scispace - formally typeset
Search or ask a question

Showing papers on "Database transaction published in 2012"


Proceedings ArticleDOI
20 May 2012
TL;DR: Calvin is a practical transaction scheduling and data replication layer that uses a deterministic ordering guarantee to significantly reduce the normally prohibitive contention costs associated with distributed transactions.
Abstract: Many distributed storage systems achieve high data access throughput via partitioning and replication, each system with its own advantages and tradeoffs. In order to achieve high scalability, however, today's systems generally reduce transactional support, disallowing single transactions from spanning multiple partitions. Calvin is a practical transaction scheduling and data replication layer that uses a deterministic ordering guarantee to significantly reduce the normally prohibitive contention costs associated with distributed transactions. Unlike previous deterministic database system prototypes, Calvin supports disk-based storage, scales near-linearly on a cluster of commodity machines, and has no single point of failure. By replicating transaction inputs rather than effects, Calvin is also able to support multiple consistency levels---including Paxos-based strong consistency across geographically distant replicas---at no cost to transactional throughput.

534 citations


Patent
Taylor Smith1
30 Jan 2012
TL;DR: In this paper, a method for obtaining data from a portable electronic device in which the data regards information obtained using the portable electronic regarding the transaction, and information obtained regarding at least one of a physical location of the portable e-device when obtaining the information regarding a transaction and the time of the day when obtaining it, was proposed.
Abstract: A method includes obtaining data from a portable electronic device in which the data regards information obtained using the portable electronic regarding the transaction, and information obtained using the portable electronic regarding at least one of a physical location of the portable electronic device when obtaining the information regarding the transaction and the time of the day when obtaining the information regarding the transaction, and processing the transaction based on the data regarding the information regarding the transaction and the at least one of the information regarding the physical location of the portable electronic device when obtaining the information regarding the transaction and the time of the day when obtaining the information regarding the transaction. The method may be employed in a point-of-sale transaction for the purchase of products at checkout.

303 citations


Proceedings ArticleDOI
04 Jun 2012
TL;DR: This work examines a common scenario in which only participants that are aware of the information can compete for some reward, and thus informed participants have an incentive not to propagate information to others, and proposes a modification to the protocol that can eliminate this problem.
Abstract: Many large decentralized systems rely on information propagation to ensure their proper function. We examine a common scenario in which only participants that are aware of the information can compete for some reward, and thus informed participants have an incentive not to propagate information to others. One recent example in which such tension arises is the 2009 DARPA Network Challenge (finding red balloons). We focus on another prominent example: Bitcoin, a decentralized electronic currency system.Bitcoin represents a radical new approach to monetary systems. It has been getting a large amount of public attention over the last year, both in policy discussions and in the popular press. Its cryptographic fundamentals have largely held up even as its usage has become increasingly widespread. We find, however, that it exhibits a fundamental problem of a different nature, based on how its incentives are structured. We propose a modification to the protocol that can eliminate this problem.Bitcoin relies on a peer-to-peer network to track transactions that are performed with the currency. For this purpose, every transaction a node learns about should be transmitted to its neighbors in the network. As the protocol is currently defined and implemented, it does not provide an incentive for nodes to broadcast transactions they are aware of. In fact, it provides an incentive not to do so. Our solution is to augment the protocol with a scheme that rewards information propagation. Since clones are easy to create in the Bitcoin system, an important feature of our scheme is Sybil-proofness.We show that our proposed scheme succeeds in setting the correct incentives, that it is Sybil-proof, and that it requires only a small payment overhead, all this is achieved with iterated elimination of dominated strategies. We complement this result by showing that there are no reward schemes in which information propagation and no self-cloning is a dominant strategy.

226 citations


Journal ArticleDOI
TL;DR: In this article, the authors present a framework for innovation capability, which is formed by four key capabilities (technology development, operations, management and transaction) that enable firms to reach Schumpeterian profits.
Abstract: The firm’s role, besides producing goods and services, is to promote technological change and innovation. While academic research on technological capabilities has led to a better understanding of the process of technical change itself, there is no consensus on the ultimate definition of innovation capability. The purpose of this paper is to present a framework for innovation capability. This is formed by four key capabilities (technology development, operations, management and transaction) that enable firms to reach Schumpeterian profits. Given that the study is characterized as a theoretical paper, methodologically is supported on an extensive literature review. Our main findings can be summed up in three aspects: (1) every firm has all four capabilities; none of them are null; (2) to be innovative, at least one of the firm’s capabilities must be predominant; (3) any firm, when established, is primarily technological or transactional, in a second stage, operational or managerial.

