Entries |
Document | Title | Date |
20080208757 | Systems and Methods for Processing Claims in Real-Time - Claim processing system providing an interface to permit pharmacy and medical management systems to use the Internet to transmit third-party insurance claims on a claim-by-claim basis in real-time or near-real-time to one or more claim servers that receive insurance claim requests over the Internet in an encrypted form. The one or more claim servers decrypt the claim requests and forward them to a health network application which facilitates the submission of the claims to insurance payers and the response of the insurance payers to the requests. Payer responses are received by the claim servers, encrypted and forwarded to the pharmacy and medical management systems in real-time or near real-time. | 08-28-2008 |
20080222046 | METHOD OF AND SYSTEM FOR EFFECTING ANONYMOUS CREDIT CARD PURCHASES OVER THE INTERNET - A transaction system for performing secure transactions over a communication network includes (i) a merchant server system including a computer processor and associated memory, the merchant server system offering items for sale; (ii) a buyer system including a computer processor and associated memory, the buyer system being selectively couplable to the merchant server system over the communication network to initiate a transaction, wherein, during the transaction, the buyer system selects one or more of the items for purchase; (iii) a security server system including a computer processor and associated memory and an encryption device, the security server system receiving buyer information from the buyer system, encrypting the buyer information in an encryption key that prevents the merchant server system from decrypting the buyer information, and transferring the encrypted buyer information to the merchant server system; and (iv) a third server system including a computer processor and associated memory, the third server system being selectively couplable to the merchant server system, wherein the merchant server system transmits at least a portion of the encrypted buyer information to the third server system for processing during the transaction. | 09-11-2008 |
20080243700 | METHODS AND APPARATUS FOR ROUTING SECURITIES ORDERS - According to some embodiments, a securities order trading system may determine, during a trading session, one or more attributes of an order destination. The attribute or attributes may be other than a price quoted or a size of an order booked on an order destination. The trading system may also determine during the trading session, and based on the order destination attribute or attributes, at least one of whether to route an order to the order destination, and a proportion of the order to allocate to the order destination. | 10-02-2008 |
20080262969 | Bit currency: transactional trust tools - Bit-currency Transactional Trust Tools (T3) is a set of tools and procedures based on expressing value through a bit string where the size of the string (bit count) reflects its value, and the identity of the bits is used to distinguish one such digital coin from the other, and for enabling an authentication hierarchy that alleviates the bottleneck of having a single source coin authentication for all transactions in coins issued (minted) by that mint; also enabling an instant split of a coin by simply splitting off a portion of the string of the coin, such that the bit count of the split-off string reflects its value. Each coin is comprised of that body string as described above, and a header that contains information regarding coin identifier, payment conditions, and suchlike. Such bit currency can be carried around everywhere bits are handled, and may be encrypted as necessary. Two online strangers could transact and make a payment by using the PINprivate procedure where by the strangers create a temporary secret which is sufficient for the payee to access the online location with the payment, and empty it before any third party can steal it; the temporary secret is based on the payer pre-calculating several computational tasks allowing the payee to randomly choose a task to compute, and communicating the identity of the chosen task (the temporary secret) by sending back the result, the task being a one-way function, it's unfeasible for any third party to find the secret before computing all the presented tasks. The bit currency can be exchanged between software applets carrying out rules of exchange and thereby allowing peer-to-peer networks to work more efficiently, and also allow for peer-to-peer distribution of digital goods to be carried out while honoring the digital rights of the digital file owner, so doing by allowing the mint to cut a portion of the payment digitally paid by the receiving node and allocate such cut to the digital rights owner. | 10-23-2008 |
20080262970 | System and method of electronic information delivery - A system and method for web browser based, secure or authenticated electronic delivery of information, wherein the security or authentication is provided by a means of a public key cryptography encryption method. The system can be used as a web-based blind bidding method, wherein software is located and operated on a central server and within the end user's web browser. Thus, no software is installed onto the end user's computer. In addition, the bidding system uses two-way PKC encryption technology or symmetric encryption technology to sign and seal the bid data submitted by each bidder, said encryption technology being completely browser based. | 10-23-2008 |
20080275821 | SYSTEMS AND METHODS FOR RISK TRIGGERING VALUES - The invention includes systems and methods for facilitating risk assessment for point of sale transactions utilizing at least one risk triggering value (RTV) stored within a distributed (e.g., local and/or regional) processing site. An RTV is a condensed version of a set of complex risk data and strategies usually found in central processing sites. The distributed site, after receiving a request for payment authorization, a risk value is calculated for the request. The distributed processing site compares the risk value to the RTV to determine whether to authorize payment. If the risk value is less than or equal to the RTV, the payment is authorized while a risk value greater than the RTV will not be authorized. After one or more authorizations, the distributed processing site forwards the information from the transaction(s) to the central site, wherein the central site calculates a new RTV for the account and distributes the new RTV to the distributed processing site. | 11-06-2008 |
20080301055 | UNIFIED PLATFORM FOR REPUTATION AND SECURE TRANSACTIONS - The claimed subject matter provides a unified platform system and/or a method that facilitates optimizing an online transaction. The unified platform system can include a secured transaction component that can secure a portion of transactional data related to an online transaction between at least one buyer and at least one merchant utilizing a secure transaction technique. The unified platform system can include a reputation assessment component that can receive a portion of reputation data related to at least one of the buyer or the merchant based at least in part upon verifying completion of the online transaction between such buyer and merchant. The unified platform system can publish the portion of reputation data coupled with a portion of non-private transactional data to provide context for the reputation data. | 12-04-2008 |
20080306874 | SYSTEM AND METHOD FOR MANAGING A PRODUCT THROUGH A DISTRIBUTION CHAIN - A method and system for distributing products is provided. The distribution system enables a manufacturer of a product to define one or more allowed distribution paths, and to limit distribution of their product to only an allowed distribution path. The system provides an embedded processor in or on a product, with the embedded processor controlling access to some utility or feature of the product. In this way, the product is not usable or is undesirable until an authorized activation process has occurred. To control the distribution chain, a set of distribution rules is defined that sets allowed or excluded distributors and retailers for products or sets of products. When the product is moved to the next distributor, or presented at a point-of-sale, the rules are compared to the actual recorded distribution chain. If the distribution chain is proper, then the product may be activated, or moved to the next distribution entity. If the distribution chain is not proper, than the product may be permanently disabled, or a response may be generated that penalized the infracting distributor. | 12-11-2008 |
20090006262 | FINANCIAL TRANSACTION PAYMENT PROCESSOR - A financial transaction payment processor includes an account access request processor for receiving dynamic swipe data from a payment card through a merchant infrastructure. A fraud detection processor is connected to analyze a dynamic data obtained by the account access request processor that should agree with values pre-loaded in a Crypto-Table by a card manufacturer. A payment authorization processor is connected to receive a message from the fraud detection processor and to then forward a response to the merchant infrastructure. | 01-01-2009 |
20090012900 | Making Secure Data for Customer Loyalty Programs - A portable device, a terminal, a system, and a method of storing data relating to transactions by terminals ( | 01-08-2009 |
20090024532 | PHONE-MEDIATING TRADING METHOD - A phone-mediating trading system and a method for use with the same are provided. After the user uses a user phone to construct linkage to the trading host, the trading host generates a set of random data to the user phone where the set of random data is encrypted with a private key designated to the user phone. The encrypted set of random data is transmitted to the trading host, and decrypted through the use of a public key that is stored in the trading host and corresponds to the user's phone number. If the decrypted set of random data, as determined by the trading host, is the same as the originally-generated set of random data, the user is allowed to perform trading with the trading host. This method is efficient and convenient to implement without performing a conventional complex identification process for identifying the user. | 01-22-2009 |
20090055322 | REMOVABLE MODULE IN PERSONAL HANDHELD DEVICES FOR PERSONAL INFORMATION EXCHANGE - A personal information exchange module in a standardized form is used as a plug-in to a personal handheld device for information exchange such as financial transactions, facility access, medical information exchange, and the like while protecting sensitive code and data associated with the module by separating those from the operating environment of the personal handheld device. Functional capabilities of the module may also be adjusted based on available power from the personal handheld device. | 02-26-2009 |
20090063351 | System And Method For Providing Consumer Rewards - An automated consumer rewards/incentive program that accepts a registration of a consumer. The registration entitles the consumer to receive the benefits of the incentive program. To track the fulfillment of reward earning criteria established by member businesses, the registration includes information indicative of a credit card of the consumer. The system may track member consumer credit card transactions without receiving personal information for non-members by using a one way hash function. The system uses the credit card information to determine when member customers perform a transaction at a member business. When a member customer performs a transaction at a member business using the registered credit card, the system and method examines the credit card transactional information to determine if the consumer fulfilled the requirements of the incentive program for the member business. If the transactional information indicates that the consumer fulfilled the criteria of the rewards program of the member business, the consumer is rewarded in accordance with the benefits of the incentive program. | 03-05-2009 |
20090070268 | SYSTEMS, METHODS AND APPARATUSES FOR SECURE DIGITAL TRANSACTIONS - A method for generating a code representative of a currency value according to one embodiment includes generating a first code, and combining a security code with the first code for creating a larger composite code, the composite code being associated with a predetermined currency value. Further, the composite code is usable in a monetary transaction. | 03-12-2009 |
20090070269 | SYSTEMS, METHODS AND APPARATUSES FOR SECURE DIGITAL TRANSACTIONS - A method for safeguarding data according to one embodiment includes receiving a data package comprising data and a timestamp. Additionally, the method includes receiving or retrieving authentication information. Furthermore, the method includes determining a validity of the authentication information. Further still, the method includes granting access to the data if the authentication information is determined to be valid, corrupting data upon receipt of invalid authentication information, and corrupting data after expiration of a predetermined amount of time from the timestamp. | 03-12-2009 |
20090083188 | Secure Data Systems and Methods - Various embodiments of secure data systems and methods are disclosed. One method embodiment, among others, comprises associating information corresponding to a first negotiable instrument with a data structure, and providing a checksum to the data structure to prevent unauthorized modification of the information. | 03-26-2009 |
20090083189 | SECURING PAYMENT DATA - The claimed subject matter relates to an architecture or arrangement that can limit access to sensitive information by means of encryption. In particular, data obtained from a payment instrument at, e.g., a Point-Of-Sale (POS) location can be encrypted at an early stage such that a POS (or another) application does not have access to the data in an unencrypted form and/or does not have access to a means for decrypting the data. For example, a Public Key Infrastructure (PKI) arrangement can be employed such that a back-end payment processor can define encryption algorithms, associate itself with a public key, and maintain a private key for decryption. The public key can be delivered to the POS location and employed for data encryption, and, moreover, the PKI can be regulated by the more trusted parties. | 03-26-2009 |
20090094163 | SECONDARY IDENTIFICATION FOR REMITTANCE DELIVERY - There are provided a method, system and program storage device perform a remittance transaction. The method includes generating a remittance transaction to transfer funds from an account associated with a sender to a receiver; receiving a visual or audio identification of the receiver from the sender for the remittance transaction; and transmitting the generated remittance transaction, the received identification and the funds associated with the remittance transaction to a disbursement agent to selectively disburse funds to the receiver if the identification of the receiver matches the receiver. | 04-09-2009 |
20090119220 | AUTHORIZED SAMPLE RECEIVER - In an exemplary embodiment of the invention, an authorized sample receiver (ASR) comprises a processor that is configured to verify biometric sample data in order to create registered biometric sample data. The ASR may also comprise a communications device configured to receive a transaction request from an RF transaction device, wherein the transaction request comprises transaction biometric sample data, a reload protocol update request, and an RF device identification code. The ASR may also be configured to authorize the transaction request in response to the transaction biometric sample data substantially matching the registered biometric sample data. The ASR may further comprise a reload protocol data file associated with the device identification code, and the reload protocol data file may be configured to be updated in accordance with the reload protocol update request. | 05-07-2009 |
