Systems and Methods for Performing Funds Freeze and/or Funds Seizure with Respect to Prepaid Payment Cards

ABSTRACT

Systems, mechanisms and processes are provided to allow law-enforcement officials, when encountering the potential use of prepaid payment cards in the furtherance of a crime or in relation to criminal activities, to (1) attempt to check the balances on such prepaid payment cards, including the ability to perform aggregate balance checks on a group of such prepaid cards, (2) attempt to freeze the funds on such prepaid payment cards, and/or (3) attempt to seize the funds on such prepaid payment cards.

CROSS-REFERENCE TO RELATED APPLICATIONS

The present application claims the benefit of U.S. ProvisionalApplication Ser. No. 61/644,094, filed May 8, 2012; the disclosure ofwhich is incorporated herein by reference in its entirety.

BACKGROUND

The present disclosure contemplates that the estimated size of criminalactivity that involves some form of cash proceeds is nearly $100 billionin the United States. Conventionally, most of this money has been movedby courier and was laundered through sophisticated networks.

The advent of prepaid payment cards is making cash less relevant andimproving the criminals' ability to move funds in innocuous manners. Lawenforcement organizations at every level are seeing increasing movementto prepaid payment card use in crime. Law enforcement organizations,however, currently have no means to seize funds “loaded on” orassociated with prepaid payment cards. Therefore, the funds fromcriminal activities are often still maintained by many of these criminalorganizations. Additionally, the identifying data obtained through thisprocess may be highly valued by law enforcement organizations.

The present disclosure contemplates that prepaid payment cards(associated with prepaid accounts) can be issued from any country that abank is a member of MasterCard or Visa. Prepaid virtual accounts aregrowing in global use and accessible with a mobile device, making theplastic card required only for automated teller machine transactions.

The present disclosure further contemplates that there is no centraldatabase to record prepaid payment card activity. Therefore, prepaidpayment cards are increasingly used for criminal purposes, includingpayment for criminal activity and to commit criminal acts. Some examplesinclude drug-related activities, prostitution activities, and moneylaundering activities. Governmental agencies, such as the U.S.Department of Homeland Security, may desire to curb the use of prepaidpayment cards in association with such criminal activity, and seize thefunds and identifying data associated with the prepaid payment cards(and their corresponding prepaid accounts).

Capturing funds and identifying data associated with prepaid paymentcards and looking for patterns may assist law enforcement entities inidentifying banks that support illegal activity.

SUMMARY

A method for processing prepaid payment cards is disclosed. A networkedcentral database including information on one or more payment cards, maybe maintained. A predetermined deposit account may be provided forholding seized prepaid payment card funds. Mechanisms and/or processesfor freezing funds on prepaid payment cards may be provided. Mechanismsand/or processes for seizing funds on prepaid payment cards may beprovided. Mechanisms and/or processes for performing batch or aggregatebalance inquiries on groups of prepaid payment cards may be provided.

Generally, the current disclosure provides systems, mechanisms andprocesses for law-enforcement officials, when encountering the potentialuse of prepaid payment cards in the furtherance of a crime or inrelation to criminal activities, to (1) attempt to check the balances onsuch prepaid payment cards, including providing the ability to performbatch or aggregate balance inquiries on groups of such prepaid paymentcards, (2) attempt to freeze the funds on such prepaid payment cards,and/or (3) attempt to seize the funds on such prepaid payment cards.

Identification data may be generated, including one or more ofgenerating a unique jurisdiction merchant ID for each government orlaw-enforcement jurisdiction, generating a unique jurisdiction locationmerchant ID for each location in each respective jurisdiction,generating one or more “Doing Business As” (DBA) identifiers associatedwith a seizure transaction, providing a plurality of merchant categorycodes, or registering one or more merchant ID numbers for a paymentnetwork.

A card reading terminal may be used to check the prepaid card “type”against a set of predetermined BIN ranges. If within a certain range ofBIN numbers, for example, the card reading terminal may proceed toperform additional activities; and if outside of a certain range of BINnumbers, the additional activities that may be performed may be limited.A monetary balance associated with the obtained payment card may bedetermined, and the monetary balance data may be transmitted to the cardreading device. Determining the monetary balance data associated withthe obtained prepaid payment card data may include completing a balanceinquiry transaction, or completing a sale transaction for a relativelysmall, predetermined sale amount. The monetary balance is representativeof monetary funds available in an associated account. The card terminalmay be configured to perform an aggregate balance check on a set ofprepaid payment cards. For example, if the type of crime (e.g., felonyversus lesser crime) involves exceeding a predetermined amount of moneyinvolved in the activity, the card terminal may be configured to collectthe total balance of a plurality of payment cards that may be associatedwith such criminal activity in order to determine if the aggregatebalance on such prepaid cards exceeds the predetermined amount of moneyassociated with the crime type.

