US20100125546A1 - System and method using superkeys and subkeys - Google Patents

System and method using superkeys and subkeys Download PDF

Info

Publication number
US20100125546A1
US20100125546A1 US12/616,028 US61602809A US2010125546A1 US 20100125546 A1 US20100125546 A1 US 20100125546A1 US 61602809 A US61602809 A US 61602809A US 2010125546 A1 US2010125546 A1 US 2010125546A1
Authority
US
United States
Prior art keywords
user
transaction
data
user inquiry
information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
US12/616,028
Inventor
Melyssa Barrett
Joe Scott
Nancy Hilgers
Kevin Siegel
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Visa International Service Association
Original Assignee
Visa International Service Association
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Visa International Service Association filed Critical Visa International Service Association
Priority to US12/616,028 priority Critical patent/US20100125546A1/en
Assigned to VISA INTERNATIONAL SERVICE ASSOCIATION reassignment VISA INTERNATIONAL SERVICE ASSOCIATION ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: SIEGEL, KEVIN, HILGERS, NANCY, BARRETT, MELYSSA, SCOTT, JOE
Priority to PCT/US2009/065167 priority patent/WO2010059840A2/en
Publication of US20100125546A1 publication Critical patent/US20100125546A1/en
Abandoned legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/403Solvency checks
    • G06Q20/4037Remote solvency checks
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/24Querying
    • G06F16/245Query processing
    • G06F16/2455Query execution
    • G06F16/24553Query execution of query operations
    • G06F16/24554Unary operations; Data partitioning operations
    • G06F16/24556Aggregation; Duplicate elimination
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/06Resources, workflows, human or project management; Enterprise or organisation planning; Enterprise or organisation modelling
    • G06Q10/067Enterprise or organisation modelling
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/02Marketing; Price estimation or determination; Fundraising
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • G06Q40/02Banking, e.g. interest calculation or account maintenance
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • G06Q40/03Credit; Loans; Processing thereof
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • G06Q40/08Insurance
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07FCOIN-FREED OR LIKE APPARATUS
    • G07F7/00Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus
    • G07F7/08Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means

