US20180053167A1 - Processing of financial transactions using debit networks - Google Patents
Processing of financial transactions using debit networks Download PDFInfo
- Publication number
- US20180053167A1 US20180053167A1 US15/803,103 US201715803103A US2018053167A1 US 20180053167 A1 US20180053167 A1 US 20180053167A1 US 201715803103 A US201715803103 A US 201715803103A US 2018053167 A1 US2018053167 A1 US 2018053167A1
- Authority
- US
- United States
- Prior art keywords
- account
- transaction
- merchant
- financial
- time password
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Abandoned
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/08—Payment architectures
- G06Q20/20—Point-of-sale [POS] network systems
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/30—Payment architectures, schemes or protocols characterised by the use of specific devices or networks
- G06Q20/36—Payment architectures, schemes or protocols characterised by the use of specific devices or networks using electronic wallets or electronic money safes
- G06Q20/367—Payment architectures, schemes or protocols characterised by the use of specific devices or networks using electronic wallets or electronic money safes involving electronic purses or money safes
- G06Q20/3674—Payment architectures, schemes or protocols characterised by the use of specific devices or networks using electronic wallets or electronic money safes involving electronic purses or money safes involving authentication
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/382—Payment protocols; Details thereof insuring higher security of transaction
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/40—Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
- G06Q20/401—Transaction verification
- G06Q20/4012—Verifying personal identification numbers [PIN]
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q30/00—Commerce
- G06Q30/06—Buying, selling or leasing transactions
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
Definitions
- This application relates generally to financial transactions. More specifically, this application relates to processing of financial transactions using debit networks.
- Some of the more prevalent forms of transactions may be characterized as credit transactions, debit transactions, and stored-value transactions. Each of these transactions differs in the manner in which access to funds is provided to the consumer.
- credit transactions are supported by funds provided by a creditor to a customer.
- the principal example of such credit transactions are credit-card transactions in which the creditor issues a card to the customer that the customer may use as a presentation instrument to identify a credit account.
- funds are drawn against the credit account, which usually has a pre-established credit limit, to support the transaction.
- a stored-value transaction is one in which funds have been specifically set aside and associated with a presentation instrument so that they may be used to support a transaction.
- stored-value instruments are anonymous in that the funds are associated only with the instrument and not with any particular person. This has the advantage that such instruments may be easily transferred and they find wide utility as gift cards. This gift aspect is frequently reinforced by imposing restrictions on the merchant with whom transactions may be executed with the set-aside funds.
- Debit transactions may also make use of a presentation instrument and are similar to stored-value transactions in that specifically identified funds are used to support the transactions.
- the source of funds for a debit transaction is specifically identified with a holder of the account that holds the funds and this account is usually a demand-deposit account maintained at a financial institution.
- the funding of the account varies over time as deposits and withdrawals are made from the account in response to receipt of wages, paying bills, etc.
- Debit accounts generally differ from stored-value accounts in that the account owner is provided with open-ended access, with all activity being based on the currently available funds level.
- Stored-value transactions might be considered to be a subset of debit transactions in which some money is set aside, but where there is no free access to funds in the account. For instance, some stored-value accounts do not allow additional deposits, permitting only withdrawals to be made from the accounts in accordance with governing restrictions of the accounts.
- the ability to transfer funds from a demand-deposit or other type of account in such a short time period is enabled by the use of one or more electronic networks provided as part of a financial infrastructure. Communications routed over these networks permit decisions to be made in real time whether the criteria for executing a transaction—valid accounts are identified, there are sufficient funds in the supporting account, identity-verification protocols have been satisfied, etc.—are met.
- Such debit transactions are of particular interest to many merchants because they remove the element of trust that is required of other transactions.
- the time lag of check transactions runs the risk that the check will be refused, forcing the merchant to expend time and effort in recovering funds due for a previously executed transaction.
- credit transactions usually involve some authorization process, there are mechanisms that may be used after the fact to prevent the payment from being made. From the perspective of merchants, debit transactions have the advantage that funds are received substantially contemporaneously with execution of the transaction itself. If there are later disputes regarding the transaction, the merchant is in the superior position by having possession of the funds at that time.
- Embodiments of the invention provide methods and systems for executing financial transactions between customers and merchants.
- an identifier of a financial account is received from the customer at a merchant system.
- a one-time password is also received from the customer at the merchant system, with the customer having been provided with the one-time password by a mobile electronic device or a contactless presentation instrument.
- a cryptogram is generated, with the cryptogram comprising the identifier of the financial account encrypted using the one-time password.
- An authorization request is formulated at the merchant system.
- the authorization request comprises the cryptogram and transaction information describing at least a portion of the financial transaction.
- the authorization request is transmitted from the merchant system to an authorization processor for authorization of the financial transaction.
- an encrypted authorization request is received from a merchant system at an authorization processor, with the authorization request having been encrypted by application of a one-time password provided to the customer by a debit presentation instrument.
- the authorization request is decrypted.
- a financial account is identified from the decrypted authorization request.
- Transaction information describing at least a portion of the financial transaction is determined from the decrypted authorization request.
- Authenticity of the transaction information is determined by validating the one-time password. It is determined whether the identified financial account is capable of supporting the financial transaction based on the transaction information.
- the identifier may comprise an account number of the financial account. In other instances, it may comprise an identification number extracted from a presentation instrument, with the identification number being translated to an account number of the financial account.
- the one-time password may comprise a two-factor one-time password. In certain cases, the one-time password is a second one-time password provided to the customer by the mobile electronic device after passage of an expiry time after a first one-time password is provided to the customer by the mobile electronic device. In some cases, an intermediate authentication processor translates the identifier to a primary account number or card number that the authorization processor recognizes.
- a personal identification number is received from the customer at the merchant system, with the authorization request further comprising the personal identification number.
- Cryptographic keys used to generate the one-time password on the presentation instrument, and to validate the one-time password on the authentication processor may either be generated on the presentation instrument and transferred to the authentication processor, or be generated on the authentication processor and transferred to the presentation instrument.
- the merchant system may sometimes comprise an Internet web server and, at other times, comprises a merchant point-of-sale device.
- the mobile electronic device may comprise a cellular telephone.
- the transaction information comprises a total cost for the financial transaction, or other descriptional data elements of the transaction such as location, terminal identifier, terminal sequence number, date, and/or time.
- Methods of the invention may also be embodied by a computer-readable storage medium having a computer-readable program embodied therein for directing operation of a merchant system or of an authorization processor, either of which may include a communications system, a processor, and a storage device.
- the computer-readable program includes instructions for operating the respective devices to implement the methods as described above.
- FIG. 1 is a schematic illustration of a financial architecture within which embodiments of the invention may be executed
- FIG. 2 is a schematic illustration of a computational unit that may be included as parts of elements of the financial architecture of FIG. 1 ;
- FIG. 3 is a flow diagram summarizing methods of providing cards suitable for use in contactless debit transactions to customers;
- FIG. 4 is a flow diagram summarizing methods of enabling mobile electronic devices to be used by customers in debit transactions
- FIG. 5 is a flow diagram summarizing enrollment methods used in some embodiments of the invention.
- FIG. 6 is a flow diagram summarizing methods of executing debit transactions using the cards provided with the method of FIG. 3 ;
- FIG. 7 is a flow diagram summarizing methods of executing debit transactions using mobile electronic devices configure according to the method of FIG. 4 ;
- FIG. 8 is a flow diagram summarizing use of a federated authentication web service to execute transactions in accordance with certain embodiments of the invention.
- Embodiments of the invention provide a number of different techniques for executing debit transactions. Some of these embodiments involve the use of “contactless” transactions that make use of a presentation instrument.
- a presentation instrument may take a form that is conventional in appearance, such as in the form of a credit-card-sized card, or may take a less conventional form, examples of which include key fobs or other kinds of instruments.
- Contactless transactions may be executed in some embodiments with a mobile electronic device. Transactions that are “contactless” are those that are executed with only wireless interaction between the presentation instrument and a merchant point-of-sale device.
- Conventional debit transactions involve contact between these elements because account information is conventionally stored on one or more tracks of a magnetic stripe that is affixed to the presentation instrument.
- the architecture 100 is structured generally around a debit network 120 , but it should be recognized that this is a depiction of only a portion of a larger financial infrastructure within which the architecture may be embodied.
- Other financial networks used in implementing credit, stored-value, or other types of transactions may be provided in communication with some of the elements shown in this drawing, even if not explicitly indicated.
- the debit network 120 generally comprises a private electronic communications network that implements security protocols commensurate with the sensitive nature of the financial information that is routed through the network 120 . Such security protocols and methods for their implementation are well known to those of skill in the art.
- Interactions with the debit network 120 are provided through a variety of different kinds of processors that are interfaced with the network.
- front-end interactions may take place through an acquiring processor 116 that is in communication with the Internet 112 and/or point-of-sale devices 108 that are used in execution of the underlying financial transactions.
- the back-end interactions may take place with an authentication processor 124 , the specific functionality of which is described in further detail for some embodiments below.
- Other communications within the architecture 100 may take place through a mobile network 110 that is interfaced with an over-the-air processor.
- the authentication processor 124 and over-the-air processor 126 may each make use of data stored in respective databases 128 and 130 .
- Endpoints of the architecture 100 are a customer 104 who interacts with the Internet 112 and/or point-of-sale device 108 to interface with the front end and issuer systems 132 that are in communication with the authentication processor 124 .
- the issuer systems 132 may act as authorization processors as described in specific detailed embodiments below.
- the customer 104 may have supplementary interactions with the architecture through a mobile electronic device 106 and/or may use a contactless presentation instrument 107 depending on specific implementations. These interactions proceed through the mobile network 110 that is accessible by the mobile electronic device and that is in communication with the over-the-air processor 128 .
- Each of the issuer systems 132 is a computational system that is operated by an issuer of the presentation instrument or that manages the account used to support the transaction.
- issuers are thus frequently financial institutions such as banks, credit unions, or the like, that maintain demand-deposit or other types of financial accounts that may be used to support debit transactions.
- FIG. 2 provides a schematic illustration of a physical structure that may be used to implement different computational systems that may form part of the architecture 100 of FIG. 1 .
- the computational systems 200 shown in FIG. 2 might correspond to a structure used for the mobile electronic device 106 , for the contactless presentation instrument 107 , for the acquiring processor 116 , for the authentication processor 124 , for the over-the-air processor 126 , and/or for any of the issuer systems 132 in different embodiments.
- FIG. 2 broadly illustrates how individual system elements may be implemented in a separated or more integrated manner.
- the computational system 200 is shown comprised of hardware elements that are electrically coupled via bus 226 , including a processor 202 , an input device 204 , an output device 206 , one or more storage devices 208 , a computer-readable storage media reader 210 a , a communications system 214 , a processing acceleration unit 216 such as a DSP or special-purpose processor, and a memory 218 .
- the computer-readable storage media reader 210 a is further connected to a computer-readable storage medium 210 b , the combination comprehensively representing remote, local, fixed, and/or removable storage devices plus storage media for temporarily and/or more permanently containing computer-readable information.
- the communications system 214 may comprise a wired, wireless, modem, and/or other type of interfacing connection and permits data to be exchanged within the architecture 100 to implement embodiments described herein.
- the computational system 200 also comprises software elements, shown as being currently located within working memory 220 , including an operating system 224 and other code 222 , such as a program designed to implement methods of the invention. It will be apparent to those skilled in the art that substantial variations may be made in accordance with specific requirements. For example, customized hardware might also be used and/or particular elements might be implemented in hardware (perhaps including tamper-resistant storage media for secure storage of cryptographic keys), software (including portable software, such as applets), or both. Further, connection to other computing devices such as network input/output devices may be employed.
- a customer 104 may first be enrolled. Such enrollment establishes sets of data that may be used and manipulated in implementing embodiments of the invention. Such data may be stored in the databases 128 and/or 130 as well as on the presentation instrument and/or mobile electronic device 106 .
- a general overview of how enrollment may be accomplished in embodiments that use physical presentation instruments is provided with the flow diagram of FIG. 3
- a corresponding overview of how enrollment may be accomplished in embodiments that make use of mobile electronic devices is illustrated with the flow diagram of FIG. 4 .
- Block 304 of FIG. 3 accordingly indicates that a production file is prepared by an issuer processor.
- a production file typically includes information defining the nature of the individual presentation instruments. For instance, when the presentation instruments comprise cards, the production file may include numbers to be embossed on the cards. It may also include information identifying the individuals to be associated with each instrument, as well as identifying the financial account that will be used to support transactions executed with the instruments.
- a manufacturer of presentation instruments may also produce blank versions of the instruments at block 308 . For example, when the presentation instruments comprise cards, blank versions of the cards may be prepared by a card manufacturer that include a debit application that will be executed when performing debit transaction.
- each of these instruments is equipped with structure that enables them to be used in contactless communications.
- the instrument may have an embedded electromagnetic chip that receives and transmits electromagnetic signals at radio or other frequencies. Once created, these instruments are delivered by the card manufacturer to the card producer at block 312 .
- the card producer may engage in personalization processes at block 316 by writing information to the blank instruments in accordance with the specifications in the production file.
- This initial personalization may include both direct physical alterations to the instrument, such as when cards are embossed with card numbers, and may additionally include writing data to storage maintained on the instrument itself. For instance, card numbers, cryptographic keys, account or identification numbers, and/or merchant loyalty identification numbers, in addition to other data, may additionally be stored as data on the card so that this information may be accessed and transmitted as appropriate in implementing embodiments of the invention.
- the card producer may implement certain encryption protocols that will be used in enhancing the security of transactions executed with the instruments.
- public-key-private-key encryption is used within a public-key infrastructure (“PKI”).
- PKI public-key infrastructure
- the card producer generates a PKI key pair for each card, referred to herein as the “card encryption key pair.”
- the public key of the pair is transmitted by the card producer, together with an indication of the card number that it refers to, to the authentication processor 124 at block 324 and the private key of the pair is retained on the card. Having been so prepared, the instrument is ready for transmission to the customer at block 328 .