206 citations


Patent
16 Aug 2012
TL;DR: In this article, the authors proposed a system where a loyalty program participant can use an existing transaction card to purchase an item over a computerized network, while at the same time offsetting the cost of that transaction by converting loyalty points to a currency value credit and having the credit applied to the participant's financial transaction account.
Abstract: The present invention involves spending loyalty points over a computerized network to facilitate a transaction. With this system, a loyalty program participant is able to use an existing transaction card to purchase an item over a computerized network, while at the same time offsetting the cost of that transaction by converting loyalty points to a currency value credit and having the credit applied to the participant's financial transaction account. Currency credit from converted loyalty points may also be applied to stored value cards, online digital wallet accounts and the like. Further, currency credit may also be applied to other accounts to effect a gift or donation.

198 citations


Patent
15 Jun 2012
TL;DR: In this paper, a method for determining a transaction authentication level includes receiving transaction information associated with a transaction between a user and a relying party, receiving relying party preferences, and determining a user authentication level based on the transaction information and the user preferences.
Abstract: According to an embodiment of the present invention, a method for determining a transaction authentication level includes receiving transaction information associated with a transaction between a user and a relying party, receiving relying party preferences, and determining a relying party authentication level based on the transaction information and the relying party preferences. The method also includes accessing user preferences, and determining a user authentication level based the transaction information and the user preferences. The method further includes determining the transaction authentication level using the user authentication level and the relying party authentication level.

182 citations


Patent
18 Oct 2012
TL;DR: In this article, a method and system for executing and undoing distributed server change operations for a collection of server objects across multiple target servers in a transaction-safe manner is provided.
Abstract: A method and system for executing and undoing distributed server change operations for a collection of server objects across multiple target servers in a transaction-safe manner is provided. In one embodiment, server change operations for a collection of server objects, such as files and configuration file entries, are specified in a transaction package. The target servers to which the specified change operation are directed are also identified in the transaction package. Parameter values for each of the identified target servers are specified through a parameter file in the transaction package. The transaction package is sent to the identified target servers, which execute the change operations on the target servers in a transaction-safe manner using these parameter values.

168 citations


Patent
01 Jun 2012
TL;DR: In this article, a query from a first user regarding a proposed transaction was sent to the plurality of potential entities for the proposed transaction based on the at least one affinity between the first user and the potential entities.
Abstract: A method includes: receiving information regarding a plurality of completed transactions from a plurality of users; receiving a query from a first user regarding a proposed transaction; determining at least one affinity between the first user and the plurality of users based on the information; determining a ranking or expectation of success for each of a plurality of potential entities for the proposed transaction based on the at least one affinity; selecting a plurality of selected entities based on the ranking or expectation of success for each of the potential entities; and sending, in response to the query, the plurality of selected entities to the first user.

167 citations


Patent
05 Jul 2012
TL;DR: In this paper, the electronic wallet checkout platform apparatuses, methods and systems (EWCP) transform customer purchase requests triggering electronic wallet applications via EWCP components into electronic purchase confirmation and receipts.
Abstract: The electronic wallet checkout platform apparatuses, methods and systems (EWCP) transform customer purchase requests triggering electronic wallet applications via EWCP components into electronic purchase confirmation and receipts. In one implementation, the EWCP receives a merchant payment request, and determines a payment protocol handler associated with the merchant payment request. The EWCP instantiates a wallet application via the payment protocol handler. The EWCP obtains a payment method selection via the wallet application, wherein the selected payment method is one of a credit card, a debit card, a gift card selected from an electronic wallet, and sends a transaction execution request for a transaction associated with the merchant payment request. Also, the EWCP receives a purchase response to the transaction execution request, and outputs purchase response information derived from the received purchase response.

