Transaction processing

ABSTRACT

A transaction processing system for the real time authorization of payment transactions. The system comprises a verification system ( 4 ) connected to an issuer card management system ( 3 ). A cardholder can access the system via an interface ( 2 ) which can be for example the Internet, a wireless device, telephone, or a branch visit. The interface allows the cardholder to input rules governing how their credit card transactions are to be authorized. When the cardholder initiates a purchase transaction with their credit card, an authorization request is passed from the card network to the verification system which executes the rules created by the cardholder in order to approve or deny the transaction.

CROSS-REFERENCE TO RELATED APPLICATIONS

This is a continuation of U.S. application Ser. No. 10/735,642, filedDec. 16, 2003, which is a continuation of PCT/1E02/00093, filed Jun. 27,2002 and published in English, both of which are incorporated herein byreference in their entireties.

BACKGROUND OF THE INVENTION

1. Field of the Invention

The invention relates to real time authorization of transactions usingnoncash payment instruments such as credit cards and debit cards.

2. Related Art

While there has been much discussion in recent years concerningcard-not-present (and particularly Internet shopping) fraud, in fact thebulk of credit card fraud arises from card-present transactions. Forexample, card “skimming” often results in a fraudulent card beingproduced and used, possibly in a different country from where theskimming occurred. Another example is mail interception, in which cardsare stolen from (he postal system as they are en route to the customer.

While the losses arising from fraud are very considerable, efforts todate at providing new systems to reduce fraud have met with only limitedsuccess. In one approach marketed by the company Orbiscom™ a“disposable” card number is issued to which limited use conditions areapplied. This approach appears to be of benefit for Internettransactions; however it is generally believed to be of little benefitfor card present transactions.

In another approach, “neural intelligence” is used by the issuer tomonitor proposed transactions and to block those which do not appear tofit a usage pattern for the cardholders. These systems monitor patternsof usage and on the basis of this monitoring, determine when usage isout of the ordinary. While this appears to be a very helpful approach,it suffers from practical problems. For example, a cardholder may findto his or her embarrassment and inconvenience that he or she cannot usea card when on holiday in a foreign country. The overall impression thecardholder has is that he or she is not in control and does notunderstand how his or her transactions are controlled.

The invention is therefore directed towards providing a system andmethod for real time processing of transactions to reduce overall fraud.Another object is to help ensure that cardholders are more in control ofhow their cards are used and that they are informed of what ishappening.

SUMMARY OF THE INVENTION

According to the invention, there is provided a transaction processingsystem comprising an interface for receiving authorization requests, aninterface for transmitting authorization outputs, and a processing meanscomprising means for determining from authorization request data if thesystem output should be positive for negative, characterized in that theprocessing means comprises:

-   -   a setup means comprising means for storing transaction        conditions associated with particular customers, and    -   authorization means for dynamically retrieving a transaction        condition associated with the customer of each authorization        request on a per-transaction basis and for applying said        conditions to the authorization request.

In one embodiment the setup means comprises an interface comprisingmeans for allowing each customer to define said conditions.

In one embodiment said interface comprises a Web server.

In another embodiment the setup .means comprises means for storingpredefined template conditions, and for allowing a customer to selectpredefined template conditions for his or her card.

In a further embodiment the setup means comprises a fraud managerinterface comprising means for allowing a fraud manager with accesscontrol to define said template conditions.

In one embodiment the predefined template condition comprises specificplaceholders for conditions, values and logical operators.

In one embodiment the setup means comprises input means for allowing acustomer to input customer specified parameters to the predefinedtemplate conditions.

In another embodiment each template comprises an associated action whichis the action to be taken if, upon evaluation, the template conditionevaluates to “true”.

In a further embodiment at least some of the conditions are in the formof program code rules.

In one embodiment the setup means comprises means for maintaining a ruledatabase.

In one embodiment the rule database comprises means for storing rules ina format which is indexed on a particular customer or customer cardnumber.

In another embodiment said rules comprise system, product and customerrules.

In one embodiment said rules are stored in a format which does notrequire parsing of logical string-based expressions for processing.

In one embodiment the authorization means comprises means forautomatically transmitting a notification to a customer under control ofthe conditions.

In another embodiment the authorization means comprises means forreceiving confirmation of authorization from a customer in response to anotification.

In a further embodiment the authorization means comprises means forsuccessively applying system-level, card product-level, and the customerconditions upon receipt of an authorization request.

In another embodiment the authorization request interface comprises anetwork interface for interfacing with a card payment network.

In one embodiment the authorization request interface comprises anetwork interface for interfacing with an issuer front end system.

In one embodiment the output interface further comprises a cardmanagement system interface means for interfacing with an issuer cardmanagement system.

In one embodiment the network interface comprises means forcommunicating over Transfer Control Protocol/Internet Protocol(“TCP/IP”), X.25. Serial, Modem, Systems Network Architecture (“SNA”) orany other communication format.

In a further embodiment the network interface comprises for convertingreceived messages into a general standard data format.

In another embodiment the network interface comprises a communicationheader module for converting received messages into a standardized datasequence of bytes.

In one embodiment the card management system interface comprises aprotocol header module comprising means for converting a standardizedsequence of bytes received from the network interface into an internalformat for processing.

In another embodiment the card management system interface comprises aprotocol header module comprising means for converting a standardizedsequence of bytes received from a communications header module into aninternal format for processing.

In a further embodiment the communication header and the protocol headermodules comprise means for sequentially checking for, receiving,converting and routing messages and data.