A card reading terminal may receive and transmit funds freeze requestdata. For example, the freeze request data may involve apre-authorization transaction for the total balance of the prepaid card.Alternatively, or in addition, the freeze request data may involvenegative file data, which is essentially placing the prepaid card on a“black list”—instructing the network to decline any request for apayment transaction using the prepaid card. Alternatively, or inaddition, the freeze request data may involve a new transaction type(new packet type)—in this case, a “freeze” transaction in which thenetwork marks the account frozen upon receiving the transaction.

A card reading terminal may receive and transmit funds seizure requestdata. The request data may include identification data associated with alegal entity authorized to seize prepaid payment card funds, and apayment card type. Once the identification data is confirmed, a seizuretransaction may be executed on the account associated with the obtainedprepaid payment card data. The seizure may include depositing funds fromthe account associated with the obtained prepaid payment card data, tothe predetermined deposit account for seized prepayment card funds. Thepredetermined deposit account may be associated with a law enforcementagency, or a government agency, wherein the government agency mayinclude a local government agency, a state government agency, a federalgovernment agency, or an international government agency.

A seizure transaction may be executed by initiating a sales transactionvia the card terminal. If the transaction authorization fails, therespective card terminal is notified of the authorization failure; ifthe transaction authorization succeeds, the respective card terminal isnotified of the authorization success. Then, the seizure transactioncompletes a sale transaction by transferring the monetary funds of therespective payment card. Alternatively, or in addition, the seizuretransaction may be executed by transmitting seizure file data to thenetwork, which would include the prepaid account ID data and appropriateseizure account data. As a result of receiving such seizure file data,for example, the network can perform the funds transfer from the prepaidcard account to the seizure account at the end of the business day.Alternatively, or in addition, the seizure request data may involve anew transaction type (new packet type)—in this case, a “seizure”transaction in which the network transfers funds from the prepaid cardaccount to a designated seizure account (which may or may not bedesignated in the transaction data because, for example, such seizureaccounts may be predetermined based upon the type of transaction).

With the above “freeze” and/or “seizure” transactions, informationprovided may include identification information of the prepaid card,such as the card number, the amount of transaction, and (if needed)seizure account information. Additional and/or optional informationsubmitted with the transaction request may include jurisdictionidentification information (such as a jurisdiction ID number), badgeidentification information (such as a badge ID number), authorizationinformation (such as an authorization PIN number), time frameinformation (such as the amount of time to freeze the account), warrantidentification information. On the issue processor side, the warrantidentification information can be used, for example, to informationpertaining to specifically issued warrants and the like.

A portion of the “seized” and/or “frozen” monetary funds may be providedto a third party processor and a card terminal provider. Alternately, atransaction fee may be paid to the third party processor and the cardterminal provider.

The central database may be updated with the with the freeze and/orseizure transaction. One or more electronic merchant activity files maybe generated. The updates may include the unique jurisdiction merchantID(s), the unique jurisdiction location merchant ID(s), the merchant IDnumber(s), the merchant category code(s), the DBA identifier(s), andinformation associated with the predetermined demand deposit account.

The method may be performed on a payment processing apparatus includingone or more non-transitory computer-readable mediums having instructionsthereon. The instructions are configured to operate a network accessiblecomputer system to perform the operations of obtaining funds freezerequest data and/or funds seizure request data transmitted from a cardreading device. The funds freeze request data includes prepaid paymentcard data and may include information pertaining to the amount of fundsto freeze. The funds seizure request data includes prepaid payment carddata and/or identification data associated with an entity legallyauthorized to seize prepaid payment card funds and/or informationpertaining to the amount of funds to seize. The identification dataassociated with the legal entity may be in the form of a unique merchantID, a ‘doing business as’ (DBA) identifier, one or more unique merchantcategory codes, and/or one or more unique merchant ID numbers.