164 citations


Book
11 Oct 2012
TL;DR: This work presents an Extensible Approach to Realizing Advanced Transaction Models E. Anwar, et al., a novel and scalable approach to transaction processing designed to address the challenges of real-time data management and distributed systems.
Abstract: Preface. Part I: Workflow Transactions. 1. Transactions in Transactional Workflows D. Worah, A. Sheth. 2. WFMS: The Next Generation of Distributed Processing Tools G. Alonso, C. Mohan. Part II: Tool-Kit Approaches. 3. The Reflective Transaction Framework R.S. Barge, C. Pu. 4. Flexible Commit Protocols for Advanced Transaction Processing L. Mancini, et al. Part III: Long Transactions and Semantics. 5. Con Tracts Revisited A. Reuter, et al. 6. Semantic-Based Decomposition of Transactions P. Ammann, et al. Part IV: Concurrency Control and Recovery. 7. Customizable Concurrency Control for Persistent Java L. Daynes, et al. 8. Toward Formalizing Recovery of (Advanced) Transactions C.P. Martin, K. Ramamritham. Part V: Transaction Optimization. 9. Transaction Optimization Techniques A. Helal, et al. Part VI: ECA Approach. 10. An Extensible Approach to Realizing Advanced Transaction Models E. Anwar, et al. Part VII: OLTP/OLAP. 11. Inter- and Intra-Transaction Parallelism for Combined OLTP/OLAP Workloads C. Hasse, G. Weikum. Part VIII: Real-Time Data Management. 12. Towards Distributed Real-Time Concurrency and Coordination Control P. Jensen, et al. Part IX: Mobile Computing. 13. Transaction Processing in Broadcast Disk Environments J. Shanmugasundaram, et al. References. Contributing Authors. Index.

160 citations


Patent
31 May 2012
TL;DR: In this paper, the authors propose a monetary transaction system for conducting monetary transactions between transaction system subscribers and other entities, which includes a mobile device that runs the monetary transaction application and at least one entity that is to be involved in the specified transaction, where the entity has a profile with the system.
Abstract: Embodiments are directed to monetary transaction system for conducting monetary transactions between transaction system subscribers and other entities. In one scenario, the monetary transaction system includes a mobile device that runs a monetary transaction system application. The monetary transaction system also includes a subscriber that has a profile with the system. The subscriber indicates a transaction that is to be performed with the monetary transaction system. The system further includes a monetary transaction system processor that performs the transactions specified by the subscriber including communicating with a monetary transaction database to determine whether the transaction is permissible based on data indicated in the subscriber's profile. The monetary transaction system also includes at least one entity that is to be involved in the specified transaction, where the entity has a profile with the monetary transaction system. This entity may be a person, a retail store, an agent or other entity.

Journal ArticleDOI
24 Jan 2012
TL;DR: In this paper, the authors review, integrate, extend and apply economic, legal, sociological and psychological perspectives on relational contracts to address the extreme risk of "displaced agency" arising in long-lived aerospace and defence programs, large-scale software initiatives and other sectors.
Abstract: Large, global, cross-sectoral, multi-phased civil infrastructure projects tend to be one-off projects for which transactions have no strong ‘shadow of the future’, but where elements of relational contracting are still ubiquitous. Such projects evolve through discrete phases—financial and technical feasibility, conceptual design, detailed design, construction, operations and renovation/replacement—each phase of which can be viewed as a discrete transaction during which key participants and stakeholders rotate in and out of the project. This discontinuity of participation across phases in the project's lifecycle creates a heretofore neglected contractual hazard of ‘displaced agency’. Similar governance challenges arising from displaced agency are found in long-lived aerospace and defence programmes, large-scale software initiatives and other sectors. We review, integrate, extend and apply economic, legal, sociological and psychological governance perspectives on relational contracts to address the extreme ...

Patent
Leigh Amaro1, Parag Ladhawala1
15 Mar 2012
TL;DR: In this article, a system and method configured to provide enhanced services based on check-in information obtained in a social network system and transaction location information observed in a payment processing system is presented.
Abstract: A system and method configured to provide enhanced services based on check-in information obtained in a social network system and transaction location information observed in a payment processing system. In one aspect, the transaction location may be used to validate, verify or authenticate the check-in location declared in the social network system. In another aspect, the transaction location can be used as a basis to automate a check-in in the social network system in accordance with a preference of a user. In a further aspect, the transaction location and the check-in location can be correlated to detect inaccurate data, correct the inaccurate data, and/or augment the data in a data warehouse about the locations of transaction terminals.