- the production file may be provided to the authentication processor 124 at block 132 .
- the combination of the production file and the key information received from the card producer provides the authentication processor 124 with sufficient information to authenticate transactions as they are performed with the instruments. Both of these forms of information may be stored in database 128 .
- the individual instruments may be activated after receipt by customers at block 336 using a process defined by the issuer producer. In some instances, this activation is performed by interactions between the customer 104 and the authentication processor 124 , such as may be achieved over the Internet, through the use of a voice-response unit, or the like.
- One purpose of this activation step is to reduce the risk of fraud by confirming receipt of the instrument by the correct customer 104 . A comparison can accordingly be made between information provided by the customer 104 during this activation with information extracted from the production file by the authentication processor 124 .
- the presentation instruments may be created with certain redundancies of information. This is especially suitable, for example, in embodiments where a card is to be equipped for both contactless and conventional transactions.
- Such multifunction cards may include an electromagnetic chip such as a radio-frequency identification chip to perform contactless transactions as well as a magnetic stripe or other mechanism that stores information that can be read by a device in contact with the card.
- the method may begin, for example, with the customer visiting an Internet web site managed by the over-the-air processor 126 at block 404 .
- This web site acts as a provisioning web site that may be used by the over-the-air processor 126 in effecting enrollment functions.
- the customer provides enrollment information at block 408 .
- Such enrollment information may comprise, for example, an identification number that generally corresponds to the card number of a debit card in more conventional debit transactions, in addition to the access number for the mobile device 106 to be enrolled.
- This information is used by the over-the-air processor 126 at block 412 to enroll the identification number with the authentication processor 124 at block 412 .
- An exchange of verification information acts to confirm that the correct mobile device 106 is enrolled.
- One example of such an exchange shown in FIG. 4 involves the transmission of a short-message-service (“SMS”) message to the mobile device 106 identified by the access number provided at block 408 .
- SMS message includes a provisioning URL that is used by the customer to confirm the verification information.
- the over-the-air processor 126 downloads a software debit application to the mobile device 106 .
- the debit application resident on the mobile electronic device 106 generates a cryptographic key at block 428 .
- This cryptographic key is a direct analogue of the key discussed in connection with FIG. 3 for the generation of presentation instruments.
- the debit application transmits the cryptographic key using the mobile device to the over-the-air process 126 .
- the over-the-air processor 126 then transmits it to the application processor 124 at block 436 , resulting in the authentication processor 124 now having all the requisite information to process a transaction in the manner described below.
- FIG. 5 is a flow diagram that summarizes a provisioning using the over-the-air processor 126 that may be used in some embodiments.
- provisioning permits enrollment to be accomplished by the customer using a combination of information provided over an Internet connection to a web site and information provided over a mobile network 110 from a mobile electronic device 106 .
- the method begins at block 504 with the customer visiting the enrollment web site. Once connected to this site, the customer enters the identification number at block 508 . Similar to the description of the processes of FIG. 4 , such an identification number may correspond to a more conventional card number of a debit card.
- the customer enters the PIN on the mobile electronic device 106 using an interface for doing generated for display on the mobile electronic device.
- This information is transmitted from the mobile electronic device 106 over the mobile network 110 to the over-the-air processor 126 at block 516 .
- the combination of information is provided to the authentication processor 124 , with the over-the-air processor 126 transmitting the PIN to the authentication process 124 at block 520 and the enrollment web site transmitting the identification number to the authentication processor 124 at block 524 .
- This combination of information is then used by the authentication processor 124 at block 528 to complete the enrollment of the mobile electronic device 106 , permitting it subsequently to be used as a presentation instrument.
- FIGS. 6 and 7 are flow diagrams that illustrate methods that may be implemented to support debit transactions using the contactless presentation instruments or mobile electronic devices enrolled in accordance with FIGS. 3 and 4 .
- FIG. 6 provides an illustration of methods for executing and supporting debit transactions made using a contactless card. Such transactions generally take place at a physical merchant location, with the drawing accordingly indicating that the method begins at block 604 with a customer selecting goods and/or services for purchase at the merchant location. If the transaction is not to be completed as a contactless transaction, the instrument may be swiped at block 648 to read information from a magnetic stripe or otherwise read with a device in contact with the instrument to proceed with a conventional form of transaction.
- the instrument is activated with a contactless mechanism at block 612 . It is anticipated that such activation will normally be accomplished using an electromagnetic mechanism, although any contactless mechanism that may be implemented may be used in alternative embodiments.
- the flow diagram also accounts for the fact that different kinds of transactions may be supported as contactless transactions.
- One distinction that may be made among transactions is the need to supply a personal identification number (“PIN”) as evidence of authorization to use the presentation instrument.
- PIN is a number that is preferably kept secret by the account owner so that that person is the only one authorized to use the instrument, but in practice PIN's are sometimes shared with family members or friends who are authorized by the account holder to execute transactions with the instrument. While the PIN offers a higher level of security for transactions, there are embodiments in which transactions will be permitted without verification of a PIN. These transactions are typically smaller transactions, so that a particular embodiment might permit transactions to be executed without a PIN when they are less than $25 but require a PIN when the transaction size exceeds $25. If the transaction is to be a PIN transaction as checked at block 616 , the customer enters the PIN information with the point-of-sale device 108 at block 652 .
- account information is retrieved contactlessly from the presentation instrument by the point-of-sale device 108 .
- the content of this information may vary in different embodiments, with it including or not including PIN information in accordance with the type of transaction being executed.
- the account information is signed digitally with the card key that is resident on the presentation instrument at block 620 .
- This signed account information is transmitted at block 624 in a contactless way from the presentation instrument to the point-of-sale device 108 .
- Merchant point-of-sale devices 108 may deliver transaction data elements to the contactless presentation instrument during the contactless transaction session and such data elements may be included in derivation of the transaction digital signature.
- the merchant point-of-sale device 108 has sufficient information to generate a transaction request at block 628 by combining the signed account information with transaction information.
- the transaction information usually specifies at least a total amount for the transaction and an account under the control of the merchant to which the transaction amount is to be transferred. In certain circumstances, the transaction information may include other information, such as the location at which the transaction is to be executed, the specific items comprised by the transaction, and the like.
- the resulting transaction request is transmitted by the merchant point-of-sale device 108 to the authentication processor 124 , which is then equipped to parse the transaction request to extract the information needed to make an authentication decision.
- the customer-account information comprised by the transaction request may be resolved with the card public key at block 632 , permitting the authentication processor 124 to identify the issuer and specific account to be used in supporting the transaction.
- the decision-making process implemented by the authentication processor 124 may be relatively simple.
- a check is made by the at block 636 to validate the cryptogram included in the encrypted authorization request transaction. If this authentication check fails, a transaction denial code is returned to the merchant point-of-sale device 108 at block 656 so that the merchant can refuse the transaction or request some other financial support for it from the customer 104 .
- the authorization request transaction is forwarded to an authorization processor 132 to determine whether there are sufficient funds in the identified account to cover the transaction amount. If there are sufficient funds in the identified account, as checked at block 641 , a transaction authorization code is returned by the authentication processor 124 at block to the merchant point-of-sale device 108 , indicating to the merchant that the transaction may be completed at block 644 . Funds are debited in real time from the customer account and transferred to the control of the merchant by depositing them into the merchant account identified with the transaction request. If there are insufficient funds, a transaction denial code may be returned by the authentication processor 124 to the merchant point-of-sale device 108 at block 642 .
- the authorization decision may be more complex than simply considering whether the total transaction amount exceeds the funds available in the customer account.
- some implementations include item-level restrictions that the funds may be applied to so that the customer is restricted in use of those funds to purchasing only certain approved items.
- the customer account might be restricted so that its funds can only be applied to transactions executed at certain approved merchants.
- the decision-making processes applied by the authentication processor 124 may consider the data received as part of the transaction request on this more detailed level to determine whether to authorize the transaction.
- Block 704 indicates that the customer 104 selects goods and/or services to purchase from a merchant at block 704 . These goods and services may be purchased at a merchant location or may be purchased remotely such as over the Internet 112 , the different transaction types resulting in different processing described below.
- the signed account information is used by the merchant point-of-sale device 108 in generating a transaction request that is then transmitted to the authentication processor at block 724 .
- the transaction request may include details of the transaction, usually including at least a transaction amount but perhaps sometimes additionally including such information as item-level identifications of the specific goods and services that form part of the transaction.
- the customer may enter the PIN using the keypad on the mobile device at block 730 and the mobile device 106 may load a one-time password at block 728 .
- the one-time password comprises a two-factor one-time password.
- factors may include something that the customer has, something that the customer knows, and something that the customer is.
- a two-factor one-time password is based on two such factors.
- the two factors are something that the customer has, such as possession of the presentation instrument, and something that the customer knows, such as the PIN.
- the customer enters the identification number for his account at block 732 with the password read from the mobile device.
- Subsequent processing of the transaction is similar to conventional processing, irrespective of whether the authorization request is received from a point-of-sale device 106 or from a merchant web server.
- the authentication processor resolves the account information from the authorization request at block 748 by applying decryption techniques. If the digital signature fails to pass validation as checked at block 752 , then a transaction denial code is returned by the authentication processor 124 at block 754 . If the digital signature passes validation, the transaction request is forwarded to the authorization processor 132 at block 756 , permitting a check to be made at block 758 whether there are sufficient funds in the identified account. If not, a transaction denial code is returned by the authorization processor 132 is returned at block 760 . If both the digital signature pass and there are sufficient funds in the account, the transaction is completed at block 762 .
- FIG. 8 is a flow diagram that summarizes methods of executing certain Internet-based transactions. These methods may be implemented using merchants that provide web sites that participate in the program, sometimes referred to herein as implementing “federated authentication.”
- federated authentication When a customer enters one of these participating web sites, as indicated at block 804 , he or she may enter conventional identification information to log into the web site at block 808 .
- Such conventional identification information will frequently take the form of a userid, but may use other forms of identification known in the art.
- the customer enters the PIN for the presentation instrument on the mobile electronic device at block 812 , with the device responding to correct entry of the PIN by displaying a one-time password at block 816 .
- the one-time password sometimes comprises a two-factor one-time password.
- This password is used by the customer to complete the log in to the participating web site at block 820 , permitting the customer to enter into and complete a transaction at block 824 .
- the security information that is used in the methods described in connection with either FIG. 7 or FIG. 8 may vary over time. That is, when a two-factor one-time password is generated, it may have a limited time of validity. In such embodiments, the customer 104 must generally provide the password within the limited time to validate the transaction. After the time period has expired, a new one-time password is generated that must be received in order to validate the transaction within a separate time period. Such a feature further enhances the overall security of the transaction methods.
Landscapes
- Business, Economics & Management (AREA)
- Accounting & Taxation (AREA)
- Engineering & Computer Science (AREA)
- Finance (AREA)
- Theoretical Computer Science (AREA)
- General Business, Economics & Management (AREA)
- General Physics & Mathematics (AREA)
- Physics & Mathematics (AREA)
- Strategic Management (AREA)
- Computer Security & Cryptography (AREA)
- Development Economics (AREA)
- Economics (AREA)
- Marketing (AREA)
- Computer Networks & Wireless Communication (AREA)
- Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
- Cash Registers Or Receiving Machines (AREA)
Abstract
Methods and systems are disclosed for executing financial transactions between customers and merchants. An identifier of a financial account is received from the customer at a merchant system. A one-time password is also received from the customer at the merchant system, with the customer having been provided with the one-time password by a mobile electronic device or contactless presentation instrument. A cryptogram is generated to include the identifier of the financial account encrypted using the one-time password. An authorization request is formulated at the merchant system. The authorization request includes the cryptogram and transaction information describing at least a portion of the financial transaction. The authorization request is transmitted from the merchant system to an authorization processor for authorization of the financial transaction.
Description
- This application is a divisional of U.S. application Ser. No. 11/677,960, entitled “Processing of Financial Transactions Using Debit Networks,” filed Feb. 22, 2007, the entire contents of which are incorporated by reference herein.
- This application is related to commonly assigned, concurrently filed U.S. Pat. appl. Ser. No. 11/677,967, entitled, “MANAGEMENT OF FINANCIAL TRANSACTIONS USING DEBIT NETWORKS,” filed by Vijay Royyuru and Robert Freisheim (Attorney Docket No. 20375-081000US), the entire disclosure of which is incorporated herein by reference for all purposes.
- This application relates generally to financial transactions. More specifically, this application relates to processing of financial transactions using debit networks.
- In a modern commercial environment, there is an array of different financial products that consumers have available to them in executing financial transactions. Some of the more prevalent forms of transactions may be characterized as credit transactions, debit transactions, and stored-value transactions. Each of these transactions differs in the manner in which access to funds is provided to the consumer. For example, credit transactions are supported by funds provided by a creditor to a customer. The principal example of such credit transactions are credit-card transactions in which the creditor issues a card to the customer that the customer may use as a presentation instrument to identify a credit account. When the transaction is executed, funds are drawn against the credit account, which usually has a pre-established credit limit, to support the transaction.
- The other major types of financial transactions also make use of presentation instruments. A stored-value transaction is one in which funds have been specifically set aside and associated with a presentation instrument so that they may be used to support a transaction. In most cases, such stored-value instruments are anonymous in that the funds are associated only with the instrument and not with any particular person. This has the advantage that such instruments may be easily transferred and they find wide utility as gift cards. This gift aspect is frequently reinforced by imposing restrictions on the merchant with whom transactions may be executed with the set-aside funds.
- Debit transactions may also make use of a presentation instrument and are similar to stored-value transactions in that specifically identified funds are used to support the transactions. The source of funds for a debit transaction is specifically identified with a holder of the account that holds the funds and this account is usually a demand-deposit account maintained at a financial institution. As such, the funding of the account varies over time as deposits and withdrawals are made from the account in response to receipt of wages, paying bills, etc. Debit accounts generally differ from stored-value accounts in that the account owner is provided with open-ended access, with all activity being based on the currently available funds level. Stored-value transactions might be considered to be a subset of debit transactions in which some money is set aside, but where there is no free access to funds in the account. For instance, some stored-value accounts do not allow additional deposits, permitting only withdrawals to be made from the accounts in accordance with governing restrictions of the accounts.
