Entries |
Document | Title | Date |
20080201264 | PAYMENT CARD FINANCIAL TRANSACTION AUTHENTICATOR - A payment card financial transaction authenticates for providing overall financial network security computes a number of results from a cryptographic key that match values that were selectively used to personalize individual payment cards with their individual user identification and account access codes. An account access code is later presented daring a financial transaction involving at least one of those individual payment cards. A dynamic portion is included in a merchant's magnetic reading of the payment card. Then authenication can proceed by matching it with values computed from the cryptographic key. | 08-21-2008 |
20080201265 | Smart card with random temporary account number generation - The smart card with random temporary account number generation provides an authenticating system coupled with an access or transaction card, such as a credit card. The card includes first and second memory storage media, with the first memory medium containing a plurality of temporary account or authentication numbers. The card also has a biometric sensor, such as a fingerprint scanner, and the second memory stores the biometric parameters of the authorized user. A processor compares the biometric parameters with the measured biometric readings to enable the card. The processor has a random number generator, allowing for the randomized selection of one of the account numbers stored in the first memory, thus providing a temporary account number for the transaction. A remote site includes an identical random number generator and set of account numbers, allowing the temporary account number to be verified and then discarded, following the transaction. | 08-21-2008 |
20080201266 | Communications System - A method for controlling payment in a communications system including the steps of providing a service accessing a service provider from the or one user device, selecting a product for purchase from the service provider, the service agent receiving a request for payment from the service provider via a payment operator and the service agent issuing a payment authorisation to a payment provider via the payment operator. The service agent is installable in a variety of user devices and provides a uniform interface to the payment system from a plurality of the user devices. The service agent may also provide a uniform interface to an ordering system from a plurality of the user devices. | 08-21-2008 |
20080222047 | Device and Method for Conducting Secure Economic Transactions with a Programmable Magnetic Stripe - A secure economic transaction device includes a memory for storing user account information, a temporary code generator coupled to the memory and operable to generate a time-based code that is valid for only a finite amount of time, a programmable magnetic stripe on a surface of the device and operable to magnetically transmit at least a portion of the user account information and the temporary code to a stripe reader, and stripe programming circuitry located on the device, coupled to the temporary code generator, and operable to dynamically program the magnetic stripe with the code. Also provided is a method for conducting the transaction. | 09-11-2008 |
20080222048 | Distributed Payment System and Method - The present invention provides a payment system that allows a mobile communications device (MCD) to interact with a merchant processing device (MPD) and a payment engine. A communications component associated with the payment engine can send requested barcodes to the MPD, receive barcodes or alphanumeric Universal Product Codes from customer MCDs, and handle payment authorizations and settlements. A barcode management component can generate and interpret barcodes based upon merchant offerings and client requests. A security algorithms component can employ an offset pair algorithm to convert each digit from a payment card information into an offset pair of digits to facilitate security in accordance with one embodiment of the present invention. | 09-11-2008 |
20080228652 | INTERNET BUSINESS SECURITY METHOD - An internet business security method is disclosed. According to this method, first, a one-time password is generated based on a smart card that includes a chip to perform the processes of storing data, processing data and encoding/decoding data. Then, the one-time password is identified by the website. When the one-time password is correct, the smart card holder is permitted to login to the website for further trading. The trade object for this website is the smart card holder identity registered in the bank. | 09-18-2008 |
20080228653 | SYSTEMS AND METHODS FOR ENROLLING A TOKEN IN AN ONLINE AUTHENTICATION PROGRAM - An online transaction system configured to implement authentication methods that allow for strong multi-factor authentication in online environments. The authentication methods can be combined with strong security methods to further ensure that the authentication process is secure. Further, the strong multi-factor authentication can be implemented with zero adoption dependencies through the implementation of automated enrollment methods. | 09-18-2008 |
20080235144 | Pre-authenticated identification token - An identification token such as a proximity payment device may be integrated with a wristwatch. For security purposes, the identification token may be disabled when removed from the user's wrist. The identification token may be re-enabled by interaction with a docking station or personal computer at the user's residence. | 09-25-2008 |
20080249947 | MULTI-FACTOR AUTHENTICATION USING A ONE TIME PASSWORD - A method of authenticating a user includes receiving a one time password from the user. The received one time password is compared to a first one time password associated with the user and provided to the user on a receipt corresponding to a transaction. The user is authenticated into a service only if the received one time password matches the first one time password associated with the user. | 10-09-2008 |
20080249948 | FINANCIAL INFORMATION INPUT METHOD USING SYMMETRICAL KEY SECURITY ALGORITHM AND COMMERCIAL TRANSACTION SYSTEM FOR MOBILE COMMUNICATIONS - A financial information input method using a symmetric key security algorithm and a mobile communications commercial transaction system using the same encrypts financial information such as a customer's identification number and a valid date with a symmetric key algorithm by use of an electronic wallet administration number of a customer's terminal used as an encryption key at the time of applying an issuance of a card, and directly inputs the encrypted financial information into a customer's electronic wallet terminal or inputs the same via a communications network. In the case that a commercial transaction settlement is accomplished with a mobile communications terminal in which the encrypted financial information is stored, his or her own electronic wallet administration number is input so that the encrypted financial information and the administration number are optically transmitted to a POS terminal/card inquiry machine of an affiliated shop. The POS terminal/card inquiry machine which has received the encrypted financial information and administration number uses the received electronic wallet administration number and decodes the encrypted financial information with the administration number. Thus, although an unauthorized person knows an encryption algorithm unless a customer's electronic wallet administration number is exposed illegally, customer's financial information cannot be used. That is, an effect of fundamentally preventing customer's financial information from being illegally copied can be provided. | 10-09-2008 |
20080301056 | ONLINE PAYER AUTHENTICATION SERVICE - A payment authentication service authenticates the identity of a payer during online transactions. The authentication service of the present invention allows a card issuer to verify a cardholder's identity using a variety of authentication methods, such as the use of passwords. Also, the only system participant requiring a certificate is the issuing financial institution. One embodiment of the invention for authenticating the identity of a cardholder during an online transaction involves querying an access control server to determine if a cardholder is enrolled in the payment authentication service, requests a password from the cardholder, verifies the password, and notifies a merchant whether the cardholder's authenticity has been verified. In another aspect of the invention, a chip card and the authentication service independently generate cryptograms that must match in order for the service to verify that the correct chip card is being used by the cardholder. | 12-04-2008 |
20080313088 | IDENTIFICATION VERIFICATION SYSTEM - An identification verification system having several applications is disclosed. First, a sender sends a person an offer that requests information. The person replies to the sender, who forwards the reply to a verifying entity. If the sender is legitimate, the verifying entity forwards the reply to a UDID service, which requests authorization from the person to send the information to the sender. Second, a passenger can only access a boarding pass online after entering in a UDID and password. A code string is also generated in a document verification field that is decoded to determine information. Third, an online shopper requests verification from a merchant. The merchant then asks a credit card company for a token. If the merchant has a merchant account with the company, the merchant receives the token that generates a certificate for the shopper, who sends the certificate to the company to verify it is valid. | 12-18-2008 |
20080319913 | ANONYMOUS ONLINE PAYMENT SYSTEMS AND METHODS - In various embodiments, a central server grants access to a plurality of anonymous one-time-usable, time-sensitive encrypted tokens that identify consumer purchase orders. A plurality of certified merchant servers are certified by being provided with an application to securely connect the certified merchant servers to the central server for, among other things, transmitting purchase order data to the central server for use in generating the tokens. A plurality of financial institution servers can also be certified by being configured for use with an application that enables secure connection to the central server for, among other things, requesting the tokens. | 12-25-2008 |
20090006264 | Methods and Systems For Secure Voice-Authenticated Electronic Payment - This application discloses systems, methods, and processes for providing a secure, voice-authenticated form of electronic payment from a device. The described exemplary system provides an infrastructure for receiving an electronic payment request, verifying the request using voice authentication, and allowing or denying the request based on the authentication or non-authentication of the user. | 01-01-2009 |
20090012901 | Multifactor authentication system for "cash back" at the point of sale - Systems and methods are provided to allow for multifactor authentication of customers seeking to enter into “cash back” transactions at a merchant's point of sale. In an illustrative implementation, a user presents a prepaid payment card at a point of sale and requests a “cash back” transaction, the merchant thereupon verifying the customer has sufficient value to complete the transaction. The merchant then requests an authentication code from the user who then requests the authentication code from an outside party. The authentication code is delivered to the customer's mobile phone via a text message. The customer offers the authentication code to the merchant, who then allows the transaction to proceed if the authentication code is confirmed. | 01-08-2009 |
20090030843 | SMART CARD LOAD AND PURCHASE TRANSACTIONS USING WIRELESS TELECOMMUNICATIONS NETWORK - A smart card transaction allows a consumer to load value onto a smart card and to make purchases using a smart card with a mobile telephone handset over the telecommunications network. For loading, the system includes: a mobile telephone handset including a card reader; a gateway computer; a funds issuer computer; and an authentication computer. The mobile telephone handset receives a request from a user to load a value onto the smart card. The handset generates a funds request message which includes the value and sends the funds request message to a funds issuer computer. The funds issuer computer debits an account associated with the user. Next, the handset generates a load request message with a cryptographic signature and sends the load request message to an authentication computer which authenticates the smart card. The handset receives a response message which includes a cryptographic signature and an approval to load. Finally, the handset validates the second cryptographic signature and loads the value onto the smart card. For payment, the system includes a merchant server and a payment server. First, the handset sends an order request message to the merchant server computer, and in return receives a purchase instruction message. The handset processes the purchase instruction message locally, and then sends a draw request message to a payment server computer. The payment server computer sends a debit message which includes a cryptographic signature and an approval to debit the smart card. Finally, the handset validates the cryptographic signature and debits the smart card. | 01-29-2009 |
20090030844 | SMART CARD LOADING TRANSACTIONS USING WIRELESS TELECOMMUNICATIONS NETWORK - A smart card transaction allows a consumer to load value onto a smart card and to make purchases using a smart card with a mobile telephone handset over the telecommunications network. For loading, the system includes: a mobile telephone handset including a card reader; a gateway computer; a funds issuer computer; and an authentication computer. The mobile telephone handset receives a request from a user to load a value onto the smart card. The handset generates a funds request message which includes the value and sends the funds request message to a funds issuer computer. The funds issuer computer debits an account associated with the user. Next, the handset generates a load request message with a cryptographic signature and sends the load request message to an authentication computer which authenticates the smart card. The handset receives a response message which includes a cryptographic signature and an approval to load. Finally, the handset validates the second cryptographic signature and loads the value onto the smart card. For payment, the system includes a merchant server and a payment server. First, the handset sends an order request message to the merchant server computer, and in return receives a purchase instruction message. The handset processes the purchase instruction message locally, and then sends a draw request message to a payment server computer. The payment server computer sends a debit message which includes a cryptographic signature and an approval to debit the smart card. Finally, the handset validates the cryptographic signature and debits the smart card. | 01-29-2009 |
20090043708 | Method and apparatus for reducing optical emissions in an integrated circuit - A method of hindering optical detection of a pattern of data being stored, moved or processed by at least one active circuit in an integrated circuit, the active circuit including at least first and second active devices that change state within a period of time, such that each device exhibits low resistance in one state and high resistance in another state, the method comprising controlling timing of the change of state of the first active device relative to the second active device so as to prevent the devices having simultaneous intermediate resistances between the low and high resistances, thereby to reduce optical emission by the at least one active circuit compared to causing the changes of state of the two devices to happen simultaneously. | 02-12-2009 |
20090043709 | METHOD AND SYSTEM FOR DETECTING TRACE STATUS, TRACE AGENT AND TRACE CONTROL SERVER - The embodiments of the invention disclose a method for detecting status of a trace task, including: calculating a Token Digest value of a Service Level Tracing (SLT) Token according to information of the SLT Token; and verifying whether the Token Digest is changed. If the Token Digest is unchanged, it is determined that the trace task is not tampered; otherwise, it is determined that the trace task is tampered. The embodiments of the invention further disclose a corresponding system for detecting the status of the trace task as well as a trace agent and a trace control server. According to the embodiments of the invention, the status of the trace task can be effectively detected through calculating and verifying the Token Digest, so that it can be determined whether the trace task is tampered. | 02-12-2009 |
20090048979 | TOKEN BASED NEW DIGITAL CASH PROTOCOLS - Digital cash token protocols employ two pairs of private and public keys. Each public key is certified separately and the protocols do not use any blind signature schemes. As a result, the digital cash token protocols provide strong protection of user privacy by using two certified public keys instead of a blind signature. One pair of certified keys consists of one master user private key and one master user public key. A second pair of certified keys consists of one pseudonym user private key and one pseudonym user public key. The use of a master key pair and a pseudonym key pair circumvents the need for blind signatures. As a result, the proposed protocols do not require blind signatures and do not add additional overhead and security requirements necessitated by conventional blind signature schemes. The protocols use public key protocols and digital signatures and symmetric key protocols, which may be readily implemented in standard information security based systems based on cryptographic constructs. In addition, the protocols may be deployed in mobile, off-line, and on-line settings. | 02-19-2009 |
20090076966 | Methods and apparatus for conducting electronic transactions - A system and method for facilitating electronic transactions using an intelligent instrument is disclosed. An authorization server enables users to obtain authorization credentials through the use of the intelligent instrument by issuing a challenge to an intelligent token of the intelligent instrument. The intelligent token generates a challenge response and transmits the challenge response to the authorization server, which assembles credentials including a key for the electronic transaction upon validating the response. The authorization server sends the assembled credentials to the intelligent instrument and the intelligent instrument transmits the assembled credentials to the authorization server during a subsequent transaction. The authorization server validates the assembled credentials and provides authorization for the transaction in response to the validating the assembled credentials. | 03-19-2009 |
20090089213 | TRACK DATA ENCRYPTION - A portable consumer device using a secondary PAN is disclosed. The portable consumer device includes a secondary PAN associated with a primary PAN, where the secondary PAN has at least one end portion that is the same as the primary PAN, but has a middle portion of that is different than the primary PAN. | 04-02-2009 |
20090094164 | REMOTE ACCESS VERIFICATION ENVIRONMENT SYSTEM AND METHOD - A system and method for authentication of the location of a user requesting remote access to an application server for processing a transaction requiring user location authentication. The system includes a client for enabling the user to request remote access to the application server, an access server for receiving and processing the request for access, an authenticating server for authenticating the user location responsive to receipt of the processed request from the access server, and a network for interconnecting the client, the access server, the authenticating server, and the application server. The client includes an identifier associated with the user's location, and the authenticating server is adapted to authenticate the client location identifier. The client may include a dialer, including a number associated therewith, and the authenticating server may be adapted to identify the number associated with the dialer to authenticate the user's location, and may further be adapted to identify the first number dialed to further authenticate the user location. The authenticating server may issue a security challenge to the client, and the client may interrogate the security challenge, generate a response, and transmit the response to the authenticating server. | 04-09-2009 |
20090125446 | System and Method for Secure Transactions Manageable by a Transaction Account Provider - A system and method for securing a financial transaction using a proxy code, which is assigned a transaction account number. An account issuer permanently assigns the proxy code to a transaction account correlated to the transaction device. The proxy code is uploaded onto the transaction device for later use in completing a transaction request. During transaction completion, the proxy code is provided to a merchant system in lieu of any sensitive account information. Since the proxy code is permanently assigned, the number need not be changed or updated on the merchant system once uploaded into a payment device or merchant database. The account issuer may manipulate the sensitive account information without need to alter the information stored on the merchant database. Since the proxy code contains no sensitive information, the sensitive information related to the transaction account is secured from theft. | 05-14-2009 |
20090138405 | System and method for performing secure online transactions - The system and method performing secure online-transactions based on challenge/response procedures executed by a terminal of at least one customer and by a terminal of a service provider, such as a bank, which terminals are connected to a network, preferably the Internet. The inventive method including:
| 05-28-2009 |
20090144202 | MODULE ID BASED ENCRYPTION FOR FINANCIAL TRANSACTIONS - A server is operable to receive a media device identifying number (ID) and establish an association between a media device and a payment account and, in one embodiment, supports at least one of payment authorization and payment clearing based at least in part on the media device ID and the payment account. A network and system includes a payment card processor server that is operable to receive a payment authorization request and to determine if an authorized media device generated a purchase selection message and to determine to approve a received payment authorization request based, in part, if the media device was authorized for the purchase selection based upon a received media device ID. The system is further operable to perform a key rotation to protect payment account information. | 06-04-2009 |
