×

Computer Implemented Systems and Methods for Fraud Prevention in Data Transactions Across Disparate Computing Networks

  • US 20170186004A1
  • Filed: 12/29/2015
  • Published: 06/29/2017
  • Est. Priority Date: 12/29/2015
  • Status: Active Grant
First Claim
Patent Images

1. A method comprising:

  • on a local computer network operating on one or more computers,sending first profile information corresponding to a first organization from the local computer network to a first remote computer network;

    receiving, from the first remote computer network, second profile information corresponding to the first organization, the second profile information comprising a first remote identification, a partial transaction number, a designation of a first user having a first role, first messaging information for the first user, a designation of a second user having a second role, and second messaging information for the second user;

    generating a first message to the first user using the first messaging information, the first message comprising at least a portion of the first profile information, a first local identification, at least a portion of the second profile information, and the first remote identification, and receiving a first confirmation approving an association between the first local identification and the first remote identification;

    generating a second message to the second user using the second messaging information, the second message comprising the portion of the first profile information, the first local identification, the portion of the second profile information, and the first remote identification, and receiving a second confirmation approving the association between the first local identification and the first remote identification;

    determining if the first confirmation and the second confirmation have been received, and associating the first local identification and the first remote identification if the first confirmation and the second confirmation have been received;

    receiving a data transfer instruction comprising the first local identification, and mapping the first local identification from the data transfer instruction to the first remote identification to generate a remote execution instruction comprising the first remote identification; and

    sending the remote execution instruction to the first remote computer network to cause the data transfer instruction to be executed.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×