Entries |
Document | Title | Date |
20080228651 | Public Key Crytography Method and System - A system is disclosed relating to the use of digital certificates to improve internet communications. In one embodiment digital certificates are used to facilitate payment for goods or services, where the digital certificate is designated as having a certain value. In a further embodiment digital certificates are used for reducing or preventing unsolicited emails or spam. In a still further embodiment digital certificates are used in a digital Lottery System. | 09-18-2008 |
20080243701 | TRANSPARENTLY SECURING DATA FOR TRANSMISSION ON FINANCIAL NETWORKS - Systems and methods for performing financial transactions are provided. In one embodiment, the invention provides a method for processing token data for a bank card transaction, the method includes: receiving a string of first token data from a token at a token reader; modifying the first token data and generating second token data, the second token data including modified token data; performing a modulo arithmetic operation on the second token data and determining a mod | 10-02-2008 |
20080319911 | FINANCIAL TRANSACTION TOKEN WITH ONBOARD POWER SOURCE - There is provided a card or token for use in financial transactions. The financial transaction token or card has an onboard energy storage device that enables onboard electronics to operate when the card is not in the proximity of a merchant Point-Of-Service (POS) terminal. In one implementation, the onboard energy storage device includes a capacitor such as a thin-film capacitor that stores sufficient energy to power onboard electronics without the need for an onboard battery. The card may be incorporated within various conventional apparatus such as a see-through and/or protective substrate, an item of clothing, an item of jewelry, a cell phone, a Personal Digital Assistant (PDA), a credit card, an identification card, a money holder, a wallet, a personal organizer, a keychain payment tag, and like personality. | 12-25-2008 |
20080319912 | POWERING FINANCIAL TRANSACTION TOKEN WITH ONBOARD AND EXTERNAL POWER SOURCE - A card or token used in financial transactions has an onboard energy storage device that enables onboard electronics to operate when the card is not in the proximity of a merchant Point-Of-Service (POS) terminal. In one implementation, the onboard energy storage device includes a capacitor such as a thin-film capacitor that stores sufficient energy to power onboard electronics without the need for an onboard battery. The card or token may be incorporated within various conventional apparatus such as a see-through and/or protective substrate, an item of clothing, an item of jewelry, a cell phone, a Personal Digital Assistant (PDA), a credit card, an identification card, a money holder, a wallet, a personal organizer, a keychain payment tag, and like personality. | 12-25-2008 |
20090006263 | TECHNIQUE FOR SECURELY COMMUNICATING INFORMATION - A system that communicates information is described. During operation, this system receives an encryption key through a first wireless communication technique, wherein the first wireless communication technique includes near field communication. Then, the system communicates a document through a second wireless communication technique, where the document is associated with a financial transaction being conducted with a commercial establishment. Next, the system receives encrypted information through the second wireless communication technique, where the encrypted information is, at least in part, encrypted using the encryption key, and where the second wireless communication technique includes a technique other than near field communication. | 01-01-2009 |
20090063352 | METHODS AND SYSTEMS FOR MONETARY EXCHANGE AND TRANSFER - A system for monetary exchange and transfer comprises a centralized location, wherein the centralized location comprises at least a first account at the centralized location comprising first funds for a first user and a second account at the centralized location comprising second funds for a second user. The system may further comprise a first device associated with the first account configured to electronically store by the first device an accounting of the first funds, a second device associated with the second account configured to electronically store by the second device an accounting of the second funds, and an electronic transfer system configured to transfer at least a portion of the first funds from the first device directly to the second device. The system may further comprise a receiver system configured to receive at least a portion of the first funds by the second device directly from the first device, a first device accounting reconciliation system configured to reconcile the accounting of the first funds by the first device, and a second device accounting reconciliation system configured to reconcile the accounting of the second funds by the second device. | 03-05-2009 |
20090106157 | Funding a Radio Frequency Device Transaction - A transponder-reader payment system includes an RFID reader for interrogating a transponder and an RFID transponder device. The RFID reader receives, from the RFID transponder device, a code that is associated with a first funding source and a second funding source. The RFID reader communicates a request associated with a transaction to a payment processor. The request includes the code and the transaction is funded using the first funding source and the second funding source associated with the code. In one embodiment, the transaction is funded according to a funding account protocol associated with the code. | 04-23-2009 |
20090164380 | FINANCIAL TRANSACTION NETWORK - The manufacture and control of payment cards used in consumer financial transactions circulates a population of payments cards with user identification and account access codes. Each use of an individual card produces a variation of its user access code according to an encryption program seeded with encryption keys or initialization vectors. A portion of the magnetic stripe is made dynamic with a Q-Chip magnetic MEMS device. The job of personalizing payment cards with the user identification and account access codes is outsourced to a personalization company. The encryption keys and initialization vectors are kept private from the personalization company by using the encryption program to generate tables of computed results. Respective ones of the tables of computed results are sent for loading by the personalization company into new members of the population of payments cards. New payment cards are manufactured and distributed that include and operate with the tables of computed results. | 06-25-2009 |
20090164381 | METHOD OF MAKING SECURE PAYMENT CARDS - A method of making secure payment cards for financial transactions over networks includes building payment card blanks by integrating plastic, circuit, battery, semiconductor chips, magnetic stripe, magnetic MEMS device, and other components into a debit/credit card format conforming to ISO industry standards, all in response to an order from an issuing bank. Then personalizing each payment card blank with a personal account number (PAN) of which a portion is variable according to an encryption processor and secret encryption key kept by said issuing bank, and only computed results are loaded in embedded crypto-tables for presentation during financial transactions by said magnetic MEMS device. A population of secure payment cards is produced which can be circulated for use in the commercial markets. | 06-25-2009 |
20090198617 | Method and apparatus for performing delegated transactions - A computer implemented method for enabling a third party by a user to execute a transaction on behalf of the user, said method comprising:
| 08-06-2009 |