In one embodiment the communication header and protocol header modulescomprise means for routing transaction requests and responses betweenthe card payment network and card management system.

In one embodiment the authorization means comprises means for updatingthe rules database in real time.

In another embodiment the authorization means comprises means forautomatically transmitting a notification to a fraud manager if apossible fraud is detected.

In a further embodiment the setup means comprises means forautomatically transmitting a notification to a customer if a possiblefraud is detected.

In one embodiment the authorization means comprises means forautomatically transmitting a notification to a customer if anauthorization request is rejected.

In another embodiment the authorization means comprises means forautomatically transmitting a notification to a customer if a request isauthorized, allowing a customer to maintain a local log of authorizedrequests.

In a further embodiment the setup means comprises means for controllingcustomer activation of a card.

In one embodiment said controlling means comprises an on-line bankinginterface.

In another embodiment said controlling means comprises an AutomatedTeller Machine (“ATM”) interface.

In a further embodiment the authorization means comprises means forreceiving a cardholder request that a card be deactivated.

In one embodiment said means comprises means for receiving a ShortMessage Service (“SMS”) from a cardholder.

According to another aspect of the invention, there is provided atransaction processing method carried by a verification system, andcomprising the steps of:

-   -   (i) receiving a transaction condition associated with a        customer;    -   (ii) writing said condition to a condition database also storing        conditions associated with other customers;    -   (iii) receiving a transaction authorization request from a        transaction network;    -   (iv) processing said received authorization request by        dynamically retrieving a condition associated with the customer        of the authorization request on a per transaction basis;    -   (v) applying said condition and determining from the        authorization request data if the requested transaction should        be approved or denied.

BRIEF DESCRIPTION OF THE DRAWINGS

The invention will be more clearly understood from (he followingdescription of some embodiments thereof, given by way of example onlywith reference to the accompanying drawings in which:

FIG. 1 is a flow diagram illustrating signal transfers for transactionprocessing of the invention;

FIGS. 2( a), 2(b) and 2(o) are block diagrams illustrating alternativearrangements for connecting the components of a verification system ofthe invention:

FIG. 3 is a diagram showing interaction between a front end system and acard management system;

FIGS. 4, 5, and 6 are flow diagrams showing signaling at a lower level;

FIG. 7 is a flow diagram illustrating processing steps in more detail;

FIG. 8 is a diagram illustrating a database object containing templatesand cardholder rules;

FIGS. 9 to 13 are diagrams illustrating interactions between a fraudmanager and a rule database;

FIGS. 14 and 15 are diagrams showing interactions between a fraudmanager and a Web server;

FIGS. 16 to 27 are diagrams showing interaction between people ofvarious roles and systems of the invention; and

FIGS. 28, 29, and 30 are sample screen shots for system displays.

DETAILED DESCRIPTION OF THE PREFERRED EMBODIMENTS

Referring to FIG. 1, in overview, in a step A, a cardholder system 1accesses a banking interface 2 via the Internet, although it mayalternatively be via wireless device, telephone or branch visit. Thebanking interface 2 is operated by an issuing bank of which thecardholder is a customer. The interface 2 is connected to an issuingsystem 3, in turn connected to a verification system 4. The interlace 2allows the cardholder to input rules governing how credit cardtransactions with her card are to be authorized. These rules can be setaccording to a wide variety of parameters such as:

deny if merchant is located outside of Ireland,

deny if the transaction amount exceeds EUR300, or

notify mc by SMS for every transaction greater than EUR100.

The rules are updated to the verification system in a step B, and aremaintained in a rule database. They can be dynamically varied by thecardholder or by issuer personnel such as a fraud manager.

In a step C the cardholder initiates a purchase transaction with hercard, the transaction being handled by a merchant system 5. In a step Dthe merchant system 5 forwards the transaction details to an acquiringsystem 6, which in step E forwards an authorization request to a cardnetwork device 7. In a step F the verification system 4 executes therules created by the cardholder in order to pass on or deny thetransaction. If passed on, the issuing system 3 is updated in a step G,otherwise a deny signal is transmitted in a step H.

It will be appreciated that the systems and method allow the cardholderto be involved in the overall authorization cycle so that usage controlis tailored to his or her requirements.

This opens up other services in addition to effective fraud control. Forexample, a rule may require for an SMS notification to be forwarded to aparent every time a card is used. This allows parents to continuallymonitor and track Usage for parental control arid information purposes.In effect, suitable rules can cause a full audit trail to be generatedin real time, when the information is required and is of most benefit.

We shall refer to the sequence of FIG. 1 as being the ‘authorizationchain’. It can be described as a chain because it consists of theMerchant requesting an authorization from an Acquirer; an Acquirerrequesting an authorization from the network and the network requestingauthorization from the Issuer.

This invention inserts into this chain a device whose function is toimplement Cardholder authorization rules. This device is located at anIssuer's premises or at a remote location and is connected to theIssuer's systems using secure communication means.

FIGS. 2( a), 2(b) and 2(c) show three alternative arrangements forintegrating the verification system into an authorization system. Themain components are the verification system (also referred to as therule processor) 4, the card management (Issuer) system (CMS) 3, andoptionally a front end system (FES) 10.

The function of the rule processor 4 is to decide whether aparticular-request should be passed on to the issuer or declined basedon the processing of system, product and cardholder rules. The ruleprocessor makes this decision by evaluating rules on the authorizationrequest. These rules are read in from a rule database. Three types ofrules can be entered into the rule database:

Rules that Must be Evaluated on Every Authorization Request—‘SystemRules’

Rules that must be evaluated on authorization requests that relate topayment cards that form part of a particular product (“Product Rules”).