20090144201 | TARGETING MESSAGES - The invention generally relates to systems and methods for directing information to people and/or households likely to be receptive to the information. Systems and methods according to the invention can be used to target one or more marketing messages, such as various types of offers, to one or more consumers determined likely to be receptive to the message(s). | 06-04-2009 |
20090157554 | CLIENT SYSTEM FACILITATING AN ONLINE CARD PRESENT TRANSACTION - An online card-present transaction system facilitates card-present type transactions with a merchant over a public network. A host system is configured to accept authentication data from a user via an authentication device. The host system, after authenticating a user is configured to retrieve the user's account information from a user database system and translate a user account number into a temporary transaction number. The temporary transaction number is then transmitted directly from the host system to the merchant, thereby eliminating the need for the user to send to the merchant over the internet, the user's transaction account number. | 06-18-2009 |
20090248578 | METHODS AND APPARATUS FOR MEDICAL DEVICE INVESTMENT RECOVERY - A method of providing a consumer or user with an investment recovery from a pay-per-use device. The investment recovery system involves a computer implemented method of determining the residual number of uses on a product, and crediting a user with the residual number. Also described are apparatus and systems for use with the method of providing medical device investment recovery. | 10-01-2009 |
20090254483 | Payment system and method using tokens - A method of payment using tokens issued by a third party comprising the steps of: a. A transaction management unit receives a request to perform a service for which payment with tokens is required; b. The management unit checks whether there are yet unused tokens available; If an unused token was found, go to step (c); If there are no available tokens, then indicate that, then END; c. The management unit requests information on an available token from a database. The status of the used token is changed to “used”; d. During the subsequent transaction, the management unit sends information relating to the token now used. A system for managing and monitoring the use of tokens, comprising: a. a transactions management unit using tokens, wherein the unit is activated when a local user requires to perform a service for which payment using tokens is required; b. a tokens database which includes information on tokens acquired from the third party; c. a tokens use monitoring unit, to verify the correct use of tokens; d. a database of tokens reports; e. a communication channel to other users. | 10-08-2009 |
20090271320 | SYSTEM FOR ELECTRONIC BUSINESS TRANSACTIONS - An electronic business transaction system is provided. The electronic business transaction system requests an ordering party to select an electronic business and input order information for the electronic business through a terminal of the ordering party, receives the order information for the electronic business from the ordering party, announces a bid for the electronic business, requests bidders to select the electronic business, input bid information for the electronic business, and organize execution groups for the electronic business through a terminal of the bidders, receives the bid information and information for the execution groups from the bidders, analyzes the bid information and the information for the execution groups, selects an order-taking party from among the bidders according to the results of the analysis, concludes an electronic contract for the electronic business between the order-taking party and the ordering party, and provides an application for processing the electronic business regarding the electronic contract to terminals of execution group members belonging to an execution group of the order-taking party so that the execution group members process the electronic business through the terminals of the execution group | 10-29-2009 |
20090276361 | Transaction System and Method for Advance a Committed Time in the Future - Transaction systems and methods for advancing a committed time in the future are described herein. In the present transaction systems and methods, the first end can be permitted to pre-hatch a time capsule signature before the committed time. The time capsule signature scheme here is conducted based on an identity-based trapdoor relation (IDTR). Moreover, an extended time capsule signature scheme is conducted based on an extended identity-based trapdoor relation (IDTR). By using an extended IDTR primitive, the present transaction systems and methods can distinguish the time capsule signature is validated before or after the committed time t. | 11-05-2009 |
20090327138 | Securing Online Transactions - Disclosed herein is a method and system that addresses the need of securing an online transaction of a consumer. The user is provided with a client application on a mobile device. The user registers the mobile device on a transaction server. The user inputs transaction details for the online transaction on a web portal hosted on the transaction server. The transaction server creates a challenge to the user on a confirmation page to confirm the online transaction. The challenge comprises a challenge code and a transaction confirmation image. The graphical image and the transaction details are computationally inseparable in real time. The user conveys the challenge to the mobile device by inputting the challenge code in the client application. The client application generates a response for the challenge. The user then inputs the response on the confirmation page. The transaction server validates the response and authorizes the online transaction. | 12-31-2009 |
20100017332 | INTER-NETWORK FINANCIAL SERVICE - Systems and methods for making a payment on behalf of a payer to a payee are provided. A request to make a payment on behalf of a payer to a payee is received at a first payment service provider. The first payment service provider supports a first payment network within a plurality of payment networks that each include a respective plurality of payers and payees. The payer is one of the plurality of payers and payees associated with the first payment network, and the payor is not one of the plurality of payers and payees associated with the first payment network. A second payment network within the plurality of payment networks with which the payee is associated is identified by the first payment service provider. A payment instruction to make the payment to the payee is transmitted by the first payment service provider to a second payment service provider associated with the second payment network. | 01-21-2010 |
20100030693 | METHOD AND SYSTEM FOR HAND GEOMETRY RECOGNITION BIOMETRICS ON A FOB - The present invention discloses a system and methods for biometric security using hand geometry recognition biometrics in a transponder-reader system. The biometric security system also includes a hand geometry scan sensor that detects biometric samples and a device for verifying biometric samples. In one embodiment, the biometric security system includes a transponder configured with a hand geometry scan sensor. In another embodiment, the system includes a reader configured with a hand geometry scan sensor. In yet another embodiment, the present invention discloses methods for proffering and processing hand geometry scan samples to facilitate authorization of transactions. | 02-04-2010 |
20100030694 | METHOD FOR SECURING IP CONNECTIONS FOR NETWORK OPERATOR COMBINATORY CONNECTIONS - The invention relates to a method for securing IP connections with a combinatory connection of a communication network of a first network operator with a communication network of at least one second network operator using the Session Initiation Protocol, SIP. This method is based on the fact that portions of an SIP message, but at least the information necessary for the combinatory connection of the networks, is transmitted in encrypted form between a transmission channel of the first network operator and a reception channel of the second network operator. | 02-04-2010 |
20100042546 | Multimedia (VO) IP Solution for Mobile Telephones - The invention relates to a novel mobile hotspot value-added service VAS (telephony, internet, IP-TV, M-Payment etc) solution using W-Lan, WiMAX, Bluetooth, DMV, DVB-H, NFC or any other known GSM and UMTS mobile radio technology, with a ticketing system on a handset (mobile, PDA, laptop), said solution being operated as a club system such as Skype for VoIP. In addition to the ticketing system, other rights, duties, or services are carried out/offered/operated or managed, and the operator of the hotspot can make their own profits on the value-added services when they sell the same individually, especially when the handset already contains an electronic ticket (MMS etc). According to the invention, a mobile VAS telephony solution (telephone exchange/platform) is operated as a club system by means of W-Lan, Bluetooth or any other mobile radio technology, such as is known for Skype with VoIP, but not as is claimed in the present invention with mobile telephones, by means of hotspots (with a proprietary software) simultaneously together with and against other rights, duties and inter alia commercial models etc. (such as ticketing systems, payment or controlling in stadiums or trains). | 02-18-2010 |
20100049658 | SECURE ELECTRONIC TRANSACTION SYSTEM - Systems and methods for the secure processing of electronic transactions are disclosed. In accordance with an exemplary embodiment, a system and method for the secure processing of electronic transactions comprises: receiving, by a POS terminal, information for a financial transaction card; receiving, by the POS terminal, information for a financial transaction; encrypting, by the POS terminal, the financial card information and the financial transaction information into a first encrypted message; transmitting the first encrypted message to a regional chassis; encrypting, by the regional chassis, the first encrypted message into a second encrypted message; transmitting the second encrypted message to a central chassis; decrypting, by the central chassis, the second encrypted message into a decrypted message; and transmitting the decrypted message to a host processor for authorization. | 02-25-2010 |
20100049659 | Method, device, server and system for identity authentication using biometrics - A method, a device, a server and a system for authenticating the identity with the biological character in an authenticating system, the authenticating system at least includes a local device and an authenticating server, wherein the method comprises the following steps: inputting step, inputting the biological character data in the local device by a biological character sensor; matching step, matching the input biological character data with the original biological character data pre-stored in the memory of the local device; first identification code producing step, producing the first identification code in the local device if the input biological character data is matched with the original biological character data pre-stored in the memory; and authenticating step, sending the first identification code to the authenticating server, authenticating the first identification code by the authenticating server in order to authorize the system to perform the authorized operation. | 02-25-2010 |
20100057618 | System, method, and software to manage financial securities via a 3-dimensional landscape - This disclosure involves systems, methods, and software for viewing, managing, or otherwise analyzing financial securities utilizing a three-dimensional display of related data and metrics. This disclosure describes techniques that facilitate the combination of financial data with 3D search technology to provide a user-friendly view and analysis of securities market data. The intuitive visual landscape offers a contextual picture that allows the user to display several layers of information simultaneously. Moreover, the disclosure describes this intuitive mechanism for looking at financial markets and identifying opportunities within a multi-dimensional landscape linked to additional integrated data panes, thus helping enable rapid analysis. The techniques may utilize or facilitate customizable metrics, seamless system compatibility, and integrated portfolio tools. The securities landscape may allow on-the-fly changes to quickly answer user queries. The disclosure further discusses various optimizations that help enable this real-time and intuitive landscape, such as vertex optimizations, color map optimizations, and hypersorting. | 03-04-2010 |
20100070418 | METHOD FOR RECEIVING ELECTRONICALLY TRANSFERRED FUNDS USING AN AUTOMATED TELLER MACHINE - A method for performing a money transfer receive transaction involving a desired amount of money to be transferred from a sender to a recipient includes receiving transaction identifying information provided by the recipient; comparing the transaction identifying information with transaction data stored on a host computer system; providing a confirmation code, to be issued to the recipient, if the transaction identifying information matches the transaction data stored on the host computer system; storing the confirmation code on the host computer system; receiving at the host computer system input corresponding to the confirmation code from a dispensing terminal in communication with the host computer system; comparing the input to the stored confirmation code; and allowing funds, corresponding to at least a portion of the desired amount of money, to be dispensed by the dispensing terminal if the input matches the stored confirmation code. | 03-18-2010 |
20100082490 | Systems and methods for secure wireless transactions - There is provided systems and methods for to conducting wireless transactions using portable electronic devices. Specifically, for example, a method of conducting a wireless transaction is provided that includes initiating a wireless transaction using a short range wireless communication system of a portable electronic device. The method also includes obtaining security information via at least one secondary system of the portable electronic device and utilizing the security information obtained via the at least one secondary system to authenticate the portable electronic device for the wireless transaction. | 04-01-2010 |
20100211505 | SYSTEM AND METHOD FOR MASS TRANSIT MERCHANT PAYMENT - Methods, systems and computer program products are provided for enabling payment of transit system fees using a financial transaction instrument. Entry is permitted onto a transit system by recognition of information included in an identification number stored on a financial transaction instrument. The identification number stored on the financial transaction instrument is associated with a transit system fee registered for each use of the transit system. A plurality of transit system fees associated with the same identification number from use of the financial transaction instrument is aggregated, and payment for the aggregated transit system fees is requested from a transaction account associated with the financial transaction instrument. | 08-19-2010 |
20100241569 | METHOD AND SYSTEM FOR MICROPAYMENT TRANSACTIONS - A micropayment system and method is presented for a payor U to establish payment to payee M for a transaction T, which typically has a very low value T | 09-23-2010 |