- The ability to transfer funds from a demand-deposit or other type of account in such a short time period is enabled by the use of one or more electronic networks provided as part of a financial infrastructure. Communications routed over these networks permit decisions to be made in real time whether the criteria for executing a transaction—valid accounts are identified, there are sufficient funds in the supporting account, identity-verification protocols have been satisfied, etc.—are met. Such debit transactions are of particular interest to many merchants because they remove the element of trust that is required of other transactions. The time lag of check transactions runs the risk that the check will be refused, forcing the merchant to expend time and effort in recovering funds due for a previously executed transaction. And while credit transactions usually involve some authorization process, there are mechanisms that may be used after the fact to prevent the payment from being made. From the perspective of merchants, debit transactions have the advantage that funds are received substantially contemporaneously with execution of the transaction itself. If there are later disputes regarding the transaction, the merchant is in the superior position by having possession of the funds at that time.
- There is accordingly a general need in the art for improved methods and systems of supporting debit transactions.
- Embodiments of the invention provide methods and systems for executing financial transactions between customers and merchants. In a first set of embodiments, an identifier of a financial account is received from the customer at a merchant system. A one-time password is also received from the customer at the merchant system, with the customer having been provided with the one-time password by a mobile electronic device or a contactless presentation instrument. A cryptogram is generated, with the cryptogram comprising the identifier of the financial account encrypted using the one-time password. An authorization request is formulated at the merchant system. The authorization request comprises the cryptogram and transaction information describing at least a portion of the financial transaction. The authorization request is transmitted from the merchant system to an authorization processor for authorization of the financial transaction.
- In a second set of embodiments, an encrypted authorization request is received from a merchant system at an authorization processor, with the authorization request having been encrypted by application of a one-time password provided to the customer by a debit presentation instrument. The authorization request is decrypted. A financial account is identified from the decrypted authorization request. Transaction information describing at least a portion of the financial transaction is determined from the decrypted authorization request. Authenticity of the transaction information is determined by validating the one-time password. It is determined whether the identified financial account is capable of supporting the financial transaction based on the transaction information.
- In either set of embodiments, there may be a number of specific features. For example, the identifier may comprise an account number of the financial account. In other instances, it may comprise an identification number extracted from a presentation instrument, with the identification number being translated to an account number of the financial account. The one-time password may comprise a two-factor one-time password. In certain cases, the one-time password is a second one-time password provided to the customer by the mobile electronic device after passage of an expiry time after a first one-time password is provided to the customer by the mobile electronic device. In some cases, an intermediate authentication processor translates the identifier to a primary account number or card number that the authorization processor recognizes. In certain embodiments, a personal identification number is received from the customer at the merchant system, with the authorization request further comprising the personal identification number. Cryptographic keys used to generate the one-time password on the presentation instrument, and to validate the one-time password on the authentication processor, may either be generated on the presentation instrument and transferred to the authentication processor, or be generated on the authentication processor and transferred to the presentation instrument.
- The merchant system may sometimes comprise an Internet web server and, at other times, comprises a merchant point-of-sale device. The mobile electronic device may comprise a cellular telephone. In some embodiments, the transaction information comprises a total cost for the financial transaction, or other descriptional data elements of the transaction such as location, terminal identifier, terminal sequence number, date, and/or time.
- Methods of the invention may also be embodied by a computer-readable storage medium having a computer-readable program embodied therein for directing operation of a merchant system or of an authorization processor, either of which may include a communications system, a processor, and a storage device. The computer-readable program includes instructions for operating the respective devices to implement the methods as described above.
- A further understanding of the nature and advantages of the present invention may be realized by reference to the remaining portions of the specification and the drawings wherein like reference numerals are used throughout the several drawings to refer to similar components. In some instances, a sublabel is associated with a reference numeral and follows a hyphen to denote one of multiple similar components. When reference is made to a reference numeral without specification to an existing sublabel, it is intended to refer to all such multiple similar components.
-
FIG. 1 is a schematic illustration of a financial architecture within which embodiments of the invention may be executed; -
FIG. 2 is a schematic illustration of a computational unit that may be included as parts of elements of the financial architecture ofFIG. 1 ; -
FIG. 3 is a flow diagram summarizing methods of providing cards suitable for use in contactless debit transactions to customers; -
FIG. 4 is a flow diagram summarizing methods of enabling mobile electronic devices to be used by customers in debit transactions; -
FIG. 5 is a flow diagram summarizing enrollment methods used in some embodiments of the invention; -
FIG. 6 is a flow diagram summarizing methods of executing debit transactions using the cards provided with the method ofFIG. 3 ; -
FIG. 7 is a flow diagram summarizing methods of executing debit transactions using mobile electronic devices configure according to the method ofFIG. 4 ; and -
FIG. 8 is a flow diagram summarizing use of a federated authentication web service to execute transactions in accordance with certain embodiments of the invention. - Embodiments of the invention provide a number of different techniques for executing debit transactions. Some of these embodiments involve the use of “contactless” transactions that make use of a presentation instrument. In many instances, such a presentation instrument may take a form that is conventional in appearance, such as in the form of a credit-card-sized card, or may take a less conventional form, examples of which include key fobs or other kinds of instruments. Contactless transactions may be executed in some embodiments with a mobile electronic device. Transactions that are “contactless” are those that are executed with only wireless interaction between the presentation instrument and a merchant point-of-sale device. Conventional debit transactions involve contact between these elements because account information is conventionally stored on one or more tracks of a magnetic stripe that is affixed to the presentation instrument. These tracks are read by swiping the presentation instrument through a magnetic-stripe reader comprised by the point-of-sale device. While some forms of contactless transaction have been attempted in the past, these have involved such techniques as optically reading a bar code from a presentation instrument, often requiring that certain information conventionally stored on the magnetic-stripe tracks be stored instead in a database that forms part of the financial architecture, i.e. either locally to the point-of-sale device or at some other location in communication with the point-of-sale device. Other forms of contactless transactions have involved transmission of the same data from the presentation instrument to a the merchant point-of-sale device, as would have been transmitted for a magnetic-stripe card. There are also a number of security issues associated with such arrangements. Embodiments of the invention use a structure in which both the information-management and security issues are better addressed.
- Other embodiments of the invention provide techniques for using mobile electronic devices in executing Internet-based transactions. Examples of mobile electronic devices that may be used in different embodiments include mobile telephones, personal digital assistants, and the like. In some instances, the description may refer by way of example to the use of mobile telephones, it being understood that such references are intended merely to be illustrative and not to be limiting.
- These various embodiments may be implemented in a financial architecture like that shown in
FIG. 1 . In this illustration, thearchitecture 100 is structured generally around adebit network 120, but it should be recognized that this is a depiction of only a portion of a larger financial infrastructure within which the architecture may be embodied. Other financial networks used in implementing credit, stored-value, or other types of transactions may be provided in communication with some of the elements shown in this drawing, even if not explicitly indicated. Thedebit network 120 generally comprises a private electronic communications network that implements security protocols commensurate with the sensitive nature of the financial information that is routed through thenetwork 120. Such security protocols and methods for their implementation are well known to those of skill in the art. - Interactions with the
debit network 120 are provided through a variety of different kinds of processors that are interfaced with the network. For example, front-end interactions may take place through an acquiringprocessor 116 that is in communication with theInternet 112 and/or point-of-sale devices 108 that are used in execution of the underlying financial transactions. The back-end interactions may take place with anauthentication processor 124, the specific functionality of which is described in further detail for some embodiments below. - Other communications within the
architecture 100 may take place through amobile network 110 that is interfaced with an over-the-air processor. Theauthentication processor 124 and over-the-air processor 126 may each make use of data stored inrespective databases - Endpoints of the
architecture 100, at least from the perspective of the kinds of transactions discussed herein, are acustomer 104 who interacts with theInternet 112 and/or point-of-sale device 108 to interface with the front end and issuer systems 132 that are in communication with theauthentication processor 124. The issuer systems 132 may act as authorization processors as described in specific detailed embodiments below. In some instances, thecustomer 104 may have supplementary interactions with the architecture through a mobileelectronic device 106 and/or may use acontactless presentation instrument 107 depending on specific implementations. These interactions proceed through themobile network 110 that is accessible by the mobile electronic device and that is in communication with the over-the-air processor 128. Each of the issuer systems 132 is a computational system that is operated by an issuer of the presentation instrument or that manages the account used to support the transaction. Such issuers are thus frequently financial institutions such as banks, credit unions, or the like, that maintain demand-deposit or other types of financial accounts that may be used to support debit transactions. -
FIG. 2 provides a schematic illustration of a physical structure that may be used to implement different computational systems that may form part of thearchitecture 100 ofFIG. 1 . For example, thecomputational systems 200 shown inFIG. 2 might correspond to a structure used for the mobileelectronic device 106, for thecontactless presentation instrument 107, for the acquiringprocessor 116, for theauthentication processor 124, for the over-the-air processor 126, and/or for any of the issuer systems 132 in different embodiments.FIG. 2 broadly illustrates how individual system elements may be implemented in a separated or more integrated manner. Thecomputational system 200 is shown comprised of hardware elements that are electrically coupled viabus 226, including aprocessor 202, aninput device 204, anoutput device 206, one ormore storage devices 208, a computer-readablestorage media reader 210 a, acommunications system 214, aprocessing acceleration unit 216 such as a DSP or special-purpose processor, and amemory 218. The computer-readablestorage media reader 210 a is further connected to a computer-readable storage medium 210 b, the combination comprehensively representing remote, local, fixed, and/or removable storage devices plus storage media for temporarily and/or more permanently containing computer-readable information. Thecommunications system 214 may comprise a wired, wireless, modem, and/or other type of interfacing connection and permits data to be exchanged within thearchitecture 100 to implement embodiments described herein. - The
computational system 200 also comprises software elements, shown as being currently located within workingmemory 220, including anoperating system 224 andother code 222, such as a program designed to implement methods of the invention. It will be apparent to those skilled in the art that substantial variations may be made in accordance with specific requirements. For example, customized hardware might also be used and/or particular elements might be implemented in hardware (perhaps including tamper-resistant storage media for secure storage of cryptographic keys), software (including portable software, such as applets), or both. Further, connection to other computing devices such as network input/output devices may be employed. - To participate in financial transaction methods of the invention, a
customer 104 may first be enrolled. Such enrollment establishes sets of data that may be used and manipulated in implementing embodiments of the invention. Such data may be stored in thedatabases 128 and/or 130 as well as on the presentation instrument and/or mobileelectronic device 106. A general overview of how enrollment may be accomplished in embodiments that use physical presentation instruments is provided with the flow diagram ofFIG. 3 , while a corresponding overview of how enrollment may be accomplished in embodiments that make use of mobile electronic devices is illustrated with the flow diagram ofFIG. 4 . - When contactless-card presentation instruments are issued by financial institutions, they are typically prepared using batch processes. Block 304 of
FIG. 3 accordingly indicates that a production file is prepared by an issuer processor. Such a production file typically includes information defining the nature of the individual presentation instruments. For instance, when the presentation instruments comprise cards, the production file may include numbers to be embossed on the cards. It may also include information identifying the individuals to be associated with each instrument, as well as identifying the financial account that will be used to support transactions executed with the instruments. A manufacturer of presentation instruments may also produce blank versions of the instruments at block 308. For example, when the presentation instruments comprise cards, blank versions of the cards may be prepared by a card manufacturer that include a debit application that will be executed when performing debit transaction. Irrespective of their specific form, each of these instruments is equipped with structure that enables them to be used in contactless communications. For example, the instrument may have an embedded electromagnetic chip that receives and transmits electromagnetic signals at radio or other frequencies. Once created, these instruments are delivered by the card manufacturer to the card producer at block 312. - Having received the production file and the blank cards, the card producer may engage in personalization processes at block 316 by writing information to the blank instruments in accordance with the specifications in the production file. This initial personalization may include both direct physical alterations to the instrument, such as when cards are embossed with card numbers, and may additionally include writing data to storage maintained on the instrument itself. For instance, card numbers, cryptographic keys, account or identification numbers, and/or merchant loyalty identification numbers, in addition to other data, may additionally be stored as data on the card so that this information may be accessed and transmitted as appropriate in implementing embodiments of the invention.
- In addition to this personalization information, the card producer may implement certain encryption protocols that will be used in enhancing the security of transactions executed with the instruments. In one implementation, public-key-private-key encryption is used within a public-key infrastructure (“PKI”). Consistent with such an infrastructure, at block 320 the card producer generates a PKI key pair for each card, referred to herein as the “card encryption key pair.” The public key of the pair is transmitted by the card producer, together with an indication of the card number that it refers to, to the
authentication processor 124 at block 324 and the private key of the pair is retained on the card. Having been so prepared, the instrument is ready for transmission to the customer at block 328. - In addition to this use of the production file by the card producer in preparing the instruments, the production file may be provided to the
authentication processor 124 at block 132. The combination of the production file and the key information received from the card producer provides theauthentication processor 124 with sufficient information to authenticate transactions as they are performed with the instruments. Both of these forms of information may be stored indatabase 128. The individual instruments may be activated after receipt by customers at block 336 using a process defined by the issuer producer. In some instances, this activation is performed by interactions between thecustomer 104 and theauthentication processor 124, such as may be achieved over the Internet, through the use of a voice-response unit, or the like. One purpose of this activation step is to reduce the risk of fraud by confirming receipt of the instrument by thecorrect customer 104. A comparison can accordingly be made between information provided by thecustomer 104 during this activation with information extracted from the production file by theauthentication processor 124. - In some instances, the presentation instruments may be created with certain redundancies of information. This is especially suitable, for example, in embodiments where a card is to be equipped for both contactless and conventional transactions. Such multifunction cards may include an electromagnetic chip such as a radio-frequency identification chip to perform contactless transactions as well as a magnetic stripe or other mechanism that stores information that can be read by a device in contact with the card.
