ALERT MANAGEMENT SYSTEM WITH REAL-TIME REMEDIATION AND INTEGRATION WITH THE OVERDRAFT ALLOWANCE ORIGINATING SYSTEM
Embodiments provide an alert management and real-time remediation system. The system receives an electronic file that includes an overdraft allowance information data structure comprising overdraft allowance information and automatically parses the overdraft allowance information into overdraft allowance events for the associated customers. The system sends overdraft allowance notification messages to the associated customers. The message includes a link to an authentication interface of an institution associated with the customer. After the customer is authenticated, the system provides a user interface that displays overdraft allowance information for each overdraft allowance event associated with the customer and a display element for a payment option. Responsive to the customer selecting the payment option, the system sends a payment message that causes a transfer of a payment to the institution.
Latest Double Check Solutions, Inc. Patents:
- Alert management system with real-time remediation and integration with the exception originating system
- Fraud alert management system with real-time remediation and integration with the originating system
- ALERT MANAGEMENT SYSTEM WITH REAL-TIME REMEDIATION AND INTEGRATION WITH THE EXCEPTION ORIGINATING SYSTEM
- Alert management system with real-time remediation and integration with the overdraft allowance originating system
This application is a continuation of U.S. patent application Ser. No. 17/860,611, filed Jul. 8, 2022, entitled “ALERT MANAGEMENT SYSTEM WITH REAL-TIME REMEDIATION AND INTEGRATION WITH THE OVERDRAFT ALLOWANCE ORIGINATING SYSTEM”, which is hereby incorporated herein by reference in its entirety.
The present application is related to U.S. Patent Publication No. US 2015/0026060 A1, filed Jul. 7, 2014, entitled “F
The present application is also related to U.S. Pat. No. 11,144,917 B1, issued Oct. 12, 2021, entitled “A
A technology platform for real-time management of time-sensitive exception notifications and integration with the overdraft allowance originating system.
BACKGROUNDVarious technologies exist to provide alerts to users. The existing technologies have various technical problems and other deficiencies. In many cases, the technology provides an alert, but lacks a technical mechanism for the user to take action. In other cases, where multiple parties are involved, the technology is deficient in that it fails to enable users to take action and provide necessary real-time updates to all of the involved parties' systems. In some cases, where an entity provides limited access to their servers and/or other computer systems, manual notification of user action may be required. This is a technical limitation, especially when there is a time-sensitive need for a user to receive an alert, take action on the alert and have the entity, whose systems provide limited access, updated on the action. Often, prior systems include a manual notification to such entities which is ineffective with there is a time-sensitive deadline. These and other technical problems exist.
Alert management systems have applicability to many industries and many practical applications. Without limitation, one practical application relates to various fintech solutions. In particular, various technologies exist to facilitate the ability for a customer to be notified of an action that needs to be taken with respect to a financial or other account. These technologies suffer from the above-referenced and other drawbacks. Moreover, the technical drawbacks of prior systems in the fintech space are exacerbated by some of the regulatory issues, complexity and multiple parties involved in the system. Multiple examples of this exist.
As just one example, the technical and other implications of what happens when a negotiable instrument (such as, for example, a check or an ACH withdrawal) is not honored by the financial institution associated with the account on which the negotiable instrument is drawn, i.e., the payor bank are explained below.
It is possible that a negotiable instrument may be generated that for a number of different reasons may not be honored by the financial institution associated with the account on which the negotiable instrument is drawn, i.e., the payor bank. One reason might be that there are insufficient funds available in the account on which the negotiable instrument is attempting to be drawn. This is generally termed a non-sufficient funds (NSF) event. Similarly, a situation where the funds deposited in the account have not yet cleared (i.e., making the funds unavailable) is generally termed an uncollected funds (UCF) event. In this description, both NSF events and UCF events will be referred to as NSF events, unless specified otherwise.
The reason for the insufficient (i.e., inadequate) funds may be that the account is overdrawn (i.e., an overdraft has occurred, and money has been withdrawn from the account in an amount that has caused the available balance in the account to be less than zero) or because the amount listed on the negotiable instrument exceeds the available balance in the account even though that balance is an amount greater than zero but less than the amount listed on the negotiable instrument. Since checks, drafts, substitute checks and ACH withdrawals are negotiable instruments that are processed using the normal clearing method versus other transactions that are approved and cleared at the point of the transaction like ATM withdrawals, on-us check and draft cashes, and point of sale transactions, the financial institutions associated with the account my refuse to pay the negotiable instrument (in this example a non-preauthorized withdrawal request) and return the negotiable instrument as unpaid.
Unfortunately, even though the payor's financial institution may refuse to honor a negotiable instrument if it is drawn against insufficient or unavailable funds, the reality is that if the bearer of the negotiable instrument (i.e., the payee) does not physically come to the payor's financial institutions to cash the negotiable instrument but instead deposits the check into his/her account (i.e., payee account) at a different financial institution, then via overnight processing the payor's financial institution may automatically pay/credit the amount listed on the negotiable instrument to payee's account. Then, only after payor's financial institution performs a clearing process, will payor's financial institution learn that the negotiable instrument actually caused an NSF event (also known as an NSF occurrence).
On the payor side of the equation, payor's financial institution will generate an NSF notification and issue a NSF notice. Once the payee's financial institution sends the item back in the return check file, the payee's financial institution will repay the amount received less a charge for the risk incurred. Further, the payor financial institution will not honor the negotiable instrument, and will send the payor an NSF notification via first class mail, and additionally charge the payor a fee for generating a “bad” negotiable instrument.
On the payee side of the equation, the payee is sent a Returned Deposited Item (RDI) notice, and generally will be charged a fee from his/her financial intuition for the negotiable instrument. Additionally, the payee may have written negotiable instruments against the payor's negotiable instrument thereby creating a snowball effect of had instruments.
At this point, the payee is left with the sole responsibility of collecting from the payor the outstanding monetary amount listed on the negotiable instrument as well as any associated penalties, costs and fees. This may lead the payee to bring legal action against the payor. Moreover, the payee's financial institution may also report the payor to a database for bad check writers such as, for example, Check Connection, TeleCheck, Shared Check Authorization Network (“SCAN”) or ChexSystems. Finally, knowingly passing a “bad check” is a crime in most states with a range of criminal penalties.
Each business day, every depositary financial institution generates Exception Information (EI) following reconciling accounts with the corresponding negotiable instruments received the previous business day. The EI may identify either all transactions that were presented the previous day that resulted in insufficient funds or only the items presented that caused an insufficient balance. Typically, for each NSF occurrence, the EI includes information about the corresponding account and the corresponding account holder. Each financial institution may also flag items that triggered an overdraft allowance/courtesy pay as well. In the description that follows, each EI may be accompanied by information that flags items that triggered an overdraft allowance/courtesy pay.
In order to better understand the above discussed problem, the problem is now describe in detail with reference to
In an example of operation, the payor 102 generates 122 the negotiable instrument 100 that lists a monetary amount and passes it to the payee 104 physically or electronically. In this example, the negotiable instrument 100 is drawn on the payor account 106 such that the payor 102 is a “Drawer” of the payor account 106 and the payor FI 108 is a “Drawee” because the payor FI 108 is where the negotiable instrument 100 can be presented for payment from the payor account 106. The payee 104 deposits the negotiable instrument 100 into the payee account 110 physically or electronically. Once the negotiable instrument 100 is deposited into the payee account 110, the payee FI 112 may present the negotiable instrument 100 to the payor FI 108 for payment via the signal path 114 that includes the communication network 116. In response, the payor FI 108 sends a payment 132 in the monetary amount listed on the negotiable instrument 100 via payor computer server 118. The payor FI 108 may utilize a Check 21 system or other interbank transaction system.