20100280955 | SYSTEMS AND METHODS FOR VERIFYING IDENTITY - Systems and methods of verifying identity through the use of a plurality of identifying devices is provided. The identity information may be acquired electronically from a plurality of identity devices, which may include credit cards, cell phones, or other personal items fitted with wireless communicators such as RFID tags, for example. In various embodiments, the transaction may be approved or denied based on a number of factors, including the number identity devices, the types of identity information provided by the identity devices, and the level of security specified for the requested transaction. | 11-04-2010 |
20100280956 | SYSTEMS AND METHODS FOR CONDUCTING COMMERCE IN A VEHICLE - A system for a vehicle and for conducting a transaction with a remote system includes a circuit configured to wirelessly obtain data from a payment mechanism brought into the vehicle and to wirelessly transmit the data to the remote system. | 11-04-2010 |
20100293098 | PROCESS FOR CARRYING OUT A TRANSACTION BETWEEN A PAYMENT MODULE AND A SECURITY MODULE - This invention relates to a process for carrying out a transaction between a payment module and a security module connected to a user's unit, this process being characterized in that it comprises the following steps: entering an identifier representative of the transaction to be carried out by means of an input device; generating by the user's unit, a control message containing at least a representative code of said transaction and an identifier of the security module requiring the transaction; sending said control message to said payment module (PP); verifying in said payment module whether it is entitled to carry out the desired transaction; if the payment module is entitled to carry out this transaction, execution of the transaction, storage of the result of the transaction in said payment module and generation by the payment module, of a receipt relating to the desired transaction and to the related security module; sending said receipt to a management centre; sending an unlocking code to the security module (SC) by the management centre; registering the transaction in said security module. | 11-18-2010 |
20100332398 | PERSONAL IDENTIFICATION NUMBER DISTRIBUTION DEVICE AND METHOD - The method of distributing a personal identification number to a user of a financial instrument associated with the personal code includes: a step of sending to a user, via a first channel, a request code associated with the financial instrument; a step of receiving the request code via a second channel; a step of matching the request code with one personal code; and a step of sending the matched personal code via a third channel to the user. In particular embodiments, the financial instrument is sent to a user via the first channel together with the corresponding request code. In particular embodiments, the step of matching the request code with one personal code includes a step of checking the user mobile phone number and the method further includes a step of decrypting the personal code using the request code as a decryption key. | 12-30-2010 |
20110004556 | System and method of electronic information delivery - A system and method for web browser based, secure or authenticated electronic delivery of information, wherein the security or authentication is provided by a means of a public key cryptography encryption method. The system can be used as a web-based blind bidding method, wherein software is located and operated on a central server and within the end user's web browser. Thus, no software is installed onto the end user's computer. In addition, the bidding system uses two-way PKC encryption technology or symmetric encryption technology to sign and seal the bid data submitted by each bidder, said encryption technology being completely browser based. | 01-06-2011 |
20110099112 | APPARATUS AND METHOD FOR CONDUCTING SECURING FINANCIAL TRANSACTIONS - A system and method are disclosed for conducting secure electronic transactions using dual-authentications. A secure server stores security information for a plurality of users and authorizes transactions being conducted by these users. A user computer system having a trusted platform module is used for storing security information relating to at least one user account. Protected environments are created to facilitate secure connections based on at least the security information stored in the trusted platform module. Transactions between the user/electronic merchants and between the user/secure server are conducted within protected environments. When a user conducts an electronic transaction with an electronic merchant, the transaction is authenticated by the secure server before can be completed. | 04-28-2011 |
20110106709 | METHOD AND APPARATUS FOR RECOVERY DURING AUTHENTICATION - Techniques for recovery during authentication include initiating sending a HyperText Transfer Protocol (HTTP) authentication message from user equipment of a user to a merchant node of a merchant. If the user is not authenticated in response to the HTTP authentication message, then sending a Short Message Service (SMS) message from the user equipment to the merchant node is initiated. The SMS message indicates a transaction between the user and the merchant. In some embodiments, techniques include changing an access point to a network until an access point utilized is on a list of acceptable access points, in response to a buy response message that indicates a transaction between a merchant and a user. A hypertext transfer protocol authentication message is sent through the access point that is on the list of acceptable access points | 05-05-2011 |
20110125651 | SYSTEM AND METHOD FOR ADMINISTERING LIFE INSURANCE POLICIES ISSUED PRIOR TO UNDERWRITING - A computer system for administering applications for life insurance has a processor and a memory storage device in communication with the processor. The processor is configured to receive data indicative of an application and an initial premium payment from a proposed insured for life insurance; based on the received data, determine whether the proposed insured is uninsurable; responsive to a determination that the proposed insured is not uninsurable, generate an output signal having data indicative of a decision to respond to the application by issuing a policy and commencing a comprehensive underwriting process; receive data indicative of a result of the comprehensive underwriting process; based on the result of the comprehensive underwriting process, determine a rating of the proposed insured; and, based on the rating, provide an output signal indicative of a same or changed premium for the policy. | 05-26-2011 |
20110125652 | Issuing machine and issuing system for public-offering a financing instrument on-line - An issuing system for issuing unmodifiable and/or unforgeable hardcopy documents or securities includes a server and a plurality of issuing machines connected to the server via a network. Each of the issuing machines receives an ID recording medium provided by a potential purchaser, retrieves an identification recorded in the received ID recording medium, requests the potential purchaser to input a request for a transaction of the security or financing instrument, processes the requested transaction, and prints out on demand a hardcopy of the security or financing instrument as purchased by the potential purchaser and a checksum thereon. A method for forming a new market with the issuing system embodies preparing the financing instrument, public-offering the financing instrument, delivering to the purchaser a financial disclosure, requesting the purchaser to acknowledge receipt and review of the financial disclosure, confirming acknowledgement of the financial disclosure from the purchaser; and processing the requested transaction by retrieving information via the network to the server. | 05-26-2011 |
20110167004 | ELECTRONIC SIGNATURE SECURITY SYSTEM - One embodiment of the invention enhances the security of electronic signatures during transmission. A peripheral device, which may be located remotely and separate from a host processing system, captures the signature. The peripheral device then binds the signature to the particular transaction record and transmits it to the host processing system. The host processing system validates or confirms the received signature before accepting the transaction. Binding the signature and record data together at the point-of-use reduces the likelihood that someone may be able to hack into the transmission medium, encrypted or not, and obtain the raw signature data. By binding or associating the signature and transaction record data together at the point-of-use, each transaction has a unique key, further foiling attempts at hacking. In various implementations, rather than associating the whole signature with the transaction record data, signature sample points or segments are encrypted with transaction record data. | 07-07-2011 |
20110173123 | System and Method for Managing Issuance of Financial Accounts - A system for managing issuance of a corporate meeting account for use in making purchases related to a meeting. The system comprises a communication interface adapted to communicate with a client computer executing an event management software and with a computer from each issuer, a processor coupled to the communication interface, and a management module executable by the processor. The management module receives, through the communication channel, a request to issue a financial account related to the meeting from the event management software. The request includes an issuer identifier and meeting account parameters. The management module generates an account issuance message and transmits the message to a computer of the issuer identified by the issuer identifier. This way, the process of opening a financial account associated with a meeting event is automatically done without having to manually contact the issuer. | 07-14-2011 |
20110184869 | METHOD OF MANAGING FRANCHISES USING CREDIT-CARD PAYMENT SYSTEM - A method of managing franchises using a credit-card payment system is provided. The method includes (a) inputting a goods selection or service use statement of a customer at a franchise to a franchise client to calculate an estimated payment amount, inputting member information of the customer to the franchise client, and transmitting the member information to a customer information server of a head office to request member authentication; (b) receiving, by the customer information server, a member authentication request signal for the customer, comparing the member authentication request signal with previously stored member information of the customer to perform authentication processing, and transmitting the result of authentication processing to the franchise client; (c) inputting credit-card payment information for the estimated payment amount to the franchise client, requesting a card company for payment approval, and receiving approval information; (d) outputting selection items for a satisfaction survey for service provided by the franchise through a sign pad connected to the franchise client; (e) when customer response data for the survey selection items is received from the sign pad, analyzing and statistically processing customer satisfaction evaluation information for the franchise according to the selection items, and storing the resultant customer satisfaction evaluation information in a database of the customer information server; and (f) switching the sign pad to a screen for obtaining a digital signature. | 07-28-2011 |
20110191247 | AUTHENTICATION FRAMEWORK EXTENSION TO VERIFY IDENTIFICATION INFORMATION - Systems and methods for authenticating parties involved in a transaction are disclosed. Some embodiments of the disclosure are directed to systems and methods for authenticating various identification attributes of a participant in a transaction. The attributes can include items such as the participant's name, address, social security number, date of birth, or any other identifying attributes. In some embodiments, all participants in a transaction may have identification information authenticated. The 3-D Secure protocol and framework is extended and enhanced to provide the ability to authenticate the identification details of participants in transactions. | 08-04-2011 |
20110196796 | PROCESS OF SELLING IN ELECTRONIC SHOP ACCESSIBLE FROM THE MOBILE COMMUNICATION DEVICE - The process encompasses the communication between trade system accessible over GUI of the mobile communication device ( | 08-11-2011 |
20110231318 | PAY AT PUMP ENCRYPTION DEVICE - Embodiments of the present invention are drawn to systems and methods for securing information using cryptographically keyed units. Specifically, in one embodiment of the present invention, a system is provided for securing information that uses two cryptographically keyed units to encrypt information flowing between a fuel pump device and a remote device. Thus, even if the information is intercepted, it could not be used to perpetrate fraud. | 09-22-2011 |
20110246369 | EVENT ACCESS WITH DATA FIELD ENCRYPTION FOR VALIDATION AND ACCESS CONTROL - The utility of a portable consumer device is extended by allowing account holders the ability to gain entry into access-controlled venues (e.g., baseball or soccer game, cinema, public transit) using a portable consumer device that is associated with an account that was used to purchase the admission or tickets to the event at the access-controlled venue. Techniques disclosed allow cardholder authentication in a non-payment setting that enables cardholders access to a location or a specific event. A first validation cryptogram is generated in the purchase cycle and is stored. A second validation cryptogram is generated in the validation cycle at the venue. If the second validation cryptogram matches the first validation cryptogram, the consumer is granted access. Validation cryptograms may be based on input data that is specific to the payment card holder (e.g., primary account number), specific to the ticket selling merchant (e.g., merchant identifier), specific to the event (e.g., event identifier, date/time, location, etc.), and/or specific to the transaction (e.g., authorization code from a payment network). Based on the input data, validation cryptograms may be generated using encryption, hashing, a combination of encryption and hashing, and/or other operations on the input data. | 10-06-2011 |
20110246370 | FACILITATING TRANSACTIONS USING UNSUPPORTED TRANSACTION IDENTIFIER TYPES - Facilitating transactions using unsupported transaction identifier types entails receiving a unique transaction indicator having a transaction indicator type, and an indication that a corresponding transaction is to be carried out with a device that does not adequately support the transaction indicator type, and sending information to the device to allow the corresponding transaction to be completed. In one example, an encoded version of the unique transaction indicator is prepared by dividing an image constituting the unique transaction indicator into a plurality of sub-areas, and representing each of the sub-areas using the characters, which respectively represent the content of each sub-area. | 10-06-2011 |
20110246371 | ENCODING OF A BANK TRANSFER - Process for encoding and/or decoding of the contents of data fields of a form, the contents of several data fields being combined into a first character chain, this first character chain being encoded in the corresponding number of bits into a corresponding first bit code, and this first bit code by means of second encoding, especially using 6 bits per character, being converted into a second character chain, this second character chain conversely being decodable/decoded into the contents of the data fields. | 10-06-2011 |