- Some aspects of the enrollment shown in
FIG. 4 for enrolling a mobileelectronic device 106 are similar to parts of the enrollment described in connection withFIG. 3 . The method may begin, for example, with the customer visiting an Internet web site managed by the over-the-air processor 126 atblock 404. This web site acts as a provisioning web site that may be used by the over-the-air processor 126 in effecting enrollment functions. The customer provides enrollment information atblock 408. Such enrollment information may comprise, for example, an identification number that generally corresponds to the card number of a debit card in more conventional debit transactions, in addition to the access number for themobile device 106 to be enrolled. - This information is used by the over-the-
air processor 126 atblock 412 to enroll the identification number with theauthentication processor 124 atblock 412. An exchange of verification information acts to confirm that the correctmobile device 106 is enrolled. One example of such an exchange shown inFIG. 4 involves the transmission of a short-message-service (“SMS”) message to themobile device 106 identified by the access number provided atblock 408. In one instance, the SMS message includes a provisioning URL that is used by the customer to confirm the verification information. - At
block 424, the over-the-air processor 126 downloads a software debit application to themobile device 106. The debit application resident on the mobileelectronic device 106 generates a cryptographic key atblock 428. This cryptographic key is a direct analogue of the key discussed in connection withFIG. 3 for the generation of presentation instruments. As indicated atblock 432, the debit application transmits the cryptographic key using the mobile device to the over-the-air process 126. The over-the-air processor 126 then transmits it to theapplication processor 124 atblock 436, resulting in theauthentication processor 124 now having all the requisite information to process a transaction in the manner described below. -
FIG. 5 is a flow diagram that summarizes a provisioning using the over-the-air processor 126 that may be used in some embodiments. Such provisioning permits enrollment to be accomplished by the customer using a combination of information provided over an Internet connection to a web site and information provided over amobile network 110 from a mobileelectronic device 106. The method begins atblock 504 with the customer visiting the enrollment web site. Once connected to this site, the customer enters the identification number atblock 508. Similar to the description of the processes ofFIG. 4 , such an identification number may correspond to a more conventional card number of a debit card. - In addition to this information, the customer enters the PIN on the mobile
electronic device 106 using an interface for doing generated for display on the mobile electronic device. This information is transmitted from the mobileelectronic device 106 over themobile network 110 to the over-the-air processor 126 atblock 516. The combination of information is provided to theauthentication processor 124, with the over-the-air processor 126 transmitting the PIN to theauthentication process 124 atblock 520 and the enrollment web site transmitting the identification number to theauthentication processor 124 atblock 524. This combination of information is then used by theauthentication processor 124 atblock 528 to complete the enrollment of the mobileelectronic device 106, permitting it subsequently to be used as a presentation instrument. -
FIGS. 6 and 7 are flow diagrams that illustrate methods that may be implemented to support debit transactions using the contactless presentation instruments or mobile electronic devices enrolled in accordance withFIGS. 3 and 4 .FIG. 6 provides an illustration of methods for executing and supporting debit transactions made using a contactless card. Such transactions generally take place at a physical merchant location, with the drawing accordingly indicating that the method begins atblock 604 with a customer selecting goods and/or services for purchase at the merchant location. If the transaction is not to be completed as a contactless transaction, the instrument may be swiped atblock 648 to read information from a magnetic stripe or otherwise read with a device in contact with the instrument to proceed with a conventional form of transaction. - If the transaction is to be executed as a contactless transaction, the instrument is activated with a contactless mechanism at
block 612. It is anticipated that such activation will normally be accomplished using an electromagnetic mechanism, although any contactless mechanism that may be implemented may be used in alternative embodiments. - The flow diagram also accounts for the fact that different kinds of transactions may be supported as contactless transactions. One distinction that may be made among transactions is the need to supply a personal identification number (“PIN”) as evidence of authorization to use the presentation instrument. The PIN is a number that is preferably kept secret by the account owner so that that person is the only one authorized to use the instrument, but in practice PIN's are sometimes shared with family members or friends who are authorized by the account holder to execute transactions with the instrument. While the PIN offers a higher level of security for transactions, there are embodiments in which transactions will be permitted without verification of a PIN. These transactions are typically smaller transactions, so that a particular embodiment might permit transactions to be executed without a PIN when they are less than $25 but require a PIN when the transaction size exceeds $25. If the transaction is to be a PIN transaction as checked at
block 616, the customer enters the PIN information with the point-of-sale device 108 atblock 652. - To execute any transaction, whether it requires a PIN or not, account information is retrieved contactlessly from the presentation instrument by the point-of-
sale device 108. The content of this information may vary in different embodiments, with it including or not including PIN information in accordance with the type of transaction being executed. The account information is signed digitally with the card key that is resident on the presentation instrument atblock 620. This signed account information is transmitted atblock 624 in a contactless way from the presentation instrument to the point-of-sale device 108. Merchant point-of-sale devices 108 may deliver transaction data elements to the contactless presentation instrument during the contactless transaction session and such data elements may be included in derivation of the transaction digital signature. - With this information, the merchant point-of-
sale device 108 has sufficient information to generate a transaction request atblock 628 by combining the signed account information with transaction information. The transaction information usually specifies at least a total amount for the transaction and an account under the control of the merchant to which the transaction amount is to be transferred. In certain circumstances, the transaction information may include other information, such as the location at which the transaction is to be executed, the specific items comprised by the transaction, and the like. The resulting transaction request is transmitted by the merchant point-of-sale device 108 to theauthentication processor 124, which is then equipped to parse the transaction request to extract the information needed to make an authentication decision. The customer-account information comprised by the transaction request may be resolved with the card public key atblock 632, permitting theauthentication processor 124 to identify the issuer and specific account to be used in supporting the transaction. - With such a resolution, the decision-making process implemented by the
authentication processor 124 may be relatively simple. A check is made by the atblock 636 to validate the cryptogram included in the encrypted authorization request transaction. If this authentication check fails, a transaction denial code is returned to the merchant point-of-sale device 108 atblock 656 so that the merchant can refuse the transaction or request some other financial support for it from thecustomer 104. - Upon successful completion of the authentication check at the authentication processor, the authorization request transaction is forwarded to an authorization processor 132 to determine whether there are sufficient funds in the identified account to cover the transaction amount. If there are sufficient funds in the identified account, as checked at
block 641, a transaction authorization code is returned by theauthentication processor 124 at block to the merchant point-of-sale device 108, indicating to the merchant that the transaction may be completed atblock 644. Funds are debited in real time from the customer account and transferred to the control of the merchant by depositing them into the merchant account identified with the transaction request. If there are insufficient funds, a transaction denial code may be returned by theauthentication processor 124 to the merchant point-of-sale device 108 atblock 642. - In other embodiments, the authorization decision may be more complex than simply considering whether the total transaction amount exceeds the funds available in the customer account. For example, some implementations include item-level restrictions that the funds may be applied to so that the customer is restricted in use of those funds to purchasing only certain approved items. Alternatively, the customer account might be restricted so that its funds can only be applied to transactions executed at certain approved merchants. In each of these and in other circumstances, the decision-making processes applied by the
authentication processor 124 may consider the data received as part of the transaction request on this more detailed level to determine whether to authorize the transaction. - A number of aspects of transactions executed using a mobile electronic device as summarized with the flow diagram of
FIG. 7 are similar to execution of a contactless transaction.Block 704 indicates that thecustomer 104 selects goods and/or services to purchase from a merchant atblock 704. These goods and services may be purchased at a merchant location or may be purchased remotely such as over theInternet 112, the different transaction types resulting in different processing described below. - A check is accordingly made of the transaction mode at
block 708. If the transaction occurs at a merchant location, a check may be made whether to execute the transaction as a PIN or non-PIN transaction. This is indicated atblock 712. Often such a decision hinges some characteristic of the transaction like its total size. If the transaction is to be a PIN transaction, the customer may enter the PIN using a keypad comprised by the mobileelectronic device 106. This may be included as part of the account information that is digitally signed and transmitted from themobile device 106 to the merchant point-of-sale device 108 atblock 720. This digital signing is similar to the signing performed with contactless cards inFIG. 6 by performing an encryption using the cryptographic key, but is performed by the mobileelectronic device 106. - The signed account information is used by the merchant point-of-
sale device 108 in generating a transaction request that is then transmitted to the authentication processor atblock 724. In addition to the signed account information, the transaction request may include details of the transaction, usually including at least a transaction amount but perhaps sometimes additionally including such information as item-level identifications of the specific goods and services that form part of the transaction. - When an Internet-based transaction is to be performed, the customer may enter the PIN using the keypad on the mobile device at
block 730 and themobile device 106 may load a one-time password atblock 728. In some embodiments, the one-time password comprises a two-factor one-time password. Conventionally, a number of different factors may be used to provide security for authentication. For instance, such factors may include something that the customer has, something that the customer knows, and something that the customer is. A two-factor one-time password is based on two such factors. In a particular implementation, the two factors are something that the customer has, such as possession of the presentation instrument, and something that the customer knows, such as the PIN. The customer enters the identification number for his account atblock 732 with the password read from the mobile device. This provides sufficient information for the merchant operating the web site to generate an authorization request atblock 736. The authorization request is transmitted by the merchant web server to theauthentication processor 124 atblock 740, permitting theauthentication processor 124 to use the one-time password to validate the authorization request atblock 744. - Subsequent processing of the transaction is similar to conventional processing, irrespective of whether the authorization request is received from a point-of-
sale device 106 or from a merchant web server. The authentication processor resolves the account information from the authorization request atblock 748 by applying decryption techniques. If the digital signature fails to pass validation as checked atblock 752, then a transaction denial code is returned by theauthentication processor 124 atblock 754. If the digital signature passes validation, the transaction request is forwarded to the authorization processor 132 atblock 756, permitting a check to be made atblock 758 whether there are sufficient funds in the identified account. If not, a transaction denial code is returned by the authorization processor 132 is returned atblock 760. If both the digital signature pass and there are sufficient funds in the account, the transaction is completed atblock 762. -
FIG. 8 is a flow diagram that summarizes methods of executing certain Internet-based transactions. These methods may be implemented using merchants that provide web sites that participate in the program, sometimes referred to herein as implementing “federated authentication.” When a customer enters one of these participating web sites, as indicated atblock 804, he or she may enter conventional identification information to log into the web site atblock 808. Such conventional identification information will frequently take the form of a userid, but may use other forms of identification known in the art. To complete the customer's authentication, the customer enters the PIN for the presentation instrument on the mobile electronic device atblock 812, with the device responding to correct entry of the PIN by displaying a one-time password atblock 816. As in other embodiments of the invention, the one-time password sometimes comprises a two-factor one-time password. This password is used by the customer to complete the log in to the participating web site atblock 820, permitting the customer to enter into and complete a transaction atblock 824. - In some embodiments, the security information that is used in the methods described in connection with either
FIG. 7 orFIG. 8 may vary over time. That is, when a two-factor one-time password is generated, it may have a limited time of validity. In such embodiments, thecustomer 104 must generally provide the password within the limited time to validate the transaction. After the time period has expired, a new one-time password is generated that must be received in order to validate the transaction within a separate time period. Such a feature further enhances the overall security of the transaction methods. - Thus, having described several embodiments, it will be recognized by those of skill in the art that various modifications, alternative constructions, and equivalents may be used without departing from the spirit of the invention. Accordingly, the above description should not be taken as limiting the scope of the invention, which is defined in the following claims.
Claims (21)
1. A method of executing a financial transaction between a customer and a merchant, the method comprising:
receiving an encrypted authorization request from a merchant system at an authorization processor, wherein the authorization request was encrypted by application of a one-time password provided to the merchant by a presentation instrument;
decrypting the authorization request;
identifying a financial account from the decrypted authorization request;
determining transaction information describing at least a portion of the financial transaction from the decrypted authorization request;
determining authenticity of the transaction information by validating the one-time password; and
determining whether the identified financial account is capable of supporting the financial transaction based on the transaction information.
2. The method recited in claim 1 further comprising delivering a loyalty customer identification number from the presentation instrument to the merchant.
3. The method recited in claim 1 wherein the identifier comprises an account number of the financial account.
4. The method recited in claim 1 wherein the one-time password comprises a two-factor one-time password.
5. The method recited in claim 1 wherein the merchant system comprises an Internet web server.
6. The method recited in claim 1 wherein the merchant system comprises a merchant point-of-sale device.
7. The method recited in claim 1 further comprising verifying authenticity of the one-time password by validating the personal identification number associated with the identified financial account.
8. The method recited in claim 1 wherein the debit presentation instrument comprises a cellular telephone.
9. The method recited in claim 1 wherein the transaction information comprises data selected from the group consisting of a total cost for the financial transaction, a location, a point-of-sale-device identifier, a point-of-sale-device sequence number, a date, and a time.
10. The method recited in claim 1 wherein the financial account comprises an account selected from the group consisting of a debit account, a credit account, and a stored-value account.
11. A computer-readable storage medium having a computer-readable program embodied therein for directing operation of an authorization processor to execute a financial transaction between a customer and a merchant, the authorization processor including a communications system, a processor, and a storage device, wherein the computer-readable program includes:
instructions for receiving an encrypted authorization request from a merchant system at the authorization processor, wherein the authorization request was encrypted by application of a one-time password provided to the customer by a presentation instrument;
instructions for decrypting the authorization request;
instructions for identifying a financial account from the decrypted authorization request;
instructions for determining transaction information describing at least a portion of the financial transaction from the decrypted authorization request;
instructions for determining authenticity of the transaction information by validating the one-time password; and
instructions for determining whether the identified financial account is capable of supporting the financial transaction based on the transaction information.
12. The system recited in claim 11 wherein the computer-readable program further includes instructions for delivering a loyalty customer identification number from the presentation instrument to the merchant.