20090240625 | POWERING FINANCIAL TRANSACTION TOKEN WITH ONBOARD POWER SOURCE - There is provided a card or token for use in financial transactions. The financial transaction token or card has an onboard energy storage device that enables onboard electronics to operate when the card is not in the proximity of a merchant Point-Of-Service (POS) terminal. In one implementation, the onboard energy storage device includes a capacitor such as a thin-film capacitor that stores sufficient energy to power onboard electronics without the need for an onboard battery. The card may be incorporated within various conventional apparatus such as a see-through and/or protective substrate, an item of clothing, an item of jewelry, a cell phone, a Personal Digital Assistant (PDA), a credit card, an identification card, a money holder, a wallet, a personal organizer, a keychain payment tag, and like personality. | 09-24-2009 |
20100082491 | System and method for providing electronic event tickets - Systems, methods, and devices for providing and managing electronic event tickets are provided. For example, a device for managing an electronic event ticket may include a processor configured to run an electronic ticket management application, a memory device configured to store data associated with the electronic ticket management application, an electronic display configured to display at least a portion of the data associated with the electronic ticket management application, and an input/output interface configured to receive an electronic ticket and the data associated with the electronic ticket for management by the electronic ticket management application. The electronic ticket management application may be configured to enable the electronic device to gain entry to an event and to obtain at least one other event-related benefit after the electronic ticket is received by the input/output interface. | 04-01-2010 |
20100211506 | MOBILE TRANSACTION SYSTEM AND METHOD - A mobile transaction system and method are carried out by a plurality of remote trading servers, a mobile barcode trading device and a data transmission server. The remote trading server generates and transmits a two-dimensional barcode image to at least one store client to display thereon after a user selects at least one product from the store client. The mobile barcode trading device captures the two-dimensional barcode image, analyzes the two-dimensional barcode image to obtain an encrypted key data and a trade data, and generates an encrypted payment data by the encrypted key data after the user input a payment data. The encrypted payment data and the trade data are combined to generate an encrypted trade data being transmitted to at least one of a plurality of the remote trading servers via a data transmission server, so as to carry out a mobile transaction. | 08-19-2010 |
20110137802 | PURCHASE TRANSACTION SYSTEM WITH ENCRYPTED PAYMENT CARD DATA - Systems and methods are provided for securing payment card information. A user may present a payment card such as a credit card to point-of-sale equipment. The point-of-sale equipment may encrypt the payment card information. An encryption algorithm may be used that takes as inputs a first part of the payment card information, a tweak formed by a second part of the payment card information, and an encryption key. The encrypted payment card information may be conveyed to a gateway over a communications network. The gateway may identify which encryption algorithm was used in encrypting the payment card information and may re-encrypt the payment card information using a format preserving encryption algorithm. A network-based service may be used to remotely perform functions for the gateway. | 06-09-2011 |
20110161231 | POSTAL SERVICES KIOSK HAVING PAYMENT CARD SECURITY - An apparatus for facilitating payment using a payment card includes a computerized sales transaction device structured to determine a monetary amount for a sale, and a secure card activated terminal (CAT) device in electronic communication with the computerized sales transaction device. The computerized sales transaction device sends the monetary amount to the secure CAT device. The secure CAT device is structured to: (i) obtain sensitive payment card information from the card, (ii) automatically request in a secure, encrypted manner authorization for the sale using the monetary amount and the sensitive payment card information, (iii) receive in a secure, encrypted manner authorization approval for the sale, and (iv) in response to receiving the authorization approval, send purchase authorization approval information to the computerized sales transaction device. The computerized sales transaction device never receives the sensitive payment card information. | 06-30-2011 |
20110208656 | METHOD, APPARATUS, AND COMPUTER PROGRAM PRODUCT FOR FACILITATING PROMOTIONS WITH AN E-WALLET - An electronic wallet platform obtains, from a check-out web page of a merchant, (i) a unique identification of a given consumer, of a plurality of consumers, who is purchasing at least one item from the merchant in an on-line transaction, and (ii) associated transaction data. The electronic wallet platform supplies, to a transaction qualification service, the unique identification of the given consumer; and retrieves, from a consumer enrollment database, a record wherein at least one useful token is stored in association with the unique identification of the given consumer. The transaction qualification service determines, based on rules from an offers registry database, whether the at least one useful token is applicable to the on-line transaction. The rules are stored in the offers registry database in association with the at least one useful token, and the rules take into account at least one of the unique identification of the given consumer and the associated transaction data in determining the applicability. If, based on the determining step, the at least one useful token is applicable to the on-line transaction, a further step includes providing the at least one useful token to the merchant, using the transaction qualification service and the electronic wallet platform. The at least one useful token is provided to the merchant prior to payment card authorization, clearing, and settlement for the on-line transaction. | 08-25-2011 |
20110238578 | MODULE ID BASED ENCRYPTION FOR FINANCIAL TRANSACTIONS - A server is operable to receive a media device identifying number (ID) and establish an association between a media device and a payment account and, in one embodiment, supports at least one of payment authorization and payment clearing based at least in part on the media device ID and the payment account. A network and system includes a payment card processor server that is operable to receive a payment authorization request and to determine if an authorized media device generated a purchase selection message and to determine to approve a received payment authorization request based, in part, if the media device was authorized for the purchase selection based upon a received media device ID. The system is further operable to perform a key rotation to protect payment account information. | 09-29-2011 |
20110307387 | Method and System for Distributed Point of Sale Transactions - A method and system for a fully distributed on-line selling environment is presented. Any webpage can contain a program module that for each customer that view any webpage with the module embedded in it, automatically associates that customer with their corresponding shopping cart stored at a central server. The module can initiate a sale transaction for a product presented on the webpage and cause the central server to complete the purchase and fulfillment. The module automatically updates the customer shopping cart and presents updated inventory availability. The website hosting the webpages with the module do not operate any back end transaction processing or order fulfillment. | 12-15-2011 |
