Search

US-12625703-B2 - Multi-card processor access framework

US12625703B2US 12625703 B2US12625703 B2US 12625703B2US-12625703-B2

Abstract

A supplemental computing system can provide card services while saving processing power of a data center for other tasks. For example, the supplemental computing system described herein can include a processor and a memory that includes instructions that are executable by the processor to perform operations. The operations can include receiving a first subset of card requests. The operations can further include performing at least one servicing task to a card request resulting in an altered card request. Additionally, the operations can include selecting, for each altered card request in the first subset, a secondary card processor from at least one secondary card processor. The operations can also include transforming the altered card request into a secondary card processor specific card request suitable for the selected secondary card processor. The operations can include submitting the secondary card processor specific card request to the selected secondary card processor.

Inventors

  • Naga Mrudula Kalyani Chitturi
  • Glenn S. Bruce
  • Manikandan Dhanabalan
  • Gopinath Rajagopal
  • Harish Dindi
  • Vijay Srinivasan
  • Jay Poole

Assignees

  • TRUIST BANK

Dates

Publication Date
20260512
Application Date
20241017

Claims (20)

  1. 1 . A computing system communicatively coupled with a data center, the computing system comprising: a processor; and a memory that includes instructions executable by the processor to perform operations comprising: receiving a first subset of card requests, the first subset of card requests configured to be routed by the data center that is communicatively coupled with a primary card processor and at least one secondary card processor; for each card request in the first subset, performing at least one servicing task to the card request in the first subset resulting in an altered card request in the first subset; for each altered card request in the first subset, selecting a secondary card processor from the at least one secondary card processor, each secondary card processor of the at least one secondary card processor being a different type of card processor than the primary card processor; transforming the altered card request of the first subset into a secondary card processor specific card request suitable for the selected secondary card processor; and submitting the secondary card processor specific card request to the selected secondary card processor.
  2. 2 . The computing system of claim 1 , wherein the data center comprises: a second processor; and a second memory that includes instructions executable by the second processor to perform operations comprising: transmitting the first subset of card requests to the computing system; for each card request in a second subset of card requests, performing at least one servicing task to the card request in the second subset resulting in an altered card request in the second subset; for each altered card request in the second subset, selecting the primary card processor from a plurality of primary card processors; transforming the altered card request of the second subset into a card processor specific card request suitable for the selected primary card processor; and submitting the card processor specific card request to the selected primary card processor.
  3. 3 . The computing system of claim 2 , wherein the plurality of primary card processors comprises two primary card processors, and wherein the at least one secondary card processor comprises one secondary card processor.
  4. 4 . The system of claim 1 , wherein the operation of performing the at least one servicing task to the card request in the first subset comprises checking to see if the card request is a fraudulent access card request, and wherein the operation of performing the at least one servicing task to the card request in the first subset further comprises determining a location of origin and a timestamp for the card request.
  5. 5 . The system of claim 4 , wherein the operation of checking to see if the card request in the first subset is a fraudulent card request comprises comparing the location of origin and the timestamp for the card request to locations of origin and timestamps of other recent card requests associated with a card.
  6. 6 . The system of claim 1 , wherein the operation of performing the at least one servicing task to the card request in the first subset comprises determining that a user account associated with the card request meets a minimum criterion for completion of an access card request.
  7. 7 . The system of claim 1 , wherein the operations performable by the system are configured to meet card community standards.
  8. 8 . A computer-implemented method comprising: receiving a first subset of card requests, the first subset of card requests configured to be routed by the data center that is communicatively coupled with a primary card processor and at least one secondary card processor; for each card request in the first subset, performing at least one servicing task to the card request in the first subset resulting in an altered card request in the first subset; for each altered card request in the first subset, selecting a secondary card processor from at least one secondary card processor, each secondary card processor of the at least one secondary card processor being a different type of card processor than the primary card processor; transforming the altered card request of the first subset into a secondary card processor specific card request suitable for the selected secondary card processor; and submitting the secondary card processor specific card request to the selected secondary card processor.
  9. 9 . The computer-implemented method of claim 8 , further comprising: transmitting the first subset of card requests to a computing system; for each card request in a second subset of card requests, performing at least one servicing task to the card request in the second subset resulting in an altered card request in the second subset; for each altered card request in the second subset, selecting the primary card processor from a plurality of primary card processors; transforming the altered card request of the second subset into a card processor specific card request suitable for the selected primary card processor; and submitting the card processor specific card request to the selected primary card processor.
  10. 10 . The computer-implemented method of claim 9 , wherein the plurality of primary card processors comprises two primary card processors, and wherein the at least one secondary card processor comprises one secondary card processor.
  11. 11 . The computer-implemented method of claim 8 , wherein performing the at least one servicing task to the card request in the first subset comprises checking to see if the card request is a fraudulent access card request, and wherein performing the at least one servicing task to the card request in the first subset further comprises determining a location of origin and a timestamp for the card request.
  12. 12 . The computer-implemented method of claim 11 , wherein checking to see if the card request in the first subset is a fraudulent card request comprises comparing the location of origin and the timestamp for the card request to locations of origin and timestamps of other recent card requests associated with a card.
  13. 13 . The computer-implemented method of claim 8 , wherein performing the at least one servicing task to the card request in the first subset comprises determining that a user account associated with the card request meets a minimum criterion for completion of an access card request.
  14. 14 . The computer-implemented method of claim 8 , wherein performing the at least one servicing task to the card request comprises performing the at least one servicing task while meeting card community standards.
  15. 15 . A non-transitory computer-readable medium comprising instructions executable by a processor to cause the processor to perform operations comprising: receiving a first subset of card requests, the first subset of card requests configured to be routed by the data center that is communicatively coupled with a primary card processor and at least one secondary card processor; for each card request in the first subset, performing at least one servicing task to the card request in the first subset resulting in an altered card request in the first subset; for each altered card request in the first subset, selecting a secondary card processor from at least one secondary card processor, each secondary card processor of the at least one secondary card processor being a different type of card processor than the primary card processor; transforming the altered card request of the first subset into a secondary card processor specific card request suitable for the selected secondary card processor; and submitting the secondary card processor specific card request to the selected secondary card processor.
  16. 16 . The non-transitory computer-readable medium of claim 15 , wherein the operations further comprise: transmitting the first subset of card requests to a computing system; for each card request in a second subset of card requests, performing at least one servicing task to the card request in the second subset resulting in an altered card request in the second subset; for each altered card request in the second subset, selecting the primary card processor from a plurality of primary card processors; transforming the altered card request of the second subset into a card processor specific card request suitable for the selected primary card processor; and submitting the card processor specific card request to the selected primary card processor.
  17. 17 . The non-transitory computer-readable medium of claim 16 , wherein the plurality of primary card processors comprises two primary card processors, and wherein the at least one secondary card processor comprises one secondary card processor.
  18. 18 . The non-transitory computer-readable medium of claim 15 , wherein the operation of performing the at least one servicing task to the card request in the first subset comprises checking to see if the card request is a fraudulent access card request, wherein the operation of performing the at least one servicing task to the card request in the first subset further comprises determining a location of origin and a timestamp for the card request, wherein the operation of checking to see if the card request in the first subset is a fraudulent card request comprises comparing the location of origin and the timestamp for the card request to locations of origin and timestamps of other recent card requests associated with a card.
  19. 19 . The non-transitory computer-readable medium of claim 18 , wherein the operation of performing the at least one servicing task to the card request in the first subset comprises determining that a user account associated with the card request meets a minimum criterion for completion of an access card request.
  20. 20 . The non-transitory computer-readable medium of claim 15 , wherein the operation of performing the at least one servicing task to the card request comprises determining that a user account associated with the card request meets a minimum criterion for completion of the card request.