Patent
10 Apr 2012
TL;DR: In this article, the authors present a method for authenticating a cardholder using multiple tokenization authentication, which includes receiving at a first entity a first token from a consumer and determining a second token associated with the first token.
Abstract: Embodiments of the present invention are directed generally to systems, methods, and apparatuses for authenticating a cardholder using multiple tokenization authentication. Embodiments of the invention are directed at a method. The method includes receiving at a first entity a first token from a consumer and determining a second token associated with the first token. Once the second token is determined, the second token is sent to a server computer at a second entity. The server computer then determines an account identifier associated with the second token and processes a transaction using the account identifier.

Patent
16 Oct 2012
TL;DR: In this paper, a consumer has conducted a cash transaction with an unidentified merchant payee and geo-location data associated with the transaction data is used to identify potential merchant payees of the cash transaction.
Abstract: Cash transaction entry data indicating a consumer has conducted a cash transaction with an unidentified merchant payee is obtained and geo-location data associated with the cash transaction data is used identify potential merchant payees of the cash transaction. If more than one potential merchant payee is identified, data representing the potential merchant payees is analyzed using historical financial transaction data associated with the consumer, and/or products or services and operations data associated with the potential merchant payees, and/or historical financial transaction data associated with a community of consumers, including consumers other than the consumer, to generate a potential merchant payee probability score for each of the potential merchant payees. The potential merchant payee probability score for each of the potential merchant payees is then used to generate a prioritized potential merchant payee list for the cash transaction that includes at least one of the potential merchant payees.

Patent
21 Nov 2012
TL;DR: In this article, a method of processing a transaction between a customer and a merchant includes receiving from a mobile device or from another device of the customer an indication of consent to perform a cardless payment transaction with the merchant, receiving from the mobile device an indication that the customer is within a predetermined distance of the merchant.
Abstract: A method of processing a transaction between a customer and a merchant includes receiving from a mobile device of the customer or from another device of the customer an indication of consent to perform a cardless payment transaction with the merchant, receiving from the mobile device an indication that the customer is within a predetermined distance of the merchant, after receiving both the indication of consent and the indication that the customer is within the predetermined distance, sending to a computer system of the merchant an indication of the presence of the customer and personal identifying information for the customer, receiving data indicating a transaction between the customer and the merchant, and submitting the transaction to a financial service for authorization.

Patent
11 Jun 2012
TL;DR: In this article, a method of processing a financial transaction for an account having a primary account number (PAN) can comprise detecting initiation of the transaction with the presentation instrument, and providing from the presentation instruments to the POS device a list of one or more applications IDs.
Abstract: Methods, systems, and machine-readable media are disclosed for handling information related to a transaction conducted with a presentation instrument at a POS device. Extended application IDs and dynamic cryptograms are use for the transaction. According to one embodiment, a method of processing a financial transaction for an account having a primary account number (PAN) can comprise detecting initiation of the transaction with the presentation instrument, and providing from the presentation instrument to the POS device a list of one or more applications IDs. Each application ID identifies an application that can be used to communicate data concerning the transaction between the presentation instrument and the POS device. The POS device selects one of the application IDs and returns it to the presentation instrument. Under the control of the selected application, the presentation instrument generates a Dynamic Transaction Cryptogram (DTC) and a dynamic PAN that are each valid for only a single transaction.

Patent
Prashanth Ranganathan1
31 Jan 2012
TL;DR: In this article, the location of a transaction or payment request is compared with a location of user device to determine whether the distance is great enough to send an alert for a possible fraudulent transaction.
Abstract: A location of a transaction or payment request is compared with a location of a user device to determine whether the distance is great enough to send an alert for a possible fraudulent transaction. The user device location may be predicted based on a last known location and information about the area of the last known location and movement of the user device.

Journal ArticleDOI
TL;DR: This study employed transaction aggregation strategy to detect credit card fraud by aggregating transactions to capture consumer buying behavior prior to each transaction and used these aggregations for model estimation to identify fraudulent transactions.
Abstract: Credit card fraud costs consumers and the financial industry billions of dollars annually. However, there is a dearth of published literature on credit card fraud detection. In this study we employed transaction aggregation strategy to detect credit card fraud. We aggregated transactions to capture consumer buying behavior prior to each transaction and used these aggregations for model estimation to identify fraudulent transactions. We use real-life data of credit card transactions from an international credit card operation for transaction aggregation and model estimation.

Patent
27 Aug 2012
TL;DR: In this paper, a system and method for conducting financial transactions by means of a smartphone is disclosed, where a barcode is printed on the invoice, which is scanned by the mobile device screen.
Abstract: A system and method for conducting financial transactions by means of a smartphone is disclosed. A barcode is printed on the invoice, which is scanned by the mobile device screen. The mobile device is used instead of a credit card or cash. Provisions for data security, transaction verification, and communications protocols are disclosed.