Definitions

  • a risk assessment network receives a user inquiry from an information requester, such as a credit card issuer.
  • an information requester such as a credit card issuer.
  • a network is a payment processing network typical in a credit card payment processing network.
  • the user inquiry received from the information requester can include user identification information such as the user's name, address, phone number, Social Security number and date of birth.
  • the inquiry can also include a request for a risk assessment summary or a credit score.
  • the network sends a file with contents of the user inquiry to one or more data sources.
  • the one or more data sources send account level data and the network receives the account level data at step 20 .
  • account level data can include a number of account numbers associated with the user indicated in the user inquiry.
  • the network queries a transaction database for transaction level data in step 25 .
  • Such transaction level data can include details of individual transactions conducted with each of the accounts associated with the user.
  • the network analyzes the transaction level data to determine the risk assessment summary or credit score according to internal network protocols, policies and algorithms in step 30 .
  • the network sends the risk assessment summary or credit score to the information requester.
  • the risk assessment summary provided by the network is typically the same regardless of which information requester requested the summary.
  • Such standardization of risk assessment summaries and credit scores while providing consistent and concise metrics of risk, do not allow for a means to provide customized reports or analysis of the transaction level data according to internal needs of each information request.
  • each information requester may have specific transaction level data needs to run their own internal risk assessment policies, protocols and regulations as determined by their target customers and account portfolio.
  • Current risk assessment networks cannot provide transaction level data aggregates across multiple accounts customized to the requirements of an individual information requester.
  • Embodiments of the present invention address this and other deficiencies of conventional risk assessment systems and methods.
  • Various embodiments of the present invention include methods for providing aggregated user data.
  • the method comprises receiving a plurality of different user inquiry messages relating to a user from a plurality of information requesters and assigning subkeys to each user inquiry messages at a transaction inquiry server.
  • the plurality of user inquiry messages are combined into a combined user inquiry message using the transaction server.
  • a super key may be assigned to the combined user inquiry message and the super key and the combined user inquiry message are sent from the transaction server to one or more data sources.
  • duplicate user data requests in the plurality of user inquiry messages are deleted.
  • systems for providing user risk data can include a transaction database and an aggregator.
  • the aggregator can be configured to receive a plurality of different user inquiry messages relating to a user from a plurality of information requesters.
  • the aggregator can be further configured to combine the plurality of user inquiry messages into a combined user inquiry message and assign a super key to the combined user inquiry message.
  • the aggregator can send the super key and the combined user inquiry message to one or more data sources.
  • a method of using a data source server to report user account data based on a combined user inquiry message is provided.
  • the method can include receiving the combined user inquiry message at the data source server from another server or computer. Once the combined user inquiry message is received, a super key and user identifiers are parsed from the combined user inquiry message using the server. Based on the user identifiers, the data source server is used to retrieve and send account data associated with the user identifiers.
  • FIG. 1A depicts a flow chart of a current method for reporting user and account level information in response to individual user information inquiries.
  • FIG. 1B depicts a flow chart of a method for reporting user and transaction level information in response to a plurality of user information inquiries according to one embodiment of the present invention.
  • FIG. 2 depicts a schematic diagram of a system for combining multiple user information inquiries and reporting aggregated transaction level data to multiple information requesters according to one embodiment of the present invention.
  • FIG. 3 depicts a schematic diagram of a system for reporting aggregated transaction level data to multiple information requesters according to one embodiment of the present invention.
  • FIG. 4 depicts a system for providing aggregated transaction level data according to one embodiment of the present invention.
  • FIG. 5 depicts a system and representative aggregated transaction level data according to one embodiment of the present invention.
  • FIG. 6 depicts a system, raw transaction level data and representative aggregated transaction level data according to one embodiment of the present invention.
  • FIG. 7 depicts a flow chart of a method of compiling transaction level aggregates according to one embodiment of the present invention.
  • FIG. 8 is a schematic of a computer system that can be used to implement various embodiments of the present invention.
  • the present invention is directed to systems and methods for efficiently and cost-effectively reporting aggregated user, account and transaction level information to multiple information requesters.
  • embodiments of the present invention can be used to report user information and aggregated transaction data to multiple credit account issuers for the purpose of anticipating or managing the risk of user bankruptcy or other account risks.
  • FIG. 1B depicts a flow chart of a method 100 B for processing user inquiries from multiple information requesters according to one embodiment of the present invention.
  • Method 100 B can be performed by any appropriate computer or server system running appropriate computer readable code in a network for processing account applications and/or transactions.
  • the network receives a plurality of user inquiries from multiple information requesters.
  • information requesters can be banks or other credit issuing institutions or entities.
  • a server can receive the user inquiries for the network.
  • the server can receive the plurality of user inquiries over various communication media including, but not limited to, the Internet, proprietary communication channels, wireless networks or any other suitable communication media.
  • the server can receive the plurality of user inquiries over any existing transaction or communication channels used for authorizing transaction or communicating user credit card account applications.
  • the server can assign each of the plurality of user inquiries a subkey to identify the specific inquiries made by each of the information requesters in step 2 .
  • a subkey For example, three credit-issuing banks, or issuers, can send the network three separate user and/or account inquiries regarding the same user. The user may have many accounts and may have those accounts spread over multiple issuers and each of the credit issuing-banks may require composite information about some or all of the user's accounts.
  • the network can refer to the assigned subkey.
  • the subkey can be used by the network to route communication to and from each bank regarding information about the user and the corresponding account level and transaction level information.
  • the network can combine the plurality of user inquiries into a single combined user inquiry.
  • the plurality of user inquiries can be multiple user inquiries regarding the same user.
  • the plurality of user inquiries can be multiple user inquiries regarding a plurality of users.
  • the multiple user inquiries can include multiple information requests for one or more of a plurality of users from a plurality of different information requesters.
  • the combined user inquiry can include user inquiries and user identification information, or identifiers, from multiple information requesters about the same user or users.
  • a user inquiry can include requests for the total amount of available credit and the composite or aggregated amount and age of any outstanding balances across all accounts associated with the user.
  • the combined user inquiry can include user information such as the user's name, Social Security number, address, phone number, date of birth and other user identifying information for multiple users.
  • the combined user inquiry can contain duplicate information and information requests depending on what information is requested by each of the information requesters. Such duplicate inquiry information and information requests can be information that is of interest and allowable to one or more of the information requesters.
  • more than one information requester might be interested in the credit score, recent spending patterns, recent credit card acquisitions, amount of unpaid credit card account balances, repayment history and other non-account specific aggregated transaction level data for a particular user.
  • the one or more of the duplicate information requests regarding the particular user can be deleted before the final combined user inquiry is compiled.
  • an aggregator can be configured to detect and delete the duplicate user inquiries. By deleting the duplicate information requests from multiple information requesters, such as banks, the network can route and request information from various data sources more quickly and efficiently. This provides the benefits of reducing the cost to the network and the information requesters.
  • the network can assign the combined user inquiry a single super key to link all the of the information requests and resulting responses to the user.
  • the network can assign each user a super key to identify each user and link each information request and the resulting responses to the corresponding user.
  • the super key can be used to identify the user inquiry file and a particular user associated with that file. Additionally, the super key can provide a link between multiple accounts issued by multiple issuers to a single user. The super key can link or tag all information linked to a particular user. Additionally, the super key can link the subkeys assigned to each of the incoming user inquiries received by the network.
  • a user inquiry can be a comma or tab delineated ASCII file or a compiled machine-readable file in binary code.
  • the user inquiry can be encrypted.
  • Each user inquiry can include a request for specific aggregated transaction level or account level information based on all accounts linked to a particular user by the corresponding super key.
  • the network can send the combined user inquiry file or portions of the combined user inquiry file (may include user identifiable information) as a linkage request file to one or more data sources to determine some or all accounts associated with each of the one or more users identified in the combined user inquiry file and associated with a super key.
  • the network sends the super keys with the linkage request file so responses from the data sources can be associated with the super keys at the data source.
  • the super keys are not sent to the data sources and the network can reference identifiers provided by the data sources to link accounts to the super keys.
  • the network can associate a super key to a data source identifier provided in a response to the linkage request file.
  • the data received from each data source can be tagged with the data source identifier to preserve information regarding the source of any information the network might store or send to various entities including the information requesters.
  • the network After the network sends the linkage request file to one or more data sources, it can receive responses to the linkage request file from the one or more data sources in the form of one or more linkage response files in step 4 .
  • the linkage response file can include user, account data.
  • the linkage response file can include a listing of the account numbers for all or some of the accounts associated with a particular user linked to the super key or an identifier generated and provided by the data source.
  • the network links the super key to all or some of the accounts or account numbers contained in the linkage response file.
  • the data sources can return the linkage response file with a listing of account numbers associated with the particular user by linking the account numbers to the super key.
  • the network can use the link between the account numbers and the super key provided by the data sources.
  • each data source can provide data source-specific identifiers that the network can link to the super key.
  • the network can then use data source-specific identifier linked to the super key to track the source of specific user/account information for later reference by the network, the information requesters or the user.
  • the super key can also be used to link the plurality of user accounts associated with a particular user. In this way, the super key can be used to identify a particular user, all the accounts associated with that user and any gathered or aggregated user, account or transaction level data.
  • the linkage request file can be submitted to the one or more data sources individually or as part of a batch process in which multiple information requests regarding multiple users are submitted to the one or more data sources at predetermined intervals or in predetermined batch sizes.
  • the linkage request file are sent to one or more data sources as part of a batch
  • the super key assigned to each user can be used to link information in each of the one or more data sources to each particular user.
  • the network can submit a super key that is linked to a particular user and some or all accounts associated with the user to a user or transaction database to gather transaction level data across all the accounts.
  • the network in a credit card transaction system can submit a super key and the account numbers for all the credit card accounts associated with a particular user.
  • the transaction database can then return raw, unprocessed, transaction level detail data for all the accounts listed in the linkage response file sent by a data source.
  • raw transaction level data can include unparsed transaction level detail data as it is received from the transaction database.
  • Such transaction level detail data can include the date, time, location, type and amount for each transaction processed with all the accounts associated with a particular user.
  • raw transaction level data will need to be processed, parsed or reformatted before it can be analyzed and used to compile transaction level aggregates or attributes.
  • the network itself can include one or more user or transaction databases, while in other embodiments, the network can receive raw transaction level data from external user or transaction databases.
  • the network can include user information or a transaction databases.
  • the user information database can be a data source used to store and report on the history of user information as compiled in account acquisitions while the transaction database can be a data source used to report up-to-date transaction profile information and transaction history of transactions processed using various user accounts.
  • the network can receive raw transaction level data regarding accounts associated with a particular user.
  • the raw transaction data can be a listing of individual transactions conducted with some or all of the accounts associated with the user.
  • Such individual listings of transactions can be linked to the super key and include information such as account designations or identifiers, account numbers, entity identifiers and the amount, type, time and date of each transaction.
  • the network can then aggregate each of the individual transactions into any type of statistic or report requested by the information requesters and link the statistic or report to the super key and the corresponding subkey originally assigned to the user inquiry that included the request for the particular statistic or report received from the information requesters.
  • the aggregator can be run and/or hosted by a third party entity external to the network. In other embodiments, the aggregator can be part of the network, the transaction server or the transaction database.
  • the network can use the aggregator to calculate or otherwise determine summaries of spending patterns over various periods of time, summaries of types of spending, totals for spending at particular vendors or entities and the like.
  • One advantage of various embodiments of the present invention is that each information requester can customize the aggregated information, statistics and reports it receives from the network per the requirements of each information requesters' internal risk management and bankruptcy prediction algorithms, protocols and policies.
  • the network in step 7 can respond to the original plurality of user inquiries with the corresponding aggregates based on the subkey originally assigned to each of the received user inquiries.
  • each information requester is to receive only the aggregated data, statistics or report it requested in its user inquiry.
  • the network can send unsolicited aggregated transaction level data it determines to be necessary or relevant to a particular information requesters internal risk management or bankruptcy predictions policies, protocols or algorithms.
  • Various embodiments of the present invention can also be used to collect transaction level data and provide aggregates or attributes on levels other than the consumer level. For example, consumers can be grouped based on region of residence, demographic information, classification of consumer type, etc. Such grouping can be very helpful for providing offers to particular groups of consumers when approaching them with targeted group marketing.
  • FIG. 2 is a schematic of a system for combining user inquiries from multiple information requesters and aggregating user or transaction level data according to the method 100 B depicted in FIG. 1B .
  • the functionality of the various components of the system 200 for combining user inquiries for multiple information requesters and reporting aggregated user or transaction level data will be described with reference to the steps in method 100 B as they correspond to the data flow indicated by the numbered arrow indicating the steps in FIG. 2 .
  • the system 200 can include a network 230 .
  • the network 230 can be any network or association for handling user account transactions or inquiries.
  • network 230 includes a transaction server 239 .
  • Transaction server 239 can be a computer system that runs computer readable code to receive process, settle and reconcile various transactions managed by network 230 .
  • transaction server 239 can include a transaction database 235 and an aggregator 237 .
  • Transaction database 235 can be connected or otherwise networked to aggregator 237 .
  • network 230 , and consequently transaction server 239 can be in communication with a plurality of information requesters. Each of the connections in FIG.
  • FIG. 2 is a possible communication route among information requester A 205 , information requester B 215 , information requester C 225 , network 230 , data source 240 , user office 250 and user 260 .
  • Next to each connection is a numbered arrow indicating the flow of information corresponding to the numbered steps in method 100 B depicted in the flowchart in FIG. 1B .
  • transaction server 239 can receive multiple user inquiries from multiple information requesters as shown by the connections between information requester A 205 , information requester B 215 , information requester C 225 and transaction server 239 .
  • Transaction server 239 can be configured to receive user inquiries over any appropriate communication media from the information requesters.
  • the communication medium can be the Internet, a proprietary communication network 230 , a wireless network or other appropriate telecommunications or data connections.
  • transaction server 239 can receive user inquiries from information requester A 205 , information requester B 215 and information requesters C 225 in step 1 .
  • information requesters A through C can be credit issuing banks. Each of the credit issuing banks can send in a user inquiry regarding one or more users and include requests for information regarding any accounts that that bank has opened related to those users as well as aggregated transaction level data.
  • transaction server 239 when transaction server 239 receives a plurality of user inquiries, it assigns a subkey to each one of the user inquiries.
  • the subkey can identify the particular information requester that sent in the user inquiry and can be referenced later when the transaction server 239 sends a user inquiry response file to one or more of the information requesters.
  • each information requester can provide its own subkey when it submits the user inquiry.
  • Transaction server 239 can analyze the plurality of user inquiries it has received. In some embodiments, if the transaction server 239 determines that more than one of the user inquiries relates to the same user as another user inquiry, then the transaction server 239 or aggregator 237 can combine those user inquiries into a single combined user inquiry file in step 2 .
  • transaction server 239 or aggregator 237 can also assign a super key to the combined user inquiry file or the user in step 2 .
  • Transaction server 239 or aggregator 237 can send the combined user inquiry file to data source 240 in step 3 as a linkage request file.
  • the linkage requested file can include a request to link all accounts associated with a particular user to the super key associated with the particular user.
  • data source 240 can be a plurality of data sources.
  • data source 240 can be one or more credit reporting bureaus.
  • data source 240 can include a fraud database.
  • data source 240 can include a transaction database such as transaction database 235 .
  • transaction database 235 can alternatively be integrated into transaction server 239 within network 230 .
  • transaction database 235 can store and organize various transactions processed by network 230 .
  • Transaction level detail stored in transaction database 235 can be processed to produce specific summary information in response to the plurality of user inquiries. For example, in a credit card payment processing network, some user inquiries might request information that summarizes specific types of transaction details such as the amount and frequency of payment transactions.
  • transaction database 235 can store and organize user account data. In such embodiments, it is possible for information requesters to submit user inquiries to request summary data regarding the application velocity of any and all data submitted in an application stored in transaction database 235 .
  • transaction server 239 can receive a linkage response file from data source 240 .
  • the linkage response file can include the super key included in the initial combined user inquiry file sent by the transaction server 239 .
  • transaction server 239 can gather transaction level information in transaction database 235 for all accounts linked to the particular super key and user.
  • aggregator 237 can analyze and/or summarize the transaction level information based on user inquiries linked to the super key.
  • Transaction server 239 or aggregator 237 can then prepare user inquiry response files according to the subkeys either submitted with or assigned to the original user inquiries submitted by the plurality of information requesters in step 6 .
  • the user inquiry response files can then be routed to each information requester based on corresponding subkeys.
  • information requester A 205 may have submitted a user inquiry including a request for the amount a particular user spent on consumer goods in transactions greater than $100 over the past 12 months across all accounts associated with that user.
  • the user inquiry response file can include an aggregated report for transactions for consumer goods greater than $100 dollars summed over the past 12 months across all user accounts associated with that particular user.
  • Such a report can include a sum of the dollar amount of all relevant transactions or it can include the number of relevant transactions.
  • such a user inquiry can be tagged with the subkey.
  • the specific data and depth of detail requested by each information requester can depend on each information requester's internal credit or bankruptcy risk management policies, protocols and regulations. Different information requesters can have different bankruptcy risk, credit risk and account management indicators.
  • transaction server 239 or aggregator 237 can parse out the aggregated reports into individual user inquiry response files according to super keys or sub keys and then send the individual user inquiry response files to the information requesters corresponding to the subkeys. This step provides each information requester only the information requested in each information requesters' original user inquiry.
  • information requesters can query user 260 to verify information reported in the individual user inquiry response files in step 8 .
  • the step is usually an investigative step to determine if there are any reasons or concerns regarding surprising information discovered in the individual user inquiry response file.
  • the information requested by a particular information requester in a user inquiry can be for the purpose of predicting or detecting a risk of the particular user declaring bankruptcy.
  • each information requester such as a credit card issuer
  • a typical user inquiry used to predict or detect the risk of bankruptcy can include information that would indicate a build up of credit card balances, depletion of personal checking and savings accounts, increased rate of credit card or personal loan applications.
  • user 260 can take the opportunity to contact the user office 250 that represents any one of the information requesters, network 230 or data source 240 to request information on file about them in an aggregated report, communicate any financial difficulties, dispute the information represented in the aggregated report or clarify any mistakes or inconsistencies in data regarding the user 260 .
  • user office 250 can then report any corrections or verifications to network 230 in step 10 .
  • FIG. 3 illustrates a system and the steps of combining user inquiries from multiple information requesters with general examples of requested aggregates, subkeys and super keys.
  • information requester A 205 information requester B 215 and information requesters C 225 each submit separate user inquiries.
  • Information requester A 205 can submit an inquiry about user X and including requests for aggregates A and B.
  • Aggregates A and B can be specific requests for information according to the internal risk and bankruptcy management policies, protocols and regulations of information requester A 205 .
  • Aggregate A can be request for the total dollar amount of purchases user X across all accounts associated with user X for the past 2 months.
  • user inquiry submitted by information requester A 205 can include a subkey n ax .
  • information requester B 215 can submit a user inquiry about user X including requests for aggregates C and D.
  • the user inquiry submitted by information requester B 215 can include a subkey n bx .
  • information requester C 225 can submit an inquiry about user X and include a request for aggregates A and C.
  • user inquiry submitted by information requester C 225 can include a subkey n cx .
  • the user inquiries sent to network 230 by information requesters do not have subkeys assigned. In such embodiments, the aggregator 237 assigns each of the subkeys to the incoming user inquiries.
  • transaction server 239 When transaction server 239 receives the submitted user inquiries, it analyzes the inquiries to determine if any of the user inquiries are related to the same user or comprise requests for duplicate aggregates. As shown in FIG. 3 , each of the user inquiries submitted by the information requesters are all related to user X and transaction server 239 or aggregator 237 can assign a super key N x to user X, the corresponding incoming user inquiry and associated subkeys in step I. Similarly, transaction server 239 or aggregator 237 can detect that the user inquiries submitted by information requester A 205 and information requester C 225 both include requests for aggregate A. As such, aggregator 237 can determine that there are 3 user inquiries regarding user X comprising two duplicate requests for aggregate A related to user X. Aggregator 237 can combine the three incoming user inquiries into one combined user inquiry file as well as assign it a super key N x that can link user X to aggregates A, B, C and D and the corresponding subkeys.
  • Aggregator 237 can submit the combined user inquiry file, the user identifier for user X and the associated super key N x to one or more data sources.
  • data sources can include data source 240 and/or transaction database 235 .
  • the data sources to which the combined user inquiry file is sent is determined by the type of information requested by the individual information requesters in the original user inquiries.
  • the aggregated user inquiry file can be sent to transaction database 235 if the included inquiries request transaction level details.
  • the aggregated user inquiry file to be sent to data source 240 such as a credit reporting bureau, if the included inquiries request account or credit worthiness details.
  • data source 240 can supply credit scores, the amount and age of any outstanding credit card balances or other information that can be used to predict or detect risk of user X declaring bankruptcy. Additionally, data source 240 can provide account numbers or account identifiers for accounts associated with user X.
  • aggregator 237 submits a linkage request file to data source 240 which can include identifiers for user X, super key N x and requests for some or all of the accounts associated with user X.
  • source 240 in step II, can return accounts M, N, P and Q associated with user X to transaction server 239 in a linkage response file.
  • Data source 240 , transaction server 239 or aggregator 237 can link user X or super key N x with accounts M, N, P and Q in step II.
  • transaction database 235 can receive a request for all raw transaction level data regarding accounts M, N, P and Q associated with user X from aggregator 237 .
  • Transaction database 235 can return all requested transaction level data to aggregator 237 .
  • aggregator 237 will run various reports and analysis to generate aggregates A, B, C and D and link the results to super key N x .
  • network 230 or aggregator 237 can send the appropriate user inquiry response files to information requester A 205 , information requester B 215 and information requester C 225 and shown in FIG. 4 .
  • FIG. 5 depicts a system and method for providing predefined model or customized transaction aggregates to multiple information requesters.
  • network 230 or aggregator 237 can send a partial or complete list of model transaction aggregates 530 to information requesters A 205 , B 215 and C 225 .
  • the sample list of fourteen model transaction aggregates shown in model transaction aggregates 530 is not exhaustive.
  • One of ordinary skill in the art will recognize many forms of derived, calculated or collected transaction level details can be determined for various periods of time, types of transactions or locations.
  • Various examples and methods of determining, defining and calculating “factors” and “clusters” can be found in commonly owned and currently pending U.S. patent application Ser. No. 12/537,566 filed on Aug. 7, 2009, which is herein incorporated by reference for all purposes.
  • network 230 or aggregator 237 can provide all possible or allowable transaction aggregates to each subscribing information requester in list of model transaction aggregates 530 .
  • each information requester can customize or define the transaction aggregates that aggregator 237 reports back.
  • information requesters can select from the predefined aggregates in the list of model transaction aggregates 530 as well as define some number of customized transaction level aggregates suited to its own internal credit, bankruptcy or other risk management policies, protocols or regulations.
  • list of model transaction aggregates 530 can be provided to information requesters as a template to information requesters for use in defining their own transaction level aggregates.
  • the list of model transaction aggregates 530 can be stored in memory 520 in aggregator 237 . Alternatively, the list of model transaction aggregates 530 can be stored elsewhere in network 230 . List of model transaction aggregates 530 can be provided to information requesters and referenced by aggregator 237 over appropriate electronic communication media. Embodiments in which aggregator 237 includes a processor 510 and memory 520 , processor 510 can access the list of model transaction aggregates 530 stored in memory 520 by internal bus or other electronic communication medium within aggregator 237 .
  • Examples of transaction aggregates that can be included in the lists of model transaction aggregates 530 include, but are not limited to, reports on the number of accounts used in the past 180 days, the ratio of the number of accounts used in the last 60 days to the number of accounts used in the last 365 days, the average transaction amount in the last month, the difference between the amount of cash advances in a financial institution from one month to another, the ratio of the total daily number of transactions compared between weekdays and weekends, etc.
  • the foregoing list should be viewed as illustrative and not limiting.
  • FIG. 6 depicts a system and method for obtaining raw transaction level data and determining transaction level data aggregates according to various embodiments of the present invention.
  • FIG. 6 also depicts a system and method for reporting the determined transaction level data aggregates to one or more information requesters according to the information requested by each information requester.
  • each information requester may request various predetermined transaction level data aggregates or define their own custom transaction level data aggregates.
  • aggregator 237 can include processor 510 and memory 520 .
  • aggregator 237 can be appropriately configured computer or server.
  • Memory 520 can include a list of model transaction aggregates 530 they can be referenced by processor 510 when aggregator 237 receives a transaction data inquiry file from an information requester.
  • Transaction inquiry file can include user identification information and/or a super key to identify a particular user for whom information requester would like transaction level data aggregates.
  • Aggregator 237 can send the user identification information to transaction database 235 . This step in the method is represented by arrow 31 indicating the transmission of a user inquiry file from aggregator 237 to transaction database 235 over an appropriate electronic communication medium.
  • Aggregator 237 which may or may not be a part of network 230 , can receive a user inquiry file from an information requestor and can parse out individual user identification information from the file and then run a database report for the historical or geographical ranges that can be indicated in the user inquiry file.
  • transaction database 235 can return all transaction level data for all accounts associated with a particular user stored in transaction database 235 . The information can then be parsed in later steps and by other components of system 600 .
  • Transaction database 235 can include real-time transaction level data for all accounts associated with any or all users identified in the user inquiry file.
  • transaction database 235 can return raw transaction data 605 .
  • the raw transaction data 605 can include transaction level data elements such as account number, issuer ID, the dates the transaction, the type of the transaction, the amount of the transaction, and merchants identification, location and the flag as to whether sufficient funds were available in the account for that particular transaction.
  • each transaction can be indicated as a line item and include successful, rejected or attempted transactions.
  • the raw transaction data can include whether the transaction was initiated at a point of sale device, over the Internet or over the telephone.
  • the only limit on the type of information included in each line item or record of the raw transaction data is the depth of the data store by transaction database 235 .
  • transaction database 235 can send a transaction data response file to aggregator 237 via an appropriate electronic communication medium.
  • Transaction data response file can include raw transaction data 605 , a key or a super key or any other information that can be used to process, organize or identify the contents of the transaction data response file or route the same to the correct information requester.
  • the transaction data response file can include raw transaction data 605 for more than one user. In this way, transaction database 235 can process reports for multiple users and can send the resulting transaction data response file in the minimal number of electronic communications.
  • Aggregator 237 can receive transaction data response file and parse the data therein according to the requests for transaction level aggregates from one or more information requesters. Parsing the data in the transaction data response file can include separating or grouping raw transaction data 605 records according to the associated user. Parsing the data in the transaction data response file can also include selecting or extracting raw transaction data line items or records based on certain transaction data elements such as date ranges, amounts, day of the week, type of transaction etc. Parsing the data in the transaction data response file can also include extracting transaction data elements based on transaction level data element identifiers.
  • aggregator 237 can then determine one or more transaction aggregates as requested by one or more information requesters or recommended or suggested by network 230 or aggregator 237 .
  • processor 510 can retrieve the list of model transaction aggregates 530 from memory 520 in step 33 . If the transaction aggregates requested by the information requesters is listed in the list of model transaction aggregates 530 , then those aggregates can be identified by an aggregate number or other appropriate identifier. In such embodiments, the aggregate identifier can be shorthand for indicating which aggregates a particular information requester wants for a particular user.
  • the list of model transaction aggregates 530 can be used a menu of predefined transaction level data aggregates.
  • One example of a predefined transaction data aggregates that aggregator 237 can produce is a tally of the number of accounts used in the last 100 days as defined by model transaction aggregate definition number 1 listed in the list of model transaction aggregates 530 . If information requesters would like such information, that information requester can indicate they would like aggregate definition number 1 in the user inquiry file it sends to aggregator 237 . Alternatively, an information requester may request aggregator 237 to calculate the average transaction amount in the last month by summing the amounts of each successful transaction executed within the last 30 days or calendar month and then dividing by the total number of transactions executed within that same timeframe as defined in model transaction aggregate definition number 9 in the list of model transaction aggregates 530 .
  • information requester can send a properly formatted user inquiry file including requests for transaction aggregate definition number 9 along with the date range for which they would like the calculated data.
  • User inquiry file can also include, along with a request for the predefined transaction aggregates listed in the list of model transaction aggregates 530 , definitions and specific instructions for custom information requester defined transaction aggregates suited to the information requester's internal credit risk or bankruptcy risk management policies, protocols or regulations.
  • One of ordinary skill in the art will recognize that many other useful transaction aggregates can be defined and/or included in the list of model transaction aggregates 530 without departing from the spirit or scope of the present invention.
  • Report 620 can be formatted in a number ways according to the standards of aggregator 237 or the requirements of the requesting information requester. In some embodiments, report 620 can return each aggregate along with its associated transaction data aggregate definition identifier. For example, report 620 lists four line items numbered 1 , 2 , 8 and 10 . These line items correspond to the transaction data aggregate definition numbers listed in the list of model transaction aggregates 530 . As such, the first piece of data listed in report 620 shows 1 . 4 and corresponds to the 4 cards used in the last 180 days by the user associated with the initial user inquiry file and the corresponding transaction data inquiry file.
  • report 620 shows 2 . 5 : 6 and indicates a ratio of 5 cards used in the last 60 days to the 6 cards used the last 360 days.
  • the third piece of data shows 8.14.3% and indicates that 14.3% of the transactions in the last 360 days were rejected or otherwise handled as having insufficient funds.
  • the final piece of data shown in report 620 indicates 10 . $XX.YY indicating that the amount spent in restaurants in the latest month was $XX.YY.
  • report 620 can also include information requester defined custom transaction aggregates and associated aggregate definition identifiers.
  • FIG. 7 depicts a flow chart of a method 700 for determining transaction level data aggregates according to various embodiments of the present invention.
  • the step numbers of method 700 correspond to the arrows indicating dataflow in system 600 depicted in FIG. 6 .
  • aggregator 237 can send one or more transaction data inquiries to transaction database 235 with requests for all or some of the raw transaction level data for all accounts associated with a particular user.
  • the accounts associated with a particular user can include credit card accounts, credit line accounts, checking accounts, savings accounts, money market accounts as well as any other financial or nonfinancial accounts held by particular user.
  • Transaction database 235 can be a payment processing network with an associated transaction database that may or may not be updated in real time.
  • transaction database can return a transaction data response including any and all raw transaction level data 605 requested by the information requester or aggregator 237 back to aggregator 237 .
  • the raw transaction level data 605 can include any transaction level data elements associated with any number of individual transactions and accounts.
  • a raw transaction level data record can include transaction level data elements such as an issuer identifier, a merchant identifier, a date, a location, a transaction type identifier, etc.
  • aggregator 237 parses the raw transaction level data 605 according to aggregates requested by information requester.
  • the raw transaction level data 605 is parsed according to a predefined transaction aggregate listed in the list of model transaction aggregates 510 .
  • Parsing the raw transaction level data 605 can include separating out individual transactions level data records or line items according to the type or values of transaction level data elements included in the transaction level data record or line item.
  • parsing the transaction level data 605 can include separating out individual transaction level data records based on a data range, for example a date range, indicated by one or more transaction level data elements. It is therefore possible to select transaction level data records within a certain date range or value range by looking at the date or value of particular transaction level data elements within the transaction level data records.
  • aggregator 237 can determine the transaction level aggregates according to aggregates requested by each information requester. Aggregator 237 can then send a report 620 to the information requesters using information requester identification codes, keys, PINs, user identifiable information (name, address, & ssn), or super keys so that each information requester receives the transaction level data aggregates it originally requested.
  • FIG. 8 is a block diagram of typical computer system 800 configured to execute computer readable code to implement various functions and steps according to various embodiments of the present invention.
  • System 800 is representative of a computer system capable of embodying the present invention.
  • the computer system can be present in any of the elements in FIGS. 2 through 4 , including the transaction server 239 , transaction database 235 and aggregator 237 described above.
  • the computer may be a desktop, portable, rack-mounted or tablet configuration.
  • the computer may be a series of networked computers.
  • the use of other micro processors are contemplated, such as XeonTM, PentiumTM or CoreTM microprocessors; TurionTM 64, OpteronTM or AthlonTM microprocessors from Advanced Micro Devices, Inc; and the like.
  • Windows®, WindowsXP®, WindowsNT®, or the like from Microsoft Corporation
  • Solaris from Sun Microsystems
  • LINUX LINUX
  • UNIX UNIX
  • the techniques described above may be implemented upon a chip or an auxiliary processing board.
  • Various embodiments may be based upon systems provided by daVinci, Pandora, Silicon Color, or other vendors.
  • computer system 800 typically includes a display 810 , computer 820 , a keyboard 830 , a user input device 840 , computer interfaces 850 , and the like.
  • display (monitor) 810 may be embodied as a CRT display, an LCD display, a plasma display, a direct-projection or rear-projection DLP, a microdisplay, or the like.
  • display 810 may be used to display user interfaces and rendered images.
  • user input device 840 is typically embodied as a computer mouse, a trackball, a track pad, a joystick, wireless remote, drawing tablet, voice command system, and the like.
  • User input device 840 typically allows a user to select objects, icons, text and the like that appear on the display 810 via a command such as a click of a button or the like.
  • An additional specialized user input device 845 such a magnetic stripe, RFID transceiver or smart card reader may also be provided in various embodiments.
  • user input device 845 include additional computer system displays (e.g. multiple monitors). Further user input device 845 may be implemented as one or more graphical user interfaces on such a display.
  • Embodiments of computer interfaces 850 typically include an Ethernet card, a modem (telephone, satellite, cable, ISDN), (asynchronous) digital subscriber line (DSL) unit, FireWire interface, USB interface, and the like.
  • computer interfaces 850 may be coupled to a computer network, to a FireWire bus, or the like.
  • computer interfaces 850 may be physically integrated on the motherboard of computer 820 , may be a software program, such as soft DSL, or the like.
  • RAM 870 and disk drive 880 are examples of computer-readable tangible media configured to store data such user, account and transaction level data, calculated aggregated data, super keys, sub keys and other executable computer code, human readable code, or the like.
  • Other types of tangible media include magnetic storage media such as floppy disks, networked hard disks, or removable hard disks; optical storage media such as CD-ROMS, DVDs, holographic memories, or bar codes; semiconductor media such as flash memories, read-only-memories (ROMS); battery-backed volatile memories; networked storage devices, and the like.
  • computer system 800 may also include software that enables communications over a network such as the HTTP, TCP/IP, RTP/RTSP protocols, and the like.
  • communications software and transfer protocols may also be used, for example IPX, UDP or the like.
  • computer 820 typically includes familiar computer components such as a processor 860 , and memory storage devices, such as a random access memory (RAM) 870 , disk drives 880 , and system bus 890 interconnecting the above components.
  • processor 860 processor 860
  • memory storage devices such as a random access memory (RAM) 870 , disk drives 880 , and system bus 890 interconnecting the above components.
  • RAM random access memory
  • computer 820 includes one or more Xeon microprocessors from Intel. Further, in the present embodiment, computer 820 typically includes a UNIX-based operating system.
  • any of the software components or functions described in this application may be implemented as software code to be executed by a processor using any suitable computer language such as, for example, Java, C++ or Perl using, for example, conventional or object-oriented techniques.
  • the software code may be stored as a series of instructions, or commands on a computer readable medium, such as a random access memory (RAM), a read only memory (ROM), a magnetic medium such as a hard-drive or a floppy disk, or an optical medium such as a CD-ROM.
  • RAM random access memory
  • ROM read only memory
  • magnetic medium such as a hard-drive or a floppy disk
  • optical medium such as a CD-ROM.
  • Any such computer readable medium may reside on or within a single computational apparatus, and may be present on or within different computational apparatuses within a system or network.