Upon confirming the identification data, the payment processingapparatus determines a monetary balance associated with the accountassociated with the obtained prepaid payment card data, and executes afreeze and/or seizure transaction on the account associated with theobtained prepaid payment card data. The freeze transaction may involve apre-authorization transaction for the total balance of the prepaid card;may involve issuing a negative file, which is essentially placing theprepaid card on a “black list”—instructing the network to decline anyrequest for a payment transaction using the prepaid card; or may involveissuing a new type of freeze transaction (new packet type) in which thenetwork marks the account frozen upon receiving the transaction. Theseizure transaction may include initiating a sale transaction,initiating a hold transaction and/or initiating a chargebacktransaction. Alternatively, the seizure transaction may involve issuinga seizure file transaction to the network or issuing a new type ofseizure transaction to the network. Following the freeze and/or seizuretransaction, the method may include updating the central database withthe transaction information.

BRIEF DESCRIPTION OF THE DRAWINGS

The foregoing and other features of the present disclosure will becomemore fully apparent from the following description and appended claims,taken in conjunction with the accompanying drawings. Understanding thatthese drawings depict only several embodiments in accordance with thedisclosure and are, therefore, not to be considered limiting of itsscope, the disclosure will be described with additional specificity anddetail through use of the accompanying drawings.

In the drawings:

FIG. 1 depicts an example payment card processing system;

FIGS. 2-4 depict example processes of processing payment cards; and

FIG. 5 depicts an example environment configured to process paymentcards; all arranged in accordance with at least some embodiments of thepresent disclosure.

DETAILED DESCRIPTION

In the following detailed description, reference is made to theaccompanying drawings, which form a part hereof. In the drawings,similar symbols typically identify similar components, unless contextdictates otherwise. The illustrative embodiments described in thedetailed description, drawings, and potential points of novelty are notmeant to be limiting. Other embodiments may be utilized, and otherchanges may be made, without departing from the spirit or scope of thesubject matter presented here. It will be readily understood that theaspects of the present disclosure, as generally described herein, andillustrated in the Figures, may be arranged, substituted, combined, anddesigned in a wide variety of different configurations, all of which areexplicitly contemplated and make part of this disclosure.

This disclosure is drawn to methods, systems, devices and/or apparatusrelated to processing payment cards for freeze and/or seizuretransactions. Specifically, the disclosed methods, systems, devicesand/or apparatus relate to processing prepaid payment cards to check thebalance of, freeze and/or seize monetary funds associated with prepaidpayment cards.

In FIG. 1, an example system 1000 for processing payment cards isdepicted. Specifically, a law enforcement officer and/or investigativeorganization may wish to analyze, freeze and/or seize funds from one ormore prepaid payment cards at a point of investigation 1009. Suchprepaid payment cards may be scanned at the point of investigation 1009using a card terminal (or similar device) 1005 to obtain prepaid paymentcard information (e.g., card number) from cards themselves (via amagnetic strip, for example) and to communicate card and transactioninformation between the various networks and account processors. Suchpayment card information may be transmitted to/from a prepaid cardissuer processor 1020, via a gateway 1010 and card network (e.g.,Visa/MC, Discover, Vantiv, etc.) 1015, for example, that may determinethe type of card 1006 (e.g., prepaid, credit, debit) and the monetaryfunds associated with the payment card's account. For transactions thatmay involve a “seizure” of funds to a government entity such as the U.S.Treasury 1040 and/or a law-enforcement agency 1045 account, the gateway1010 can interact with a settlement processor 1030 for conducting suchtransactions with the network 1035 associated with the destinationaccounts.

A prepaid payment card reader terminal 1005 may scan or otherwise readdata from a prepaid payment card. This allows efficient delivery of datato law enforcement agents in a quick, easy to understand and executeformat. Payment card data may be obtained by use of a wireless or wiredcard terminal 1005 in the field at the point of arrest or investigation1009. Payment cards and payment card terminals 1005 may incorporatemagnetic stripes, smart cards, and/or near-field communications (NFC),among other technologies. The particular account 1006 associated withthe prepaid payment card, may then be accessed via the card network1015.