20110270762 | Secure Data Transfer From a Vending Device to Portable Data Storage Devices - Techniques for transferring secured data from a vending device to a portable data storage device are described herein. The vending device receives a request from a user of the portable data storage device for digital contents to be stored on the portable data storage device and requests for a payment for the requested digital contents to be paid by the user. The vending device locates a first portable storage identification (PSID) parameter unique to the portable data storage device, and then generates a rights object including a second PSID parameter that is equal to the first PSID parameter to prevent the digital contents from being accessed at a data storage medium other than the portable data storage device. It is to be appreciated some or all of the above processing, such as location or generation of parameters, can be completed by a back-end device separate from the vending device. | 11-03-2011 |
20110295752 | PRACTICAL SECRECY-PRESERVING, VERIFIABLY CORRECT AND TRUSTWORTHY AUCTIONS - A system and method for conducting verifiably correct auctions that preserves the secrecy of the bids while providing for verifiable correctness and trustworthiness of the auction is disclosed. Some of the elements of the method and apparatus are that the auction operator accepts all bids submitted and follows the published rules of the auction. In one embodiment, the bids are maintained secret from the auctioneer and all bidders until the auction closes and no bidder is able to change or repudiate her bid. In another embodiment, the auction operator computes the auction results and publishes proofs of the results' correctness. In yet another embodiment, any party can check these proofs of correctness via publicly verifiable to computations on encrypted bids. | 12-01-2011 |
20110313930 | DYNAMICALLY ADAPTIVE POLICY MANAGEMENT FOR SECURING MOBILE FINANCIAL TRANSACTIONS - A system for securing a mobile financial transaction using an adaptive security policy is provided by presenting, via an external terminal, an input request associated with a vertex of the security policy. User input is received via the external terminal in response to the input request. A rule associated with the vertex is retrieved from a database. An edge is selected from a plurality of edges associated with the vertex according to the retrieved rule. A communication session of the external terminal is routed to a subsequent vertex via the selected edge. | 12-22-2011 |
20120036075 | DETERMINING MOBILE ACCOUNT TO APPLY MARKETPLACE CHARGES - Identifying a mobile operator account associated with a user to apply charges incurred by the user at a mobile marketplace service. The mobile operator provides an account identifier for the account to a billing token service associated with the mobile marketplace service. The billing token service creates a billing token including the account identifier, and provides the billing token to the user. When subsequently ordering from the mobile marketplace service, the user sends order requests with the billing token to the mobile marketplace service. The mobile marketplace service extracts the account identifier from the billing token and provides the order requests and the extracted account identifier to a mobile operator billing service. The mobile operator billing service applies a charge to the mobile operator account identified by the account identifier. Based on a charge status from the mobile operator billing service (e.g., a successful or unsuccessful charge), the mobile marketplace service allows or denies access by the user to an item identified in the order request. | 02-09-2012 |
20120059762 | Dynamic Card Verification Value - As described herein, a card services provider dynamically generates a card verification value (CVV) for a transaction card and sends the dynamically-generated CVV to a cardholder. The card services provider generates the dynamically-generated CVV such that the dynamically-generated CVV is substantially unpredictable based on other dynamically-generated CVVs for the transaction card. The dynamically-generated CVV is only valid for a limited period of time and/or for a limited number of economic transactions. The cardholder uses the dynamically-generated CVV as part of an economic transaction with a merchant. Because the dynamically-generated CVV is only valid for a limited number of economic transactions and/or for a limited period of time, it may be difficult for a thief to repeatedly use the transaction card to make economic transactions. | 03-08-2012 |
20120072353 | ENHANCED SYSTEM AND METHOD FOR MULTIPATH CONTACTLESS TRANSACTIONS - A system for multipath contactless transaction processing, comprising a networked server comprising a processing unit, a billing entity based on a first networked computing device comprising a processing unit and a video screen, the video screen at least sometimes viewable by a purchaser interacting with the point-of-sale processing system. According to the system, during a transaction, a graphical indicia is displayed on the video screen in a form suitable for photographing or scanning by a payment entity mobile device; and wherein, said indicia is being replaced each time a predetermined time period has elapsed, these replacements occurring regularly until the transaction is completed. | 03-22-2012 |
20120078798 | SYSTEMS AND METHODS FOR TRANSMITTING FINANCIAL ACCOUNT INFORMATION - Described herein are methods and systems for securely transmitting information, including financial account information. An irreversibly encrypted account number can be transmitted to a processing party as part of a transmission packet. The processing party can extract other information from the transmission packet to determine one or more registered account numbers that may match the irreversibly encrypted account number. Using the same encryption algorithm used to create the transmission packet, the processing party can create a verification packet by encrypting the one or more registered account numbers and determine if the verification packet matches the transmission packet. As a result, financial account information can be transmitted in such a way that it cannot be intercepted and then used to perform an unauthorized transaction. | 03-29-2012 |
20120084210 | MOBILE DEVICE PAYMENT SYSTEM - Technology is provided for using a mobile device as part of a payment system. The mobile device utilizes an accessory with a security feature based on its connection state to the mobile device. When the accessory detects disconnection, the accessory deletes user account information on the accessory. When in a valid connection state, the accessory transmits a user payment service account identification and an accessory identification to a transceiver of a merchant computer system to initiate a transaction. A payment service system eventually receives the information transmitted by the accessory, and contacts the mobile device associated with the account for transaction approval in one example. Thus, the user initiates the transaction at his/her mobile device using the connected mobile device accessory, and approves the transaction on his/her mobile device. In other examples, the user can send approval in a transmission to the merchant system or set up other pre-authorization criteria. | 04-05-2012 |
20120084211 | SYSTEM AND METHOD FOR A SECURE TRANSACTION MODULE - A secure electronic payment transaction system includes a Secure Transaction Module (STM) and a host device. The STM includes hardware and software components that meet the security requirements of the payment card industry and provide secure payment transactions utilizing banking cards. The host device includes a communication modem for connecting to financial institutions via a network connection. The STM connects to the host device via an interface and communicates with the financial institutions via the host device's communication modem. The STM is self-sufficient and can be connected to any host device over any interface. | 04-05-2012 |
20120109826 | TECHNIQUES FOR CONDUCTING SINGLE OR LIMITED USE PURCHASES VIA A MOBILE DEVICE - A customer uses a mobile device to acquire a mobile app thereon. The mobile device is configured by a cloud-based service to escrow one or more card numbers mapped by a financial facility to the customer's primary account's number. Further security limitations can be configured into the mobile app by the cloud-based service. Subsequently, the customers uses the mobile app at a point-of-sale location to access one or more of the escrowed card numbers to make purchases; these purchases can be made while the mobile device lacks any connectivity to a network. | 05-03-2012 |
20120109827 | Methods, Devices and Computer Program Products for Voucher Access Code Creation and Management - Methods, devices and computer program products are provided that provide refills for pre-paid subscriptions. A voucher activation code is received for a subscriber account. The voucher activation code is processed to obtain a voucher serial number, where the processing includes performance of a decryption operation. The voucher serial number is used to identify a voucher for use in updating the subscriber account. | 05-03-2012 |
20120143767 | Secure Distributed Single Action Payment System - Methods and systems for enabling and performing secured, single action payments from a mobile device are disclosed. One method includes receiving user credentials at an application installed on a mobile device, and transmitting the user credentials from the mobile device to a server alongside a device identifier. The method includes receiving data at least partially defining encrypted personal payment information and saving the encrypted personal payment information in a memory of the mobile device in association with the application. At least prior to receiving a user request to make a payment via the application, the mobile device lacks a decryption key capable of decrypting the encrypted personal payment information. | 06-07-2012 |
20120158593 | SYSTEMS AND METHODS FOR FACILITATING SECURE TRANSACTIONS - Various embodiments are directed to methods for generating proxy account data for a financial account and authorizing payment from an account of a customer based on proxy account data. Example methods may comprise selecting a serial number for a first customer and storing an association between the serial number and an account of the first customer. The methods may further comprise encrypting the serial number and consolidating the encrypted serial number with checkable data. An association between the encrypted serial number and the checkable data may be stored and the consolidated encrypted serial number and checkable data may be encrypted to generate proxy account data. | 06-21-2012 |
20120166343 | FUEL DISPENSING PAYMENT SYSTEM FOR SECURE EVALUATION OF CARDHOLDER DATA - A system used in a retail environment for providing end-to-end encryption of payment cardholder data. An input device configured to receive cardholder data is operative to encrypt the cardholder data according to a first encryption method to produce first encrypted cardholder data. A cardholder data handling device is in electronic communication with the input device. A secure evaluation assembly (SEA) is operatively connected to the cardholder data handling device and comprises antitampering control electronics adapted to decrypt the first encrypted cardholder data to produce unencrypted cardholder data. The antitampering control electronics evaluate the unencrypted cardholder data to determine whether the unencrypted cardholder data is payment cardholder data or nonsensitive cardholder data. Finally, if the unencrypted cardholder data is payment cardholder data, the antitampering control electronics of the SEA are adapted to encrypt the unencrypted cardholder data according to a second encryption method to produce second encrypted cardholder data. | 06-28-2012 |
20120191611 | SYSTEMS AND METHODS FOR ENCODED ALIAS BASED TRANSACTIONS - Disclosed is a computer based method for securing a financial transaction. A transaction device does not include any human readable data that can be used to identify the account owner and/or the transaction account. A first code and a second code are combined to determine an alias transaction account code. A transaction account is determined based upon the alias transaction account code. | 07-26-2012 |
20120197805 | METHOD AND APPARATUS FOR CAPTURING FINANCIAL DATA USING A CAMERA-EQUIPPED COMPUTING DEVICE - The disclosed embodiments provide a system that captures financial data using a camera. During operation, the system uses the camera to scan a barcode that is associated with a financial document. The system decodes the barcode to generate a financial data set that is then input into a financial application. Allowing data to be input by capturing and decoding a scanned barcode reduces errors and generally improves the user data entry experience. | 08-02-2012 |
20120209777 | Monetary Transaction Control Code System - A payment system is provided having an internet interface. In one embodiment, the payment system issues instruments having control codes. The system may issue a first portion of the control code, and retain a second portion of the control code for later issuance. Such later issuance activates the instrument. Some embodiments have a role-based security access scheme. For example, one embodiment provides a security verification score to be used in assigning user permissions on the payment system. Customer service representatives having different security permissions complete different portions of the security scoring and permission assignment process. Some embodiments have automated processing of security verification items submitted by users. | 08-16-2012 |
20120239577 | Systems and methods for performing person-to-person transactions using active authentication - In some embodiments, a method of performing a person-to-person financial transaction includes receiving an active authentication transaction key at a mobile financial transaction instrument of a transferor from a financial institution, storing the active authentication transaction key in a non-transient machine-readable storage medium of the mobile financial transaction instrument of the transferor, and transferring the active authentication transaction key to a mobile financial transaction instrument of a transferee for completion of the person-to-person financial transaction using wireless transmission. | 09-20-2012 |
20120246078 | METHOD FOR MAKING SECURE TRANSACTIONS - The invention concerns a method for carrying out a transaction comprising prior steps of identifying the card by reading its number and authenticating the bearer optionally by writing in the secret code using a keyboard. The invention is characterised in that the secret code and/or the card number, comprise(s) in a specific position at least a character modified at each transaction. The modified character(s) (n) of the secret code and/or the card is/are modified in accordance with at least a character of a predetermined parameter. | 09-27-2012 |
20120254041 | ONE-TIME CREDIT CARD NUMBERS - Various technologies related to one-time credit card numbers are presented. One-time credit card numbers can originate from a customer device and be independently generated by the customer device without online communication with an issuer. Signed transaction details can also be sent, providing non-repudiation of the purchase transaction. Merchant infrastructure need not be changed to accommodate the one-time credit card numbers. The technologies can be particularly resilient to replay, forgery, man-in-the-middle, and guessing attacks for credit card number generation or other usage by an attacker. | 10-04-2012 |