In this example, once the payor FI 108 has sent the payment 132 to the payee FI 112, the payor FI 108 withdraws the funds from the payor account 106 and determines whether sufficient funds are available in the payor account 106 to pay the listed monetary amount of the negotiable instrument 100. If the funds are available in the payor account 106, the listed monetary amount of the negotiable instrument 100 is withdrawn from the payor account 106 to satisfy the payment 132 made by the payor FI 108. If, instead, the payor FI 108 determines that there are insufficient funds in the payor account 106 to pay the listed monetary amount of the negotiable instrument 100, the clearing process designates the negotiable instrument 100 as causing an NSF occurrence and then places it as an NSF item on an EI that will be generated the next day by the payor FI 108. In this example, the clearing process may be performed by a computer system such as, for example, a reconciliation system 134. The reconciliation system 134 may be optionally part of the payor server 118 or another independent computer system of the payor FI 108. The reconciliation system 134 may include software that includes rules and decisions engines/modules to reconcile the amount paid on behalf of the payor 102 with the funds available from the payor account 106. The reconciliation system 134 has access to the payor FI 108 customer lists and corresponding accounts such that it may generate a daily EI 136 that includes either all items presented that result in a non-sufficient balance or all NSF occurrences with the corresponding negotiable instruments that caused the NSF occurrences, the corresponding accounts of the negotiable instruments, and the corresponding customer information of the accounts. This EI 136 may then be received and reviewed by a manager 138 of the payor FI 108.
In some exceptional cases, the manager 138 notices the payor 102 is listed on the EI 136 as a result of negotiable instrument 100 causing a NSF occurrence and the manager 138 subjectively considers the payor 102 an important or favorite customer of the payor FI 108. The manager 138, in some instances, may have the discretion to have the payor FI 108 pay the negotiable instrument 100 and because the negotiable instrument is then marked “pay,” a NSF notification 139 is sent to the payor 102 if the balance is still insufficient and the payee FI 112 does not receive the NSF item back in the returned items file.
In another example, the manager 138 or other FI 108 representative may notify the payor 102 of the need to cover the negotiable instrument 100 on the EI. In order to cover the instrument 100, the payor must physically pay the manager or a designee, and the manager or designee must locate the NSF record in the payor FI 108 system and manually mark the negotiable instrument 100 as “pay.”
But if the payor 102 does not deposit the funds within the time allowed by the payor FI 108, the payor FI 108 will send the item to the payee FI 112 in the returned check file marked as NSF.
As noted above, this process is entirely time-sensitive yet requires manual operations. If the payor does not pay the required amount within the FI predetermined time period, the payor will still be listed as having an NSF occurrence, and the associated negotiable instrument that caused the NSF occurrence will not be honored and will be returned for insufficient funds. Furthermore, even if the payor commences payment of the required amount within the FI predetermined time period, the payment may not settle until after expiration of the FI predetermined time period, with the same result.
SUMMARY OF THE INVENTIONOne aspect of the invention relates to an improved technology platform for a financial alert management and real-time remediation system (FAMS). The platform may include some or all of the following technical components and features.
The FAMS includes a set of computer-software modules (executed on a processor) that can generate alerts, also referred to herein as notifications, and allow a customer to manage and control an outcome, within a designated period of time, based upon the customer's decisions and actions in a real-time environment. The FAMS provides a technical solution that leverages the real-time communication to empower customers, including individuals and businesses, to act to minimize expenses that would otherwise be incurred as well as protect their credit standing, reputation, and identity. In addition, it allows a protective and secure means to exchange information, remedy situations, and provide options in a real-time environment, that will benefit the customer.
The FI electronically generates exception information (EI) describing one or more events, (e.g., NSF or other events) and automatically transmits the EI to the platform. The system may be configured so that the EI has a particular data structure. One component of the data structure may include information about specific rules applicable to the specific events in the EI. The rules may be based on a set of information related to the particular events and a set of rules in a rules database. Thus, the rules for one event may differ from those of another. The platform parses the EI into events, processes the events in the EI in accordance with the rules, and generates a customized electronic notification to a customer along with a link. The link enables the customer to access the platform after authentication by a single sign on (SSO) feature associated with the customer account at the FI, for example using a browser execution on a customer device. After authentication, the FI SSO interface may redirect the customer browser to the platform. The platform generate a user interface to display the events, a time frame for response, action options (e.g., pay, report fraud, return the negotiable instrument unpaid), any fees associated with the action (which may vary from one user to the next based on the rules associated with each event), and if a pay action is selected, one or more payment options, including payment options that are enabled directly from the platform, without the user having to use a separate website or application.
After the customer views the exception notification, they may choose an action via a user interface that presents a set of options, including the option to provide a payment to address the event. If the customer selects the pay action, the platform facilitates real-time communication of the customer selection and any payment information received from the customer to the FI to enable the prompt and automated posting of payment directly to the customer account without the need for further manual interaction.
The FAMS reduces the occurrence of a non-payment event where the payor FI refuses to pay a negotiable instrument generated by a payor having a payor account at the payor FI, where the negotiable instrument has caused a non-sufficient funds (NSF) event because the monetary amount of the negotiable instrument exceeds the available funds amount in the payor account.
The FAMS may include a communication module, a database, a timing module, a second communication module, a decision module, a payment module, and a settlement module. A controller may be in signal communication with the first communication module, second communication module, payment module, timing module, and database. The controller is configured to control the operation of the system. The first communication module is configured to receive an EI, payor contact data, and a FI predetermined time period from the payor FI. The payor FI produces the EI that includes all of the events presented and processed through nightly processing that resulted in a final non-sufficient balance.
The payor contact data includes contact information for payor, and the FI predetermined time period for receiving funds to cover the NSF event before the occurrence of the non-payment event where the payor FI refuses to pay the negotiable instrument. The database is configured to store the NSF events from the EI and utilize the contact information for the payor from the payor contact data. The timing module is configured to generate a FAMS time period based on the FI predetermined time period. The second communication module is configured to attempt communication with the payor based on the contact information for the payor and, if successful, communicate to the payor the NSF event, options to take action to change the order of the events by selecting “Pay”, “Return”, or “Fraudulent”, and/or paying the amount necessary to cure the NSF event. The payment module is configured to receive a payment from the payor.
As an example of operation, the system performs a method that reduces the occurrence of a non-payment event where the payor FI refuses to pay the negotiable instrument generated by the payor, where the negotiable instrument has caused a NSF event because the monetary amount of the negotiable instrument exceeds the available funds amount in the payor account. The method may include (electronically) receiving the EI (e.g., as a data structure) including, for example, payor contact data, FI predetermined time period, rules and/or other data from the payor FI, parsing the data structure to extract the various components, storing the data items, including the NSF events from the EI, and storing the contact information for the payor from the payor contact data.
The method may further include generating a FAMS time period based on the FI predetermined time period, and attempting communication with the payor based on the contact information for the payor. If the attempted communication is successful, the method may include communicating to the payor in real time the NSF event, the option to take action, the amount necessary to cure the NSF event, and the FAMS time period. The method may include receiving a payment from the payor.
The present disclosure, in accordance with one or more various embodiments, is described in detail with reference to the following figures. The figures are provided for purposes of illustration only and merely depict typical or example embodiments.
The figures are not exhaustive and do not limit the present disclosure to the precise form disclosed.
