US-12626236-B2 - Computer-implemented method for data processing in a filtered spend program
Abstract
Systems and methods are disclosed for data processing, data verification, and categorization of items. The method includes receiving a request from a first sub-system, wherein the request includes a plurality of data associated with an access device. Determining the first sub-system and/or the access device has the authorization to access a service. Determining contextual data of one or more purses associated with the access device and/or status of the first sub-system, wherein the contextual data includes an expiration date and/or rules associated with the one or more purses. Transmitting the request to a second sub-system based on the contextual data and/or the status of the first sub-system for categorizing one or more items associated with the request into one or more categories. Executing the request based on one or more categories.
Inventors
- Joyce BRENNAN
- James BATTS
Assignees
- FIDELITY INFORMATION SERVICES, LLC
Dates
- Publication Date
- 20260512
- Application Date
- 20230814
Claims (18)
- 1 . A system comprising: one or more processors; and at least one non-transitory computer readable medium storing instructions which, when executed by the one or more processors, cause the one or more processors to perform operations comprising: receiving a request from a first sub-system, wherein the request includes a plurality of data associated with an access device; determining the first sub-system, the access device, or a combination thereof has authorization to access a service; determining contextual data of one or more purses associated with the access device, status of the first sub-system, or a combination thereof, wherein the contextual data includes an initial expiration date of the one or more purses, one or more rules associated with the one or more purses, or a combination thereof, wherein each of the one or more purses includes a time-limited store value balance maintained for the access device, wherein determining the contextual data of the one or more purses, further comprises: monitoring, by a first machine learning model, the one or more purses to detect amounts credited to the one or more purses near or after the initial expiration date; and automatically setting, by the first machine learning model, without, without user intervention, an alternate expiration date to access the credited amount, wherein the alternate expiration date is based on a pre-determined duration, and the alternate expiration date is after the initial expiration date; transmitting the request to a second sub-system based, at least in part, on the contextual data, the status of the first sub-system, or a combination thereof for categorizing one or more items associated with the request into one or more categories; and executing the request, after the initial expiration date and before the alternative expiration date, based on the one or more categories.
- 2 . The system of claim 1 , wherein determining the first sub-system and/or the access device has authorization to access the service, further comprises: configuring a restricted authorization network (RAN) list, wherein the RAN list includes at least one of: RAN merchant category code (MCC), RAN merchant identification (MID), or RAN network name; and comparing, by utilizing a second machine learning model, transaction MCC, transaction MID, or transaction merchant system associated with the request with the RAN MCC, the RAN MID, or the RAN network name to determine a match.
- 3 . The system of claim 2 , further comprising: qualifying the one or more purses upon determining the transaction MCC, the transaction MID, or the transaction merchant system is approved by the RAN MCC, the RAN MID, or the RAN network name, respectively.
- 4 . The system of claim 2 , further comprising: normalizing the transaction MCC, the transaction MID, or a combination thereof upon determining an unsuccessful match; and utilizing the normalized MCC, the normalized MID, or a combination thereof to authenticate the first sub-system.
- 5 . The system of claim 1 , wherein determining the contextual data of the one or more purses, further comprises: determining one or more dependent accounts linked to a primary account associated with the one or more purses; and reconfiguring the one or more rules to limit access to the primary account by the one or more dependent accounts, adjust purse priorities for usage of available funds in the one or more purses, or a combination thereof.
- 6 . The system of claim 1 , wherein transmitting the request to the second sub-system, further comprises: determining the first sub-system is a participating system or a self-categorizing system; transmitting the request to a third sub-system, wherein the third sub-system determines the plurality of data includes enhanced data; and transmitting, by the third sub-system, the request with the enhanced data to the second sub-system.
- 7 . The system of claim 6 , further comprising: identifying, by the second sub-system, category and subcategory values associated with the one or more items identified in the request by checking an approved product list in a database.
- 8 . The system of claim 7 , wherein the second sub-system manages content of the approved product list in the database, and wherein the participating system or the self-categorizing system adds filtered items to or removes the filtered items from a potential product list in the database.
- 9 . The system of claim 6 , wherein the enhanced data includes stock keeping unit data, and wherein the stock keeping unit data includes a unique identifier for one or more items sold by the participating system.