20090144203 | SERIAL NUMBER AND PAYMENT DATA BASED PAYMENT CARD PROCESSING - A server is operable to receive a media device identifying number (ID) and establish an association between a media device and a payment account and, in one embodiment, supports at least one of payment authorization and payment clearing based at least in part on the media device ID and the payment account. A network and system includes a payment card processor server that is operable to receive a payment authorization request and to determine if an authorized media device generated a purchase selection message and to determine to approve a received payment authorization request based, in part, if the media device was authorized for the purchase selection based upon a received media device ID. | 06-04-2009 |
20090150294 | SYSTEMS AND METHODS FOR AUTHENTICATING FINANCIAL TRANSACTIONS INVOLVING FINANCIAL CARDS - A system for authenticating financial transactions comprising a plurality of financial cards, a plurality of financial terminals, and at least one authorization center connected to the plurality of financial terminals. Each of the financial cards having a card data storage device for storing identification data, and a GPS module for generating geographical position indicative of a current geographical position of the financial card. Each of the financial terminals having a card reader configured to receive one of the financial cards and access the identification data and geographical position data associated therewith. The Authorization center is configured to receive transactional data associated with a financial transaction, the transactional data including the identification data and the geographical position data for the particular financial transaction involving a particular financial terminal and a particular financial card, and for each financial transaction, determine whether that transaction is potentially fraudulent based on an analysis of the geographical position data for that transaction and previously stored geographical position data related to the particular financial card. | 06-11-2009 |
20090157555 | BILL PAYMENT SYSTEM AND METHOD - Automated authorization and processing of an interim payment is disclosed. When a merchant requests payment prior to a recurring payment process being enabled, the system handles the payment request without customer intervention. The system requests and receives a transaction coordination code for an interim payment from a financial processor. The system passes the interim payment transaction coordination code to the merchant so the merchant may obtain an authorized payment. | 06-18-2009 |
20090157556 | MERCHANT FACILITATION OF ONLINE CARD PRESENT TRANSACTION - An online card-present transaction system facilitates card-present type transactions with a merchant over a public network. A host system is configured to accept authentication data from a user via an authentication device. The host system, after authenticating a user is configured to retrieve the user's account information from a user database system and translate a user account number into a temporary transaction number. The temporary transaction number is then transmitted directly from the host system to the merchant, thereby eliminating the need for the user to send to the merchant over the internet, the user's transaction account number. | 06-18-2009 |
20090157557 | MERCHANT SYSTEM FACILITATING AN ONLINE CARD PRESENT TRANSACTION - An online card-present transaction system facilitates card-present type transactions with a merchant over a public network. A host system is configured to accept authentication data from a user via an authentication device. The host system, after authenticating a user is configured to retrieve the user's account information from a user database system and translate a user account number into a temporary transaction number. The temporary transaction number is then transmitted directly from the host system to the merchant, thereby eliminating the need for the user to send to the merchant over the internet, the user's transaction account number. | 06-18-2009 |
20090164382 | SYSTEM FOR MANAGING MULTIPLE CREDIT ACCOUNTS - In an improved method and system for managing consumer credit accounts a consumer registers a plurality of credit accounts through a secure web page establishing a priority of accounts in the process. The web page aggregates data from all of the registered accounts and a single credit card or device is issued to access the aggregated accounts. The single card is used at points of sale like an ordinary credit card except that it requires a password like a debit card. When a purchase is made the request is relayed to the credit account that has the top priority and sufficient available credit. A single card can access a plurality of separate credit accounts so there is no need to carry multiple cards. If the single card is stolen, it can be rapidly inactivated with a single call. It will not be necessary to cancel the underlying accounts. | 06-25-2009 |
20090171849 | TRACK DATA ENCRYPTION - A method for using a secondary PAN is disclosed. The method includes providing a secondary PAN associated with a primary PAN, where the secondary PAN has at least one end portion that is the same as the primary PAN, but has a middle portion of that is different than the primary PAN. | 07-02-2009 |
20090177585 | Conditional access system for broadcast digital television - A method for managing access to scrambled broadcast or transmitted events received from a variety of service providers (including broadcast television networks, cable television networks, digital satellite systems). Each service provider employs the same public key for descrambling the access information message thereby permitting a user to access events from various service providers without changing the smart card. The method may also be expanded to manage access to a scrambled package of broadcast events. | 07-09-2009 |
20090177586 | AUTHENTICATION DEVICE AND PAYMENT SYSTEM - The payment system according to the present invention comprises an electronic payment device ( | 07-09-2009 |
20090177587 | METHOD AND SYSTEM FOR PROVIDING ONLINE AUTHENTICATION UTILIZING BIOMETRIC DATA - A system and method for securely authenticating a user for the purpose of accessing information, such as private financial or personal information, in an online environment are disclosed. In addition, a system and method for allowing consumers to make secure payments from an electronic wallet with biometric authentication are disclosed. | 07-09-2009 |
20090210347 | Method and System for a Virtual Safe - A transaction server for performing a transaction over a network using a virtual smart card the server comprising, a virtual smart card database having a plurality of records each record including a virtual card identification and a value corresponding to a single virtual smart card; a security module; an emulator for emulating a smart card, the emulator for receiving smart card commands and processing the commands in conjunction with the virtual smart card database and the security module; and a virtual card reader module for receiving the smart card commands and relaying the commands to the smart card emulator whereby transactions are performed over the network using one or more the records and the virtual smart card database. | 08-20-2009 |
20090248579 | Method and System for Accepting and Processing Financial Transactions over a Mobile Computing Device - A system includes a processing component; a communication interface receiving transaction data when a mobile device is coupled to the system; at least one data capture input element receiving payment data from an item external to the system and the mobile device; and a display displaying at least the transaction data. | 10-01-2009 |
20090248580 | SECURE ONLINE BANKING TRANSACTION APPARATUS AND METHOD - A secure online banking transaction apparatus to communicate with a server over a non-secure connection is provided and includes a selector configured to allow for a selection of a mode of the apparatus, a processing unit coupled to the selector and including a secure communication unit, which is configured to set up a secure connection, along which a secure transaction occurs, with the server via the non-secure connection in accordance with the mode, an input unit coupled to the processing unit and configured to allow for a input of data into the apparatus, which is at least partly related to the secure transaction, and an interface coupled to the processing unit and configured to convey at least a status of the secure transaction and the contents off the inputted data. | 10-01-2009 |
20090248581 | DISPLAY PAYMENT CARD WITH FRAUD AND LOCATION DETECTION - A payment card comprises a display to support card-not-present transactions where no card reader is available to automate the transaction, and an account number retrieval method for dynamic, one-time use virtual account numbers whose use can assist authorities in rapid fraud and location detection. The account number generator is able to produce a sequence of virtual account numbers over its life that are predictable by the issuing bank and useful in authenticating transactions. A server for the issuing bank logs the merchant locations associated with each use or attempted use, and provides real-time detection of fraudulent attempts to use a virtual account number outside the predicted set. Fraud identification efforts can then be directed in a timely and useful way. | 10-01-2009 |
20090281951 | Payment Processing Platform - A method for generating a child product that is linked to a core account. A payment processing platform receives a user selection of control parameters that define use restrictions for the child product and the core account that provides financial backing for the child product. The child product is generated and may be used for payment transactions within the use restrictions defined by the control parameters. The child product is delivered to a recipient as a physical card or as a virtual card or both as a physical card and a virtual card. Advantageously, the financial institution needs to modify its legacy payment processing infrastructure minimally in order to process payment transactions made using the child product. From a user perspective, child products protect consumers from fraud or identity theft and limit a customer's exposure when child products are lost or stolen. | 11-12-2009 |
20090307139 | BIOMETRIC AUTHENTICATION OF MOBILE FINANCIAL TRANSACTIONS BY TRUSTED SERVICE MANAGERS - A method for authenticating a financial transaction at a point of sale (POS) includes storing an application program in a first secure element of a mobile phone. The application is configured to generate instruction codes to effect the financial transaction upon verification of a user's identity. The user's credentials are stored in a second SE of the phone, which is operable to verify the user's identity from a biometric trait of the user input to the phone and to generate data authenticating the financial transaction in response to the verification of the user's identity. At the POS, the user invokes the application and then inputs a biometric trait to the phone. The second SE verifies the user's identity, and upon verification, generates data authenticating the transaction. The financial transaction data, including the instruction codes and the authenticating data, are then transmitted from the phone to the POS. | 12-10-2009 |
20100017333 | METHODS AND SYSTEMS FOR CONDUCTING ELECTRONIC COMMERCE - Methods are disclosed of processing financial transactions. A connection is established over a public network between a customer client and a merchant server. A file is received over the connection from the merchant server at the customer client. An application is launched at the merchant server in response to receiving the file. Financial transaction data are received with the launched application. The received financial transaction data are transmitted with the launched application over the connection from the customer client to the merchant server to initiate processing of the financial transaction with the received financial transaction data. | 01-21-2010 |
20100030695 | MOBILE DEVICE SECURITY USING WEARABLE SECURITY TOKENS - The claimed subject matter provides systems and/or methods that effectuates and establishes mobile device security. The system can include devices that detect point of sale mechanisms or secure token devices and based at least in part on the detection of secure token devices the system effectuates release of electronic funds persisted on a mobile device in order to satisfy a debt accrued at the point of sale mechanism. | 02-04-2010 |
20100036773 | INTEGRATED WIRELESS RESONANT POWER CHARGING AND COMMUNICATION CHANNEL - A power delivery system wirelessly deliver electric power and a communication signal to a target device. The power delivery system includes a power transmitting unit having a power source operable to source alternating current power and a sending resonant coupling component operable to couple the alternating current power to a coil for wireless power transmission by a non-radiated magnetic field at a target resonant frequency. The power transmitting unit is capable of dynamically tuning the wireless power transmission to the target resonant frequency wherein the target resonant frequency is specified dynamically. A communication module couples to the power transmitting unit and is operable to couple the communication signal to the non-radiated magnetic field. Operations may include target device authentication, target resonant frequency information communication, billing, and device management. | 02-11-2010 |
20100057619 | ACCOUNT AUTHENTICATION SERVICE WITH CHIP CARD - A payment authentication service authenticates the identity of a payer during online transactions. The authentication service of the present invention allows a card issuer to verify a cardholder's identity using a variety of authentication methods, such as the use of passwords. Also, the only system participant requiring a certificate is the issuing financial institution. One embodiment of the invention for authenticating the identity of a cardholder during an online transaction involves querying an access control server to determine if a cardholder is enrolled in the payment authentication service, requests a password from the cardholder, verifies the password, and notifies a merchant whether the cardholder's authenticity has been verified. In another aspect of the invention, a chip card and the authentication service independently generate cryptograms that must match in order for the service to verify that the correct chip card is being used by the cardholder. | 03-04-2010 |
20100082492 | PAYMENT SYSTEM - An electronic transaction payment system is provided having a vendor terminal associated with a vendor who provides goods or services to a purchaser, a vendor smart-card and a vendor smart-card reader for transmitting data to and receiving data from the vendor smart-card. The system also includes a purchaser smart-card reader which is connected to the vendor terminal and which is operable for transmitting data to and receiving data from a purchaser smart-card. In operation, payment for goods purchased by the purchaser is made between the purchaser smart-card and the vendor smart-card. In a preferred embodiment, the payment data is encrypted using an encryption key specific to the transaction between the purchaser and the vendor. A third party registry terminal may also be provided for providing validation of the vendor and/or the purchaser. | 04-01-2010 |
20100106647 | METHOD AND SYSTEM FOR CLOSE RANGE COMMUNICATION USING AUDIO TONES - The present invention relates to a method for close range secured communication using audio tones and a system for carrying out such method. The invention is related to the field of financial transactions through relatively-mobile devices using audio tones. More particularly, the present invention is directed to a method for communicating information between two mobile phones using the speaker and Mic of the mobile devices | 04-29-2010 |
20100106648 | Method and apparatus for acquiring encryption key to provide pay channel - A mobile terminal is configured to acquire an encryption key to decrypt a pay channel encrypted with a smartcard profile by the mobile terminal in a Multimedia Broadcast/Multicast Service (MBMS) mobile broadcast system. The mobile terminal is configured to purchase a specific pay channel, determine validity of an encryption key, store a range of a valid encryption key identification value, and initialize a reference Time Stamp (TS) value. The mobile terminal also; extracts an encryption key identification value and a TS value from a last received Short Term Key Message (STKM), when a view request for the specific pay channel is created; and determines that an encryption key is valid, when the extracted TS value satisfies the reference TS and the extracted encryption key identification value falls within a range of the valid encryption key identification value, and extracts and acquires an encryption key from the STKM. | 04-29-2010 |
20100106649 | System And Method For Authorizing Transactions Via Mobile Devices - A system and method for authorizing transactions via mobile devices is provided. The system includes a mobile device executing a transaction authorization application. The transaction authorization application generates a transaction code for a transaction upon request by a user. The transaction authorization application includes a presentation module for presentation of the transaction code on the mobile device, and a communication module for communicating at least a part of the transaction code over a first channel. A server is in communication with the mobile device over the first channel for receiving the at least partial transaction code. The server is also in communication with a merchant system over a second channel for receiving a transaction request for the transaction. The transaction request includes the transaction code. The server executes transaction processing software for validating the transaction code received via the second channel by determining if the transaction code received via the second channel matches the at least partial transaction code received via the first channel. The server then communicates a transaction response to the merchant system. | 04-29-2010 |
20100121767 | INTERMEDIARY SERVICE AND METHOD FOR PROCESSING FINANCIAL TRANSACTION DATA WITH MOBILE DEVICE CONFIRMATION - A transaction processing service operates as an intermediary between acquirers of financial transaction requests and issuing institutions that process the financial transaction requests. The intermediary service utilizes a customer's mobile device as an out-of-band communication channel to notify a customer of a received financial transaction request. To send the notification, the intermediary service retrieves stored customer information, including an address of the customer's mobile device and a list of payment instruments that can be used to pay for the transaction. Before continuing to process the received financial transaction request, the service may first require the customer to confirm the transaction via the mobile device. The intermediary service retrieves financial account information associated with the customer from issuing institutions, and, if the transaction is confirmed, provides the account information to acquirers in order to allow transactions to be processed. | 05-13-2010 |
20100131414 | PERSONAL IDENTIFICATION DEVICE FOR SECURE TRANSACTIONS - A portable identification apparatus and an associated identification and authentication system are described. The portable apparatus can store biometric data of an authorised user of the apparatus and includes a biometric scanner for acquiring biometric data of a user of the apparatus. A processor compares acquired biometric data with the stored biometric data to identify a user of the apparatus, and generates identification information relating to the authorised user if the acquired biometric data matches the stored biometric data. A wireless communication interface transmits the identification information to a communication terminal such as a mobile telephone, for use in a transaction. At an authentication centre comprising a server with an associated database, data is stored identifying each identification apparatus, as well as biometric data corresponding to the stored biometric data in each identification apparatus, and encryption keys for decrypting data in the identification information transmitted via the communication terminal. In a method of use of the apparatus and system, a user of the identification apparatus can be identified to a third party participating in a transaction. | 05-27-2010 |
20100153273 | SYSTEMS FOR PERFORMING TRANSACTIONS AT A POINT-OF-SALE TERMINAL USING MUTATING IDENTIFIERS - A point-of-sale (POS) terminal for use in performing a transaction between a first entity and a second entity at a POS, the POS terminal associated with the second entity. The POS terminal stores a second mutating identified, receives encrypted transaction information from an account information carrier device over a communication link, sending the encrypted first and second transaction information to an authenticator, and receiving the second mutating identifier from the authenticator and a processor configured to encrypt transaction information with the second mutating identifier to create second encrypted transaction information. | 06-17-2010 |
20100169223 | Payment System and Method Using an IC Identification Card - A payment system utilizes an IC identification card to identify a user, finds and verifies a bank account of the user. The system uses an IC identification card reader to read user identity information, and sends it along with user bank account information to an intermediary platform to be processed. The intermediary platform sends the received user identity information along with the other bank transaction information as part of a bank transaction request to a participating bank subsystem to be processed. The participating bank subsystem conducts the requested bank transaction with a user bank account determined according to the user identification either by the intermediary platform or by the participating bank subsystem based on a mapping relationship between the user identity and bank accounts. The decryption of the user identification information is done either by the IC identification card reader or at the intermediary platform. | 07-01-2010 |
20100179909 | USER DEFINED UDK - A server computer including a processor and a computer readable medium coupled to the processor. The computer readable medium includes code executable by the processor, where the code includes code for receiving user input, code for forming a concatenated value by concatenating the user input with a data string associated with a portable consumer device, and code for deriving the user defined key from the concatenated value. | 07-15-2010 |
20100185545 | DYNAMIC PRIMARY ACCOUNT NUMBER (PAN) AND UNIQUE KEY PER CARD - Methods, systems, and machine-readable media are disclosed for handling information related to a financial transaction including utilizing dynamic cryptograms. According to one embodiment, a method of processing a financial transaction related to a financial account can comprise detecting initiation of the transaction with a device used as a presentation instrument in the transaction. A Dynamic Transaction Cryptogram (DTC) and a dynamic PAN can be generated at the device. The DTC can be used to authenticate the transaction and the dynamic PAN can comprise an encrypted form of a real PAN of the financial account that is valid for a single transaction. The DTC and the dynamic PAN can be provided by the device for use in the transaction. | 07-22-2010 |
