Systems and methods for enhanced authorization fraud mitigation
First Claim
1. A computer-implemented method comprising:
- creating, by a computer-based system, a pseudo authorization message in a first electronic data packet associated with a transaction,wherein the transaction includes enhanced authorization data associated with purchase information;
storing, by the computer-based system, the pseudo authorization message in a database,wherein the storing includes storing using a binary large object method to store different pseudo authorization messages from different owners with different formats as ungrouped data elements via a fixed memory offset;
organizing, by the computer-based system, the database as data tables;
using, by the computer-based system, a key field in the data tables to speed searching;
performing, by the computer-based system, sequential searching through the data tables;
sorting, by the computer-based system, records in data tables to simplify look up;
partitioning, by the computer-based system and using the key field, the database according to a high-level class of objects defined by the key field;
designating, by the computer-based system, types of data as the key field in a plurality of data tables;
linking, by the computer-based system, the data tables on the basis of the types of data designated as the key field;
tuning, by the computer-based system, the database to optimize database performance,wherein the tuning includes placing frequently used files on separate file systems to reduce in and out bottlenecks;
obtaining, by the computer-based system, the pseudo authorization message from the frequently used files;
establishing, by the computer-based system and using an application programming interface, first communication protocols in a first communication channel between programs of a merchant server and programs of the computer-based system;
transmitting, by the computer-based system and using the first communication protocols, the purchase information to the merchant server via the first communication channel,wherein the merchant server, using the application programming interface, establishes third communication protocols between programs of the merchant server and programs of an authorizing entity system;
wherein the merchant server creates a second electronic data packet, using the third communication protocols, with an authorization request associated with the transaction, andwherein the merchant server transmits, using the third communication protocols, the authorization request in the second electronic data packet to the authorizing entity system; and
establishing, by the computer-based system and using the application programming interface, second communication protocols in a second communication channel between programs of the authorizing entity system and programs of the computer-based system;
transmitting, by the computer-based system and via a web acceleration server using the application program interface and using the second communication protocols, the pseudo authorization message to the authorizing entity system via the second communication channel,wherein the web acceleration server caches a website of the merchant server,wherein the pseudo authorization message bypasses the merchant server, andwherein the authorizing entity system determines that the pseudo authorization message was received within a specified time of the authorization request.
1 Assignment
0 Petitions
Accused Products
Abstract
A consumer uses a web client to transmit purchase information associated with a transaction to a merchant server. The purchase information is transmitted via a web acceleration server. The web acceleration server identifies enhanced authorization data associated with the transaction. The web acceleration server creates a pseudo authorization message. The web acceleration server transmits the pseudo authorization message to a transaction account issuer. The merchant server transmits an authorization request to the transaction account issuer. The transaction account issuer determines that the authorization request and the pseudo authorization message are associated with the same transaction. The transaction account issuer merges the authorization request and the pseudo authorization message and performs a fraud analysis. The transaction account issuer transmits an authorization response to the merchant.
73 Citations
19 Claims
-
1. A computer-implemented method comprising:
-
creating, by a computer-based system, a pseudo authorization message in a first electronic data packet associated with a transaction, wherein the transaction includes enhanced authorization data associated with purchase information; storing, by the computer-based system, the pseudo authorization message in a database, wherein the storing includes storing using a binary large object method to store different pseudo authorization messages from different owners with different formats as ungrouped data elements via a fixed memory offset; organizing, by the computer-based system, the database as data tables; using, by the computer-based system, a key field in the data tables to speed searching; performing, by the computer-based system, sequential searching through the data tables; sorting, by the computer-based system, records in data tables to simplify look up; partitioning, by the computer-based system and using the key field, the database according to a high-level class of objects defined by the key field; designating, by the computer-based system, types of data as the key field in a plurality of data tables; linking, by the computer-based system, the data tables on the basis of the types of data designated as the key field; tuning, by the computer-based system, the database to optimize database performance, wherein the tuning includes placing frequently used files on separate file systems to reduce in and out bottlenecks; obtaining, by the computer-based system, the pseudo authorization message from the frequently used files; establishing, by the computer-based system and using an application programming interface, first communication protocols in a first communication channel between programs of a merchant server and programs of the computer-based system; transmitting, by the computer-based system and using the first communication protocols, the purchase information to the merchant server via the first communication channel, wherein the merchant server, using the application programming interface, establishes third communication protocols between programs of the merchant server and programs of an authorizing entity system; wherein the merchant server creates a second electronic data packet, using the third communication protocols, with an authorization request associated with the transaction, and wherein the merchant server transmits, using the third communication protocols, the authorization request in the second electronic data packet to the authorizing entity system; and establishing, by the computer-based system and using the application programming interface, second communication protocols in a second communication channel between programs of the authorizing entity system and programs of the computer-based system; transmitting, by the computer-based system and via a web acceleration server using the application program interface and using the second communication protocols, the pseudo authorization message to the authorizing entity system via the second communication channel, wherein the web acceleration server caches a website of the merchant server, wherein the pseudo authorization message bypasses the merchant server, and wherein the authorizing entity system determines that the pseudo authorization message was received within a specified time of the authorization request. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17)