Rules that must be evaluated on authorization requests that are forparticular payment cards—‘Cardholder Rules’.

The CMS 3 is the terminal device in the authorization chain.Authorization request responses are generated by this device. The FES 10interfaces with the card payment network and receives authorizationrequests. The rule processor 4 further comprises an SMS/Email gateway 19which allows email SMS, Electronic Message Service (“EMS”), MultimediaMessaging Service (“MMS”) or any other communication format messages tobe sent to the cardholders or received from the cardholders.

Referring to FIG. 2( a) the rule processor 4 is connected between theFES 10 and the CMS 3. The corresponding FIG. 3 illustrates the flow ofrequests in this embodiment. In the normal mode of operation, anauthorization request received from the card payment network moves fromthe FES 10 and into the rule processor 4. The rule processor decideswhether the authorization request is sent on to the CMS 3, or whether anauthorization request response—a decline—is sent back to the networkside device. The system also supports a bypass mode of operation used bydefault if a malfunction or failure is detected in the rule processor.In the bypass mode requests are routed directly from the FES to the CMS.

Referring to FIG. 2( b), in another embodiment the rule processor 4 isinterfaced to the FES 10. In operation, authorization requests from thecard payment network received by the FES 10 are routed to the ruleprocessor 4. The rule processor applies rules to the requests and sendsthem back into the FES which decides whether or not to route them to theCMS 3.

Referring to FIG. 2( c), in another embodiment authorization requestsare accepted from the card payment network into the rule processor 4,where rules are applied to the requests. The rule processor then routespermitted authorization requests to the CMS 3.

The verification system (or rule processor) of the present invention isdesigned to integrate flexibly into existing card management (Issuer)systems, While it is possible to include additional functionality byadding more features to a particular ‘card management system’ becauseeach card management system is different such an approach isproblematic. The verification system is designed to be placed in theauthorization chain as a separate entity within that chain. However, inorder to integrate the verification system into existing card managementsystems significant communications issues must be addressed.

FIGS. 4 to 6 illustrate the communication modules and routing processesof the invention.

IS08583 Is used over many different types of communications media,depending on the equipment that is being used and the preferences of theinstitutions involved. These media include:

TCP/I

X.25

SNA

Serial Line

Modem

Messages that are sent between entities involved in the authorizationprocess are standardized according to the IS08583 standard—“Bank cardoriginated messages—Interchange message specifications-Content forfinancial transactions’. To facilitate connection and integration of theverification system of the invention into an existing authorizationchain a module which converts messages from any particular medium into a“stream of bytes” is used. This module is a CI I (CommunicationsHeader).

Referring to FIG. 4 an IS08583 Message is read by a CM (CommunicationsHeader) from whatever form of communications channel the incomingmessages are arriving on. The message is converted into a sequence ofbytes and passed to a PFI (Protocol Header) module. The CH is a modulethat sends and receives data without regard to the content. Itunderstands and implements the specifics needed to handle connectionsover different media—e.g. TCP/IP, X,25, Serial and Modem. It providescommon functions for the set-up, management and teardown of openconnections. The PH layer converts the message from a specific8583-message implementation into an internal ‘Normalized’ form. Thisform is independent of any vendor specific implementations.

After being processed by a ‘Test Rules’ process of the rule processor(described later) the message is converted from the ‘Normalized’ formback into a specific 8583 implementation via the PH layer, and then issent to its destination via the CH layer.

Referring to FIG. 5 the CH connects to its PH module. It then attemptsto connect to its 8583 source using the specified method (TCP/IP, X.25or Serial). It then checks whether there are any bytes ready to beaccepted from the PH module. If there are no bytes available itimmediately checks whether there are any available from the 8583 source.If there are none, it immediately goes back to check whether there areany bytes available from the PH and proceeds as before.

If there are bytes available from the PH, they are read, and sent to the8583 source, and then checks are made for bytes being available from8583 source and PH as before.

If there are bytes available from the 8583 source, they are read, andsent to the PH, and then checks are made for bytes being available fromthe PH and the 8583 source as before.

IS08583 is a standard that describes the messaging that is used to alloworganizations to exchange messages that relate to ‘Bank Cards’. Thisspecification although complete in many ways is interpreted differentlyby different organizations. The differences relate for example to thespecific meaning of a field, or the choice of field to hold a particularpiece of data or how a particular response is to be interpreted. For theinvention, the implication of this problem is that a message from onesource may differ significantly from a message from another source, notbecause of any difference in the core transaction details, but becauseof differences between the organizations that are feeding thetransactions into the verification system.

Because of this, a technique is presented for converting many knownimplementations of IS08583 into a single generalized format. Examples of8583 protocol implementations include:

Vendor Implementation Description VISA BASE I Visa Credit Cardimplementation MasterCard CIS MasterCard Credit Card implementation BASE24 Host ISO AC1 Credit Card implementation Europay Host EM MasterCardCredit & Debit Card implementation VISA SMS Visa Debit Cardimplementation MasterCard MDS MasterCard Debit Card implementation

Referring to FIG. 6 the PFI initially connects to a Test Rules' processof the rule processor. It then connects to the CH, It checks whetherthere we any bytes available from the CH, If there are not, itimmediately checks whether there are any messages available from theApplication Process. If there are none, it goes back to check for bytesfrom the CH and so on.