20120284193 | SYSTEM AND METHOD FOR SECURE COMMUNICATION FOR CASHLESS TRANSACTIONS - Embodiments of the present invention provide a system and method for an access point providing client to point-of-sale communication over a network, comprising: receiving credentials from the point-of-sale; sending at least one beacon message; receiving a probe request from a client; sending a probe response to the client; authenticating a connection with the client: exchanging capabilities with the client; performing a security handshake with the client; assigning at least one dynamic IP address to the client; and establishing an https session between the client and the point-of-sale over the network. | 11-08-2012 |
20120330843 | TRANSPARENTLY SECURING DATA FOR TRANSMISSION ON FINANCIAL NETWORKS - Systems and methods for performing financial transactions are provided. In one embodiment, the invention provides a method for processing token data for a bank card transaction, the method includes: receiving a string of first token data from a token at a token reader; modifying the first token data and generating second token data, the second token data including modified token data; performing a modulo arithmetic operation on the second token data and determining a mod | 12-27-2012 |
20130054468 | SYSTEM AND METHOD FOR CONDUCTING FINANCIAL TRANSACTIONS - Systems and method of the present invention include a comprehensive system architecture that enables access to Non-bank financial institutions (NFBIs) and banks through point-of-sale devices and mobile telephones, for example. The present invention involves use of a modified ISO 8583 standard to allow users to interface with a front end processing system directly from non-traditional devices. The present invention also allows mobile banking with the NBFI through use of an application residing in a user's mobile telephone, which allows the encapsulation of user information as XML, for example, and the transmission of those over http while complying with the ISO 8583 standard, and further allowing encryption of certain user data, without having to resort to access to mobile banking website. In one aspect of the invention, a POS application may run on top of PCI to enable users to make purchases using funds pre-deposited in an NBFI account. | 02-28-2013 |
20130103591 | AUTHENTICATION - The user's SIM 20 is adapted to store a seed for generating an authentication code which is usable to authenticate a transaction. The mobile telecommunications device 1 has a processor including means operable to obtain the seed from the SIM, to calculate the authentication code and to generate a transaction message for enabling the transaction with the entity, the transaction message including the authentication code. | 04-25-2013 |
20130132281 | COMPUTER-IMPLEMENTED METHOD FOR CAPTURING DATA USING PROVIDED INSTRUCTIONS - A computer-implemented method for capturing data including sending a set of select processing instructions for capture of a set of select data to a first party computer from an instruction provider computer; combining a set of non-select processing instructions for capture of a set of non-select data with the set of select processing instructions into a set of data requests, where the combining is performed by the first party computer; sending the set of data requests from the first party computer to an end user computer; processing the set of data requests on the end user computer according to the set of select processing instructions and the set of non-select processing instructions; sending the set of select data from the end user computer to a second party computer; and, sending the set of non-select data from the end user computer to the first party computer. | 05-23-2013 |
20130132282 | APPARATUS AND METHODS FOR PAYMENT TRANSACTIONS USING NEAR FIELD COMMUNICATION - In one embodiment, the mobile device includes an NFC tag for near field communication. The NFC tag may include a first storage device and a second storage device. Personal data is stored on the first storage device, which is not accessible by a NFC reader device. Prior to a transaction, the personal data is transmitted from the first storage device to the second storage device, where the data is readable or accessible by the reader device. After transmission of the data to the reader device, the data on the second storage is erased. In this respect, the data is not available for eavesdropping by an unauthorized reader device. In one embodiment, the data remains stored in the first storage device and available for future use. In another embodiment, the data comprises financial product data. | 05-23-2013 |
20130166455 | CREATING AND USING DIGITAL CURRENCY - Among other things, a physical device carries value and can be physically delivered in a transaction. The physical device includes a representation of the value carried by the physical device. The representation is usable to transfer the value from the physical device to a digital domain. A security feature can change from a state indicating that the value carried by the physical device has not been compromised to a state indicating that the value carried by the physical device may have been compromised. The change in state is detectable, the representation of the value carried by the physical device being inaccessible except in a manner that causes the security feature to change state. | 06-27-2013 |
20130179350 | ELECTRONIC SIGNATURE SECURITY ALGORITHMS - Technologies are generally described for security algorithm methods in authorizing and linking devices associated with a customer. A first device can be linked to a customer account. Additional devices can be linked to the customer account. Those devices can be authenticated to perform banking operations using dual factor authentication wherein a customer's login information is a first factor and the customer using a previously authenticated device is a second factor. By using additional methods of authentication, transactions can be done more reliably and securely. | 07-11-2013 |
20130212024 | TOKENIZATION IN DISTRIBUTED PAYMENT ENVIRONMENTS - Data can be protected in mobile and payment environments through various tokenization operations. A mobile device can tokenize communication data based on device information and session information associated with the mobile device. A payment terminal can tokenize payment information received at the payment terminal during a transaction based on transaction information associated with the transaction. Payment data tokenized first a first set of token tables and according to a first set of tokenization parameters by a first payment entity can be detokenized or re-tokenized with a second set of token tables and according to a second set of tokenization parameters. Payment information can be tokenized and sent to a mobile device as a token card based on one or more selected use rules, and a user can request a transaction based on the token card. The transaction can be authorized if the transaction satisfies the selected use rules. | 08-15-2013 |
20130246279 | EXTERNAL LOG STORAGE IN AN ASSET STORAGE AND TRANSFER SYSTEM - A secure asset storage media. A secure module includes a memory storing at least a DuplicateCounter and a HashLog, the HashLog comprising a respective hash of each value transfer message sent or received by the secure asset storage media, the DuplicateCounter storing a count of duplicate hash values in the HashLog. A non-volatile memory is disposed external to the secure module. The non-volatile memory stores a transaction log comprising a copy of each value transfer message sent or received by the secure asset storage media and its respective hash value. A controller is configured to control communication between the secure module and the non-volatile memory to record information of a received value transfer message in the secure module and the transaction log. | 09-19-2013 |
20130268443 | SYSTEM AND METHOD FOR A SECURE TRANSACTION MODULE - A secure electronic payment transaction system includes a Secure Transaction Module (STM) and a host device. The STM includes hardware and software components that meet the security requirements of the payment card industry and provide secure payment transactions utilizing banking cards. The host device includes a communication modem for connecting to financial institutions via a network connection. The STM connects to the host device via an interface and communicates with the financial institutions via the host device's communication modem. The STM is self-sufficient and can be connected to any host device over any interface. | 10-10-2013 |
20130275307 | SYSTEMS, METHODS, AND COMPUTER READABLE MEDIA FOR CONDUCTING A TRANSACTION USING CLOUD BASED CREDENTIALS - A method for conducting an electronic transaction that includes initiating an electronic transaction between a mobile device and a POS reader device and applying at least a user identifier that is associated with a user of the mobile device and shared secret data as inputs to a cryptographic function in the mobile device. The method further includes inserting the output of the cryptographic function into legacy transaction formatted data, wirelessly providing the legacy transaction formatted data to the POS reader device via the electronic transaction, forwarding the legacy transaction formatted data to the issuer server, and processing, at the issuer server, the legacy transaction formatted data to verify the user identifier and request authorization for the electronic transaction. The method also includes sending a notification message to the POS reader device that indicates that the electronic transaction is authorized and conducting the electronic transaction upon receipt of the notification message. | 10-17-2013 |
20130332366 | Mobile Device Software Radio for Securely Passing Financial Information between a Customer and a Financial Services Firm - A computing device having a software radio (e.g., a mobile device where the software radio is substantially defined in software) transmits first information related to a financial transaction over the first radio network to the financial institution, and transmits second information related to the financial transaction over the second radio network to the financial institution. A server of the financial institution receives the first information and the second information to carry out the financial transaction. | 12-12-2013 |
20140040144 | Systems and Methods for Multi-Merchant Tokenization - Systems and methods for multi-merchant tokenization may include receiving a transaction from a point of sale terminal of a merchant, validating the merchant ID against merchant logs, and generating a token for the transaction. The token includes a primary account number, expiration, and a group ID. Additionally, the system provides the primary account number to a payment system and receives a response back. The response is then output back to the merchant along with the token. In subsequent transactions, the system may receive the token from a one point of sale terminal of the merchant. The system validates the merchant ID against merchant logs and ensures the merchant is configured for tokenization. The token is decrypted and the group ID is compared to the merchant ID in the merchant logs. When they match, the primary account number is provided to the payment system for approval. | 02-06-2014 |
20140040145 | SYSTEMS AND METHODS FOR DISTRIBUTED ENHANCED PAYMENT PROCESSING - A distributed enhanced payment processing system includes a merchant point of sale (POS) terminal system and a remote payment management system. The POS terminal system initiates a transaction that includes receiving a payment amount, a purchaser account identifier, a virtual electronic payment indicator, and a merchant ID via a payment client. Subsequently, the POS terminal system outputs the transaction to the remote payment management system which generates a token for the transaction. The payment management system then provides the purchaser account identifier, a merchant account identifier, and the payment amount to a remote virtual electronic payment (VEP) entity system. Upon receiving a VEP entity system response, the payment management system outputs the response and token to the POS terminal system. | 02-06-2014 |
20140067687 | CLONE DEFENCE SYSTEM FOR SECURE MOBILE PAYMENT - A clone attack on the security of the mobile payment system occurs when a transaction is conducted from more than one mobile communication device for a user account, or when the data communication within the transaction is transmitted from more than one mobile communication device or from a mobile communication device other than the mobile communication device that was registered initially. The presently claimed clone defense method and system employ a first counter in each data communication message, a second counter at the sending end, and a third counter at the receiving end. By incrementing the counters when sending and receiving the data communication messages and matching the counters at the receiving end, clone attacks can be detected. | 03-06-2014 |
20140074719 | SYSTEM AND METHOD FOR COMPUTERIZED NEGOTIATIONS BASED ON CODED INTEGRITY - An accelerated transparent authenticated Data Exchange system wherein the chronology of alternating senders' and receivers' messages are authenticated typically at each step, with an easy to use provision for resending, in the event of faulty transmission, such that the final message hash value authenticates the negotiation chronologically from first to final message, wherein the final hash value is operative to enable a signature of an entity or entities which binds such entity to the whole data exchange, which signature can be in clear text, encoded, and/or encrypted with authentication integrity. The system is useful for managing computerized negotiations including client-initiated computerized negotiations and including computerized financial transactions. | 03-13-2014 |
20140089201 | Modular and embeddable electronic commerce system - A system and method that provides trusted commerce functionality on an untrusted website is disclosed. Content rights owners upload the content to the system. The system generates a piece of HTML code to be copied and pasted into a website. The code generates a commerce widget. The widget allows a buyer to review the content, its description and its price, and to safely execute the purchase. The widget maintains an authenticated session with the buyer or visitor in a way that requires no registration prior to purchase. Upon purchase, the buyer can access the content from the widget itself, and means of logging in if they have already purchased the content. The owners can offer items for sale on their own web properties without having to operate as merchants and without redirecting their visitors to other websites. The buyers can make changes to their identity without losing their purchases. | 03-27-2014 |
20140101054 | SYSTEM AND METHOD OF TRANSMITTING DATA OVER A VOICE CHANNEL - A method for transmitting data over a voice channel by transcoding a bit of the data stream into two bits, and converting each of such two bits into a value of a parameter of a curve of a sound frequency that can be carried on the voice channel. At the receiving end of the voice channel, the values of the parameters of the curve are reconverted into bits, and the pairs of bits are transcoded back into the bit of the data stream. | 04-10-2014 |