- 10 . The system of claim 1 , wherein transmitting the request to the second sub-system, further comprises: determining the first sub-system is a self-categorizing system or a non-participating system; transmitting the request to a switching system, wherein the switching system determines the plurality of data is missing item level details; and determining a configured alternative to the item level details for the self-categorizing system or the non-participating system.
- 11 . A computer-implemented method, comprising: receiving, by one or more processors, a request from a first sub-system, wherein the request includes a plurality of data associated with an access device; determining, by the one or more processors, the first sub-system, the access device, or a combination thereof has authorization to access a service; determining, by the one or more processors, contextual data of one or more purses associated with the access device, status of the first sub-system, or a combination thereof, wherein the contextual data includes an initial expiration date of the one or more purses, one or more rules associated with the one or more purses, or a combination thereof, wherein each of the one or more purses includes a time-limited store value balance maintained for the access device, wherein determining the contextual data of the one or more purses, further comprises: monitoring, by a first machine learning model, the one or more purses to detect amounts credited to the one or more purses near or after the initial expiration date; and automatically setting, by the first machine learning model, without user intervention, an alternate expiration date to access the credited amount, wherein the alternate expiration date is based on a pre-determined duration, and the alternate expiration date is after the initial expiration date; transmitting, by the one or more processors, the request to a second sub-system based, at least in part, on the contextual data, the status of the first sub-system, or a combination thereof for categorizing one or more items associated with the request into one or more categories; and executing, by the one or more processors, the request based on the one or more categories.
- 12 . The computer-implemented method of claim 11 , wherein determining the first sub-system and/or the access device has authorization to access the service, further comprises: configuring, by the one or more processors, a restricted authorization network (RAN) list, wherein the RAN list includes at least one of: RAN merchant category code (MCC), RAN merchant identification (MID), or RAN network name; and comparing, by utilizing a second machine learning model, transaction MCC, transaction MID, or transaction merchant system associated with the request with the RAN MCC, the RAN MID, or the RAN network name to determine a match.
- 13 . The computer-implemented method of claim 12 , further comprising: qualifying, by the one or more processors, the one or more purses upon determining the transaction MCC, the transaction MID, or the transaction merchant system is approved by the RAN MCC, the RAN MID, or the RAN network name, respectively.
- 14 . The computer-implemented method of claim 12 , further comprising: normalizing, by the one or more processors, the transaction MCC, the transaction MID, or a combination thereof upon determining an unsuccessful match; and utilizing, by the one or more processors, the normalized MCC, the normalized MID, or a combination thereof to authenticate the first sub-system.
- 15 . The computer-implemented method of claim 11 , wherein determining the contextual data of the one or more purses, further comprises: determining, by the one or more processors, one or more dependent accounts linked to a primary account associated with the one or more purses; and reconfiguring, by the one or more processors, the one or more rules to limit access to the primary account by the one or more dependent accounts, adjust purse priorities for usage of available funds in the one or more purses, or a combination thereof.
- 16 . The computer-implemented method of claim 11 , wherein transmitting the request to the second sub-system, further comprises: determining, by the one or more processors, the first sub-system is a participating system or a self-categorizing system; transmitting, by the one or more processors, the request to a third sub-system, wherein the third sub-system determines the plurality of data includes enhanced data; and transmitting, by the third sub-system via the one or more processors, the request with the enhanced data to the second sub-system.
- 17 . A non-transitory computer readable medium, the non-transitory computer readable medium storing instructions which, when executed by one or more processors, cause the one or more processors to perform operations, comprising: receiving a request from a first sub-system, wherein the request includes a plurality of data associated with an access device; determining the first sub-system, the access device, or a combination thereof has authorization to access a service; determining contextual data of one or more purses associated with the access device, status of the first sub-system, or a combination thereof, wherein the contextual data includes an initial expiration date of the one or more purses, one or more rules associated with the one or more purses, or a combination thereof, wherein each of the one or more purses includes a time-limited store value balance maintained for the access device, wherein determining the contextual data of the one or more purses, further comprises: monitoring, by a first machine learning model, the one or more purses to detect amounts credited to the one or more purses near or after the initial expiration date; and automatically setting, by the first machine learning model, without user intervention, an alternate expiration date to access the credited amount, wherein the alternate expiration date is based on a pre-determined duration, and the alternate expiration date is after the initial expiration date; transmitting the request to a second sub-system based, at least in part, on the contextual data, the status of the first sub-system, or a combination thereof for categorizing one or more items associated with the request into one or more categories; and executing the request based on the one or more categories.