20100191652 | SYSTEMS AND METHODS FOR ADDING FUNCTIONALITY TO A UIS FOR USE AT A POINT OF INTERACTION - Systems and methods for the addition of functionality to a user identification string (UIS) at a point of interaction (POI) are provided. A UIS is first requested from the user at a POI. According to some embodiments, the user enters a modified UIS (MUIS) at the POI. The MUIS can include a UIS along with a user code. An authorization request is then created by the POI device, wherein the request can include information such as, but not limited to, a vehicle code, the MUIS, POI location identifier, function deduction amounts, and/or the like. An action (e.g. rounding sweep, linking a function to the user operation vehicle, etc.) associated with the user code, if present, is determined and implemented. An approval or denial of the authorization request is then sent to the POI device after the action has been applied and the request has been processed. | 07-29-2010 |
20100235281 | Method Guaranteeing Payment for Electronic Commerce in Particularly by Mobile Telephone and a System Implementing It - An electronic payment method for a retailer using an operator network and a financial organization. During a transaction two certificates are produced; one using an operator key and the other using a banking key. The first certificate is sent to the operator and the other certificate is securely placed under the control of the financial organization. | 09-16-2010 |
20100235282 | SMART CARD PURCHASE TRANSACTIONS USING WIRELESS TELECOMMUNICATIONS NETWORK - A mobile handset includes a card reader; a gateway; a funds issuer computer; and an authentication computer. The handset receives a request to load a value onto the smart card. The handset generates a funds request and sends it to a funds issuer computer. The funds issuer computer debits an account. The handset generates a load request with a signature and sends it to an authentication computer. The handset receives a response. The handset validates the second signature and loads value onto the smart card. For payment, the system includes a merchant server and a payment server. The handset sends an order request to the merchant computer, and receives a purchase instruction. The handset processes the message, and then sends a draw request message to a payment server. The payment server sends a debit message to debit the smart card. The handset validates the signature and debits the smart card. | 09-16-2010 |
20100241570 | SECURE AND EFFICIENT PAYMENT PROCESSING SYSTEM - A method of processing commercial transactions carried out over the Internet ( | 09-23-2010 |
20100250441 | METHOD AND SYSTEM FOR SECURING A PAYMENT TRANSACTION WITH TRUSTED CODE BASE ON A REMOVABLE SYSTEM MODULE - A trusted code base is provided on a removable system module that is inserted in a mobile payment device | 09-30-2010 |
20100287101 | APPARATUS FOR CALCULATING NUTRIENT REQUIREMENT AMOUNT, AN APPARATUS FOR SUGGESTING A NUTRITIONAL SUPPLEMENT, A BLENDING APPARATUS OF A NUTRITIONAL SUPPLEMENT AND A BLENDING SYSTEM OF A NUTRITIONAL SUPPLEMENT - It is provided with a medical inquiry processing unit for acquiring the response to a medical inquiry presenting medical inquiry items to a person to be examined, a nutrient requirement amount calculating unit for calculating the nutrient requirement amount of the person to be examined from the response to the medical inquiry, a nutritional supplement suggesting unit for suggesting the blend of a nutritional supplement based on the nutrient requirement amount of the person to be examined and a nutritional supplement blending unit for blending nutrients to prepare the nutritional supplement based on the blend of the nutritional supplement. | 11-11-2010 |
20100293099 | PURCHASE TRANSACTION SYSTEM WITH ENCRYPTED TRANSACTION INFORMATION - Systems and methods are provided for securing payment card information. A user may present a payment card such as a credit card to point-of-sale equipment. The point-of-sale equipment may use a symmetric key to encrypt payment card information associated with the payment card. The symmetric key may be encrypted at the point-of-sale equipment using the identity-based-encryption (IBE) public key of a purchase transaction processor to produce a key transfer block. The key transfer block and the encrypted payment card information may be conveyed from the point-of-sale equipment to the purchase transaction processor over a communications network. At the purchase transaction processor, an IBE private key may be used to recover the symmetric key from the key transfer block. The symmetric key can be used to decrypt the encrypted payment card information for processing and re-encryption using a key associated with the purchase transaction processor. | 11-18-2010 |
20100293100 | Authenticated Payment | 11-18-2010 |
20100299265 | METHODS AND SYSTEMS FOR SECURITY AUTHENTICATION AND KEY EXCHANGE - This is for a payment device that may be constructed from separate modules in a secure fashion such that the aggregation of the modules constitutes an overall secure device without the use of additional covers, cases, or tamper-resistant housings. The methods and system are provided whereby the devices within a modular payment system can exchange data between each-other in a secure fashion. While data encryption is being used elsewhere, the present invention extends the security zone from each secure payment module within a modular device out over the cable to the next device. This allows the user to purchase payment device components, place them as they see fit, and not have to obtain certification on their end product as a POS-A level payment device. | 11-25-2010 |
20100325052 | WIRELESS TRANSACTION PAYMENT SERVICE APPLICATION SELECTION - A method of performing a transaction over a contactless interface placing a first device in wireless communication with a second device, selecting the interface over which the first and second device with communicate, selecting the application to be used to approve or disapprove the transaction, communicating to the second device the data necessary for the application to approve or disapprove the transaction. | 12-23-2010 |
20110004557 | Electronic Transaction Systems and Methods Therefor - The method includes the steps of receiving at the PEAD first digital data representing the transaction request. The PEAD provides information to the user regarding an ability to approve the transaction request. When the transaction request is approved by the user, the PEAD receives second digital data representing the electronic service authorization token. A remote agent server may provide a bridge between the electronic transaction system and the PEAD. In another embodiment, the private key is stored on the portable device, encrypted. The decryption key is stored outside of the device, at a trusted 3 | 01-06-2011 |
20110022521 | Authentication arrangement and method for use with financial transaction - A system and method for generating an authentication token which is used by an issuer associated with a integrated circuit card to authenticate a transaction. A personal card reader receives data, including an authentication cryptogram, from the integrated circuit card. The personal card reader uses the data received from the integrated circuit card to select one of at least two default bitmaps stored in a memory portion of the personal card reader. The personal card reader uses the selected default bitmap and the authentication cryptogram to build the authentication token. | 01-27-2011 |
20110029436 | Methods And Systems For Delivering Sponsored Out-Of-Band Passwords - Methods and systems for delivering advertising content to selected users in combination with out-of-band passwords or access code information delivered over a selected communication medium. | 02-03-2011 |
20110082797 | VEHICLE USAGE-BASED TOLLING PRIVACY PROTECTION ARCHITECTURE - A client-side on-board computing device is partitioned into a trusted computing module, and a private computing platform. When a metric report is required, the private computing platform retrieves an original data file and transfers the original data file to the trusted computing module. The original data file includes a global positioning system coordinate stream and time information. Communication between the private computing platform and the trusted computing module is via an unencrypted serial link. The private computing platform applies at least one billing algorithm to the original data file to determine a billing charge. The private computer platform signs and hashes the billing charge using a private key of a public-private endorsement key pair to create a signed metric report. The private computer platform forwards the signed metric report to the trusted computing module via the unencrypted serial link. The trusted computing module then forwards the signed metric report by the trusted computing module to a billing authority. | 04-07-2011 |
20110093397 | ANTI-PHISHING SYSTEM AND METHOD INCLUDING LIST WITH USER DATA - A server computer is disclosed. It comprises a processor and a computer readable medium coupled to the processor. The computer readable medium comprises code executable by the processor for implementing a method comprising: (i) receiving a request to conduct a transaction, (ii) providing a user interface to a user in response to the request, wherein the user interface includes a list of candidate identification tokens, wherein the list of candidate identification tokens includes an authentic identification token and one or more non-authentic identification tokens, wherein the authentic identification token is associated with a user account. | 04-21-2011 |
20110137803 | SECURE ELECTRONIC RECEIPT SYSTEMS AND METHODS - The present disclosure relates to secure electronic receipt systems and methods. The present invention removes the need for paper-based receipts while preserving security through use of a digital signature on each electronic receipt verifying the transaction and other data related to the transaction. In an exemplary embodiment, the present invention includes a trusted email server, an authentication server, a point-of-sale (POS) terminal or the like, and a smart card or the like. A buyer can utilize the smart card to instruct the terminal to provide an electronic receipt. The terminal can utilize the trusted email server and the authentication server to digitally sign the electronic receipt with credentials trusted by the buyer, and these credentials can later be utilized to verify the electronic receipt. | 06-09-2011 |
20110145151 | FINANCIAL CARD SYSTEM, COMMUNICATIONS DEVICE, AUTHENTICATION TERMINAL, AUTHENTICATION METHOD, AND PROGRAM - Disclosed herein is a financial card system. The system includes a communications device on which a non-contact integrated circuit chip is installed; and an authentication terminal having a reader/writer allowing reading/writing information on the communications device and capable of transmission and reception of information with the communications device through the reader/writer. The communications device has a storage block, a common area information transmission block, and an individual area information transmission block. The reader/writer of the authentication terminal has a storage block, a common area information reception block, and an individual area information reception block. | 06-16-2011 |
20110145152 | SYSTEMS, APPARATUS, AND METHODS FOR IDENTITY VERIFICATION AND FUNDS TRANSFER VIA A PAYMENT PROXY SYSTEM - Systems, apparatus, and methods for verifying a user's identity and conducting a transfer of funds via a payment proxy system are herein provided. A message including a request for verification of the user's identity and/or a transfer of funds via a proxy payment system may be received. The message may also include user identification information and/or a token. Completion of the identification verification and/or requested funds transfer may be dependent upon verification of user identification information and/or a token. | 06-16-2011 |
20110153503 | Device and Method for Identity Theft Resistant Transcations - An authorization device includes an input module, a key generator, and an output module. The input module receives a request to authorize a transaction between a mobile device and a merchant terminal. The key generator generates a key used for authorizing the transaction. The key relates only to the transaction. The output module transmits an authorization for the transaction that is based on a processing of the key. | 06-23-2011 |
20110191248 | Methods and Apparatus for Conducting Electronic Transactions - A system and method for facilitating electronic transactions using an intelligent instrument is disclosed. An authorization server enables users to obtain authorization credentials through the use of the intelligent instrument by issuing a challenge to an intelligent token of the intelligent instrument. The intelligent token generates a challenge response and transmits the challenge response to the authorization server, which assembles credentials including a key for the electronic transaction upon validating the response. The authorization server sends the assembled credentials to the intelligent instrument and the intelligent instrument transmits the assembled credentials to the authorization server during a subsequent transaction. The authorization server validates the assembled credentials and provides authorization for the transaction in response to the validating the assembled credentials. | 08-04-2011 |
20110191249 | Methods and Apparatus for Conducting Electronic Transactions - A system and method for facilitating electronic transactions using an intelligent instrument is disclosed. An authorization server enables users to obtain authorization credentials through the use of the intelligent instrument by issuing a challenge to an intelligent token of the intelligent instrument. The intelligent token generates a challenge response and transmits the challenge response to the authorization server, which assembles credentials including a key for the electronic transaction upon validating the response. The authorization server sends the assembled credentials to the intelligent instrument and the intelligent instrument transmits the assembled credentials to the authorization server during a subsequent transaction. The authorization server validates the assembled credentials and provides authorization for the transaction in response to the validating the assembled credentials. | 08-04-2011 |
20110191250 | Methods and Apparatus for Conducting Electronic Transactions - A system and method for facilitating electronic transactions using an intelligent instrument is disclosed. An authorization server enables users to obtain authorization credentials through the use of the intelligent instrument by issuing a challenge to an intelligent token of the intelligent instrument. The intelligent token generates a challenge response and transmits the challenge response to the authorization server, which assembles credentials including a key for the electronic transaction upon validating the response. The authorization server sends the assembled credentials to the intelligent instrument and the intelligent instrument transmits the assembled credentials to the authorization server during a subsequent transaction. The authorization server validates the assembled credentials and provides authorization for the transaction in response to the validating the assembled credentials. | 08-04-2011 |
20110202465 | SYSTEM AND METHOD FOR FACILITATING POINT OF SALE TRANSACTIONS WITH MINIMAL TRANSFER OF SENSITIVE DATA - Disclosed herein are a system and method for facilitating point of sale transactions with minimal transfer of sensitive data corresponding to a consumer or merchant. The system and method comprise connecting to a central banking system using a communications apparatus for connecting to a landline or mobile communications network. The communications apparatus is coupled to one or more slots for receiving a merchant digital token and a consumer digital token storing merchant public and private keys and consumer public and private keys, respectively. The merchant and consumer public keys are used to identify the merchant and consumer, respectively, to the central banking system. The merchant and consumer private keys are used to sign, and thereby authenticate, a merchant sign-on agreement and a payment authorization form, respectively. | 08-18-2011 |
20110202466 | Multifactor Authentication - An electronic device with radio and GNSS receiving capabilities is used to provide a second or further authentication factor to current and future transaction systems. The device's embedded characteristics are combined with GNSS data into a unique identifiable device code. The device can be used initially to put a bank or credit card into a “transaction enabled” mode. The location of the electronic device can be compared to the location from which a request to use the enabled card originates. | 08-18-2011 |
20110208657 | Mobile monetary transactions and banking for rural populations - Authenticating users for mobile transactions conducted over mobile phones. In general, the present invention makes it possible to securely authenticate a rural user (using the unique user ID from the uWallet, the client certificate in the mobile phone of the rural user and PIN code/password provided by the rural user) and then permit mobile banking transactions over the mobile phone. Both participating individuals employ their individual mobile phones and secure USB/Bluetooth based mobile banking devices (the uWallet) to authenticate themselves and conduct monetary transactions (funds transfer, mobile payments, etc.). | 08-25-2011 |
20110238579 | SYSTEM AND DEVICE FOR FACILITATING A SECURE TRANSACTION WITH A VALIDATED TOKEN - The present invention relates generally to a smart card device that is configured to facilitate wireless network access and credential verification. Specifically, the device is configured to meet the physical and electrical specification for commercially available mobile devices utilizing a standard Subscriber Identity Module (SIM) for network access. The device combines the features of the SIM with Common Access Card or Personal Identity Verification card features to allow a network subscriber to invoke secure payment transactions over a carrier's network by way of a transaction account token. The system includes data storage for maintaining a plurality of network and transaction instrument profiles and a profile gateway for receiving transaction information from a payment gateway, sending an authorization request to a user's mobile device, receiving a transaction authorization from the mobile device, and sending transaction information to a payment gateway to finalize the payment transaction. | 09-29-2011 |
20110238580 | SYSTEM AND DEVICE FOR CONSOLIDATING SIM, PERSONAL TOKEN, AND ASSOCIATED APPLICATIONS FOR SECURE TRANSMISSION OF SENSITIVE DATA - The present invention relates generally to a smart card device that is configured to facilitate wireless network access and credential verification. Specifically, the device is configured to meet the physical and electrical specification for commercially available mobile devices utilizing a standard Subscriber Identity Module (SIM) for network access. The device combines the features of the SIM with Common Access Card or Personal Identity Verification card features to allow a network subscriber to invoke secure payment transactions over a carrier's network. The system includes data storage for maintaining a plurality of network and transaction instrument profiles and a profile gateway for receiving transaction information from a payment gateway, sending an authorization request to a user's mobile device, receiving a transaction authorization from the mobile device, and sending transaction information to a payment gateway to finalize the payment transaction. | 09-29-2011 |
20110238581 | SECURE ELECTRONIC CASH-LESS PAYMENT SYSTEMS AND METHODS - Systems and methods to provide and maintain secure financial transaction conducted with a credit card or other cashless payment mechanism at a vending machine or other potentially unattended vending or point of sale device. Encapsulated card readers providing end-to-end encryption capabilities encrypt transaction data for secure transmission to a transaction host or server. Pre-authorization transaction data checking maintains account numbers in a secure encrypted format further enhancing security. Protection mechanisms that guard against, and provide warnings of equipment tampering, while also providing a visual indication to customers regarding the security of the system. | 09-29-2011 |
20110258121 | METHOD AND APPARATUS FOR PROVIDING AUTOMATED PAYMENT - An approach is provided for conducting transactions via an audio token base payment system. An audio payment manager receives a request, at a device, for payment to a merchant, the request including a password. In response, the audio payment manager retrieves a personal identification number from a user of the device, an identifier associated with the user, a session code, or a combination thereof. The audio payment manager then generates an audio token at the device based, at least in part, on the password, the personal identification number, the identifier associated with the user, the session code, or the combination thereof, and causes, at least in part, conveyance of the audio token to the merchant to initiate the payment. | 10-20-2011 |
20110258122 | PAYMENT SYSTEM TO FACILITATE TRANSACTIONS - Disclosed herein are systems and method for facilitating transactions between a merchant-partner and a customer. In general, the systems and methods include: (a) staging a transaction between the merchant-partner and the customer; (b) tokenizing the transaction by linking one or more transaction instructions to a token ID; (c) providing the customer with the token ID, wherein the customer can then present the token ID and a payment to a point-of-sale terminal; (d) receiving confirmation that the customer has presented, to a point-of-sale terminal, the token ID and a payment in accordance with the one or more transaction instructions; (e) notifying the merchant-partner that the customer provided the payment to the point-of-sale terminal; and (f) settling the transaction between the point-of-sale terminal and the merchant-partner. | 10-20-2011 |
20110264586 | SYSTEM AND METHOD FOR MULTIPATH CONTACTLESS TRANSACTIONS - A system for multipath contactless transaction processing, comprising a point-of-sale system comprising a processing unit and a video screen, the video screen at least sometimes viewable by a purchaser interacting with the point-of-sale processing system, wherein, during a transaction, a graphical indicia is displayed on the video screen in a form suitable for photographing or scanning by a device held by the purchaser, and wherein, upon receipt by the point-of-sale processing unit of at least one non-graphical indicia the content of which is determined at least in part by the contents of the graphical indicia that was displayed to the purchaser, the point-of-sale completes the transaction. | 10-27-2011 |