Abstract

Systems and methods for providing aggregated transaction level data for a particular user to multiple information requesters are disclosed. Subkeys are assigned to user inquiries from multiple information requesters and a super key is assigned to those subkeys to link them to one or more user identifiers such as a username or Social Security number. Account level data is provided based on the super key and the user identifiers. Duplicate requests for aggregated transaction level data contained in the user inquiries can be deleted. User inquiry response files containing transaction level aggregate data can be sent to the information requesters based on the assigned subkeys.

Description

    CROSS-REFERENCES TO RELATED APPLICATIONS
  • This Application claims priority to U.S. Provisional Patent Application No. 61/116,207 filed on Nov. 19, 2008, and is related to U.S. Non-Provisional Patent Application 12/616,048 filed on Nov. 10, 2009. All applications (provisional and non-provisional) are herein incorporated by reference in their entirety for all purposes.
  • BACKGROUND
  • Various tools, systems and products exist to assist various entities assess the risk, marketing value, success of marketing efforts, consumer loyalty and detect fraud. Such tools are especially useful for helping credit issuers when assessing the initial and continued credit worthiness of a user with regard to a credit account, targeting offers and evaluating the chances of a user declaring bankruptcy. The methodology of a conventional system for providing risk assessment or scoring is illustrated in the flowchart depicted in FIG. 1A.
  • Starting at step 10, a risk assessment network receives a user inquiry from an information requester, such as a credit card issuer. One example of a network is a payment processing network typical in a credit card payment processing network. The user inquiry received from the information requester can include user identification information such as the user's name, address, phone number, Social Security number and date of birth. The inquiry can also include a request for a risk assessment summary or a credit score.
  • At step 15, the network sends a file with contents of the user inquiry to one or more data sources. In response to the file, the one or more data sources send account level data and the network receives the account level data at step 20. In many conventional risk assessment systems, account level data can include a number of account numbers associated with the user indicated in the user inquiry. Using the account level data, usually the account numbers, the network queries a transaction database for transaction level data in step 25. Such transaction level data can include details of individual transactions conducted with each of the accounts associated with the user. The network then analyzes the transaction level data to determine the risk assessment summary or credit score according to internal network protocols, policies and algorithms in step 30. Finally, in step 35 the network sends the risk assessment summary or credit score to the information requester.
  • The risk assessment summary provided by the network is typically the same regardless of which information requester requested the summary. Such standardization of risk assessment summaries and credit scores, while providing consistent and concise metrics of risk, do not allow for a means to provide customized reports or analysis of the transaction level data according to internal needs of each information request. Depending on the size and sophistication of each individual information requester, each information requester may have specific transaction level data needs to run their own internal risk assessment policies, protocols and regulations as determined by their target customers and account portfolio. Current risk assessment networks cannot provide transaction level data aggregates across multiple accounts customized to the requirements of an individual information requester.
  • Embodiments of the present invention address this and other deficiencies of conventional risk assessment systems and methods.
  • BRIEF SUMMARY
  • Various embodiments of the present invention include methods for providing aggregated user data. The method comprises receiving a plurality of different user inquiry messages relating to a user from a plurality of information requesters and assigning subkeys to each user inquiry messages at a transaction inquiry server. The plurality of user inquiry messages are combined into a combined user inquiry message using the transaction server. A super key may be assigned to the combined user inquiry message and the super key and the combined user inquiry message are sent from the transaction server to one or more data sources. In some embodiments, duplicate user data requests in the plurality of user inquiry messages are deleted.
  • In other embodiments, systems for providing user risk data are provided. The systems can include a transaction database and an aggregator. The aggregator can be configured to receive a plurality of different user inquiry messages relating to a user from a plurality of information requesters. The aggregator can be further configured to combine the plurality of user inquiry messages into a combined user inquiry message and assign a super key to the combined user inquiry message. When the super key is assigned to the combined user inquiry message, the aggregator can send the super key and the combined user inquiry message to one or more data sources.
  • In yet other embodiments, a method of using a data source server to report user account data based on a combined user inquiry message is provided. The method can include receiving the combined user inquiry message at the data source server from another server or computer. Once the combined user inquiry message is received, a super key and user identifiers are parsed from the combined user inquiry message using the server. Based on the user identifiers, the data source server is used to retrieve and send account data associated with the user identifiers.
  • BRIEF DESCRIPTION OF THE DRAWINGS
  • FIG. 1A depicts a flow chart of a current method for reporting user and account level information in response to individual user information inquiries.
  • FIG. 1B depicts a flow chart of a method for reporting user and transaction level information in response to a plurality of user information inquiries according to one embodiment of the present invention.
  • FIG. 2 depicts a schematic diagram of a system for combining multiple user information inquiries and reporting aggregated transaction level data to multiple information requesters according to one embodiment of the present invention.
  • FIG. 3 depicts a schematic diagram of a system for reporting aggregated transaction level data to multiple information requesters according to one embodiment of the present invention.
  • FIG. 4 depicts a system for providing aggregated transaction level data according to one embodiment of the present invention.
  • FIG. 5 depicts a system and representative aggregated transaction level data according to one embodiment of the present invention.
  • FIG. 6 depicts a system, raw transaction level data and representative aggregated transaction level data according to one embodiment of the present invention.
  • FIG. 7 depicts a flow chart of a method of compiling transaction level aggregates according to one embodiment of the present invention.
  • FIG. 8 is a schematic of a computer system that can be used to implement various embodiments of the present invention.
  • DETAILED DESCRIPTION
  • The present invention is directed to systems and methods for efficiently and cost-effectively reporting aggregated user, account and transaction level information to multiple information requesters. For example, embodiments of the present invention can be used to report user information and aggregated transaction data to multiple credit account issuers for the purpose of anticipating or managing the risk of user bankruptcy or other account risks.
  • FIG. 1B depicts a flow chart of a method 100B for processing user inquiries from multiple information requesters according to one embodiment of the present invention. Method 100B can be performed by any appropriate computer or server system running appropriate computer readable code in a network for processing account applications and/or transactions. In step 1, the network receives a plurality of user inquiries from multiple information requesters. As examples, information requesters can be banks or other credit issuing institutions or entities. In some embodiments, a server can receive the user inquiries for the network. The server can receive the plurality of user inquiries over various communication media including, but not limited to, the Internet, proprietary communication channels, wireless networks or any other suitable communication media. For example, in the credit card industry, the server can receive the plurality of user inquiries over any existing transaction or communication channels used for authorizing transaction or communicating user credit card account applications.
  • Once the network receives the plurality of user inquiries, the server can assign each of the plurality of user inquiries a subkey to identify the specific inquiries made by each of the information requesters in step 2. For example, three credit-issuing banks, or issuers, can send the network three separate user and/or account inquiries regarding the same user. The user may have many accounts and may have those accounts spread over multiple issuers and each of the credit issuing-banks may require composite information about some or all of the user's accounts. To identify which user inquiry came from which bank, the network can refer to the assigned subkey. The subkey can be used by the network to route communication to and from each bank regarding information about the user and the corresponding account level and transaction level information.
  • Next, the network can combine the plurality of user inquiries into a single combined user inquiry. In some embodiments, the plurality of user inquiries can be multiple user inquiries regarding the same user. In other embodiments, the plurality of user inquiries can be multiple user inquiries regarding a plurality of users. In yet other embodiments, the multiple user inquiries can include multiple information requests for one or more of a plurality of users from a plurality of different information requesters.
  • Once the combined user inquiry is generated, it can include user inquiries and user identification information, or identifiers, from multiple information requesters about the same user or users. For example, a user inquiry can include requests for the total amount of available credit and the composite or aggregated amount and age of any outstanding balances across all accounts associated with the user. Additionally, the combined user inquiry can include user information such as the user's name, Social Security number, address, phone number, date of birth and other user identifying information for multiple users. The combined user inquiry can contain duplicate information and information requests depending on what information is requested by each of the information requesters. Such duplicate inquiry information and information requests can be information that is of interest and allowable to one or more of the information requesters. For example, more than one information requester might be interested in the credit score, recent spending patterns, recent credit card acquisitions, amount of unpaid credit card account balances, repayment history and other non-account specific aggregated transaction level data for a particular user. In such cases, the one or more of the duplicate information requests regarding the particular user can be deleted before the final combined user inquiry is compiled.
  • Since the combined user inquiry can contain duplicate information requests, various embodiments of the present invention can delete the duplicate information requests. In some embodiments, an aggregator can be configured to detect and delete the duplicate user inquiries. By deleting the duplicate information requests from multiple information requesters, such as banks, the network can route and request information from various data sources more quickly and efficiently. This provides the benefits of reducing the cost to the network and the information requesters.
  • In step 3, if the combined user inquiry includes only multiple user inquiries regarding a single user, the network can assign the combined user inquiry a single super key to link all the of the information requests and resulting responses to the user. In other embodiments in which the combined user inquiry includes one or more user inquiries regarding a plurality of users, the network can assign each user a super key to identify each user and link each information request and the resulting responses to the corresponding user. In various embodiments, the super key can be used to identify the user inquiry file and a particular user associated with that file. Additionally, the super key can provide a link between multiple accounts issued by multiple issuers to a single user. The super key can link or tag all information linked to a particular user. Additionally, the super key can link the subkeys assigned to each of the incoming user inquiries received by the network.
  • As used herein, the terms user inquiry, user inquiry message and user inquiry file can be used interchangeably to refer to any electronically stored or transmitted document, string, vector or other data structure that can contain user identification and/or inquiry or request information. For example, a user inquiry can be a comma or tab delineated ASCII file or a compiled machine-readable file in binary code. In some embodiments, the user inquiry can be encrypted. Each user inquiry can include a request for specific aggregated transaction level or account level information based on all accounts linked to a particular user by the corresponding super key.
  • In embodiments in which the network assigns a super key, the network can send the combined user inquiry file or portions of the combined user inquiry file (may include user identifiable information) as a linkage request file to one or more data sources to determine some or all accounts associated with each of the one or more users identified in the combined user inquiry file and associated with a super key. In some embodiments, the network sends the super keys with the linkage request file so responses from the data sources can be associated with the super keys at the data source. In other embodiments, the super keys are not sent to the data sources and the network can reference identifiers provided by the data sources to link accounts to the super keys. For example, the network can associate a super key to a data source identifier provided in a response to the linkage request file. In such embodiments, the data received from each data source can be tagged with the data source identifier to preserve information regarding the source of any information the network might store or send to various entities including the information requesters.
  • After the network sends the linkage request file to one or more data sources, it can receive responses to the linkage request file from the one or more data sources in the form of one or more linkage response files in step 4. The linkage response file can include user, account data. For example, the linkage response file can include a listing of the account numbers for all or some of the accounts associated with a particular user linked to the super key or an identifier generated and provided by the data source.
  • In step 5, the network links the super key to all or some of the accounts or account numbers contained in the linkage response file. In embodiments in which the network provides the super key with the linkage request file sent to the data sources, the data sources can return the linkage response file with a listing of account numbers associated with the particular user by linking the account numbers to the super key. In such embodiments, the network can use the link between the account numbers and the super key provided by the data sources. In other embodiments, each data source can provide data source-specific identifiers that the network can link to the super key. The network can then use data source-specific identifier linked to the super key to track the source of specific user/account information for later reference by the network, the information requesters or the user. The super key can also be used to link the plurality of user accounts associated with a particular user. In this way, the super key can be used to identify a particular user, all the accounts associated with that user and any gathered or aggregated user, account or transaction level data.
  • Depending on the agreement and communication connections between the network and the one or more data sources, the linkage request file can be submitted to the one or more data sources individually or as part of a batch process in which multiple information requests regarding multiple users are submitted to the one or more data sources at predetermined intervals or in predetermined batch sizes. In embodiments in which the linkage request file are sent to one or more data sources as part of a batch, the super key assigned to each user can be used to link information in each of the one or more data sources to each particular user.
  • In step 6, the network can submit a super key that is linked to a particular user and some or all accounts associated with the user to a user or transaction database to gather transaction level data across all the accounts. For example, the network in a credit card transaction system can submit a super key and the account numbers for all the credit card accounts associated with a particular user. The transaction database can then return raw, unprocessed, transaction level detail data for all the accounts listed in the linkage response file sent by a data source. As used herein, raw transaction level data can include unparsed transaction level detail data as it is received from the transaction database. Such transaction level detail data can include the date, time, location, type and amount for each transaction processed with all the accounts associated with a particular user. In some embodiments, raw transaction level data will need to be processed, parsed or reformatted before it can be analyzed and used to compile transaction level aggregates or attributes.
  • In some embodiments, the network itself can include one or more user or transaction databases, while in other embodiments, the network can receive raw transaction level data from external user or transaction databases. For example, if the network is a payment transaction-processing network, the network can include user information or a transaction databases. The user information database can be a data source used to store and report on the history of user information as compiled in account acquisitions while the transaction database can be a data source used to report up-to-date transaction profile information and transaction history of transactions processed using various user accounts.
  • In response to a super key and transaction information requests submitted to the user or transaction database, the network can receive raw transaction level data regarding accounts associated with a particular user. The raw transaction data can be a listing of individual transactions conducted with some or all of the accounts associated with the user. Such individual listings of transactions can be linked to the super key and include information such as account designations or identifiers, account numbers, entity identifiers and the amount, type, time and date of each transaction. The network can then aggregate each of the individual transactions into any type of statistic or report requested by the information requesters and link the statistic or report to the super key and the corresponding subkey originally assigned to the user inquiry that included the request for the particular statistic or report received from the information requesters.
  • In some embodiments, the aggregator can be run and/or hosted by a third party entity external to the network. In other embodiments, the aggregator can be part of the network, the transaction server or the transaction database.
  • From the data stored in the transaction database, the network can use the aggregator to calculate or otherwise determine summaries of spending patterns over various periods of time, summaries of types of spending, totals for spending at particular vendors or entities and the like. One advantage of various embodiments of the present invention is that each information requester can customize the aggregated information, statistics and reports it receives from the network per the requirements of each information requesters' internal risk management and bankruptcy prediction algorithms, protocols and policies.
  • Once the network gathers, determines or otherwise calculates transaction level aggregated data, also referred to as transaction level aggregates or attributes, the network in step 7 can respond to the original plurality of user inquiries with the corresponding aggregates based on the subkey originally assigned to each of the received user inquiries. In some embodiments, each information requester is to receive only the aggregated data, statistics or report it requested in its user inquiry. In other embodiments, the network can send unsolicited aggregated transaction level data it determines to be necessary or relevant to a particular information requesters internal risk management or bankruptcy predictions policies, protocols or algorithms.
  • Various embodiments of the present invention can also be used to collect transaction level data and provide aggregates or attributes on levels other than the consumer level. For example, consumers can be grouped based on region of residence, demographic information, classification of consumer type, etc. Such grouping can be very helpful for providing offers to particular groups of consumers when approaching them with targeted group marketing.
  • FIG. 2 is a schematic of a system for combining user inquiries from multiple information requesters and aggregating user or transaction level data according to the method 100B depicted in FIG. 1B. The functionality of the various components of the system 200 for combining user inquiries for multiple information requesters and reporting aggregated user or transaction level data will be described with reference to the steps in method 100B as they correspond to the data flow indicated by the numbered arrow indicating the steps in FIG. 2.
  • The system 200 can include a network 230. The network 230 can be any network or association for handling user account transactions or inquiries. In some embodiments, network 230 includes a transaction server 239. Transaction server 239 can be a computer system that runs computer readable code to receive process, settle and reconcile various transactions managed by network 230. In some embodiments, transaction server 239 can include a transaction database 235 and an aggregator 237. Transaction database 235 can be connected or otherwise networked to aggregator 237. Furthermore, network 230, and consequently transaction server 239, can be in communication with a plurality of information requesters. Each of the connections in FIG. 2 is a possible communication route among information requester A 205, information requester B 215, information requester C 225, network 230, data source 240, user office 250 and user 260. Next to each connection is a numbered arrow indicating the flow of information corresponding to the numbered steps in method 100B depicted in the flowchart in FIG. 1B.
  • In some embodiments, transaction server 239 can receive multiple user inquiries from multiple information requesters as shown by the connections between information requester A 205, information requester B 215, information requester C 225 and transaction server 239. Transaction server 239 can be configured to receive user inquiries over any appropriate communication media from the information requesters. In some embodiments, the communication medium can be the Internet, a proprietary communication network 230, a wireless network or other appropriate telecommunications or data connections.
  • As shown in FIG. 2, transaction server 239 can receive user inquiries from information requester A 205, information requester B 215 and information requesters C 225 in step 1. In some embodiments, information requesters A through C can be credit issuing banks. Each of the credit issuing banks can send in a user inquiry regarding one or more users and include requests for information regarding any accounts that that bank has opened related to those users as well as aggregated transaction level data.
  • As previously described in reference to FIG. 1B, when transaction server 239 receives a plurality of user inquiries, it assigns a subkey to each one of the user inquiries. The subkey can identify the particular information requester that sent in the user inquiry and can be referenced later when the transaction server 239 sends a user inquiry response file to one or more of the information requesters. In some embodiments, each information requester can provide its own subkey when it submits the user inquiry.
  • Transaction server 239 can analyze the plurality of user inquiries it has received. In some embodiments, if the transaction server 239 determines that more than one of the user inquiries relates to the same user as another user inquiry, then the transaction server 239 or aggregator 237 can combine those user inquiries into a single combined user inquiry file in step 2.
  • In some embodiments, transaction server 239 or aggregator 237 can also assign a super key to the combined user inquiry file or the user in step 2. Transaction server 239 or aggregator 237 can send the combined user inquiry file to data source 240 in step 3 as a linkage request file. The linkage requested file can include a request to link all accounts associated with a particular user to the super key associated with the particular user.
  • In some embodiments, data source 240 can be a plurality of data sources. For example, data source 240 can be one or more credit reporting bureaus. In other embodiments, data source 240 can include a fraud database. In yet other embodiments, data source 240 can include a transaction database such as transaction database 235. As previously mentioned, transaction database 235 can alternatively be integrated into transaction server 239 within network 230.
  • In various embodiments, transaction database 235 can store and organize various transactions processed by network 230. Transaction level detail stored in transaction database 235 can be processed to produce specific summary information in response to the plurality of user inquiries. For example, in a credit card payment processing network, some user inquiries might request information that summarizes specific types of transaction details such as the amount and frequency of payment transactions. In other embodiments, transaction database 235 can store and organize user account data. In such embodiments, it is possible for information requesters to submit user inquiries to request summary data regarding the application velocity of any and all data submitted in an application stored in transaction database 235.
  • In step 4, transaction server 239 can receive a linkage response file from data source 240. The linkage response file can include the super key included in the initial combined user inquiry file sent by the transaction server 239. In step 5, transaction server 239 can gather transaction level information in transaction database 235 for all accounts linked to the particular super key and user. In some embodiments, aggregator 237 can analyze and/or summarize the transaction level information based on user inquiries linked to the super key. Transaction server 239 or aggregator 237 can then prepare user inquiry response files according to the subkeys either submitted with or assigned to the original user inquiries submitted by the plurality of information requesters in step 6. The user inquiry response files can then be routed to each information requester based on corresponding subkeys.