20120109828 | PRE-AUTHENTICATED IDENTIFICATION TOKEN - A wearable identification token includes a housing, a transmitter for transmitting user identification data to a proximity reader, a switch for switching the identification token between an enabled state and a disabled state, and a sensor for detecting removal of the housing from the user's body. The switch is responsive to the sensor to switch the identification token from the enabled state to the disabled state in response to the housing being removed from the user's body, and is responsive to a signal received from a trusted electronic device to switch the identification token from the disabled state to the enabled state. | 05-03-2012 |
20120123947 | LATE BINDING TOKEN IN SYSTEM AND METHOD FOR VERIFYING INTENT IN A CARD NOT PRESENT TRANSACTION - A system for verifying intent in a card not present transaction is provided. The system includes a late binding token that is distributable to consumers without necessarily being bound to an account. The system also includes a client software that locates a token server configured to facilitate managing and communicating with the late binding token. The system also includes a protocol concerning how to build a verifiably secure structured proposal that carries an offer to the consumer through the client software. | 05-17-2012 |
20120173431 | SYSTEMS AND METHODS FOR USING A TOKEN AS A PAYMENT IN A TRANSACTION - Embodiments of the invention relate to systems and methods for using a token as a payment in a transaction. In one embodiment, a method for facilitating a payment transaction using a mobile device can be provided. The method can include validating a user's identity; providing a token to the user; receiving the token and user identification information from a merchant as payment for a transaction; and authorizing the transaction. | 07-05-2012 |
20120173432 | SELF-AUTHORIZING TOKEN - Self-authorizing tokens are disclosed. Typical embodiments employ a secure element and a secure element interrogator. Such tokens may be used for authorization of financial payments and other secure transactions. In some embodiments the secure element is provisioned with information about a particular payment card holder account. A secure element reader interrogates the smart element and derives information needed to authorize a transaction. In some embodiments the secure element and the secure element interrogator communicate using communications formatted according to ISO 7816-4. | 07-05-2012 |
20120191612 | PORTABLE E-WALLET AND UNIVERSAL CARD - Universal cards are used in place of all the other traditional cards which a person may want to carry. The universal card can include a short range communications transceiver to communicate with a mobile device. The mobile device can include a user interface and an e-wallet application so that the user can interface with the e-wallet application for programming the universal card via the short range communication link. Once programmed, the universal card emulates a function of a traditional card. | 07-26-2012 |
20120233077 | ELECTRIC CHARGING STATION RESERVATION SYSTEM AND METHOD - A method for reserving a vehicle charging station includes receiving a desired destination, and automatically verifying the availability of a designated station at an expected arrival time. The method further includes reserving the designated station when the designated station is available at the expected arrival time, and transmitting an electronic token to the client device. The token confirms the reservation and uniquely identifies the vehicle. A system for reserving the station includes a server in communication with the station, and with a client device configured for communicating a desired destination to the server. The server automatically verifies the availability of the designated charging station at an expected arrival time at the desired destination, reserves the designated station when it is available at the expected arrival time, and then generates and transmits the token to the client device. | 09-13-2012 |
20120296826 | METHOD AND SYSTEM FOR DISTRIBUTING ELECTRONIC TICKETS WITH VISUAL DISPLAY - This invention discloses a novel system and method for distributing electronic ticketing such that the ticket is verified at the entrance to venues by means of an animation or other human perceptible verifying visual object that is selected by the venue for the specific event. This removes the need to use a barcode scanner on an LCD display of a cell phone or other device and speeds up the rate at which human ticket takers can verify ticket holders. | 11-22-2012 |
20120296827 | PERFORMING AUTOMATICALLY AUTHORIZED PROGRAMMATIC TRANSACTIONS - Techniques are described for facilitating interactions between computing systems, such as by performing transactions between parties that are automatically authorized via a third-party transaction authorization system. In some situations, the transactions are programmatic transactions involving the use of fee-based Web services by executing application programs, with the transaction authorization system authorizing and/or providing payments in accordance with private authorization instructions previously specified by the parties. The authorization instructions may include predefined instruction rule sets that regulate conditions under which a potential transaction can be authorized, with the instruction rule sets each referenced by an associated reference token. After one or more of the parties to a potential transaction supply reference tokens for the parties, the transaction authorization system can determine whether to authorize the transaction based on whether the instruction rule sets associated with the reference tokens are compatible or otherwise satisfied. | 11-22-2012 |
20120296828 | Method and System for Distributing Electronic Tickets with Visual Display - This invention discloses a novel system and method for distributing electronic ticketing such that the ticket is verified at the entrance to venues by means of an animation or other human perceptible verifying visual object that is selected by the venue for the specific event. This removes the need to use a bar-code scanner on an LCD display of a cell phone or other device and speeds up the rate at which human ticket takers can verify ticket holders. The system providing the service also can maintain a persistent communication channel with the user device in order to control the ticket verification process. | 11-22-2012 |
20120310838 | LOCAL USAGE OF ELECTRONIC TOKENS IN A TRANSACTION PROCESSING SYSTEM - A method for the use of electronic transactional tokens includes: generating a plurality of transactional tokens including a first token; associating each of the transactional tokens with a plurality of users, the first token associated with a first user; monitoring usage of the transactional tokens in a plurality of transactions in a local region or network; and in response to receiving transactional data for the first transaction, updating the first token from a first state to a second state (e.g., to provide a benefit when the token is applied in the local region or network). The tokens may be generated and monitored using a token processing system, which uses transaction data received by a transaction handler that is handling transaction processing for the transactions. | 12-06-2012 |
20120317034 | TRANSPARENT VIRTUAL CURRENCY USING VERIFIABLE TOKENS - Users make online purchases using a virtual currency. A series of secret encryption keys is generated, where each key in the series is associated with a different epoch. A token tracking table is initialized. Whenever real currency is received from a user wanting to purchase tokens, a semantically secure encryption method is used in conjunction with the secret encryption key in the series that is associated with the current epoch to generate a set of encrypted tokens which includes one or more encrypted paid tokens. The set of encrypted tokens is sent to the user wanting to purchase tokens, and each encrypted paid token in the set is entered into the token tracking table, where the entry for each encrypted paid token includes information specifying that the token has not yet been spent and has not yet been encashed. | 12-13-2012 |