In some examples, card information and transaction information may bedetermined and transmitted/received via a network-accessible application1008 that may be accessed from an Internet-capable computer 1025 or viaan embedded application on the computer 1025 (or any combination ofnetwork-accessible or embedded application). In this manner, a highlevel of security, tracking of entered data, and aggregation of cardswipe data may be maintain pursuant to Payment Card Industry (PCI) DataSecurity Standard (DSS) requirements. Additionally, reporting oftransactional and/or financial data may be provided by either a virtualterminal 1025 or a payment card terminal 1005. In some examples, ananalytics engine 1050 and an associated database may be used to allowfor comprehensive analytics to be performed using data from multipletransactions associated with the law enforcement and investigativeactivities on the various prepaid card accounts 1006.

An issue processor 1020 may respond to a data inquiry, such as a requestof balance, and respond to the inquiry. The processor 1020 may receivetransactional instructions, such as freezing or seizure of funds, andthen may authorize such transactions and/or may otherwise act upon thetransactional instructions. Transactions affecting the monetary funds(or balance) may then proceed. Example transactions may include“seizing” the monetary funds (or a portion thereof), “freezing” themonetary funds (or a portion thereof), and/or performing a “chargeback”to the monetary balance. “Seizing” the monetary funds may include, amongother things, transferring the monetary funds to a financial institutionaccount, transferring the monetary funds to a demand deposit account,settling the monetary funds into an account, and/or performing aconventional sale transaction by a merchant (e.g., a law enforcementorganization). “Freezing” the monetary funds may include placing a holdon the monetary funds, at least temporality settling the monetary fundsinto an account, and/or otherwise making the monetary funds unavailablefor transfer. Performing a “chargeback” may include, among other things,transferring seized and/or held monetary funds back to the payment cardaccount 1006.

The monetary funds associated with the card may have a portion divertedas fee for third party and card processors 1035, and a portion divertedto a predetermined deposit account belonging to a government treasury1040 or a legal agency 1045, which may hold the seized funds.

As generally depicted in FIGS. 2-4, example methods of processingpayment cards may include one or more operations. In FIG. 2, method 1100shows the top level operation of the example method. Operation 1115generates a unique jurisdiction merchant IDs for each jurisdiction(MIDS), a unique jurisdiction location merchant ID for each location ineach respective jurisdiction, and a “Doing Business As” (DBA)identifier(s) associated with a balance inquiry, funds freeze and/orseizure transaction, for example. In operation 1120 the uniquejurisdiction merchant ID(s), the unique jurisdiction location merchantID(s), the merchant ID number(s), the merchant category code(s), and theDBA identifier(s) may be transmitted or loaded into a payware connectgateway and corresponding payment card terminal. Operation 1125 tracksand registers the IDs with the relevant networks; merchant categorycodes may be provided. Merchant ID numbers for law enforcement agenciesmay be registered with payment networks (e.g., Visa®, MasterCard®,Discover®, American Express®). In operation 1130, a traditionalgovernment Merchant Category Code (MCC) and a “DBA” identifier initiatesa seizure transaction, for example.

FIG. 3 depicts the steps of an example a freeze or seizure transactionat the law enforcement location. In operation 1225, officials make adetermination of probable cause to check the balance on a card. When alaw enforcement agency obtains a payment card (from a criminal or otherentity), the law enforcement agency may determine the card type of thepayment card. For example, at step 1230, a payment card may be scanned,swiped, or otherwise read by a payment card terminal 1005 at the pointof investigation 1009 (or, alternatively, the payment card informationmay be entered into or read by the computer terminal 1025 at a remotelocation). Payment card information may be transmitted to a processingentity 1020 via the payment card terminal 1005 (or remote terminal1025). For example a central database or processor 1020 may provide BINtables to the gateway 1010 to facilitate checking the type cardpre-paid, credit, debit, etc. at step 1235. In response, the type ofpayment card (e.g., prepaid, credit, debit) may be transmitted to thepayment card terminal 1005 (or remote computer 1025). Generally, thisstep involves checking the card account number information againstpredetermined BIN ranges associated with prepaid cards, for example. Ifthe card account number falls within the predetermined BIN range a“valid” signal, for example, may be transmitted to the card reader 1005or remote computer 1025, indicating that a broad set of transactions maybe available for that card (such as balance inquiry and othertransactions). If the card number falls outside of the predetermined BINrange, an “invalid” signal, for example, may be transmitted to the cardreader 1005 or remote computer 1025, indicating that a narrower set oftransactions may be available as indicated by block 1240, alternateprocessing.