  • For example, information requester A 205 may have submitted a user inquiry including a request for the amount a particular user spent on consumer goods in transactions greater than $100 over the past 12 months across all accounts associated with that user. In such a scenario, the user inquiry response file can include an aggregated report for transactions for consumer goods greater than $100 dollars summed over the past 12 months across all user accounts associated with that particular user. Such a report can include a sum of the dollar amount of all relevant transactions or it can include the number of relevant transactions. As mentioned above, such a user inquiry can be tagged with the subkey. The specific data and depth of detail requested by each information requester can depend on each information requester's internal credit or bankruptcy risk management policies, protocols and regulations. Different information requesters can have different bankruptcy risk, credit risk and account management indicators.
  • In step 7, transaction server 239 or aggregator 237 can parse out the aggregated reports into individual user inquiry response files according to super keys or sub keys and then send the individual user inquiry response files to the information requesters corresponding to the subkeys. This step provides each information requester only the information requested in each information requesters' original user inquiry.
  • In response to the user inquiry response file, information requesters can query user 260 to verify information reported in the individual user inquiry response files in step 8. The step is usually an investigative step to determine if there are any reasons or concerns regarding surprising information discovered in the individual user inquiry response file. For example, the information requested by a particular information requester in a user inquiry can be for the purpose of predicting or detecting a risk of the particular user declaring bankruptcy. Although each information requester, such as a credit card issuer, can have its own internal bankruptcy prediction policies, protocols and regulations, a typical user inquiry used to predict or detect the risk of bankruptcy, can include information that would indicate a build up of credit card balances, depletion of personal checking and savings accounts, increased rate of credit card or personal loan applications. While such indicators are set forth as examples of possible indicators of bankruptcy, the aforementioned list should not be considered exhaustive. Each information requester can have its own methodology for predicting and detecting the risk of bankruptcy or other credit risks and may wish to question the user 260 for purposes of evaluating the credit worthiness of the user “consumer.”
  • Once user 260 is contacted by one of the information requesters in step 8, user 260 can take the opportunity to contact the user office 250 that represents any one of the information requesters, network 230 or data source 240 to request information on file about them in an aggregated report, communicate any financial difficulties, dispute the information represented in the aggregated report or clarify any mistakes or inconsistencies in data regarding the user 260. In some embodiments, user office 250 can then report any corrections or verifications to network 230 in step 10.
  • FIG. 3 illustrates a system and the steps of combining user inquiries from multiple information requesters with general examples of requested aggregates, subkeys and super keys. As shown, information requester A 205, information requester B 215 and information requesters C 225 each submit separate user inquiries. Information requester A 205 can submit an inquiry about user X and including requests for aggregates A and B. Aggregates A and B can be specific requests for information according to the internal risk and bankruptcy management policies, protocols and regulations of information requester A 205. For example, Aggregate A can be request for the total dollar amount of purchases user X across all accounts associated with user X for the past 2 months. In some embodiments, user inquiry submitted by information requester A 205 can include a subkey nax. Additionally, information requester B 215 can submit a user inquiry about user X including requests for aggregates C and D. In some embodiments, the user inquiry submitted by information requester B 215 can include a subkey nbx. Finally, information requester C 225 can submit an inquiry about user X and include a request for aggregates A and C. In some embodiments, user inquiry submitted by information requester C 225 can include a subkey ncx. In other embodiments, the user inquiries sent to network 230 by information requesters do not have subkeys assigned. In such embodiments, the aggregator 237 assigns each of the subkeys to the incoming user inquiries.
  • When transaction server 239 receives the submitted user inquiries, it analyzes the inquiries to determine if any of the user inquiries are related to the same user or comprise requests for duplicate aggregates. As shown in FIG. 3, each of the user inquiries submitted by the information requesters are all related to user X and transaction server 239 or aggregator 237 can assign a super key Nx to user X, the corresponding incoming user inquiry and associated subkeys in step I. Similarly, transaction server 239 or aggregator 237 can detect that the user inquiries submitted by information requester A 205 and information requester C 225 both include requests for aggregate A. As such, aggregator 237 can determine that there are 3 user inquiries regarding user X comprising two duplicate requests for aggregate A related to user X. Aggregator 237 can combine the three incoming user inquiries into one combined user inquiry file as well as assign it a super key Nx that can link user X to aggregates A, B, C and D and the corresponding subkeys.
  • Aggregator 237 can submit the combined user inquiry file, the user identifier for user X and the associated super key Nx to one or more data sources. In some embodiments, data sources can include data source 240 and/or transaction database 235. The data sources to which the combined user inquiry file is sent is determined by the type of information requested by the individual information requesters in the original user inquiries. For example, the aggregated user inquiry file can be sent to transaction database 235 if the included inquiries request transaction level details. In other embodiments, the aggregated user inquiry file to be sent to data source 240, such as a credit reporting bureau, if the included inquiries request account or credit worthiness details. In the cases in which data source 240 is a credit reporting bureau such as Experian® or Equifax®, the source 240 can supply credit scores, the amount and age of any outstanding credit card balances or other information that can be used to predict or detect risk of user X declaring bankruptcy. Additionally, data source 240 can provide account numbers or account identifiers for accounts associated with user X.
  • In various embodiments, aggregator 237 submits a linkage request file to data source 240 which can include identifiers for user X, super key Nx and requests for some or all of the accounts associated with user X. In response, source 240, in step II, can return accounts M, N, P and Q associated with user X to transaction server 239 in a linkage response file. Data source 240, transaction server 239 or aggregator 237 can link user X or super key Nx with accounts M, N, P and Q in step II.
  • In step III, transaction database 235 can receive a request for all raw transaction level data regarding accounts M, N, P and Q associated with user X from aggregator 237. Transaction database 235 can return all requested transaction level data to aggregator 237. In step IV, aggregator 237 will run various reports and analysis to generate aggregates A, B, C and D and link the results to super key Nx. Based on the super key Nx and its links to the subkeys nax, nbx and ncx, network 230 or aggregator 237 can send the appropriate user inquiry response files to information requester A 205, information requester B 215 and information requester C 225 and shown in FIG. 4.
  • Raw and Aggregated Transaction Level Data
  • FIG. 5 depicts a system and method for providing predefined model or customized transaction aggregates to multiple information requesters. To facilitate fast, efficient and cost-effective risk management, network 230 or aggregator 237 can send a partial or complete list of model transaction aggregates 530 to information requesters A 205, B 215 and C 225. The sample list of fourteen model transaction aggregates shown in model transaction aggregates 530 is not exhaustive. One of ordinary skill in the art will recognize many forms of derived, calculated or collected transaction level details can be determined for various periods of time, types of transactions or locations. Various examples and methods of determining, defining and calculating “factors” and “clusters” can be found in commonly owned and currently pending U.S. patent application Ser. No. 12/537,566 filed on Aug. 7, 2009, which is herein incorporated by reference for all purposes.
  • In some embodiments, network 230 or aggregator 237 can provide all possible or allowable transaction aggregates to each subscribing information requester in list of model transaction aggregates 530. In other embodiments, each information requester can customize or define the transaction aggregates that aggregator 237 reports back. In other embodiments, information requesters can select from the predefined aggregates in the list of model transaction aggregates 530 as well as define some number of customized transaction level aggregates suited to its own internal credit, bankruptcy or other risk management policies, protocols or regulations. In such embodiments list of model transaction aggregates 530 can be provided to information requesters as a template to information requesters for use in defining their own transaction level aggregates.
  • The list of model transaction aggregates 530 can be stored in memory 520 in aggregator 237. Alternatively, the list of model transaction aggregates 530 can be stored elsewhere in network 230. List of model transaction aggregates 530 can be provided to information requesters and referenced by aggregator 237 over appropriate electronic communication media. Embodiments in which aggregator 237 includes a processor 510 and memory 520, processor 510 can access the list of model transaction aggregates 530 stored in memory 520 by internal bus or other electronic communication medium within aggregator 237.
  • Examples of transaction aggregates that can be included in the lists of model transaction aggregates 530 include, but are not limited to, reports on the number of accounts used in the past 180 days, the ratio of the number of accounts used in the last 60 days to the number of accounts used in the last 365 days, the average transaction amount in the last month, the difference between the amount of cash advances in a financial institution from one month to another, the ratio of the total daily number of transactions compared between weekdays and weekends, etc. The foregoing list should be viewed as illustrative and not limiting.
  • FIG. 6 depicts a system and method for obtaining raw transaction level data and determining transaction level data aggregates according to various embodiments of the present invention. FIG. 6 also depicts a system and method for reporting the determined transaction level data aggregates to one or more information requesters according to the information requested by each information requester. As mentioned above, each information requester may request various predetermined transaction level data aggregates or define their own custom transaction level data aggregates.
  • As shown, aggregator 237 can include processor 510 and memory 520. In such embodiments, aggregator 237 can be appropriately configured computer or server. Memory 520 can include a list of model transaction aggregates 530 they can be referenced by processor 510 when aggregator 237 receives a transaction data inquiry file from an information requester. Transaction inquiry file can include user identification information and/or a super key to identify a particular user for whom information requester would like transaction level data aggregates. Aggregator 237 can send the user identification information to transaction database 235. This step in the method is represented by arrow 31 indicating the transmission of a user inquiry file from aggregator 237 to transaction database 235 over an appropriate electronic communication medium.
  • Aggregator 237, which may or may not be a part of network 230, can receive a user inquiry file from an information requestor and can parse out individual user identification information from the file and then run a database report for the historical or geographical ranges that can be indicated in the user inquiry file. Alternatively, transaction database 235 can return all transaction level data for all accounts associated with a particular user stored in transaction database 235. The information can then be parsed in later steps and by other components of system 600. Transaction database 235 can include real-time transaction level data for all accounts associated with any or all users identified in the user inquiry file.
  • In response to a user inquiry file, transaction database 235 can return raw transaction data 605. The raw transaction data 605 can include transaction level data elements such as account number, issuer ID, the dates the transaction, the type of the transaction, the amount of the transaction, and merchants identification, location and the flag as to whether sufficient funds were available in the account for that particular transaction. In this way, each transaction can be indicated as a line item and include successful, rejected or attempted transactions. One of ordinary skill in the art will realize that other data for each transaction can be included in each line item or record of raw transaction data. For instance, the raw transaction data can include whether the transaction was initiated at a point of sale device, over the Internet or over the telephone. The only limit on the type of information included in each line item or record of the raw transaction data is the depth of the data store by transaction database 235.
  • In step 32, transaction database 235 can send a transaction data response file to aggregator 237 via an appropriate electronic communication medium. Transaction data response file can include raw transaction data 605, a key or a super key or any other information that can be used to process, organize or identify the contents of the transaction data response file or route the same to the correct information requester. In addition, the transaction data response file can include raw transaction data 605 for more than one user. In this way, transaction database 235 can process reports for multiple users and can send the resulting transaction data response file in the minimal number of electronic communications.
  • Aggregator 237 can receive transaction data response file and parse the data therein according to the requests for transaction level aggregates from one or more information requesters. Parsing the data in the transaction data response file can include separating or grouping raw transaction data 605 records according to the associated user. Parsing the data in the transaction data response file can also include selecting or extracting raw transaction data line items or records based on certain transaction data elements such as date ranges, amounts, day of the week, type of transaction etc. Parsing the data in the transaction data response file can also include extracting transaction data elements based on transaction level data element identifiers.
  • Once the raw transaction data is appropriately parsed, grouped or separated, aggregator 237 can then determine one or more transaction aggregates as requested by one or more information requesters or recommended or suggested by network 230 or aggregator 237. In some embodiments, processor 510 can retrieve the list of model transaction aggregates 530 from memory 520 in step 33. If the transaction aggregates requested by the information requesters is listed in the list of model transaction aggregates 530, then those aggregates can be identified by an aggregate number or other appropriate identifier. In such embodiments, the aggregate identifier can be shorthand for indicating which aggregates a particular information requester wants for a particular user. The list of model transaction aggregates 530 can be used a menu of predefined transaction level data aggregates.
  • One example of a predefined transaction data aggregates that aggregator 237 can produce is a tally of the number of accounts used in the last 100 days as defined by model transaction aggregate definition number 1 listed in the list of model transaction aggregates 530. If information requesters would like such information, that information requester can indicate they would like aggregate definition number 1 in the user inquiry file it sends to aggregator 237. Alternatively, an information requester may request aggregator 237 to calculate the average transaction amount in the last month by summing the amounts of each successful transaction executed within the last 30 days or calendar month and then dividing by the total number of transactions executed within that same timeframe as defined in model transaction aggregate definition number 9 in the list of model transaction aggregates 530. To do so, information requester can send a properly formatted user inquiry file including requests for transaction aggregate definition number 9 along with the date range for which they would like the calculated data. User inquiry file can also include, along with a request for the predefined transaction aggregates listed in the list of model transaction aggregates 530, definitions and specific instructions for custom information requester defined transaction aggregates suited to the information requester's internal credit risk or bankruptcy risk management policies, protocols or regulations. One of ordinary skill in the art will recognize that many other useful transaction aggregates can be defined and/or included in the list of model transaction aggregates 530 without departing from the spirit or scope of the present invention.
  • When aggregator 237 has determined a predetermined number of transaction data aggregates, it can prepare and send a report 620 to one or more information requesters. Report 620 can be formatted in a number ways according to the standards of aggregator 237 or the requirements of the requesting information requester. In some embodiments, report 620 can return each aggregate along with its associated transaction data aggregate definition identifier. For example, report 620 lists four line items numbered 1, 2, 8 and 10. These line items correspond to the transaction data aggregate definition numbers listed in the list of model transaction aggregates 530. As such, the first piece of data listed in report 620 shows 1. 4 and corresponds to the 4 cards used in the last 180 days by the user associated with the initial user inquiry file and the corresponding transaction data inquiry file. Similarly, the second piece of data in report 620 shows 2. 5:6 and indicates a ratio of 5 cards used in the last 60 days to the 6 cards used the last 360 days. The third piece of data shows 8.14.3% and indicates that 14.3% of the transactions in the last 360 days were rejected or otherwise handled as having insufficient funds. The final piece of data shown in report 620 indicates 10. $XX.YY indicating that the amount spent in restaurants in the latest month was $XX.YY. In other embodiments report 620 can also include information requester defined custom transaction aggregates and associated aggregate definition identifiers.
  • FIG. 7 depicts a flow chart of a method 700 for determining transaction level data aggregates according to various embodiments of the present invention. The step numbers of method 700 correspond to the arrows indicating dataflow in system 600 depicted in FIG. 6. At step 31, aggregator 237 can send one or more transaction data inquiries to transaction database 235 with requests for all or some of the raw transaction level data for all accounts associated with a particular user. The accounts associated with a particular user can include credit card accounts, credit line accounts, checking accounts, savings accounts, money market accounts as well as any other financial or nonfinancial accounts held by particular user. Transaction database 235 can be a payment processing network with an associated transaction database that may or may not be updated in real time.
  • At step 32, transaction database can return a transaction data response including any and all raw transaction level data 605 requested by the information requester or aggregator 237 back to aggregator 237. As previously mentioned, the raw transaction level data 605 can include any transaction level data elements associated with any number of individual transactions and accounts. In the credit card industry, a raw transaction level data record can include transaction level data elements such as an issuer identifier, a merchant identifier, a date, a location, a transaction type identifier, etc.
  • A step 33, aggregator 237 parses the raw transaction level data 605 according to aggregates requested by information requester. In some embodiments, the raw transaction level data 605 is parsed according to a predefined transaction aggregate listed in the list of model transaction aggregates 510. Parsing the raw transaction level data 605 can include separating out individual transactions level data records or line items according to the type or values of transaction level data elements included in the transaction level data record or line item. In some embodiments, parsing the transaction level data 605 can include separating out individual transaction level data records based on a data range, for example a date range, indicated by one or more transaction level data elements. It is therefore possible to select transaction level data records within a certain date range or value range by looking at the date or value of particular transaction level data elements within the transaction level data records.
  • Once the raw transaction level data 605 is parsed, aggregator 237 can determine the transaction level aggregates according to aggregates requested by each information requester. Aggregator 237 can then send a report 620 to the information requesters using information requester identification codes, keys, PINs, user identifiable information (name, address, & ssn), or super keys so that each information requester receives the transaction level data aggregates it originally requested.
  • FIG. 8 is a block diagram of typical computer system 800 configured to execute computer readable code to implement various functions and steps according to various embodiments of the present invention.
  • System 800 is representative of a computer system capable of embodying the present invention. The computer system can be present in any of the elements in FIGS. 2 through 4, including the transaction server 239, transaction database 235 and aggregator 237 described above. It will be readily apparent to one of ordinary skill in the art that many other hardware and software configurations are suitable for use with the present invention. For example, the computer may be a desktop, portable, rack-mounted or tablet configuration. Additionally, the computer may be a series of networked computers. Further, the use of other micro processors are contemplated, such as Xeon™, Pentium™ or Core™ microprocessors; Turion™ 64, Opteron™ or Athlon™ microprocessors from Advanced Micro Devices, Inc; and the like. Further, other types of operating systems are contemplated, such as Windows®, WindowsXP®, WindowsNT®, or the like from Microsoft Corporation, Solaris from Sun Microsystems, LINUX, UNIX, and the like. In still other embodiments, the techniques described above may be implemented upon a chip or an auxiliary processing board. Various embodiments may be based upon systems provided by daVinci, Pandora, Silicon Color, or other vendors.
  • In one embodiment, computer system 800 typically includes a display 810, computer 820, a keyboard 830, a user input device 840, computer interfaces 850, and the like. In various embodiments, display (monitor) 810 may be embodied as a CRT display, an LCD display, a plasma display, a direct-projection or rear-projection DLP, a microdisplay, or the like. In various embodiments, display 810 may be used to display user interfaces and rendered images.
  • In various embodiments, user input device 840 is typically embodied as a computer mouse, a trackball, a track pad, a joystick, wireless remote, drawing tablet, voice command system, and the like. User input device 840 typically allows a user to select objects, icons, text and the like that appear on the display 810 via a command such as a click of a button or the like. An additional specialized user input device 845, such a magnetic stripe, RFID transceiver or smart card reader may also be provided in various embodiments. In other embodiments, user input device 845 include additional computer system displays (e.g. multiple monitors). Further user input device 845 may be implemented as one or more graphical user interfaces on such a display.
  • Embodiments of computer interfaces 850 typically include an Ethernet card, a modem (telephone, satellite, cable, ISDN), (asynchronous) digital subscriber line (DSL) unit, FireWire interface, USB interface, and the like. For example, computer interfaces 850 may be coupled to a computer network, to a FireWire bus, or the like. In other embodiments, computer interfaces 850 may be physically integrated on the motherboard of computer 820, may be a software program, such as soft DSL, or the like.
  • RAM 870 and disk drive 880 are examples of computer-readable tangible media configured to store data such user, account and transaction level data, calculated aggregated data, super keys, sub keys and other executable computer code, human readable code, or the like. Other types of tangible media include magnetic storage media such as floppy disks, networked hard disks, or removable hard disks; optical storage media such as CD-ROMS, DVDs, holographic memories, or bar codes; semiconductor media such as flash memories, read-only-memories (ROMS); battery-backed volatile memories; networked storage devices, and the like.
  • In the present embodiment, computer system 800 may also include software that enables communications over a network such as the HTTP, TCP/IP, RTP/RTSP protocols, and the like. In alternative embodiments of the present invention, other communications software and transfer protocols may also be used, for example IPX, UDP or the like.
  • In various embodiments, computer 820 typically includes familiar computer components such as a processor 860, and memory storage devices, such as a random access memory (RAM) 870, disk drives 880, and system bus 890 interconnecting the above components.
  • In some embodiments, computer 820 includes one or more Xeon microprocessors from Intel. Further, in the present embodiment, computer 820 typically includes a UNIX-based operating system.
  • It should be understood that embodiments of the present invention as described above can be implemented in the form of control logic using computer software in a modular or integrated manner. Based on the disclosure and teachings provided herein, a person of ordinary skill in the art will know and appreciate other ways and/or methods to implement the present invention using hardware and a combination of hardware and software
  • Any of the software components or functions described in this application, may be implemented as software code to be executed by a processor using any suitable computer language such as, for example, Java, C++ or Perl using, for example, conventional or object-oriented techniques. The software code may be stored as a series of instructions, or commands on a computer readable medium, such as a random access memory (RAM), a read only memory (ROM), a magnetic medium such as a hard-drive or a floppy disk, or an optical medium such as a CD-ROM. Any such computer readable medium may reside on or within a single computational apparatus, and may be present on or within different computational apparatuses within a system or network.
  • The above description is illustrative and is not restrictive. Many variations of the invention will become apparent to those skilled in the art upon review of the disclosure. The scope of the invention should, therefore, be determined not with reference to the above description, but instead should be determined with reference to the pending claims along with their full scope or equivalents.
  • One or more features from any embodiment may be combined with one or more features of any other embodiment without departing from the scope of the invention.
  • A recitation of “a”, “an” or “the” is intended to mean “one or more” unless specifically indicated to the contrary.