Description

CROSS-REFERENCE TO RELATED APPLICATIONS The present application is a continuation of U.S. patent application Ser. No. 18/364,971, filed Aug. 3, 2023, titled “MULTI-CARD PROCESSOR ACCESS FRAMEWORK”, the entirety of which is incorporated herein by reference. TECHNICAL FIELD The present disclosure relates generally to card processing and, more particularly (although not necessarily exclusively), to a framework for handling multiple types of card processors. BACKGROUND Data centers can transmit and service card events for multiple card processors. Data centers can be designed to service card requests with the multiple card processors. There can be a limit to an amount and types of card processors with multiple processors that a data center can process before resources of the data center become limited. SUMMARY A data center can be assisted in servicing multiple card processors. For example, a system described herein can include a data center. The data center can include a processor and a memory. The memory can include instructions executable by the processor to perform operations. The operations can include transmitting a first subset of card requests to a supplemental computing system. For each card request in a second subset of card requests, the operations can also include performing at least one servicing task to the card request in the second subset resulting in an altered card request in the second subset. For each altered card request in the second subset, the operations can further include selecting a primary card processor from a group of primary card processors. Additionally, the operations can include transforming the altered card request of the second subset into a card processor specific card request suitable for the selected primary card processor. The operations can also include submitting the card processor specific card request to the selected card processor. The system can also include a supplemental computing system. The supplemental computing system can include a supplemental processor and supplemental memory. The supplemental memory can include instructions that are executable by the supplemental processor to perform supplemental operations. The supplemental operations can include receiving the first subset of card requests. For each card request in the first subset, the supplemental operations can include performing at least one servicing task to the card request in the first subset, resulting in an altered card request in the first subset. For each altered card request in the first subset, the supplemental operations can further include selecting a secondary card processor from at least one secondary card processor. Each secondary card processor can be a different type of card processor than any of the primary card processors. Additionally, the supplemental operations can include transforming the altered card request of the first subset into a secondary card processor specific card request suitable for the selected secondary card processor. The supplemental operations can also include submitting the secondary card processor specific card request to the selected secondary card processor. In another example, a computer-implemented method can include receiving a first subset of card requests. The computer-implemented method can also include performing, while saving processing power of a data center for other tasks, for each card request in the first subset, at least one servicing task to a card request resulting in an altered card request. Additionally, the computer-implemented method can include selecting, for each altered card request in the first subset, a secondary card processor from at least one secondary card processor. Each secondary card processor can be a different type of card processor than any primary card processor in a group of primary card processors. The computer-implemented method can further include transforming the altered card request into a secondary card processor specific card request suitable for the selected secondary card processor. The computer-implemented method can also include submitting the secondary card processor specific card request to the selected card processor. In another example, a supplemental computing system described herein can include a processor and a memory. The memory can include instructions that are executable by the processor to perform operations. The operations can include receiving a first subset of card requests. The operations can further include performing, while saving processing power of a data center for other tasks, for each card request in the first subset, at least one servicing task to a card request resulting in an altered card request. Additionally, the operations can include selecting, for each altered card request in the first subset, a secondary card processor from at least one secondary card processor. Each secondary card processor can be a different type of card processor than any primary card processor in a group of prim