20130036057 | WEB-BASED ELECTRONIC CONTROLLED SUBSTANCE TRANSFER MANAGEMENT SYSTEM AND METHOD - A Web-based Electronic Controlled Substance (CS) Transfer Management System and Method designed to fully comply with the DEA requirements for a prescription of controlled substances. The system and method allows the buyer to securely order and confirm the receipt of the controlled substances over an existing Internet infrastructure of the buyer such as a Web browser as the buyer's software, thus avoiding the necessity of any additional proprietary software or hardware to be built and installed onto the buyer's computer. The system and method further utilizes various validation functions, related to signing the controlled substance prescription with the utilization of the PKI certificate therefore, completely eliminating the necessity of the paper DEA 222 Form. The transfer of the controlled substances is managed through a secured database server, wherein signed validated orders are posted for fulfillment and reporting to the DEA. | 02-07-2013 |
20130041830 | METHODS AND APPARATUS TO PROVISION PAYMENT SERVICES - Methods and apparatus to provision payment services are disclosed. An example method includes receiving an indication of a service to be provisioned to a mobile device, generating a token indicative of the service, wherein the token includes a cryptographically signed portion that was cryptographically signed by a secure element of the mobile device, sending the token to an entity for verification, and provisioning the service when the token is verified. | 02-14-2013 |
20130046696 | Method and Apparatus for Object Transaction Session Validation - According to one embodiment, an apparatus may store a plurality of token-based rules. A token-based rule may facilitate access to a resource. The apparatus may further store a plurality of tokens. The apparatus may receive a first token indicating that a transaction associated with the resource has been requested. The apparatus may determine at least one token-based rule based at least in part upon the first token. The at least one token-based rule may condition access to the resource upon a second token. The apparatus may determine that the plurality of tokens includes the second token associated with the at least one token-based rule and generate a session token based at least in part upon the first token and the second token in response to the determination that the plurality of tokens includes the second token. The apparatus may then allow the transaction. | 02-21-2013 |
20130091061 | SECURE PAYMENT SYSTEM - A method for handling secure information using a first application that has a link to a second, separate secure data handling application, the method comprising: presenting to the user using the secure data handling application a secure data entry screen in response to selection of the link in the first application; receiving secure data from the user using the secure data entry screen; and re-directing the user to the first application once the secure data entry is completed. | 04-11-2013 |
20130151416 | SYSTEM AND METHOD FOR TARGETED INFORMATION DELIVERY THROUGH SOCIAL NETWORK - A method for delivering information to a targeted group of users includes establishing a network that includes a plurality of users and a plurality of entities being connected with each other based on the interest of the users in the entities; searching for a targeted group of users who match a specification of an interest profile and a specification of a spatial temporal profile among the users in the network; and delivering information to the targeted group of users. The interest profile is based on the relationships between each user and the entities that the user is interested in. The spatial temporal profile is based on the location and the time on which the user accesses the network. A system for delivering information to a targeted group of users is also provided. | 06-13-2013 |
20130151417 | DYNAMIC WIDGET GENERATOR APPARATUSES, METHODS AND SYSTEMS - The DYNAMIC WIDGET GENERATOR APPARATUSES, METHODS AND SYSTEMS (“DWG”) transforms developer credentials, codes and parameter inputs via DWG components into buy widgets, payment acceptance and purchase transaction outputs. In one embodiment, the DWG may facilitate obtaining a plurality of authentication parameters and widget customization parameters. The DWG may authenticate a user using a parameter derived from the plurality of authentication parameters and may dynamically generating a purchase widget for the authenticated user using the plurality of widget customization parameters. | 06-13-2013 |
20140012762 | Embedded Electronic Payment System and Integrated Circuit - An embedded electronic payment (EEP) system allows various devices and appliances to act as a merchant to accept electronic payments. The EEP system can be formed on an integrated circuit or as a software applet to run on a virtual machine. The integrated chip can be a standard IC, an application specific integrated chip, programmable logic device, or a multiprocessor based microcontroller. The EEP system operates with a standard interface that can be adapted to many applications. As a result, the cost of payment integration is reduced. The reduced cost of inclusion allows electronic payment systems to be applied in systems and devices where cost margins previously prohibited custom electronic payment systems. When the EEP system is included as an integrated chip, the system has improved security and power consumption compared to software solutions. | 01-09-2014 |
20140025581 | MOBILE TRANSACTIONS USING AUTHORIZED TOKENS - Conducting mobile transactions comprises determining, using a processor, whether a network is available to facilitate a mobile transaction. An interface, communicatively coupled to the processor, receives an encrypted token from a mobile device without using the network if the network is not available. The processor is further operable to process the encrypted token to complete the mobile transaction. | 01-23-2014 |
20140025582 | Digital Token Generator, Server For Recording Digital Tokens and Method For Issuing Digital Token - A disconnected digital token generator is provided. which is capable of generating and displaying or delivering a digital token for a customer. The customer can take a picture of the digital token using a smart phone and then communicate with a server through a hyperlink represented by the picture using the smart phone. The disconnected digital token generator thus can be used for issuing a digital token without requiring any networks or logical connections. | 01-23-2014 |
20140046854 | READABLE INDICIA FOR ADVERTISEMENTS - Embodiments of the invention are directed to systems, methods and computer program products for processing a readable indicia associated with an advertisement associated with a product. The invention decodes the readable indicia to determine product purchase information, wherein the product purchase information is associated with the product, receives authentication credentials associated with a payment account, and processes the authentication credentials to authorize a payment associated with the product purchase information. In some embodiments, the invention extracts a link from the readable indicia or a second readable indicia associated with the advertisement and initiates a user interface associated with the link. In some embodiments, the invention populates some or all the product purchase information into at least one of a user's notes, calendar or budget, and in some, the advertisement is placed proximate the product within a merchant's business. | 02-13-2014 |
20140136417 | PORTABLE E-WALLET AND UNIVERSAL CARD - Universal cards are used in place of all the other traditional cards which a person may want to carry. The universal card can include a short range communications transceiver to communicate with a mobile device. The mobile device can include a user interface and an e-wallet application so that the user can interface with the e-wallet application for programming the universal card via the short range communication link. Once programmed, the universal card emulates a function of a traditional card. | 05-15-2014 |