Claims (18)

1. A method for providing aggregated user data comprising:
receiving a plurality of different user inquiry messages relating to a user from a plurality of information requesters at a transaction server;
assigning subkeys to the different user inquiry messages;
combining the plurality of user inquiry messages into a combined user inquiry message using the transaction server;
assigning a super key to the combined user inquiry message using the transaction server; and
sending the super key and the combined user inquiry message from the transaction server to one or more data sources.
2. The method of claim 1 further comprising receiving raw transaction level data for at least some accounts associated with the user.
3. The method of claim 2 wherein the plurality of different user inquiry messages relating to the user each comprise at least one request for aggregated transaction level data for at least some accounts associated with the user.
4. The method of claim 3 wherein combining the plurality of user inquiry messages further comprises deleting duplicate requests for aggregated transaction level data in the plurality of user inquiry messages.
5. The method of claim 4 further comprising assigning the super key to the accounts associated with the user.
6. The method of claim 5 further comprising running a report on the raw transaction level data to generate the requested aggregated transaction level data in the plurality of user inquiry messages using the transaction server.
7. The method of claim 6 further comprising parsing the requested aggregated transaction level data into a plurality of individual user inquiry response files based on the sub keys and sending the plurality of individual user inquiry response files to the information requester corresponding to the sub keys.
8. A system for providing user risk data comprising:
a transaction database; and
an aggregator,
wherein the aggregator is configured to receive a plurality of different user inquiry messages relating to a user from a plurality of information requesters, combine the plurality of user inquiry messages in a combined user inquiry message, assign a super key to the combined user inquiry message; and send the super key and the combined user inquiry message to one or more data sources.
9. The system of claim 8 wherein the aggregator is further configured to assign subkeys to the different user inquiry messages.
10. The system of claims 9 wherein the plurality of different user inquiry messages each comprise at least one request for aggregated transaction level data.
11. The system of claim 10 wherein the aggregator is further configured to delete duplicate requests for aggregated transaction level data in the plurality of user inquiry messages.
12. The system of claim 11 wherein the aggregator is further configured to receive a linkage response file from the one or more data sources that comprises links between at least some accounts associated with the user and the super key.
13. The system of claim 12 wherein the aggregator is further configured to link the super key to the subkeys.
14. The system of claim 17 wherein the aggregator is further configured to receive raw transaction level data for at least some of the accounts associated with the user.
15. The system of claim 14 wherein the aggregator is further configured to run at least one report on the raw transaction level data to generate at least some of the requested aggregated transaction level data in the plurality of user inquiry messages
16. The system of claim 15 wherein the aggregator is further configured to parse the requested aggregated transaction level data into a plurality of individual user inquiry response files based on the sub keys and sending the plurality of individual user inquiry response files to the information requesters corresponding to the sub keys.
17. A method of reporting user account data based on a combined user inquiry message using a server comprising:
receiving the combined user inquiry message using the server;
parsing a super key from the combined user inquiry message using the server;
parsing user identifiers from the combined user inquiry message using the server;
retrieving account data associated with the user identifiers using the server; and
sending the account data to one or more other servers from the server.
18. The method of claim 17 wherein sending the account data to one or more other servers from the server further comprises linking the account data to the super key.
US12/616,028 2008-11-19 2009-11-10 System and method using superkeys and subkeys Abandoned US20100125546A1 (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
US12/616,028 US20100125546A1 (en) 2008-11-19 2009-11-10 System and method using superkeys and subkeys
PCT/US2009/065167 WO2010059840A2 (en) 2008-11-19 2009-11-19 System and method using a transaction aggregator, superkeys and subkeys

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US11620708P 2008-11-19 2008-11-19
US12/616,028 US20100125546A1 (en) 2008-11-19 2009-11-10 System and method using superkeys and subkeys

Publications (1)

Publication Number Publication Date
US20100125546A1 true US20100125546A1 (en) 2010-05-20

Family

ID=42172755

Family Applications (3)

Application Number Title Priority Date Filing Date
US12/616,048 Active 2030-12-20 US9818118B2 (en) 2008-11-19 2009-11-10 Transaction aggregator
US12/616,028 Abandoned US20100125546A1 (en) 2008-11-19 2009-11-10 System and method using superkeys and subkeys
US12/824,030 Active US8086528B2 (en) 2008-11-19 2010-06-25 Transaction aggregator

Family Applications Before (1)

Application Number Title Priority Date Filing Date
US12/616,048 Active 2030-12-20 US9818118B2 (en) 2008-11-19 2009-11-10 Transaction aggregator

Family Applications After (1)

Application Number Title Priority Date Filing Date
US12/824,030 Active US8086528B2 (en) 2008-11-19 2010-06-25 Transaction aggregator

Country Status (2)

Country Link
US (3) US9818118B2 (en)
WO (1) WO2010059840A2 (en)