20110276494 | METHOD AND APPARATUS FOR ORDERING GOODS, SERVICES, AND CONTENT OVER AN INTERNETWORK USING A VIRTUAL PAYMENT ACCOUNT - A secure, closed virtual payment system comprising registered buyers and sellers for ordering and paying for goods, services, and content over an internetwork is disclosed. A buyer becomes registered by applying for a virtual payment account. A seller becomes registered by applying for a seller account. A credit processing component ( | 11-10-2011 |
20110302088 | TOKEN BASED NEW DIGITAL CASH PROTOCOLS - Digital cash token protocols employ two pairs of private and public keys. Each public key is certified separately and the protocols do not use any blind signature schemes. As a result, the digital cash token protocols provide strong protection of user privacy by using two certified public keys instead of a blind signature. One pair of certified keys consists of one master user private key and one master user public key. A second pair of certified keys consists of one pseudonym user private key and one pseudonym user public key. The use of a master key pair and a pseudonym key pair circumvents the need for blind signatures. As a result, the proposed protocols do not require blind signatures and do not add additional overhead and security requirements necessitated by conventional blind signature schemes. The protocols use public key protocols and digital signatures and symmetric key protocols, which may be readily implemented in standard information security based systems based on cryptographic constructs. In addition, the protocols may be deployed in mobile, off-line, and on-line settings. | 12-08-2011 |
20110307388 | METHODS AND SYSTEMS FOR PAYMENT PROCESSING BASED ON A MOBILE PHONE NUMBER - Described herein are methods and systems for processing a consumer payment based on a mobile phone number of a mobile device of a consumer. In one embodiment, a method includes initiating a payment between the consumer and a merchant. A payment system receives the mobile phone number associated with the mobile device of the consumer. The payment system generates and sends to the mobile device a one time passcode (OTP) in response to receiving the mobile phone number from the consumer. The payment system authenticates the consumer based on receiving the OTP from the consumer. The payment system completes the payment transaction by granting micro-credit to the consumer with no pre-registration. | 12-15-2011 |
20110307389 | Method and System for Distributed Point of Sale Transactions - A method and system for a fully distributed on-line selling environment is presented. Any webpage can contain a program module that for each customer that view any webpage with the module embedded in it, automatically associates that customer with their corresponding shopping cart stored at a central server. The module can initiate a sale transaction for a product presented on the webpage and cause the central server to complete the purchase and fulfillment. The website hosting the webpages with the module do not operate any back end transaction processing or order fulfillment. Instead the central server can retrieve a pending sales data associated with the customer and then initiate a payment process for the pending sale items as well as generate revenue share credits for the webpages associated with the sales. | 12-15-2011 |
20120030121 | SECURE ACTIVATION BEFORE CONTACTLESS BANKING SMART CARD TRANSACTION - The invention relates to a portable token equipped with non-volatile memory, the token comprising authentication means to authenticate a holder of the token, authorization means to define the rights of the holder, and payment means to trigger a payment transaction. The authorization means are set to store the rights in non-volatile memory after the authentication means are invoked, and the payment means have the capacity to retrieve the rights from non-volatile memory, and to subject the execution of the payment transaction to the verification of the rights. The invention also relates to a related portable device, to a system comprising a portable token and a portable token, and to a method for carrying out a payment transaction with a portable token. | 02-02-2012 |
20120041881 | SECURING EXTERNAL SYSTEMS WITH ACCOUNT TOKEN SUBSTITUTION - Systems, apparatuses, and methods for providing an account token to an external entity during the lifecycle of a payment transaction. In some embodiments, an external entity may be a merchant computer requesting authorization of a payment message. In other embodiments, the external entity may be a support computer providing a payment processing network or a merchant support functions. | 02-16-2012 |
20120078799 | SECURE PAYMENT SERVICE AND SYSTEM FOR INTERACTIVE VOICE RESPONSE (IVR) SYSTEMS - A secure payment method includes receiving, at a computer of a payment service, a request from a requester for a one time use transaction identification token for a transaction. The one time use transaction identification token is provided from the payment service computer to the requester. The one time use transaction identification token is received at the payment service from a merchant communications apparatus under the control of a merchant. Electronic payment information for the transaction is issued from the payment service to the merchant upon validating the one time use transaction identification token. | 03-29-2012 |
20120101950 | ELECTRONIC CURRENCY AND AUTHENTICATION SYSTEM AND METHOD - An electronic currency and authentication system and method. An electronic money validator is attached to electronic money. The electronic money validator authenticates the electronic money originated by electronic money issuer. The electronic money might be originated when cash or cash equivalent is received from a customer for deposit into the customer's account. The electronic money validator is retired when the electronic money is removed from circulation. | 04-26-2012 |
20120109829 | METHOD AND SYSTEM FOR PROCESSING TRANSACTIONS USING A TOKEN - Methods and systems of preventing fraud in electronic transaction and verification are described herein. The method includes obtaining information from a recipient; splitting the information into multiple parts; encrypting one or more of the multiple parts and encoding said encrypted part on different locations of a token; and encrypting the remaining portions of the split information and storing the encrypted remaining portions in one or more information stores. At a subsequent time, when the recipient provides the token to complete a transaction or to establish identity, retrieving the multiple portions from the one or more information stores and the token and combining or re-mating the multiple portions retrieved from the token and the one or more information stores. | 05-03-2012 |
20120116976 | VERIFICATION OF PORTABLE CONSUMER DEVICE FOR 3-D SECURE SERVICES - Apparatuses, methods, and systems pertaining to the verification of portable consumer devices for 3-D Secure Systems are disclosed. In one implementation, a verification token is coupled to a computer by a USB connection so as to use the computer's networking facilities. The verification token reads identification information from a user's portable consumer device (e.g., credit card) and sends the information to a validation entry over a communications network using the computer's networking facilities. The validation entity applies one or more validation tests to the information that it receives from the verification token. If a selected number of tests are passed, the validation entity sends a 3-D Secure datum to the verification token. The verification token may enter the 3-D Secure datum into a hidden field of a Purchase Authentication Page appearing on the computer's display. | 05-10-2012 |
20120130901 | SYSTEM AND METHOD FOR CONSOLIDATING IDENTIFICATION AND TRANSACTION FUNCTIONS ON A COMMUNICATION DEVICE - The present invention relates generally to a smart card device that is configured to facilitate wireless network access and credential verification. Specifically, the device is configured to meet the physical and electrical specification for commercially available mobile devices utilizing a standard Subscriber Identity Module (SIM) for network access. The device combines the features of the SIM with Common Access Card or Personal Identity Verification card features to allow a network subscriber to invoke secure payment transactions over a carrier's network. The system includes data storage for maintaining a plurality of network and transaction instrument profiles and a profile gateway for receiving transaction information from a payment gateway, sending an authorization request to a user's mobile device, receiving a transaction authorization from the mobile device, and sending transaction information to a payment gateway to finalize the payment transaction. | 05-24-2012 |
20120136796 | Device Enrollment System and Method - Embodiments related to systems and methods comprising receiving payment data at an access device; receiving an identifier for a mobile device at the access device; and generating and sending an authorization request message to a payment processing network, wherein the payment processing network generates a verification token, which is then sent to the mobile device whereby the mobile device is thereafter used to conduct payment transactions. | 05-31-2012 |
20120136797 | SYSTEM AND METHOD FOR CONSOLIDATING NETWORK, IDENTIFICATION AND TRANSACTION FUNCTIONS ON A COMMUNICATION DEVICE - The present invention relates generally to a smart card device that is configured to facilitate wireless network access and credential verification. Specifically, the device is configured to meet the physical and electrical specification for commercially available mobile devices utilizing a standard Subscriber Identity Module (SIM) for network access. The device combines the features of the SIM with Common Access Card or Personal Identity Verification card features to allow a network subscriber to invoke secure payment transactions over a carrier's network. The system includes data storage for maintaining a plurality of network and transaction instrument profiles and a profile gateway for receiving transaction information from a payment gateway, sending an authorization request to a user's mobile device, receiving a transaction authorization from the mobile device, and sending transaction information to a payment gateway to finalize the payment transaction. | 05-31-2012 |
20120143768 | Device Enrollment System and Method - Embodiments related to systems and methods comprising receiving payment data at an access device; receiving an identifier for a phone at the access device; and generating and sending an authorization request message to a payment processing network, wherein the payment processing network generates a verification token, which is then sent to the phone whereby the phone is thereafter used to conduct payment transactions. | 06-07-2012 |
20120158594 | TRANSFER METHOD OF ELECTRONIC CASH - A card to card transfer method used in the financial system is provided in the present invention, and comprises an initializing step, a transferring step and a transaction confirming step, wherein the initializing step includes the steps of calculating and obtaining the public key certificate and checking the amount of the transaction and so on, and the transferring step includes the steps of performing the transaction and so on. The present invention can achieve the function of transferring the electronic cash between two cards and can prevent the risk of repeatedly transferring the money into the card for transfer-in by using the card for transfer-out and so on. | 06-21-2012 |
20120173433 | METHOD AND SYSTEM FOR PROVIDING FINANCIAL SERVICE - A system and a method for providing a financial service. The system for providing a financial service can include: a first user terminal which signs financial transaction information with a pre-stored first private key, the financial transaction information including withdrawal account information, a PIN of the withdrawal account, deposit account information and amount information; a second user terminal which receives the signed financial transaction information by being connecting with the first user terminal through near field communication and which further signs the signed financial transaction information with a pre-stored second private key; and a financial server configured to transfer an amount corresponding to the amount information from an account of the withdrawal account information to an account of the deposit account information. | 07-05-2012 |
20120173434 | BIOMETRIC AUTHENTICATION OF MOBILE FINANCIAL TRANSACTIONS BY TRUSTED SERVICE MANAGERS - A method for authenticating a financial transaction at a point of sale (POS) includes storing an application program in a first secure element of a mobile phone. The application is configured to generate instruction codes to effect the financial transaction upon verification of a user's identity. The user's credentials are stored in a second SE of the phone, which is operable to verify the user's identity from a biometric trait of the user input to the phone and to generate data authenticating the financial transaction in response to the verification of the user's identity. At the POS, the user invokes the application and then inputs a biometric trait to the phone. The second SE verifies the user's identity, and upon verification, generates data authenticating the transaction. The financial transaction data, including the instruction codes and the authenticating data, are then transmitted from the phone to the POS. | 07-05-2012 |
20120173435 | HANDY TERMINAL AND PAYMENT METHOD TO BE USED IN SAME - There is provided a handy terminal in which inputting of an application program and of a PIN is executed and a keyboard and a display device are commonly used thus security is secured with a simple system. A card reader control program | 07-05-2012 |
20120191613 | SYSTEMS AND METHODS FOR VIRTUAL MOBILE TRANSACTION - Disclosed is a computer based method including receiving a request, by a virtual mobile transaction computer, from a user device or from an application running on the user device. The user and the user device are verified and authenticated based on one or more parameters. A transaction account is determined, where the transaction account is associated with the user. A barcode is sent to the user device and the barcode is used to initiate a payment for a purchase transaction associated with the request. | 07-26-2012 |
20120197806 | SONIC BASED DIGITAL NETWORKING - Systems, apparatuses and methods of using an acoustic communication mechanism to transmit data in the form of acoustic data from a mobile device to an electronic device are described. In one embodiment, a method of completing a purchase with a merchant using a mobile device starts with the mobile device sending a request message to a central server through a network interface. The mobile device then receives a token from the central server through the network interface that confirms that a payment in the purchase amount has been received at the merchant's account. This token is then translated into acoustic data and transmitted from the mobile device to an electronic device being associated with the identification of a merchant. Other embodiments are also described. | 08-02-2012 |
20120203700 | TOKENIZED CONTACTLESS PAYMENTS FOR MOBILE DEVICES - According to an exemplary embodiment of the invention, a method is discloses for facilitating a credit card transaction wirelessly via a mobile device. The method includes receiving registration information for a credit card and a mobile device, the registration information for the credit card including a primary account number (PAN) of the credit card; associating the registration information for the credit card with a unique token; generating a pseudo-PAN based on the PAN, the pseudo-PAN being different than the PAN; and providing the unique token and the pseudo-PAN to the mobile device for use in one or more credit card transactions. | 08-09-2012 |
20120215700 | PAYMENT SYSTEMS AND METHODS USING MOBILE COMPUTING DEVICES - Systems and methods for the processing of payments to retail establishments using mobile computing devices. A user of a mobile computer device takes a digital image of a specific bar code at a retail establishment. A token is then derived from the bar code and the token is transmitted by the device to a server with whom the device and its user are registered with. The retail establishment packages the details regarding the proposed purchase by the user along with a token derived from the same bar code. The retail establishment then sends the package to the same server. The server then checks the two tokens received and, if they match, then the server effects payment from one of the user's payment options to the retail establishment. Both the user and the retail establishment are then notified of the payment. | 08-23-2012 |
20120221475 | MOBILE TRANSACTION DEVICE SECURITY SYSTEM - Embodiments of the invention include apparatuses, methods, and computer-program products that provide for a unique financial transaction security system. In one embodiment, the financial transaction security system receives a security protocol from a user. The security protocol includes instructions for allowing transactions without authentication and security features for the user if authentication is necessary. The system then determines that the user is conducting a transaction, evaluates the instructions, and determines whether the transaction can occur without authentication. If the user is required to authenticate his identity, the system requests input from the user, compares the input to the security feature, and determines if the user is authenticated. The user is able to customize both the instructions and the security features to provide greater control over financial transaction security. | 08-30-2012 |
20120233078 | ELECTRONIC SETTLEMENT SYSTEM, SETTLEMENT MANAGEMENT DEVICE, STORE DEVICE, CLIENT DEVICE, DATA STORAGE DEVICE, COMPUTER PROGRAM, AND STORAGE MEDIUM - An electronic settlement system includes a data storage device such as an IC card in which value information is stored, a client device provided with an information input/output function to the data storage device, a settlement management device for managing settlement between the data storage device and a store device, and a communication system for connecting the client device, and the settlement management device so as to enable bidirectional communication. The settlement management device creates settlement information for making settlement by the data storage device, subjects the settlement information to an encryption processing by using a common key shared by the settlement management device and the data storage device, and transmits the settlement information subjected to the encryption processing to the client device, and the client device outputs the settlement information received from the settlement management device to the data storage device. | 09-13-2012 |
20120246079 | AUTHENTICATION USING APPLICATION AUTHENTICATION ELEMENT - Embodiments of the present invention can be directed to systems, apparatuses, and methods for performing transactions through mobile communication devices using telecommunications networks, systems, or proximity near-field communications systems. Embodiments may be directed to a mobile communication device displaying an application authentication element including a pre-selected authentication element. The application authentication element may include transaction data associated with a transaction conducted by a mobile communication device. The mobile communication device may obtain the pre-selected authentication element by either transmitting a request to a server computer or retrieving the pre-selected authentication element from a secure memory in the mobile communication device. A user authentication token may then be received by the mobile communication device from the user. The mobile communication device may then generate a secret token derived from the user authentication token, and if the secret token is correlated to a secret reference token, a transaction may be conducted. | 09-27-2012 |
20120271770 | MANAGING ELECTRONIC TOKENS IN A TRANSACTION PROCESSING SYSTEM - A method for the use of electronic transactional tokens includes: generating transactional tokens including a first token; associating each of the transactional tokens with one of a group of users; monitoring usage of the transactional tokens in a multitude of transactions by the users; and responsive to the monitoring, updating the first token from a first state to a second state. The tokens may be generated and monitored using a token processing system, which uses transaction data received by a transaction handler that is handling transaction processing for the transactions. | 10-25-2012 |
20120271771 | METHODS AND APPARATUS FOR CONDUCTING ELECTRONIC TRANSACTIONS - A system and method for conducting electronic commerce are disclosed. In various embodiments, the electronic transaction is a purchase transaction. A user is provided with an intelligent token, such as a smartcard containing a digital certificate. The intelligent token suitably authenticates with a server on a network that conducts all or portions of the transaction on behalf of the user. In various embodiments a wallet server interacts with a security server to provide enhanced reliability and confidence in the transaction. In various embodiments, the wallet server includes a toolbar. In various embodiments, the digital wallet pre-fills forms. Forms may be pre-filled using an auto-remember component. | 10-25-2012 |
20120278241 | TRACEABLE AND NON-REPUTABLE TRANSACTION DEVICES AND METHODS - Data and financial transactions are secured on a mobile electronics device for traceability and non-repudiation. A mobile personal trusted device (PTD) is needed to communicate over a network to a transaction server. Characteristic abstracts of objects carried by users have distinctive features that can be associated with and registered to a particular user and are recorded. An abstract contemporaneously obtained during a secure transaction is sent to a server for use as an authenticator for comparison to an abstract previously obtained and registered to said user. A traceable transaction record is rendered that is highly identifiable and substantially indisputable. | 11-01-2012 |
20120296829 | Unlinkable Priced Oblivious Transfer with Rechargeable Wallets - A protocol that allows customers to buy database records while remaining fully anonymous, i.e. the database server does not learn who purchases a record, and cannot link purchases by the same customer; the database server does not learn which record is being purchased, nor the price of the record that is being purchased; the customer can only obtain a single record per purchase, and cannot spend more than his account balance; the database server does not learn the customer's remaining balance. In the protocol customers keep track of their own balances, rather than leaving this to the database server. The protocol allows customers to anonymously recharge their balances. | 11-22-2012 |