13. The system recited in claim 11 wherein the identifier comprises an account number of the financial account.
14. The system recited in claim 11 wherein the one-time password comprises a two-factor one-time password.
15. The system recited in claim 11 wherein the merchant system comprises an Internet web server.
16. The system recited in claim 11 wherein the merchant system comprises a merchant point-of-sale device.
17. The system recited in claim 11 wherein the computer-readable program further includes instructions for verifying authenticity of the one-time password by validating the personal identification number associated with the identified financial account.
18. The system recited in claim 11 wherein the debit presentation instrument comprises a cellular telephone.
19. The system recited in claim 11 wherein the transaction information comprises data selected from the group consisting of a total cost for the financial transaction, a location, a point-of-sale-device identifier, a point-of-sale-device sequence number, a date, and a time.
20. The system recited in claim 11 wherein cryptographic keys used to generate the one-time password on the presentation instrument are generated on the presentation instrument and transmitted to an authentication processor or are generated on the authentication processor and transmitted to the presentation instrument.
21. The system recited in claim 11 wherein the financial account comprises an account selected from the group consisting of a debit account, a credit account, and a stored-value account.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US15/803,103 US20180053167A1 (en) | 2007-02-22 | 2017-11-03 | Processing of financial transactions using debit networks |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US11/677,960 US9846866B2 (en) | 2007-02-22 | 2007-02-22 | Processing of financial transactions using debit networks |
US15/803,103 US20180053167A1 (en) | 2007-02-22 | 2017-11-03 | Processing of financial transactions using debit networks |
Related Parent Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US11/677,960 Division US9846866B2 (en) | 2007-02-22 | 2007-02-22 | Processing of financial transactions using debit networks |
Publications (1)
Publication Number | Publication Date |
---|---|
US20180053167A1 true US20180053167A1 (en) | 2018-02-22 |
Family
ID=39717024
Family Applications (2)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US11/677,960 Expired - Fee Related US9846866B2 (en) | 2007-02-22 | 2007-02-22 | Processing of financial transactions using debit networks |
US15/803,103 Abandoned US20180053167A1 (en) | 2007-02-22 | 2017-11-03 | Processing of financial transactions using debit networks |
Family Applications Before (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US11/677,960 Expired - Fee Related US9846866B2 (en) | 2007-02-22 | 2007-02-22 | Processing of financial transactions using debit networks |
Country Status (2)
Country | Link |
---|---|
US (2) | US9846866B2 (en) |
WO (1) | WO2008118582A1 (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US12107925B2 (en) | 2021-06-18 | 2024-10-01 | Bank Of America Corporation | Data processing transactions between disparate systems using a universal processor |
Families Citing this family (47)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7506812B2 (en) * | 2004-09-07 | 2009-03-24 | Semtek Innovative Solutions Corporation | Transparently securing data for transmission on financial networks |
US8055581B2 (en) * | 2007-02-22 | 2011-11-08 | First Data Corporation | Management of financial transactions using debit networks |
US9846866B2 (en) * | 2007-02-22 | 2017-12-19 | First Data Corporation | Processing of financial transactions using debit networks |
AU2008288851A1 (en) * | 2007-08-21 | 2009-02-26 | Daniel Jonathan Baron | Methods and systems for preauthorizing venue-based credit accounts |
US20100096449A1 (en) * | 2008-10-22 | 2010-04-22 | Paycode Systems, Inc. | Cause gift card platform for providing redemption of funds across multiple unaffiliated entities |
KR20110105841A (en) * | 2008-12-23 | 2011-09-27 | 엠티엔 모바일 머니 에스에이 (피티와이) 엘티디 | Method of and system for securely processing a transaction |
US20100276484A1 (en) * | 2009-05-01 | 2010-11-04 | Ashim Banerjee | Staged transaction token for merchant rating |
US10438181B2 (en) * | 2009-07-22 | 2019-10-08 | Visa International Service Association | Authorizing a payment transaction using seasoned data |
US20110057025A1 (en) * | 2009-09-04 | 2011-03-10 | Paycode Systems, Inc. | Generation, management and usage of on-demand payment ids |
IT1398518B1 (en) * | 2009-09-25 | 2013-03-01 | Colombo | SAFE MILANO |
US8374916B2 (en) * | 2009-10-27 | 2013-02-12 | At&T Mobility Ii Llc | Secure mobile-based financial transactions |
US20110119190A1 (en) * | 2009-11-18 | 2011-05-19 | Magid Joseph Mina | Anonymous transaction payment systems and methods |
US20120303528A1 (en) * | 2010-01-07 | 2012-11-29 | Accells Technologies (2009), Ltd. | System and method for performing a transaction responsive to a mobile device |
AU2011205391B2 (en) * | 2010-01-12 | 2014-11-20 | Visa International Service Association | Anytime validation for verification tokens |
ES2672920T3 (en) * | 2010-01-19 | 2018-06-18 | Bluechain Pty Ltd | Procedure, device and system to ensure payment data for transmission through open communication networks |
US20110251962A1 (en) * | 2010-04-13 | 2011-10-13 | John Hruska | Transaction method for secure electronic gift cards |
GB2488766A (en) * | 2011-03-04 | 2012-09-12 | Intercede Ltd | Securely transferring data to a mobile device |
US8346672B1 (en) | 2012-04-10 | 2013-01-01 | Accells Technologies (2009), Ltd. | System and method for secure transaction process via mobile device |
KR20140058442A (en) | 2011-05-17 | 2014-05-14 | 엑셀스 테크놀로지스 (2009), 엘티디. | System and method for performing a secure transaction |
US9098850B2 (en) | 2011-05-17 | 2015-08-04 | Ping Identity Corporation | System and method for transaction security responsive to a signed authentication |
US20120303534A1 (en) * | 2011-05-27 | 2012-11-29 | Tomaxx Gmbh | System and method for a secure transaction |
CN103733212A (en) * | 2011-06-09 | 2014-04-16 | 奥赛尔斯科技(2009)有限公司 | A transaction system and method for use with a mobile device |
US9886688B2 (en) | 2011-08-31 | 2018-02-06 | Ping Identity Corporation | System and method for secure transaction process via mobile device |
US20130144755A1 (en) * | 2011-12-01 | 2013-06-06 | Microsoft Corporation | Application licensing authentication |
WO2013103991A1 (en) * | 2012-01-05 | 2013-07-11 | Visa International Service Association | Data protection with translation |
GB2492614B (en) * | 2012-02-28 | 2014-01-29 | Barclays Bank Plc | System and method for authenticating a payment transaction |
US9022286B2 (en) | 2013-03-15 | 2015-05-05 | Virtual Electric, Inc. | Multi-functional credit card type portable electronic device |
US10460314B2 (en) * | 2013-07-10 | 2019-10-29 | Ca, Inc. | Pre-generation of session keys for electronic transactions and devices that pre-generate session keys for electronic transactions |
US11605070B2 (en) | 2013-07-29 | 2023-03-14 | The Toronto-Dominion Bank | Cloud-based electronic payment processing |
US20150073995A1 (en) | 2013-09-10 | 2015-03-12 | The Toronto Dominion Bank | System and method for authorizing a financial transaction |
EP2849448A1 (en) * | 2013-09-13 | 2015-03-18 | Nagravision S.A. | Method for controlling access to broadcast content |
CN115082065A (en) | 2013-12-19 | 2022-09-20 | 维萨国际服务协会 | Cloud-based transaction method and system |
US9922322B2 (en) | 2013-12-19 | 2018-03-20 | Visa International Service Association | Cloud-based transactions with magnetic secure transmission |
US10050787B1 (en) | 2014-03-25 | 2018-08-14 | Amazon Technologies, Inc. | Authentication objects with attestation |
US10049202B1 (en) | 2014-03-25 | 2018-08-14 | Amazon Technologies, Inc. | Strong authentication using authentication objects |
EP3146747B1 (en) | 2014-05-21 | 2020-07-01 | Visa International Service Association | Offline authentication |
US9264419B1 (en) | 2014-06-26 | 2016-02-16 | Amazon Technologies, Inc. | Two factor authentication with authentication objects |
FR3023640B1 (en) * | 2014-07-10 | 2016-08-12 | Roam Data Inc | METHOD FOR MANAGING TRANSACTION, SERVER, COMPUTER PROGRAM PRODUCT AND CORRESPONDING STORAGE MEDIUM |
US9775029B2 (en) | 2014-08-22 | 2017-09-26 | Visa International Service Association | Embedding cloud-based functionalities in a communication device |
US10187363B2 (en) | 2014-12-31 | 2019-01-22 | Visa International Service Association | Hybrid integration of software development kit with secure execution environment |
CN107210918B (en) * | 2015-02-17 | 2021-07-27 | 维萨国际服务协会 | Apparatus and method for transaction processing using token and password based on transaction specific information |
US9781105B2 (en) | 2015-05-04 | 2017-10-03 | Ping Identity Corporation | Fallback identity authentication techniques |
US10699268B2 (en) * | 2015-12-30 | 2020-06-30 | Thales Dis France Sa | Method, server and system for authorizing a transaction |
US10861019B2 (en) * | 2016-03-18 | 2020-12-08 | Visa International Service Association | Location verification during dynamic data transactions |
SG10201610472XA (en) | 2016-12-14 | 2018-07-30 | Mastercard International Inc | Processing electronic payments on a mobile computer device |
WO2019027488A1 (en) * | 2017-08-02 | 2019-02-07 | Wepay, Inc. | Systems and methods for instant merchant activation for secured in-person payments at point of sale |
US20240048382A1 (en) | 2022-08-03 | 2024-02-08 | 1080 Network, Llc | Systems, methods, and computing platforms for executing credential-less network-based communication exchanges |
Citations (140)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5109384A (en) * | 1988-11-02 | 1992-04-28 | Tseung Lawrence C N | Guaranteed reliable broadcast network |
US5163098A (en) * | 1990-09-06 | 1992-11-10 | Dahbura Abbud S | System for preventing fraudulent use of credit card |
US5577121A (en) * | 1994-06-09 | 1996-11-19 | Electronic Payment Services, Inc. | Transaction system for integrated circuit cards |
US5590197A (en) * | 1995-04-04 | 1996-12-31 | V-One Corporation | Electronic payment system and method |
US5592553A (en) * | 1993-07-30 | 1997-01-07 | International Business Machines Corporation | Authentication system using one-time passwords |
US5850442A (en) * | 1996-03-26 | 1998-12-15 | Entegrity Solutions Corporation | Secure world wide electronic commerce over an open network |
US5917168A (en) * | 1993-06-02 | 1999-06-29 | Hewlett-Packard Company | System and method for revaluation of stored tokens in IC cards |
US6085168A (en) * | 1997-02-06 | 2000-07-04 | Fujitsu Limited | Electronic commerce settlement system |
US6100804A (en) * | 1998-10-29 | 2000-08-08 | Intecmec Ip Corp. | Radio frequency identification system |
US6270011B1 (en) * | 1998-05-28 | 2001-08-07 | Benenson Tal | Remote credit card authentication system |
US20010027441A1 (en) * | 2000-02-16 | 2001-10-04 | Mastercard International Incorporated. | System and method for conducting electronic commerce with a remote wallet server |
US20010044777A1 (en) * | 2000-05-10 | 2001-11-22 | Ncr Corporation | Self-service terminal |
US6327578B1 (en) * | 1998-12-29 | 2001-12-04 | International Business Machines Corporation | Four-party credit/debit payment protocol |
US20010056409A1 (en) * | 2000-05-15 | 2001-12-27 | Bellovin Steven Michael | Offline one time credit card numbers for secure e-commerce |
US20020018585A1 (en) * | 2000-07-19 | 2002-02-14 | Kim Young Wan | System and method for cardless secure credit transaction processing |
US20020049658A1 (en) * | 2000-08-29 | 2002-04-25 | George Davidson | Ticket remarketing system and method |
US6393411B1 (en) * | 1998-07-21 | 2002-05-21 | Amdahl Corporation | Device and method for authorized funds transfer |
US20020062277A1 (en) * | 2000-11-20 | 2002-05-23 | Paul Foster | Method and system for completing a lease for real property in an on-line computing environment |
US20020069177A1 (en) * | 2000-12-01 | 2002-06-06 | Carrott Richard F. | Method and apparatus to provide secure purchase transactions over a computer network |
US20020107799A1 (en) * | 1999-10-07 | 2002-08-08 | Fujitsu Limited | Transaction method, transaction system, management equipment and IC card therefor |
US20020111919A1 (en) * | 2000-04-24 | 2002-08-15 | Visa International Service Association | Online payer authentication service |
US6442448B1 (en) * | 1999-06-04 | 2002-08-27 | Radiant Systems, Inc. | Fuel dispensing home phone network alliance (home PNA) based system |
US20020126850A1 (en) * | 2001-03-09 | 2002-09-12 | Arcot Systems, Inc. | Method and apparatus for cryptographic key storage wherein key servers are authenticated by possession and secure distribution of stored keys |
US20020147658A1 (en) * | 1999-09-13 | 2002-10-10 | Kwan Khai Hee | Computer network method for conducting payment over a network by debiting and crediting telecommunication accounts |
US20020164031A1 (en) * | 2000-08-15 | 2002-11-07 | Lauri Piikivi | Devices |
US20030009382A1 (en) * | 2001-06-12 | 2003-01-09 | D'arbeloff Matthew A. | Customer identification, loyalty and merchant payment gateway |
US20030055785A1 (en) * | 2001-09-20 | 2003-03-20 | International Business Machines Corporation | System and method for electronic wallet transactions |
US20030061170A1 (en) * | 2000-08-29 | 2003-03-27 | Uzo Chijioke Chukwuemeka | Method and apparatus for making secure electronic payments |