Cited By (49)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20110106840A1 (en) * 2009-11-05 2011-05-05 Melyssa Barrett Transaction aggregator for closed processing
US20120166384A1 (en) * 2010-12-22 2012-06-28 Karl-Peter Nos Systems and methods to provide server-side client based caching
US8788407B1 (en) 2013-03-15 2014-07-22 Palantir Technologies Inc. Malware data clustering
US8855999B1 (en) 2013-03-15 2014-10-07 Palantir Technologies Inc. Method and system for generating a parser and parsing complex data
US8930897B2 (en) 2013-03-15 2015-01-06 Palantir Technologies Inc. Data integration tool
US9009827B1 (en) 2014-02-20 2015-04-14 Palantir Technologies Inc. Security sharing system
US9021260B1 (en) 2014-07-03 2015-04-28 Palantir Technologies Inc. Malware data item analysis
US9043894B1 (en) 2014-11-06 2015-05-26 Palantir Technologies Inc. Malicious software detection in a computing system
US9202249B1 (en) 2014-07-03 2015-12-01 Palantir Technologies Inc. Data item clustering and analysis
US9230280B1 (en) 2013-03-15 2016-01-05 Palantir Technologies Inc. Clustering data based on indications of financial malfeasance
US9367872B1 (en) 2014-12-22 2016-06-14 Palantir Technologies Inc. Systems and user interfaces for dynamic and interactive investigation of bad actor behavior based on automatic clustering of related data in various data structures
US9454785B1 (en) 2015-07-30 2016-09-27 Palantir Technologies Inc. Systems and user interfaces for holistic, data-driven investigation of bad actor behavior based on clustering and scoring of related data
US9535974B1 (en) 2014-06-30 2017-01-03 Palantir Technologies Inc. Systems and methods for identifying key phrase clusters within documents
US9552615B2 (en) 2013-12-20 2017-01-24 Palantir Technologies Inc. Automated database analysis to detect malfeasance
CN106570010A (en) * 2015-10-09 2017-04-19 阿里巴巴集团控股有限公司 Method and device for identifying consecutive number users in interaction data
US9635046B2 (en) 2015-08-06 2017-04-25 Palantir Technologies Inc. Systems, methods, user interfaces, and computer-readable media for investigating potential malicious communications
US9785773B2 (en) 2014-07-03 2017-10-10 Palantir Technologies Inc. Malware data item analysis
US9817563B1 (en) 2014-12-29 2017-11-14 Palantir Technologies Inc. System and method of generating data points from one or more data stores of data items for chart creation and manipulation
US9898528B2 (en) 2014-12-22 2018-02-20 Palantir Technologies Inc. Concept indexing among database of documents using machine learning techniques
US9898509B2 (en) 2015-08-28 2018-02-20 Palantir Technologies Inc. Malicious activity detection system capable of efficiently processing data accessed from databases and generating alerts for display in interactive user interfaces
US9965937B2 (en) 2013-03-15 2018-05-08 Palantir Technologies Inc. External malware data item clustering and analysis
US10103953B1 (en) 2015-05-12 2018-10-16 Palantir Technologies Inc. Methods and systems for analyzing entity performance
US10120857B2 (en) 2013-03-15 2018-11-06 Palantir Technologies Inc. Method and system for generating a parser and parsing complex data
US10162887B2 (en) 2014-06-30 2018-12-25 Palantir Technologies Inc. Systems and methods for key phrase characterization of documents
US10230746B2 (en) 2014-01-03 2019-03-12 Palantir Technologies Inc. System and method for evaluating network threats and usage
US10235461B2 (en) 2017-05-02 2019-03-19 Palantir Technologies Inc. Automated assistance for generating relevant and valuable search results for an entity of interest
US10318630B1 (en) 2016-11-21 2019-06-11 Palantir Technologies Inc. Analysis of large bodies of textual data
US10325224B1 (en) 2017-03-23 2019-06-18 Palantir Technologies Inc. Systems and methods for selecting machine learning training data
US10356032B2 (en) 2013-12-26 2019-07-16 Palantir Technologies Inc. System and method for detecting confidential information emails
US10362133B1 (en) 2014-12-22 2019-07-23 Palantir Technologies Inc. Communication data processing architecture
US10482382B2 (en) 2017-05-09 2019-11-19 Palantir Technologies Inc. Systems and methods for reducing manufacturing failure rates
US10552994B2 (en) 2014-12-22 2020-02-04 Palantir Technologies Inc. Systems and interactive user interfaces for dynamic retrieval, analysis, and triage of data items
US10572487B1 (en) 2015-10-30 2020-02-25 Palantir Technologies Inc. Periodic database search manager for multiple data sources
US10572496B1 (en) 2014-07-03 2020-02-25 Palantir Technologies Inc. Distributed workflow system and database with access controls for city resiliency
US10606866B1 (en) 2017-03-30 2020-03-31 Palantir Technologies Inc. Framework for exposing network activities
US10620618B2 (en) 2016-12-20 2020-04-14 Palantir Technologies Inc. Systems and methods for determining relationships between defects
US10719527B2 (en) 2013-10-18 2020-07-21 Palantir Technologies Inc. Systems and user interfaces for dynamic and interactive simultaneous querying of multiple data stores
CN111769951A (en) * 2020-06-28 2020-10-13 成都平凡谷科技有限公司 Data parallel acquisition method, system and terminal based on USB-HID (Universal Serial bus-high intensity discharge) equipment
US10838987B1 (en) 2017-12-20 2020-11-17 Palantir Technologies Inc. Adaptive and transparent entity screening
US10891690B1 (en) 2014-11-07 2021-01-12 Intuit Inc. Method and system for providing an interactive spending analysis display
US10929436B2 (en) 2014-07-03 2021-02-23 Palantir Technologies Inc. System and method for news events detection and visualization
US10937034B2 (en) 2013-03-15 2021-03-02 Palantir Technologies Inc. Systems and user interfaces for dynamic and interactive investigation based on automatic malfeasance clustering of related data in various data structures
US20210073808A1 (en) * 2018-01-22 2021-03-11 Visa International Service Associatio Method, System, and Computer Program Product for Real-Time Data Aggregation
US10990969B2 (en) * 2018-12-21 2021-04-27 Square, Inc. Point of sale (POS) systems and methods for dynamically processing payment data based on payment reader capability
US11049095B2 (en) 2018-12-21 2021-06-29 Square, Inc. Point of sale (POS) systems and methods with dynamic kernel selection
US11119630B1 (en) 2018-06-19 2021-09-14 Palantir Technologies Inc. Artificial intelligence assisted evaluations and user interface for same
US11301856B2 (en) * 2018-05-24 2022-04-12 Mastercard International Incorporated Method and system for transaction authorization via controlled blockchain
EP4184408A1 (en) * 2021-11-17 2023-05-24 Mastercard International Incorporated Account linking index structure in a network
EP4184407A1 (en) * 2021-11-17 2023-05-24 Mastercard International Incorporated Account linking index structure in a network

Families Citing this family (25)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9818118B2 (en) * 2008-11-19 2017-11-14 Visa International Service Association Transaction aggregator
US20110071933A1 (en) * 2009-09-24 2011-03-24 Morgan Stanley System For Surveillance Of Financial Data
US8595789B2 (en) * 2010-02-15 2013-11-26 Bank Of America Corporation Anomalous activity detection
US8571954B2 (en) * 2010-09-20 2013-10-29 Bank Of America Corporation Customer exposure view and income statements (cevis)
CN102685071B (en) * 2011-03-10 2016-05-11 腾讯科技(深圳)有限公司 Realize the method and system of cloning between different microblogging accounts
US8914545B2 (en) 2011-04-27 2014-12-16 Iii Holdings 1, Llc Systems and methods for lossless compression of data and high speed manipulation thereof
US20130007849A1 (en) * 2011-05-26 2013-01-03 FonWallet Transaction Soulutions, Inc. Secure consumer authorization and automated consumer services using an intermediary service
NZ707185A (en) 2012-09-25 2018-01-26 Mx Tech Inc Aggregation source routing
US20140344029A1 (en) 2013-05-14 2014-11-20 Moneydesktop, Inc. Proactive bill pay method and system
US9917885B2 (en) 2013-07-30 2018-03-13 International Business Machines Corporation Managing transactional data for high use databases
US9497871B2 (en) 2014-12-19 2016-11-15 International Business Machines Corporation Modular enclosure elements employing cams forming detent features with latches
US9686883B2 (en) 2014-12-29 2017-06-20 International Business Machines Corporation Modular elements employing latches with flexure bearings
US10249002B2 (en) * 2015-09-11 2019-04-02 Bank Of America Corporation System for dynamic visualization of individualized consumption across shared resource allocation structure
US9692815B2 (en) 2015-11-12 2017-06-27 Mx Technologies, Inc. Distributed, decentralized data aggregation
US11288359B1 (en) 2015-11-30 2022-03-29 Mx Technologies, Inc. Automatic account protection
US10313342B1 (en) 2015-11-30 2019-06-04 Mx Technologies, Inc. Automatic event migration
US11233789B1 (en) 2015-11-30 2022-01-25 Mx Technologies, Inc. Automatic event migration
US20170316434A1 (en) * 2016-04-29 2017-11-02 Ncr Corporation Identity aggregation and integration
US20170316433A1 (en) * 2016-04-29 2017-11-02 Ncr Corporation Identity aggregation and integration
US11250028B2 (en) * 2017-01-31 2022-02-15 Bank Of America Corporation Data aggregator
CN112567368A (en) 2018-08-14 2021-03-26 维萨国际服务协会 Enhanced data security and presentation system and method
US11144536B2 (en) * 2019-06-26 2021-10-12 Nice Ltd. Systems and methods for real-time analytics detection for a transaction utilizing synchronously updated statistical aggregation data
US10984434B1 (en) 2019-07-02 2021-04-20 Wells Fargo Bank, N.A. Systems and methods for determining and providing non-financial benefits on a subscription basis
US20230073140A1 (en) * 2021-09-03 2023-03-09 Worldpay, Llc Systems and methods for data aggregation for transaction settlement
US20230251980A1 (en) * 2022-02-10 2023-08-10 Mellanox Technologies, Ltd. Devices, methods, and systems for disaggregated memory resources in a computing environment

Citations (96)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5401946A (en) * 1991-07-22 1995-03-28 Weinblatt; Lee S. Technique for correlating purchasing behavior of a consumer to advertisements
US5692017A (en) * 1994-07-20 1997-11-25 Nec Corporation Receiving circuit
US5717923A (en) * 1994-11-03 1998-02-10 Intel Corporation Method and apparatus for dynamically customizing electronic information to individual end users
US5875510A (en) * 1996-09-27 1999-03-02 Chesebrough-Pond's Usa Co., Division Of Conopco, Inc. Replaceable head toothbrush
US5974396A (en) * 1993-02-23 1999-10-26 Moore Business Forms, Inc. Method and system for gathering and analyzing consumer purchasing information based on product and consumer clustering relationships
US6012094A (en) * 1996-07-02 2000-01-04 International Business Machines Corporation Method of stratified transaction processing
US6216129B1 (en) * 1998-12-03 2001-04-10 Expanse Networks, Inc. Advertisement selection system supporting discretionary target market characteristics
US6285330B1 (en) * 1998-07-14 2001-09-04 Sensis Corporation Antenna field tester
US20010049520A1 (en) * 2000-05-01 2001-12-06 Janet Robertson Non-invasive female urinary device
US6334110B1 (en) * 1999-03-10 2001-12-25 Ncr Corporation System and method for analyzing customer transactions and interactions
US20020059100A1 (en) * 2000-09-22 2002-05-16 Jon Shore Apparatus, systems and methods for customer specific receipt advertising
US20020099562A1 (en) * 1999-10-29 2002-07-25 Bruce Michael George System and method of data exchange for electronic transactions with multiple sources
US6430539B1 (en) * 1999-05-06 2002-08-06 Hnc Software Predictive modeling of consumer financial behavior
US20020147670A1 (en) * 1999-07-21 2002-10-10 Jeffrey Lange Digital options having demand-based, adjustable returns, and trading exchange therefor
US20030061132A1 (en) * 2001-09-26 2003-03-27 Yu, Mason K. System and method for categorizing, aggregating and analyzing payment transactions data
US20030217005A1 (en) * 1996-11-27 2003-11-20 Diebold Self Service Systems, Division Of Diebold, Incorporated Automated banking machine system and method
US6658393B1 (en) * 1997-05-27 2003-12-02 Visa Internation Service Association Financial risk prediction systems and methods therefor
US20040039742A1 (en) * 2002-08-22 2004-02-26 International Business Machines Corporation Database enabled messaging facility
US20040107123A1 (en) * 2002-11-18 2004-06-03 Peter Haffner Collection and analysis of trading data in an electronic marketplace
US6785675B1 (en) * 2000-11-13 2004-08-31 Convey Development, Inc. Aggregation of resource requests from multiple individual requestors
US20040193685A1 (en) * 2003-03-31 2004-09-30 Sony Corporation/Sony Electronics, Inc. Method and apparatus for managing and sharing personal identities in a peer-to-peer environment
US20040225603A1 (en) * 2003-05-06 2004-11-11 American Express Travel Related Services Company, Inc. System and method for web access to financial data
US6839979B1 (en) * 2003-08-25 2005-01-11 General Electric Company Top mounted turbine casing alignment tool with multi-axis maneuverability
US20050021397A1 (en) * 2003-07-22 2005-01-27 Cui Yingwei Claire Content-targeted advertising using collected user behavior data
US20050055275A1 (en) * 2003-06-10 2005-03-10 Newman Alan B. System and method for analyzing marketing efforts
US20050071200A1 (en) * 2003-07-18 2005-03-31 Dave Franklin Systems and methods for decoding payer identification in health care data records
US20050071307A1 (en) * 2003-09-29 2005-03-31 Paul Snyder Dynamic transaction control within a host transaction processing system
US20050149455A1 (en) * 2003-07-01 2005-07-07 Visa U.S.A. Inc. Method and system for providing advanced authorization
US20050240478A1 (en) * 2002-12-17 2005-10-27 Allen Lubow Method and system for providing coupon saving using existing credit card processing infrastructure, and bar-coded coupon having 2-D component
US20050256802A1 (en) * 2001-11-14 2005-11-17 Dirk Ammermann Payment protocol and data transmission method and data transmission device for conducting payment transactions
US7028052B2 (en) * 2001-05-10 2006-04-11 Equifax, Inc. Systems and methods for notifying a consumer of changes made to a credit report
US7035855B1 (en) * 2000-07-06 2006-04-25 Experian Marketing Solutions, Inc. Process and system for integrating information from disparate databases for purposes of predicting consumer behavior
US7039599B2 (en) * 1997-06-16 2006-05-02 Doubleclick Inc. Method and apparatus for automatic placement of advertising
US7062510B1 (en) * 1999-12-02 2006-06-13 Prime Research Alliance E., Inc. Consumer profiling and advertisement selection system
US20060143075A1 (en) * 2003-09-22 2006-06-29 Ryan Carr Assumed demographics, predicted behaviour, and targeted incentives
US20060218087A1 (en) * 2005-03-24 2006-09-28 Zimmerman Jeffrey P Automated aggregation and comparison of individual spending relative to population of similar users
US20060242051A1 (en) * 2004-10-29 2006-10-26 American Express Travel Related Services Company, Inc. Method and apparatus for development and use of a credit score based on spend capacity
US20060242047A1 (en) * 2004-10-29 2006-10-26 American Express Travel Related Services Company, Inc., A New York Corporation Method and apparatus for rating asset-backed securities
US20070011194A1 (en) * 1998-08-12 2007-01-11 Bank Of America Corporation Method and apparatus for data item movement between disparate sources and hierarchical, object-oriented representation
US7181412B1 (en) * 2000-03-22 2007-02-20 Comscore Networks Inc. Systems and methods for collecting consumer data
US20070067297A1 (en) * 2004-04-30 2007-03-22 Kublickis Peter J System and methods for a micropayment-enabled marketplace with permission-based, self-service, precision-targeted delivery of advertising, entertainment and informational content and relationship marketing to anonymous internet users
US20070073585A1 (en) * 2005-08-13 2007-03-29 Adstreams Roi, Inc. Systems, methods, and computer program products for enabling an advertiser to measure user viewing of and response to advertisements
US20070100719A1 (en) * 2004-10-29 2007-05-03 American Express Travel Related Services Company, Inc. Estimating the Spend Capacity of Consumer Households
US20070140483A1 (en) * 2004-12-31 2007-06-21 Samsung Electronics Co., Ltd. Combination-based broadcast encryption method
US20070162457A1 (en) * 2006-01-06 2007-07-12 Roland Barcia Apparatus for sending a sequence of asynchronous messages to the same member of a clustered consumer
US20070168246A1 (en) * 2004-10-29 2007-07-19 American Express Marketing & Development Corp., a New York Corporation Reducing Risks Related to Check Verification
US20070185844A1 (en) * 2006-01-10 2007-08-09 Erez Schachter Customizing web search results based on users' offline activity
US20070214076A1 (en) * 2006-03-10 2007-09-13 Experian-Scorex, Llc Systems and methods for analyzing data
US20070220030A1 (en) * 2006-03-14 2007-09-20 International Business Machines Corporation Input data structure for data mining
US20070233571A1 (en) * 2001-01-11 2007-10-04 Prime Research Alliance E., Inc. Targeting Ads to Subscribers based on Privacy Protected Subscriber Profiles
US7299194B1 (en) * 2000-02-22 2007-11-20 International Business Machines Corporation Method and system for researching sales effects of advertising using association analysis
US20070282681A1 (en) * 2006-05-31 2007-12-06 Eric Shubert Method of obtaining and using anonymous consumer purchase and demographic data
US20080004884A1 (en) * 2006-06-29 2008-01-03 Microsoft Corporation Employment of offline behavior to display online content
US20080021971A1 (en) * 2006-07-21 2008-01-24 Halgas Joseph F System and Method for Electronic Messaging Notification Using End-User Display Devices
US20080033852A1 (en) * 2005-10-24 2008-02-07 Megdal Myles G Computer-based modeling of spending behaviors of entities
US20080046349A1 (en) * 2006-08-17 2008-02-21 Verizon Data Services Inc. Method and systems for providing online banking and account aggregation services
US20080071587A1 (en) * 2005-06-24 2008-03-20 Granucci Nicole J Incentive wireless communication reservations
US20080082393A1 (en) * 2006-09-28 2008-04-03 Microsoft Corporation Personal data mining
US20080091720A1 (en) * 2006-10-13 2008-04-17 International Business Machines Corporation Collaborative Derivation Of An Interface And Partial Implementation Of Programming Code
US20080147731A1 (en) * 2006-12-19 2008-06-19 Yahoo! Inc. User behavior reporting based on pre-aggregated activity data
US20080189202A1 (en) * 2007-02-02 2008-08-07 James Zadoorian Method of collecting delinquent specialized debt
US20080215436A1 (en) * 2006-12-15 2008-09-04 Joseph Roberts System for delivering advertisements to wireless communication devices
US20080221973A1 (en) * 2005-10-24 2008-09-11 Megdal Myles G Using commercial share of wallet to rate investments
US20080221970A1 (en) * 2005-10-24 2008-09-11 Megdal Myles G Method and apparatus for targeting best customers based on spend capacity
US20080222027A1 (en) * 2005-10-24 2008-09-11 Megdal Myles G Credit score and scorecard development
US20080222015A1 (en) * 2005-10-24 2008-09-11 Megdal Myles G Method and apparatus for development and use of a credit score based on spend capacity
US20080221972A1 (en) * 2005-10-24 2008-09-11 Megdal Myles G Method and apparatus for determining credit characteristics of a consumer
US20080228538A1 (en) * 2005-10-24 2008-09-18 Megdal Myles G Using commercial share of wallet to analyze vendors in online marketplaces
US20080228556A1 (en) * 2005-10-24 2008-09-18 Megdal Myles G Method and apparatus for consumer interaction based on spend capacity
US20080228635A1 (en) * 2005-10-24 2008-09-18 Megdal Myles G Reducing risks related to check verification
US20080228540A1 (en) * 2005-10-24 2008-09-18 Megdal Myles G Using commercial share of wallet to compile marketing company lists
US20080228539A1 (en) * 2005-10-24 2008-09-18 Megdal Myles G Using commercial share of wallet to manage vendors
US20080243680A1 (en) * 2005-10-24 2008-10-02 Megdal Myles G Method and apparatus for rating asset-backed securities
US7444558B2 (en) * 2003-12-31 2008-10-28 Intel Corporation Programmable measurement mode for a serial point to point link
US7451134B2 (en) * 2004-08-02 2008-11-11 Wells Fargo Bank, N.A. Method and apparatus for facilitating data management over a network
US7493655B2 (en) * 2000-03-22 2009-02-17 Comscore Networks, Inc. Systems for and methods of placing user identification in the header of data packets usable in user demographic reporting and collecting usage data
US20090070225A1 (en) * 2001-12-14 2009-03-12 Matz William R Methods, Systems, and Products for Classifying Subscribers
US20090070219A1 (en) * 2007-08-20 2009-03-12 D Angelo Adam Targeting advertisements in a social network
US20090119167A1 (en) * 2007-11-05 2009-05-07 Kendall Timothy A Social Advertisements and Other Informational Messages on a Social Networking Website, and Advertising Model for Same
US20090132366A1 (en) * 2007-11-15 2009-05-21 Microsoft Corporation Recognizing and crediting offline realization of online behavior
US20090132347A1 (en) * 2003-08-12 2009-05-21 Russell Wayne Anderson Systems And Methods For Aggregating And Utilizing Retail Transaction Records At The Customer Level
US7542993B2 (en) * 2001-05-10 2009-06-02 Equifax, Inc. Systems and methods for notifying a consumer of changes made to a credit report
US20090164566A1 (en) * 2006-05-22 2009-06-25 Nec Corporation Information providing system, method of providing information and program for providing information
US7580884B2 (en) * 2001-06-25 2009-08-25 Intuit Inc. Collecting and aggregating creditworthiness data
US20090216579A1 (en) * 2008-02-22 2009-08-27 Microsoft Corporation Tracking online advertising using payment services
US20090234715A1 (en) * 2008-03-17 2009-09-17 Segmint Inc. Method and system for targeted content placement
US20090259518A1 (en) * 2008-04-14 2009-10-15 Tra, Inc. Analyzing return on investment of advertising campaigns using cross-correlation of multiple data sources
US20090271248A1 (en) * 2008-03-27 2009-10-29 Experian Information Solutions, Inc. Precalculation of trending attributes
US20090292619A1 (en) * 2006-04-03 2009-11-26 Gershon Kagan Method for universal electronic payment processing
US20090319411A1 (en) * 2008-06-18 2009-12-24 Debie Tod Personal finance integration system and method
US20100114387A1 (en) * 2008-09-29 2010-05-06 Battelle Memorial Institute Electric power grid control using a market-based resource allocation system
US20100257404A1 (en) * 2009-04-04 2010-10-07 Oracle International Corporation Method and system for implementing a scalable, high-performance, fault-tolerant locking mechanism in a multi-process environment
US7823207B2 (en) * 2004-04-02 2010-10-26 Crossix Solutions Inc. Privacy preserving data-mining protocol
US8010337B2 (en) * 2004-09-22 2011-08-30 Microsoft Corporation Predicting database system performance
US8086528B2 (en) * 2008-11-19 2011-12-27 Visa International Service Association Transaction aggregator
US8396811B1 (en) * 1999-02-26 2013-03-12 Syncada Llc Validation approach for auditing a vendor-based transaction