Patent
23 Feb 2012
TL;DR: In this article, a method and system for processing DDA payment transactions including generating a private virtual identifier, associating the private virtual identifiers with a DDA, and generating a public virtual identifier associated with the private Virtual Identifier is presented.
Abstract: A method and system for processing DDA payment transactions including generating a private virtual identifier, associating the private virtual identifier with a DDA, and generating a public virtual identifier associated with the private virtual identifier. The method can also include distributing the public virtual identifier to consumers, receiving a DDA payment request from a billing entity including the public virtual identifier, retrieving the private virtual identifier in response to receipt of the public virtual identifier, and processing the DDA payment request using the private virtual identifier to facilitate payment to the billing entity on behalf of the consumer. The method and system also authenticates the identity of a user during a transaction.

Patent
26 Jun 2012
TL;DR: In this article, a mobile payment system for facilitating secure financial transactions in person-to-person, personto-business, business to business, person to a group-of-people, group of people to a person, etc.
Abstract: A mobile payment system for facilitating secure financial transactions in person-to-person, person-to-business, business-to-business, person-to-a-group-of-people, group-of-people-to-a-person, etc. using mobile and non-mobile user interfaces for online and physical points of transaction using a standard procedure for various circumstances locally and internationally. The system involves use of a specially-configured QR code which is displayed by a payee, and scanned by a payor using a specially-configured software application running on a smartphone or other computing devices. The QR code communicates a payee-identification code and instructions for initiating a payment transaction. The application interprets the QR code and processes the data contained therein to complete a payment transaction in accordance with the instructions.

Patent
11 Apr 2012
TL;DR: In this article, a method for operating a security device comprises receiving a request for a transaction from a programmable device executing an application obtained from an application controlling institute, and verifying a validity of the transaction.
Abstract: A method for operating a security device comprises receiving a request for a transaction from a programmable device executing an application obtained from an application controlling institute, and verifying a validity of the transaction. A user is alerted, in which the user indicates an acceptance of the request. A one-time identifier is generated. The one-time identifier comprises a security device identification, a transaction number, a date and a time. The one-time identifier is communicated to the programmable device, in which the application verifies a validity of the security device identification and instructs the programmable device to communicate the one-time identifier and transaction to the application controlling institute for processing. The application controlling institute verifies validity of the one-time identifier and processes the transaction, wherein said security device, application programmable device and application controlling institute securely processes the transaction.

Patent
13 Nov 2012
TL;DR: In this article, the authors propose a real-time request to override a declined transaction or select a different financial account and the insertion of user identification information into the transaction approval message sent to the merchant.
Abstract: Novel features to be used in a proxy card payment system include a real-time request to override a declined transaction or to select a different financial account and the insertion of user identification information into the transaction approval message sent to the merchant. A payment request is forwarded to the payment system, which maintains the proxy card account and determines whether the transaction violates a user-defined rule. If the transaction is declined by the issuer that maintains the financial account, or the payment system for violation of a user-defined rule, the payment system sends a real-time message to the user. The user is prompted to override the rule causing the transaction to be declined or to select a new account to process the transaction. Once the payment system receives authorization for the transaction, it inserts the user identification information in an approval message before transmitting the approval to the merchant.

Patent
14 Feb 2012
TL;DR: In this paper, a transaction system and method of conducting a transaction wherein the transaction is initiated by the consumer using a mobile device with a unique identifier is described. But this system is limited to the case where the consumer initiates the transaction by entering a vendor provided transaction initiation code into the mobile device.
Abstract: The invention pertains to a transaction system and method of conducting a transaction. Particularly, the invention pertains to a transaction system and method of conducting a transaction wherein the transaction is initiated by the consumer using a mobile device with a unique identifier. The consumer initiates the transaction by entering a vendor provided transaction initiation code into the mobile device. The transaction identifier code and unique identifier of the mobile device is transmitted to a server. Using the unique identifier the server can retrieve pre-existing transaction options specific to the unique identifier of the mobile device. The transaction options can either be transmitted to the mobile device to allow the consumer to input any preferences relating to the transaction options or to a vendor sales system of a vendor for further processing.