20120310839 | Method and service platform for implementing account transfer using mobile terminal - The disclosure discloses a method for implementing account transfer using a mobile terminal, which includes: an uplink processing module receives a transfer-out transaction request from a transferor and a transfer-in transaction request from a transferee or an agent; an encryption and decryption module performs format verification and decryption of the transfer-out transaction request and transfer-in transaction request, randomly generates a withdrawal password according to the transfer-out transaction request, and provides the withdrawal password to a transaction processing module and a transferee; the transaction processing module authenticates a user accessing to the mobile terminal wallet transaction, performs the transfer-out operation according to the transfer-out transaction request, and performs the transfer-in operation according to the transfer-in transaction request and the withdrawal password provided by the encryption and decryption module; and a downlink processing module returns a response message to the mobile terminal of the transferor, transferee or agent after the transaction processing is completed. The disclosure also discloses a service platform for a mobile terminal wallet transaction. By adopting the disclosure, the inconvenience caused by the fact that the current transfer way using the mobile terminal must be supported by the bank outlet is overcome. | 12-06-2012 |
20120330844 | MULTI FUNCTIONAL DUPLEX ENCRYPTED PROCUREMENT AND PAYMENT SYSTEM AND METHOD - A device having a processor, the processor executing program instructions causing the processor to: storing credit card information of an individual in an encrypted format only readable by the processor; function as a credit card terminal by receiving an invoice for payment, wherein the invoice has a merchant key to direct payment to a specified gateway; and transferring funds from the individual to the specified gateway. | 12-27-2012 |
20130036058 | SYSTEMS AND METHODS FOR SECURELY PROCESSING TRANSACTIONS - This disclosure includes a system, method, and article of manufacture for securely processing a transaction. The method may comprise performing a three factor authentication, communicating and/or generating, to a web client, a token in response to a transaction request and based upon the three factor authentication, comparing the token to a received token, and authorizing the transaction request based upon the comparing. Three factor authentication may comprise authenticating a web client to a transaction account associated with an individual, authenticating a web client to a payment network associated with the transaction account, and authenticating an individual to the transaction account based upon a biometric sample. | 02-07-2013 |
20130046697 | Using Mobile Device to Prevent Theft of User Credentials - Systems and methods are provided to prevent unauthorized credit and debit transactions. A system creates a transactional, or one-time-use PIN in response to a request from a mobile device, such as a smartphone or tablet computer, belonging to an authorized user. This PIN is securely transmitted to the mobile device, and used in combination with a credit or debit account number to complete the transaction. The user is determined to be authorized by the fact that they are able to access an application on the mobile device that sends the request. The application itself may be protected using a non-changing PIN. | 02-21-2013 |
20130054469 | COMPUTER IMPLEMENTED MULTI-LEVEL TRANSACTION AUTHORIZATION BANKING SUPPORT SYSTEM AND METHOD THEREOF - A computer implemented system and method for multi-level transaction authorization in a banking support unit. The system includes a data center with a cluster further including: (i) a host for processing transactions, (ii) a security module authenticating and generating a customer personal identification number (PIN), authentication means for authenticating a point-of-sales (POS) terminal, and encryption means for encrypting all information and POS transactions. The system further includes a maker-checker unit further comprising: a token number generator for conducting sensitive transactions on said POS by unique tokens validated for adaptability with said cluster; and an authorization cards array to configured to effectuate multi-level authorization of primary and subsidiary transactions while selectively linking said primary and subsidiary transactions to said token number generator. | 02-28-2013 |
20130054470 | System for Payment via Electronic Wallet - A method includes receiving a request to process, against an electronic wallet, a portion of a transaction, an electronic wallet optionally comprising a sub-wallet, the transaction processed against the wallet and/or sub-wallet. The method further includes identifying one or more electronic value tokens in the e-wallet and/or sub-wallet that, when used together, will cover the portion of the transaction. The method further includes applying the electronic value tokens to the portion of the transaction. | 02-28-2013 |
20130085944 | SYSTEM AND METHOD FOR APPLICATION SECURITY - A secured hardware token includes an embedded processor, secured persistent storage, and read only memory. The storage includes functionality to store data that includes an account master secret for an account at a financial institution. The memory includes a security application, which causes the processor to receive, from a financial institution application executing on a mobile device, a call for an n-bit result. The security application further causes the processor to obtain, from the secured persistent storage, the account master secret, construct the n-bit result specific to the call using the account master secret and the n-bit generator input as input to an n-bit generator in the security application, and return the n-bit result to the financial institution application. The financial institution application provides the n-bit result to the financial institution, which completes a financial transaction when the n-bit result is verified using a copy of the account master secret. | 04-04-2013 |
20130110727 | TECHNIQUES FOR MOBILE TRANSACTION PROCESSING | 05-02-2013 |
20130117185 | Method for conducting a transaction between a merchant site and a customer's electronic device without exposing payment information to a server-side application of the merchant site - A transaction is conducted between a merchant site and a customer's electronic device using a payment processor. The merchant site is associated with a client-side application and a server-side application. The client-side application executes on the customer's electronic device. The client-side application electronically sends payment information retrieved from the customer's electronic device to the payment processor. The client-side application does not send the payment information to the server-side application. The payment processor creates a token from the payment information sent by the client-side application. The token functions as a proxy for the payment information. The payment processor electronically sends the token to the client-side application. The client-side application electronically sends the token to the server-side application for use by the server-side application in conducting the transaction. The payment information can thus be used by the server-side application via the token without the server-side application being exposed to the payment information. | 05-09-2013 |
20130117186 | SYSTEM AND METHOD FOR INCREASING SECURITY IN INTERNET TRANSACTIONS - Increasing security of financial transactions conducted over the Internet is disclosed. In an example, an apparatus may be configured to prompt a user for authorization to permit a pending purchase initiated by a purchase initiating device. The apparatus may establish, via a mobile network interface, a secure communication channel with a server and communicate a credential via the secure communication channel. The apparatus may generate a token based on the credential and communicate the token to the server via the mobile network interface. | 05-09-2013 |
20130132283 | SYSTEM AND METHOD FOR PROCESSING AN ONLINE TRANSACTION REQUEST - A method of processing an online transaction request involves a network gateway generating a revised transaction request from an incoming transaction request that is received from a client terminal. The revised transaction request includes a revised transaction message that is derived from the incoming transaction request and a revised transaction request cryptogram that is generated from the revised transaction message. The revised transaction request cryptogram is uniquely associated with an identity token that is interfaced with the client terminal. The network gateway receives a transaction authorization from an issuer server for the revised transaction request, and provides a revised transaction authorization message to the client terminal in accordance with the received transaction authorization. The revised transaction authorization message provides an indication of authorization of the revised transaction request. | 05-23-2013 |
20130138570 | LAYERED SECURITY FOR AGE VERIFICATION AND TRANSACTION AUTHORIZATION - A user may be willing to purchase items or participate in a pay-for service offered by a service provider. A service provider may wish to verify characteristics of the user prior to allowing transactions to take place, and may want to secure the transactions once the transactions are allowed. A credential issued to a user and a transaction application uploaded to a user device may be used to secure transactions between the user and a service provider interface, such as a webserver or a point-of-sale. The transaction application may capture real-time user data and comparing the real-time user data to prior user data stored on the credential, authenticate the service provider interface to the user and the user to the service provider interface; and establish an encrypted session between the service provider interface and the transaction application adapted to authenticate the transactions between the user and the service provider interface. | 05-30-2013 |
20130144792 | STAND-ALONE SECURE PIN ENTRY DEVICE FOR ENABLING EMV CARD TRANSACTIONS WITH SEPARATE CARD READER - A method of conducting secure electronic payments to a payment acquirer using a credit card payment unit, comprising of a smart card, a portable card reader device, a mobile phone, a stand-alone PIN entry device and a payment server. The method is based on eliminating the unsecure keyboard in a mobile phone used for entering personal identification information, and instead use a separate secure PIN entry device which fulfils the EMV Level specification. Since all sensitive payment information, communicated to the payment server from the card reader and the PIN entry device, is encrypted using unique encryption keys an unsecure mobile phone may be used for relaying the communication between the card reader device and the PIN entry device to and from the payment server. | 06-06-2013 |
20130166456 | System and Method for Remote Payment Based on Mobile Terminal - The present invention discloses a method for remote payment based on a mobile terminal. The method includes: an authentication server asking a mobile terminal for a digital certificate, the mobile terminal transmitting an certificate reading instruction to the built-in smart card, and after the smart card exports the stored digital certificate, the mobile terminal transmitting it to the authentication server for certificate registration, and the authentication server sending a signature instruction to the mobile terminal, the mobile terminal transmitting a private key signature instruction to the built-in smart card, the smart card sending out the signature result and the mobile terminal reporting the signature result to the authentication server. The present invention also discloses a system for remote payment based on mobile terminal, a mobile terminal and a smart card. The present invention not only breaks through the limitation of short of transmitting the personal ID and password by using short message and WAP. | 06-27-2013 |
20130173474 | OFFLINE MOBILE PHONE PAYMENTS - A method for performing vending transactions includes generating a token upon request by a wireless appliance is provided. The method includes placing the token in a remote server; placing the token in the wireless appliance; providing the token from the wireless appliance to a point-of-sale (POS) terminal; authenticating the token with the remote server; validating the token to perform the vending transaction; and deleting the token from the remote server when the vending transaction is complete. A method for using a wireless appliance in vending transactions is provided. A method for using a remote server configured to connect to a wireless appliance and a POS terminal in vending transactions is provided. A system to perform vending transactions using an internet connection as above is provided. The system may include a remote server including a private account; the remote server configured to communicate with a POS terminal and a wireless appliance. | 07-04-2013 |
20130173475 | SYSTEM FOR SECURE PAYMENT OVER A WIRELESS COMMUNICATION NETWORK - A method of conducting secure electronic credit payments to a payment acquirer using a credit payment unit, comprising of a smart card, a portable card reader device and a mobile phone, and a payment server. The method is based on using a unique reader key in the card reader device to encrypt all the sensitive smart card information communicated to the payment server, and thus being able to use an unsecure mobile phone to communicate with the payment server. The payment server then completes the transaction with the payment acquirer over a secure line. | 07-04-2013 |
20130191289 | METHOD AND SYSTEM FOR UTILIZING AUTHORIZATION FACTOR POOLS - One embodiment of the present disclosure provides a system and associated processes for sharing cardholder data (CHD) between a merchant that utilizes tokenization and a second merchant that may or may not utilize tokenization. In one embodiment, the merchant, or an employee of the merchant, can use the system and associated processes to reacquire CHD from a tokenization provider system. In one embodiment, the merchant identifies to the tokenization provider system a desire to share CHD, which is associated with a token, with a second merchant. The merchant and/or the tokenization provider system can then invite the second merchant to register with the tokenization provider system. Once registered with the tokenization provider system, the second merchant can access any CHD that the merchant associated with the second merchant. | 07-25-2013 |
20130204793 | Smart communication device secured electronic payment system - Systems, apparatuses, and methods enabling secure payment transactions, and methods for sharing secure documents, via a mobile device, for example a mobile telephone, smartphone, cellular telephone, other wireless device, a Near Field Communications (NFC) device, or the like. Actual user account information is substituted with temporary account information such that the temporary account information may be manipulated in a manner similar to actual user account information, with the result that actual account information is masked thereby greatly reducing the likelihood of misuse. | 08-08-2013 |
20130204794 | PAYMENT SERVICE AUTHENTICATION FOR A TRANSACTION USING A GENERATED DYNAMIC VERIFICATION VALUE - Methods and systems for dynamically generating a verification value for a transaction and for utilizing such value to verify the authenticity of the payment service application. The dynamically created verification value may be generated on a payment device, such as an integrated circuit credit card or smart card, embedded into the payment data, and transmitted to a point of sale terminal. Alternatively, payment data is sent by a payment device to a point of sale terminal, which generates a verification value and embeds it into the payment data. The embedded verification value is used by a service provider to verify the authenticity of the transaction. The methods and systems may be used in a contactless (wireless) environment or a non-wireless environment. | 08-08-2013 |
20130226812 | CLOUD PROXY SECURED MOBILE PAYMENTS - A secure payment system provisions a payment transaction proxy with virtual EMV-type chipcards on secure backend servers. Users authorize the proxy in each transaction to make payments in the Cloud for them. The proxy carries out the job without exposing the cryptographic keys to risk. User, message, and/or device authentication in multifactor configurations are erected in realtime to validate each user's intent to permit the proxy to sign for a particular transaction on the user's behalf. Users are led through a series of steps by the proxy to validate their authenticity and intent, sometimes incrementally involving additional user devices and communications channels that were pre-registered. Authentication risk can be scored by the proxy, and high risk transactions that are identified are tasked by further incrementally linking in more user devices, communications channels, and user challenges to increase the number of security factors required to authenticate. | 08-29-2013 |
20130226813 | Cyberspace Identification Trust Authority (CITA) System and Method - When two parties of a cyberspace transaction register their identity attributes under a CITA system each party is assigned a unique, encrypted and digitally signed identity token. When the consuming party seeks access too, or payment for, cyberspace services, the providing party submits their identity token to the consuming party. The consuming party creates a request token, containing both the consumers' and the providers' identity tokens, and the transaction related information, to the CITA system. The CITA system validates the identity tokens and either creates a payment confirmation token by processing the payment request, or creates an access confirmation token by dynamically defining the minimal consumer identity attributes required to gain access to the provider's service. The confirmation token is encrypted and digitally signed and returned to the consumer, and then forwarded to the provider to complete the transaction without either party openly exchanging personal identity attributes. | 08-29-2013 |
20130232083 | SYSTEMS AND METHODS FOR MAPPING A MOBILE CLOUD ACCOUNT TO A PAYMENT ACCOUNT - A method for processing a financial transaction using a mobile cloud account mapped to a payment account includes: storing, in a mapping database, a plurality of mapping records, each mapping record including a master key identifier, a mobile cloud account number (MCA), and a real card account number (RCA), the MCA being based on attributes of the RCA; receiving transaction data related to a financial transaction, wherein the transaction data includes at least an MCA and a payment cryptogram; validating, by a validation device, the payment cryptogram; identifying, in the mapping database, a specific mapping record, wherein the specific mapping record includes the MCA included in the received transaction data; and transmitting at least the RCA included in the specific mapping record and a validation result indicating a success or failure of the validation of the payment cryptogram. | 09-05-2013 |
20130232084 | Mobile Financial Transaction System and Method - The present invention relates to a mobile financial transaction system ( | 09-05-2013 |
20130254114 | NETWORK-BASED SELF-CHECKOUT - Techniques for network-based self-checkout are provided. A consumer of an establishment uses a mobile app to self-scan barcodes of items for purchase. A running list of the items is maintained by a network shopping manager. The consumer uses the app to purchase the items when desired and the shopping manager sends a code to the app to validate the purchase. When exiting the establishment, the app provides the code to a self-service checkout system and as the customer bags the items, each item is validated against the list without requiring any additional action on the part of the consumer. | 09-26-2013 |
20130254115 | CONVERGED CROSS-PLATFORM ELECTRONIC WALLET - Various consumer interface platforms are converged to facilitate user access to an electronic network of wallets. The functions of both remote and NFC payment, among other interface platforms, give the purchaser access to a single electronic wallet for online E-commerce and a variety of mCommerce scenarios, some including brick and mortar, face-to-face (F2F), and/or point-of-sale (POS) transaction payments. The network of wallets has a network operator intermediating payment transactions between merchants and wallet providers. In this way, the parallel consumer interface platforms, such as remote platform enabling e-commerce payments, an NFC platform, and/or others, into a single converged payment platform that is usable in either or both transaction settings. | 09-26-2013 |
20130262315 | System for Secure Purchases Made by Scanning Barcode Using a Registered Mobile Phone Application Linked to a Consumer-Merchant Closed Loop Financial Proxy Account System - A secure product purchasing system and method are disclosed to allow for online purchase of goods or services by means of a proprietary graphical or barcode-represented printed or on-line digital product code and details to be either sent to or discovered by a customer, so as to be scanned then paid for using a secure financial closed-loop proxy account and a pre-registered personal handheld mobile device where all funds within the account remain in an “inactive” non-usable state until activated and allocated only by the customer through the mobile handheld device, wherein the merchant is registered to the secure financial closed-loop proxy account. | 10-03-2013 |
20130262316 | Securely Selling and Purchasing of Goods through Social Network Sites Using a Secure Mobile Wallet System as a Mobile Commerce - A secure and convenient product purchasing system and method are disclosed to allow for online sale and purchase of goods by means of a social network site using a mobile wallet system as an m-Commerce shopping cart checkout linked to a secure financial closed-loop proxy account. A proprietary graphical or barcode-represented on-line digital product code and details to be posted to one user's social network wall, so as to be either scanned or directly selected, then paid for using the secure financial closed-loop proxy account and a pre-registered personal handheld mobile device where all funds within the account remain in an “inactive” non-usable state until activated and allocated by another user through their mobile device, where both users are registered to the secure financial closed-loop proxy account. | 10-03-2013 |
20130282588 | Consumer, Merchant and Mobile Device Specific, Real-Time Dynamic Tokenization Activation within a Secure Mobile-Wallet Financial Transaction System - A secure system and method are disclosed to effectuate financial transactions over a secure internet backbone establishing and using a secure closed loop financial transactional system encompassing a proxy account and a pre-registered personal handheld mobile device to the account a preregistered merchant where all funds within the account remain in an “inactive” non-usable state until activated and allocated only by the consumer's registered mobile handheld device using a unique, time sensitive, device specific and merchant specific transactional token initially developed on the system's backend and subsequent token activation completion by the intended specific registered mobile device and by the intended merchant application. | 10-24-2013 |