20140108260 | SYSTEM AND METHOD FOR TOKEN-BASED PAYMENTS - A system and method for enhanced token-based payments. The system and method including software and hardware to receive, via a network, a request for authorization; create, in response to the request, a dynamic payment packet (DPP) for payment; transmit, via a network, the DPP; receive, via a network, an authorization request, the DPP, and a transaction ID; receive at least one additional data element relating to the customer involved in the transaction and the transaction itself; and transmit, via a network, the transaction ID, an authorization response, and token. | 04-17-2014 |
20140114860 | Systems and Methods for Expedited Automated Merchant Boarding - An expedited automated merchant boarding system in association with a distributed enhanced payment processing system includes a merchant point of sale (POS) terminal system and a remote enhanced payment management system (EPMS). The remote EPMS pre-boards anticipated POS terminal system components and records pre-boarding results information. The POS terminal system initiates merchant boarding by transmitting merchant account information. The remote EPMS receives merchant account information and establishes a merchant account. The POS terminal system utilizes protocol transactions including auto-boarding information to initiate auto-boarding with the remote EPMS. The remote EPMS auto-boards the POS terminal system utilizing received auto-boarding information and recorded pre-boarding results. The remote EPMS turns up selected payment management services for the merchant POS terminal system. The POS terminal system utilizes payment transactions to conduct validation of successful interoperation with the remote EPMS. The remote EPMS enables utilization of selected payment management services by the POS terminal system. | 04-24-2014 |
20140164249 | METHOD AND SYSTEM FOR SECURE AUTHENTICATION AND INFORMATION SHARING AND ANALYSIS - A method for selectively permitting access over a computer network to two or more sets of information that have been assigned different confidentiality levels in which access to information having a lower level of confidentiality requires an authentication process requiring only a UserID and a password, and in which access to information having a higher level of confidentiality requires an authentication process requiring a UserID, a password, and a hard token, but no additional PIN. | 06-12-2014 |
20140172721 | Method for Securing a Transaction - A method, a computer program product, a communication end device and a system for securing a payment transaction, between a communication end device and a server instance. The communication end device includes a processor with an insecure runtime environment and a secure runtime environment. The method includes setting up a first communication channel between the communication end device and the server instance; and sending transaction-relevant data from the communication end device to the server instance via the first communication channel. A second communication channel is set up between the browser application in the insecure runtime environment and a transaction application in the secure runtime environment, and the inputted transaction-relevant data is sent to the transaction application via the second communication channel. The transaction application generates from the received part of the transaction-relevant data a confirmation information item for securing the transaction employed for authorizing the transaction in the server instance. | 06-19-2014 |
20140180929 | Assisting in Bill Split Payment - When a split amount decided by a representative splitting, in a representative terminal, a total amount transmitted from a store terminal is notified from each member terminal to a credit company server as a payment amount, the credit company server holds information for payment settlement, and transmits payment permission information including encrypted information generated by encrypting the information for payment settlement, to each member terminal. Each member terminal transmits payment permission information of the same contents as the payment permission information to the representative terminal. The representative terminal transmits payment permission information obtained by concatenating the payment permission information, to the store terminal. | 06-26-2014 |
20140188732 | SECURE PROVISIONING MANIFEST FOR CONTROLLING PERIPHERALS ATTACHED TO A COMPUTER - There is provided a secure provisioning manifest used to authenticate and communicate with peripherals attached to a computer. A secure I/O module, that is separate from an operating system and transaction software executed by a processor of the computer, uses the secure provisioning manifest to establish a secure encrypted session for communicating with each peripheral attached to the computer when a peripheral is authenticated and able to establish a secure encrypted session. | 07-03-2014 |
20140188733 | AUTOMATIC WIRELESS CONSUMER CHECKINS - Computing systems and methods for facilitating consumer transactions in retail and other establishments include communication interfaces adapted to couple a computing system to a plurality of third party phones or other mobile electronic devices, storage components adapted to store user information, participating merchant information, or any combination thereof, and processors in communication with the communication interfaces and storage components. The processors are adapted to facilitate the automatic wireless checkins of third party users of the third party phones or other mobile electronic devices at participating merchants. Such automatic wireless checkins take place when the third party phones or mobile electronic devices are simply present at the participating merchants, without any affirmative activity by the users at the participating merchants. | 07-03-2014 |
20140201084 | APPARATUS CONFIGURED TO FACILITATE SECURE FINANCIAL TRANSACTIONS - An aspect provides an apparatus configured to facilitate secure financial transactions. | 07-17-2014 |
20140201085 | METHODS AND SYSTEMS FOR CONTACTLESS PAYMENTS AT A MERCHANT - A coordination server of a contactless payment system may receive a total bill of purchases for a customer from a merchant point-of-sale terminal, associate the total bill of purchases with a unique identifier of an RFID tag of a check presenter, and receive notification that payment of the total bill of purchases is authorized. The coordination server may receive the unique identifier and payment information from a contactless-enabled device, and transmit the payment information and the total bill to the merchant point-of-sale terminal for transmittal to a merchant acquirer for completion of the transaction under business as usual standards. In one embodiment, the coordination server transmits the payment information and the total bill to a merchant acquirer, which then routes the payment request to an appropriate payment network. In another embodiment, the coordination server transmits the payment information and the total bill directly to the appropriate payment network. | 07-17-2014 |
20140214686 | APPLICATION STORE SYSTEM AND METHOD FOR IMPLEMENTING IN-APPLICATION PURCHASE FUNCTION - The disclosure provides an application store system and a method for implementing an IAP function. The system includes: a developer community functional entity and an online application store functional entity, and further includes a configuration module, configured to accept an operation of configuring, for an application, one or more purchasable items corresponding to the application and information corresponding to the one or more purchasable items, wherein the application is uploaded through the developer community functional entity; and an IAP processing module, configured to receive a purchase request from the application, and perform fee deduction according to information corresponding to a one or more purchasable items that the purchase request requests to purchase. Through the above solution, the cost of developing and maintaining an application having an in-program purchase function by a common developer is reduced. | 07-31-2014 |
20140236834 | METHODS, USES AND SYSTEM FOR TRANSMITTING, CONVERTING, AND DISPLAYING A CHALLENGE TOKEN AS AN OPTICALLY READABLE CODE - The present invention includes methods for completing the secure transfer of information, such as purchase transactions, money transfers, identification transfers, loyalty point transfers and coupon transfers. The methods comprise generating, transmitting and displaying a digital challenge token as an optically readable code, to be scanned and answered. Once the answer is processed, the information is transferred. | 08-21-2014 |
20140236835 | SYSTEM AND METHOD FOR APPLICATION SECURITY - A secured hardware token includes an embedded processor, secured persistent storage, and read only memory. The storage includes functionality to store data that includes an account master secret for an account at a financial institution. The memory includes a security application, which causes the processor to receive, from a financial institution application executing on a mobile device, a call for an n-bit result. The security application further causes the processor to obtain, from the secured persistent storage, the account master secret, construct the n-bit result specific to the call using the account master secret and the n-bit generator input as input to an n-bit generator in the security application, and return the n-bit result to the financial institution application. The financial institution application provides the n-bit result to the financial institution, which completes a financial transaction when the n-bit result is verified using a copy of the account master secret. | 08-21-2014 |
20140244513 | DATA PROTECTION IN NEAR FIELD COMMUNICATIONS (NFC) TRANSACTIONS - Described herein are architectures, platforms and methods for protecting sensitive data that are utilized during near field communications (NFC) communications or transactions and more particularly, a system on chip (SOC) microcontroller that is configured to control processing of the sensitive data during the NFC transactions is described. The sensitive data may include, but not limited to, personal information, financial information, or business identification numbers. | 08-28-2014 |
20140279551 | Minting and Use of Digital Money - Systems and methods are provided for constructing a digital money from concatenated or otherwise linked bit strings. Several applications of digital coins include (i) means to secure the use of money according to the prevailing understanding between payer and payee, (ii) a method by which a mint entity that mints and redeems digital money collaborates with traders to jointly earn interest, or jointly gamble in the stock market, or other markets, (iii) a method by which a mint entity that mints and redeems digital money collaborates with merchants, their customers, and credit-extending entities (CEE) to allow the CEE to extend credit to selected group of customers, so that these customers can shop with any participating merchant, and (iv) a method for utility consumption on a real-time basis by splitting digital coins at a rate that pays exactly for the utility measure being consumed. | 09-18-2014 |
20140289127 | Secured Online Transactions - A method, apparatus, and computer program for improving security in connection with online transactions are provided. A security application configured to monitor received text messages of a short message service is executed in an apparatus. The security application is arranged to have prioritized access to process the received text messages before other applications executed in the apparatus, to identify from contents of a received text message whether or not the received text message includes a transaction authentication message and, upon detecting that the received text message includes the transaction authentication message, prevent the processing of the transaction authentication message by the other applications and carry out user interfacing related to the transaction authentication message within a secured environment provided by the security application. | 09-25-2014 |
20140289128 | ONLINE POINT REDEMPTION AND DISTRIBUTION SYSTEM AND METHOD - An online point redemption and distribution system and method. The online point redemption and distribution system is used in combination with a cloud computing operating system to allow consumers and stores to do transaction online, every transaction between the consumers and the stores will be recorded as points, and then the points can be redeemed into virtual money and deposited in consumer's account. Therefore, it will enhance consumers' loyalty. The online point redemption and distribution system comprises a website operation platform and an application programming interface module. | 09-25-2014 |
20140316991 | ONLINE PURCHASE PROCESSING SYSTEM AND METHOD - A system and method to use quick response (QR) codes encoded with merchant website t identification codes and session GUID to register a user or code scanner with a merchant server, login the user or code scanner with the merchant server, and complete a purchase of an item or service within a virtual shopping cart of the merchant server. A code scanner can scan a QR code displayed on a device connected to the interne. An application server can receive an identification code from the code scanner and then transmit data indicating form fields to be filled in on a merchant webpage. A user profile can include data regarding the user and a payment instrument. The user profile data can prepopulate the form fields and the form field data can be transmitted to the merchant server to use for logging in the user and completing the purchase. | 10-23-2014 |
20140330725 | METHOD AND SYSTEM FOR ELECTRONIC PURCHASES USING AN INTELLIGENT DATA CARRIER MEDIUM, ELECTRONIC COUPON SYSTEM, AND INTERACTIVE TV INFRASTRUCTUR - A method and a system for electronically transacting a purchase between a purchaser and a merchant are disclosed. The method includes storing accrued incentives on an intelligent data carrier medium via interactive television (DTV/STB) equipment and redeeming a discount or a value corresponding to the accrued incentives present on the data carrier medium when a purchase is made. The electronic purchase system using an electronic network contains a purchaser interactive television (DTV/STB) equipment connected to the electronic network, a fixed intelligent data carrier medium connected to the interactive television (DTV/STB) equipment for service authentication and decryption and a detachable intelligent data carrier medium connected to the interactive television (DTV/STB) equipment. | 11-06-2014 |
20140351143 | METHOD AND SYSTEM FOR SECURING A PAYMENT CARRIED OUT WITH THE AID OF A PAYMENT CARD - This method for securing a payment carried out with the aid of a payment card associated with card identification data and a security cryptogram, is characterized in that it includes a step ( | 11-27-2014 |
20150019438 | APPARATUS AND METHOD FOR A PAYMENT PROCESSING SYSTEM FOR SECURING BANKCARD DATA - Apparatus and method for a payment processing system are described. The payment processing system provides security of and secures storage of bankcard data during storage in the payment processing system by encrypting the bankcard data. | 01-15-2015 |
20150019439 | Systems and Methods Relating to Secure Payment Transactions - Systems and methods are provided for processing a transaction to enable an issuer of a physical transaction device to process a transaction message relating to a digital transaction device, where the digital transaction device is a digitized counterpart of the physical transaction device. In connection therewith, a transaction processing system is configured to receive the transaction message including a digital device data set associated with the digital transaction device; identify a physical device data set that corresponds to the digital device data set from a group of paired physical device data sets and respective digital device data sets; modify the transaction message to include the identified physical device data set to form a modified transaction message; and communicate the modified transaction message to the issuer of the physical transaction device. | 01-15-2015 |