- 18 . The non-transitory computer readable medium of claim 17 , wherein determining the first sub-system and/or the access device has authorization to access the service, further comprises: configuring a restricted authorization network (RAN) list, wherein the RAN list includes at least one of: RAN merchant category code (MCC), RAN merchant identification (MID), or RAN network name; comparing, by utilizing a second machine learning model, transaction MCC, transaction MID, or transaction merchant system associated with the request with the RAN MCC, the RAN MID, or the RAN network name to determine a match; and qualifying the one or more purses upon determining the transaction MCC, the transaction MID, or the transaction merchant system is approved by the RAN MCC, the RAN MID, or the RAN network name, respectively.
Description
CROSS-REFERENCE TO RELATED APPLICATION(S) This patent application claims the benefit of priority to U.S. Provisional Application No. 63/489,955 filed on Mar. 13, 2023, the entirety of which is incorporated herein by reference. TECHNICAL FIELD The present disclosure relates generally to the field of data processing and, more particularly, to systems and methods for executing authenticated filtered electronic transactions. BACKGROUND Current electronic transaction systems and services are continuously challenged to track, analyze, and/or categorize allowable product items associated with various prepaid benefits programs. The existing systems and services also experience technical difficulties in allowing select users to access funds after the expiration of purses that hold cash or virtual value for benefit programs. There has been an escalation in the occurrences of false matches due to an increase in the use of alphanumeric merchant identification (MID) numbers, and present technologies are limited in their capability to efficiently and accurately detect false matches. There is also a need for a system that adjusts the order of use of the purses of a subprogram within certain acceptable alternatives, including the suppression of the use of some purses for additional users of the benefit account. Existing technologies are technically challenged in pre-defining acceptable alternative priorities for subprograms or cardholders/users which presents challenges in limiting access to prevent misuse The present disclosure is directed to addressing these and other drawbacks to the existing electronic transaction systems and services. Unless otherwise indicated herein, the materials described in this section are not prior art to the claims in this application and are not admitted to be prior art, or suggestions of the prior art, by inclusion in this section. SUMMARY OF THE DISCLOSURE The present disclosure solves this problem and/or other problems described above or elsewhere in the present disclosure and improves the state of conventional data processing methods by authenticating access devices and/or merchant systems and determining their contextual data for categorizing items associated with a transaction request. In some embodiments, a system for data processing, data verification, and categorization of items is disclosed. The system includes: one or more processors; and at least one non-transitory computer readable medium storing instructions which, when executed by the one or more processors, cause the one or more processors to perform operations including: receiving a request from a first sub-system, wherein the request includes a plurality of data associated with an access device; determining the first sub-system, the access device, or a combination thereof has authorization to access a service; determining contextual data of one or more purses associated with the access device, status of the first sub-system, or a combination thereof, wherein the contextual data includes expiration date of the one or more purses, one or more rules associated with the one or more purses, or a combination thereof; transmitting the request to a second sub-system based, at least in part, on the contextual data, the status of the first sub-system, or a combination thereof for categorizing one or more items associated with the request into one or more categories; and executing the request based on the one or more categories. In some embodiments, a computer-implemented method for data processing, data verification, and categorization of items is disclosed. The computer-implemented method includes: receiving, by one or more processors, a request from a first sub-system, wherein the request includes a plurality of data associated with an access device; determining, by the one or more processors, the first sub-system, the access device, or a combination thereof has authorization to access a service; determining, by the one or more processors, contextual data of one or more purses associated with the access device, status of the first sub-system, or a combination thereof, wherein the contextual data includes expiration date of the one or more purses, one or more rules associated with the one or more purses, or a combination thereof; transmitting, by the one or more processors, the request to a second sub-system based, at least in part, on the contextual data, the status of the first sub-system, or a combination thereof for categorizing one or more items associated with the request into one or more categories; and executing, by the one or more processors, the request based on the one or more categories. In some embodiments, a non-transitory computer readable medium for data processing, data verification, and categorization of items is disclosed. The non-transitory computer readable medium stores instructions which, when executed by one or more processors, cause the one or more processors to perform operations including: receiving a reque