20130282589 | MULTI-FACTOR MOBILE TRANSACTION AUTHENTICATION - Disclosed are authentication systems and techniques that can automatically recognize, validate, and utilize different types of information including user information, device information, and network information. Each of these types of information is processed with a unique algorithm and then is encrypted for security purposes. The processed and encrypted information are then used as components of a multi-factor authentication process. During an actual authentication transaction, these unique identifiers are used along with real-time personal identification methods including, but not limited to, biometrics and/or a personal identification number (the “PIN”), to complete the authentication process between two devices. A backend server communicates to both the devices to create a highly secure closed-loop authentication process. This authentication process can be used to interface with other processes or systems to enable customer identification, payment processing or any other business process that can benefit from a secure, positive identification authentication capability. | 10-24-2013 |
20130297513 | MULTI FACTOR USER AUTHENTICATION - Technologies are generally described for multi factor security authentication algorithm methods in authorizing and using client devices to perform banking transactions. A customer can register and associate a client device with their account. The customer can further create unique login information associated with their account. A customer's login information, client device, and a push confirmation must be verified for accuracy prior to allowing the customer to perform banking operations. Using multi factor authentication process, banking transactions can be performed more reliably and securely. | 11-07-2013 |
20130304651 | SYSTEMS AND METHOD FOR PROVIDING MULTIPLE VIRTUAL SECURE ELEMENTS IN A SINGLE PHYSICAL SECURE ELEMENT OF A MOBILE DEVICE - Methods and systems are disclosed for providing a plurality of virtual secure elements (virtual SEs) to mobile devices with secure elements (SEs). A method generates and forwards a certificate authority security domain (CASD) key for a plurality of virtual SEs to an SE supplier that created the CASD. The method receives a card serial number (CSN) and a card production life cycle (CPLC) key from the SE supplier and forwards these to a mobile device maker. An updated CSN and CPLC data is received from the device maker with an International Mobile Equipment Identity (IMEI) and an issuer security domain key (ISD key) is added to the CSN and CPLC data by a master secure element issuer trusted service manager (master SEI TSM). An application is provisioned to the device that retrieves the CSN, CPLC data, and the IMEI, which are used for to verify and activate the virtual SE. | 11-14-2013 |
20130311381 | LIMITING DATA EXPOSURE IN AUTHENTICATED MULTI-SYSTEM TRANSACTIONS - The limiting of data exposure in authenticated multi-system transactions is disclosed. A client system authenticates and requests secured data and unsecured data with an initial system. The initial system transmits to an external system a token request that corresponds to the request for the secured data. A token is generated and passed to the initial system, which relays the same to the client system. The client system uses the token to access the secured data on the external system, while also retrieving the unsecured data on the initial system. The initial system thus does not have access to the secured data, while the request therefor is known. | 11-21-2013 |
20130346317 | Personal Communications Applications, Devices and Systems - A client device may receive an offer from a tandem device. The offer may include an indication of a location and a cost. In response to receiving the offer, the client device may display a representation of the offer. The client device may receive acceptance of the offer. In response to receiving the acceptance of the offer, the client device may transmit an indication of the acceptance to the tandem device. The indication may include an encrypted payment token, and the encrypted payment token may include an encrypted instruction to (i) debit a first account associated with the client device based on the cost, and (ii) credit a second account associated with the tandem device based on the cost. | 12-26-2013 |
20140019364 | ANYTIME VALIDATION TOKENS - Systems and method for producing, validating, and registering authentic verification tokens are disclosed. Such systems and methods include generating verification token specific key pairs. The key pairs can be signed by a verification token manufacturer master key or public key certificate for an additional level of authenticity. Related methods and systems for authenticating and registering authorized verification token manufacturers are also disclosed. Once a verification token manufacturer is authenticated, it can be assigned a manufacturer-specific key pair or certificate and in some cases, a predetermined set of serial numbers to assign to the verification tokens it produces. Each serial number can be used to generate a verification token specific key pair specific to the associated verification token. One component of the verification token key pair can be stored to the verification token. Optionally, the component of the verification token key pair stored to the verification token can be signed by the manufacturer specific master key or certificate and stored a verification token public certificate. | 01-16-2014 |
20140025583 | ELECTRONIC TRANSACTION VERIFICATION SYSTEM WITH BIOMETRIC AUTHENTICATION - An electronic transaction verification system for use with transaction tokens such as checks, credit cards, debit cards, and smart cards that gathers and transmits information about the transaction token and biometric data. Customers can be enrolled in the system by receiving customer information that includes at least a biometric datum, associating the received customer information with a transaction instrument issued to the customers and storing the received customer information and the issued transaction instrument information in a database for future reference. | 01-23-2014 |
20140040146 | PAYMENT SYSTEM FOR AUTHORIZING A TRANSACTION BETWEEN A USER DEVICE AND A TERMINAL - Methods, apparatus and computer software are provided for authorizing an EMV transaction between a user device and a point of sale terminal, particularly, but not exclusively, in situations where a secure element is not made available for the deployment of a payment application on the user device. The payment application is instead deployed to a processing environment that is outside of any secure element on the user device. The payment application is associated with a certificate and a corresponding hash. The hash is adapted to be generated on the basis of an application expiration date parameter, which is adapted to comprise data indicative of an expiration date of day level granularity associated with the certificate. During processing of the EMV transaction, the point-of-sale terminal verifies the hash, thereby establishing the authenticity of the application expiration date, and hence the validity of the certificate. | 02-06-2014 |
20140052640 | ENSURING SECURE ELECTRONIC TRANSACTIONS BETWEEN A WALLET SERVICE CENTER AND A CLUSTER OF ELECTRONIC WALLET TRANSACTION FACILITIES - Ensuring secure electronic transactions between a wallet service center and a cluster of electronic wallet transaction facilities provided at a user device involves registering the cluster of electronic wallet transaction facilities by delivering electronic transaction facility software that provides electronic wallet capabilities to the user device, exchanging a user authentication code between the wallet service center and the user via the electronic transaction facility software, and activating an account of a registered electronic wallet transaction facility. | 02-20-2014 |
20140058951 | MOBILE ELECTRONIC DEVICE AND USE THEREOF FOR ELECTRONIC TRANSACTIONS | 02-27-2014 |
20140074720 | VIRTUAL ACCOUNT AND TOKEN-BASED DIGITAL CASH PROTOCOLS - The virtual account and token-based digital cash token protocols use a combination of blind digital signatures and pseudonym authentication with at least two pairs of public and private keys. A user has one master pair of private and public keys and many pseudonym pairs of private and public keys. The new protocols combine blind digital signature and pseudonym-based authentication. Blind digital signatures based on the master pair of keys are used to withdraw digital cash from the user's bank account under the user's real identity. A pseudonym pair of keys is used for depositing digital cash with a digital cash issuer. Pseudonym key pairs are used for spending the digital cash. Digital cash includes digital cash tokens in virtual accounts, which can be managed from a user's fixed or mobile computing platform. | 03-13-2014 |
20140108261 | SYSTEMS AND METHODS FOR PAYMENT MANAGEMENT FOR SUPPORTING MOBILE PAYMENTS - Systems and methods for managing mobile payments is provided. An account issuer provides an application that is loaded onto a mobile device, which enables a consumer to pay for transactions. The mobile payment application generates a unique code. The code is read by the point of sale terminal, which is then provided to the payment management system. The payment management system contracts the account issuer and authenticates the code, thereby receiving a primary account number. Account number and transaction information is used to authorize the transaction via payment systems. The payment system accepts or declines the transaction in a response. Tokens may be generated for the account number, and value added services may be generated based upon user behaviors. | 04-17-2014 |
20140122343 | MALWARE DETECTION DRIVEN USER AUTHENTICATION AND TRANSACTION AUTHORIZATION - Techniques are disclosed for detecting online fraud initiated by a host infected with a malicious software application that would otherwise remain undetected by many current fraud detection systems, e.g., for detecting man-in-the-browser Trojans. A fraud detection system operates in conjunction with an IPS system to identify online transactions that have a high probability of being fraudulent or initiated by a legitimate, but compromised host. | 05-01-2014 |
20140122344 | Secure Computing Environment - A portable electronic device having a memory storing application software for initiating a payment transaction with a remote system, a data interface for coupling the device to a host computer, a contactless interface for receiving payment token data from a contactless payment token, and a cellular network interface for communication of data over a cellular network. The application software is executed from the device when the device is connected to the host computer and configures the portable electronic device to initiate a payment transaction by receiving payment token data via the contactless interface means and transmitting said payment token data to the remote system via the mobile network interface means. | 05-01-2014 |
20140136419 | LIMITED USE TOKENS GRANTING PERMISSION FOR BIOMETRIC IDENTITY VERIFICATION - Systems and methods are described herein for granting permission for biometric identity verification by a third-party using a limited-use token. A merchant point of sale (“POS”) system may receive transaction payment information from a mobile device associated with a customer. The customer may consent to biometric verification allowing the mobile device to provide customer identification information and a biometric verification token to the POS system. The POS system can collect a sample of biometric information from the customer. The biometric verification token may be transmitted to an identity verification service to be authenticated as originating from the mobile device of the customer. Upon successful authentication of the biometric verification token by the identity verification service, the service may evaluate the biometric information collected from the customer as corresponding to the customer identification or not. | 05-15-2014 |
20140164251 | USER GENERATED AUTONOMOUS DIGITAL TOKEN SYSTEM - A digital token system and methods to provide user generated digital tokens includes receiving from a plurality of users authorization to create one or more unique tokens without approval from a central authority, wherein each user who created the unique token (“creator”) is the only user authorized to increase quantity of the same token-type; and rendering the quantity of each token type visible to recipients of the token. | 06-12-2014 |
20140164252 | USER TERMINAL AND PAYMENT SYSTEM - The invention provides a user terminal and a payment system. The user terminal comprises an input device, a multi-channel selection switch, an application module, a processor, a password processing module, and a security IC chip containing information on user's ID and/or banking card therein, wherein the multi-channel selection switch is coupled with the input device, the password processing module and the processor, the password processing module is coupled with the processor, and the security IC chip is coupled with the password processing module; the application module controls the multi-channel selection switch via the processor so as to place the user terminal in a password input mode or in a normal input mode. The invention ensures the safety in entering the user's password in hardware configuration so that even when software system of the user terminal is not safe in itself, the safety of input password can be ensured. | 06-12-2014 |
20140164253 | METHOD AND SYSTEM FOR PROCESSING INTERNET PURCHASE TRANSACTIONS - A method for minimizing risk of a consumer performing a fraudulent Internet purchase transactions using a transaction card is disclosed herein, the method comprising receiving an enrollment verification request for a transaction from a merchant's website, transmitting the enrollment verification request to an access control server; receiving an enrollment verification response from the access control server, determining whether the transaction is risky based on at least a portion of the enrollment verification request, if the transaction is not risky, forwarding the enrollment verification response to the merchant website and, if the transaction is risky, modifying the enrollment verification response to denote the transaction is risky and forwarding the modified enrollment, verification response to the merchant's website. | 06-12-2014 |
20140236836 | MANAGING RECURRING PAYMENTS FROM MOBILE TERMINALS - Equipments and methods are disclosed for facilitating service provisioning in a system that comprises a payment processor, a number of service providers and a mediator that mediates information exchange between the payment processor and service providers, and a mobile terminal operated by payment card holder. In some implementations, service provisioning can be facilitated in cases wherein the payment processor must reside in a strictly regulated Payment Card Industry (PCI) compliant environment and the service providers operate servers that are not PCI-compliant. | 08-21-2014 |
20140258132 | SYSTEM AND METHOD FOR SECURE ELECTRONIC TRANSACTION - The various embodiments herein provide a system for a secure electronic transaction. The system comprises a dongle connected to a computing device for reading an electronic card data, a client application running on the client device for collecting a transaction information from a customer, a service provider system connected to the computing device through a first communication network for transmitting the collected transaction information and the audio signal from the computing device to the service provider system, a production server located at the service provider system for processing the received card data, a payment server for processing the audio signal, a second communication network for transmitting a processed card data from the production server to a payment system and a payment gateway running on the payment system for interfacing with the service provider system. The payment system performs the financial transaction by authenticating the customer and a merchant. | 09-11-2014 |
20140279554 | DISTRIBUTED AUTHENTICITY VERIFICATION FOR CONSUMER PAYMENT TRANSACTIONS - Payment tokens designed for display on a consumer's mobile device include dynamic trust data (e.g., transaction history and/or token generation date) along with financial account information, enabling merchants to make an informed decision about whether to accept payment without communication with the central processing system, and also protecting the consumer's account information from theft. | 09-18-2014 |
20140279555 | DYNAMICALLY ALLOCATED SECURITY CODE SYSTEM FOR SMART DEBT AND CREDIT CARDS - This invention provides a dynamically generated security code for smart, debit and credit cards as a way to thwart fraudulent use of these cards in financial transactions. The card internally contains a processor connected to a viewable display powered by a battery where the processor is capable of generating security codes on a periodic basis. The card can generate the security code by encrypting certain data is a way that the card issuer as the same security codes so that when the security code is used in a financial transaction, the card issuer can ascertain whether the transaction is valid and authorized or potentially fraudulent. To prevent unwanted denials of transactions when the security code is changed, a time period window can be created on the card issuer's network that compares the card security code with the current valid security code stored on the card issuer's server as well as the previous security code in case the transaction was processed over a longer period of time than the life of the dynamically generated security code. | 09-18-2014 |
20140279556 | DISTRIBUTED AUTHENTICITY VERIFICATION FOR CONSUMER PAYMENT TRANSACTIONS - Payment tokens designed for display on a consumer's mobile device include dynamic trust data (e.g., transaction history and/or token generation date) along with financial account information, enabling merchants to make an informed decision about whether to accept payment without communication with the central processing system, and also protecting the consumer's account information from theft. | 09-18-2014 |
20140289129 | METHOD FOR SECURE CONTACTLESS COMMUNICATION OF A SMART CARD AND A POINT OF SALE TERMINAL - The embodiment(s) relate to a method of securely communicating between a Point-of-Sale (PoS) terminal and a payment card. The method includes signing payment data with a private key of the PoS terminal to create a signature. The method includes encrypting the payment data and signature using a public key certificate of the payment card, which is encrypted and signed by a certificate authority using a certificate authority private key and is received at the PoS terminal after a public key certificate of the PoS terminal is validated at the payment card. The PoS terminal public key certificate is encrypted and signed by the certificate authority using the certificate authority private key. The method includes transmitting the encrypted payment data and signature to the payment card for decryption of the payment data and signature using a payment card private key corresponding to the payment card public key certificate. | 09-25-2014 |
20140297537 | AUTOMATED APPLICATION PROGRAMMING INTERFACE (API) SYSTEM AND METHOD - A method for leveraging email to complete an online transaction from a third party vendor, the method comprising: storing customer information, the customer information including a customer name, customer email address, customer shipping address, and customer billing information. The method further comprises receiving an authorization request from an application programming interface associated with a third party vendor requesting access to a portion of the customer information and receiving confirmation from a customer to allow the third party vendor to access the portion of the customer information. The method further comprising transmitting an access code to the third party vendor and receiving a request message from the third party vendor, wherein the request message comprises the access code, and wherein the request message requests an authorization token. The method may further comprise confirming the received access code and transmitting an authorization token to the third party vendor. | 10-02-2014 |
20140297538 | System and Method for Data and Identity Verification and Authentication - A system for verifying and authenticating the identity of a user in a transaction. The user's identity is authenticated through the user's computer, tablet computer, mobile computing device, web browser (as a web-page, or as a plug-in for the browser), or other computing device by means of a single-use, time sensitive, system-generated transaction token and user selected system PIN. The user presents the transaction token to the vendor or merchant, which forwards a request for authentication to the system. The system prompts the user to confirm the transaction and enter the PIN into the device used to generate the transaction token. Upon confirmation, the transaction is completed. | 10-02-2014 |
20140310181 | ANONYMOUS ONLINE PAYMENT SYSTEMS AND METHODS - In various embodiments, a server grants access to a plurality of anonymous one-time-usable, time-sensitive encrypted tokens that identify consumer purchase orders. A plurality of certified merchant servers are certified by being provided with an application to securely connect the certified merchant servers to the server for, among other things, transmitting purchase order data to the server for use in generating the tokens. A plurality of financial institution servers can also be certified by being configured for use with an application that enables secure connection to the server for, among other things, requesting the tokens. | 10-16-2014 |
20140330726 | SMART CARD WITH VERIFICATION MEANS - The present invention is directed to a smartcard that enables a one-time pin code offline security authentication with a card reader. This is achieved by generating a one-time pin code when the user inputs their pin code. The inputted pin code is encrypted and matched with the encrypted user correct pin code. If there is a match the one-time pin code is stored in memory and the transaction can proceed. | 11-06-2014 |
20140330727 | ID Authentication - A method for ID authentication, in which equipment involved in a transaction requests a password from a physically separate but limited-range communicating device, which automatically supplies a password in response to such request and communicates it to the equipment, the password is assessed as valid or invalid and the transaction approved or not accordingly. | 11-06-2014 |