20140136418 | SYSTEM AND METHOD FOR APPLICATION SECURITY - A secured hardware token includes an embedded processor, secured persistent storage, and read only memory. The storage includes functionality to store data that includes an account master secret for an account at a financial institution. The memory includes a security application, which causes the processor to receive, from a financial institution application executing on a mobile device, a call for an n-bit result. The security application further causes the processor to obtain, from the secured persistent storage, the account master secret, construct the n-bit result specific to the call using the account master secret and the n-bit generator input as input to an n-bit generator in the security application, and return the n-bit result to the financial institution application. The financial institution application provides the n-bit result to the financial institution, which completes a financial transaction when the n-bit result is verified using a copy of the account master secret. | 05-15-2014 |
20140164250 | ENCRYPTION AND TOKENIZATION ARCHITECTURES - Various embodiments of the present invention are directed to methods, systems and computer program products for conducting an online transaction on a website involving sensitive information. Such embodiments provide methods, systems and computer program products to: (a) register at least one entity with a gate keeper module, the registering comprising associating the entity with a subscription level; (b) associate a sub-string of a character string with a unique token so that a direct link does not exist between the unique token and the character string; and (c) during processing of the online transaction: (i) using the unique token for intermediate steps during the processing of the online transaction; and (ii) only accessing the character string in storage memory to complete the online transaction after receiving a request from at least one registered entity associated with a subscription level associated with a privilege to receive the requested sensitive information. | 06-12-2014 |
20140188734 | Securely Receiving Data Input At A Computing Device Without Storing The Data Locally - The present invention is generally directed to securely receiving data input at a computing device without storing the data locally. The invention allows an application, such as a mobile app, to receive payment information (e.g. credit card information) directly from a user without requiring the application to comply with the PA DSS or another standard. The application can employ any type of user interface for receiving user input as well as one or more overlaid input fields that receive sensitive payment information. The overlaid input fields can be part of a web page or other interface that can securely submit data to a remote computer system (e.g. a server) where it can be stored, processed, or transmitted in accordance with the PCI DSS. In this way, the sensitive payment information (or another type of information) is not stored, processed, or transmitted by the application on the local device. | 07-03-2014 |
20140188735 | SECURE ELEMENT FOR PROXIMITY TRANSACTIONS - A method for transmitting data between a mobile communication device and a server. The method includes running a mobile application on the mobile communication device. The mobile application is hosted on the mobile communication device through the server as a Software as a Service (SaaS). The method further includes transmitting data associated with the mobile application between the mobile communication device and the server, in which transmission of the data between the mobile communication device and the server is monitored through the server. | 07-03-2014 |
20140279552 | VIRTUALIZATION AND SECURE PROCESSING OF DATA - Systems, methods, and non-transient machine-interpretable data representing executable instruction sets and/or other products for the processing of data for the secure creation, administration, manipulation, processing, and storage of electronic data useful in the processing of payment transactions and other secure data processes. In various aspects and embodiments the disclosure provides secure means for the authorization of sensitive and other data processes subject to controlled access. Such processes include, for example the creation, administration, authorization, virtualization, storage, and other manipulation or processing of electronic data representing characteristics of, instructions for, and information associated with consumer, business, and other payment accounts, and other forms of secure payment elements, such as payment tokens; and data useful in processing transactions using such accounts and elements. Information associated with particular payment means, such as accounts or payment tokens, can be stored, for example, in a data set, usually secure, sometimes referred to as a virtual or electronic wallet, or a secure payment token. | 09-18-2014 |
20140304169 | TECHNIQUES FOR MOBILE TRANSACTION PROCESSING - Techniques for automated mobile transaction processing are provided. A consumer traverses to a web portal or other type of enterprise terminal device of an enterprise and proceeds to shop. During checkout, the portal contacts a transaction service and is delivered back an identifying barcode or Quick Response (QR) code. The consumer uses a mobile device to scan the code and send it to the transaction service. Previously registered payment details of the consumer are located and payment is received from the consumer. The portal is notified that payment is completed by the transaction service. | 10-09-2014 |
20140365374 | Security Token for Mobile Near Field Communication Transactions - Devices, systems, and methods are disclosed which relate to an NFC-enabled security token that is removably coupled to a mobile device. The security token may be provisioned with the information by the mobile device, then decoupled from the mobile device and used to authenticate the user or perform a transaction at a POS terminal equipped with an NFC reader. The security token includes logic for user-controlled restrictions on allowable purchases, such as payment limits, timeouts, vendor identifiers, allowed purchases, and location-based restrictions. The security token is further equipped with “self-destruct” security features, such as deactivating itself or erasing any sensitive information upon being unable to contact the mobile device for a specified duration, or being subject to an unauthorized or restricted transaction, until such time as it is re-coupled to the mobile device. | 12-11-2014 |
20140372318 | SYSTEMS AND METHODS FOR PAYMENT PROCESSING ON PLATFORMS - Systems and methods for payment processing on devices are provided. Such systems and methods enable payment processing to be completed with a peripheral device (such as a magnetic card reader) and a point of sales system, without the need for extensive developer integration. The system receives a payment charge amount from a point of sales system. The system also detects (or dynamically populates) peripheral devices that are used to capture account information. The peripheral device is a supported device type with an associated library, which includes data for properly interfacing with the peripheral device. The system provides the captured account data, a merchant ID and the amount of the charge to a payment management system. The system likewise receives a response (approve or decline) from the payment management system. | 12-18-2014 |