If there are bytes available from the CH, they are read and convertedinto a message. At this stage, the message is in the format of a vendorspecific implementation of IS08583. This message is then converted intoa normalized form using transformations that are specific to thisspecific PH. These transformations are very much related to eachvendor's implementation and thus can be arbitrarily complicated. Forexample, a particular field may be broken down in a particular manner bya vendor implementation.

After the normalized message is generated, it is sent to the applicationprocess. The PH then goes back to checking for bytes from the CH.

If a message is available from an application, it is read and convertedto de-normalized form using PH transformations. It is then convertedinto a sequence of bytes and passed to the CH. The PH then goes back tochecking for bytes from the CH.

Referring to FIG. 7 the authorization cycle or “Test Rules” process ofthe rule processor is shown in more detail. The request is generated instep 101. If the number prefix is that of a valid product (step 102) instep 104 system rules are applied. If the rules apply 110, product rulesare applied to the authorization request 105. If not, the systemproceeds to applying files to determine if there is a “decline” 113. Ifthe product rules apply 111, the cardholder rules are applied to theauthorization request 106. If not, the system proceeds to applying rulesto determine if there is a “decline” 113. If the cardholder rules apply112, the system proceeds to applying rules to determine if there is a“decline” 113. If the output is negative in step 113 a decline responseis generated. Otherwise, in step 105 product rules are applied. If theoutput is negative, again a decline response is generated. Otherwise,the Cardholder rules are applied in step 106. Again, this may provide apositive or a negative outcome. If the result of step 113 is notnegative (i.e., positive), the system proceeds to apply rules anddetermine if response is “pass to issuer” 114. If the result is notnegative (i.e., positive), the system proceeds to apply rules anddetermine if response is “advise fraud manager” 115. If the result ispositive, the system proceeds to create a fraud queue item 109. If theprefix is not a valid product 102, the system proceeds to determine ifthe issuer is configured so that transactions are declined 103. If not,the system proceeds to pass to issuer 108.

The three possible outcomes of application of the sequence of three setsof rules are:

decline,

approve and pass to CMS, and

create fraud queue item.

The third outcome causes an item to be added to a fraud queue. In thisembodiment, a decline outcome may cause a message to be sent to theCardholder (steps 116,117,118).

Process Messages According to Defined Rules

The Cardholder can communicate through the Issuer's computer system. TheCardholder communicates with the Issuer's, computer system throughwhatever means the Issuer's computer system supports—e.g. Internet,phone. Wireless Application Protocol (“WAP”). By doing this, theCardholder can enter a set of rules. A rule may be in the form of

IF (Condition) THEN (Action)

Each Condition can be a set of comparisons separated by AND and OR. Eachcomparison compares an authorization request data element with a value.An example of a condition would be:

Amount>“100.00” AND (MerchantCountry=‘IE” OR MerchantCountry=“UK”)

This example condition would apply whenever the transaction amount isgreater than 100 and the Merchant is registered in Ireland or the UK.

Each action is one of three choices-either ‘decline’ or ‘accept’ or‘advise Fraud Manager or advise Cardholder in the event of an automaticconfirmation system being implemented’. The term ‘decline’ means to notsend the request onwards to the CMS, but to send an authorizationrejection back towards the Acquirer. The term ‘accept’ means to send theauthorization request on towards the Issuer. The term ‘advise’ FraudManager’ means to send a message to a Fraud Manager about theauthorization.

In addition to cardholder rules, the Fraud Manager in the issuinginstitution can also enter rules. These rules can be entered at threelevels. The first of these is the set of rules that are run for everytransaction that passes through the system—these are termed ‘system’rules. The second of these is the set of rules that are run for each‘product’ that the issuing institution markets. A product in this senseis a set of credit card number ranges that are grouped together. Thethird of these is (he set of ‘template rules’ for a particular product.These are pre-written rules that a Cardholder who has a card fromparticular product can ‘opt into’ without having to write the rulethemselves.

The invention allows complex rules to be built and enables them to beexecuted in a very time-efficient manner by using template rules.

Each template is built in response to Fraud Manager inputs by the FraudManager and is given an index number (#1, #2, . . . ). Each templatecomprises a set of empty placeholders for up to ten conditions. Eachcondition comprises the following:

Template index Number Unique identifier for this template. Field NumberNumber of field in message E.g. ‘Ficld32 could be Merchant Country'Relational Operator Relational operator to apply to field E.g. -‘equals‘/’docs not equals ‘/’’ is less than ‘/’is greater than’ ValueValue to compare against Logical Operator Operator to use with nextcondition E.g. - ‘AND’/‘OR’

Also associated with each template is an ‘Action’. This is the action tocondition evaluates to ‘True’. Each action is composed of the followingelements:

Event Event that should take place E.g. - ‘Decline’/‘Approve’/‘Advise’Direction Direction to send message E.g. - ‘Forward’/‘Back’ ResponseValue to set in ‘Response Code’ field of message. Code E.g. - ‘01 -refer to Card Issuer’

Each template also includes ‘Notification’ fields. These fields indicatewhether an Email or SMS notification should be sent if the conditionabove evaluates to ‘True’.

Cardholder Rules

Each cardholder rule comprises a reference to a template and anyinformation required by that template. Accordingly, the fields involvedare:

Card Number The unique number of the card Template The number of thetemplate to which this rule refers. Parameter1 If any conditions forthis template require a parameter (e.g. Template condition is ′Amount >User_Specified_Amount), the first of these parameters is stored here.Parameter2 As Parameter1 above. SMS Address SMS Address of thiscardholder if required, Email Address Email Address of this cardholderif required, Sequence Sequence in which the rules associated with thiscardholder should be executed.