20140337233 | METHODS, APPARATUS AND MEDIA FOR USE IN ASSOCIATION WITH IDENTIFICATION TOKEN AND/OR IN DOCKING - In accordance with some embodiments, apparatus comprises a body defining: a first seat to receive a first device having a wireless communication interface; and a second seat to receive a second device having a wireless communication interface; a first wireless communication interface supported by the body to communicate with the wireless communication interface of the first device; and a second wireless communication interface supported by the body to communicate with the wireless communication interface of the second device. In accordance with some embodiments, apparatus comprises a body comprising a flexible pad; a first communication interface supported by the flexible pad, the first communication interface comprising a first wireless communication interface to communicate with a wireless communication interface of a first device; a second communication interface supported by the flexible pad; and a controller supported by the flexible pad to couple the first wireless communication interface to the second communication interface. In accordance with some embodiments, a method comprises: receiving a first device having a wireless communication interface on a body of a dock; receiving a second device having a wireless communication interface on a body of a dock; communicating with the wireless communication interface of the first device using a first wireless communication interface supported by the body of the dock; and communicating with the wireless communication interface of the second device using a second wireless communication interface supported by the body of the dock. | 11-13-2014 |
20140344160 | Universal Authentication Token - A universal authentication token is configured to securely acquire security credentials from other authentication tokens and/or devices. In this manner, a single universal authentication token can store the authentication credentials required to access a variety of resources, services and applications for a user. The universal authentication token includes a user interface, memory for storing a plurality of authentication records for a user, and a secure processor. The secure processor provides the required cryptographic operations to encrypt, decrypt, and/or authenticate data that is sent or received by universal token. For example, secure processor may be used to generate authentication data from seed information stored in memory. | 11-20-2014 |
20140344161 | ELECTRONIC MONEY TRANSFER PAYMENT METHOD AND SYSTEM FOR SAME - This electronic money transfer system provides an electronic money transfer method and a system for the same which allow handling electronic money in a sense that is very similar to cash, and which allow avoidance of loss of the electronic money even at a time of loss or theft of a terminal for operating the electronic money. To this end, first, information of an electronic certificate for a terminal (A) of a user A is sent from a terminal (B) of a user B to an electronic money management server ( | 11-20-2014 |
20140351144 | PAYMENT TRANSACTIONS ON MOBILE DEVICE USING MOBILE CARRIER - A user makes a purchase request through a merchant app on a mobile device, such as by selecting an item for purchase. A mobile SDK of a payment provider is installed in the merchant app. The payment request includes the phone number for the mobile device. The payment provider verifies the phone number of the user and requests approval of the payment from a mobile operator providing wireless communication services on the mobile device. If the request is approved, the payment is charged to the user mobile operator account. The user simply taps a button to select an item to purchase and selects another button to confirm the purchase. Once processing is done, the user is notified on the mobile device of a successful payment. | 11-27-2014 |
20140358793 | Unforgeable Noise-Tolerant Quantum Tokens - A quantum ticket is defined by a unique serial number; and a set of qubits, each qubit encoding quantum information. The serial number and the set of qubits are distributed only among one or more trusted verifiers who require a tolerance fidelity F | 12-04-2014 |
20150019441 | MOBILE-TO-MOBILE TRANSACTIONS - A mobile-to-mobile transaction method allows two mobile smartphones to engage in a private transaction between themselves. The two share the same transaction server using prearranged individual enrollments. These build a dynamic digital image of a colorgram with a selected shape that defines a colorgram matrix boundary. Authentication codes, merchant coupons, product advertisements, and browser uniform resource locator (URL) links for product information and ordering, one-time-password (OTP) seeds, initialization vectors, individual enrollment passwords, or password seeds are embedded and encrypted in each colorgram. The colorgram is sent to a first one of the mobile smartphones for its display to a collocated second one of the mobile smartphones. A transaction is authenticated between users based on a calculated expectation of what should be returned when it provides its own digital image of the colorgram displayed by the first mobile smartphone. | 01-15-2015 |
20150039517 | CLOUD ENTERTAINMENT PLATFORM - Embodiments are directed to purchasing content provided by a cloud-based entertainment platform and to accessing media content provided by a cloud-based entertainment platform. In one scenario, a computer system receives authentication credentials from a user. The computer system authenticates the user to the cloud-based entertainment platform using the received authentication credentials. The computer system then receives payment data from the authenticated user, where the payment data includes a tokenized QR code that contains an indication of the media items being purchased and embedded account information for both the provider of the selected media items and the user. The computer system also processes a payment transaction based on the indication of media items being purchased and the embedded account information in the tokenized QR code and, upon determining that the authenticated user has paid for a media item, transmits the purchased media item to the user. | 02-05-2015 |
20150046338 | MULTI-NETWORK TOKENIZATION PROCESSING - Systems, apparatuses, and methods are provided for enabling a transaction using a token associated with a first payment network to be conducted using a second payment network. When a transaction using a token is submitted to a payment network, the payment network can determine the payment network associated with the token. If the token is associated with a second payment network, a token verification request including the token can be sent to the second payment network. The second payment network can then return a token verification response including a primary account identifier such as a primary account number (PAN) corresponding to the token and a validation result. The transaction may then be processed using the primary account identifier. | 02-12-2015 |
20150058226 | TOKEN FOR SHORT RANGE RF TRANSACTION NOTIFICATION - A token has an antenna and a short-range RF receiver to receive wireless receive bursts comprising receive protocol overhead and transaction credentials. A parsing circuit selects a subset of the transaction credentials including a duration of an associated transaction. A credentials memory holds at least the subset of the transaction credentials for the duration of the transaction. A display and/or short-range RF transmitter notifies a transaction notification indicative of the subset of the transaction credentials held in the credentials memory. The short-range RF transmitter transmits wireless transmit bursts in a burst data length shorter than a burst data length of the receive bursts. The wireless receive bursts can have control data and the parsing circuit selects the subset based on instructions in the control data. A display on a vehicle can render the subset of the transaction credentials for the duration of the associated transaction. | 02-26-2015 |
20150058227 | SYSTEM, METHOD, AND APPARATUS TO AUTHORIZE A PAYMENT TRANSACTION USING A TOKEN CREDENTIAL - A novel system and methodology for conducting financial and other transactions using a wireless device. Credentials may be selectively issued by issuers such as credit card companies, banks, and merchants to consumers permitting the specific consumer to conduct a transaction according to the authorization given as reflected by the credential or set of credentials. The preferred mechanism for controlling and distributing credentials according to the present invention is through one or more publicly accessible networks such as the Internet wherein the system design and operating characteristics are in conformance with the standards and other specific requirements of the chosen network or set of networks. Credentials are ultimately supplied to a handheld device such as a mobile telephone via a wireless network. The user holding the credential may then use the handheld device to conduct the authorized transaction or set of transactions via, for example, a short range wireless link with a point-of-sale terminal. | 02-26-2015 |
20150066777 | VALUE ADD SERVICE FOR MOBILE POINT OF SALE - The present invention provides a method and system for validating the authenticity of products in which a known payment network infrastructure is used to convey messages for applications other than effecting financial transactions. In particular, the invention provides a method of allocating an identification number to a product manufacturer that may be processed in the same manner as a Personal Account Number (PAN). Standard network messages from the payment network infrastructure may then be used to record an action for example verifying the authenticity of the product. Conveniently, such standard network messages may be translated by an application, for example running on a mobile point of sale (MPOS) device or a suitably enabled smart device, into a more MPOS-user readable format more associated with a warranty action (e.g. a given standard network message may be translated into a “warranty activated” message). | 03-05-2015 |
20150088753 | METHOD AND APPARATUS FOR PROVIDING A VIRTUAL GIFT CARD SYSTEM - An approach is provided for linking one or more virtual gift cards to the wallet database associated with the unique identifier of at least one mobile device. The approach involves receiving a request for registering a virtual gift card to a mobile device, wherein the request specifies a unique identifier associated with the mobile device. The approach also involves determining a card identifier associated with the virtual gift card. The approach further involves generating a card token for the virtual gift card based on the card identifier. The approach also involves storing the card token in a wallet database, wherein the wallet database is associated with the unique identifier of the mobile device, and wherein the wallet database is accessed from an application of the mobile device. | 03-26-2015 |
20150100496 | Switching System Able to Prevent Fraud from Falsified Digital Information - The present invention is a switching system able to prevent fraud from falsified digital information, generally installed into card reader device, wherein the card reader device can read integrated circuit card. The switch system can provide safe financial transaction during advertisement broadcasting, and resume advertisement broadcasting after transaction. The transaction processor of the present invention turns off all the links with the card reader device except certain transaction center, stops broadcasting advertisement sent from advertisement center, and prevent falsified information from displaying on the monitor. | 04-09-2015 |
20150112869 | Methods and Systems for Use in Online Transactions - A method of enabling the creation of a wallet entry in a digital wallet, wherein the wallet entry is for use in completing online transactions. The method comprises associating a local device with a network portal, using the local device to obtain card data relating to a card, encrypting the card data on the local device, and transmitting the encrypted card data from the local device to a remote server by means of the network portal. The remote server is arranged to decrypt the card data and use the card data to create the wallet entry. | 04-23-2015 |
20150112870 | CONTEXTUAL TRANSACTION TOKEN METHODS AND SYSTEMS - Embodiments of the present invention are directed to methods, systems, apparatuses, and computer-readable mediums for generating and providing a transaction token that may provide contextual information associated with the token. Accordingly, the transaction token may provide any entities within a transaction processing system immediate information about the context in which the token was generated, how the token may be used, and any other information that may be pertinent to processing the token. | 04-23-2015 |
20150112871 | MULTI-NETWORK TOKEN BIN ROUTING WITH DEFINED VERIFICATION PARAMETERS - Techniques described herein relate to using tokenization with BIN table routing by configuring a computer system, such as an acquirer computer, to utilize a token BIN translation table to determine which payment processing network(s) are eligible to route a transaction based upon a utilized token. In an embodiment, each token BIN translation table entry associates a token BIN with one or more payment processing networks that are eligible to route transactions. An acquirer computer, upon receiving a token for a transaction, thus may flexibly route the transaction to an eligible network from the set of payment processing networks identified by the entry corresponding to the token's BIN value. The entry may further identify verification methods for the eligible payment processing networks, and may identify product type attributes of the account associated with the token, either of which may be used in determining which payment processing network to select. | 04-23-2015 |
20150127547 | NETWORK TOKEN SYSTEM - Embodiments of the invention are directed to methods, apparatuses, computer readable media and systems for providing, along with a token, a token assurance level and data used to generate the token assurance level. At the time a token is issued, one or more Identification and Verification (ID&V) methods may be performed to ensure that the token is replacing a PAN that was legitimately used by a token requestor. A token assurance level may be assigned to a given token in light of the type of ID&V that is performed and the entity performing the ID&V. Different ID&Vs may result in different token assurance levels. An issuer may wish to know the level of assurance and the data used in generating the level of assurance associated with a token prior to authorizing a payment transaction that uses the token. | 05-07-2015 |
20150134537 | SECURE COMMUNICATION OF PAYMENT INFORMATION TO MERCHANTS USING A VERIFICATION TOKEN - Disclosed are apparatuses, systems, and methods pertaining to the secure communication of payment information from portable consumer devices, such as credit cards, to online merchants using verification tokens. | 05-14-2015 |
20150142666 | AUTHENTICATION SERVICE - An authentication service for hosting in trusted server environments includes a validation process for validating the identities of mobile users from a server's vantage point in the Cloud. A confidence scoring process is further included for estimating the certainty to which (1) a particular user, (2) a user's device apps and devices hosting them, and (3) a user's intent to carry out a given transaction have been correctly identified. | 05-21-2015 |
20150142667 | PAYMENT AUTHORIZATION SYSTEM - A payment authorization system includes a network server configured to create strong bindings between individual user identifiers and a peculiar combination of devices corresponding users employ, and the associated communications services each utilizes. The combination of user-devices-services reduces the possibilities to the one user who is authorized to establish access to a set of security keys held by another secure server. The principal goal being to authorize a payment transaction without exposing the security keys. A secure backend payment server is configured to produce a surrogate output that will satisfy a payment processor when asked to do so by an authorized user. Such surrogate duplicates what a payment chip card or secure element would have presented in person, but here the security keys never have to leave the backend payment server. | 05-21-2015 |
20150142668 | APPARATUS AND METHOD FOR USING A DEVICE CONFORMING TO A PAYMENT STANDARD FOR ACCESS CONTROL AND/OR SECURE DATA STORAGE - Secure establishment of a key associated with a first facility identifier is facilitated. The key is shared between a device and an operator of a first facility, via a public key management infrastructure of a payment system operating according to the payment standard, during a first transaction, substantially in accordance with the payment standard, between the device and the first facility. Controlling access to a first facility is facilitated, via the device, using the key associated with the first facility identifier, substantially without reference to an issuer of the device and substantially without use of asymmetric keys of the device, during a plurality of subsequent transactions, substantially in accordance with the payment standard, between the device and the first facility. | 05-21-2015 |
20150294306 | USER AUTHENTICATION BY TOKEN AND COMPARISON TO VISITATION PATTERN - Embodiments are directed to receiving a token from a wearable device carried by a customer, the token for user authentication based on a visitation pattern of the customer. Embodiments include receive, from the wearable device carried by the customer, the token comprising user authentication information associated with the customer, wherein receiving the token indicates a current visit of the customer to the financial institution location; access, based at least in part on the user authentication information, a visitation history from a customer profile associated with the customer; determine, based at least in part on the visitation history, whether the current visit falls within a recognized visitation pattern; and authenticate, based at least in part on the determination, the customer for performing a transaction at the financial institution location. | 10-15-2015 |
20150294308 | DIGITAL CURRENCY MINING CIRCUITRY - Mining circuitry may be used to mine digital currency such as bitcoins by computing solutions to a cryptographic puzzle. Successful computation of a solution to the cryptographic puzzle may provide a reward of the digital currency. The mining circuitry may partition the mined reward between a first digital wallet and a second digital wallet. The first digital wallet may be user-provided, whereas the second digital wallet may be hardcoded into the dedicated mining circuitry. The mining circuitry may include control circuitry and multiple processing core circuits. The control circuitry may control the processing cores to solve the cryptographic puzzle via exhaustive search over possible inputs to the cryptographic puzzle. | 10-15-2015 |
20150302390 | A TOKEN GENERATING COMPONENT - The invention provides a method and system for providing financial details from a mobile device of a user for use in a transaction. The method is performed on a mobile device of the user and includes the steps of generating, on a token generating component, a session-specific token by applying an algorithm requiring a dynamic key; providing financial details for use in a transaction; incorporating the session-specific token and the financial details into a modified form the financial details; and transferring the modified form of the financial details from the mobile device to initiate the transaction. A corresponding method and system for validating financial details received, at a server of an issuing authority, is also provided. | 10-22-2015 |
20150317625 | VERIFICATION OF PORTABLE CONSUMER DEVICES - Apparatuses, methods, and systems pertaining to the verification of portable consumer devices are disclosed. In one implementation, a verification token is coupled to a computer by a USB connection so as to use the computer's networking facilities. The verification token reads identification information from a user's portable consumer device (e.g., credit card) and sends the information to a validation entry over a communications network using the computer's networking facilities. The validation entity applies one or more validation tests to the information that it receives from the verification token. If a selected number of tests are passed, the validation entity sends a device verification value to the verification token, and optionally to a payment processing network. The verification token may enter the device verification value into a CVV field of a web page appearing on the computer's display, or may display the value to the user using the computer's display. | 11-05-2015 |
20150317627 | METHOD AND SYSTEM FOR PREVENTING FRAUD - Disclosed herein are methods and systems of preventing fraud during a financial transaction. A consumer can subscribe, enter, and store their personal and business credit and debit card information, account numbers, pin numbers, logins, and passwords on a secure website. The consumer also can upload biometric data, such as a thumbprint or fingerprint, to the security system using a smart phone or tablet. The thumbprint and fingerprints act as the consumer's identifier when using the service and system. At the point of sale, the consumer places their thumb or finger on the biometric reader. The purchase amount is sent to the security system after the consumer chooses a credit or debit card. The security system sends a request for payment to the credit card company if the thumbprint matches. The credit card company determines whether to approve the transaction and if so, remits payment to the security system. The security system then remits the payment to the vendor. | 11-05-2015 |
20150324787 | Policy-Based Control and Augmentation of Cryptocurrencies and Cryptocurrency Security - A system for policy-based control and augmentation of cryptocurrency security including policy rules that govern transactions that are embedded in the cryptocurrency transmission. The transactions are then adjudicated using the policy-based control system at the endpoint. The invention first secures the private key to the cryptocurrency in a secure hardware module to ensure that ownership is maintained. Then, the system uses a policy-based control subsystem to embed policy information within the cryptocurrency transmission. On receipt, the transmission is decoupled such that the policy information can be implemented resulting in a decision to approve or disapprove the transaction. The system can be used for multiple signatories on a single transaction as well as any other policy requirement desired. | 11-12-2015 |
20150324788 | MOBILE CHECKOUT SYSTEMS AND METHODS - A mobile checkout system and method for completing a purchase transaction to purchase items from an internet merchant. A user browses and selects items for purchase from the merchant through a shopping application or browser. During the processing of the transaction, a checkout application installed on a mobile communication device is launched. The checkout application receives a checkout token created by a checkout server that identifies the purchase transaction. The checkout application uses this token and communicates with the checkout server to cause the checkout server to complete the purchase transaction. When the transaction is complete, the shopping application or browser is relaunched and a results page is displayed. | 11-12-2015 |