Patent
01 Jun 2012
TL;DR: In this paper, a method for the use of electronic transactional tokens includes: generating a plurality of tokens including a first token, associating each token with a user, the first token associated with a first user, and monitoring usage of the transactional token in a majority of transactions in a local region or network.
Abstract: A method for the use of electronic transactional tokens includes: generating a plurality of transactional tokens including a first token; associating each of the transactional tokens with a plurality of users, the first token associated with a first user; monitoring usage of the transactional tokens in a plurality of transactions in a local region or network; and in response to receiving transactional data for the first transaction, updating the first token from a first state to a second state (e.g., to provide a benefit when the token is applied in the local region or network). The tokens may be generated and monitored using a token processing system, which uses transaction data received by a transaction handler that is handling transaction processing for the transactions.

Patent
19 Apr 2012
TL;DR: In this article, a method for the use of electronic transactional tokens includes: generating transactional token including a first token, associating each of the tokens with one of a group of users, monitoring usage of the transactional transactions by the users; and responsive to the monitoring, updating the first token from a first state to a second state.
Abstract: A method for the use of electronic transactional tokens includes: generating transactional tokens including a first token; associating each of the transactional tokens with one of a group of users; monitoring usage of the transactional tokens in a multitude of transactions by the users; and responsive to the monitoring, updating the first token from a first state to a second state. The tokens may be generated and monitored using a token processing system, which uses transaction data received by a transaction handler that is handling transaction processing for the transactions.

Journal ArticleDOI
TL;DR: In this paper, various models are constructed that examine how supply chain actors' usage of contracts to manage their exposure to supply-demand-side transaction risks can affect the exposure to demand (supply) side transaction risks.
Abstract: How supply chain actors manage their exposure to both supply- and demand-side risks is a topic that has been insufficiently examined within the transaction cost economics (TCE) literature. TCE studies often only examine transaction risks in the context of bilateral exchanges. This study aims to contribute to a shift within the TCE literature from a focus on bilateral transactions, to examining transactions within a supply chain context. In this article, various models are constructed that examine how supply chain actors' usage of contracts to manage their exposure to supply (demand)-side transaction risks can affect their exposure to demand (supply)-side transaction risks. The models show that when supply chain actors follow the recommendations from the traditional TCE model regarding the use of contracts, it may increase rather than decrease their exposure to transaction risks. However, when supply chain actors take into account simultaneously both supply- and demand-side transactions when making their contract decisions, as is recommended in this article, a reduction in exposure to transaction risks is more likely. This study offers managers’ various strategies for taking a supply chain-wide approach to reduce transaction risk exposure.

Patent
04 Mar 2012
TL;DR: In this article, one or more computers retrieve records of transactions to be analyzed together, each record identifies a date of a transaction, an amount of the transaction, a person associated with the transaction and a category into which the transaction is classified.
Abstract: One or more computers retrieve records of transactions to be analyzed together. Each record identifies a date of a transaction, an amount of the transaction, a person associated with the transaction, and a category into which the transaction is classified. The one or more computers automatically prepare in computer memory, a set of tuples (also called “vectors”) corresponding to a set of persons identified in the retrieved records. Each tuple corresponds to one person, and each tuple includes at least one number representing a count within each category, of transactions classified therein, e.g. total number of cash transactions in category X. Then, the one or more computers automatically identify a subset of outliers, e.g. by grouping the tuples into clusters using k-means clustering, followed by marking in memory an indication of inappropriateness of any transaction that had been included in the count of a tuple now identified to be outlier.

Patent
Ayman Hammad1, Matthew Joy1, Joseph Spears1, Mark Carlson1, Patrick Stan1 
27 Mar 2012
TL;DR: In this article, the authors present a system to integrate offer processing in a social networking environment, which includes a data warehouse configured to store data associating social networking accounts of a user with a financial payment account of the user.
Abstract: Systems and methods to integrate offer processing in a social networking environment. A computing apparatus includes: a data warehouse configured to store data associating a social networking account of a user with a financial payment account of the user; a portal configured to provide an offer to the user of the social networking account and to store data associating the offer with the financial payment account; a transaction handler configured to monitor transactions in the financial payment account of the user and detect a transaction that satisfies a set of requirements of the offer, when an authorization request for the transaction is being processed by the transaction handler; a message broker configured to generate a message in response to the transaction being detected; and a media controller coupled with the message broker to communicate the message to a social networking site.