Systems and methods for fraud management in relation to stored value cards
First Claim
1. An account acquisition fraud management system, the account acquisition fraud management system comprising:
- a first analysis engine, wherein the first analysis engine is associated with a first stored value product;
a second analysis engine, wherein the second analysis engine is associated with a second stored value product; and
a cross monitor, wherein the cross monitor is operable to accept a first transaction information from the first analysis engine and a second transaction information from the second analysis engine, wherein the first transaction information is provided from the cross monitor to the second analysis engine; and
wherein the second analysis engine is operable to reject a request for the second stored value card product based at least in part on the first transaction information.
8 Assignments
0 Petitions
Accused Products
Abstract
Systems and methods for monitoring and/or preventing fraud in relation to account acquisition. In some cases, this account acquisition is ongoing in relation to stored value accounts. Some of the methods provide for receiving suspicious activity indications from one or more issuer analysis engines that are operable to monitor activities occurring in relation to various stored value products. A global negative file is maintained including an update of various of the suspicious activities. An activity request is received from a user in relation to a stored value account, and the activity is checked against the global negative file. A response is generated based at least in part on the information accessible from the global negative file.
-
Citations
20 Claims
-
1. An account acquisition fraud management system, the account acquisition fraud management system comprising:
-
a first analysis engine, wherein the first analysis engine is associated with a first stored value product;
a second analysis engine, wherein the second analysis engine is associated with a second stored value product; and
a cross monitor, wherein the cross monitor is operable to accept a first transaction information from the first analysis engine and a second transaction information from the second analysis engine, wherein the first transaction information is provided from the cross monitor to the second analysis engine; and
wherein the second analysis engine is operable to reject a request for the second stored value card product based at least in part on the first transaction information. - View Dependent Claims (2, 3, 4, 5)
-
-
6. A method for detecting fraud in relation to stored value products, the method comprising:
-
receiving a first suspicious activity indication from a first issuer analysis engine, wherein the first issuer analysis engine is operable to monitor activities occurring in relation to a first plurality of stored value products associated with the first issuer;
receiving a second suspicious activity indication from a second issuer analysis engine, wherein the second issuer analysis engine is operable to monitor activities occurring in relation to a second plurality of stored value products associated with the second issuer;
maintaining the first suspicious activity indication and the second suspicious activity indication in a global negative file;
receiving an activity request from the first issuer analysis engine, wherein the request includes a transaction information;
based at least in part on the transaction information, accessing the global negative file; and
providing a response, wherein the response indicates the transaction information is related to suspicious behavior. - View Dependent Claims (7, 8, 9, 10, 11, 12, 13, 14, 15)
-
-
16. A system for suppressing fraudulent activity in relation to account acquisition, the system comprising:
-
a first load monitor associated with a first issuer;
a second load monitor associated with a second issuer;
a first enrollment monitor associated with the first issuer;
a second enrollment monitor associated with the second issuer; and
a cross monitor, wherein the cross monitor is operable to accept information from one or more of the first load monitor, the second load monitor, the first enrollment monitor and the second enrollment monitor, and wherein the cross monitor is operable to communicate suspicious activity to both the first issuer and the second issuer. - View Dependent Claims (17, 18, 19, 20)
-
Specification