20150324789 | Cryptocurrency Virtual Wallet System and Method - The present disclosure describes a method in which an encrypted request to transfer a requested amount of cryptocurrency from a user address to a destination address is received. The request includes a destination address, a requested amount, a user device encryption key, and biometric data. A partially signed transaction to transfer a requested amount of cryptocurrency from the user address to the destination address is also received. The partially signed transaction is cryptographically signed and a multi-signed transaction is broadcast to a cryptocurrency network to transfer the requested amount of cryptocurrency from the user address to the destination address. | 11-12-2015 |
20150339662 | SYSTEMS AND METHODS FOR LINKING DEVICES TO USER ACCOUNTS - A device, system and method for uniquely binding a MST to a user account to load and securely store a magnetic stripe card data for transmission to a merchant's point of sale (POS) terminal, checkout system, or other MSR device. The system provides a convenient buying experience for buyers, and secure and informative transactions for sellers. | 11-26-2015 |
20150339663 | METHODS OF PAYMENT TOKEN LIFECYCLE MANAGEMENT ON A MOBILE DEVICE - A method includes maintaining a token database in a computer system, where the token database maps tokens to primary account numbers (PANs) for payment card accounts. The method further includes storing a respective entry in the token database for a token, with the token being mapped by the respective entry to a respective PAN and the respective PAN identifies a payment card account that belongs to a cardholder who uses a mobile device. The method also includes provisioning the token to the mobile device and determining at a subsequent point in time that a lifecycle event has occurred or will soon occur with respect to the token. In addition, the method includes updating the respective entry for the token in the token database in response to determining that the lifecycle event has occurred. | 11-26-2015 |
20150348010 | SWITCH SERVER SYSTEM INTEROPERABLE WITH MOBILE DEVICES PROVIDING SECURE COMMUNICATIONS - Methods and systems for conducting a secure transaction over a network using one or more gateway servers. The methods include receiving a request from a consumer, sending the request to a merchant, and receiving, from the merchant, a payment order associated with the request. The payment order is received via a merchant programmable user interface. The methods also include confirming the payment order to transform the payment order to a confirmed payment order, sending the confirmed payment order to a user, and receiving, from the user, a payment authorization associated with the confirmed payment order, and the payment authorization being received via a consumer programmable user interface. The payment authorization from the user includes a secure, encrypted, Internet Protocol (IP) message using encryption hashed with public and private key management. The methods also include performing a transaction in accordance with the payment authorization. | 12-03-2015 |
20150356552 | SYSTEM, METHOD AND PROGRAM FOR SECURELY MANAGING FINANCIAL TRANSACTIONS - The present invention relates to a method, system and computer program for securely managing financial transactions and, more particularly, but not exclusively, transactions authorised by way of authenticated personal data. It is significantly based on authenticated personal data and provides a degree of assurance to financial entities that the personal data used to establish a customer account (and gain access thereto for the purposes of conducting a financial transaction) is genuine, as is the identity of the customer to whom the personal data relates. The identity assurance aspect provides by a rating system which gives a rating to a personal data record according to the number of items of personal data deemed to be authentic, the nature of the issuing source of the identity evidence (e.g. a passport is rated more highly than a sports club membership card) and the financial health of the relevant customer. | 12-10-2015 |
20150371221 | TWO FACTOR AUTHENTICATION FOR INVOICING PAYMENTS - Methods and systems for authenticating a transaction are described. A user provides a user account and contact information to a merchant, and the merchant transmits this information to a service provider. The service provider generates an access token for the transaction and sends it to the contact information. The service provider also sends a notification to the user account. The user provides the access token to the service provider. The service provider confirms the access token, and processes the payment. | 12-24-2015 |
20150379505 | USING LIMITED LIFE TOKENS TO ENSURE PCI COMPLIANCE - A method comprises receiving, by a payment service from a point of sale (POS) system, a payment request having sale data and a card data token, generating a detokenize and erase request including the card data token, sending the detokenize and erase request to a token service, receiving, by the payment service, card data from the token service in response to the sending the detokenize and erase request, generating a payment process request comprising the sale data and the card data, sending the payment process request to a payment authorization service, receiving a payment response from the payment authorization service in response to the sending the payment process request, and sending the payment response to the POS system. | 12-31-2015 |
20150379515 | SECURE AUTHENTICATION SYSTEM AND METHOD - Apparatuses, methods, and systems pertaining to the verification of portable consumer devices for 3-D Secure Systems are disclosed. In one implementation, a verification token is coupled to a computer by a USB connection so as to use the computer's networking facilities. The verification token reads identification information from a user's portable consumer device (e.g., credit card) and sends the information to a validation entry over a communications network using the computer's networking facilities. The validation entity applies one or more validation tests to the information that it receives from the verification token. If a selected number of tests are passed, the validation entity sends a 3-D Secure datum to the verification token. The verification token may enter the 3-D Secure datum into a hidden field of a Purchase Authentication Page appearing on the computer's display. | 12-31-2015 |
20160005042 | HOST CARD EMULATION OUT-OF-BOUND DEVICE BINDING VERIFICATION - Methods and apparatus, including computer program products, are provided for mobile secure payments. In one aspect there is provided a method. The method may include sending, by a user equipment, verification information via an out-of-band channel to a host card emulation token provider, wherein the verification information includes one or more identifiers representative of the user equipment and/or user; and receiving one or more tokens, when the sent verification information verifies the identity of the user equipment and/or user. Related apparatus, systems, methods, and articles are also described. | 01-07-2016 |
20160012420 | HANDS-FREE TRANSACTION TOKENS VIA PAYMENT PROCESSOR | 01-14-2016 |
20160012421 | HANDS-FREE TRANSACTIONS USING BEACON IDENTIFIERS | 01-14-2016 |
20160012422 | HANDS-FREE TRANSACTIONS WITH A TRANSACTION CONFIRMATION REQUEST | 01-14-2016 |
20160012423 | HANDS-FREE TRANSACTIONS WITH VOICE RECOGNITION | 01-14-2016 |
20160012424 | DISTRIBUTED LEDGER PROTOCOL TO INCENTIVIZE TRANSACTIONAL AND NON-TRANSACTIONAL COMMERCE | 01-14-2016 |
20160019533 | METHOD AND SYSTEM FOR FACILITATING AUTHORIZATION OF A TRANSACTION - Method and system for facilitating authorization of a transaction. The method comprises: generating a unique identifier for each the transaction, the unique identifier being generated at a server; providing transaction details to a mobile electronic device via the server, the transaction details associated with each the transaction and being provided after receipt of the generated unique identifier; and generating, at the mobile electronic device, a cryptogram, based on the unique identifier and the transaction details, for facilitating authorization of each the transaction. The system comprises server(s), point-of-sale terminal(s) and mobile electronic devices. | 01-21-2016 |
20160019536 | SECURE PROCESSING OF DATA - Systems, methods, and machine-interpretable data representing executable instruction sets and/or other products for the processing of data for the secure creation, administration, manipulation, processing, and storage of electronic data useful in the processing of payment transactions and other secure data processes. Some embodiments provides secure means for the authorization of sensitive and other data processes subject to controlled access. Such processes include the creation, administration, authorization, virtualization, storage, and other manipulation or processing of electronic data representing characteristics of, instructions for, and information associated with consumer, business, and other payment accounts, and other forms of secure payment elements, such as payment tokens; and data useful in processing transactions using such accounts and elements. Information associated with particular payment means, such as accounts or payment tokens, can be stored in a data set, usually secure, sometimes referred to as a virtual or electronic wallet, or a secure payment token. | 01-21-2016 |
20160048825 | SYSTEM AND METHOD FOR A SECURE ELECTRONIC TRANSACTION USING A UNIVERSAL PORTABLE CARD READER DEVICE - The embodiments herein provide a method and system for secure electronic transaction using a dongle device and a mobile device. The method comprises inserting a payment card in a dongle device. A type of the card is recognized to activate a respective card reader to read a card data which is processed by a microprocessor. The payment amount input by the user is transmitted along with the card data and a transaction related information through the mobile device to a payment server for processing the card data to authenticate the merchant using a mobile application. The mobile application resides on the mobile device or server. After authenticating the user by verifying the user input PIN, the received data and a transaction request is sent to a banking server to perform an electronic transaction. | 02-18-2016 |
20160048830 | Transaction Token Issuing Authorities - Systems, methods, apparatus, processes, computer program code and means for conducting transactions are described which allow a first party to a transaction to identify a second party to a transaction. | 02-18-2016 |
20160048832 | SYSTEM AND METHOD FOR FACILITATING ONLINE TRANSACTIONS - Methods and systems for facilitating online transactions are disclosed. One method includes supplying content for display in a frame of a website, the website hosted by a third-party. The method also includes receiving transaction information from the third-party, and returning a token to the frame, the token including state information based on the transaction information. The method further includes passing the token from the frame to the third-party. The method optionally also includes receiving the token from the third-party and transferring funds from a first account to a second account based on the transaction information and the state information. | 02-18-2016 |
20160063487 | SYSTEM AND METHOD FOR DOUBLE BLIND AUTHENTICATION - A system and method a method for providing a double blind payment by virtually authorizing a transaction using an additional Funding Personal Account Number (FPAN). The method may include generating, by an issuing entity, an additional FPAN (e.g., FPAN2, FPAN3, etc.) that is tied to a primary account for a customer and independent from the number printed on the face of the transaction card associated with the master account. The additional FPAN may be associated with a specific merchant, a specific type of payment (e.g., online purchase, in-store purchase, and the like), and/or a specific account holder (e.g., master account holder, subsidiary account holder, and the like). The method may include receiving, at a merchant point-of-sale (PoS) system, the additional FPAN token, transmitting the additional FPAN token to the authorizing party, converting the additional FPAN token to the primary account number associated with the transaction card for authorization and approval of the charges, and transmitting, from the authorizing party to the merchant, the approval and authentication determination and additional FPAN number associated with the approval and authentication determination. | 03-03-2016 |
20160071096 | Method and System for Securing Cryptocurrency Wallet - Disclosed are a system and method for securing an online wallet by separating a first server hosting a cryptocurrency transaction website from a second server executing the cryptocurrency transactions within a private network. In a method of securing such cryptocurrency transactions, the first server receives a transaction request from a user to execute a transaction with a cryptocurrency stored in an online wallet. The first server then generates a request message and embeds at least a portion of the transaction request into the request message. The first server places the request message in a message queue and transmits the request message to the second server through the message queue. The second server receives the request message, extracts the transaction request and executes a cryptocurrency transaction based on the transaction request. The second server generates a response message and transmits the response message to the first server through the message queue. | 03-10-2016 |
20160078397 | AUTHENTICATION SYSTEM FOR PURCHASE DELIVERY - A computer-implemented method of providing authenticated delivery of a purchase to an authorised recipient comprises: a. authorising (S | 03-17-2016 |
20160104154 | SECURING HOST CARD EMULATION CREDENTIALS - Systems and methods for providing token generation and password verification are disclosed. The system may be configured to receive a password input by a user, wherein the password is not stored on the system prior to receiving the password, and to generate an encryption key based on the password. The system may further be configured to decrypt a token using the encryption key and, in response to verifying that the token was properly decrypted, decrypting a credential using the encryption key. The system may additionally be configured to initiate a near-field communication transaction with a reader using the decrypted credential. | 04-14-2016 |
20160110708 | SYSTEM AND METHOD FOR MANAGING A LOYALTY PROGRAM VIA AN ASSOCIATION NETWORK INFRASTRUCTURE - A system and method for providing a loyalty program by utilizing a pre-existing association network. When a consumer is registered with the program, the consumer's personal information is stored in a database and associated with a token ID. The token is capable of initiating a transaction message request over an association network when used in conjunction with a merchant transaction system. A program manager is provided that includes an association network interface for receiving over the association network the transaction request message initiated by the token at a merchant, where the transaction request message includes a first set of transaction information regarding a consumer-initiated product purchase transaction. The program manager is then configured to store the first set of transaction information, transmit to the merchant a response message that includes an indication that the token cannot provide tender for a product purchase, and utilize the first set of transaction information to facilitate the identification of one or more rewards for the consumer. | 04-21-2016 |
20160125396 | CONFIRMING PHYSICAL POSSESSION OF PLASTIC NFC CARDS WITH A MOBILE DIGITAL WALLET APPLICATION - In an example embodiment, an issuer system receives payment card information from a payment processing system, wherein the payment card information is received from a payment card via a user computing device using near field communication. The issuer system generates an unpredictable number for the payment card and communicates the unpredictable number to the payment card via the payment processing system and the user computing device. The payment card calculates a cryptographic checksum based on the unpredictable number and a shared secret and communicates the checksum to the issuer system via the user computing device and payment processing system. The issuer system verifies the checksum using the shared secret and the unpredictable number. The issuer system generates a token associated with the payment card and transmits the token to the user computing device via the payment processing system for use in an online transaction. | 05-05-2016 |
20160125402 | METHOD AND DEVICE FOR PAYMENT USING TOKEN - Methods and devices for payment using token are provided, one of methods comprises, receiving a public key and a payment device token from a payment device, creating a digital signature through encryption of the payment device token and a stored user token using the public key, and payment request data including the digital signature, transmitting the payment request data to the payment device and updating the user token through performing of a token update operation. | 05-05-2016 |
20160140538 | MOBILE DEVICE LOCAL INTERRUPTION OF TRANSACTIONS - A system method and a device for offline authentication of transactions using mobile device, based on, analytic engine such as behavioral pattern detection are provided. The behavioral pattern can be for a specific person, for group of people with similar characteristics or a combination of the two. The invention has the advantage over prior art centralized authentication and fraud detection systems in that the it is more precise indentifying and preventing fraud in real time. The precision is better for both customer and merchant frauds. The present invention also requires fewer investments in infrastructure and uses less communication traffic when compared in the prior art. | 05-19-2016 |
20160140542 | MULTIPLE TOKENIZATION FOR AUTHENTICATION - Embodiments of the present invention are directed generally to systems, methods, and apparatuses for authenticating a cardholder using multiple tokenization authentication. Embodiments of the invention are directed at a method. The method includes receiving at a first entity a first token from a consumer and determining a second token associated with the first token. Once the second token is determined, the second token is sent to a server computer at a second entity. The server computer then determines an account identifier associated with the second token and processes a transaction using the account identifier. | 05-19-2016 |
20160140565 | REFRESHING A BEHAVIORAL PROFILE STORED ON A MOBILE DEVICE - A system, method and a device for offline authentication of transactions using mobile device, based on, analytic engine such as behavioral pattern detection are provided. The behavioral pattern can be for a specific person, for group of people with similar characteristics, or a combination of the two. The invention has the advantage over the prior art centralized authentication and fraud detection systems in that it is more precise in identifying and preventing fraud in real time. The precision is better for both customer and merchant frauds. The present invention also requires fewer investments in infrastructure and uses less communication traffic when compared to the prior art. | 05-19-2016 |
20160148197 | TOKENIZATION REQUEST VIA ACCESS DEVICE - Embodiments of the invention are directed to a method for submitting a tokenization request via an access device. Embodiments allow tokens to be retrieved for complex mobile devices as well as basic card-type devices. Token requests can be formatted as authorization request messages and transmitted along authorization communication channels. | 05-26-2016 |
20160162873 | SYSTEMS AND METHODS FOR MESSAGING, CALLING, DIGITAL MULTIMEDIA CAPTURE, PAYMENT TRANSACTIONS, GLOBAL DIGITAL LEDGER, AND NATIONAL CURRENCY WORLD DIGITAL TOKEN - Provided are computer implemented methods and systems for using a global world universal digital mobile and wearable currency. The method commences with receiving a transfer request. The transfer request is associated with an amount represented in tokens of the global world universal digital mobile and wearable currency. The transfer request includes at least a sender account, a recipient account, and the amount. The method continues with transferring the amount from the sender account to the recipient account based on the transfer request. | 06-09-2016 |
20160171480 | METHODS AND SYSTEMS FOR TRANSFERRING ELECTRONIC MONEY | 06-16-2016 |
20160180335 | ALARM SERVICE | 06-23-2016 |
20160180340 | SECURE PAYMENT SERVICE AND SYSTEM FOR INTERACTIVE VOICE RESPONSE (IVR) SYSTEMS | 06-23-2016 |
20160203476 | METHOD AND APPARATUS FOR DISTRIBUTION OF MONEY TRANSFERS | 07-14-2016 |
20160253660 | PROPRIETARY TOKEN-BASED UNIVERSAL PAYMENT PROCESSING SYSTEM | 09-01-2016 |
20160379208 | SYSTEMS AND METHODS FOR IN-APPLICATION AND IN-BROWSER PURCHASES - A system may receive a transaction request from a user device, and request an in-app cryptogram from a network software development kit (SDK) on the user device. The in-app cryptogram may include an unpredictable number, an application transaction counter (ATC), and a card verification result (CVR), and the ATC may be extracted from a limited use payment credential (LUPC). The system may transmit a token, a token expiry, and a token data block for an assessment by a payment network, with the token data block including the token, the token expiry, the ATC, and/or the in-app cryptogram. The system may further receive a request from the payment network to update the LUPC on the user device, and attest that the user device is secure in response to the request from the payment network to refresh the LUPC on the user device. | 12-29-2016 |
20170236120 | Accountability and Trust in Distributed Ledger Systems | 08-17-2017 |
20180025351 | MOBILE DEVICE SECURITY USING WEARABLE SECURITY TOKENS | 01-25-2018 |
20220138706 | METHOD AND SYSTEM FOR ALLOCATING VIRTUAL ARTICLES - A method for allocating virtual articles comprises: receiving at least two acquisition requests directed at a virtual article packet, and respectively recording receiving times of the acquisition requests, wherein the virtual article packet comprises one or more virtual article sub-packets; allocating acquisition sequence numbers respectively to the acquisition requests according to a sequential order of the receiving times of the acquisition requests; and allocating the virtual article sub-packets according to the acquisition sequence numbers for the acquisition requests corresponding to the acquisition sequence numbers, and sending virtual articles in the virtual article sub-packets to users corresponding to the acquisition requests. | 05-05-2022 |