All of the cardholder rules in the system are stored in the systemdatabase and are indexed and clustered on card number.

Real Time—not Batch

The invention allows Cardholders and Fraud Managers to view and modifyrules while, at the same time, processing authorization transactionsusing these rules. Updates to the rules can be made in real time withthe effect of such a change being immediate.

In order to allow this to occur, ‘database transactions’ are defined forthe purposes of reading and updating the table in which rules arestored. The purpose of these transactions is to allow updates to rulesto occur in the moments between one authorization transaction and thenext.

Processing Efficiency

The processing efficiency of the system is based upon the time taken toread all rules related to a particular card out of the database and thetime taken to computationally apply the rules to the transaction inhand.

Having cardholder rules refer to templates rather than exist in astandalone manner makes each cardholder rule very small (<100 bytes).This means that a minimal amount of disk space will be used per rule,and so more rules can be read per database read.

By clustering the cardholder rules within the database on Card Number,all rules related to a particular Cardholder can be read in one diskread by the database.

By allowing templates to have specific placeholders for conditions,values and logical operators there is no requirement for the normalparsing of logical string-based expressions. Processing can proceedwithout the need for intensive string parsing.

Referring to FIG. 8, an example of a database object containing twotemplates and two sets of Cardholder rules is illustrated.

Template #1 contains the rule:

IF (Field32=‘Africa’ OR Field32=‘Asia’ OR Field32=‘Australia’) THEN SentDecline Back with Response Code 2 Send SMS and Email to Cardholder

Template #2 contains the rule:

IF (Field41.2=‘20’ OR Field41.2=‘20) THEN Send Decline Back withResponse Code 2 Cardholder Rules for card ‘ 1234123412341234’: IF (CardNumber is ‘1234123412341234’) Apply Template 1 with no parameters, andSMS Address 0872337868 and Email Address joebioggs@aol.com ApplyTemplate 2 with no parameters, and no SMS Address and no Email AddressCardholder Rules for card ‘9999999999999999’; IF (Card Number is‘9999999999999999’) Apply Template 1 with no parameters, and SMS Address0872337868 and Email Address joebloggs@aol.com Figs. 9 to 25 illustratehow Issuer Personnel and Cardholders interact with the rule processor.

Users of the system are as follows:

User Role Cardholder The Cardholder is a person who holds a credit card,which has been issued by the Issuer, The invention primarily allows theCardholder to add rules that control how his/her card is used. Fraud TheFraud Manager is an employee of the Issuer, The Manager invention allowsthis person to add rules to particular control how particular creditcard products operate. This can be done in order to reduce Fraud, or inorder to create new types of credit card products with differentoperating profiles. CSR The Customer Service Representatives answerqueries from Cardholders. The invention allows CSRs to perform all ofthe tasks that a Cardholder can perform. Also, the CSR is able to viewdetails on the authorization requests and responses for particular cardsover given time periods. Technical The Technical Operator is responsiblefor starting and Operator stopping the system, editing database data,applying new configuration data to the system and checking the status ofthe system. Auditor The Auditor is allowed see, at a great level ofdetail the decisions being made by the system, and is able to tracethese decisions back to individual messages and rules.

The Fraud Manager is that person in the Issuing Institution whosefunction is to track and minimize the incidence of fraud in theinstitution. This person and the Cardholder are the prime users of thesystem 4. The Fraud Manager configures the system 4 according to theneeds of the Issuer. FIGS. 9 to 15 illustrate some interactions of theFraud Manager with the system.

Fraud Manager Adds or Modifies Products (FIG. 9)

The Fraud Manager must define those products that the Issuer uses. Aproduct is a set of credit cards that a Fraud Manager wishes to view asa single entity for the purpose of applying rules to them. These may infact be individual products that the Issuer offers its customers (e.g.Standard Card, Gold Card, Platinum Card,) or they may be collections orsubsets of same.

Fraud Manager Adds or Modifies BIN (FIG. 10)

Each Issuer has a set of allocated credit card number prefixes (BankIdentifier Numbers or ‘BIN’s). In the natural course of events, itdivides these up between the products that it creates. For instance, itmight create a student credit card product, a normal credit card productand a gold credit card product. These products, and their associatedBIN's are entered into the system as part of the product definitions.

Fraud Manager Modifies System or Product or Template Rules (FIG. 11)

The Fraud Manager can add rules to the system 4 of types ‘System’,‘Product’ or ‘Template’. Rules lie at the core of the system 4 and arein three types. Each rule type is applied in the following order to eachauthorization request message:

System Rules are applied to all messages arriving from the network.

Product Rules are applied to all messages in particular BIN rangesarriving from Network.

Cardholder roles are applied to all messages that relate to a particularcredit card number. A Cardholder rule can be created in one of two ways:

It can be created by the Fraud Manager as a template role, and can thenbe opted into by the cardholder. For example, the Fraud Manager mightcreate a template rule that defines how to reject a transaction if theMerchant is not a European merchant. A Cardholder might then be askedwhether they wanted to ‘switch on’ this rule on their card. If theydecide to, a new rule is generated for them, based on the template rule.

The Cardholder can generate it directly.

Fraud Manager Modifies Rule Sequence (FIG. 12)

The order of execution within each set of rules (system, product andcardholder) can be modified by the Fraud Manager as required.

Fraud Manager Views Cardholder Rules (FIG. 13)

The Fraud Manager can view but not modify Cardholder rules. A “PAN”, isthe industry term for a credit card number (“Primary Account Number”).