In operation 1245, if it is determined that the card is a pre-paid card(or otherwise within the predetermined range of BIN numbers), the systemwill then have an option to execute a balance inquiry transaction, andif the issuer processor responds, the system will provide a fundsbalance to law enforcement via card reader 1005 or remote terminal 1025.In operation 1245, determining the amount of monetary funds associatedwith a payment card may include completing a balance inquiry transactionand/or completing a sale transaction for a relatively small,predetermined sale amount (e.g., $1.00). The latter may allow a merchantaccess to the balance on the payment card. Action 1255 allows for batchprocessing a group of prepaid cards to determine an aggregate balance ofthe group of prepaid cards.

With the current disclosure, it may be possible to perform aggregate orbatch balance inquiries on a plurality of prepaid cards. For example, ifthe type of crime (e.g., felony versus lesser crime) involves exceedinga predetermined amount of money involved in the activity, the cardterminal 1005 and/or remote terminal 1025 may be configured to collectthe total balance of a plurality of payment cards found at the point ofinvestigation 1009 that may be associated with such criminal activity inorder to determine if the aggregate balance on such prepaid cardsexceeds the predetermined amount of money associated with the crimetype.

If the remaining balance is not returned, in action 1250, a lawenforcement agent may choose to perform alternate processing 1240, suchas contacting the financial institution associated with the payment cardto determine the monetary balance.

If the balance is returned, or at the end of the aggregate balancecheck, in operation 1260, after obtaining the monetary balanceassociated with the payment card(s), transactions may be initiated onthe payment card(s) (and, accordingly, on the monetary funds associatedwith the payment card(s)). In operation 1260, assuming law enforcementhas probable cause to freeze or to seize the funds, the card reader 1005and/or terminal 1025 may have a freeze and/or seizure transactioncapability. For example, a freeze or seizure transaction may beinitiated via the payment card terminal 1005. In operation 1260, thedesired funds freeze or funds-seizure transaction may be requested bythe card reader 1005 and/or terminal 1025 and transmitted through thegateway 1010 to the network 1015 and provider 1020.

Various funds freeze transactions are contemplated by the currentdisclosure. The card reading terminal 1005 may transmit funds freezerequest data to the gateway 1010 and onto the network 1015 and issuerprocessor 1020. For example, the freeze request data may involve apre-authorization transaction for the total balance of the prepaid card.Alternatively, or in addition, the freeze request data may involve atype of sale transaction in which the funds are temporarily placed intoan account (such as accounts 1040/1045 associated with government orlaw-enforcement entities). Alternatively, or in addition, the freezerequest data may involve negative file data, which is essentiallyplacing the prepaid card on a “black list”—instructing the network 1015to decline any request for a payment transaction using the prepaid card.Alternatively, or in addition, the freeze request data may involve a newtransaction type (new packet type)—in this case, a “freeze” transactionin which the network 1015 marks the account frozen upon receiving thetransaction.

With respect to the negative file structure, the network may beconfigured to notify the issuer processor 1020 so that the issuerprocessor may cross-check the card information on the negative fileagainst related transactions, related accounts and possible intra-banktransfer requests.

Seizure transactions may include initiating a sale transaction via thepayment card terminal 1005 or remote terminal 1025 to effectuate a fundstransfer from the prepaid card account 1006 to the seizure account1040/1045. Further, a transaction authorization may be requested and/orinitiated. If the transaction authorization fails, the payment cardterminal may be notified of the authorization failure, and the paymentcard terminal may display such notice to a user. If the transactionauthorization succeeds, the payment card terminal may be notified of theauthorization success, and the payment card terminal may display suchnotice to a user.

In some examples, the monetary funds (or at least a portion thereof) ofthe respective payment card may be transferred to a predetermined demanddeposit account. In some examples, such demand deposit account may beassociated with, owned, and/or controlled by a government agency,including local, state, federal and/or international agencies. In someexamples, the demand deposit account may be associated with, owned,and/or controlled by a law enforcement agency.

Alternatively, or in addition, the seizure transaction may be executedby transmitting seizure file data to the network 1015, which wouldinclude the prepaid account ID data and appropriate seizure amount data.As a result of receiving such seizure file data, for example, thenetwork 1015 can perform the funds transfer from the prepaid cardaccount 1006 to the seizure account 1040/1045 at the end of the businessday. Alternatively, or in addition, the seizure request data may involvea new transaction type (new packet type)—in this case, a “seizure”transaction in which the network 1015 transfers funds from the prepaidcard account 1006 to a designated seizure account (which may or may notbe designated in the transaction data because, for example, such seizureaccounts may be predetermined based upon the type of transaction)1040/1045.