DETAILED DESCRIPTIONEmbodiments of the disclosed technology include a financial alert management system with real-time remediation (FAMS) that may interact with one or more FI, one or more customer electronic devices, and one or more external payment provider systems. In the described embodiments, the FAMS is a separate system from the payor FI. For example, the FAMS may comprise a server programmed with computer instructions to be operated to provide services to various FIs as described herein. In other embodiments, some or all of the elements of the FAMS may be provided and/or operated by the payor FI as part of its internal system. The payor FI may be a bank, savings and loan, credit union, trust company, mortgage loan company, or a similar FI. The external payment providers may be, for example, credit card companies, online payment companies, or similar FIs.
The FAMS may include a server programmed with a set of software modules that allow a customer to manage and control an outcome, within a designated period of time, based upon the customer's decisions and actions in a real-time environment. It also includes intelligent data analytics that derive scores based upon historical data based upon current data from a variety of input sources. The FAMS empowers customers, including individuals and businesses, to act to minimize expenses that would otherwise be incurred as well as protect their credit standing, reputation and identity. In addition, the FAMS allows a protective and secure means to exchange information, remedy situations, and provide options in a real-time environment, that will benefit the customer.
The FAMS 204 may be implemented as one or more networked computer systems, for example as described in detail below. In the described embodiments, the FAMS 204 is separate system from the payor financial institution system 202. For example, the FAMS 204 may be operated to provide services to the financial institutions. In other embodiments, some or all of the elements of the FAMS 204 may be provided and/or operated by the payor financial institution 202 as part of its internal system.
The payor financial institution may be a bank, savings and loan, credit union, trust company, mortgage loan company, or a similar financial institution. The external payment providers 210 may be, for example, credit card companies, online payment companies, or similar financial institutions.
The customer devices 208 may be operated by a customer 206 having a financial account at the payor financial institution. The customer devices 208 may include, for example, smart phones, tablets, personal computers, and similar electronic devices. The one or more networks 212 (e.g., wired or wireless networks, the internet or other networks) may interconnect and enable communication between the elements of the financial system 200.
Overdraft Allowance and Courtesy Pay Item Handling
Related U.S. Pat. No. 11,144,917 B1 provides a financial alert management and real-time remediation system (FAMS) that allows customers to remedy the above-described NSF events in real time. However, financial institutions also generate other items that are not included in the exceptions process because they are paid (referred to herein as “other items presented”). For example, items are presented each day that include paid items, items and transactions that are NSF due to insufficient funds, and items and transactions that are paid if the financial institution offers Overdraft Allowance or Courtesy Pay services. Embodiments of the disclosed technologies provide an improved FAMS (hereinafter simply “FAMS”) that creates a total view for the customer of all items presented (whether paid or not), and allows customers to be fully in control of which items they want to pay and which items, if any, they want to return. As noted above, these items, unlike regular NSF exceptions (being returned for insufficient balance) are not included in the exceptions process because they are paid, and as a result these “other items presented” are not segregated in an exceptions job to be reviewed. Therefore, the core processors have not made a report of these “other items presented” available to any external partners.
One drawback of the current system is that paid items that are overdrawn are not reported in any segregated report or job to readily display them to a customer. In addition, these items are considered paid so there is no pre-established automated system to return these items if the customer requests them to be returned. Therefore, making changes to a paid item is currently a manual, time consuming, and risky process. Risk occurs when a customer wants an item returned but the return deadline for the item has passed. Such an item is considered a “late return” and could be kicked back as an unaccepted late return, and the bank would be liable for the item.
The elements of the disclosed processes are presented in one arrangement. However, it should be understood that one or more elements of the processes may be performed in a different order, in parallel, or omitted entirely. Furthermore, the processes may include other elements in addition to those presented. For example, the processes may include error-handling functions if exceptions occur.
Referring to
The file may include information describing the events as well as customer information regarding the customers. The information may include the date and time the event was generated, a unique identifier code (UIC) to uniquely identify each event, an account number of the involved customer's account, instrument number(s) of the involved negotiable financial instrument(s) (for example, such as a check number), a monetary amount of each involved negotiable financial instrument, and other information.
The customer information may include the name of the customer, a customer number, contact information of the customer, and other information. The contact information of the customer may include email addresses, phone numbers, and other contact information.
The FAMS 204 may obtain the electronic file electronically from the payor financial institution 202 in a variety of ways. In some embodiments, the FAMS 204 may poll the payor financial institution 202 to obtain the electronic file. In other embodiments, the payor financial institution 202 may push the electronic file to the FAMS 204. In some embodiments, the payor financial institution 202 may provide an access process or application programming interface (API) for the FAMS 204 to obtain the electronic file. In some embodiments, the FAMS 204 may obtain the electronic file by employing robotic process automation that emulates keystrokes of an employee of the payor financial institution 202. In some embodiments, a combination of these techniques may be employed. In some embodiments, the FAMS may request a specific process in that allows access to the core system for obtaining the electronic file. These techniques may be performed in a highly encrypted security protocol environment.
This technical integration of the FAMS and the payor financial institution to obtain the electronic file is not conventional, and employs a novel technical collaboration between the FAMS computer systems and those of the payor financial institution. Conventionally, the process of receiving the electronic file from an FI is implemented manually, in whole or in part. These manual processes consume valuable time in a process where time is of the essence. The described automated electronic collaboration between the payor FI and the FAMS occurs nearly instantaneously, thereby giving the payor more time to address the event.
Referring again to
For example, the process 300 may include generating and sending an overdraft allowance notification message to the electronic address of the customer, at 306. The overdraft allowance notification message may include a link to an authentication interface of an institution associated with the customer.
For example, referring again to
The link may be a hyperlink to a single sign-on (SSO) authentication interface of the payor financial institution 202. The customer 206 may enter the link in a browser executing on the customer device 208 to reach the SSO interface, and may be authenticated by logging into the SSO interface, for example by providing a preset user ID and password. In some embodiments, the authentication process may include multifactor authentication.
Referring again to
The user interface 400 may list a FI decision for each instrument, at 408. The FI decision represents the decision made by the FI regarding the disposition of the instrument. For example, the FI may decide the instrument should be paid, should be paid by courtesy pay, or should be returned. The interface 400 also allows the customer to override these decisions, at 410. For example, the customer may decide to pay the instrument, to return the instrument to the payee, to report the instrument as fraudulent, or to stop payment of the instrument. Responsive to such a customer selection, the FAMS may send an electronic message representing the decision to the FI.
Referring again to
In some embodiments, the user interface may list more than one payment method in the user interface. For example, the payment methods may identify accounts the customer has with the external payment providers 210. In such embodiments, responsive to the customer selecting one or more of the payment methods, the FAMS 204 (or third party) may transfer the payment monetary amount to the financial account of the customer according to the selected payment method(s).
In some embodiments, the user interface may provide options for actions other than to pay the NSF. For example, the user interface may present an option for a customer to report a fraud concerning the involved negotiable financial instrument(s). In such embodiments, responsive to the customer selecting the option to report a fraud, the FAMS 204 may report the fraud concerning the negotiable financial instrument to the payor financial institution 202.
In some embodiments, responsive to expiration of the time interval for curing the NSF event, the FAMS system may provide an indication of the expiration of the time interval in the user interface, and may disable or remove the payment option from the user interface.
Pricing Overdraft Fees from a Pricing Model Grid
FI institutions often charge a customer a fee for a declined transaction. For example, an FI may charge a customer an overdraft fee for an instrument that is overdrawn. The instrument may be a debit card, a check, an ACH instrument, or a similar instrument. The fee is generally fixed regardless of the amount of the instrument. For example, the fee may be set at $30. To many this fee will seem excessive when the amount of the instrument is similar or less than the fee. However, in current systems the amount of the fee is fixed, regardless of the amount of the instrument.
In some embodiments, the fee may vary based on the amount of the related transaction. For example, the fee may be defined in a pricing grid. An example pricing grid is presented below as Table 1. Referring to table 1, the pricing grid establishes multiple ranges for the transaction amounts, up to a predetermined debt limit. For each range, the pricing grid establishes a related fee amount. For example, for a transaction amount below $25.00, the pricing grid of Table 1 establishes a $5.00 fee. For the highest range, the fee amount may be the default service fee. In some embodiments, the pricing grid may assign a different fee code to each range and fee amount. Referring again to Table 1, for the foregoing example the fee code is 01.
Referring to
Referring again to
For example, the process 500 may include determining the service fee based on the amount of the related transaction, at 506. In some embodiments, the pricing grid may be stored within the FAMS. In these embodiments, the FAMS may index the grid with the transaction amount to determine the fee. The FAMS may also determine the fee code in a similar manner. The FAMS may provide the fee code to the FI or core processor.
In other embodiments, the fee amounts may not be stored in the FAMS, and may be stored at the FI instead. In these embodiments, the FAMS may determine the fee code based on the transaction amount, and may provide the fee code to the FI. Responsive to receiving the fee code, the FI may determine the fee amount based on the fee code, and may return the fee amount to the FAMS.
The process 500 may include generating and sending an overdraft allowance notification message to the electronic address of the customer, at 508. The overdraft allowance notification message, and the manner of sending the overdraft allowance notification message, may be as described above with reference to
Referring again to
Referring again to
Easy Select Dispositioning
The disclosed FAMS presents a variety of transactions and options to customers. Many customers and small businesses don't have time to analyze these transactions and options in detail, but still want an opportunity to select appropriate options for each transaction. Complicating factors include small devices and other time constraints.
In some embodiments, the FAMS provides easy select dispositioning of such items by providing “quick select” buttons as display elements in a user interface. Instead of individually making a decision for each transaction, the customer may select a decision type and select all transactions that apply to that selected decision type. This process is particularly efficient when the number of transactions is large. With this technology, an individual or small businesses operator can implement their decisions in seconds rather than minutes. In some embodiments, the FAMS then automatically groups the transactions by decision type for quick verification of the decisions made.
AI Decisioning Based Upon Previous Activity
Financial institutions have always had a hierarchy of presentment to process debit and credit transactions. This process is rigid and includes assumptions on which transactions a customer (e.g., a consumer or small business) would want to pay.
Up until this time, there has been no way for a financial institution to know or intelligently guess which transactions a customer would want to pay versus defaulting to the rigid established hierarchy. This approach causes dissatisfaction and problems for the customers because items could be dishonored that were critically important for the customers to pay.
In some embodiments, the FAMS may use the previous activity of the customer to select default decisions for the customer's current transactions. For example, the FAMS may maintain a record of which decisions the customer has selected in the past for particular transactions. The FAMS may also maintain a record of what payment methods were used when the customer selected a payment decision.
In some embodiments, the FAMS uses algorithms to build a database of predictable actions to present to the customer. The financial institution's hierarchy becomes obsolete, and the selected default decisions now reflect what the customer has done in the past. This process results in quicker and more accurate decisioning.
In some embodiments, the process may employ artificial intelligence. For example, the process may employ one or more machine learning models. Any machine learning models and techniques may be used. For example, the machine learning models and techniques may include decision trees, neural networks, gradient boosting, and similar machine learning models and techniques. The machine learning models may be trained previously with historical correspondences between decisions made and parameters of the corresponding transactions. The training may be supervised, unsupervised, or a combination thereof, and may continue between operations for the lifetime of the system. The training may continue with use of the models to improve their accuracy over time. The parameters may include, for example and without limitation, the account number, the identity of the payor, the identity of the payee, the amount of the item, the date of the item, the type of payment (e.g., check, ACH, or debit card), and the ultimate decision made on handling the item. Time frames and weights may be assigned to each data point and calculated to determine a pattern of activity.
When a new item is presented, the parameters for the new item may be applied as inputs to the trained model. In response, the model may provide a default decision. The FAMS may present the item, the default decision, and one or more of the parameters to the user in a user interface. This process may follow the authentication and notification procedures described above.
How Much can I Afford Analytics
When presented with multiple items to pay, a customer who does not have sufficient funds to pay all of the items may struggle with understanding how much the customer can afford to pay, which items to pay, and how to pay them. Budget models can sometimes assist the customer, but cannot provide timely and specific answers to these questions. Returning the items can increase the overall cost by imposing additional fees, and can have devastating effects on the customer's credit rating, reputation, and future payment terms.
In some embodiments, the FAMS may provide a calculator tool that provides timely and specific answers. For example, the tool may provide the customer with options for how much the customer can afford to pay to remedy some or all of the items presented. This calculations vary based upon what the financial institution offers and what they want to include in the calculator. The tool is not a budgeting calculator. Rather, the tool is a calculator that assists the customer in discovering and using funds from multiple sources the customer may already have or may be able to obtain. The tool may provide a combination of questions and fill in the blank answer boxes for the customer to complete in order to compute an amount the customer can afford to pay.
Referring to
A user-operable “Prioritize transactions” display element 906 allows a customer can change the order of presentment that the financial institution has selected. By allowing the customer to reprioritize or reorder the transactions, they may be able to pay the transactions they believe are most important and return others that are not as critical. In some cases, no additional funds are needed.
How Much Did I Save Analytics
In a world of charges and negative consequences, it is helpful to show the customer how much they saved by taking particular actions. However, these savings are difficult to calculate, especially when it comes to transactions being presented that have caused an overdrawn account. Furthermore, the amount that is estimated as savings for each transaction may vary due to the type of transaction and the timing. Techniques for this estimation are particularly difficult or even non-existent when it comes to non-sufficient funds and overdraft (NSF/OD) items.
In some embodiments, the FAMS provides a savings estimate tool to estimate how much the customer saved.
In one example, the tool may determine the payee for each item, for example by processing an image of the item. Based on the payee, the tool may then ask the purpose of the item (e.g., rent payment, mortgage payment, credit card payment, or auto loan payment). Based on the purpose, the tool may estimate the savings. The estimated savings may include priority returned item fees, late fees, restocking fees, insurance reactivation fees, collection fees, phone reactivation fees, and similar fees.
Many retail receipts list sales discounts based upon the original price. When these transactions are presented as NSF/OD items, the savings can be difficult to determine. Currently these savings are estimated based upon industry standards and the most likely costs. The savings estimate tool instead asks the customer questions to make this determination.
In a similar manner, the tool may consider late fees or restocking charges for returned merchandise. Currently these charges are estimated as a percentage of the payment. The savings estimate tool instead asks the customer questions to make this determination.
The tool may consider the type of transaction when estimating the savings. For example, for a returned item, the tool may presume an industry standard returned item fee, for example such as $25.00.
Real-Time Cashier's Check Anti-Fraud Tool
Cashier's checks are prepaid bank checks that customers purchase and use, typically for large transactions like loan closings or purchasing large dollar items. Banks and merchants trust cashier's checks will be paid because they are prepaid by the customer. However, cashier's checks are sometimes fraudulent. Currently there is no way to determine whether a cashier's check is fraudulent. Banks and merchants generally accept cashier's checks in good faith hoping they are not fraudulent. But currently no technological solution exists to “confirm” or “guarantee” a cashier's check is good until it has cleared the bank.
In some embodiments, the FAMS may provide a real-time cashier's check anti-fraud tool that leverages financial institution data to validate a cashier's check is genuine before it is accepted. Users of this technology have the unique advantage of a central hub that validates certain criteria when a cashier's check is scanned or input into the FAMS. Parameters used by the FAMS to validate a cashier's check may include the date, routing number, account number, check number, amount, and payee. Through secure data lines, the FAMS may validate the check data by connecting to a variety of systems including core systems, positive pay systems, accounting systems and other systems where the cashier's check data is maintained.
Referring to
Referring again to
The process may include identifying a second institution based on the routing number. For example, the second institution may be the issuer or payor of the cashier's check, a core processor, or a similar institution. The process may include determining whether the second institution supports the anti-fraud tool. If not, the tool may send a message to the first institution indicating that the second institution is not a participating financial institution.
But if the second institution supports the anti-fraud tool, the process 1200 may include sending an electronic verification request message to the second institution, at 1206. The electronic verification request message may include one or more of an account number, and an amount, a date, a check number, and a payee of the corresponding cashier's check. Messages may be exchanged with the institutions by accessing application programming interfaces (APIs) of the institutions.
The process 1200 may include receiving an electronic verification response message responsive to the electronic verification request message, at 1208. The process 1200 may include determining, based on the electronic verification response message, whether the cashier's check has been verified, at 1210.
The process 1200 may include sending an electronic response message to the institution, wherein the electronic response message indicates whether the cashier's check has been verified, at 1212. For example, the tool may provide a user interface to an electronic device at the institution. The user interface may include a display element that indicates whether the cashier's check has been verified based on the electronic response message.
Real-Time Fraudulent Item Reporting Tool
Occasionally fraudulent items are presented to a customer's account for payment. A common example is the fraudulent check. Currently it is not possible for a customer to detect and report the fraudulent item in a real-time or even timely manner, for several reasons. Some processing methods do not post an item to a customer's account until after the 24-hour window for returning the item has closed. As a result, the customer does not see the item until it is too late to return it within the 24-hour window. Even if a processing system posts the item to the customer's account within the 24-hour window, often no notification is provided to the customer to allow for timely review of the item(s). And even if the customer has configured such notifications, the customer still must review the items, determine whether they are fraudulent, manually notify the financial institution, complete the required paperwork, and manually return the item, all within the 24-hour return window.
As a consequence, a customer may not learn of a fraudulent item until days later. The customer must then deal with the negative consequences because the unanticipated item was paid with the customer's available balance. Furthermore, paying the item may cause other items to be returned, for example due to insufficient funds in the customer's accounts. Such returns may degrade the customer's relationships with merchants, and may result in additional fees being charged to the customer by third parties, for example such as return check fees, late fees, restocking fees, and poor payment terms going forward.
Financial institutions may suffer adverse consequences as well. These institution may be required to reimburse the customer and pay other items that were fraudulent because the institution did not learn of the fraudulent item until it was too late. For example, the customer's financial institution, which accepted the fraudulent item for deposit (i.e., the payee financial institution), may be unaware the item is being returned. This causes losses on the payee financial institution side. If the item is returned as fraudulent, the payee bank must charge the item back to the customer that made the deposit. If the customer does not have a sufficient balance to cover the returned item, they will be overdrawn until and unless they can pay back the fraudulent funds they have already used.
In some embodiments, the FAMS provides a real-time fraudulent item reporting tool that allows the customer to indicate that an item being presented will create an overdraft, is a fraudulent item, can be returned within the 24-hour return window of opportunity. This tool not only notifies the customer of specific items causing an overdrawn situation, but also provides an option to “report fraud” directly in the user experience. The item is immediately flagged to be returned with no action needed on the financial institution's part, aside from documenting the customer's report of fraud or unauthorized activity. The tool allows a customer to stop a problem before it happens. And the payor's financial institution can avoid fraud losses due to late returns.
In addition, if the payee's bank supports the tool, the FAMS immediately notifies the payee's financial institution that the item is being returned. Normally this notification process takes a minimum of 24 hours, and occurs only when the item is over a certain dollar amount. Currently there are no 24-hour notifications required for smaller items. The FAMS notification allows the payee financial institution to take action quickly to preserve the funds in the payee's account to pay the charge back when it arrives, thereby mitigating additional losses.
Referring to
The process 1300 may include, responsive to obtaining the exception information, automatically parsing, by the computer processor, the exception information into events for the customers associated with the events, at 1304. After this parsing, the process 1000 may include one or more of the operations that follow for one or more of the customers.
The process 1300 may include generating and sending, by the computer processor, an event notification message to the electronic address of the customer, wherein the event notification message includes a link to an authentication interface of the payor financial institution, at 1306.
The process 1300 may include responsive to the customer being authenticated by the authentication interface, providing, by the computer processor, a user interface to the electronic customer device for display to the customer, at 1308. The user interface may display information for each event associated with the customer and display elements from which a user may select, including a display element for reporting fraud concerning the respective negotiable financial instrument.
The process 1300 may include, responsive to the customer selecting the display element for reporting fraud, generating and sending a first fraud reporting message to the payor financial institution and a second fraud reporting message to the payee financial institution, at 1310. The first and second fraud reporting messages may identify the respective negotiable financial instrument.
Real-Time Debit Card Automated Opt-In Process
When a customer attempts to pay with a debit card but funds in the card account are insufficient to cover the transaction, the transaction will be declined. Many debit cards address this shortcoming by allowing a customer to “opt-in” to a debit card overdraft allowance service. If the customer has opted-in, the debit card transaction will be paid with an overdraft allowance. However, many customers don't opt-in due to the fear of overdraft fees being assessed. And because debit card transactions are so convenient, customers often don't carry checks or cash as an alternative payment method. Then if a debit card transaction is declined, the customer has no other source of payment. This can be a significant problem, for example, for a customer stuck at a grocery store or gas station without a source to pay. Furthermore, the debit card authorization process is so fast (on the order of nano-seconds) there is no time to route the transaction differently or notify the customer of the option to change the “opt-out” status of the debit card.
In some embodiments, the FAMS provides a real-time debit card automated opt-in process. In these embodiments, the FAMS may provide FIs with an option to “turn-on” this service. The technology is integrated into the card system, and triggers a flag when a debit card transaction is declined. This flag is sent to the FAMS, which in response sends a message notifying the customer the transaction has been declined due to the “opt-out” status of the card. The message may be sent by SMS, email, or a similar service. A customer wishing to “opt-in” may respond to the message. The response is received by the FAMS. Once the message is received, the FAMS sends a Reg E “Opt-In” field maintenance to the core system. Once the field is updated on the core system, the customer may try the transaction again for approval.
Referring to
But if the customer has not opted-in to an overdraft protection service, or has opted-out of the service, the transaction may be declined, and the FAMS may retrieve contact information from the core processor, for example based on the debit card account number, at 1510, and may trigger an electronic message to be sent to the customer, at 1512. The message may alert the customer of the declined transaction and the opt-in status of the debit card, and may provide the customer with an option to change the opt-in status, at 1514. For example, the message may provide a user interface on the customer's smartphone having display elements that allow the customer to change the opt-in status. Responsive to the customer changing the opt-in status, the FAMS may send a Reg E “Opt-In” field maintenance message to the core system to update the opt-in status for the debit card account, at 1516. The customer may then try the transaction again.
Ach Warehouse Analytics for Payments
The Automated Clearing House (ACH) system utilizes a warehouse, referred to herein as “the ACH warehouse”, to store credits and debits until the date each entry should be posted. Financial institutions use the ACH warehouse to store ACH entries, but do not provide any information to their customers as to what is staged to post next. This service has not been a part of financial institution processes and as a result, their customers are not aware of impending ACH activity.
In some embodiments, the FAMS provides ACH warehouse analytics. The FAMS may connect to a financial institution's ACH warehouse and detect transactions that are pending to post within the 24-hour window available for returns. The FAMS then provides this crucial information to the customer in a user interface so the customer can take action items within the 24-hour window, including overdrafts as well as ability to pay items. If the customer has credits in the ACH warehouse that have a posting date within the 24-hour window, the FAMS may display this information to the customer in the user interface to inform the customer of the impending deposit. This information is helpful when the customer is selecting methods to pay for items selected by the customer for payment.
Responsive to the request, the FAMS may send a query to the ACH warehouse, at 1604. The FAMS may access the ACH warehouse using an API provided by the warehouse. Responsive to the query, the ACH warehouse may search its database for pending transactions, at 1606. If any items are found, at 1608, the ACH warehouse may provide information describing the items to the FAMS, at 1610. In response, the FAMS may provide the information to the customer in a user interface, at 1612.
Automated GL Reconcilement
When transactions occur outside of the core processor, it is difficult so provide any automation due to the access levels needed as well as the correct transaction sets to customer accounts and general ledgers (GLs). These challenges are increased because the financial institution does not allow other outside vendors to post entries to their customer accounts or their GLs. Due to restrictive and prohibited access, these processes are not provided by outside vendors.
In some embodiments, the FAMS provides an automated GL reconcilement service. The FAMS technology is integrated with the financial institution's core processor. The FAMS also conforms to many of the financial audit and security requirements that the financial institution must follow. As a result, the FAMS may launch certain processes that are internal to the core processor. These processes include customer transactions, various GL transactions, and updating return codes, based upon customers' changes throughout the day. These processes can be different based upon the processing hierarchy as well.
One such process is the customer transactions process. When the customer selects “Pay with Cash” or “Pay with Available Balance”, the funds must be preserved by placing a hold on the customer's account. This ensures that the funds won't be used for other purposes, for example such as debit card transactions. When a customer selects “Pay with Credit Card”, the merchant approved amount goes to a merchant settlement account rather than posting to the customer's account, again to preserve the funds until the items are paid.
Other processes include GL transactions. GL transactions include fees, merchant services and interchange. Certain GL processes are triggered based upon each transaction. These GL processes are established by the financial institution, but the FAMS works to establish the miscellaneous job post after the time to act has expired. These GL entries move funds into the proper GL and customer accounts to create an automated settlement process for the financial institution so manual transactions do not need to be posted.
Another process is updating return codes. This process is a critical part of the “end of day” processing. The default decisions that occurred based upon the financial institution's hierarchy posting process need to be updated based upon the customer decisions throughout the time to act. This process does one of several things for each item, for example including: remove the item from the “Return file” so it can pay; add the item to the “Return file” so it will be returned; or change the return code to reflect the reason for return if it is other than NSF (e.g., in the case of fraud, stop pay). Other pre-established return codes may be used.
Automated FAMS Administration (AFA)
In some embodiments, the FAMS provides an automated FAMS administration (AFA) tool. The AFA tool enables the onboarding into the FAMS of multiple financial institutions at once, and provides a mechanism to allow each financial institution to set up some of their key data, for example such as fee structures, settings, and messaging. The AFA tool is a split process between the technical specifications for each financial institution and the financial institution data that is specifically based upon their business decisions.
The financial institution part may be mostly exposed to the financial Institution based upon an administrative role for access to the AFA tool. This information may automatically be uploaded to the designated FAMS “tenant” (e.g., financial institution) once submitted. Certain configurable data points may be open for maintenance by credentialled financial institution employees.
Data points for each financial institution may include: service charge fee, convenience fee ($/%), business rules based upon various criteria, messaging, branding (Colors/logo), return item codes, NSF/OF fee refund matrix, general ledgers for settlement, time zone, web site, main phone number, group fraud email, name of courtesy pay program, name of contact center, customer portal start of day time, end of day time, mission control portal start of day, end of day, discount on service charge, holiday schedule, business day schedule, billing address, and billing contact.
Data points for the technical team may include: Member portal; URL, Okta client ID—Mission Control; URL, Okta client OD, group ID—Credit Union; Core API, transaction API, Data base connection string, and Data Base name—Sendgrid; API Key, from email, URL, from name—Twillio; SID Token, phone—Payment Detail; Secret key, access key, public profile—ServiceBus Endpoint—Azure storage account detail; Storage account endpoint, blob path from where ETL triggers—SFTP Details; Host, Port, Username, password, path—Decision codes; ACH pay, fraud, Draft, Pay, fraud.
Roles for the AFA tool may include role name and role description. Configurations may include financial information, convenience fee threshold, transaction fee threshold, FAMS fee threshold, admin email, and IDP configuration.
The AFA tool also includes sections that display: dashboards, corporate set-ups users, tenants, and settings. Other data fields may added as requirements change by financial institution, for example including specific messaging throughout the technology, processing codes (e.g. GL codes, return codes, and similar codes) discounts, business rule criteria, and analytics.
Customer Settings
Currently financial institutions do not provide customer settings for customers to configure their interfaces and processes to be more convenient for daily use, and that provide enough flexibility to create settings that fit the customer's financial and daily needs. Without these settings, the customer has no power to establish alerts, payment setups, auto decisioning, or other processing that make the technology more convenient and easier to use.
In some embodiments, the FAMS exposes these customer settings to the customer. The customer settings may be specific to each customer, and may allow certain processes to be established to automatically assist the customer. These settings may be configured by the customer, and may be saved by the customer until updated. Example settings include alert timing, secondary alerts, preferred payment methods, automatic decisioning on certain types of payments, amount warnings, payee suspect warnings, overdraft allowance warnings, communication preferences, updated contact information, life line template set up, and nicknaming accounts. Because the FAMS works “inside the vault door” (after customer authentication has occurred), these settings are considered safe relative to the preapproved financial institutions' authentication processes, and can be updated to the core system the financial institution uses.
Job Notifications
Job sites are everywhere and easily accessible. However, in the financial institution world, job availability notifications have never been part of financial institution offers even though they would be of huge benefit to consumers, especially those with financial issues. Constant notifications of jobs available would be helpful and convenient to those that are struggling financially.
In some embodiments, the FAMS provides such job notifications. By offering job notifications through a convenient and recognized portal where customers do banking today, the FAMS allows customers a “one-stop” financial area to address all of their financial needs. Online banking is the main financial institution tool used by consumers and small businesses. Since the job notification tab is inside the online banking tab, it is convenient for consumers to see what local jobs are available while conducting online banking.
The FAMS may use algorithms and rules to determine what jobs are available based upon criteria that is gathered by activity in a customer's checking account, and responses to activity concerning overdraft/NSF items. This criteria may include past titles and employers, location, and legal age to work. In addition, the FAMS may pull together job notifications posted on various sites to display in one place jobs that appear to match jobs held historically by the consumer. These data points along with weighted scores may be used to calculate the jobs best suited for each customer. The FAMS may also provide the customer with the ability to expand the search by providing additional information. In some embodiments, this additional information is not maintained by the FAMS.
The computer system 2000 also includes a main memory 2006, such as a random access memory (RAM), cache and/or other dynamic storage devices, coupled to bus 2002 for storing information and instructions to be executed by processor 2004. Main memory 2006 also may be used for storing temporary variables or other intermediate information during execution of instructions to be executed by processor 2004. Such instructions, when stored in storage media accessible to processor 2004, render computer system 2000 into a special-purpose machine that is customized to perform the operations specified in the instructions.
The computer system 2000 further includes a read only memory (ROM) 2008 or other static storage device coupled to bus 2002 for storing static information and instructions for processor 2004. A storage device 2010, such as a magnetic disk, optical disk, or USB thumb drive (Flash drive), etc., is provided and coupled to bus 2002 for storing information and instructions.
The computer system 2000 may be coupled via bus 2002 to a display 2012, such as a liquid crystal display (LCD) (or touch screen), for displaying information to a computer user. An input device 2014, including alphanumeric and other keys, is coupled to bus 2002 for communicating information and command selections to processor 2004. Another type of user input device is cursor control 2016, such as a mouse, a trackball, or cursor direction keys for communicating direction information and command selections to processor 2004 and for controlling cursor movement on display 2012. In some embodiments, the same direction information and command selections as cursor control may be implemented via receiving touches on a touch screen without a cursor.
The computing system 2000 may include a user interface component to implement a GUI that may be stored in a mass storage device as executable software codes that are executed by the computing device(s). This and other components may include, by way of example, components, such as software components, object-oriented software components, class components and task components, processes, functions, attributes, procedures, subroutines, segments of program code, drivers, firmware, microcode, circuitry, data, databases, data structures, tables, arrays, and variables.
In general, the word “component,” “engine,” “system,” “database,” data store,” and the like, as used herein, can refer to logic embodied in hardware or firmware, or to a collection of software instructions, possibly having entry and exit points, written in a programming language, such as, for example, Java, C or C++. A software component may be compiled and linked into an executable program, installed in a dynamic link library, or may be written in an interpreted programming language such as, for example, BASIC, Perl, or Python. It will be appreciated that software components may be callable from other components or from themselves, and/or may be invoked in response to detected events or interrupts. Software components configured for execution on computing devices may be provided on a computer readable medium, such as a compact disc, digital video disc, flash drive, magnetic disc, or any other tangible medium, or as a digital download (and may be originally stored in a compressed or installable format that requires installation, decompression or decryption prior to execution). Such software code may be stored, partially or fully, on a memory device of the executing computing device, for execution by the computing device. Software instructions may be embedded in firmware, such as an EPROM. It will be further appreciated that hardware components may be comprised of connected logic units, such as gates and flip-flops, and/or may be comprised of programmable units, such as programmable gate arrays or processors.
The computer system 2000 may implement the techniques described herein using customized hard-wired logic, one or more ASICs or FPGAs, firmware and/or program logic which in combination with the computer system causes or programs computer system 2000 to be a special-purpose machine. According to one embodiment, the techniques herein are performed by computer system 2000 in response to processor(s) 2004 executing one or more sequences of one or more instructions contained in main memory 2006. Such instructions may be read into main memory 2006 from another storage medium, such as storage device 2010. Execution of the sequences of instructions contained in main memory 2006 causes processor(s) 2004 to perform the process steps described herein. In alternative embodiments, hard-wired circuitry may be used in place of or in combination with software instructions.
The term “non-transitory media,” and similar terms, as used herein refers to any media that store data and/or instructions that cause a machine to operate in a specific fashion. Such non-transitory media may comprise non-volatile media and/or volatile media. Non-volatile media includes, for example, optical or magnetic disks, such as storage device 2010. Volatile media includes dynamic memory, such as main memory 2006. Common forms of non-transitory media include, for example, a floppy disk, a flexible disk, hard disk, solid state drive, magnetic tape, or any other magnetic data storage medium, a CD-ROM, any other optical data storage medium, any physical medium with patterns of holes, a RAM, a PROM, and EPROM, a FLASH-EPROM, NVRAM, any other memory chip or cartridge, and networked versions of the same.
Non-transitory media is distinct from but may be used in conjunction with transmission media. Transmission media participates in transferring information between non-transitory media. For example, transmission media includes coaxial cables, copper wire and fiber optics, including the wires that comprise bus 2002. Transmission media can also take the form of acoustic or light waves, such as those generated during radio-wave and infra-red data communications.
The computer system 2000 also includes a communication interface 2018 coupled to bus 2002. Network interface 2018 provides a two-way data communication coupling to one or more network links that are connected to one or more local networks. For example, communication interface 2018 may be an integrated services digital network (ISDN) card, cable modem, satellite modem, or a modem to provide a data communication connection to a corresponding type of telephone line. As another example, network interface 2018 may be a local area network (LAN) card to provide a data communication connection to a compatible LAN (or a WAN component to communicate with a WAN). Wireless links may also be implemented. In any such implementation, network interface 2018 sends and receives electrical, electromagnetic or optical signals that carry digital data streams representing various types of information.
A network link typically provides data communication through one or more networks to other data devices. For example, a network link may provide a connection through local network to a host computer or to data equipment operated by an Internet Service Provider (ISP). The ISP in turn provides data communication services through the world wide packet data communication network now commonly referred to as the “Internet.” Local network and Internet both use electrical, electromagnetic or optical signals that carry digital data streams. The signals through the various networks and the signals on network link and through communication interface 2018, which carry the digital data to and from computer system 2000, are example forms of transmission media.
The computer system 2000 can send messages and receive data, including program code, through the network(s), network link and communication interface 2018. In the Internet example, a server might transmit a requested code for an application program through the Internet, the ISP, the local network and the communication interface 2018.
The received code may be executed by processor 2004 as it is received, and/or stored in storage device 2010, or other non-volatile storage for later execution.
Each of the processes, methods, and algorithms described in the preceding sections may be embodied in, and fully or partially automated by, code components executed by one or more computer systems or computer processors comprising computer hardware. The one or more computer systems or computer processors may also operate to support performance of the relevant operations in a “cloud computing” environment or as a “software as a service” (SaaS). The processes and algorithms may be implemented partially or wholly in application-specific circuitry. The various features and processes described above may be used independently of one another, or may be combined in various ways. Different combinations and sub-combinations are intended to fall within the scope of this disclosure, and certain method or process blocks may be omitted in some implementations. The methods and processes described herein are also not limited to any particular sequence, and the blocks or states relating thereto can be performed in other sequences that are appropriate, or may be performed in parallel, or in some other manner. Blocks or states may be added to or removed from the disclosed example embodiments. The performance of certain of the operations or processes may be distributed among computer systems or computers processors, not only residing within a single machine, but deployed across a number of machines.
As used herein, a circuit might be implemented utilizing any form of hardware, or a combination of hardware and software. For example, one or more processors, controllers, ASICs, PLAs, PALs, CPLDs, FPGAs, logical components, software routines or other mechanisms might be implemented to make up a circuit. In implementation, the various circuits described herein might be implemented as discrete circuits or the functions and features described can be shared in part or in total among one or more circuits. Even though various features or elements of functionality may be individually described or claimed as separate circuits, these features and functionality can be shared among one or more common circuits, and such description shall not require or imply that separate circuits are required to implement such features or functionality. Where a circuit is implemented in whole or in part using software, such software can be implemented to operate with a computing or processing system capable of carrying out the functionality described with respect thereto, such as computer system 2000.
As used herein, the term “or” may be construed in either an inclusive or exclusive sense. Moreover, the description of resources, operations, or structures in the singular shall not be read to exclude the plural. Conditional language, such as, among others, “can,” “could,” “might,” or “may,” unless specifically stated otherwise, or otherwise understood within the context as used, is generally intended to convey that certain embodiments include, while other embodiments do not include, certain features, elements and/or steps.
Terms and phrases used in this document, and variations thereof, unless otherwise expressly stated, should be construed as open ended as opposed to limiting. Adjectives such as “conventional,” “traditional,” “normal,” “standard,” “known,” and terms of similar meaning should not be construed as limiting the item described to a given time period or to an item available as of a given time, but instead should be read to encompass conventional, traditional, normal, or standard technologies that may be available or known now or at any time in the future. The presence of broadening words and phrases such as “one or more,” “at least,” “but not limited to” or other like phrases in some instances shall not be read to mean that the narrower case is intended or required in instances where such broadening phrases may be absent.