-
-
18. A method comprising:
-
establishing, by an authorizing entity computer-based system and using an application programming interface, first communication protocols in a first communication channel between programs of a merchant server and programs of the authorizing entity computer-based system; receiving, by the authorizing entity computer-based system using the first communication protocols, an authorization request in a first electronic data packet from the merchant server via the first communication channel, wherein the merchant server, using third communication protocols, creates the authorization request associated with purchase information and a transaction; establishing, by the authorizing entity computer-based system and using the application programming interface, second communication protocols in a second communication channel between programs of a web acceleration server and programs of the authorizing entity computer-based system; receiving, by the authorizing entity computer-based system and via the web acceleration server using an application program interface and using the second communication protocols, a pseudo authorization message in a second electronic data packet via a second communication channel, wherein the message includes enhanced authorization data associated with the purchase information, and wherein the pseudo authorization message bypasses the merchant server; wherein the web acceleration server caches a website of the merchant server, storing, by the authorizing entity computer-based system, the pseudo authorization message in a database, wherein the storing includes storing using a binary large object method to store different pseudo authorization messages from different owners with different formats as ungrouped data elements via a fixed memory offset; organizing, by the authorizing entity computer-based system, the database as data tables; using, by the computer-based system, a key field in the data tables to speed searching; performing, by the authorizing entity computer-based system, sequential searching through the data tables; sorting, by the authorizing entity computer-based system, records in data tables to simplify look up; partitioning, by the authorizing entity computer-based system and using the key field, the database according to a high-level class of objects defined by the key field; designating, by the authorizing entity computer-based system, types of data as the key field in a plurality of data tables; linking, by the authorizing entity computer-based system, the data tables on the basis of the types of data designated as the key field; tuning, by the authorizing entity computer-based system, the database to optimize database performance, wherein the tuning includes placing frequently used files on separate file systems to reduce in and out bottlenecks; obtaining, by the authorizing entity computer-based system, the pseudo authorization message from the frequently used files; determining, by the authorizing entity computer-based system, that the pseudo authorization message was received within a specified time of the authorization request; and determining, by the authorizing entity computer-based system, that the authorization request was received from the merchant server and the pseudo authorization message originated from the transaction.
-
-
19. A system comprising:
-
a processor, a tangible, non-transitory memory configured to communicate with the processor, the tangible, non-transitory memory having instructions stored thereon that, in response to execution by the processor, cause the processor to perform operations comprising; creating, by the processor, a pseudo authorization message in a first electronic data packet associated with a transaction, wherein the transaction includes enhanced authorization data associated with purchase information; storing, by the processor, the pseudo authorization message in a database, wherein the storing includes storing using a binary large object method to store different pseudo authorization messages from different owners with different formats as ungrouped data elements via a fixed memory offset; organizing, by the processor, the database as data tables; using, by the processor, a key field in the data tables to speed searching; performing, by the processor, sequential searching through the data tables; sorting, by the processor, records in data tables to simplify look up; partitioning, by the processor and using the key field, the database according to a high-level class of objects defined by the key field; designating, by the processor, types of data as the key field in a plurality of data tables; linking, by the processor, the data tables on the basis of the types of data designated as the key field; tuning, by the processor, the database to optimize database performance, wherein the tuning includes placing frequently used files on separate file systems to reduce in and out bottlenecks; obtaining, by the processor, the pseudo authorization message from the frequently used files; establishing, by the processor and using an application programming interface, first communication protocols in a first communication channel between programs of a merchant server and programs of the processor; transmitting, by the processor and using the first communication protocols, the purchase information to the merchant server via the first communication channel, wherein the merchant server, using the application programming interface, establishes third communication protocols between programs of the merchant server and programs of an authorizing entity system; wherein the merchant server creates a second electronic data packet, using the third communication protocols, with an authorization request associated with the transaction, and wherein the merchant server transmits, using the third communication protocols, the authorization request in the second electronic data packet to the authorizing entity system; and establishing, by the processor and using the application programming interface, second communication protocols in a second communication channel between programs of the authorizing entity system and programs of the processor; transmitting, by the processor and via a web acceleration server using the application program interface and using the second communication protocols, the pseudo authorization message to the authorizing entity system via the second communication channel, wherein the web acceleration server caches a website of the merchant server, wherein the pseudo authorization message bypasses the merchant server, and wherein the authorizing entity system determines that the pseudo authorization message was received within a specified time of the authorization request.
-
Specification