In some examples, a requested transaction may include initiating achargeback transaction via a payment card terminal 1005 or remoteterminal 1025, and completing the chargeback transaction by refundingand/or releasing the monetary funds (or at least a portion thereof) ofthe payment card to the payment card account 1006

With the above “freeze” and/or “seizure” transactions, informationprovided may include identification information of the prepaid card,such as the card number, the amount of transaction, and (if needed)seizure account information. Additional and/or optional informationsubmitted with the transaction request may include jurisdictionidentification information (such as a jurisdiction ID number), badgeidentification information (such as a badge ID number), authorizationinformation (such as an authorization PIN number), time frameinformation (such as the amount of time to freeze the account), warrantidentification information. On the issue processor side, the warrantidentification information can be used, for example, to informationpertaining to specifically issued warrants and the like.

Returning to FIG. 3, following the freeze and/or seizure transactionstep 1260, the associated freeze or seizure transaction data isrecorded, such as on the database 1055 for record-keeping and/orsubsequent data processing and analytics by the analytics engine 1050.Finally, line 1265 is provided to indicate that such freeze and/orseizure transactions may be performed on the group of prepaid cards.

In association with the possible aggregate or batch processing, all suchprepaid cards in the batch may be tied together in the system so thateach may be associated with the same crime(s), investigated party(s),warrant(s) and the like. As discussed above, if a check of a prepaidcard in a batch of such prepaid card returns an “invalid” signal in theBIN-range check, it still may be desirable to perform a “freeze” or“seizure” transaction on the card if it is tied to a group of prepaidcards associated with a particular criminal activity and/or actor.Additionally, by the analytics and data mining engine 1050 can be usedto find additional prepaid card accounts, providers, actors and the likethat may be associated with or otherwise tied to the group of prepaidcards in the current batch. Alternatively, the analytics and data miningengine 1050 can be used to obtain account information from prepaid cardsin the batch, using available search algorithms, to which the system isunable to obtain access and/or authorization.

FIG. 4 illustrates detailed steps 1300 involved in an exemplary fundsseizure transaction. In operation 1305, once an approved transaction isexecuted by a law enforcement official, it will be processed in asimilar manner to other sale transactions and settle to defined lawenforcement DDA (in the case of Department of Homeland Security, anaccount defined by FMS/US Treasury). In operation 1310, a centraldatabase may maintain the segregated seizure accounts and monitorchargebacks closely with government agencies, for example the USTreasury. In operation 1315, an EMAF (Electronic Merchant Activity File)is provided to payment card services as needed to track detailedMid-level activity.

In some examples, an electronic merchant activity file(s) may begenerated. Such file(s) may include the unique jurisdiction merchantID(s), the unique jurisdiction location merchant ID(s), the merchant IDnumber(s), the merchant category code(s), the DBA identifier(s), and/orinformation associated with the predetermined demand deposit account. Insome examples, the electronic merchant activity file(s), the uniquejurisdiction merchant ID(s), the unique jurisdiction location merchantID(s), the merchant ID number(s), the merchant category code(s), the DBAidentifier(s), information associated with the predetermined demanddeposit account, the issuing financial institution, and/or the seizuretransaction information may be transmitted to government agencies.

In some examples, a third party processor and/or a card terminalprovider may receive financial consideration. For example, a third partyprocessor and/or a card terminal provider may receive a portion of thepredetermined demand deposit account, a portion of the monetary funds ofthe respective payment card being seized, a portion of the seizuretransaction value, and/or a fee associated with any seizure transaction.

FIG. 5 illustrates an exemplary environment 1600 for implementing and/orcontrolling various aspects of an example system that includes acomputer 1602, the computer 1602 including a processing unit 1604, asystem memory 1606 and a system bus 1608. The system bus 1608 couplessystem components including, but not limited to, the system memory 1606to the processing unit 1604. The processing unit 1604 can be any ofvarious commercially available processors. Dual microprocessors andother multi-processor architectures may also be employed as theprocessing unit 1604.