Family Cites Families (18)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5675510A (en) 1995-06-07 1997-10-07 Pc Meter L.P. Computer use meter and analyzer
US6285983B1 (en) 1998-10-21 2001-09-04 Lend Lease Corporation Ltd. Marketing systems and methods that preserve consumer privacy
US6859212B2 (en) * 1998-12-08 2005-02-22 Yodlee.Com, Inc. Interactive transaction center interface
US6055573A (en) 1998-12-30 2000-04-25 Supermarkets Online, Inc. Communicating with a computer based on an updated purchase behavior classification of a particular consumer
WO2000062231A1 (en) 1999-04-13 2000-10-19 Shopexpert.Com, Inc. Method and apparatus for tracking consumers
EP1240611A1 (en) 1999-11-19 2002-09-18 Trilegiant Corporation Method and apparatus for measuring effectiveness of on-line advertising
WO2001065453A1 (en) 2000-02-29 2001-09-07 Expanse Networks, Inc. Privacy-protected targeting system
US6873979B2 (en) 2000-02-29 2005-03-29 Marketswitch Corporation Method of building predictive models on transactional data
CN1459068A (en) 2000-08-17 2003-11-26 丹尼尔·A·克恩 Automated payment system
AU2001287013A1 (en) 2000-09-01 2002-03-13 Kinexus Corporation Method and system for financial data aggregation, analysis and reporting
US20040010458A1 (en) * 2002-07-10 2004-01-15 First Data Corporation Methods and systems for organizing information from multiple sources
KR20040017547A (en) 2002-08-22 2004-02-27 이홍규 Method and system for providing integrated exchange results based on network
US20080221971A1 (en) 2005-10-24 2008-09-11 Megdal Myles G Using commercial share of wallet to rate business prospects
US20080221990A1 (en) 2005-10-24 2008-09-11 Megdal Myles G Estimating the spend capacity of consumer households
CA2527538A1 (en) * 2005-11-12 2007-05-14 Matt Celano Method and apparatus for a consumer interactive credit report analysis and score reconciliation adaptive education and counseling system
JP2007219651A (en) 2006-02-14 2007-08-30 Toshiba Corp Job processing order control method, network computer system using this, and its program
WO2008013945A2 (en) 2006-07-27 2008-01-31 Leverage, Inc. System and method for targeted marketing and consumer resource management
WO2008144643A1 (en) 2007-05-18 2008-11-27 Global Rainmakers, Inc. Measuring effectiveness of advertisements and linking certain consumer activities including purchases to other activities of the consumer

Patent Citations (100)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5401946A (en) * 1991-07-22 1995-03-28 Weinblatt; Lee S. Technique for correlating purchasing behavior of a consumer to advertisements
US5974396A (en) * 1993-02-23 1999-10-26 Moore Business Forms, Inc. Method and system for gathering and analyzing consumer purchasing information based on product and consumer clustering relationships
US5692017A (en) * 1994-07-20 1997-11-25 Nec Corporation Receiving circuit
US5717923A (en) * 1994-11-03 1998-02-10 Intel Corporation Method and apparatus for dynamically customizing electronic information to individual end users
US6012094A (en) * 1996-07-02 2000-01-04 International Business Machines Corporation Method of stratified transaction processing
US5875510A (en) * 1996-09-27 1999-03-02 Chesebrough-Pond's Usa Co., Division Of Conopco, Inc. Replaceable head toothbrush
US20030217005A1 (en) * 1996-11-27 2003-11-20 Diebold Self Service Systems, Division Of Diebold, Incorporated Automated banking machine system and method
US6658393B1 (en) * 1997-05-27 2003-12-02 Visa Internation Service Association Financial risk prediction systems and methods therefor
US7039599B2 (en) * 1997-06-16 2006-05-02 Doubleclick Inc. Method and apparatus for automatic placement of advertising
US6285330B1 (en) * 1998-07-14 2001-09-04 Sensis Corporation Antenna field tester
US20070011194A1 (en) * 1998-08-12 2007-01-11 Bank Of America Corporation Method and apparatus for data item movement between disparate sources and hierarchical, object-oriented representation
US6216129B1 (en) * 1998-12-03 2001-04-10 Expanse Networks, Inc. Advertisement selection system supporting discretionary target market characteristics
US7490052B2 (en) * 1998-12-30 2009-02-10 Experian Marketing Solutions, Inc. Process and system for integrating information from disparate databases for purposes of predicting consumer behavior
US20090182625A1 (en) * 1998-12-30 2009-07-16 Experian Marketing Solutions, Inc. Process and System for Integrating Information from Disparate Databases for Purposes of Predicting Consumer Behavior
US8396811B1 (en) * 1999-02-26 2013-03-12 Syncada Llc Validation approach for auditing a vendor-based transaction
US6334110B1 (en) * 1999-03-10 2001-12-25 Ncr Corporation System and method for analyzing customer transactions and interactions
US6430539B1 (en) * 1999-05-06 2002-08-06 Hnc Software Predictive modeling of consumer financial behavior
US20020147670A1 (en) * 1999-07-21 2002-10-10 Jeffrey Lange Digital options having demand-based, adjustable returns, and trading exchange therefor
US20020099562A1 (en) * 1999-10-29 2002-07-25 Bruce Michael George System and method of data exchange for electronic transactions with multiple sources
US7062510B1 (en) * 1999-12-02 2006-06-13 Prime Research Alliance E., Inc. Consumer profiling and advertisement selection system
US7299194B1 (en) * 2000-02-22 2007-11-20 International Business Machines Corporation Method and system for researching sales effects of advertising using association analysis
US7493655B2 (en) * 2000-03-22 2009-02-17 Comscore Networks, Inc. Systems for and methods of placing user identification in the header of data packets usable in user demographic reporting and collecting usage data
US7181412B1 (en) * 2000-03-22 2007-02-20 Comscore Networks Inc. Systems and methods for collecting consumer data
US20010049520A1 (en) * 2000-05-01 2001-12-06 Janet Robertson Non-invasive female urinary device
US7035855B1 (en) * 2000-07-06 2006-04-25 Experian Marketing Solutions, Inc. Process and system for integrating information from disparate databases for purposes of predicting consumer behavior
US20020059100A1 (en) * 2000-09-22 2002-05-16 Jon Shore Apparatus, systems and methods for customer specific receipt advertising
US6785675B1 (en) * 2000-11-13 2004-08-31 Convey Development, Inc. Aggregation of resource requests from multiple individual requestors
US20070233571A1 (en) * 2001-01-11 2007-10-04 Prime Research Alliance E., Inc. Targeting Ads to Subscribers based on Privacy Protected Subscriber Profiles
US7028052B2 (en) * 2001-05-10 2006-04-11 Equifax, Inc. Systems and methods for notifying a consumer of changes made to a credit report
US7542993B2 (en) * 2001-05-10 2009-06-02 Equifax, Inc. Systems and methods for notifying a consumer of changes made to a credit report
US7580884B2 (en) * 2001-06-25 2009-08-25 Intuit Inc. Collecting and aggregating creditworthiness data
US20030061132A1 (en) * 2001-09-26 2003-03-27 Yu, Mason K. System and method for categorizing, aggregating and analyzing payment transactions data
US20050256802A1 (en) * 2001-11-14 2005-11-17 Dirk Ammermann Payment protocol and data transmission method and data transmission device for conducting payment transactions
US20090070225A1 (en) * 2001-12-14 2009-03-12 Matz William R Methods, Systems, and Products for Classifying Subscribers
US20040039742A1 (en) * 2002-08-22 2004-02-26 International Business Machines Corporation Database enabled messaging facility
US20040107123A1 (en) * 2002-11-18 2004-06-03 Peter Haffner Collection and analysis of trading data in an electronic marketplace
US20050240478A1 (en) * 2002-12-17 2005-10-27 Allen Lubow Method and system for providing coupon saving using existing credit card processing infrastructure, and bar-coded coupon having 2-D component
US20040193685A1 (en) * 2003-03-31 2004-09-30 Sony Corporation/Sony Electronics, Inc. Method and apparatus for managing and sharing personal identities in a peer-to-peer environment
US20040225603A1 (en) * 2003-05-06 2004-11-11 American Express Travel Related Services Company, Inc. System and method for web access to financial data
US20050055275A1 (en) * 2003-06-10 2005-03-10 Newman Alan B. System and method for analyzing marketing efforts
US20050149455A1 (en) * 2003-07-01 2005-07-07 Visa U.S.A. Inc. Method and system for providing advanced authorization
US20050071200A1 (en) * 2003-07-18 2005-03-31 Dave Franklin Systems and methods for decoding payer identification in health care data records
US20050021397A1 (en) * 2003-07-22 2005-01-27 Cui Yingwei Claire Content-targeted advertising using collected user behavior data
US20090132347A1 (en) * 2003-08-12 2009-05-21 Russell Wayne Anderson Systems And Methods For Aggregating And Utilizing Retail Transaction Records At The Customer Level
US6839979B1 (en) * 2003-08-25 2005-01-11 General Electric Company Top mounted turbine casing alignment tool with multi-axis maneuverability
US20060143075A1 (en) * 2003-09-22 2006-06-29 Ryan Carr Assumed demographics, predicted behaviour, and targeted incentives
US20050071307A1 (en) * 2003-09-29 2005-03-31 Paul Snyder Dynamic transaction control within a host transaction processing system
US7444558B2 (en) * 2003-12-31 2008-10-28 Intel Corporation Programmable measurement mode for a serial point to point link
US7823207B2 (en) * 2004-04-02 2010-10-26 Crossix Solutions Inc. Privacy preserving data-mining protocol
US20070067297A1 (en) * 2004-04-30 2007-03-22 Kublickis Peter J System and methods for a micropayment-enabled marketplace with permission-based, self-service, precision-targeted delivery of advertising, entertainment and informational content and relationship marketing to anonymous internet users
US7451134B2 (en) * 2004-08-02 2008-11-11 Wells Fargo Bank, N.A. Method and apparatus for facilitating data management over a network
US8010337B2 (en) * 2004-09-22 2011-08-30 Microsoft Corporation Predicting database system performance
US20060242047A1 (en) * 2004-10-29 2006-10-26 American Express Travel Related Services Company, Inc., A New York Corporation Method and apparatus for rating asset-backed securities
US20060242051A1 (en) * 2004-10-29 2006-10-26 American Express Travel Related Services Company, Inc. Method and apparatus for development and use of a credit score based on spend capacity
US20070100719A1 (en) * 2004-10-29 2007-05-03 American Express Travel Related Services Company, Inc. Estimating the Spend Capacity of Consumer Households
US20070168246A1 (en) * 2004-10-29 2007-07-19 American Express Marketing & Development Corp., a New York Corporation Reducing Risks Related to Check Verification
US20070140483A1 (en) * 2004-12-31 2007-06-21 Samsung Electronics Co., Ltd. Combination-based broadcast encryption method
US20060218087A1 (en) * 2005-03-24 2006-09-28 Zimmerman Jeffrey P Automated aggregation and comparison of individual spending relative to population of similar users
US20080071587A1 (en) * 2005-06-24 2008-03-20 Granucci Nicole J Incentive wireless communication reservations
US20070073585A1 (en) * 2005-08-13 2007-03-29 Adstreams Roi, Inc. Systems, methods, and computer program products for enabling an advertiser to measure user viewing of and response to advertisements
US20080222015A1 (en) * 2005-10-24 2008-09-11 Megdal Myles G Method and apparatus for development and use of a credit score based on spend capacity
US20080221973A1 (en) * 2005-10-24 2008-09-11 Megdal Myles G Using commercial share of wallet to rate investments
US20080221970A1 (en) * 2005-10-24 2008-09-11 Megdal Myles G Method and apparatus for targeting best customers based on spend capacity
US20080222027A1 (en) * 2005-10-24 2008-09-11 Megdal Myles G Credit score and scorecard development
US20080033852A1 (en) * 2005-10-24 2008-02-07 Megdal Myles G Computer-based modeling of spending behaviors of entities
US20080221972A1 (en) * 2005-10-24 2008-09-11 Megdal Myles G Method and apparatus for determining credit characteristics of a consumer
US20080228538A1 (en) * 2005-10-24 2008-09-18 Megdal Myles G Using commercial share of wallet to analyze vendors in online marketplaces
US20080228556A1 (en) * 2005-10-24 2008-09-18 Megdal Myles G Method and apparatus for consumer interaction based on spend capacity
US20080228635A1 (en) * 2005-10-24 2008-09-18 Megdal Myles G Reducing risks related to check verification
US20080228540A1 (en) * 2005-10-24 2008-09-18 Megdal Myles G Using commercial share of wallet to compile marketing company lists
US20080228539A1 (en) * 2005-10-24 2008-09-18 Megdal Myles G Using commercial share of wallet to manage vendors
US20080243680A1 (en) * 2005-10-24 2008-10-02 Megdal Myles G Method and apparatus for rating asset-backed securities
US20070162457A1 (en) * 2006-01-06 2007-07-12 Roland Barcia Apparatus for sending a sequence of asynchronous messages to the same member of a clustered consumer
US20070185844A1 (en) * 2006-01-10 2007-08-09 Erez Schachter Customizing web search results based on users' offline activity
US20070214076A1 (en) * 2006-03-10 2007-09-13 Experian-Scorex, Llc Systems and methods for analyzing data
US20070220030A1 (en) * 2006-03-14 2007-09-20 International Business Machines Corporation Input data structure for data mining
US20090292619A1 (en) * 2006-04-03 2009-11-26 Gershon Kagan Method for universal electronic payment processing
US20090164566A1 (en) * 2006-05-22 2009-06-25 Nec Corporation Information providing system, method of providing information and program for providing information
US20070282681A1 (en) * 2006-05-31 2007-12-06 Eric Shubert Method of obtaining and using anonymous consumer purchase and demographic data
US20080004884A1 (en) * 2006-06-29 2008-01-03 Microsoft Corporation Employment of offline behavior to display online content
US20080021971A1 (en) * 2006-07-21 2008-01-24 Halgas Joseph F System and Method for Electronic Messaging Notification Using End-User Display Devices
US20080046349A1 (en) * 2006-08-17 2008-02-21 Verizon Data Services Inc. Method and systems for providing online banking and account aggregation services
US20080082393A1 (en) * 2006-09-28 2008-04-03 Microsoft Corporation Personal data mining
US20080091720A1 (en) * 2006-10-13 2008-04-17 International Business Machines Corporation Collaborative Derivation Of An Interface And Partial Implementation Of Programming Code
US20080215436A1 (en) * 2006-12-15 2008-09-04 Joseph Roberts System for delivering advertisements to wireless communication devices
US20080147731A1 (en) * 2006-12-19 2008-06-19 Yahoo! Inc. User behavior reporting based on pre-aggregated activity data
US20080189202A1 (en) * 2007-02-02 2008-08-07 James Zadoorian Method of collecting delinquent specialized debt
US20090070219A1 (en) * 2007-08-20 2009-03-12 D Angelo Adam Targeting advertisements in a social network
US20090119167A1 (en) * 2007-11-05 2009-05-07 Kendall Timothy A Social Advertisements and Other Informational Messages on a Social Networking Website, and Advertising Model for Same
US20090132365A1 (en) * 2007-11-15 2009-05-21 Microsoft Corporation Search, advertising and social networking applications and services
US20090132366A1 (en) * 2007-11-15 2009-05-21 Microsoft Corporation Recognizing and crediting offline realization of online behavior
US20090132395A1 (en) * 2007-11-15 2009-05-21 Microsoft Corporation User profiling in a transaction and advertising electronic commerce platform
US20090216579A1 (en) * 2008-02-22 2009-08-27 Microsoft Corporation Tracking online advertising using payment services
US20090234715A1 (en) * 2008-03-17 2009-09-17 Segmint Inc. Method and system for targeted content placement
US20090271248A1 (en) * 2008-03-27 2009-10-29 Experian Information Solutions, Inc. Precalculation of trending attributes
US20090259518A1 (en) * 2008-04-14 2009-10-15 Tra, Inc. Analyzing return on investment of advertising campaigns using cross-correlation of multiple data sources
US20090319411A1 (en) * 2008-06-18 2009-12-24 Debie Tod Personal finance integration system and method
US20100114387A1 (en) * 2008-09-29 2010-05-06 Battelle Memorial Institute Electric power grid control using a market-based resource allocation system
US8086528B2 (en) * 2008-11-19 2011-12-27 Visa International Service Association Transaction aggregator
US20100257404A1 (en) * 2009-04-04 2010-10-07 Oracle International Corporation Method and system for implementing a scalable, high-performance, fault-tolerant locking mechanism in a multi-process environment