20150026070 | SYSTEMS AND METHODS FOR CORRELATING CARDHOLDER IDENTITY ATTRIBUTES ON A PAYMENT CARD NETWORK TO DETERMINE PAYMENT CARD FRAUD - A method and system for correlating cardholder identity attributes on a payment card interchange network using a computer device coupled to a database are provided. The method includes storing at a central store, personally identifiable information from an issuer for a plurality of payment card cardholders, the personally identifiable information encrypted to prevent payment card transaction data from being associated with the personally identifiable information, receiving, from a merchant, personally identifiable information during a payment card transaction, encrypting the received personally identifiable information, and comparing the encrypted stored personally identifiable information to the encrypted received personally identifiable information to determine a risk of fraud during the payment card transaction. | 01-22-2015 |
20150046335 | PIN ENTRY FOR INTERNET BANKING ON MEDIA DEVICE - Embodiments of the invention disclose a remote control device for operating a media device that can be used to conduct financial transactions. The remote control device includes a user interface to accept user input, and a communication interface to communicate with the media device. The remote control device also includes a hardware security module that is coupled to the user interface and the communication interface. The hardware security module includes a secure processing unit, and a public processing unit that is configured to selectively request the secure processing unit to encrypt user input based on a function that is being performed on the media device. | 02-12-2015 |
20150073994 | PAYMENT PROCESSING SYSTEM, PAYMENT TERMINAL, COMMUNICATION DEVICE, PAYMENT SERVER AND PAYMENT PROCESSING METHOD - Provided is a payment processing system for executing payment processing by transmitting and receiving payment data between a payment terminal and a payment server via a communication device, the payment terminal not including a dedicated network device for communication with the payment server, the payment data including at least payment amount information and service information to which a payment is to be executed. The payment terminal includes a payment data generation section configured to generate first payment data in which the payment amount information is encrypted, and a terminal communication unit configured to transmit the generated first payment data to the communication device by short range communication | 03-12-2015 |
20150081565 | Apparatus and Method for Bringing Offline Data Online While Protecting Consumer Privacy - A method and system for bringing together online and offline advertising uses anonymous links that are associated with consumer data. The anonymous links allow processing without personally identifiable information (PII) in a secure environment. Data is matched using the anonymous links, and further using identifiers that are encrypted for use in connection with individual match distribution partners. The method and system allows a marketer to utilize offline data to precisely target advertisements without the use of PII, and to perform analytics concerning the use of the online advertisements to more precisely determine the effectiveness of multichannel marketing efforts. | 03-19-2015 |
20150100493 | EyeWatch credit card fraud prevention system - A method of iris scanning and proximity sensing, which includes receiving and photographing an iris in the iris scanning mode of the subject computer, laptop, mobile device or tablet, smartphone or i-phone; sensing for the available amount of necessary light and whether the iris is within the desired range to ensure proper acquisition of the sample. The iris is then photographed. The method provides for recognizing the iris utilizing the previously photographed iris image and converting the photographed iris image to an encrypted mathematical value, which will then be stored within the acquiring electronic device such as computer, laptop, smartphone; i-phone; mobile device or tablet, to be compared for future reference against any subject photographed iris. If any subsequently photographed iris matches the encrypted mathematical stored image, access to the device is granted. If the subsequently photographed iris does not match the encrypted mathematical stored image, access is denied. | 04-09-2015 |
20150120568 | ELECTRONIC TRANSACTION METHOD - A method can include transmitting a plurality of encodings to a given computing device in a commercial transaction. The method can also include transmitting information characterizing an entity associated with the given computing device to another computing device in the commercial transaction. The method can further include transmitting a particular encoding of the plurality of encodings to the other computing device in the commercial transaction. | 04-30-2015 |
20150127545 | WIRELESS TRANSACTION MEDIUM HAVING COMBINED MAGNETIC STRIPE AND RADIO FREQUENCY COMMUNICATIONS - A wireless financial transaction instrument, such as a card, has a magnetic stripe, a display, and an on-board power supply, such as a battery, and is usable with a dual capture point of sale terminal. Information is received by such a terminal from the card wirelessly, and also from the magnetic stripe, and the data received contactlessly is preferably used to verify that read from the stripe. The display can display the account number on command, or to display a current balance, or amount of credit remaining, or any combination of these items of information. | 05-07-2015 |
20150134535 | DATA LINK MODULE - An interface module configured to provide codes to be used in determining an availability status of service points, wherein the module receives status data from a secure transaction system and selects a predetermined code or generates a code in accordance with predefined syntax, the code indicative of the availability of the service points and relays the selected code to a retail customer queue management system for determining the availability of a service point. | 05-14-2015 |
20150142665 | GENERATING TRANSACTION IDENTIFIERS - To facilitate conducting a financial transaction via wireless communication between an electronic device and another electronic device, the electronic device determines a unique transaction identifier for the financial transaction based on financial-account information communicated to the other electronic device. The financial-account information specifies a financial account that is used to pay for the financial transaction. Moreover, the unique transaction identifier may be capable of being independently computed by one or more other entities associated with the financial transaction (such as a counterparty in the financial transaction or a payment network that processes payment for the financial transaction) based on the financial-account information communicated by the portable electronic device. The electronic device may also associate receipt information, which is subsequently received from a third party (such as the payment network), with the financial transaction by comparing the determined unique transaction identifier to the computed unique transaction identifier. | 05-21-2015 |
20150302408 | CONDUCTING FUEL DISPENSING TRANSACTIONS - Fuel dispensing transactions may be accomplished by a variety of systems and techniques. A fuel dispensing device may include a payment module, a data entry device, and a customer display. The payment module may receive a first communication from a point of sale device requesting an encrypted response and receive a second communication from the point of sale device requesting an unencrypted response. The module may match the first communication to a first corresponding library entry, match the second communication to a second corresponding library entry, determine a user response based on one of the first corresponding library entry or the second corresponding library entry, where the user response defines one of the encrypted response based on the first corresponding library entry or the unencrypted response based on the second corresponding library entry, and use the corresponding library entry to generate a visual customer display requesting the user response. | 10-22-2015 |
20150310425 | Systems and Methods of Processing Payment Transactions Using One-Time Tokens - Disclosed are exemplary embodiments of systems and methods for processing payment transaction using pseudo-PAN. In an exemplary embodiment, a method generally includes generating an encryption salt, receiving a request from a consumer indicating a possible payment transaction, in response to the request, generating a one-time token, based on the actual payment information and a most recent generated encryption salt, the one-time token having the same format as the payment information, with a routing segment of the one-time token being identical to a routing segment of the payment information, and presenting the one-time token. | 10-29-2015 |
20150310427 | METHOD, APPARATUS, AND SYSTEM FOR GENERATING TRANSACTION-SIGNING ONE-TIME PASSWORD - Disclosed herein are a method, apparatus and system for generating a transaction-signing One-time password. The method includes transmitting a payment request to a payment server using a trusted application running on a client terminal, receiving transaction information in response to the transaction request, and generating a transaction-signing OTP including the transaction information as an input value by using the trusted application. | 10-29-2015 |
20150310553 | PRODUCTS AND PROCESSES FOR UTILIZING ORDER DATA AND RELATED DATA - In an embodiment, an apparatus comprises a processor, and a memory that stores a program. The program, when executed by the processor, directs the processor to perform a method including the following steps: receiving an encrypted query, in which the query indicates at least one security, and at least one price; determining whether the encrypted query corresponds to any order in an encrypted data set that represents orders; outputting a response to the query, in which the response indicates whether the encrypted query corresponds to any order in an encrypted data set that represents orders; receiving order data that represents the orders; and encrypting the order data to yield the encrypted data set that represents orders. | 10-29-2015 |
20150348031 | Switch Server System Interoperable with Mobile Devices Providing Secure Communications - Methods and systems for conducting a secure transaction over a network using one or more gateway servers. The methods include receiving a request from a consumer, sending the request to a merchant, and receiving, from the merchant, a payment order associated with the request. The payment order is received via a merchant programmable user interface. The methods also include confirming the payment order to transform the payment order to a confirmed payment order, sending the confirmed payment order to a user, and receiving, from the user, a payment authorization associated with the confirmed payment order, and the payment authorization being received via a consumer programmable user interface. The payment authorization from the user includes a secure, encrypted, Internet Protocol (IP) message using encryption hashed with public and private key management. The methods also include performing a transaction in accordance with the payment authorization. | 12-03-2015 |
20150356554 | Secure Distributed Single Action Payment System - Methods and systems for enabling and performing secured, single action payments from a mobile device are disclosed. One method includes receiving user credentials at an application installed on a mobile device, and transmitting the user credentials from the mobile device to a server alongside a device identifier. The method includes receiving data at least partially defining encrypted personal payment information and saving the encrypted personal payment information in a memory of the mobile device in association with the application. At least prior to receiving a user request to make a payment via the application, the mobile device lacks a decryption key capable of decrypting the encrypted personal payment information. | 12-10-2015 |
20150356560 | Identification and Verification for Provisioning Mobile Application - Embodiments are directed to the generation of a token associated with a status. The status of the token may affect how the token is treated and the types of restrictions placed on the token. The status of the token may indicate that the token is generated based on verification of secure user data. Alternatively, the status of the token may indicate that the token is generated based on insufficient user data and, as such, restrictions may be imposed on the token. The token requestor may be a mobile application, such as a merchant mobile application provisioned on a user device. In response to a token request from the merchant, the token provider issues tokens with varying status based on a confidence level. The status of the token may be indicated in terms of token assurance level. | 12-10-2015 |
20150363763 | Mobile Information Apparatus That Includes A Secure Element Storing Payment Information And Using A Cryptographic Technique For Implementing Mobile Payment - A mobile information apparatus that includes a secure element for making mobile payments associated with a credit card or bank card, via a near distance radio frequency wireless communication unit, is herein disclosed and enabled. At least part of payment information or a device identification number is stored in the secure element or protected memory of the mobile information apparatus. Data stored in the secure element or protected memory is implemented to be not accessible by the user, but is accessible by a memory controller included in the mobile information apparatus implementing a cryptographic algorithm. To authorize payment, the user enters authentication information that may include a password, or a pin code, or user biometrics; and subsequent to the authentication, the mobile information apparatus transmits encrypted data over a short range radio frequency communication link to a wireless output controller or reader for making payment and transaction processing. | 12-17-2015 |
20150363769 | Cryptocurrency Real-Time Conversion System - A system comprises a memory operable to store a set of conversion rules. The system also comprises a processor communicatively coupled to the memory. The processor is able to receive an electronic request for a cryptocurrency conversion requesting a conversion of a first currency into a second currency, wherein the second currency is a cryptocurrency. The processor is further able to retrieve price data associated with the first and second currencies and determine whether the conversion is optimal. In response to determining the conversion is optimal, the processor determines a plurality of exchange rates associated with converting the first currency into the second currency and determines an optimal exchange rate of the plurality of exchange rates. The processor is further able to initiate, essentially simultaneously as the determination that the conversion is optimal, converting the first currency into the second currency. | 12-17-2015 |