The system bus 1608 can be any of several types of bus structure thatmay further interconnect to a memory bus (with or without a memorycontroller), a peripheral bus, and a local bus using any of a variety ofcommercially available bus architectures. The system memory 1606includes read only memory (ROM) 1610 and random access memory (RAM)1612. A basic input/output system (BIOS) is stored in a non-volatilememory 1610 such as ROM, EPROM, EEPROM, which BIOS contains the basicroutines that help to transfer information between elements within thecomputer 1602, such as during start-up. The RAM 1612 can also include ahigh-speed RAM such as static RAM for caching data.

The computer 1602 further includes an internal hard disk drive (HDD)1614 (e.g., EIDE, SATA), which internal hard disk drive 1614 may also beconfigured for external use in a suitable chassis (not shown), amagnetic floppy disk drive (FDD) 1616, (e.g., to read from or write to aremovable diskette 1618) and an optical disk drive 1620, (e.g., readinga CD-ROM disk 1622 or, to read from or write to other high capacityoptical media such as the DVD). The hard disk drive 1614, magnetic diskdrive 1616 and optical disk drive 1620 can be connected to the systembus 1608 by a hard disk drive interface 1624, a magnetic disk driveinterface 1626 and an optical drive interface 1628, respectively. Theinterface 1624 for external drive implementations includes at least oneor both of Universal Serial Bus (USB) and IEEE 1394 interfacetechnologies.

The drives and their associated computer-readable media providenonvolatile storage of data, data structures, computer-executableinstructions, and so forth. For the computer 1602, the drives and mediaaccommodate the storage of any data in a suitable digital format.Although the description of computer-readable media above refers to aHDD, a removable magnetic diskette, and a removable optical media suchas a CD or DVD, it should be appreciated by those skilled in the artthat other types of media which are readable by a computer, such as zipdrives, magnetic cassettes, flash memory cards, cartridges, and thelike, may also be used in the exemplary operating environment, andfurther, that any such media may contain computer-executableinstructions for performing the methods of an example system.

A number of program modules can be stored in the drives and RAM 1612,including an operating system 1630, one or more application programs1632, other program modules 1634 and program data 1636. All or portionsof the operating system, applications, modules, and/or data can also becached in the RAM 1612. It is appreciated that an example system can beimplemented with various commercially available operating systems orcombinations of operating systems.

A user can enter commands and information into the computer 1602 throughone or more wired/wireless input devices, e.g., a keyboard 1638 and apointing device, such as a mouse 1640. Other input devices (not shown)may include a microphone, an IR remote control, a joystick, a game pad,a stylus pen, touch screen, or the like. These and other input devicesare often connected to the processing unit 1604 through an input deviceinterface 1642 that is coupled to the system bus 1608, but can beconnected by other interfaces, such as a parallel port, an IEEE 1394serial port, a game port, a USB port, an IR interface, etc.

A monitor 1644 or other type of display device is also connected to thesystem bus 1608 via an interface, such as a video adapter 1646. Inaddition to the monitor 1644, a computer typically includes otherperipheral output devices (not shown), such as speakers, printers, etc.

The computer 1602 may operate in a networked environment using logicalconnections via wired and/or wireless communications to one or moreremote computers, such as a remote computer(s) 1648. The remotecomputer(s) 1648 can be a workstation, a server computer, a router, apersonal computer, portable computer, microprocessor-based entertainmentappliance, a peer device or other common network node, and typicallyincludes many or all of the elements described relative to the computer1602, although, for purposes of brevity, only a memory storage device1650 is illustrated. The logical connections depicted includewired/wireless connectivity to a local area network (LAN) 1652 and/orlarger networks, e.g., a wide area network (WAN) 1654. Such LAN and WANnetworking environments are commonplace in offices, and companies, andfacilitate enterprise-wide computer networks, such as intranets, all ofwhich may connect to a global communication network, e.g., the Internet.

When used in a LAN networking environment, the computer 1602 isconnected to the local network 1652 through a wired and/or wirelesscommunication network interface or adapter 1656. The adaptor 1656 mayfacilitate wired or wireless communication to the LAN 1652, which mayalso include a wireless access point disposed thereon for communicatingwith the wireless adaptor 1656.

When used in a WAN networking environment, the computer 1602 can includea modem 1658, or is connected to a communications server on the WAN1654, or has other means for establishing communications over the WAN1654, such as by way of the Internet. The modem 1658, which can beinternal or external and a wired or wireless device, is connected to thesystem bus 1608 via the serial port interface 1642. In a networkedenvironment, program modules depicted relative to the computer 1602, orportions thereof, can be stored in the remote memory/storage device1650. It will be appreciated that the network connections shown areexemplary and other means of establishing a communications link betweenthe computers can be used.