Fraud Manager Reviews Fraud Queue and Acknowledges an Item (FIG. 14)

A fraud queue is a queue of issues that Fraud Managers go through on aregular basis. These issues are those items that have matched ruleswhose action was ‘Advise Fraud Manager’ or ‘Decline’. Each item on thefraud queue has to be acknowledged by a Fraud Manager. Several differentFraud Managers can be looking at the fraud queue and acknowledging itemsat the same time.

Fraud Manager Requests Report (FIG. 15)

The Fraud Manager can get various reports from the system 4. These canrelate to fraud queue, activated rules, tracked rules, active rules, andsuspended rules.

Fraud Manager Sets Up System Options (FIG. 16)

There are various system settings that the Fraud Manager needs to setup, These settings are global, i.e. in that they apply to all products.

Monitor only without declining

Archival Options—when to archive and how old items must be before they,are archived.

FIGS. 16 and 17 illustrate how a cardholder can interact with thesystem. The Cardholders can enter rules themselves. One way that theycan do this is by choosing to have a particular rule from a templateenabled. The list of templates available to a Cardholder whose paymentcard is part of a particular’ product might be:

Deny Access Outside Ireland

Deny Access Outside Europe

Deny Access Outside Europe and US

Deny Access to Internet Merchants

Deny All Transactions unless Specified

Deny All Internet Transactions unless Specified

Allow One-Time Transaction for (£50, £100, English Pound, 500, £1000)

Alternatively, the Cardholder can define a Rule from scratch in the sameway that the Fraud Manager defines one.

Cardholder Requests List of Templates Available for Credit Card Number,and adds One (FIG. 16)

The invention provides the interface to the Issuer's online bankingsystem. This interlace is web-based, although it is not expected thatthe web interface is delivered directly to the Cardholder. Rather, it isexpected that the web-based interface is driven by the Issuer's computersystems. Here a list of template rules is provided, from which theCardholder can add one or more for their particular credit card.

Cardholder Requests List of Current Rules for Cardholder and Can DeleteOne (FIG. 17)

Referring to FIG. 17, the Cardholder requests a list of current rulesavailable and selects the option to delete one. The Cardholder requeststhe set of rules that are set up for a particular Personal AccountNumber (“PAN”). The Cardholder can then optionally delete one of theserules.

The Cardholder generates a new rule rather than choosing from a list ofpre-defined template rules and applies this rule to the credit card.

As shown in FIG. 18 the system supports access by a Customer ServiceRepresentative. The Issuer's CSR (Customer Service Representative) canperform all functions that a Cardholder can perform as well as oneother. The same interface is used for CSR functions as is provided forCardholder functions, It is expected that an Issuer's existing CSRapplication will be integrated to allow this extra functionality.

Referring to FIG. 18, the CSR can see logged activity for a credit cardnumber over a time range. The CSR can look into a particular item andsee the underlying message if available.

Functional Requirement-Allow Auditor to Verify Integrity of System

The Issuer's auditors—internal and external—must be able to see how andwhy the software functions in the way that it does. The overallfunctionality of the system is to allow Issuers and Cardholders toselectively decline transactions, so the reason for a transaction eitherbeing declined or not has to be clear to an Auditor.

Auditor Views Transaction Log (FIG. 19) The Auditor can look into thetransaction log to see the detail of the processing of the system.

Auditor Examines One Particular Set of Rules in Detail (FIG. 20)

The Auditor can enable rule tracking, which enables the Auditor to trackall of the decisions relating to a particular rule. When rule trackingis switched on the Auditor will see each condition being tested and theresult of the test.

Functional Requirement—Allow Technical Team to Control and ConfigureSystem

The Technical Operator has the job of configuring the system for use,and maintaining it thereafter. Most of this configuration resides in thedatabase. However, it would be inefficient for the processing nodes tohave to read their own configuration from the database. Instead theirconfiguration is loaded into a local database on each processing node.This means that there is a requirement for parts of the database to beloaded into the local database on each processing node by the TechnicalOperator.

Technical Operator Modifies Database Through Web Browser (FIG. 21)

The Technical Operator can modify ail tables in the database through aweb browser.

Technical Operator Starts/Stops Processing Nodes (FIG. 22)

The Technical Operator uses an application to allow the starting andstopping of each processing node 15.

Technical Operator Sends New Configuration to the Processing Nodes (FIG.23)

The technical operator must instruct the processing nodes to begin usingthe new registry that they have been sent. This is achieved with thisuse case.

Technical Operator Triggers the Processing Nodes to Begin Using a NewConfiguration (FIG. 24)

The technical operator must instinct the processing nodes to begin usingthe new registry that they have been sent. This is achieved with thisuse case.

O&M Node Checks Status of Processing Nodes (FIG. 25)

The O&M Node sends a status request message once every 10 seconds toeach O&M node. The O&M node replies with a response, and on the basis ofthis, the O&M Node database entry is updated.

Functional Requirement—Perform All System Maintenance FunctionsAutomatically

At the end of each period (such as a day), the system 4 must run severalprocedures automatically.

Database is Backed up (FIG. 26)

The database is backed up to tape on a nightly basis.

Database is Restored (FIG. 27)

The data on tape can be restored into the database.

The system 4 generates a large number of messages and logged items.These objects are taken out of the database after they have been therefor a period of lime in order to prevent the database from growing toolarge. Over time, the expired rules (rules that are past, the end oftheir stop date) must be archived. Management information (MIS) reportsare run from a different database server. Entities relevant to MISreports are copied into a separate database.