Claims
1. A system for providing alert management and real-time remediation, the system comprising:
- one or more hardware processors; and
- a non-transitory machine-readable storage medium encoded with instructions executable by the one or more hardware processors to cause the system to perform operations comprising: receiving from a first user interface of an electronic customer device, a first electronic message comprising a request for information concerning one or more transactions pending in an Automated Clearing House (ACH) warehouse and due to post to an account of a customer within a predetermined future interval; responsive to receiving the first electronic message, transmitting an electronic query to the ACH warehouse, the electronic query requesting the information concerning the one or more transactions pending in the ACH warehouse and due to post to the account of the customer within the predetermined future interval; responsive to receiving a response to the electronic query, transmitting, to the electronic customer device, a second user interface for display to the customer, wherein the second user interface displays the one or more transactions pending in the ACH warehouse and due to post to the account of the customer within the predetermined future interval and display elements from which the customer may select, including a first display element for selecting one of the transactions and a second display element for selecting a payment option; and responsive to the customer selecting the payment option and one of the transactions, generating and sending a second electronic message, wherein the second electronic message causes a transfer of a payment for the selected one of the transactions.
2. The system of claim 1, the operations further comprising:
- transmitting, to the electronic customer device, the first user interface for display to the customer, wherein the first user interface comprises a third display element operable to transmit the first electronic message.
3. The system of claim 1, the operations further comprising:
- responsive to receiving the first electronic message, transmitting, to the electronic customer device, a third electronic message, wherein the third electronic message includes a link to an authentication interface;
- receiving a fourth electronic message from the authentication interface;
- determining, based on the fourth electronic message, whether the customer was successfully authenticated by the authentication interface;
- responsive to determining the customer was successfully authenticated by the authentication interface, transmitting the electronic query to the ACH warehouse.
4. The system of claim 1, wherein:
- the one or more transactions pending in the ACH warehouse comprise multiple transactions; and
- the second user interface further comprises a third display element operable to prioritize the multiple transactions for payment.
5. The system of claim 1, wherein:
- the second user interface further comprises a third display element operable to select a source of funds for payment for the selected one of the transactions.
6. The system of claim 1, wherein:
- the second user interface further comprises a third display element operable to transfer funds between multiple accounts of the customer for payment for the selected one of the transactions.
7. The system of claim 1, wherein:
- the second user interface further comprises a third display element operable to apply for a loan for payment for the selected one of the transactions.
8. A non-transitory machine-readable storage medium encoded with instructions executable by the one or more hardware processors to cause a system to perform operations comprising:
- receiving from a first user interface of an electronic customer device, a first electronic message comprising a request for information concerning one or more transactions pending in an Automated Clearing House (ACH) warehouse and due to post to an account of a customer within a predetermined future interval;
- responsive to receiving the first electronic message, transmitting an electronic query to the ACH warehouse, the electronic query requesting the information concerning the one or more transactions pending in the ACH warehouse and due to post to the account of the customer within the predetermined future interval;
- responsive to receiving a response to the electronic query, transmitting, to the electronic customer device, a second user interface for display to the customer, wherein the second user interface displays the one or more transactions pending in the ACH warehouse and due to post to the account of the customer within the predetermined future interval and display elements from which the customer may select, including a first display element for selecting one of the transactions and a second display element for selecting a payment option; and
- responsive to the customer selecting the payment option and one of the transactions, generating and sending a second electronic message, wherein the second electronic message causes a transfer of a payment for the selected one of the transactions.
9. The non-transitory machine-readable storage medium of claim 8, the operations further comprising:
- transmitting, to the electronic customer device, the first user interface for display to the customer, wherein the first user interface comprises a third display element operable to transmit the first electronic message.
10. The non-transitory machine-readable storage medium of claim 8, the operations further comprising:
- responsive to receiving the first electronic message, transmitting, to the electronic customer device, a third electronic message, wherein the third electronic message includes a link to an authentication interface;
- receiving a fourth electronic message from the authentication interface;
- determining, based on the fourth electronic message, whether the customer was successfully authenticated by the authentication interface;
- responsive to determining the customer was successfully authenticated by the authentication interface, transmitting the electronic query to the ACH warehouse.
11. The non-transitory machine-readable storage medium of claim 8, wherein:
- the one or more transactions pending in the ACH warehouse comprise multiple transactions; and
- the second user interface further comprises a third display element operable to prioritize the multiple transactions for payment.
12. The non-transitory machine-readable storage medium of claim 8, wherein:
- the second user interface further comprises a third display element operable to select a source of funds for payment for the selected one of the transactions.
13. The non-transitory machine-readable storage medium of claim 8, wherein:
- the second user interface further comprises a third display element operable to transfer funds between multiple accounts of the customer for payment for the selected one of the transactions.
14. The non-transitory machine-readable storage medium of claim 8, wherein:
- the second user interface further comprises a third display element operable to apply for a loan for payment for the selected one of the transactions.
15. A computer-implemented method, comprising:
- receiving from a first user interface of an electronic customer device, a first electronic message comprising a request for information concerning one or more transactions pending in an Automated Clearing House (ACH) warehouse and due to post to an account of a customer within a predetermined future interval;
- responsive to receiving the first electronic message, transmitting an electronic query to the ACH warehouse, the electronic query requesting the information concerning the one or more transactions pending in the ACH warehouse and due to post to the account of the customer within the predetermined future interval;
- responsive to receiving a response to the electronic query, transmitting, to the electronic customer device, a second user interface for display to the customer, wherein the second user interface displays the one or more transactions pending in the ACH warehouse and due to post to the account of the customer within the predetermined future interval and display elements from which the customer may select, including a first display element for selecting one of the transactions and a second display element for selecting a payment option; and
- responsive to the customer selecting the payment option and one of the transactions, generating and sending a second electronic message, wherein the second electronic message causes a transfer of a payment for the selected one of the transactions.
16. The computer-implemented method of claim 15, further comprising:
- transmitting, to the electronic customer device, the first user interface for display to the customer, wherein the first user interface comprises a third display element operable to transmit the first electronic message.
17. The computer-implemented method of claim 15, further comprising:
- responsive to receiving the first electronic message, transmitting, to the electronic customer device, a third electronic message, wherein the third electronic message includes a link to an authentication interface;
- receiving a fourth electronic message from the authentication interface;
- determining, based on the fourth electronic message, whether the customer was successfully authenticated by the authentication interface;
- responsive to determining the customer was successfully authenticated by the authentication interface, transmitting the electronic query to the ACH warehouse.
18. The computer-implemented method of claim 15, wherein:
- the one or more transactions pending in the ACH warehouse comprise multiple transactions; and
- the second user interface further comprises a third display element operable to prioritize the multiple transactions for payment.
19. The computer-implemented method of claim 15, wherein:
- the second user interface further comprises a third display element operable to select a source of funds for payment for the selected one of the transactions.
20. The computer-implemented method of claim 15, wherein the second user interface further comprises at least one of:
- a third display element operable to transfer funds between multiple accounts of the customer for payment for the selected one of the transactions; and
- a fourth display element operable to apply for a loan for payment for the selected one of the transactions.
Type: Application
Filed: Mar 22, 2023
Publication Date: Jan 11, 2024
Applicant: Double Check Solutions, Inc. (Austin, TX)
Inventors: Joel SCHWARTZ (Encino, CA), Anne Vivian LEE (Ellenton, FL)
Application Number: 18/124,756