The computer 1602 is operable to communicate with any wireless devicesor entities operatively disposed in wireless communication, e.g., aprinter, scanner, desktop and/or portable computer, portable dataassistant, communications satellite, any piece of equipment or locationassociated with a wirelessly detectable tag (e.g., a kiosk, news stand,restroom), and telephone. This includes at least Wi-Fi and Bluetooth™wireless technologies. Thus, the communication can be a predefinedstructure as with a conventional network or simply an ad hoccommunication between at least two devices.

Wi-Fi, or Wireless Fidelity, allows connection to the Internet from acouch at home, a bed in a hotel room, or a conference room at work,without wires. Wi-Fi is a wireless technology similar to that used in acell phone that enables such devices, e.g., computers, to send andreceive data indoors and out; anywhere within the range of a basestation. Wi-Fi networks use radio technologies called IEEE 802.11 (a, b,g, etc.) to provide secure, reliable, fast wireless connectivity. AWi-Fi network can be used to connect computers to each other, to theInternet, and to wired networks (which use IEEE 802.3 or Ethernet).Wi-Fi networks operate in the unlicensed 2.4 and 5 GHz radio bands, atan 11 Mbps (802.11a) or 54 Mbps (802.11b) data rate, for example, orwith products that contain both bands (dual band), so the networks canprovide real-world performance similar to the basic 10 BaseT wiredEthernet networks used in many offices.

While various aspects and embodiments have been disclosed herein, otheraspects and embodiments will be apparent to those skilled in the art.The various aspects and embodiments disclosed herein are for purposes ofillustration and are not intended to be limiting.

What is claimed is:
 1. A method of processing a plurality of prepaidpayment cards, comprising: for each prepaid payment card, receiving cardidentification information; for each prepaid payment card, obtainingcard balance information; and for each prepaid payment card, performingat least one of a funds freeze transaction and a funds seizuretransaction.
 2. The method of claim 1, wherein further comprising a stepof, prior to obtaining card balance information, confirming that thecard identification information falls with a predetermined range ofBINs.
 3. The method of claim 1, further comprising the step of summingthe balance information for the plurality of prepaid payment cards andcomparing the sum against a predetermined crime-level threshold.
 4. Themethod of claim 3, wherein the step of performing at least one of afunds freeze transaction and a funds seizure transaction is performed ifthe sum meets or exceeds the predetermined crime-level threshold.
 5. Themethod of claim 1, wherein the at least one of a funds freezetransaction and a funds seizure transaction involves transmitting, foreach prepaid payment card, a pre-authorization transaction in accordancewith the balance information.
 6. The method of claim 1, wherein the atleast one of a funds freeze transaction and a funds seizure transactioninvolves transmitting, for each prepaid payment card, a negative filenotification to a payment card network, resulting in the cardidentifying information being placed on a negative file list of frozenaccounts accessible by at least one of the payment card network and anissuer processor.
 7. The method of claim 1, wherein the at least one ofa funds freeze transaction and a funds seizure transaction involvestransmitting, for each prepaid payment card, a dedicated funds freezetransaction to a payment card network.
 8. The method of claim 1, whereinthe at least one of a funds freeze transaction and a funds seizuretransaction involves transmitting, for each prepaid payment card, apurchase transaction in accordance with the balance information.
 9. Themethod of claim 1, wherein the at least one of a funds freezetransaction and a funds seizure transaction involves transmitting, foreach prepaid payment card, a seizure file notification to a payment cardnetwork, resulting in the card identifying information being placed on aseizure file list of seized accounts accessible by at least one of thepayment card network and an issuer processor.
 10. The method of claim 1,wherein the at least one of a funds freeze transaction and a fundsseizure transaction involves transmitting, for each prepaid paymentcard, a dedicated funds seizure transaction to a payment card network.11. The method of claim 1, wherein the at least one of a funds freezetransaction and a funds seizure transaction involves transmitting, foreach prepaid payment card, the card identification information, the cardbalance information and at least one of: law enforcement jurisdictionidentification information; law enforcement badge identificationinformation; authorization PIN information; freeze time-frameinformation; and warrant identification information. 12-28. (canceled)