Fraud Alarm/Rejection Alarm/Authorization Confirmation

This invention allows notifications (SMS/email) that are sent tocardholders to serve different functions:

They can be configured to act as a ‘Fraud Alarm’

Rules are set within the rule processor to prevent fraud. When a ruleinfringement and possible fraud is detected, a fraud alarm can betriggered and a notification sent to the cardholder in order to alertthem of possible fraud.

They can be configured to act as a ‘Rejection Alarm’

A notification can be sent to alert the cardholder about a transactionthat has been declined for a reason other than the infringement of arule. For instance, if the card management system decides that aparticular transaction would push a cardholder over their credit limit,it normally does this silently. However, the invention can be configuredto see this rejection and to send a message to the cardholder informingthem of the rejection.

They can be configured to act as an ‘Authorization Confirmation’

A notification can be sent to a cardholder whenever a transaction isapproved. A cardholder may wish to use this feature to maintain an emaillog of all transactions on a card.

The invention can be configured to see all approvals and to send amessage to the cardholder informing them of the approval.

Card Activation

Much credit card fraud exists in the form of “Mail Fraud”. This fraudoccurs when a fraudster intercepts a latter containing a credit card,which is on the way to a cardholder.

In order to eliminate this form of fraud, the system 4 can establishrules denying the use of each recently issued credit card until anactivation event occurs. This activation event can have a number offorms:

The cardholder goes to an ATM machine and enters the new card followedby the allocated Personal Identification Number (“PIN”). A transactionis then sent to the issuing bank from the ATM. This transaction isspecially formatted to that when the transaction goes through to theprocessor of the invention, the processor deactivates the rule that isdenying the card use. The card is thus “Activated”.

Alternatively the cardholder, could use his/her computer to access andswitch off the rule that is denying the card's use. The card can be thusactivated.

Online-Banking Access

The invention allows rules to be accessed by Cardholders through anonline banking platform. The online banking platform is responsible forconstruction of credit card management web page. The online bankingplatform calls the verification system in order construct the requiredweb page.

The verification system of the invention provides four services to theonline banking platform to aid it in constructing the card managementweb page:

List all rules that a Cardholder can switch on,

Display all rules that a Cardholder can switch off.

Switch a rule on.

Switch a rule off.

Referring to FIG. 28, a screen of the interface 2 is shown, the screenshown is an example of a basic rule activation screen. The customer canaccess this screen through their online banking channel, at an ATM, orthrough a customer representative. This basic rule activation is part ofthe existing renewal or registration process. For example the Issuer mayinform the Cardholder that their card will not operate in a specificgeographic region that may be sensitive to fraud unless the Cardholderinforms them to the contrary by telephone or online that there arespecific countries that they wish to “turn on”.

In another application, as shown in FIG. 29, a customer segment uses theverification system through the card product they have chosen to usei.e. where the card product has predetermined parameters e.g.transaction type or geographic set to Issuer determined defaults whenthe card is issued but changed by the Cardholder to suit their ownparticular requirements whether it is security or control they areconcerned about.

These products are designed for Cardholders who may wish to have moreactive participation in how a card is used, for example, an ancillarycard issued by a parent to a child where the parent wishes to controlhow, where and when the card is used by the child. FIG. 29 illustratesan example of a parent controlled teenager card and how the verificationsystem enhances the security and control for the parent.

The card product design of this particular customer segment would bedriven by specific customer needs for credit control and security. Anexample of this would be a corporate Card Manager as detailed in FIG.30. Designed for the corporate market where a financial controller mayWish to centrally control the individual usage profiles of the company'spayment card base using rules similar to previous examples. Rules couldalso exclude specific merchants or alternatively may allow the card tobe used only at specific merchants i.e. as a controlled purchasing card.

Transaction rules form an important part of the operation of cardmanagement systems by card issuers. These are rules that are usuallyapplied at either a system level i.e. a rule that will apply to allcards issued by that institution or at a product level i.e. a rule thatwill apply to a particular card product such as a Gold Card. An exampleof a rule might be to deny or refer all transactions from a country thatis deemed to be a particular hotspot for card fraud.

It will be appreciated that the invention allows the cardholder tocontrol what happens in the authorization process via the establishmentof a rule set that will apply to all cardholder's transaction. Thecardholder can remotely create, delete or amend rules e.g. throughonline banking channels. In addition the invention at the Issuersdiscretion allows for the cardholder to be alerted in real-time of arule infringement thus alerting him to potential misuse of their paymentcard and allows them to respond automatically to this alert in real-timeto confirm their authenticity thus allowing the transaction to proceed.

It is expected that the invention will reduce and displace the incidenceof fraud in payment card networks. It effectively helps manage the riskof card fraud. The system can be used as a complementary technology andas such the card Issuers can implement it as another line of defense inthe fight against fraud.

The invention is not limited to the embodiments described but may bevaried in construction and detail.