Cited By (87)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8626705B2 (en) 2009-11-05 2014-01-07 Visa International Service Association Transaction aggregator for closed processing
US20110106840A1 (en) * 2009-11-05 2011-05-05 Melyssa Barrett Transaction aggregator for closed processing
US8990146B2 (en) * 2010-12-22 2015-03-24 Sap Se Systems and methods to provide server-side client based caching
US20120166384A1 (en) * 2010-12-22 2012-06-28 Karl-Peter Nos Systems and methods to provide server-side client based caching
US9135658B2 (en) 2013-03-15 2015-09-15 Palantir Technologies Inc. Generating data clusters
US9165299B1 (en) 2013-03-15 2015-10-20 Palantir Technologies Inc. User-agent data clustering
US8855999B1 (en) 2013-03-15 2014-10-07 Palantir Technologies Inc. Method and system for generating a parser and parsing complex data
US8930897B2 (en) 2013-03-15 2015-01-06 Palantir Technologies Inc. Data integration tool
US8788405B1 (en) 2013-03-15 2014-07-22 Palantir Technologies, Inc. Generating data clusters with customizable analysis strategies
US10937034B2 (en) 2013-03-15 2021-03-02 Palantir Technologies Inc. Systems and user interfaces for dynamic and interactive investigation based on automatic malfeasance clustering of related data in various data structures
US8788407B1 (en) 2013-03-15 2014-07-22 Palantir Technologies Inc. Malware data clustering
US10120857B2 (en) 2013-03-15 2018-11-06 Palantir Technologies Inc. Method and system for generating a parser and parsing complex data
US9965937B2 (en) 2013-03-15 2018-05-08 Palantir Technologies Inc. External malware data item clustering and analysis
US8818892B1 (en) 2013-03-15 2014-08-26 Palantir Technologies, Inc. Prioritizing data clusters with customizable scoring strategies
US9171334B1 (en) 2013-03-15 2015-10-27 Palantir Technologies Inc. Tax data clustering
US9177344B1 (en) 2013-03-15 2015-11-03 Palantir Technologies Inc. Trend data clustering
US10216801B2 (en) 2013-03-15 2019-02-26 Palantir Technologies Inc. Generating data clusters
US9230280B1 (en) 2013-03-15 2016-01-05 Palantir Technologies Inc. Clustering data based on indications of financial malfeasance
US10264014B2 (en) 2013-03-15 2019-04-16 Palantir Technologies Inc. Systems and user interfaces for dynamic and interactive investigation based on automatic clustering of related data in various data structures
US10719527B2 (en) 2013-10-18 2020-07-21 Palantir Technologies Inc. Systems and user interfaces for dynamic and interactive simultaneous querying of multiple data stores
US9552615B2 (en) 2013-12-20 2017-01-24 Palantir Technologies Inc. Automated database analysis to detect malfeasance
US10356032B2 (en) 2013-12-26 2019-07-16 Palantir Technologies Inc. System and method for detecting confidential information emails
US10230746B2 (en) 2014-01-03 2019-03-12 Palantir Technologies Inc. System and method for evaluating network threats and usage
US10805321B2 (en) 2014-01-03 2020-10-13 Palantir Technologies Inc. System and method for evaluating network threats and usage
US10873603B2 (en) 2014-02-20 2020-12-22 Palantir Technologies Inc. Cyber security sharing and identification system
US9923925B2 (en) 2014-02-20 2018-03-20 Palantir Technologies Inc. Cyber security sharing and identification system
US9009827B1 (en) 2014-02-20 2015-04-14 Palantir Technologies Inc. Security sharing system
US9535974B1 (en) 2014-06-30 2017-01-03 Palantir Technologies Inc. Systems and methods for identifying key phrase clusters within documents
US10180929B1 (en) 2014-06-30 2019-01-15 Palantir Technologies, Inc. Systems and methods for identifying key phrase clusters within documents
US10162887B2 (en) 2014-06-30 2018-12-25 Palantir Technologies Inc. Systems and methods for key phrase characterization of documents
US11341178B2 (en) 2014-06-30 2022-05-24 Palantir Technologies Inc. Systems and methods for key phrase characterization of documents
US10798116B2 (en) 2014-07-03 2020-10-06 Palantir Technologies Inc. External malware data item clustering and analysis
US9785773B2 (en) 2014-07-03 2017-10-10 Palantir Technologies Inc. Malware data item analysis
US9998485B2 (en) 2014-07-03 2018-06-12 Palantir Technologies, Inc. Network intrusion data item clustering and analysis
US9202249B1 (en) 2014-07-03 2015-12-01 Palantir Technologies Inc. Data item clustering and analysis
US9344447B2 (en) 2014-07-03 2016-05-17 Palantir Technologies Inc. Internal malware data item clustering and analysis
US9021260B1 (en) 2014-07-03 2015-04-28 Palantir Technologies Inc. Malware data item analysis
US10929436B2 (en) 2014-07-03 2021-02-23 Palantir Technologies Inc. System and method for news events detection and visualization
US10572496B1 (en) 2014-07-03 2020-02-25 Palantir Technologies Inc. Distributed workflow system and database with access controls for city resiliency
US9558352B1 (en) 2014-11-06 2017-01-31 Palantir Technologies Inc. Malicious software detection in a computing system
US9043894B1 (en) 2014-11-06 2015-05-26 Palantir Technologies Inc. Malicious software detection in a computing system
US10135863B2 (en) 2014-11-06 2018-11-20 Palantir Technologies Inc. Malicious software detection in a computing system
US10728277B2 (en) 2014-11-06 2020-07-28 Palantir Technologies Inc. Malicious software detection in a computing system
US10891690B1 (en) 2014-11-07 2021-01-12 Intuit Inc. Method and system for providing an interactive spending analysis display
US11810186B2 (en) 2014-11-07 2023-11-07 Intuit Inc. Method and system for providing an interactive spending analysis display
US10552994B2 (en) 2014-12-22 2020-02-04 Palantir Technologies Inc. Systems and interactive user interfaces for dynamic retrieval, analysis, and triage of data items
US10362133B1 (en) 2014-12-22 2019-07-23 Palantir Technologies Inc. Communication data processing architecture
US10447712B2 (en) 2014-12-22 2019-10-15 Palantir Technologies Inc. Systems and user interfaces for dynamic and interactive investigation of bad actor behavior based on automatic clustering of related data in various data structures
US11252248B2 (en) 2014-12-22 2022-02-15 Palantir Technologies Inc. Communication data processing architecture
US9367872B1 (en) 2014-12-22 2016-06-14 Palantir Technologies Inc. Systems and user interfaces for dynamic and interactive investigation of bad actor behavior based on automatic clustering of related data in various data structures
US9898528B2 (en) 2014-12-22 2018-02-20 Palantir Technologies Inc. Concept indexing among database of documents using machine learning techniques
US9589299B2 (en) 2014-12-22 2017-03-07 Palantir Technologies Inc. Systems and user interfaces for dynamic and interactive investigation of bad actor behavior based on automatic clustering of related data in various data structures
US9817563B1 (en) 2014-12-29 2017-11-14 Palantir Technologies Inc. System and method of generating data points from one or more data stores of data items for chart creation and manipulation
US10552998B2 (en) 2014-12-29 2020-02-04 Palantir Technologies Inc. System and method of generating data points from one or more data stores of data items for chart creation and manipulation
US10103953B1 (en) 2015-05-12 2018-10-16 Palantir Technologies Inc. Methods and systems for analyzing entity performance
US11501369B2 (en) 2015-07-30 2022-11-15 Palantir Technologies Inc. Systems and user interfaces for holistic, data-driven investigation of bad actor behavior based on clustering and scoring of related data
US9454785B1 (en) 2015-07-30 2016-09-27 Palantir Technologies Inc. Systems and user interfaces for holistic, data-driven investigation of bad actor behavior based on clustering and scoring of related data
US10223748B2 (en) 2015-07-30 2019-03-05 Palantir Technologies Inc. Systems and user interfaces for holistic, data-driven investigation of bad actor behavior based on clustering and scoring of related data
US10484407B2 (en) 2015-08-06 2019-11-19 Palantir Technologies Inc. Systems, methods, user interfaces, and computer-readable media for investigating potential malicious communications
US9635046B2 (en) 2015-08-06 2017-04-25 Palantir Technologies Inc. Systems, methods, user interfaces, and computer-readable media for investigating potential malicious communications
US11048706B2 (en) 2015-08-28 2021-06-29 Palantir Technologies Inc. Malicious activity detection system capable of efficiently processing data accessed from databases and generating alerts for display in interactive user interfaces
US9898509B2 (en) 2015-08-28 2018-02-20 Palantir Technologies Inc. Malicious activity detection system capable of efficiently processing data accessed from databases and generating alerts for display in interactive user interfaces
US10346410B2 (en) 2015-08-28 2019-07-09 Palantir Technologies Inc. Malicious activity detection system capable of efficiently processing data accessed from databases and generating alerts for display in interactive user interfaces
CN106570010A (en) * 2015-10-09 2017-04-19 阿里巴巴集团控股有限公司 Method and device for identifying consecutive number users in interaction data
US10572487B1 (en) 2015-10-30 2020-02-25 Palantir Technologies Inc. Periodic database search manager for multiple data sources
US10318630B1 (en) 2016-11-21 2019-06-11 Palantir Technologies Inc. Analysis of large bodies of textual data
US10620618B2 (en) 2016-12-20 2020-04-14 Palantir Technologies Inc. Systems and methods for determining relationships between defects
US11681282B2 (en) 2016-12-20 2023-06-20 Palantir Technologies Inc. Systems and methods for determining relationships between defects
US10325224B1 (en) 2017-03-23 2019-06-18 Palantir Technologies Inc. Systems and methods for selecting machine learning training data
US11481410B1 (en) 2017-03-30 2022-10-25 Palantir Technologies Inc. Framework for exposing network activities
US10606866B1 (en) 2017-03-30 2020-03-31 Palantir Technologies Inc. Framework for exposing network activities
US10235461B2 (en) 2017-05-02 2019-03-19 Palantir Technologies Inc. Automated assistance for generating relevant and valuable search results for an entity of interest
US11714869B2 (en) 2017-05-02 2023-08-01 Palantir Technologies Inc. Automated assistance for generating relevant and valuable search results for an entity of interest
US11210350B2 (en) 2017-05-02 2021-12-28 Palantir Technologies Inc. Automated assistance for generating relevant and valuable search results for an entity of interest
US10482382B2 (en) 2017-05-09 2019-11-19 Palantir Technologies Inc. Systems and methods for reducing manufacturing failure rates
US11537903B2 (en) 2017-05-09 2022-12-27 Palantir Technologies Inc. Systems and methods for reducing manufacturing failure rates
US10838987B1 (en) 2017-12-20 2020-11-17 Palantir Technologies Inc. Adaptive and transparent entity screening
US20210073808A1 (en) * 2018-01-22 2021-03-11 Visa International Service Associatio Method, System, and Computer Program Product for Real-Time Data Aggregation
US11301856B2 (en) * 2018-05-24 2022-04-12 Mastercard International Incorporated Method and system for transaction authorization via controlled blockchain
US20220222674A1 (en) * 2018-05-24 2022-07-14 Mastercard International Incorporated Method and system for transaction authorization via controlled blockchain
US11119630B1 (en) 2018-06-19 2021-09-14 Palantir Technologies Inc. Artificial intelligence assisted evaluations and user interface for same
US11049095B2 (en) 2018-12-21 2021-06-29 Square, Inc. Point of sale (POS) systems and methods with dynamic kernel selection
US10990969B2 (en) * 2018-12-21 2021-04-27 Square, Inc. Point of sale (POS) systems and methods for dynamically processing payment data based on payment reader capability
US11775957B2 (en) 2018-12-21 2023-10-03 Block, Inc. Point of sale (POS) systems and methods with kernel selection
CN111769951A (en) * 2020-06-28 2020-10-13 成都平凡谷科技有限公司 Data parallel acquisition method, system and terminal based on USB-HID (Universal Serial bus-high intensity discharge) equipment
EP4184408A1 (en) * 2021-11-17 2023-05-24 Mastercard International Incorporated Account linking index structure in a network
EP4184407A1 (en) * 2021-11-17 2023-05-24 Mastercard International Incorporated Account linking index structure in a network

Also Published As

Publication number Publication date
WO2010059840A2 (en) 2010-05-27
US8086528B2 (en) 2011-12-27
US20100262536A1 (en) 2010-10-14
WO2010059840A3 (en) 2010-09-16
US20100125547A1 (en) 2010-05-20
US9818118B2 (en) 2017-11-14

Similar Documents

Publication Publication Date Title
US9818118B2 (en) Transaction aggregator
US10776865B2 (en) Method and apparatus for ATM-based cross-selling of products and services
US10922761B2 (en) Payment card network data validation system
US20160292690A1 (en) Risk manager optimizer
US8458062B2 (en) Real-time product matching
US7693810B2 (en) Method and system for advanced scenario based alert generation and processing
US7970698B2 (en) Application processing and decision systems and processes
US10127554B2 (en) Fraud early warning system and method
US20100228658A1 (en) System and method for credit reporting
JP2020522832A (en) System and method for issuing a loan to a consumer determined to be creditworthy
US20050279824A1 (en) System and method for calculating recommended charge limits
US20120022990A1 (en) Systems and methods of credit information reporting
WO2021167858A1 (en) Transaction card system having overdraft capability
US20170270496A1 (en) Instant funds availablity risk assessment and real-time fraud alert system and method
US20180101591A1 (en) Methods and Systems for Cluster-Based Historical Data
US11037160B1 (en) Systems and methods for preemptive fraud alerts
US20130282583A1 (en) Fraud detection system rule profile interaction
US20160239853A1 (en) Method and system for providing insights to merchants based on consumer transaction history
WO2022155740A1 (en) Systems and methods for outlier detection of transactions
US20150242846A1 (en) Systems and methods for predicting a merchant's change of acquirer
US20200082407A1 (en) Instant funds availablity risk assessment and real-time fraud alert system and method
US20170061455A1 (en) Method and system for sizing of demographic markets
US20150066773A1 (en) Claim rate black box
US20190370826A1 (en) Method and system for anonymous estimation of transaction basket details
EP1244976A2 (en) Intelligent transaction monitor system and method

Legal Events

Date Code Title Description
AS Assignment

Owner name: VISA INTERNATIONAL SERVICE ASSOCIATION,CALIFORNIA

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:BARRETT, MELYSSA;SCOTT, JOE;HILGERS, NANCY;AND OTHERS;SIGNING DATES FROM 20091104 TO 20091110;REEL/FRAME:023505/0418

STCV Information on status: appeal procedure

Free format text: ON APPEAL -- AWAITING DECISION BY THE BOARD OF APPEALS

STCV Information on status: appeal procedure

Free format text: BOARD OF APPEALS DECISION RENDERED

STCB Information on status: application discontinuation

Free format text: ABANDONED -- AFTER EXAMINER'S ANSWER OR BOARD OF APPEALS DECISION