US20030080183A1 (en) * | 2001-10-31 | 2003-05-01 | Sanguthevar Rajasekaran | One-time credit card number generator and single round-trip authentication |
US20030095791A1 (en) * | 2000-03-02 | 2003-05-22 | Barton James M. | System and method for internet access to a personal television service |
US6598031B1 (en) * | 2000-07-31 | 2003-07-22 | Edi Secure Lllp | Apparatus and method for routing encrypted transaction card identifying data through a public telephone network |
US6607136B1 (en) * | 1998-09-16 | 2003-08-19 | Beepcard Inc. | Physical presence digital authentication system |
US20030177370A1 (en) * | 2002-03-16 | 2003-09-18 | Smith Mark T. | Dynamic security system |
US6636833B1 (en) * | 1998-03-25 | 2003-10-21 | Obis Patents Ltd. | Credit card system and method |
US6636968B1 (en) * | 1999-03-25 | 2003-10-21 | Koninklijke Philips Electronics N.V. | Multi-node encryption and key delivery |
US20030204726A1 (en) * | 2002-04-25 | 2003-10-30 | Kefford Mark Gregory | Methods and systems for secure transmission of information using a mobile device |
US6681328B1 (en) * | 1999-10-08 | 2004-01-20 | Mastercard International Incorporated | System and method for global internet digital identification |
US6715078B1 (en) * | 2000-03-28 | 2004-03-30 | Ncr Corporation | Methods and apparatus for secure personal identification number and data encryption |
US20040064351A1 (en) * | 1999-11-22 | 2004-04-01 | Mikurak Michael G. | Increased visibility during order management in a network-based supply chain environment |
US20040167863A1 (en) * | 2003-02-21 | 2004-08-26 | Knowles W. Jeffrey | System and method of transferring data through transaction process |
US20040167854A1 (en) * | 2003-02-21 | 2004-08-26 | Knowles W. Jeffrey | System and method of currency conversion in financial transaction process |
US20040167851A1 (en) * | 2003-02-21 | 2004-08-26 | W. Jeffrey Knowles | System and method of electronic data transaction processing |
US20040187108A1 (en) * | 2003-02-21 | 2004-09-23 | Knowles W. Jeffrey | Method of scheduling and event processing in computer operating system |
US20040243496A1 (en) * | 2001-04-25 | 2004-12-02 | Kim Chul Ki | Financial information input method using symmetrical key security algorithm and commercial transaction system for mobile communications |
US20050027648A1 (en) * | 2003-07-29 | 2005-02-03 | Knowles W. Jeffrey | System and method of account reconciliation for electronic transactions |
US20050033688A1 (en) * | 2002-07-09 | 2005-02-10 | American Express Travel Related Services Company, Inc. | Methods and apparatus for a secure proximity integrated circuit card transactions |
US20050043997A1 (en) * | 2003-08-18 | 2005-02-24 | Sahota Jagdeep Singh | Method and system for generating a dynamic verification value |
US20050080677A1 (en) * | 2003-10-14 | 2005-04-14 | Foss Sheldon H. | Real-time entry and verification of PIN at point-of-sale terminal |
US20050101295A1 (en) * | 2003-11-07 | 2005-05-12 | Alcatel | Method for supporting cashless payment |
US20050119978A1 (en) * | 2002-02-28 | 2005-06-02 | Fikret Ates | Authentication arrangement and method for use with financial transactions |
US20050171898A1 (en) * | 2001-07-10 | 2005-08-04 | American Express Travel Related Services Company, Inc. | Systems and methods for managing multiple accounts on a rf transaction device using secondary identification indicia |
US20060012473A1 (en) * | 2001-07-10 | 2006-01-19 | American Express Travel Related Services Company, Inc. | System and method for authenticating a rf transaction using a radio frequency identification device including a transaction counter |
US20060026671A1 (en) * | 2004-08-02 | 2006-02-02 | Darran Potter | Method and apparatus for determining authentication capabilities |
US7020635B2 (en) * | 2001-11-21 | 2006-03-28 | Line 6, Inc | System and method of secure electronic commerce transactions including tracking and recording the distribution and usage of assets |
US7024174B2 (en) * | 2001-07-24 | 2006-04-04 | Citibank, N.A. | Method and system for data management in electronic payments transactions |
US20060085844A1 (en) * | 2004-10-20 | 2006-04-20 | Mark Buer | User authentication system |
US7080049B2 (en) * | 2001-09-21 | 2006-07-18 | Paymentone Corporation | Method and system for processing a transaction |
US20060177065A1 (en) * | 2005-02-09 | 2006-08-10 | Wal-Mart Stores, Inc. | System and methods for encrypting data utilizing one-time pad key |
US7090128B2 (en) * | 2003-09-08 | 2006-08-15 | Systems And Software Enterprises, Inc. | Mobile electronic newsstand |
US7103575B1 (en) * | 2000-08-31 | 2006-09-05 | International Business Machines Corporation | Enabling use of smart cards by consumer devices for internet commerce |
US7107462B2 (en) * | 2000-06-16 | 2006-09-12 | Irdeto Access B.V. | Method and system to store and distribute encryption keys |
US20060204051A1 (en) * | 2005-03-10 | 2006-09-14 | Debix One, Inc. | Method and system for managing account information |
US20060218098A1 (en) * | 1997-08-28 | 2006-09-28 | Walker Jay S | Method and device for generating a single-use financial account number |
US20060230112A1 (en) * | 2005-03-18 | 2006-10-12 | Yahoo! Inc. | Method for signing into a mobile device over a network |
US20060242698A1 (en) * | 2005-04-22 | 2006-10-26 | Inskeep Todd K | One-time password credit/debit card |
US20060278697A1 (en) * | 2005-06-13 | 2006-12-14 | Robert Lovett | System, method and program product for credit card transaction validation |
US20070037552A1 (en) * | 2005-08-11 | 2007-02-15 | Timothy Lee | Method and system for performing two factor mutual authentication |
US20070055630A1 (en) * | 2005-09-06 | 2007-03-08 | Visa U.S.A. | System and method for secured account numbers in proximity devices |
US20070077916A1 (en) * | 2005-10-04 | 2007-04-05 | Forval Technology, Inc. | User authentication system and user authentication method |
US20070079135A1 (en) * | 2005-10-04 | 2007-04-05 | Forval Technology, Inc. | User authentication system and user authentication method |
US7213144B2 (en) * | 2001-08-08 | 2007-05-01 | Nokia Corporation | Efficient security association establishment negotiation technique |
US20070119918A1 (en) * | 2005-07-15 | 2007-05-31 | Hogg Jason J | System and method for new execution and management of financial and data transactions |
US20070130463A1 (en) * | 2005-12-06 | 2007-06-07 | Eric Chun Wah Law | Single one-time password token with single PIN for access to multiple providers |
US20070125840A1 (en) * | 2005-12-06 | 2007-06-07 | Boncle, Inc. | Extended electronic wallet management |
US20070136211A1 (en) * | 2004-03-15 | 2007-06-14 | Brown Kerry D | Financial transactions with dynamic card verification values |
US20070143230A1 (en) * | 2003-06-30 | 2007-06-21 | Selvanathan Narainsamy | Transaction verification system |
US20070173266A1 (en) * | 2002-05-23 | 2007-07-26 | Barnes Melvin L Jr | Portable communications device and method |
US20070183593A1 (en) * | 2005-10-31 | 2007-08-09 | Fujitsu Limited And Osamu Hirota | Encryption method, cryptogram decoding method, encryptor, cryptogram decoder, and communication system |
US20070220597A1 (en) * | 2006-03-17 | 2007-09-20 | Ishida Natsuki | Verification system |
US7287692B1 (en) * | 2004-07-28 | 2007-10-30 | Cisco Technology, Inc. | System and method for securing transactions in a contact center environment |
US20070260544A1 (en) * | 2004-11-10 | 2007-11-08 | John Wankmueller | Method and system for performing a transaction using a dynamic authorization code |
US20070277044A1 (en) * | 2004-04-07 | 2007-11-29 | Hans Graf | Data Support With Tan-Generator And Display |
US20080005039A1 (en) * | 2006-06-20 | 2008-01-03 | Utstarcom, Inc. | Decryption of Personal Identification Number & Forwarding Method and Apparatus |
US20080034221A1 (en) * | 2006-06-19 | 2008-02-07 | Ayman Hammad | Portable consumer device configured to generate dynamic authentication data |
US20080034216A1 (en) * | 2006-08-03 | 2008-02-07 | Eric Chun Wah Law | Mutual authentication and secure channel establishment between two parties using consecutive one-time passwords |
US20080029593A1 (en) * | 2003-08-18 | 2008-02-07 | Ayman Hammad | Method and System for Generating a Dynamic Verification Value |
US20080031456A1 (en) * | 2005-09-29 | 2008-02-07 | Keith Alexander Harrison | Device with multiple one-time pads and method of managing such a device |
US20080040274A1 (en) * | 2006-08-14 | 2008-02-14 | Uzo Chijioke Chukwuemeka | Method of making secure electronic payments using communications devices and biometric data |
US20080071938A1 (en) * | 2006-09-19 | 2008-03-20 | Ricoh Company, Ltd. | Multifunction machine and a control method of the multifunction machine |
US20080103984A1 (en) * | 2006-10-30 | 2008-05-01 | Mobilekash, Inc. | System, Method, and Computer-Readable Medium for Mobile Payment Authentication and Authorization |
US7373518B2 (en) * | 2000-05-09 | 2008-05-13 | Wincor Nixdorf International Gmbh | Operation of a security module in a card reader |
US20080140845A1 (en) * | 2006-12-08 | 2008-06-12 | Microsoft Corporation | Transfer of content to closed systems |
US7391724B2 (en) * | 2002-10-09 | 2008-06-24 | Spyder Navigations, L.L.C. | System and method with policy control function for multimedia broadcast/multicast system services |
US20080168544A1 (en) * | 2007-01-05 | 2008-07-10 | Ebay Inc. | Token device re-synchronization through a network solution |
US20080168543A1 (en) * | 2007-01-05 | 2008-07-10 | Ebay Inc. | One time password authentication of websites |
US7412420B2 (en) * | 2002-09-09 | 2008-08-12 | U.S. Encode Corporation | Systems and methods for enrolling a token in an online authentication program |
US20080208759A1 (en) * | 2007-02-22 | 2008-08-28 | First Data Corporation | Processing of financial transactions using debit networks |
US20080208758A1 (en) * | 2008-03-03 | 2008-08-28 | Spiker Norman S | Method and apparatus for secure transactions |
US20080208746A1 (en) * | 2007-02-22 | 2008-08-28 | First Data Corporation | Management of financial transactions using debit networks |
US20090030845A1 (en) * | 2006-04-05 | 2009-01-29 | Simon Hurry | System and method for account identifier obfuscation |
US20090063802A1 (en) * | 2006-01-24 | 2009-03-05 | Clevx, Llc | Data security system |
US20090144202A1 (en) * | 2007-11-29 | 2009-06-04 | Visa Usa, Inc. | Module id based encryption for financial transactions |
US20090154707A1 (en) * | 2007-12-18 | 2009-06-18 | Lee Taek Kyu | Method and system for distributing group key in video conference system |
US20090157555A1 (en) * | 2007-12-12 | 2009-06-18 | American Express Travel Related Services Company, | Bill payment system and method |
US7587502B2 (en) * | 2005-05-13 | 2009-09-08 | Yahoo! Inc. | Enabling rent/buy redirection in invitation to an online service |
US20090287742A1 (en) * | 2008-05-15 | 2009-11-19 | Bowe Bell+ Howell Company | Method and system for run time directories for address services on a mail processing system |
US7636694B1 (en) * | 1998-09-18 | 2009-12-22 | Mastercard International Incorporated | Apparatus and method for generating an electronic-commerce personal identification number cryptographically related to an ATM personal identification number |
US20100017860A1 (en) * | 2005-12-09 | 2010-01-21 | Ishida Natsuki | Authentication system and authentication method |
US20100031051A1 (en) * | 2007-06-05 | 2010-02-04 | Machani Salah E | Protocol And Method For Client-Server Mutual Authentication Using Event-Based OTP |
US20100106649A1 (en) * | 2008-10-23 | 2010-04-29 | Diversinet Corp. | System And Method For Authorizing Transactions Via Mobile Devices |
US7711586B2 (en) * | 2005-02-24 | 2010-05-04 | Rearden Corporation | Method and system for unused ticket management |
US20100287382A1 (en) * | 2009-05-07 | 2010-11-11 | John Charles Gyorffy | Two-factor graphical password for text password and encryption key generation |
US20100293099A1 (en) * | 2009-05-15 | 2010-11-18 | Pauker Matthew J | Purchase transaction system with encrypted transaction information |
US20110016054A1 (en) * | 2007-01-30 | 2011-01-20 | Phil Dixon | Signature based negative list for off line payment device validation |
US20110047036A1 (en) * | 2006-06-08 | 2011-02-24 | Master Card International Incorporated | All-in-one proximity payment device with local authentication |
US20110099384A1 (en) * | 2009-10-23 | 2011-04-28 | Vasco Data Security International, Inc. | Strong authentication token usable with a plurality of independent application providers |
US20110101109A1 (en) * | 2009-11-05 | 2011-05-05 | John Kenneth Bona | Card with illuminated codes for use in secure transactions |
US20110302021A1 (en) * | 2010-06-08 | 2011-12-08 | Reid Christopher S | Fundraising process using pos technology |
US20120028609A1 (en) * | 2010-07-27 | 2012-02-02 | John Hruska | Secure financial transaction system using a registered mobile device |
US8123123B1 (en) * | 2002-12-26 | 2012-02-28 | Diebold Self-Service Systems, Division Of Diebold, Incorporated | Automated banking machine that operates responsive to data bearing records |
US20120137131A1 (en) * | 2009-12-31 | 2012-05-31 | Zhou Lu | Authentication method, system, and device |
US20120143770A1 (en) * | 2010-12-06 | 2012-06-07 | Pauker Matthew J | Purchase transaction system with encrypted payment card data |
US20120150742A1 (en) * | 2010-12-14 | 2012-06-14 | Xtreme Mobility Inc. | System and Method for Authenticating Transactions Through a Mobile Device |
US20120185398A1 (en) * | 2009-09-17 | 2012-07-19 | Meir Weis | Mobile payment system with two-point authentication |