1. A system for processing requests to authorize financial transactions,comprising: a receiver configured to receive authorization requests frommerchants for financial transactions on payment cards; a databaseconfigured to store a plurality of cardholder rules, wherein eachcardholder rule, from the plurality of cardholder rules, is associatedwith at least one payment card of a customer; a processor configured toidentify a positive or negative authorization response based on thereceived authorization requests, the processor comprising: (i) a setupmodule configured to: select a template, from a plurality of pre-definedtemplates, wherein each template, from the plurality of templates,specifies at least one action; receive information to populate theselected template to generate at least one cardholder rule; andassociate the at least one cardholder rule with a payment card of acustomer; (ii) an authorization module configured to dynamicallyretrieve the at least one cardholder rule associated with a payment cardof a customer of each received authorization request on aper-transaction basis, for applying the retrieved at least onecardholder rule to the corresponding authorization request, and forimplementing the action specified by the selected template; and atransmitter configured to transmit the identified positive or negativeauthorization response.
 2. The system of claim 1, wherein the databaseis configured to store system rules which apply to all transactions andproduct rules which apply to groups of payment cards, the database isconfigured to index stored cardholder rules based on an associatedpayment card number, and the authorization module is further configuredto retrieve the system rules and the product rules and to successivelyapply the system, product, and cardholder rules upon the receipt of anauthorization request.
 3. The system of claim 1, wherein the setupmodule is further configured to enable a user to define a template. 4.The system of claim 1, wherein the plurality of cardholder rules arestored in a format which does not require parsing of logicalstring-based expressions for processing.
 5. The system of claim 1,wherein the authorization module is further configured to receiveconfirmation of authorization from a customer in response to anotification.
 6. The system of claim 1, further comprising: a networkinterface for a card payment network; and a card management systeminterface for an issuer card management system.
 7. The system of claim5, wherein the network interface and the card management systeminterface each include a communication header module configured toconvert received messages into a standardized data sequence of bytes. 8.The system of claim 6, wherein the network interface and the cardmanagement system interface each include a protocol header moduleconfigured to convert the standardized data sequence of bytes into aninternal format for processing.
 9. The system of claim 7, wherein thecommunication header module and the protocol header module are furtherconfigured to sequentially check for, receive, convert, and routemessages and data.
 10. The system of claim 7, wherein the communicationheader module and the protocol header module are further configured toroute transaction requests and responses between the card paymentnetwork and the issuer card management system.
 11. The system of claimI, wherein the transmitter is further configured to transmit at leastone of (i) a notification to at least one of a user or a correspondingcustomer once a possible fraud is detected and (ii) an authorizationresponse to the corresponding customer.
 12. The system of claim I,wherein the setup module is further configured to provide at least oneof an online banking interface and an automated teller machineinterface.
 13. The system of claim 1, wherein the receiver is furtherconfigured to receive a customer request that a payment card bedeactivated.
 14. The system of claim 1, wherein the receiver is furtherconfigured to receive a short message service (SMS) message from acustomer to deactivate a payment card.
 15. A method for processingrequests to authorize financial transactions, comprising: storing, in adatabase, a plurality of cardholder rules, wherein each cardholder rule,from the plurality of cardholder rules, is associated with at least onepayment card of a customer; selecting a template, from a plurality ofpre-defined templates, wherein each template, from the plurality ofpre-defined templates, specifies at least one action; populating thetemplate with information to generate at least one cardholder rule,receiving, by a receiving device, authorization requests from merchantsfor financial transactions on payment cards; identifying, by aprocessor, positive or negative authorization responses based onreceived authorization requests by (i) dynamically retrieving the atleast one cardholder rule associated with a payment card of a customerof each received authorization request on a per-transaction basis, (ii)applying the retrieved at least one cardholder rule to the correspondingauthorization request, and (iii) implementing the action specified bythe selected template; and transmitting, by a transmitting device, theidentified positive or negative authorization response.
 16. The methodof claim 15, further comprising: storing, in the database, system ruleswhich apply to all transactions and product rules which apply to groupsof cards, indexing, in the database, stored cardholder rules based on anassociated payment card number, retrieving the system rules and theproduct rules, and successively applying the system, product, andcardholder rules upon the receipt of an authorization request.
 17. Thesystem of claim 15, wherein selecting a template includes the definingof a template by a user.
 18. The method of claim 15, further comprisingstoring the cardholder rules in a format which does not require parsingof logical string-based expressions for processing.
 19. The method ofclaim 15, further comprising receiving confirmation of authorizationfrom a customer in response to a notification.
 20. The method of claim15, further comprising: interfacing, by a network interface, a cardpayment network, and interfacing, by a card management system, an issuercard management system.
 21. The method of claim 20, further comprisingconverting received messages into a standardized data sequence of bytes.22. The method of claim 21, further comprising converting thestandardized data sequence of bytes into an internal format forprocessing.
 23. The method of claim 20, further comprising routingtransaction requests and responses between the card payment network andthe issuer card management system.
 24. The method of claim 20, furthercomprising transmitting at least one of (i) a notification to at leastone of a user or a corresponding customer once a possible fraud isdetected and (ii) an authorization response to the correspondingcustomer.
 25. The method of claim 20, further comprising providing atleast one of an online banking interface and an automated teller machineinterface.
 26. The method of claim 20, further comprising receiving acustomer request that a payment card be deactivated.
 27. The method ofclaim 20, further comprising receiving a short message service (SMS)message from a customer to deactivate a payment card.
 28. Anon-transitory computer readable storage medium encoded withinstructions that, when executed by a computer, cause the computer toexecute the steps of: selecting a template, from a plurality ofpredefined templates, wherein each template, from the plurality ofpredefined templates, specifies at least one action; populating thetemplate with information to generate at least one cardholder rule;associating the at least one cardholder rule with a payment card of acustomer; dynamically retrieving, on a per-transaction basis, the atleast one cardholder rule associated with a payment card of a customerof authorization requests received from a merchant; applying theretrieved at least one cardholder rule to a corresponding authorizationrequest; implementing the action specified by the selected template; andtransmitting, by a transmitting device, an identified positive ornegative authorization response.