20150019440 | Encrypted Correction Code to protect the integrity and originality of electronic documentation and secure online payment and online wallet - A method is provided for protecting the integrity and originality of electronic documentation and supporting securer and easier online payment using the Encrypted Correction Code which is correction code of the whole documentation and encrypted by the private key of RSA. The code is imbedded into 2D-barcode as RGB color value of pixels. First, 2D-barcode is generated with public-key ID, and then blend and imbedded into electronic documentation. Then the Correction Code is calculated and is encrypted by RSA private key. After that, the Encrypted Correction is mapped into color in the image of 2D-barcode. When the file is received, the integrity and originality is checked by comparing Correction Code decrypted from 2D-barcode with the Correction Code of the documentation. The present invention can be applicable to support more secure and easier online wallet using three-layer encryption and free from any personal information. | 01-15-2015 |
20150026071 | SMARTCARD TO VIRTUAL MEDIA CONVERSION - In one embodiment, a method for converting a smartcard into a virtual media in a transit system is provided. The method includes reading data from a smartcard. The data includes product information related to a transit product stored on the smartcard. The data is communicated to a smartcard management system such that the smartcard management system may create a record of the smartcard. The data is also communicated to a ticket management system. An indication of the creation of an account from the ticket management system is received. The account includes a unique account identifier and the data. An input from a contactless media is received. The input includes an identifier of the contactless media. The identifier is communicated to an authorization service. A token created by the authorization service is received. The token is associated with the identifier. The token is communicated to the ticket management system | 01-22-2015 |
20150046336 | SYSTEM AND METHOD OF USING A SECONDARY SCREEN ON A MOBILE DEVICE AS A SECURE AND CONVENIENT TRANSACTING MECHANISM - A method and system for transmitting payment credentials that are related to a payment account and include at least an account number associated with the related payment account. Machine-readable code is encoded with the set of payment credentials related to the indicated payment account and is displayed on a second display of the mobile communication device. The second screen can be a low-power display, such as electrophoretic display, and the machine readable code can be selectively or continuously displayed. | 02-12-2015 |
20150046337 | OFFLINE VIRTUAL CURRENCY TRANSACTION - A method of conducting an offline virtual currency transaction is disclosed. The method may include steps of generating one or more virtual wallets; depositing certain amount of virtual currency in said virtual wallets; a payer transmitting at least a portion of said virtual currency to a payee through an offline platform; and payee confirming reception of the virtual currency. In one embodiment, the step of transmitting at least a portion of said virtual currency to another user through an offline platform may include a step of scanning a QR (Quick Response) code to transmit the virtual currency. In another embodiment, the virtual currency can also be transmitted through infrared. In a further embodiment, the step of confirming reception of the virtual currency may include a step of said payee deleting private key. | 02-12-2015 |
20150100494 | POINT TRANSACTION SYSTEM AND METHOD FOR MOBILE COMMUNICATION DEVICE - A point transaction system and method for mobile communication device is provided. The system includes at least an encryption chip, a plurality of function menu defined in the encryption chip, a plurality of storage devices and at least a point unit, where the encryption chip is integrated with the SIM card in an electronic communication device, the storage devices are connected respectively to the electronic communication device, and the point unit is connected to the plurality of storage devices. The method includes: a first user changes the currency to point unit at a corresponding venue and stores to an account of the user; the first user transmits the point unit stored inside the account to an account of a second user by operating a first electronic communication device; and the second user uses the point unit in the account of the second user through using a second electronic communication device. | 04-09-2015 |
20150100495 | Systems and Methods for Providing Tokenized Transaction Accounts - The disclosed embodiments include methods and systems for providing tokenized transaction accounts. In one embodiment, a computer-implemented method is provided that may include generating, by one or more processors, a first tokenized transaction account from a first transaction account associated with a first user. The method may also include providing the first tokenized transaction account to a client device associated with the first user for storage in the client device and use in transactions. The method may also include updating the first tokenized transaction account based on one or more conditions and providing the updated first tokenized transaction account to the client device for storage and use in a subsequent transaction. | 04-09-2015 |
20150112868 | DONGLE DEVICE WITH COMMUNICATION MODULE FOR A SECURE ELECTRONIC TRANSACTION - The various embodiments herein provide a dongle device with a communication module for a secure electronic transaction. The dongle device comprises housing provided with a slot for inserting a magnetic stripe card, a slot for inserting a contact type card, a communication module such as a Wireless module or a Bluetooth module or a mobile communication module or a zigbee module, a key pad, a connector, a cover for safeguarding the connector, a stylus, a universal serial bus (USB) port, a processor and a display. The communication module is a pluggable module to the dongle device. The card is read and the card data are transmitted through the supersonic frequencies or spread spectrum signals to a payment gateway server. The communication module links a transaction originated in a cloud computing server with a payment gateway server through a mobile device to complete a financial transaction. | 04-23-2015 |
20150127546 | METHODS FOR PROVIDING INTERNET SERVICES THROUGH A TOLL FREE CONNECTION TO A USER AND DEVICES THEREOF - Techniques for providing internet services to a user through a toll free connection are provided. The techniques include receiving, from an Internet Access Point (IAP), a request for the internet services through the toll free connection provided by a Cloud Service Provider (CSP), wherein the CSP is selected by the user from a plurality of CSPs. Access credentials are received from IAP and are forwarded to the selected CSP. A token is received from the CSP if the user is authenticated by the CSP based on the access credentials. The token is sent to the IAP wherein the token is used by the user to access the Internet services through the toll free connection. | 05-07-2015 |
20150302393 | ENHANCED NEAR FIELD COMMUNICATIONS ATTACHMENT - A secure fob that enables a user to pay for an item or items without needing to present a mobile device. A secure fob may include a proximity capability to ensure that a mobile device is within a particular range, thereby eliminating the risk of fraudulent charges on a stolen fob. In such an embodiment, a fob may be disabled if the fob is not paired with the mobile device by virtue of being disconnected and/or physically separated from the mobile device. The secure fob also may include enhanced features to authorize transactions and locate the mobile device and/or the secure fob. | 10-22-2015 |
20150302397 | ENCRYPTED PAYMENT TRANSACTIONS - Systems, apparatuses, and methods are provided for conducting encrypted payment transactions. In some embodiments, a payment device may send account credentials for a digital wallet to a wallet provider computer, and receive encrypted payment data from the wallet provider computer in response. The payment device may then send a request to initiate a transaction to a transaction processor computer (e.g., a merchant computer or a merchant processor computer), the request to initiate the transaction including the encrypted payment data. The transaction processor computer can then decrypt the encrypted payment data and conduct the transaction. | 10-22-2015 |
20150302506 | Method for Securing an Order or Purchase Operation Means of a Client Device | 10-22-2015 |
20150332255 | METHOD AND SYSTEM FOR TOKEN-BASED COMMUNICATION BETWEEN EXTRANEOUS APPLICATIONS AND AN ELECTRONIC WALLET - A method for token-based communication between extraneous applications and an electronic wallet includes: (1a) selecting items for storage in the core wallet by one or more extraneous application(s); (1b) sending information on the selected items to the core wallet by the extraneous application(s); (1c) displaying the selected items on the terminal by the core wallet; (1d) waiting for activation of at least one of the displayed items based on interaction of the user with the core wallet; (1e) retrieving, for each activated item, a token associated with the item in the extraneous application from which the item originates by the core wallet; and (1f) storing the tokens retrieved in step (1e) in a wallet applet installed on a secure element that is configured for wireless radio communication. | 11-19-2015 |
20150332259 | SECURE PAYMENT SYSTEM AND METHOD - A secure payment system and method are disclosed. An example secure payment system includes a vending device configured to receive a token from the customer for a transaction at the vending device. The vending device is further configured to confirm validity of the token based on a transaction index and a transaction code of the token. In response to a valid token, the vending device is configured to negotiate the transaction for the customer. In an example, the system also includes a remote payment processor to confirm payment by the customer for the transaction and issue the token to the customer, the token having the transaction index and the transaction code. | 11-19-2015 |
20150363771 | MOBILE CHECKOUT SYSTEMS AND METHODS - A mobile checkout system and method for completing a purchase transaction to purchase items from an internet merchant. A user browses and selects items for purchase from the merchant through a shopping application or browser. During the processing of the transaction, a checkout application installed on a mobile communication device is launched. The checkout application receives a checkout token created by a checkout server that identifies the purchase transaction. The checkout application uses this token and communicates with the checkout server to cause the checkout server to complete the purchase transaction, in which payment data is securely transmitted using a cryptogram. | 12-17-2015 |
20150365398 | Verifiable Tokenization - Use rules are included within tokenized data either before or after tokenization. The use rules can be appended to the data before or after tokenization, can be used to modify the data before or after tokenization, and can be used to select or generate token tables for use in tokenizing the data. The use rules limit how, where, and when the tokenized data can be used, who can use the tokenized data, and the like. In addition, data can be tokenized such that the tokenized data can be identified as tokenized based on the tokenized data failing a validation test. The data is tokenized using one or more token tables, and the validation test is applied to the tokenized data. If the tokenized data passes the validation test, the data is modified with formatting rules or re-tokenized with additional token tables until the tokenized data fails the validation test. | 12-17-2015 |
20160005031 | CRYPTOGRAPHIC LABEL FOR ATTACHMENT TO A COMMUNICATION CARD - A cryptographic label is provided for enabling a mobile communications device to perform secure communications. The label comprises a flexible printed circuit having a first set of electrical contacts disposed on a top side of the circuit for interfacing to a mobile communications device, a second set of electrical contacts disposed on a bottom side of the circuit for interfacing to a communication card, and a hardware security module disposed in the circuit and coupled to the first and second sets of electrical contacts. The label is characterised in that it further includes a skirt attached to the flexible printed circuit, the skirt having an adhesive portion on at least a bottom side thereof which, in use, bonds to a communication card to attach the label to the communication card. The skirt is capable of having printed indicia provided on a top side thereof. | 01-07-2016 |
20160005034 | ENCRYPTION AND TOKENIZATION ARCHITECTURES - Various embodiments of the present invention are directed to methods, systems and computer program products for conducting an online transaction on a website involving sensitive information. Such embodiments provide methods, systems and computer program products to: (a) register at least one entity with a gate keeper module, the registering comprising associating the entity with a subscription level; (b) associate a sub-string of a character string with a unique token so that a direct link does not exist between the unique token and the character string; and (c) during processing of the online transaction: (i) using the unique token for intermediate steps during the processing of the online transaction; and (ii) only accessing the character string in storage memory to complete the online transaction after receiving a request from at least one registered entity associated with a subscription level associated with a privilege to receive the requested sensitive information. | 01-07-2016 |
20160005036 | HCE TOKEN SECURE DELIVERY WITHOUT DATA CONNECTIVITY - Methods and apparatus, including computer program products, are provided for secure HCE token delivery. In some example embodiments, there may be provided a method, which includes determining, at a user equipment including a host card emulation payment application, whether a data service is allowed and/or available for use; selecting, based on the determining, the data service to carry a message generated by the host card emulation payment application, when the data service is allowed and/or available for use; and selecting, based on the determining, a short message service to carry the message generated by the host card emulation payment application, when the data service is not allowed and/or not available for use. The message may carry tokens, requests for tokens, and/or other information as well. Related apparatus, systems, methods, and articles are also described. | 01-07-2016 |
20160012434 | ENCRYPTION AND TOKENIZATION ARCHITECTURES | 01-14-2016 |
20160012435 | ENCRYPTION AND TOKENIZATION ARCHITECTURES | 01-14-2016 |
20160012436 | ENCRYPTION AND TOKENIZATION ARCHITECTURES | 01-14-2016 |
20160012437 | ENCRYPTION AND TOKENIZATION ARCHITECTURES | 01-14-2016 |
20160012438 | ENCRYPTION AND TOKENIZATION ARCHITECTURES | 01-14-2016 |
20160012439 | ENCRYPTION AND TOKENIZATION ARCHITECTURES | 01-14-2016 |
20160012440 | ENCRYPTION AND TOKENIZATION ARCHITECTURES | 01-14-2016 |
20160027001 | SYSTEMS FOR PROVISIONING UNIVERSAL INTEGRATED CIRCUIT CARDS - A system that incorporates the subject disclosure may include, for example, a system for receiving a request to modify a universal integrated circuit card, generating a package comprising configuration data for modifying the universal integrated circuit card, encrypting the package with a transport key to generate an encrypted package, transmitting the encrypted package to a communication device communicatively coupled to the universal integrated circuit card to provision the universal integrated circuit card, and providing a mobile network operator trusted service manager system information relating to the configuration data to enable the mobile network operator trusted service manager system to manage content and memory allocation of the universal integrated circuit card. Other embodiments are disclosed. | 01-28-2016 |
20160027003 | PERSONAL TOKEN READ SYSTEM AND METHOD - A system for facilitating secure transactions between a purchaser and a vendor is provided. The system might include a purchaser token data capture device for reading token data into the system, an encryption module for encrypting the token data and a network based vendor input form for communicating the encrypted token data to the vendor. The system might further include a purchaser terminal for routing the encrypted token data to a transaction processing network or a vendor for providing payment and confirmation to the vendor of an authorized token. | 01-28-2016 |
20160027013 | Wireless Data Communication Interface - In some embodiments, the rendering a financial transaction record in a second format includes converting a tokenized first item of financial transaction information to an account-specific item of financial transaction information using an account identifier associated with the tokenized first item in a registry stored in a secured account data vault. In some embodiments, the system includes a transaction execution module for transmitting in the second format the first item of financial transaction information for payment processing by the first external financial party, wherein the second format includes the financial transaction information using the account identifier associated with the tokenized first item in a registry stored in a secured account data vault, and transmitting in the third format the second item of financial transaction information for payment processing by the second external financial party. | 01-28-2016 |
20160034877 | SYSTEM AND METHOD FOR PROVIDING CONTACTLESS PAYMENT WITH A NEAR FIELD COMMUNICATIONS ATTACHMENT - A system and method in accordance with exemplary embodiments may include an attachment with a near field communication antenna, a secure element, a plug capable of connecting the attachment to an audio jack on a mobile device. Further, a system and method in accordance with exemplary embodiments may include receiving a payment initiation instruction from a customer, using a near field communication antenna, sending payment information to a point of sale device, using one or more computer processors, encoding data related to the payment as audio data, and transmitting the data related to the payment through an audio jack. | 02-04-2016 |
20160055482 | Tokenization in Mobile Environments - Data can be protected in mobile and payment environments through various tokenization operations. A mobile device can tokenize communication data based on device information and session information associated with the mobile device. A payment terminal can tokenize payment information received at the payment terminal during a transaction based on transaction information associated with the transaction. Payment data tokenized first a first set of token tables and according to a first set of tokenization parameters by a first payment entity can be detokenized or re-tokenized with a second set of token tables and according to a second set of tokenization parameters. Payment information can be tokenized and sent to a mobile device as a token card based on one or more selected use rules, and a user can request a transaction based on the token card. The transaction can be authorized if the transaction satisfies the selected use rules. | 02-25-2016 |
20160071095 | REQUESTING PAYMENTS FOR SELECTED ITEMS OR SERVICES USING PAYMENT TOKENS - There are provided systems and methods for requesting payment for selected items or services using payment tokens. A first user, such as a requester for a transaction, may initiate a transaction with a merchant for at least one item or service. Upon checkout for the transaction, the first user may request that a second user complete payment for the transaction, such as a parent, spouse, or relative. A payment provider may generate a token for the transaction and instruct the merchant to hold the transaction for a period of time. The token may be communicated to the second user, a payer, for the transaction. The second user may then decide to authorize or decline payment for the transaction. The token may be kept valid for a period of time and the transaction may be cancelled with the merchant if the token is not paid for within the period. | 03-10-2016 |
20160092872 | Transaction Risk Based Token - Embodiments of the invention provision multiple payment tokens on a communication device. The communication device may be provisioned with multiple limited use keys (LUK), each LUK being associated with a specific type of transaction. When the communication device is used for a transaction, the communication device automatically determines a type of the transaction and selects an appropriate LUK based on the determined transaction type. The selected LUK may be used to create a cryptogram, which can be used to verify the transaction. | 03-31-2016 |
20160104155 | SYSTEMS FOR PROCESSING ELECTRONIC TRANSACTIONS - A computer-implemented platform ( | 04-14-2016 |
20160148177 | Method and System for Pushing Payment or Account Information to Multiple Retail and Payment Sites - Novel tools and techniques are provided for implementing automatic updating or pushing of credit card data, other payment information, and/or personal data to multiple retail and payment sites (collectively, “vendor websites”). In some embodiments, a method might include providing a user interface to a user device associated with a user via an account management application running on the user device. The user interface might receive, from the user, a first set of inputs comprising instructions to push payment information and a second set of inputs comprising instructions indicating two or more user accounts for at least two vendor websites with which the payment information is to be updated. The account management application or a server computer subsequently automatically concurrently pushes the payment information to the two or more user accounts, in response to receiving the first and second sets of inputs from the user. | 05-26-2016 |
20160162891 | Unlinkable Priced Oblivious Transfer with Rechargeable Wallets - A protocol that allows customers to buy database records while remaining fully anonymous, i.e. the database server does not learn who purchases a record, and cannot link purchases by the same customer; the database server does not learn which record is being purchased, nor the price of the record that is being purchased; the customer can only obtain a single record per purchase, and cannot spend more than his account balance; the database server does not learn the customer's remaining balance. In the protocol customers keep track of their own balances, rather than leaving this to the database server. The protocol allows customers to anonymously recharge their balances. | 06-09-2016 |
20160180334 | Email address token integration | 06-23-2016 |
20160189144 | ALTERNATIVE PAYMENT METHOD FOR ONLINE TRANSACTIONS USING INTERACTIVE VOICE RESPONSE - A method for performing payments in remote transactions between a buyer and a vendor is provided. The method includes receiving buyer information from a vendor's network outlet when the buyer indicates a desire to purchase a selection at a later time through an Interactive Voice Response (IVR) center; providing a token to the buyer; receiving information about the token from the buyer through the IVR center; verifying the information about the token; transferring funds from a buyer account to a vendor account. Also provided is a system for processing payments in remote transactions including an IVR center to: receive a request for token from a buyer to purchase products from a vendor, and to receive information about the product; provide the token to the buyer; access a database, the database including information from vendor's and buyer's accounts; transfer funds from buyer's account to vendor's account upon buyer confirmation. | 06-30-2016 |
20160203463 | MOBILE CARD SHARING SERVICE METHOD AND SYSTEM WITH ENHANCED SECURITY | 07-14-2016 |
20190147553 | STORING LINKED LISTS OF MINERAL RIGHTS TRANSACTIONS IN DIRECTED ACYCLIC GRAPHS OF CRYPTOGRAPHIC HASH POINTERS | 05-16-2019 |