US20120197807A1 (en) * | 2011-01-28 | 2012-08-02 | Joshua Schlesser | Secure online transaction processing |
US8255688B2 (en) * | 2008-01-23 | 2012-08-28 | Mastercard International Incorporated | Systems and methods for mutual authentication using one time codes |
US20120226582A1 (en) * | 2010-02-24 | 2012-09-06 | Ayman Hammad | Integration of Payment Capability into Secure Elements of Computers |
US8341397B2 (en) * | 2006-06-26 | 2012-12-25 | Mlr, Llc | Security system for handheld wireless devices using-time variable encryption keys |
US20130262317A1 (en) * | 2012-04-02 | 2013-10-03 | Mastercard International Incorporated | Systems and methods for processing mobile payments by provisoning credentials to mobile devices without secure elements |
US8655789B2 (en) * | 2001-07-10 | 2014-02-18 | American Express Travel Related Services Company, Inc. | Systems and methods for non-traditional payment using biometric data |
US20140101055A1 (en) * | 2012-10-05 | 2014-04-10 | Jvl Ventures, Llc | Systems, methods, and computer program products for managing remote transactions |
US20140136418A1 (en) * | 2011-09-29 | 2014-05-15 | Pacid Technologies, Llc | System and method for application security |
US8770470B2 (en) * | 2008-04-29 | 2014-07-08 | Visa U.S.A. Inc. | Device including form factor indicator |
US20150154414A1 (en) * | 2012-07-20 | 2015-06-04 | Licentia Group Limited | Authentication Method and System |
US20150287031A1 (en) * | 2012-11-19 | 2015-10-08 | Mastercard International Incorporated | Methods and apparatus for card transactions |
US20160063496A1 (en) * | 2013-03-15 | 2016-03-03 | Vijay Kumar Royyuru | Remote Secure Transactions |
US20160110711A1 (en) * | 2014-10-21 | 2016-04-21 | Mastercard International Incorporated | Method and system for generating cryptograms for validation in a webservice environment |
US20170011395A1 (en) * | 2013-09-30 | 2017-01-12 | Apple Inc. | Multi-path communication of electronic device secure element data for online payments |
US20180240110A1 (en) * | 2017-02-21 | 2018-08-23 | Mastercard International Incorporated | Transaction cryptogram |
US20190172045A1 (en) * | 2017-12-04 | 2019-06-06 | The Toronto-Dominion Bank | Dynamic generation and provisioning of tokenized data to network-connected devices |
Family Cites Families (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7303120B2 (en) * | 2001-07-10 | 2007-12-04 | American Express Travel Related Services Company, Inc. | System for biometric security using a FOB |
US20050215306A1 (en) * | 2004-03-29 | 2005-09-29 | O'donnell Michael L | Lottery methods and apparatus |
US20080167079A1 (en) * | 2007-01-09 | 2008-07-10 | Garrettson Brook W | Winner notification system |
-
2007
- 2007-02-22 US US11/677,960 patent/US9846866B2/en not_active Expired - Fee Related
-
2008
- 2008-02-22 WO PCT/US2008/054683 patent/WO2008118582A1/en active Application Filing
-
2017
- 2017-11-03 US US15/803,103 patent/US20180053167A1/en not_active Abandoned
Patent Citations (154)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5109384A (en) * | 1988-11-02 | 1992-04-28 | Tseung Lawrence C N | Guaranteed reliable broadcast network |
US5163098A (en) * | 1990-09-06 | 1992-11-10 | Dahbura Abbud S | System for preventing fraudulent use of credit card |
US5917168A (en) * | 1993-06-02 | 1999-06-29 | Hewlett-Packard Company | System and method for revaluation of stored tokens in IC cards |
US5592553A (en) * | 1993-07-30 | 1997-01-07 | International Business Machines Corporation | Authentication system using one-time passwords |
US5577121A (en) * | 1994-06-09 | 1996-11-19 | Electronic Payment Services, Inc. | Transaction system for integrated circuit cards |
US5590197A (en) * | 1995-04-04 | 1996-12-31 | V-One Corporation | Electronic payment system and method |
US5850442A (en) * | 1996-03-26 | 1998-12-15 | Entegrity Solutions Corporation | Secure world wide electronic commerce over an open network |
US6085168A (en) * | 1997-02-06 | 2000-07-04 | Fujitsu Limited | Electronic commerce settlement system |
US20060218098A1 (en) * | 1997-08-28 | 2006-09-28 | Walker Jay S | Method and device for generating a single-use financial account number |
US6636833B1 (en) * | 1998-03-25 | 2003-10-21 | Obis Patents Ltd. | Credit card system and method |
US6270011B1 (en) * | 1998-05-28 | 2001-08-07 | Benenson Tal | Remote credit card authentication system |
US6393411B1 (en) * | 1998-07-21 | 2002-05-21 | Amdahl Corporation | Device and method for authorized funds transfer |
US6607136B1 (en) * | 1998-09-16 | 2003-08-19 | Beepcard Inc. | Physical presence digital authentication system |
US7636694B1 (en) * | 1998-09-18 | 2009-12-22 | Mastercard International Incorporated | Apparatus and method for generating an electronic-commerce personal identification number cryptographically related to an ATM personal identification number |
US6100804A (en) * | 1998-10-29 | 2000-08-08 | Intecmec Ip Corp. | Radio frequency identification system |
US6327578B1 (en) * | 1998-12-29 | 2001-12-04 | International Business Machines Corporation | Four-party credit/debit payment protocol |
US6636968B1 (en) * | 1999-03-25 | 2003-10-21 | Koninklijke Philips Electronics N.V. | Multi-node encryption and key delivery |
US6442448B1 (en) * | 1999-06-04 | 2002-08-27 | Radiant Systems, Inc. | Fuel dispensing home phone network alliance (home PNA) based system |
US20020147658A1 (en) * | 1999-09-13 | 2002-10-10 | Kwan Khai Hee | Computer network method for conducting payment over a network by debiting and crediting telecommunication accounts |
US20020107799A1 (en) * | 1999-10-07 | 2002-08-08 | Fujitsu Limited | Transaction method, transaction system, management equipment and IC card therefor |
US6681328B1 (en) * | 1999-10-08 | 2004-01-20 | Mastercard International Incorporated | System and method for global internet digital identification |
US20040064351A1 (en) * | 1999-11-22 | 2004-04-01 | Mikurak Michael G. | Increased visibility during order management in a network-based supply chain environment |
US20010027441A1 (en) * | 2000-02-16 | 2001-10-04 | Mastercard International Incorporated. | System and method for conducting electronic commerce with a remote wallet server |
US20030095791A1 (en) * | 2000-03-02 | 2003-05-22 | Barton James M. | System and method for internet access to a personal television service |
US6715078B1 (en) * | 2000-03-28 | 2004-03-30 | Ncr Corporation | Methods and apparatus for secure personal identification number and data encryption |
US20100057619A1 (en) * | 2000-04-24 | 2010-03-04 | Visa International Service Association | Account authentication service with chip card |
US7827115B2 (en) * | 2000-04-24 | 2010-11-02 | Visa International Service Association | Online payer authentication service |
US20080301056A1 (en) * | 2000-04-24 | 2008-12-04 | Weller Kevin D | Online payer authentication service |
US20020111919A1 (en) * | 2000-04-24 | 2002-08-15 | Visa International Service Association | Online payer authentication service |
US7373518B2 (en) * | 2000-05-09 | 2008-05-13 | Wincor Nixdorf International Gmbh | Operation of a security module in a card reader |
US20010044777A1 (en) * | 2000-05-10 | 2001-11-22 | Ncr Corporation | Self-service terminal |
US20010056409A1 (en) * | 2000-05-15 | 2001-12-27 | Bellovin Steven Michael | Offline one time credit card numbers for secure e-commerce |
US7107462B2 (en) * | 2000-06-16 | 2006-09-12 | Irdeto Access B.V. | Method and system to store and distribute encryption keys |
US20020018585A1 (en) * | 2000-07-19 | 2002-02-14 | Kim Young Wan | System and method for cardless secure credit transaction processing |
US6598031B1 (en) * | 2000-07-31 | 2003-07-22 | Edi Secure Lllp | Apparatus and method for routing encrypted transaction card identifying data through a public telephone network |
US20020164031A1 (en) * | 2000-08-15 | 2002-11-07 | Lauri Piikivi | Devices |
US20020049658A1 (en) * | 2000-08-29 | 2002-04-25 | George Davidson | Ticket remarketing system and method |
US20030061170A1 (en) * | 2000-08-29 | 2003-03-27 | Uzo Chijioke Chukwuemeka | Method and apparatus for making secure electronic payments |
US7103575B1 (en) * | 2000-08-31 | 2006-09-05 | International Business Machines Corporation | Enabling use of smart cards by consumer devices for internet commerce |
US20020062277A1 (en) * | 2000-11-20 | 2002-05-23 | Paul Foster | Method and system for completing a lease for real property in an on-line computing environment |
US20020069177A1 (en) * | 2000-12-01 | 2002-06-06 | Carrott Richard F. | Method and apparatus to provide secure purchase transactions over a computer network |
US20020126850A1 (en) * | 2001-03-09 | 2002-09-12 | Arcot Systems, Inc. | Method and apparatus for cryptographic key storage wherein key servers are authenticated by possession and secure distribution of stored keys |
US20040243496A1 (en) * | 2001-04-25 | 2004-12-02 | Kim Chul Ki | Financial information input method using symmetrical key security algorithm and commercial transaction system for mobile communications |
US20030009382A1 (en) * | 2001-06-12 | 2003-01-09 | D'arbeloff Matthew A. | Customer identification, loyalty and merchant payment gateway |
US8655789B2 (en) * | 2001-07-10 | 2014-02-18 | American Express Travel Related Services Company, Inc. | Systems and methods for non-traditional payment using biometric data |
US20050171898A1 (en) * | 2001-07-10 | 2005-08-04 | American Express Travel Related Services Company, Inc. | Systems and methods for managing multiple accounts on a rf transaction device using secondary identification indicia |
US20060012473A1 (en) * | 2001-07-10 | 2006-01-19 | American Express Travel Related Services Company, Inc. | System and method for authenticating a rf transaction using a radio frequency identification device including a transaction counter |
US7024174B2 (en) * | 2001-07-24 | 2006-04-04 | Citibank, N.A. | Method and system for data management in electronic payments transactions |
US7213144B2 (en) * | 2001-08-08 | 2007-05-01 | Nokia Corporation | Efficient security association establishment negotiation technique |
US20030055785A1 (en) * | 2001-09-20 | 2003-03-20 | International Business Machines Corporation | System and method for electronic wallet transactions |
US7080049B2 (en) * | 2001-09-21 | 2006-07-18 | Paymentone Corporation | Method and system for processing a transaction |
US20030080183A1 (en) * | 2001-10-31 | 2003-05-01 | Sanguthevar Rajasekaran | One-time credit card number generator and single round-trip authentication |
US7020635B2 (en) * | 2001-11-21 | 2006-03-28 | Line 6, Inc | System and method of secure electronic commerce transactions including tracking and recording the distribution and usage of assets |
US20050119978A1 (en) * | 2002-02-28 | 2005-06-02 | Fikret Ates | Authentication arrangement and method for use with financial transactions |
US7222239B2 (en) * | 2002-03-16 | 2007-05-22 | Hewlett-Packard Development Company, L.P. | Dynamic security system |
US20030177370A1 (en) * | 2002-03-16 | 2003-09-18 | Smith Mark T. | Dynamic security system |
US20030204726A1 (en) * | 2002-04-25 | 2003-10-30 | Kefford Mark Gregory | Methods and systems for secure transmission of information using a mobile device |
US20070173266A1 (en) * | 2002-05-23 | 2007-07-26 | Barnes Melvin L Jr | Portable communications device and method |
US7587756B2 (en) * | 2002-07-09 | 2009-09-08 | American Express Travel Related Services Company, Inc. | Methods and apparatus for a secure proximity integrated circuit card transactions |
US20050033688A1 (en) * | 2002-07-09 | 2005-02-10 | American Express Travel Related Services Company, Inc. | Methods and apparatus for a secure proximity integrated circuit card transactions |
US7412420B2 (en) * | 2002-09-09 | 2008-08-12 | U.S. Encode Corporation | Systems and methods for enrolling a token in an online authentication program |
US7391724B2 (en) * | 2002-10-09 | 2008-06-24 | Spyder Navigations, L.L.C. | System and method with policy control function for multimedia broadcast/multicast system services |
US8123123B1 (en) * | 2002-12-26 | 2012-02-28 | Diebold Self-Service Systems, Division Of Diebold, Incorporated | Automated banking machine that operates responsive to data bearing records |
US20040167854A1 (en) * | 2003-02-21 | 2004-08-26 | Knowles W. Jeffrey | System and method of currency conversion in financial transaction process |
US20040167863A1 (en) * | 2003-02-21 | 2004-08-26 | Knowles W. Jeffrey | System and method of transferring data through transaction process |
US20040167851A1 (en) * | 2003-02-21 | 2004-08-26 | W. Jeffrey Knowles | System and method of electronic data transaction processing |
US20040187108A1 (en) * | 2003-02-21 | 2004-09-23 | Knowles W. Jeffrey | Method of scheduling and event processing in computer operating system |
US20070143230A1 (en) * | 2003-06-30 | 2007-06-21 | Selvanathan Narainsamy | Transaction verification system |
US20050027648A1 (en) * | 2003-07-29 | 2005-02-03 | Knowles W. Jeffrey | System and method of account reconciliation for electronic transactions |
US20080029593A1 (en) * | 2003-08-18 | 2008-02-07 | Ayman Hammad | Method and System for Generating a Dynamic Verification Value |
US20050043997A1 (en) * | 2003-08-18 | 2005-02-24 | Sahota Jagdeep Singh | Method and system for generating a dynamic verification value |
US7090128B2 (en) * | 2003-09-08 | 2006-08-15 | Systems And Software Enterprises, Inc. | Mobile electronic newsstand |
US20050080677A1 (en) * | 2003-10-14 | 2005-04-14 | Foss Sheldon H. | Real-time entry and verification of PIN at point-of-sale terminal |