20150371226 | MANAGEMENT OF RELOADABLE CREDENTIALS ON AN ELECTRONIC DEVICE USING AN ONLINE RESOURCE - Systems, methods, and computer-readable media for using an online resource to manage reloadable credentials on an electronic device are provided. In one example embodiment, a method, at an electronic device, includes, inter alia, receiving selection data via an online resource, where the selection data may be indicative of a particular credential applet stored on a secure element of the electronic device, in response to the receiving the selection data, accessing validation data from the particular credential applet on the secure element, transmitting initialization results comprising the accessed validation data to a remote subsystem associated with the online resource, in response to the transmitting, receiving reload data from the remote subsystem, and adjusting a balance of the particular credential applet based on the received reload data. Additional embodiments are also provided. | 12-24-2015 |
20160005041 | METHOD AND SYSTEM FOR MAINTAINING PRIVACY AND COMPLIANCE IN THE USE OF ACCOUNT REISSUANCE DATA - A method for linking payment accounts includes: storing a plurality of account profiles, each profile including data related to a payment account including an account number and account data; encrypting the account number included in each account profile using a method of encryption to obtain an encrypted account number; receiving account linkage data, the data including a plurality of encrypted account identifiers, each identifier being indicated as being linked to another identifier, and each identifier being encrypted using the method of encryption; matching each of the encrypted account identifiers to an encrypted account number; and updating one or more account profiles to indicate a link to another account profile where the encrypted account number included in the profile being updated matches an encrypted account identifier that is indicated as being linked to an encrypted account identifier that matches the encrypted account number included in the other profile. | 01-07-2016 |
20160019535 | METHOD AND SYSTEM FOR MAINTAINING PRIVACY IN SCORING OF CONSUMER SPENDING BEHAVIOR - A method for maintaining consumer privacy in behavioral scoring includes a first computing system and a second computing system. The first computing system disguises consumer characteristics and maps disguised consumer characteristics to unencrypted account identifiers, and then transmits the data to the second computing system. The second computing system encrypts the account identifiers upon receipt, and maps the encrypted account identifiers to anonymous transaction data. The second computing system uses the transaction data to calculate consumer behavioral scores, and then generates a scoring algorithm that uses disguised consumer characteristics to calculate consumer behavior scores based on the calculated consumer behavioral scores and corresponding disguised consumer characteristics. The generated algorithm is then returned to the first computing system, with the second computing system not receiving any unencrypted account identifiers, any undisguised consumer characteristics, or any personally identifiable information. | 01-21-2016 |
20160026990 | POINT OF SALE SYSTEM WITH SECURE AND UNSECURE MODES - A point of sale system has a display for receiving touch inputs, a controller to receive the touch inputs from the display, and a secure controller to receive touch input data from the controller. The system also has a card interface module and a contactless interface module to provide encrypted data to the secure controller. The secure controller can operate in either a secure mode or a non-secure mode. When a non-secure mode is engaged, the secure controller provides the touch input data to a processor. When a secure mode is engaged, the secure controller blocks at least a portion of the touch input data from the processor. | 01-28-2016 |
20160027004 | INFORMATION PROCESSING SYSTEM, INFORMATION PROCESSING APPARATUS, MOBILE TERMINAL APPARATUS, INFORMATION PROCESSING METHOD, AND NON-TRANSITORY COMPUTER READABLE MEDIUM - An information processing system includes a mobile terminal apparatus and an information processing apparatus. The information processing apparatus includes an encryption unit encrypting multiple pieces of data to be transmitted; a data transmission processing unit executing a transmission process to sequentially transmit the pieces of encrypted data to the mobile terminal apparatus in response to a request; a billing unit submitting a bill for each piece of transmitted data after the piece of data is transmitted; and a decryption information transmitting unit transmitting decryption information on decryption of the data for which payment of a charge with electronic money is confirmed to the mobile terminal apparatus. The mobile terminal apparatus includes a data receiving unit receiving the pieces of data; a decryption information receiving unit receiving the decryption information; and a decryption unit decrypting each piece of received data based on the received decryption information. | 01-28-2016 |
20160078429 | ENABLING CARD AND METHOD AND SYSTEM USING THE ENABLING CARD IN A POS - The invention, relates to an enabling card as well as a system and method for completing a financial transaction in a P.O.S. terminal comprising: a processor carried by the enabling card for establishing a connection with a mobile device; receiving secure information from a mobile device and generating a digital signal; a coil carried by the enabling card for generating a magnetic field in response to the digital signal to simulate the swipe of card in the P.O.S. terminal and complete the financial transaction. | 03-17-2016 |
20160078431 | ENCRYPTED AGGREGATED TRANSACTION DATA EXCHANGE WITH TRANSACTION DATA PROVIDER - Aggregated transaction data from a transaction data provider may be encrypted and exchanged with a content item selection system using commutative encryption algorithms. The transaction data provider and content item selection system may utilize a set of common identifiers that are each encrypted using a respective commutative encryption algorithm of the transaction data provider or content item selection system. The other of the transaction data provider or content item selection system encrypts the single-encrypted common identifier using a respective commutative encryption algorithm to generate double encrypted common identifiers. The double encrypted common identifiers may be used to match a set of common identifiers with transaction data. The transaction data may be encrypted and/or may include random offset values. | 03-17-2016 |
20160117679 | Automated Payment Information Update With Vendors - A wallet integration server generates a list of one or more vendors for presentation to a user responsive to a successful authentication of the user. Upon receiving a selection of at least one vendor from the list of vendors by the user, the wallet integration server generates and transmits a validation request to the at least one vendor for validating the user. Responsive to a successful validation of the user by the at least one vendor, the wallet integration engine generates and transmits a message comprising payment information associated with the user to the at least one vendor. Further, the wallet integration server receives a notification confirming receipt of the payment information by the at least one vendor. | 04-28-2016 |
20160148188 | SWITCHING BETWEEN INTERNAL AND EXTERNAL ANTENNAS - The present disclosure is directed to a system and method for switching between internal and external antennas. In some implementations, a system includes an antenna, a connector, and a housing. The antenna is configured to communicate wirelessly transactions with transaction terminals. The connector is connected to the antenna and configured to connect a transaction card to the antenna in response to at least insertion in the housing. The housing enclosing at least a portion of the antenna and at least a portion of the connector and including one or more elements that form an opening for receiving the transaction card. In addition, the housing is substantially rectangular and includes a first portion with a first thickness and a second portion with a second thickness different from the first thickness and at least the thickness of the transaction card. | 05-26-2016 |
20160148203 | MOBILE COMMERCE PAYMENT SYSTEM - A mobile commerce system and components thereof are provided in which multiple wireless mobile communications devices (mobile devices) ( | 05-26-2016 |
20160162888 | Fuel Dispensing Payment System for Secure Evaluation of Cardholder Data - A secure evaluation assembly in which an encrypted communication of cardholder data from an input device to a remote host processing system may be securely evaluated. The secure evaluation assembly includes antitampering control electronics and a memory. The secure evaluation assembly memory contains information needed to decrypt data encrypted according to a first encryption method and information needed to encrypt data according to a second encryption method. Further, the secure evaluation assembly memory is encrypted according to a third encryption method. The antitampering control electronics are operative to decrypt the secure evaluation assembly memory and are further operative to decrypt cardholder data encrypted according to the first encryption method to produce unencrypted cardholder data. Finally, the antitampering control electronics are operative to evaluate the unencrypted cardholder data and encrypt the unencrypted cardholder data according to the second encryption method if the unencrypted cardholder data is payment cardholder data. | 06-09-2016 |
20160203448 | CRYPTOCURRENCY VERIFICATION SYSTEM | 07-14-2016 |
20160253637 | OBFUSCATING PRIVATE INFORMATION USING A TRANSACTION IDENTIFIER | 09-01-2016 |
20160253638 | PAYMENT DEVICE WITH DATA ENTRY KEYS | 09-01-2016 |
20160253667 | PAYMENT CHECKOUT WITHIN AN APPLICATION | 09-01-2016 |
20160379214 | PRIVACY PROTECTION IN ECOMMERCE/LOGISTICS - Various embodiments secure a customer's private data within a logistics environment. In one embodiment, a graphical object including encoded data associated with an order for goods is generated. The encoded data within the graphical object is machine-only readable. An electronic shipping form is generated. The electronic shipping form includes at least a delivery address associated with the order and the graphical object. Private data associated with a customer is inaccessible to a human via the electronic shipping form. The electronic shipping form is wirelessly transmitted to an electronic device associated with a delivery person. | 12-29-2016 |
20170236102 | Peer-to-Peer Financial Transactions Using A Private Distributed Ledger | 08-17-2017 |
20170236103 | Peer-to-Peer Financial Transactions Using A Private Distributed Ledger | 08-17-2017 |
20170236104 | Peer-to-Peer Financial Transactions Using A Private Distributed Ledger | 08-17-2017 |
20190147415 | DIGITAL ASSET MODELING | 05-16-2019 |
20220138730 | TIME-BOUNDED ACTIVITY CHAINS WITH MULTIPLE AUTHENTICATED AGENT PARTICIPATION BOUND BY DISTRIBUTED SINGLE-SOURCE-OF-TRUTH NETWORKS THAT CAN ENFORCE AUTOMATED VALUE TRANSFER - The disclosure relates to executing time bound activity chains using a baseline blockchain that encodes milestones and a realized blockchain that tracks activity relating to the milestones encoded on the baseline blockchain. Each project managed by the system may be scheduled using its own baseline blockchain, which stores time-bounded activity chains that encode milestones for that project. The realized blockchain stores performance related activity that validates and stores information indicating performance of actions related to milestones and automated transfer of value through the use of smart contracts. Each block of the realized blockchain not only references a prior block of the realized blockchain but also a corresponding baseline block, which encodes a milestone, in the baseline blockchain. Thus activity relating to progress toward a milestone may be recorded on a realized block, which refers back to a baseline block that specifies the milestone. | 05-05-2022 |
20220138738 | COMPUTER-IMPLEMENTED SYSTEMS AND METHODS FOR IMPLEMENTING TRANSFERS OVER A BLOCKCHAIN NETWORK - The invention provides improved verification solutions for blockchain-implemented transfers. It is suited for, but not limited to, implementation in an SPV wallet. In accordance with one embodiment, a system or resource is provided which comprises a plurality of novel SPV verification components, the activities of which are coordinated by a coordination component. The system enables Bob to send Alice a payment transaction template (template Tx3) and requests: the full transaction data for all input transactions (Tx1, Tx2) comprising at least one output that Alice wants to spend as inputs to a transfer (Tx3); the Merkle path for all input transactions (Tx1, Tx2) linking them to their respective Merkle roots associated with their respective block headers; the completed transfer transaction (Tx3). Alice provides this information plus her signature. Bob can then perform local SPV checks on the input transactions Tx1, Tx2 using transactions Tx1 and Tx2, their corresponding Merkle paths Path 1, Path 2, and Bob's local list of block headers. Bob broadcasts the transfer transaction (Tx3) to the P2P network. | 05-05-2022 |
20220138739 | ELECTRONIC DEVICE FOR GENERATING TRANSACTION INCLUDING INTERNAL DATA AND OPERATING METHOD THEREOF - A portable electronic device and a method thereof are disclosed. The portable electronic device includes a communication circuit, a processor, and a memory configured to store instructions. The instructions, when executed by the processor, causes the portable electronic device to execute a first smart contract, to obtain at least a portion of data stored in the memory, by executing the first smart contract, to create a transaction including the at least portion of data, to sign the created transaction based on a private key of a user of the portable electronic device, and to send the signed transaction to at least one node of a decentralization network through the communication circuit. | 05-05-2022 |
20220138740 | COMPUTER-IMPLEMENTED METHOD, A COMPUTER SYSTEM AND A CRYPTOCURRENCY DEPOSITORY FOR ENABLING SECURE ESCROW AND SAFEKEEPING OF A CRYPTOCURRENCY - There is provided a secure cryptocurrency depository having an associated second party device in communication with a first party device associated with a first party, in a cryptocurrency network, wherein the secure cryptocurrency depository is a secure cryptocurrency escrow and/or a secure cryptocurrency vault. | 05-05-2022 |
20220138744 | ELECTRONIC CASH-BASED OFFLINE TRANSACTION METHOD AND SYSTEM - Provided is an electronic cash-based offline transaction method and system. The method includes: receiving, by a back-end server from a smart card, an anti-replay factor generated by the smart card; determining, by the back-end server in accordance with a predetermined algorithm, whether an abnormal transaction occurs on the smart card, generating, by the back-end server when no abnormal transaction occurs, a security information signature by signing security information with a private key of the back-end server, and transmitting, by the back-end server, the security information and the security information signature to the smart card (S | 05-05-2022 |
20220138760 | Dynamic Ledger Address Masking - A ledger based dynamic digital address masking solution for reducing vulnerability of private cryptographic keys used during digital transactions. Tokenized digital transaction addresses may be stored in association with an actual distributed ledger reference address. The tokenized transaction address, or recipient token, may be used to complete a variety of transactions for digital asset exchange without exposing the transaction address's actual reference address on the distributed ledger. | 05-05-2022 |