Method and apparatus for detecting and investigating fraudulent transactions in debit and charge card activations
First Claim
Patent Images
1. A method of activating a payment card, the method comprisingcreating a cardholder record based on information from a cardholder application, the cardholder record including card identity and cardholder information;
- receiving a card activation request;
starting a session and issuing a first query in response to the activation request;
receiving card identity information in response to issuing a first query;
starting a card identity information attempt tracking mechanism;
verifying the validity of the card identity information;
reissuing the first query if the card identity information is invalid and a limit of the card identity tracking mechanism has not been exceeded;
issuing an error message and ending the session if a limit of the card identity tracking mechanism has been exceeded; and
if the card identity information is valid issuing a second query requesting cardholder information;
starting a cardholder information attempt tracking mechanism;
verifying the validity of the cardholder information;
reissuing the second query if the cardholder information is invalid and a limit of the cardholder information attempt tracking mechanism has not been exceeded; and
issuing an error message and ending the session if the limit of the cardholder information tracking mechanism has been exceeded; and
if the cardholder information is valid, issuing a card activation message.
3 Assignments
0 Petitions
Accused Products
Abstract
A method and apparatus for the detection and investigation of fraudulent debit and charge card activation transactions. Cardholder information on file is matched with information provided at activation time. Where matching does not occur, fraud is a possibility. All activation activity is captured and summarized. Absolute failures are highlighted. Subsequent fraudulent use of fraudulently activated cards can be investigated resulting in possible identification of the alleged fraudulent card user.
-
Citations
33 Claims
-
1. A method of activating a payment card, the method comprising
creating a cardholder record based on information from a cardholder application, the cardholder record including card identity and cardholder information; -
receiving a card activation request;
starting a session and issuing a first query in response to the activation request;
receiving card identity information in response to issuing a first query;
starting a card identity information attempt tracking mechanism;
verifying the validity of the card identity information;
reissuing the first query if the card identity information is invalid and a limit of the card identity tracking mechanism has not been exceeded;
issuing an error message and ending the session if a limit of the card identity tracking mechanism has been exceeded; and
if the card identity information is valid issuing a second query requesting cardholder information;
starting a cardholder information attempt tracking mechanism;
verifying the validity of the cardholder information;
reissuing the second query if the cardholder information is invalid and a limit of the cardholder information attempt tracking mechanism has not been exceeded; and
issuing an error message and ending the session if the limit of the cardholder information tracking mechanism has been exceeded; and
if the cardholder information is valid, issuing a card activation message. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
starting a session tracking mechanism; issuing an error message and ending the session if a limit of the session tracking session has been exceeded.
-
-
3. A method as claimed in claim 1, further comprising logging a first message if the card identity information is valid.
-
4. A method as claimed in claim 1, further comprising logging a second message if the card identity information is invalid or the limit of the card identity tracking mechanism has been exceeded.
-
5. A method as claimed in claim 4, further comprising logging a third message if the cardholder information is valid.
-
6. A method as claimed in claim 5, further comprising logging a fourth message if the cardholder information is invalid.
-
7. A method as claimed in claim 6, further comprising logging a fifth message if a limit of the cardholder information attempt tracking mechanism has been exceeded.
-
8. A method as claimed in claim 7, further comprising generating a report based on one or more of the first through fifth messages.
-
9. A method as claimed in claim 1, further comprising:
-
before issuing a second query, querying a database;
determining whether the card identity information matches an entry in the database;
logging a match message if the card identity information matches an entry in the database; and
if the card identity information does not match an entry in the database logging a non-match message.
-
-
10. A method of capturing card activation activity, the method comprising
receiving a card activation request; -
starting a session, incrementing a session tracking mechanism; and
issuing a first query in response to the activation request;
issuing an error message and ending the session if a limit of the session tracking mechanism has been exceeded;
receiving card identity information in response to issuing a first query;
starting a card identity information attempt tracking mechanism;
verifying the validity of the card identity information;
logging a message if the card identity information is invalid;
reissuing the first query if the card identity information is invalid and a limit of the card identity tracking mechanism has not been exceeded;
issuing an error message, logging a second message, and ending the session if a limit of the card identity tracking mechanism has been exceeded; and
if the card identity information is valid logging a third message;
issuing a second query;
starting a cardholder information attempt tracking mechanism;
verifying the validity of the cardholder information;
logging a fourth message and reissuing the second query if the cardholder information is invalid and a limit of the cardholder information attempt tracking mechanism has not been exceeded; and
logging a fifth message, issuing an error message, and ending the session if the limit of the cardholder information tracking mechanism has been exceeded. - View Dependent Claims (11)
-
-
12. A payment card activation system comprising:
-
a network;
a cardholder terminal coupled to the network; and
a call center coupled to the network, the call center having a report generation unit, a response unit, a cardholder database, a set of validation rules, and a database of logged messages, each message representing a card activation activity, wherein the report generation unit is operable to generate a report including information based on one or more of the logged messages in the database of logged messages. - View Dependent Claims (13, 14, 15, 16, 17, 18, 19)
-
-
20. A payment card activation report generation system comprising
a response unit programmed to respond to an inquiry, generate card activation queries, and log messages based on responses to the queries; -
a database of logged messages, each message representing a card activation activity;
a cardholder database;
a set of validation rules; and
a report generation unit programmed to sort the database of logged messages by card issuer and to generate a report including information based on one or more of the logged messages in the database of logged messages. - View Dependent Claims (21, 22, 23)
-
-
24. A payment card activation report comprising:
-
a card issue name block having a name of a card issuer;
card number and cardholder name information;
an account number;
a session number representing the number of times a purported cardholder has attempted to activate a particular card;
a purported cardholder identifier;
an indication of activation criteria;
an indication of activation status;
an indication of an agent processing an activation attempt; and
an eye catcher that indicates a failed card activation. - View Dependent Claims (25, 26, 27, 28)
-
-
29. A method of monitoring card activation activity, the method comprising
logging activity of a purported cardholder in activating a payment card, where the impetus of activity is one or more queries generated by a response unit; -
creating a report from the logged activity; and
reviewing the report for indications of failed activation, erroneous responses to queries, or both. - View Dependent Claims (30, 31, 32, 33)
creating a database of actual cardholders;
reviewing the report for an indication of activation success;
determining a card associated with the activation success;
contacting the actual cardholder of the card; and
determining whether the actual cardholder is aware that the card has been activated.
-
-
33. A method as claimed in claim 32, further comprising
determining identifying information of a purported cardholder associated with the activation success; - and
contacting the purported cardholder if the actual cardholder is unaware that the card has been activated.
- and
Specification