US20050101295A1 (en) * | 2003-11-07 | 2005-05-12 | Alcatel | Method for supporting cashless payment |
US7584153B2 (en) * | 2004-03-15 | 2009-09-01 | Qsecure, Inc. | Financial transactions with dynamic card verification values |
US20070136211A1 (en) * | 2004-03-15 | 2007-06-14 | Brown Kerry D | Financial transactions with dynamic card verification values |
US20070277044A1 (en) * | 2004-04-07 | 2007-11-29 | Hans Graf | Data Support With Tan-Generator And Display |
US7287692B1 (en) * | 2004-07-28 | 2007-10-30 | Cisco Technology, Inc. | System and method for securing transactions in a contact center environment |
US20080011823A1 (en) * | 2004-07-28 | 2008-01-17 | Cisco Technology, Inc. | System and method for securing transactions in a contact center environment |
US20060026671A1 (en) * | 2004-08-02 | 2006-02-02 | Darran Potter | Method and apparatus for determining authentication capabilities |
US20060085844A1 (en) * | 2004-10-20 | 2006-04-20 | Mark Buer | User authentication system |
US20070260544A1 (en) * | 2004-11-10 | 2007-11-08 | John Wankmueller | Method and system for performing a transaction using a dynamic authorization code |
US8527427B2 (en) * | 2004-11-10 | 2013-09-03 | Mastercard International Incorporated | Method and system for performing a transaction using a dynamic authorization code |
US20060177065A1 (en) * | 2005-02-09 | 2006-08-10 | Wal-Mart Stores, Inc. | System and methods for encrypting data utilizing one-time pad key |
US7711586B2 (en) * | 2005-02-24 | 2010-05-04 | Rearden Corporation | Method and system for unused ticket management |
US20060204051A1 (en) * | 2005-03-10 | 2006-09-14 | Debix One, Inc. | Method and system for managing account information |
US20060230112A1 (en) * | 2005-03-18 | 2006-10-12 | Yahoo! Inc. | Method for signing into a mobile device over a network |
US8266441B2 (en) * | 2005-04-22 | 2012-09-11 | Bank Of America Corporation | One-time password credit/debit card |
US20060242698A1 (en) * | 2005-04-22 | 2006-10-26 | Inskeep Todd K | One-time password credit/debit card |
US7587502B2 (en) * | 2005-05-13 | 2009-09-08 | Yahoo! Inc. | Enabling rent/buy redirection in invitation to an online service |
US20060278697A1 (en) * | 2005-06-13 | 2006-12-14 | Robert Lovett | System, method and program product for credit card transaction validation |
US20070119918A1 (en) * | 2005-07-15 | 2007-05-31 | Hogg Jason J | System and method for new execution and management of financial and data transactions |
US20070037552A1 (en) * | 2005-08-11 | 2007-02-15 | Timothy Lee | Method and system for performing two factor mutual authentication |
US20070055630A1 (en) * | 2005-09-06 | 2007-03-08 | Visa U.S.A. | System and method for secured account numbers in proximity devices |
US20080031456A1 (en) * | 2005-09-29 | 2008-02-07 | Keith Alexander Harrison | Device with multiple one-time pads and method of managing such a device |
US20070077916A1 (en) * | 2005-10-04 | 2007-04-05 | Forval Technology, Inc. | User authentication system and user authentication method |
US20070079135A1 (en) * | 2005-10-04 | 2007-04-05 | Forval Technology, Inc. | User authentication system and user authentication method |
US20070183593A1 (en) * | 2005-10-31 | 2007-08-09 | Fujitsu Limited And Osamu Hirota | Encryption method, cryptogram decoding method, encryptor, cryptogram decoder, and communication system |
US20070130463A1 (en) * | 2005-12-06 | 2007-06-07 | Eric Chun Wah Law | Single one-time password token with single PIN for access to multiple providers |
US20070125840A1 (en) * | 2005-12-06 | 2007-06-07 | Boncle, Inc. | Extended electronic wallet management |
US20100017860A1 (en) * | 2005-12-09 | 2010-01-21 | Ishida Natsuki | Authentication system and authentication method |
US20090063802A1 (en) * | 2006-01-24 | 2009-03-05 | Clevx, Llc | Data security system |
US20070220597A1 (en) * | 2006-03-17 | 2007-09-20 | Ishida Natsuki | Verification system |
US20150235211A1 (en) * | 2006-04-05 | 2015-08-20 | Simon Hurry | System and method for account identifier obfuscation |
US20090030845A1 (en) * | 2006-04-05 | 2009-01-29 | Simon Hurry | System and method for account identifier obfuscation |
US20110047036A1 (en) * | 2006-06-08 | 2011-02-24 | Master Card International Incorporated | All-in-one proximity payment device with local authentication |
US20080040271A1 (en) * | 2006-06-19 | 2008-02-14 | Ayman Hammad | Portable Consumer Device Verification System |
US20080034221A1 (en) * | 2006-06-19 | 2008-02-07 | Ayman Hammad | Portable consumer device configured to generate dynamic authentication data |
US20080005039A1 (en) * | 2006-06-20 | 2008-01-03 | Utstarcom, Inc. | Decryption of Personal Identification Number & Forwarding Method and Apparatus |
US8341397B2 (en) * | 2006-06-26 | 2012-12-25 | Mlr, Llc | Security system for handheld wireless devices using-time variable encryption keys |
US20080034216A1 (en) * | 2006-08-03 | 2008-02-07 | Eric Chun Wah Law | Mutual authentication and secure channel establishment between two parties using consecutive one-time passwords |
US20080040274A1 (en) * | 2006-08-14 | 2008-02-14 | Uzo Chijioke Chukwuemeka | Method of making secure electronic payments using communications devices and biometric data |
US20080071938A1 (en) * | 2006-09-19 | 2008-03-20 | Ricoh Company, Ltd. | Multifunction machine and a control method of the multifunction machine |
US20080103984A1 (en) * | 2006-10-30 | 2008-05-01 | Mobilekash, Inc. | System, Method, and Computer-Readable Medium for Mobile Payment Authentication and Authorization |
US20080140845A1 (en) * | 2006-12-08 | 2008-06-12 | Microsoft Corporation | Transfer of content to closed systems |
US20080168543A1 (en) * | 2007-01-05 | 2008-07-10 | Ebay Inc. | One time password authentication of websites |
US20080168544A1 (en) * | 2007-01-05 | 2008-07-10 | Ebay Inc. | Token device re-synchronization through a network solution |
US20110016054A1 (en) * | 2007-01-30 | 2011-01-20 | Phil Dixon | Signature based negative list for off line payment device validation |
US20080208746A1 (en) * | 2007-02-22 | 2008-08-28 | First Data Corporation | Management of financial transactions using debit networks |
US20080208759A1 (en) * | 2007-02-22 | 2008-08-28 | First Data Corporation | Processing of financial transactions using debit networks |
US8055581B2 (en) * | 2007-02-22 | 2011-11-08 | First Data Corporation | Management of financial transactions using debit networks |
US9846866B2 (en) * | 2007-02-22 | 2017-12-19 | First Data Corporation | Processing of financial transactions using debit networks |
US8130961B2 (en) * | 2007-06-05 | 2012-03-06 | Diversinet Corp. | Method and system for client-server mutual authentication using event-based OTP |
US20100031051A1 (en) * | 2007-06-05 | 2010-02-04 | Machani Salah E | Protocol And Method For Client-Server Mutual Authentication Using Event-Based OTP |
US20090144202A1 (en) * | 2007-11-29 | 2009-06-04 | Visa Usa, Inc. | Module id based encryption for financial transactions |
US20090157555A1 (en) * | 2007-12-12 | 2009-06-18 | American Express Travel Related Services Company, | Bill payment system and method |
US20090154707A1 (en) * | 2007-12-18 | 2009-06-18 | Lee Taek Kyu | Method and system for distributing group key in video conference system |
US8255688B2 (en) * | 2008-01-23 | 2012-08-28 | Mastercard International Incorporated | Systems and methods for mutual authentication using one time codes |
US20080208758A1 (en) * | 2008-03-03 | 2008-08-28 | Spiker Norman S | Method and apparatus for secure transactions |
US8770470B2 (en) * | 2008-04-29 | 2014-07-08 | Visa U.S.A. Inc. | Device including form factor indicator |
US20090287742A1 (en) * | 2008-05-15 | 2009-11-19 | Bowe Bell+ Howell Company | Method and system for run time directories for address services on a mail processing system |
US20100106649A1 (en) * | 2008-10-23 | 2010-04-29 | Diversinet Corp. | System And Method For Authorizing Transactions Via Mobile Devices |
US20100287382A1 (en) * | 2009-05-07 | 2010-11-11 | John Charles Gyorffy | Two-factor graphical password for text password and encryption key generation |
US20100293099A1 (en) * | 2009-05-15 | 2010-11-18 | Pauker Matthew J | Purchase transaction system with encrypted transaction information |
US20120185398A1 (en) * | 2009-09-17 | 2012-07-19 | Meir Weis | Mobile payment system with two-point authentication |
US20110099384A1 (en) * | 2009-10-23 | 2011-04-28 | Vasco Data Security International, Inc. | Strong authentication token usable with a plurality of independent application providers |
US20110101109A1 (en) * | 2009-11-05 | 2011-05-05 | John Kenneth Bona | Card with illuminated codes for use in secure transactions |
US20120137131A1 (en) * | 2009-12-31 | 2012-05-31 | Zhou Lu | Authentication method, system, and device |
US20120226582A1 (en) * | 2010-02-24 | 2012-09-06 | Ayman Hammad | Integration of Payment Capability into Secure Elements of Computers |
US20110302021A1 (en) * | 2010-06-08 | 2011-12-08 | Reid Christopher S | Fundraising process using pos technology |
US20120028609A1 (en) * | 2010-07-27 | 2012-02-02 | John Hruska | Secure financial transaction system using a registered mobile device |
US20120143770A1 (en) * | 2010-12-06 | 2012-06-07 | Pauker Matthew J | Purchase transaction system with encrypted payment card data |
US20120150742A1 (en) * | 2010-12-14 | 2012-06-14 | Xtreme Mobility Inc. | System and Method for Authenticating Transactions Through a Mobile Device |
US20120197807A1 (en) * | 2011-01-28 | 2012-08-02 | Joshua Schlesser | Secure online transaction processing |
US20140136418A1 (en) * | 2011-09-29 | 2014-05-15 | Pacid Technologies, Llc | System and method for application security |
US20130262317A1 (en) * | 2012-04-02 | 2013-10-03 | Mastercard International Incorporated | Systems and methods for processing mobile payments by provisoning credentials to mobile devices without secure elements |
US20150154414A1 (en) * | 2012-07-20 | 2015-06-04 | Licentia Group Limited | Authentication Method and System |
US20140101055A1 (en) * | 2012-10-05 | 2014-04-10 | Jvl Ventures, Llc | Systems, methods, and computer program products for managing remote transactions |
US20150287031A1 (en) * | 2012-11-19 | 2015-10-08 | Mastercard International Incorporated | Methods and apparatus for card transactions |
US20160063496A1 (en) * | 2013-03-15 | 2016-03-03 | Vijay Kumar Royyuru | Remote Secure Transactions |
US20170011395A1 (en) * | 2013-09-30 | 2017-01-12 | Apple Inc. | Multi-path communication of electronic device secure element data for online payments |
US20160110711A1 (en) * | 2014-10-21 | 2016-04-21 | Mastercard International Incorporated | Method and system for generating cryptograms for validation in a webservice environment |
US20180240110A1 (en) * | 2017-02-21 | 2018-08-23 | Mastercard International Incorporated | Transaction cryptogram |
US20190172045A1 (en) * | 2017-12-04 | 2019-06-06 | The Toronto-Dominion Bank | Dynamic generation and provisioning of tokenized data to network-connected devices |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US12107925B2 (en) | 2021-06-18 | 2024-10-01 | Bank Of America Corporation | Data processing transactions between disparate systems using a universal processor |
Also Published As
Publication number | Publication date |
---|---|
US9846866B2 (en) | 2017-12-19 |
US20080208759A1 (en) | 2008-08-28 |
WO2008118582A1 (en) | 2008-10-02 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US20180053167A1 (en) | Processing of financial transactions using debit networks | |
US11880815B2 (en) | Device enrollment system and method | |
US8055581B2 (en) | Management of financial transactions using debit networks | |
US12074974B2 (en) | Method and system for access token processing | |
US9858566B2 (en) | Biometric authentication of mobile financial transactions by trusted service managers | |
US8565723B2 (en) | Onetime passwords for mobile wallets | |
US7865448B2 (en) | Methods and systems for performing credit transactions with a wireless device | |
JP5552555B2 (en) | Transaction authentication using the network | |
US8818907B2 (en) | Limiting access to account information during a radio frequency transaction | |
US20150220932A1 (en) | Biometric authentication of mobile financial transactions by trusted service managers | |
US20160224984A1 (en) | Biometric authentication of mobile financial transactions by trusted service managers | |
CN108476227A (en) | System and method for equipment push supply | |
US20090150248A1 (en) | System for enhancing payment security, method thereof and payment center | |
MX2008011021A (en) | Method and system for performing two factor authentication in mail order and telephone order transactions. | |
KR20140125449A (en) | Transaction processing system and method | |
US20240291812A1 (en) | Token processing system and method | |
US20220291979A1 (en) | Mobile application integration | |
CN108780547B (en) | Proxy device for representing multiple certificates | |
KR100431223B1 (en) | Optical payment system on eCommerce |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AS | Assignment |
Owner name: FIRST DATA CORPORATION, COLORADO Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:ROYYURU, VIJAY;REEL/FRAME:044031/0489 Effective date: 20070307 |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: DOCKETED NEW CASE - READY FOR EXAMINATION |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: NON FINAL ACTION MAILED |
|
STCB | Information on status: application discontinuation |
Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION |