any combination of: stored-value instrument identifier, date of request, time of request, request type (e.g., balance inquiry, debit request, purchase request, deposit request,
  • the at least one request may relate to a single stored-value instrument identifier, or there may be a plurality of requests that relate to a plurality of stored-value instrument identifiers.
  • the stored-value instrument identifiers may be in sequential order, and the requests may be received in a predetermined period of time, or from a single source, e.g., a single ANI designation, IP address, or POS terminal.
  • instrument-authority system 140 processes the information compiled at Block 240 through a predetermined rule set stored in one or more databases (e.g., database 122 , etc.) to evaluate, optionally in real-time, whether the request(s) received at Block 210 is potentially unauthorized or fraudulent. If determined to be potentially unauthorized or fraudulent activity at Block 260 , instrument-authority system 140 sets a “flag” at Block 280 in one or more databases (e.g., database 124 , etc.).
  • databases e.g., database 122 , etc.
  • optional steps may be taken at Block 285 to minimize the potential unauthorized or fraudulent use of stored-value instruments.
  • Such optional steps may include, e.g., blocking a flagged ANI designation or IP address from further access to an automated request system; placing a hold on a stored-value instrument identifier; deactivating a stored-value identifier; initiating a fraud watch or investigation associated with a flagged ANI designation, IP address or stored-value instrument identifier; or transmitting a message or message code to the point of origination of the request(s) at Block 210 indicating that the stored-value instrument requires verification and/or authentication.
  • suitable rules for use at Block 260 include (i) no more than a selectable number of balance inquiries related to a single stored-value instrument identifier during a selectable period of time; (ii) no more than a selectable number of balance inquiries from a single automatic number identification (ANI) designation or internet protocol (IP) address during a selectable period of time; (iii) no more than a selectable number of transactions of a selectable value in a selectable geographic locale; (iv) no more than a selectable number of transaction requests related to an inactive stored-value instrument identifier; (v) no more than a selectable number of transaction requests related to a stored-value instrument identifier associated with a zero balance; (vi) no more than a selectable number of transaction requests related to a single stored-value instrument identifier from PCS terminals during a selectable period of time; and (vii) no more than a selectable number of activation requests related to a single stored-value instrument identifier.
  • the selectable parameters may be
  • no more than 1 - 10 , 3 - 10 , 1 - 5 , 3 - 5 , 3 , etc. balance inquires; or no more than 1 - 10 , 3 - 10 , 1 - 5 , 3 - 5 , 3 , etc. transactions of a $1, $2, $3, etc. amount or related to an inactive, zero balance, or single stored-value instrument identifier.
  • Exemplary selectable periods of time include 1 hour, 2 hours, 3 hours, 4 hours, 5 hours, 6 hours, 12 hours, 24 hours, 48 hours, etc.
  • Exemplary geographic locales include 1 mile, 2 miles, 3 miles, 4 miles, 5 miles, 10 miles, 25 miles, etc.
  • a selectable parameter within the rule set is the type of request to monitor or process through the rule set. For instance, if desired, only requests originating from the IVR, POS, internet, batch files, back-office, or any combination thereof, may be monitored. Further, if desired, only requests originating from selected IVR, POS, etc. locations may be monitored (e.g., unmanned POS locations). By way of example, requests from the IVR and internet may be monitored, but not POS, or alternatively any combination of: one POS only, all (POS, internet, BATCH, Back-office), some (IVR and POS), etc.
  • a rule may relate to detecting repeated balance inquiries related to the same stored-value card identifier or originating from the same point of origin (i.e., as identified by ANI or IP address identification).
  • a rule may relate to detecting a series of small transactions (e.g., $1) in a small geographic location (e.g., within 5 miles).
  • a rule may relate to detecting repeated balance inquiries or transaction attempts related to an inactive stored-value instrument identifier (e.g., a yet to be activated card).
  • a rule may relate to detecting repeated balance inquires or transaction attempts related to a stored-value instrument identifier associated with a zero balance.
  • a rule may relate to detecting repeated attempts to “activate” a single stored-value identifier.
  • multiple activations of a single identifier may indicate an attempt to fraudulently “skim” multiple activations (and thereby funds) onto a single identifier.
  • a single identifier may be fraudulently associated with multiple physical stored-value cards. Upon activation of each individual physical stored-value card, the associated identifier is “loaded” with funds.
  • such rules are, in part, designed to detect potential unauthorized or fraudulent “skimming” of stored-value instruments in that the rules monitor for repeated requests related a single stored-value instrument identifier or repeated requests from a single source location (or geographic locale). Such repeated requests are often indicative of skimming schemes and other fraudulent activities involving stored-value instruments.
  • Exemplary embodiments of the invention may therefore comprise, at Block 210 , receiving at least one balance inquiry via an automated telephone inquiry system, and at Block 220 and 230 , the captured and compiled information may comprises an ANI designation of the source of the at least one request.
  • the at least one request received at Block 210 may be a balance inquiry received via an on-line automated balance inquiry system, and the captured and compiled information at Blocks 220 and 230 may comprise IP address information.
  • the at least one request received at Block 210 may be a plurality of transaction attempts of a predetermined small increment originating from a predetermined small geographic region, and the captured and compiled information at Block 220 and 230 may comprise the geographic location of origin of each transaction request.
  • the plurality of transaction attempts may originate, e.g., from POS terminals.
  • the plurality of transaction attempts may be related to a single stored-value instrument identifier, or may be related to a plurality of stored-value instrument identifiers, for example, those with sequential identifiers.
  • FIG. 3 provides a schematic illustration of a structure that may be used to implement the instrument-authority system 140 of the invention as unit for use, e.g., at a merchant location 112 .
  • FIG. 3 broadly illustrates how individual system elements may be implemented in a separated or more integrated manner.
  • the instrument-authority system 140 is shown comprised of hardware elements that are electrically coupled via bus 326 , including a processor 302 , an input interface 304 , an output interface 306 , a storage device 308 , a computer-readable storage media reader 310 a, a communications system 314 , a processing acceleration unit 316 such as a DSP or special-purpose processor, and a memory 318 .
  • the computer-readable storage media reader 310 a is further connected to a computer-readable storage medium 310 b, the combination comprehensively representing remote, local, fixed, and/or removable storage devices plus storage media for temporarily and/or more permanently containing computer-readable information.
  • the instrument-authority system 140 also comprises software elements, shown as being currently located within working memory 320 , including an operating system 324 and other code 322 , such as a program designed to implement the rule set of the present invention. It will be apparent to those skilled in the art that substantial variations may be made in accordance with specific requirements. For example, customized hardware might also be used and/or particular elements might be implemented in hardware, software (including portable software, such as applets), or both. Further, connection to other computing devices such as network input/output devices may be employed.
  • the systems and methods of the invention may be used to detect potential unauthorized or fraudulent use of stored-value instruments in real-time.
  • transaction and inquiry requests are monitored in real-time, and information related to these requests are captured, compiled, and processed through a rule set to build a real-time database of request activity. Based on this real-time monitoring and the predetermined, selectable rule set, determinations concerning the potential likelihood of unauthorized or fraudulent activity can be made. “Flags” can then be set in the system, and the flags can optionally be acted in on a variety of ways in order to minimize the potential for unauthorized or fraudulent use of stored-value instruments.
  • machine-executable instructions may be stored on one or more machine readable media, such as CD-ROMs or other type of optical disks, floppy diskettes, ROMs, RAMs, EPROMs, EEPROMs, magnetic or optical cards, flash memory, or other types of machine-readable media suitable for storing electronic instructions.
  • machine readable media such as CD-ROMs or other type of optical disks, floppy diskettes, ROMs, RAMs, EPROMs, EEPROMs, magnetic or optical cards, flash memory, or other types of machine-readable media suitable for storing electronic instructions.
  • some embodiments of the invention provide software programs, which may be executed on one or more computers, for performing the methods described above.
  • the methods may be performed by a combination of hardware and software.

Abstract

The present invention is generally directed to systems and methods for detecting unauthorized or fraudulent use of stored-value instruments. A stored-value instrument can be any instrument (tangible or intangible) that may be associated with a debit account and/or may otherwise be presented for payment for goods and/or services, used to transfer money, etc. The systems and methods of the invention generally involve processing request activity through a predetermined rule set to ascertain whether the activity is potentially unauthorized or fraudulent. The systems and methods of the invention allow for real-time monitoring of request activity for potentially unauthorized or fraudulent use of stored-value instruments.

Description

    BACKGROUND OF THE INVENTION
  • This application relates generally to stored-value instruments. More specifically, this application relates to methods and systems for detecting fraudulent use of stored value cards.
  • Stored value, gift, or other pre-paid metered accounts associated with debits cards are well-known for providing access to goods and services. For example, gift cards may be purchased from various merchants such as Target®, Wal-Mart®, Starbucks®, Sears®, Blockbuster®, and the like. Pre-paid debit cards are also frequently purchased for telephone services. The purchase and usage of pre-paid debit cards has continued to increase in recent years to the point that the sale of pre-paid debit cards today is a multi-billion dollar industry. Pre-paid cards, such as gift cards issued by a merchant, are advantageous to the merchant because customers using them are more likely to shop the merchant and also more likely to spend beyond the initial value of the gift card. Other prepaid cards may be issued by a bank or money transfer office, and may be used like a credit card to make purchases, up to the balance maintained within the card account.
  • In some cases, pre-paid debit cards are printed and issued with a predetermined value and balance, and typically sold as a retail item. An example of one such a card is a pre-paid gift card which provides an individual with a set dollar amount for the purchase of goods from a particular merchant. In other cases, a gift card may be printed without a predetermined value, but when it is purchased and activated the customer pays for the amount of money to be “loaded” onto the card.
  • Clearinghouse arrangements have been set up to handle gift card accounts on behalf of merchants. For example, ValueLink, L.L.C., a unit of First Data Corporation, provides database services that merchants may access for activating and maintaining gift card accounts. When the card is purchased, the card is electronically read (e.g., by reading a magnetic stripe and/or printed bar code on the card) by the merchant to activate the account at the database. Once activated, the card is used to make purchases (redemptions) by reading the card at the time of purchase and debiting the purchase amount from the account.
  • In recent years, stored-value cards have become increasingly popular among consumers. The steadily increasing demand for such cards, in the form of prepaid gift cards and other types of stored-value cards, has resulted in an increased number of merchants offering stored-value cards for sale. This success in marketing stored-value cards has, however, spawned a variety of fraudulent practices related to these cards.
  • There is, accordingly, a general need in the art for methods and systems to provide detection of unauthorized or fraudulent uses of such stored-value instruments.
  • BRIEF SUMMARY OF THE INVENTION
  • To address these and other needs, the present invention provides systems and methods for detecting the unauthorized or fraudulent use of stored-value instruments.
  • Thus, in one aspect of the invention, a method for detecting potential unauthorized or fraudulent use of a stored value instrument is provided. Methods of the invention generally comprise: receiving at least one request related to at least one stored value instrument identifier; compiling predetermined information concerning the request based on the type of request made; processing the compiled information through a predetermined rule set to thereby determine whether there is a likelihood of potential unauthorized or fraudulent use of the at least one stored value instrument based on the predetermined rule set; and setting a flag if potentially unauthorized or fraudulent use of a stored-value instrument is detected in accordance with the predetermined rule set. In certain embodiments, the flagging may result in a hold being placed on the stored-value instrument identifier or deactivation of the stored-value identifier. In other embodiments, the flag may result in the source of the request being blocked from making further requests.
  • In one embodiment, the rule set may comprise: (i) no more than a predetermined, selectable number of balance inquiries related to a single stored-value instrument identifier during a predetermined, selectable period of time; (ii) no more than a predetermined, selectable number of balance inquiries from a single ANI designation or IP address during a predetermined, selectable period of time; (iii) no more than a predetermined, selectable number of transactions of a predetermined, selectable value in a predetermined, selectable geographic locale during a predetermined, selectable period of time; (iv) no more than a predetermined, selectable number of transaction requests related to an inactive stored-value instrument identifier; (v) no more than a predetermined, selectable number of transaction requests related to a stored-value instrument identifier associated with a zero balance; (vi) no more than a predetermined, selectable number of transaction requests related to a single stored-value instrument identifier from POS terminals during a predetermined, selectable period of time; and (vii) no more than a predetermined, selectable number of activation requests related to a single stored-value instrument identifier.
  • In another aspect of the invention, a system for detecting potential unauthorized or fraudulent use of a stored-value instrument is provided. Systems of the invention generally comprise: means for receiving at least one request related to at least one stored-value instrument identifier number; means for capturing predetermined information concerning the at least one request based on the type of request made; a database comprising a predetermined rule set useful to determine whether there is a likelihood of potential unauthorized or fraudulent use of the at least one stored value instrument based on the predetermined rule set; and means for setting a flag if potential unauthorized or fraudulent use of the stored-value instrument is detected in accordance with the predetermined rule set.
  • In one embodiment, the means for receiving at least one request may be an automated telephone balance inquiry system, an on-line balance inquiry system, a POS terminal, or a combination thereof. In another embodiment, the means for capturing information may comprise ANI, IP address capture, and combinations thereof. In yet another embodiment, the means for flagging may comprise a database comprising the captured information related to the request, and the flag may comprise a data flag set in the database if potential unauthorized or fraudulent use of a stored-value instrument is detected in accordance with the predetermined rule set.
  • These and other aspects will become apparent to one of skill in the art upon reading the disclosure.
  • BRIEF DESCRIPTION OF THE DRAWINGS
  • FIG. 1A illustrates a typical point-of-service (POS) type system for use in connection with the present invention.
  • FIG. 1B illustrates an exemplary system in accordance with the present invention.
  • FIG. 2 illustrates an exemplary method in accordance with the present invention.
  • FIG. 3 illustrates an exemplary instrument-authority system of the invention.
  • DETAILED DESCRIPTION OF THE INVENTION
  • The present invention is generally directed to systems and methods for detecting unauthorized or fraudulent use of stored-value instruments. A stored-value instrument can be any instrument (tangible or intangible) that may be associated with a debit account and/or may otherwise be presented for payment for goods and/or services, used to transfer money, etc. Particular embodiments of stored-value instruments comprise stored-value cards, which may have a form factor similar to that of credit cards, etc. By way of non-limiting example, stored-value instruments, such as cards may be packaged in a manner described in detail in U.S. patent application Ser. No. 10/665,984, filed Sep. 19, 2003 by McGee et al. and entitled “Financial Presentation Instruments with Integrated Holder and Methods for Use,” the entire disclosure of which is incorporated herein by reference.
  • A stored-value instrument will generally comprise some form of identifier, which may be sufficient to uniquely identify the stored-value instrument. Merely by way of example, a stored-value instrument may comprise a magnetic stripe and/or a bar code. The stored-value identifier, which might be a serial number and/or other string of text and/or numbers, then, might be encoded onto the magnetic stripe and/or represented by the bar code. Those skilled in the art will appreciate the variety of methods that can be used to encode/decode a magnetic stripe and/or translate a bar code. Further, those skilled in the art will appreciate that there are a number of ways known in the art to store information associated with a stored value instrument, and any of them may be used as appropriate to store the first and/or second identifiers. Merely by way of example, in some embodiments, the first and/or second identifier may be stored in various ways (such as RFID tag or chips embedded in the card, holograms, etc.) and/or any appropriate scanner, RFID reader and/or hardware may be used to obtain and/or input the first and/or second identifier. Bar codes, track data, account information, etc. may also be printed on the card, as known in the art.
  • In some cases, the stored-value instrument may comprise both a magnetic stripe and a bar code. The magnetic stripe may be used to store a first identifier (such as an account number associated with the instrument and/or the like), which may also be printed, embossed, etc. on the instrument. The bar code may represent a second identifier, which may have some relation to the first identifier, or may incorporate a personal account number, a personal identification number, etc. Merely by way of example, in some cases, the bar code may be a Code 128 bar code known in the art. As recognized by those skilled in the art, the identifier may also be encrypted. The encrypted value representing the identifier can be derived using any appropriate technique, of which many are known in the art. An exemplary technique may comprise 3DES encryption. As used herein, a stored-value instrument identifier can be any single identifier or combination of identifiers, such as a first identifier, second identifier, etc., or any combination thereof.
  • Merely by way of example, an overview of a typical point-of-sale (POS) system that may be used to activate or perform certain transaction requests utilizing stored-value instruments is illustrated schematically in FIG. 1A. Other systems are described in U.S. patent application Ser. No. 10/405,043, filed Sep. 26, 2003 by McGee et al. and entitled “Methods and Systems for Processing Unrestricted Stored-Value Instruments,” the entire disclosure of which is incorporated herein by reference. However, the invention is not so limited, and any known systems may be used in connection with the present invention, as understood by those skilled in the art.
  • Now, with reference to FIG. 1A, a stored-value instrument may be purchased by a purchaser 102 at a merchant location 112. Each merchant location 112 may include one or more point-of-sale (POS) terminals 108 having a capacity for reading information from the stored-value instrument. Each POS terminal 108 may be configured for interacting with an instrument-authority system 140 via a network 104, optionally through a host system 116 configured to interface directly with each of the POS terminals 108 at a particular merchant location 112. (In some embodiments, the host system 116 may be configured to perform the functions attributed herein to the instrument-authority system. In other embodiments, the host system 116 may be omitted and/or the instrument-authority system 140 may be configured to communicate directly with the point-of-sale terminals 108 via a network 104). The network 114 may comprise a wired, wireless, modern, and/or other type of interfacing connection (e.g., internet, telephony, etc.) and permits data to be exchanged between the host system 116, instrument-authority system 140, point-of-sale terminals 108, etc.
  • Examples of suitable POS devices that include multiple capabilities are provided in the following commonly assigned applications, the entire disclosures of which are incorporated herein by reference for all purposes: U.S. Prov. Pat. Appl. No. 60/147,889, entitled “Integrated Point Of Sale Device,” filed Aug. 9, 1999 by Randy J. Templeton et al.; U.S. patent application Ser. No. 09/634,901, entitled “Point Of Sale Payment System,” filed Aug. 9, 2000 by Randy J. Templeton et al.; U.S. patent application Ser. No. 10/116,689, entitled “Systems And Methods For Performing Transactions At A Point-Of-Sale,” filed Apr. 3, 2002 by Eamey Stoutenburg et al.; U.S. patent application Ser. No. 10/116,733, entitled “Systems And Methods For Deploying A Point-Of-Sale System,” filed Apr. 3, 2002 by Earney Stoutenburg et al.; U.S. patent application Ser. No. 10/116,686, entitled “Systems And Methods For Utilizing A Point-Of-Sale System,” filed Apr. 3, 2002 by Earney Stoutenburg et al.; and U.S. patent application Ser. No. 10/116,735, entitled “Systems And Methods For Configuring A Point-Of-Sale System,” filed Apr. 3, 2002 by Earney Stoutenburg.
  • In accordance with the present invention, the instrument-authority system 140 illustrated in FIG. 1A may be adapted to detect potential unauthorized or fraudulent use of the stored-value instruments as described in further detail below. For instance, the instrument-authority system may comprise or be in communication with a database that includes a predetermined rule set designed to detect potential unauthorized or fraudulent use of stored-value instruments.
  • More generally, one aspect of the invention is directed to a system for detecting potential unauthorized or fraudulent use of stored-value instruments. With reference to FIG. 1B, system 100 can be implemented in a network environment (generally indicated by reference number 104). Network 104 can be any network capable of supporting communication between different computing devices. Merely by way of example, network 104 could be a local area network, an intra-network, the internet and/or any other telecommunications network, a wireless network and the like.
  • Exemplary system 100 comprises an instrument-authority system 140 in communication with at least one request means, e.g., 106, 108, 110, perhaps through network 104. In certain embodiments, request means 106 may, for example, be an automated telephone inquiry system which may be used to make automated balance and transaction inquiries for stored-value instruments. Suitable automated telephone inquiry systems include known interactive voice recognition (IVR) systems known in the art. As above, request means 108 may, for example, be a POS terminal. In other embodiments, request means 110 may, for example, be a computer connected via a network, e.g., the internet, to an automated inquiry system which may be used to make automated balance and transaction inquiries for stored-value instruments. Alternatively, request means 110, may be back-office software, batch files processes , mainframe processes, etc.
  • Instrument-authority system 140 may generally be configured as a server, however, it is understood that it may be any device that includes a processor and is capable of reading input data, processing the data in accordance with a predetermined rule set, and writing output data, as described in further detail in the embodiments below. Merely by way of example, instrument-authority system 140 can be a mainframe computer such as an IBM™ System/390™, a mid range system such as an IBM™ AS/400™, and/or server running a UNIX™ or UNIX-like operating system (including, for example, AIX™, Solaris™, and/or Linux™). In other embodiments, instrument-authority system 140 can be a personal computer, perhaps running one of a variety of Microsoft™ operating systems, and/or can be an Apple™ computer. Alternatively, instrument-authority system 140 may be a specifically configured, stand-alone unit for on-site merchant use.
  • In accordance with various embodiments of the invention, system 100 also includes one or more databases 118, 120, 122, 124, etc. which can be used to store a variety of information related to the inventive methods discussed herein. Those skilled in the art will appreciate that although, for purposes of clarity, databases 118, 120, 122, 124 are illustrated separately on FIG. 1B, other embodiments of the invention might incorporate all of the stored data within a single database and/or organize data structures differently than as illustrated herein. Further, although illustrated as separate physical elements in FIG. 1B, databases 118, 120, 122, 124 may alternatively be housed within instrument-authority system 140 (as indicated by the dashed line in FIG. 1B). As discussed herein, when reference is made to instrument-authority system 140 including or comprising a database, it is understood that the database may be within the computer housing itself, or may be a separate structure in communication with instrument-authority system 140.
  • In embodiments utilizing the information bus model discussed herein, the information discussed with respect to databases 118, 120, 122, 124 may be pushed and/or pulled from the bus, allowing for data acquisition from a wide variety of sources. The term “database,” therefore, should be interpreted to mean a collection of information rather than read as a limitation to a particular physical or logical structure or organization. Databases 118, 120, 122, 124 can be in communication with instrument-authority system 140 either through network 104 (as illustrated on FIG. 1B), through direct communication (e.g., SCSI connection, etc.) and/or through any other method known in the art, so long as instrument-authority system 140 can access the information stored within databases 118, 120, 122, 124.
  • As will be discussed in more detail below, databases 118, 120, 122, 124 may comprise various combinations of data, predetermined rule sets, instructions, etc. for use in connection with the methods of the present invention. By way of non-limiting example, databases 118, 120, 122, 124 may comprise captured information concerning stored-value instrument identifiers, date and time of requests, request types, request mode, geographic location of request POS identifier, automatic number identification (ANI) designations, internet protocol (IP) address information, predetermined rule set definitions, “flag” status associated with a stored-value instrument identifier, ANI designation or IP address, etc. Those skilled in the art will recognize that there are a variety of ways of storing composite information in a database, any of which can be implemented in accordance with various embodiments of the invention. For instance, database 118, 120, 122, 124 can be incorporated within a software package, and instrument-authority system 140 can be configured to interface with such software package in order to assess the information stored in the database(s).
  • Those skilled in the art will recognize that there are a variety of ways in which instrument-authority system 140 might interface with database 118, 120, 122, 124. In a particular aspect instrument-authority system 140 can access information in database 118, 120, 122, 124 on a periodic basis or on demand. Various standardized (e.g., OOBC, SQL, XML, etc.) and/or proprietary data access methodologies known in the art may be used to access databases 118, 120, 122, 124. Further, data may either be pushed from a database or “pulled” by instrument-authority system 140.
  • Alternatively, databases 118, 120, 122, 124 and/or instrument-authority system 140 can engage in a practice known in the art as “push-pull” data warehousing, whereby information can be shared with and/or pulled from another source. Such data warehousing can be done within an enterprise or between multiple enterprises and can be performed using any of a variety of methods known to those skilled in the art including, merely by way of example, XML data transfers. In these and other ways, embodiments of the present invention, as discussed above, can interface with an information bus operation on an intra-company or inter-company basis, and can both pull information from that bus and push information to the information bus. Thus, systems in accordance with embodiments of the invention can easily integrate with other data management systems in the provider's network, for example by utilizing the information bus methodology described briefly herein and known to those skilled in the art.
  • In accordance with some embodiments, system 100 can include a computing device 132 that can be in communication with instrument-authority system 140 and that can be used, inter alia, to provide configuration and operational instructions to instrument-authority system 140. Computing device 132 can be any device known in the art that is capable of communicating with instrument-authority system 140, including, for example, a personal computer (perhaps running a Microsoft™ and/or Apple™ operating system), a personal digital assistant, a mini-computer, a workstation, a cell phone, and/or the like. Communication with instrument-authority system 140 can be through network 104 as illustrated in FIG. 1B, or alternatively, can be through some other means of communication including wireless communication, direct connection and the like. Device 132 can be used to add, delete and/or modify any of the information contained within databases 118, 120, 122, 124. For instance, device 132 can be used to add, delete, or modify rule set parameters stored in one or more databases 118, 120, 122, 124. However, in many circumstances, databases 118, 120, 122, 124 will be populated automatically, e.g., via an information bus, through the activities of other software applications or data capture services, as described below.
  • In another aspect of the invention, methods for detecting potential unauthorized or fraudulent use of stored-value instruments are provided. The methods generally involve processing request activity through a predetermined rule set to ascertain whether the activity is potentially unauthorized or fraudulent. In one embodiment, the methods of the invention allow for real-time monitoring of request activity for potentially unauthorized or fraudulent use of stored-value instruments. With reference to system 100 described above, instrument-authority system 140 may monitor activity via request means 106, 108, 110, etc. and flag potentially unauthorized or fraudulent activity. Certain embodiments will be discussed in more detail below with reference to FIG. 2.
  • Turning now to FIG. 2, an exemplary method of the invention for detecting potential unauthorized or fraudulent use of stored-value instruments is illustrated. Although for ease of description, method 200 will be described by reference to system 100, those skilled in the art will understand that methods in accordance with various embodiments of the invention are not limited to any particular hardware or physical structure(s). In Block 210, at least one request related to at least one stored-value instrument identifier is received via, e.g., request means 106, 108, 110, etc. Based on the type of request, certain predetermined information is captured at Block 220 and compiled at Block 240 in one or more databases (e.g., database 118, 120, etc.).
  • The predetermined information may be captured at Block 220 in any suitable manner known in the art, depending on the type of information to be captured, e.g., automatic number identification (ANI), internet protocol (IP) address identification, POS terminal identification, etc. Further, depending on the type of request, the information which is captured at Block 220 and compiled at Block 240 may include any combination of: stored-value instrument identifier, date of request, time of request, request type (e.g., balance inquiry, debit request, purchase request, deposit request, etc.), mode of request (e.g., automated inquiry system via telephone, internet, POS, etc.), geographic location, POS identifier, ANI designation, IP address, etc. Further, the at least one request may relate to a single stored-value instrument identifier, or there may be a plurality of requests that relate to a plurality of stored-value instrument identifiers. In one embodiment, the stored-value instrument identifiers may be in sequential order, and the requests may be received in a predetermined period of time, or from a single source, e.g., a single ANI designation, IP address, or POS terminal.
  • Moving on, at Block 260, instrument-authority system 140 processes the information compiled at Block 240 through a predetermined rule set stored in one or more databases (e.g., database 122, etc.) to evaluate, optionally in real-time, whether the request(s) received at Block 210 is potentially unauthorized or fraudulent. If determined to be potentially unauthorized or fraudulent activity at Block 260, instrument-authority system 140 sets a “flag” at Block 280 in one or more databases (e.g., database 124, etc.).
  • Once a flag is set, optional steps may be taken at Block 285 to minimize the potential unauthorized or fraudulent use of stored-value instruments. Such optional steps may include, e.g., blocking a flagged ANI designation or IP address from further access to an automated request system; placing a hold on a stored-value instrument identifier; deactivating a stored-value identifier; initiating a fraud watch or investigation associated with a flagged ANI designation, IP address or stored-value instrument identifier; or transmitting a message or message code to the point of origination of the request(s) at Block 210 indicating that the stored-value instrument requires verification and/or authentication.
  • By way of example, suitable rules for use at Block 260 include (i) no more than a selectable number of balance inquiries related to a single stored-value instrument identifier during a selectable period of time; (ii) no more than a selectable number of balance inquiries from a single automatic number identification (ANI) designation or internet protocol (IP) address during a selectable period of time; (iii) no more than a selectable number of transactions of a selectable value in a selectable geographic locale; (iv) no more than a selectable number of transaction requests related to an inactive stored-value instrument identifier; (v) no more than a selectable number of transaction requests related to a stored-value instrument identifier associated with a zero balance; (vi) no more than a selectable number of transaction requests related to a single stored-value instrument identifier from PCS terminals during a selectable period of time; and (vii) no more than a selectable number of activation requests related to a single stored-value instrument identifier. The selectable parameters may be hardcoded into the database, or may be selectable by a user and input via, e.g., computing device 132.
  • By way of example, in one embodiment, no more than 1-10, 3-10, 1-5, 3-5, 3, etc. balance inquires; or no more than 1-10, 3-10, 1-5, 3-5, 3, etc. transactions of a $1, $2, $3, etc. amount or related to an inactive, zero balance, or single stored-value instrument identifier. Exemplary selectable periods of time include 1 hour, 2 hours, 3 hours, 4 hours, 5 hours, 6 hours, 12 hours, 24 hours, 48 hours, etc. Exemplary geographic locales include 1 mile, 2 miles, 3 miles, 4 miles, 5 miles, 10 miles, 25 miles, etc. Also a selectable parameter within the rule set is the type of request to monitor or process through the rule set. For instance, if desired, only requests originating from the IVR, POS, internet, batch files, back-office, or any combination thereof, may be monitored. Further, if desired, only requests originating from selected IVR, POS, etc. locations may be monitored (e.g., unmanned POS locations). By way of example, requests from the IVR and internet may be monitored, but not POS, or alternatively any combination of: one POS only, all (POS, internet, BATCH, Back-office), some (IVR and POS), etc.
  • As such, in one embodiment, a rule may relate to detecting repeated balance inquiries related to the same stored-value card identifier or originating from the same point of origin (i.e., as identified by ANI or IP address identification). In another embodiment, a rule may relate to detecting a series of small transactions (e.g., $1) in a small geographic location (e.g., within 5 miles). In yet another embodiment, a rule may relate to detecting repeated balance inquiries or transaction attempts related to an inactive stored-value instrument identifier (e.g., a yet to be activated card). In yet another embodiment, a rule may relate to detecting repeated balance inquires or transaction attempts related to a stored-value instrument identifier associated with a zero balance. In yet another embodiment, a rule may relate to detecting repeated attempts to “activate” a single stored-value identifier. By way of example, multiple activations of a single identifier may indicate an attempt to fraudulently “skim” multiple activations (and thereby funds) onto a single identifier. In such a scheme, a single identifier may be fraudulently associated with multiple physical stored-value cards. Upon activation of each individual physical stored-value card, the associated identifier is “loaded” with funds.
  • Without intending to be limited by theory, such rules are, in part, designed to detect potential unauthorized or fraudulent “skimming” of stored-value instruments in that the rules monitor for repeated requests related a single stored-value instrument identifier or repeated requests from a single source location (or geographic locale). Such repeated requests are often indicative of skimming schemes and other fraudulent activities involving stored-value instruments.
  • Exemplary embodiments of the invention may therefore comprise, at Block 210, receiving at least one balance inquiry via an automated telephone inquiry system, and at Block 220 and 230, the captured and compiled information may comprises an ANI designation of the source of the at least one request. In another exemplary embodiment, the at least one request received at Block 210 may be a balance inquiry received via an on-line automated balance inquiry system, and the captured and compiled information at Blocks 220 and 230 may comprise IP address information.
  • In yet another exemplary embodiment, the at least one request received at Block 210 may be a plurality of transaction attempts of a predetermined small increment originating from a predetermined small geographic region, and the captured and compiled information at Block 220 and 230 may comprise the geographic location of origin of each transaction request. The plurality of transaction attempts may originate, e.g., from POS terminals. Further, the plurality of transaction attempts may be related to a single stored-value instrument identifier, or may be related to a plurality of stored-value instrument identifiers, for example, those with sequential identifiers.
  • FIG. 3 provides a schematic illustration of a structure that may be used to implement the instrument-authority system 140 of the invention as unit for use, e.g., at a merchant location 112. FIG. 3 broadly illustrates how individual system elements may be implemented in a separated or more integrated manner. The instrument-authority system 140 is shown comprised of hardware elements that are electrically coupled via bus 326, including a processor 302, an input interface 304, an output interface 306, a storage device 308, a computer-readable storage media reader 310 a, a communications system 314, a processing acceleration unit 316 such as a DSP or special-purpose processor, and a memory 318. The computer-readable storage media reader 310 a is further connected to a computer-readable storage medium 310 b, the combination comprehensively representing remote, local, fixed, and/or removable storage devices plus storage media for temporarily and/or more permanently containing computer-readable information.
  • The instrument-authority system 140 also comprises software elements, shown as being currently located within working memory 320, including an operating system 324 and other code 322, such as a program designed to implement the rule set of the present invention. It will be apparent to those skilled in the art that substantial variations may be made in accordance with specific requirements. For example, customized hardware might also be used and/or particular elements might be implemented in hardware, software (including portable software, such as applets), or both. Further, connection to other computing devices such as network input/output devices may be employed.
  • As mentioned above, in one embodiment, the systems and methods of the invention may be used to detect potential unauthorized or fraudulent use of stored-value instruments in real-time. In accordance with the invention, transaction and inquiry requests are monitored in real-time, and information related to these requests are captured, compiled, and processed through a rule set to build a real-time database of request activity. Based on this real-time monitoring and the predetermined, selectable rule set, determinations concerning the potential likelihood of unauthorized or fraudulent activity can be made. “Flags” can then be set in the system, and the flags can optionally be acted in on a variety of ways in order to minimize the potential for unauthorized or fraudulent use of stored-value instruments.
  • It should be noted that the methods, systems and devices discussed above are intended merely to be exemplary in nature. Consequently, various embodiments may omit, substitute and/or add various procedures and/or components as appropriate. For example, it should be appreciated that in alternative embodiments, the methods may be performed in an order different than that described. It should also be appreciated that the methods described above may be performed by hardware components and/or software programs, and thus may be embodied in sequences of machine-executable instructions, which may be used to cause a machine, such as a general-purpose or special-purpose processor or logic circuits programmed with the instructions, to perform the methods. These machine-executable instructions may be stored on one or more machine readable media, such as CD-ROMs or other type of optical disks, floppy diskettes, ROMs, RAMs, EPROMs, EEPROMs, magnetic or optical cards, flash memory, or other types of machine-readable media suitable for storing electronic instructions. Merely by way of example, some embodiments of the invention provide software programs, which may be executed on one or more computers, for performing the methods described above. In particular embodiments, for example, there may be a plurality of software components configured to execute on various hardware devices (such as a point-of-sale terminal, host system and/or instrument-authority system). Alternatively, the methods may be performed by a combination of hardware and software.
  • Having described several embodiments, it will be recognized by those of skill in the art that various modifications, alternative constructions, and equivalents may be used without departing from the spirit of the invention. Accordingly, the above description should not be taken as limiting the scope of the invention, which is defined in the following claims.

Claims (21)

1. A method for detecting potential unauthorized or fraudulent use of a stored value instrument, said method comprising:
providing a database comprising a rule set, wherein the rule set comprises at least one of (a) whether a certain number of balance inquiries have been made, (b) whether a certain number of transactions have been performed, and (c) whether a certain number of activation requests have been made;
receiving at least one request related to at least one stored value instrument identifier;
compiling information concerning said request based on the type of request made;
processing said compiled information through said rule set to thereby determine whether there is a likelihood of potential unauthorized or fraudulent use of said at least one stored value instrument based on said rule set; and
setting a flag if potentially unauthorized or fraudulent use of said stored-value instrument is detected in accordance with said rule set.
2. The method of claim 1, wherein said compiled information comprises: stored value instrument identifier, date of request, time of request, request type, mode of request, and optionally geographic location of origin of request, point of service (POS) identifier, automatic number identification (ANI) designation, or internet protocol (IP) address.
3. The method of claim 1, wherein said at least one request is a balance inquiry received via an automated telephone inquiry system, and the compiled information comprises an ANI designation.
4. The method of claim 1, wherein said at least one request is a balance inquiry received via an on-line automated balance inquiry system, and the compiled information comprises IP address information.
5. The method of claim 1, wherein said at least one request is a plurality of transaction attempts of a small increment originating from a small geographic region, and the compiled information comprises geographic location of origination of each respective request.
6. The method of claim 1, wherein said at least one request is a plurality of transaction attempts related to a single stored value instrument identifier at point of service terminals.
7. The method of claim 1, wherein the at least one request is a plurality of requests that relate to a single stored value instrument identifier.
8. The method of claim 1, wherein the at least one request is a plurality of requests that relate to a plurality of stored value instrument identifiers.
9. The method of claim 8, wherein the plurality of stored value instrument identifiers are in sequential order.
10. The method of claim 1, wherein said rule set comprises:
(i) no more than a predetermined number of balance inquiries related to a single stored-value instrument identifier during a predetermined period of time;
(ii) no more than a predetermined number of balance inquiries from a single ANI designation or IP address during a predetermined period of time;
(iii) no more than a predetermined number of transactions of a predetermined value in a predetermined geographic locale during a predetermined period of time;
(iv) no more than a predetermined number of transaction requests related to an inactive stored-value instrument identifier;
(v) no more than a predetermined number of transaction requests related to a stored-value instrument identifier associated with a zero balance;
(vi) no more than a predetermined number of transaction requests related to a single stored-value instrument identifier from POS terminals during a predetermined period of time; and
(vii) no more than a predetermined number of activation requests related to a single stored-value instrument identifier.
11. The method of claim 1, wherein said flagging of said at least one stored-value instrument identifier results in deactivation of said stored-value instrument identifier number and any stored-value instruments associated therewith.
12. The method of claim 1, wherein said flagging of said at least one stored-value instrument identifier results in a hold being placed on said stored-value instrument identifier, and any stored-value instruments associated therewith.
13. The method of claim 1, wherein said method further comprising transmitting a message or message code to the point of origination of the at least one request that the stored-value instrument requires verification and/or authorization.
14. The method of claim 1, wherein receiving at least one request comprises a plurality of balance inquiries received from a single source, as identified by ANI or IP address identification, and said method further comprises blocking said source from attempting further balance inquiries.
15. The method of claim 1, wherein said method further comprises flagging a source as identified by ANI or IP address identification for fraud watch or investigation.
16. A system for detecting potential unauthorized or fraudulent use of a stored-value instrument, said system comprising:
means for receiving at least one request related to at least one stored-value instrument identifier number;
means for capturing information concerning said at least one request based on the type of request made;
a database comprising a rule set useful to determine whether there is a likelihood of potential unauthorized or fraudulent use of said at least one stored value instrument based on said rule set, wherein the rule set comprises at least one of (a) whether a certain number of balance inquiries have been made, (b) whether a certain number of transactions have been performed, and (c) whether a certain number of activation requests have been made; and
means for setting a flag if potential unauthorized or fraudulent use of said stored-value instrument is detected in accordance with said rule set.
17. The system of claim 16, wherein said means for receiving at least one request is selected from the group consisting of: an automated telephone balance inquiry system, an on-line balance inquiry system, a POS terminal, or a combination thereof.
18. The system of claim 16, wherein said means for capturing information comprises a means selected from the group consisting of: ANI, IP address capture, and combinations thereof.
19. The system of claim 16, wherein said means for flagging comprises a database comprising said captured information related to said request, and said flag comprises a data flag set in said database if potential unauthorized or fraudulent use of said stored-value instrument is detected in accordance with said rule set.
20. The system of claim 16, wherein said rule set comprises:
(i) no more than a predetermined number of balance inquiries related to a single stored-value instrument identifier during a predetermined period of time;
(ii) no more than a predetermined number of balance inquiries from a single ANI designation or IP address during a predetermined period of time;
(iii) no more than a predetermined number of transactions of a predetermined value in a predetermined geographic locale during a predetermined period of time;
(iv) no more than a predetermined number of transaction requests related to an inactive stored-value instrument identifier;
(v) no more than a predetermined number of transaction requests related to a stored-value instrument identifier associated with a zero balance;
(vi) no more than a predetermined number of transaction requests related to a single stored-value instrument identifier from POS terminals during a predetermined period of time; and
(vii) no more than a predetermined number of activation requests related to a single stored-value instrument identifier.
21. A system for detecting potential unauthorized or fraudulent use of a stored-value instrument, said system comprising:
an input that is configured to receive at least one request of a certain request type related to at least one stored-value instrument identifier number;
a database comprising a rule set useful to determine whether there is a likelihood of potential unauthorized or fraudulent use of said at least one stored value instrument based on said rule set, wherein the rule set comprises at least one of (a) whether a certain number of balance inquiries have been made for the stored-value instrument identifier, (b) whether a certain number of transactions have been performed relating to the stored-value identifier, and (c) whether a certain number of activation requests have been made relating to the stored-value identifier; and
a computer processor that is configured to set a flag if potential unauthorized or fraudulent use of said stored-value instrument is detected in accordance with said rule set.
US11/956,250 2005-05-11 2007-12-13 System and method for detecting fraudulent use of stored value instruments Abandoned US20080091545A1 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
US11/956,250 US20080091545A1 (en) 2005-05-11 2007-12-13 System and method for detecting fraudulent use of stored value instruments

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US11/128,115 US7325726B2 (en) 2005-05-11 2005-05-11 System and method for detecting fraudulent use of stored value instruments
US11/956,250 US20080091545A1 (en) 2005-05-11 2007-12-13 System and method for detecting fraudulent use of stored value instruments

Related Parent Applications (1)

Application Number Title Priority Date Filing Date
US11/128,115 Continuation US7325726B2 (en) 2005-05-11 2005-05-11 System and method for detecting fraudulent use of stored value instruments

Publications (1)

Publication Number Publication Date
US20080091545A1 true US20080091545A1 (en) 2008-04-17

Family

ID=37418192

Family Applications (2)

Application Number Title Priority Date Filing Date
US11/128,115 Active 2026-05-05 US7325726B2 (en) 2005-05-11 2005-05-11 System and method for detecting fraudulent use of stored value instruments
US11/956,250 Abandoned US20080091545A1 (en) 2005-05-11 2007-12-13 System and method for detecting fraudulent use of stored value instruments

Family Applications Before (1)

Application Number Title Priority Date Filing Date
US11/128,115 Active 2026-05-05 US7325726B2 (en) 2005-05-11 2005-05-11 System and method for detecting fraudulent use of stored value instruments

Country Status (1)

Country Link
US (2) US7325726B2 (en)

Cited By (20)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20100063906A1 (en) * 2008-09-05 2010-03-11 Giftango Corporation Systems and methods for authentication of a virtual stored value card
US20100082482A1 (en) * 2008-09-26 2010-04-01 Vandeburg Theodore F Systems and Methods for Aggregating and Donating Dormant Prepaid Card Amounts
US20110055078A1 (en) * 2006-11-07 2011-03-03 Ebay Inc. Online fraud prevention using genetic algorithm solution
US8676672B2 (en) 2007-08-23 2014-03-18 E2Interactive, Inc. Systems and methods for electronic delivery of stored value
US8706630B2 (en) 1999-08-19 2014-04-22 E2Interactive, Inc. System and method for securely authorizing and distributing stored-value card data
CN107650582A (en) * 2016-07-26 2018-02-02 株式会社岛野 Cycle wheel fixing device
US10068287B2 (en) 2010-06-11 2018-09-04 David A. Nelsen Systems and methods to manage and control use of a virtual card
US10937076B2 (en) 2010-10-13 2021-03-02 E2Interactive, Inc. Online personalized gifting system
US10943438B2 (en) 2012-09-04 2021-03-09 E2Interactive, Inc. Processing of a game-playing transaction based on location
US10943432B2 (en) 2012-09-04 2021-03-09 E2Interactive, Inc. Processing of a game-playing transaction based on location
US10954049B2 (en) 2017-12-12 2021-03-23 E2Interactive, Inc. Viscous liquid vessel for gifting
US11017443B2 (en) 2014-04-30 2021-05-25 E2Interactive, Inc. System and method for a merchant onsite personalization gifting platform
US11037397B2 (en) 2012-09-04 2021-06-15 E2Interactive, Inc. Processing of a user device game-playing transaction based on location
US11111065B2 (en) 2013-02-15 2021-09-07 E2Interactive, Inc. Gift card presentation devices
US11120428B2 (en) 2013-05-02 2021-09-14 E2Interactive, Inc. Stored value card kiosk system and method
US11182836B2 (en) 2010-10-13 2021-11-23 E2Interactive, Inc. Gift card ordering system and method
US11219288B2 (en) 2013-02-15 2022-01-11 E2Interactive, Inc. Gift card box with slanted tray and slit
US11250666B2 (en) 2013-03-15 2022-02-15 E2Interactive, Inc. Systems and methods for location-based game play on computing devices
US11436651B2 (en) 2012-01-30 2022-09-06 E2Interactive, Inc. Group video generating system
US11928696B2 (en) 2009-12-16 2024-03-12 E2Interactive, Inc. Systems and methods for generating a virtual value item for a promotional campaign

Families Citing this family (20)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7328190B2 (en) * 2002-09-24 2008-02-05 E2Interactive, Inc. System and method for adding value to a stored-value account
PT1442404E (en) * 2001-09-24 2014-03-06 E2Interactive Inc System and method for supplying communication service
US7991386B2 (en) 2003-11-14 2011-08-02 E2Interactive, Inc. System and method for authorizing the activation of a communication device
US8655309B2 (en) 2003-11-14 2014-02-18 E2Interactive, Inc. Systems and methods for electronic device point-of-sale activation
US20170046679A1 (en) * 2004-04-09 2017-02-16 Blackhawk Network, Inc. Systems and methods for mimicking post-paid user experience with stored-value card accounts
US20050236471A1 (en) * 2004-04-23 2005-10-27 Corcoran Suzanne D Gift card assembly and method
US7472822B2 (en) 2005-03-23 2009-01-06 E2Interactive, Inc. Delivery of value identifiers using short message service (SMS)
US7325726B2 (en) * 2005-05-11 2008-02-05 First Data Corporation System and method for detecting fraudulent use of stored value instruments
US7354004B2 (en) 2005-08-23 2008-04-08 The Western Union Company Presentation instrument display and activation systems and methods
US7698220B2 (en) 2006-09-14 2010-04-13 E2Interactive, Inc. Virtual terminal for payment processing
US10769290B2 (en) * 2007-05-11 2020-09-08 Fair Isaac Corporation Systems and methods for fraud detection via interactive link analysis
US7627522B2 (en) * 2007-06-04 2009-12-01 Visa U.S.A. Inc. System, apparatus and methods for comparing fraud parameters for application during prepaid card enrollment and transactions
US8025221B2 (en) * 2007-08-03 2011-09-27 First Data Corporation Stored value card transaction control systems and methods
US10296874B1 (en) * 2007-12-17 2019-05-21 American Express Travel Related Services Company, Inc. System and method for preventing unauthorized access to financial accounts
US20120078739A1 (en) * 2010-09-23 2012-03-29 Nintendo Of America, Inc. Electronic registration systems for tracking and/or identifying fraudulent gift cards purchased or linked to fraudulent item returns, and associated methods
US11055686B2 (en) 2012-08-08 2021-07-06 E2Interactive, Inc. S/M for providing, reloading, and redeeming stored value cards used in transit applications
US10062075B2 (en) 2013-11-04 2018-08-28 E2Interactive, Inc. Systems and methods for using a dual function medical benefits card
FR3025912B1 (en) * 2014-09-16 2016-12-09 Compagnie Ind Et Financiere Dingenierie Ingenico METHOD FOR DETECTING A SUBSTITUTION RISK OF A TERMINAL, CORRESPONDING DEVICE, PROGRAM, AND RECORDING MEDIUM
US10007875B1 (en) 2016-05-03 2018-06-26 The Meyers Printing Companies, Inc. Point-of-sale security activation card
US10650382B2 (en) * 2017-09-05 2020-05-12 Nsure.Ai Payment Assurance Ltd. Systems and methods for detecting fraudulent use of a serial code for accessing an associated value stored on a network

Citations (16)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4853882A (en) * 1987-11-02 1989-08-01 A. C. Nielsen Company System and method for protecting against redundant mailings
US5241162A (en) * 1991-01-17 1993-08-31 Hello S.A. Accounting system for consumable units, with optimized management, notably to account for parking time units
US6016960A (en) * 1997-07-08 2000-01-25 Intermec Ip Corporation Rule based method and apparatus for processing reflectance signals from machine-readable symbols or images
US20020153414A1 (en) * 1999-08-09 2002-10-24 First Data Corporation Systems and methods for performing transactions at a point-of-sale
US6547132B1 (en) * 1999-08-09 2003-04-15 First Data Corporation Point of sale payment terminal
US20030222135A1 (en) * 1999-08-09 2003-12-04 First Data Corporation Systems and methods for configuring a point-of-sale system
US20040181453A1 (en) * 2002-11-06 2004-09-16 Ray James Thomas Configurable stored value platform
US20040193551A1 (en) * 2003-03-31 2004-09-30 First Data Corporation Methods and systems for processing unrestricted stored-value instruments
US6827260B2 (en) * 1999-08-09 2004-12-07 First Data Corporation Systems and methods for utilizing a point-of-sale system
US20050061889A1 (en) * 2003-09-19 2005-03-24 First Data Corporation Financial presentation instruments with integrated holder and methods for use
US6886742B2 (en) * 1999-08-09 2005-05-03 First Data Corporation Systems and methods for deploying a point-of sale device
US20050170814A1 (en) * 1996-08-08 2005-08-04 Joao Raymond A. Transaction security apparatus and method
US20050197958A1 (en) * 2003-12-29 2005-09-08 Ronald Miles Electronic account cash card security unit/process
US20060208074A1 (en) * 2001-02-28 2006-09-21 Eglen Jan A Digital online exchange
US20060255125A1 (en) * 2005-05-11 2006-11-16 First Data Corporation System and method for detecting fraudulent use of stored value instruments
US7600674B1 (en) * 2004-10-12 2009-10-13 Sprint Communications Company L.P. Integrated prepaid system and method

Patent Citations (16)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4853882A (en) * 1987-11-02 1989-08-01 A. C. Nielsen Company System and method for protecting against redundant mailings
US5241162A (en) * 1991-01-17 1993-08-31 Hello S.A. Accounting system for consumable units, with optimized management, notably to account for parking time units
US20050170814A1 (en) * 1996-08-08 2005-08-04 Joao Raymond A. Transaction security apparatus and method
US6016960A (en) * 1997-07-08 2000-01-25 Intermec Ip Corporation Rule based method and apparatus for processing reflectance signals from machine-readable symbols or images
US6827260B2 (en) * 1999-08-09 2004-12-07 First Data Corporation Systems and methods for utilizing a point-of-sale system
US20030222135A1 (en) * 1999-08-09 2003-12-04 First Data Corporation Systems and methods for configuring a point-of-sale system
US6547132B1 (en) * 1999-08-09 2003-04-15 First Data Corporation Point of sale payment terminal
US6886742B2 (en) * 1999-08-09 2005-05-03 First Data Corporation Systems and methods for deploying a point-of sale device
US20020153414A1 (en) * 1999-08-09 2002-10-24 First Data Corporation Systems and methods for performing transactions at a point-of-sale
US20060208074A1 (en) * 2001-02-28 2006-09-21 Eglen Jan A Digital online exchange
US20040181453A1 (en) * 2002-11-06 2004-09-16 Ray James Thomas Configurable stored value platform
US20040193551A1 (en) * 2003-03-31 2004-09-30 First Data Corporation Methods and systems for processing unrestricted stored-value instruments
US20050061889A1 (en) * 2003-09-19 2005-03-24 First Data Corporation Financial presentation instruments with integrated holder and methods for use
US20050197958A1 (en) * 2003-12-29 2005-09-08 Ronald Miles Electronic account cash card security unit/process
US7600674B1 (en) * 2004-10-12 2009-10-13 Sprint Communications Company L.P. Integrated prepaid system and method
US20060255125A1 (en) * 2005-05-11 2006-11-16 First Data Corporation System and method for detecting fraudulent use of stored value instruments

Cited By (24)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8706630B2 (en) 1999-08-19 2014-04-22 E2Interactive, Inc. System and method for securely authorizing and distributing stored-value card data
US20110055078A1 (en) * 2006-11-07 2011-03-03 Ebay Inc. Online fraud prevention using genetic algorithm solution
US8321341B2 (en) * 2006-11-07 2012-11-27 Ebay, Inc. Online fraud prevention using genetic algorithm solution
US8930268B2 (en) 2006-11-07 2015-01-06 Ebay Inc. Online fraud prevention using genetic algorithm solution
US10776790B2 (en) 2006-11-07 2020-09-15 Paypal, Inc. Online fraud prevention using genetic algorithm solution
US11348114B2 (en) 2006-11-07 2022-05-31 Paypal, Inc. Online fraud prevention using genetic algorithm solution
US8676672B2 (en) 2007-08-23 2014-03-18 E2Interactive, Inc. Systems and methods for electronic delivery of stored value
US20100063906A1 (en) * 2008-09-05 2010-03-11 Giftango Corporation Systems and methods for authentication of a virtual stored value card
US20100082482A1 (en) * 2008-09-26 2010-04-01 Vandeburg Theodore F Systems and Methods for Aggregating and Donating Dormant Prepaid Card Amounts
US11928696B2 (en) 2009-12-16 2024-03-12 E2Interactive, Inc. Systems and methods for generating a virtual value item for a promotional campaign
US10068287B2 (en) 2010-06-11 2018-09-04 David A. Nelsen Systems and methods to manage and control use of a virtual card
US11182836B2 (en) 2010-10-13 2021-11-23 E2Interactive, Inc. Gift card ordering system and method
US10937076B2 (en) 2010-10-13 2021-03-02 E2Interactive, Inc. Online personalized gifting system
US11436651B2 (en) 2012-01-30 2022-09-06 E2Interactive, Inc. Group video generating system
US10943432B2 (en) 2012-09-04 2021-03-09 E2Interactive, Inc. Processing of a game-playing transaction based on location
US11037397B2 (en) 2012-09-04 2021-06-15 E2Interactive, Inc. Processing of a user device game-playing transaction based on location
US10943438B2 (en) 2012-09-04 2021-03-09 E2Interactive, Inc. Processing of a game-playing transaction based on location
US11111065B2 (en) 2013-02-15 2021-09-07 E2Interactive, Inc. Gift card presentation devices
US11219288B2 (en) 2013-02-15 2022-01-11 E2Interactive, Inc. Gift card box with slanted tray and slit
US11250666B2 (en) 2013-03-15 2022-02-15 E2Interactive, Inc. Systems and methods for location-based game play on computing devices
US11120428B2 (en) 2013-05-02 2021-09-14 E2Interactive, Inc. Stored value card kiosk system and method
US11017443B2 (en) 2014-04-30 2021-05-25 E2Interactive, Inc. System and method for a merchant onsite personalization gifting platform
CN107650582A (en) * 2016-07-26 2018-02-02 株式会社岛野 Cycle wheel fixing device
US10954049B2 (en) 2017-12-12 2021-03-23 E2Interactive, Inc. Viscous liquid vessel for gifting

Also Published As

Publication number Publication date
US20060255125A1 (en) 2006-11-16
US7325726B2 (en) 2008-02-05

Similar Documents

Publication Publication Date Title
US7325726B2 (en) System and method for detecting fraudulent use of stored value instruments
US20230289774A1 (en) Combination payment card and methods thereof
US7578439B2 (en) System and method for authorizing stored value card transactions
AU2008259784B2 (en) Systems and methods for automatic migration of a consumer between financial accounts
US7437328B2 (en) Value insertion using bill pay card preassociated with biller
US20090289111A1 (en) System And Method For Providing A Product-Based Coupon Card Account
US20110016041A1 (en) Triggering Fraud Rules for Financial Transactions
US20030212796A1 (en) Loadable debit card system and method
US20060253392A1 (en) Payment apparatus and method
US20210117941A1 (en) Application program interface for conversion of stored value cards
US8688548B2 (en) Negative balance management
CN107924512B (en) Electronic incremental payments
WO2013188559A2 (en) Methods and systems for investigating fraudulent transactions
IES980562A2 (en) Method and system for the prepayment of a mobile telephone account
US20160063620A1 (en) System and method of facilitating payday loans
KR20130006575A (en) Method for providing selective financial transaction

Legal Events

Date Code Title Description
AS Assignment

Owner name: FIRST DATA CORPORATION, COLORADO

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:JENNINGS, KENNETH E., JR.;MCDONOUGH, JOHN K.;PRIDGEON, PETER A.;AND OTHERS;REEL/FRAME:020248/0610;SIGNING DATES FROM 20050621 TO 20050728

STCB Information on status: application discontinuation

Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION