Class / Patent application number | Description | Number of patent applications / Date published |
705066000 | Intelligent token initializing or reloading | 38 |
20080243702 | Tokens Usable in Value-Based Transactions - Techniques for generating a token that can be used to transfer value. The token may be used to transfer value in a value-based transaction with a vendor in a way that is secure and safe and maintains anonymity of the source of the value and preserves secrecy of information that should preferably not be disclosed to an untrusted third party such as a vendor. The token comprises sufficient information that enables value to be transferred from an account associated with the token to a vendor during a value-based transaction. Such a token may be presented by a user to a vendor in a value-based transaction with the purpose of transferring value involved in the transaction to the vendor in order to complete the transaction. | 10-02-2008 |
20080313087 | AUTOMATED TELLER MACHINE HAVING ACCESS POINT AND METHOD FOR PROVIDING FINANCIAL SERVICE USING THE SAME - An automated teller machine (ATM) having a wireless network access apparatus and a method for providing financial services using the ATM are provided. The ATM includes a user interface unit, a first financial processing unit, a first network access unit, a second network access unit, and a second financial service unit. The user interface unit performs data communication with a storage medium on which information is recorded, and outputs information to a user through an output apparatus. The first financial processing unit provides financial services including account inquiry, deposit, and withdrawal, by performing data communication processes with a recognized storage medium. The first network access unit is connected to an ATM network connected to a financial institution server, transmits data obtained as a result of performing financial services, to the financial institution server, and receives processed data from the financial institution server. The second network access unit is connected to an access point establishing a communication path for a wireless communication terminal of the user traveling in a predetermined communication area, and activating wireless communication. The second financial service unit performs data communication with the wireless communication terminal of the user through the access point, and provides at least one or more of financial services, digital token delivery service, and V2oIP service. | 12-18-2008 |
20090030842 | SMART CARD PURCHASING TRANSACTIONS USING WIRELESS TELECOMMUNICATIONS NETWORK - A smart card transaction allows a consumer to load value onto a smart card and to make purchases using a smart card with a mobile telephone handset over the telecommunications network. For loading, the system includes: a mobile telephone handset including a card reader; a gateway computer; a funds issuer computer; and an authentication computer. The mobile telephone handset receives a request from a user to load a value onto the smart card. The handset generates a funds request message which includes the value and sends the funds request message to a funds issuer computer. The funds issuer computer debits an account associated with the user. Next, the handset generates a load request message with a cryptographic signature and sends the load request message to an authentication computer which authenticates the smart card. The handset receives a response message which includes a cryptographic signature and an approval to load. Finally, the handset validates the second cryptographic signature and loads the value onto the smart card. For payment, the system includes a merchant server and a payment server. First, the handset sends an order request message to the merchant server computer, and in return receives a purchase instruction message. The handset processes the purchase instruction message locally, and then sends a draw request message to a payment server computer. The payment server computer sends a debit message which includes a cryptographic signature and an approval to debit the smart card. Finally, the handset validates the cryptographic signature and debits the smart card. | 01-29-2009 |
20090055323 | System and method for providing custom personal identification numbers at point of sale - Allowing an account holder for a newly-established financial card account to establish a PIN at the time the financial card account is opened and use that PIN to authenticate transactions at the time the account is opened. The systems and methods may include a POS device that securely captures and encrypts a custom PIN, that is, a PIN supplied by the customer for a new financial card account. The systems and methods would also include a transaction processing system that receives an encrypted PIN, along with customer information about a new financial card account, and processes that information and encrypted PIN to establish a new account. As a result of this processing, an authorization platform would receive information necessary to authenticate a user and authorize a transaction. Through these systems and methods, a customer would be able to use the custom PIN to authenticate a transaction at the time the new account is opened. | 02-26-2009 |
20090070270 | SYSTEM AND METHOD FOR PURCHASE BENEFITS AT A POINT OF SALE - A system and method of providing users with an accessible system and convenient method for conducting purchase benefit transactions. When enrolling in a biometric authorization system, a user may authorize the system to apply for purchase benefits on the user's behalf at subsequent transactions. | 03-12-2009 |
20090106158 | Conducting Financial Transactions - A payment device such as a debit card may be issued to an individual such as a minor. The debit card may be associated with spending control parameters to prevent overspending and other financial issues. Control parameters may include a weekly maximum that may be spent, approved transaction types (e.g., deposits only), authorized transaction entities (e.g., grocery stores, gas stations, etc.). Thus, transaction might only be approved if the transaction qualifies under the set control parameters. An individual may further access a banking interface that allows the individual to view financial education materials, games, savings trackers and the like. A savings tracker may be used to help an individual save money toward a particular goal. In one or more configurations, a parent, guardian or primary account holder may have the ability to modify control settings of the payment device and/or modify the banking interface (e.g., change the options available). | 04-23-2009 |
20090177584 | Digital card cd/dvd with contacless microcomputer chip for transportation systems - A digital card | 07-09-2009 |
20090182673 | TOKEN BASED NEW DIGITAL CASH PROTOCOLS WITH COMBINED BLIND DIGITAL SIGNATURE AND PSEUDONYM AUTHENTICATION - Digital cash token protocols use a combination of blind digital signatures and pseudonym authentication with at least two pairs of public and private keys. A user is provided with one master pair of private and public keys and as many pseudonym pairs of private and public keys as desired. The resulting digital cash token based hybrid protocols combine the advantages of blind digital signature and pseudonym authentication. Blind digital signatures based on the master pair of keys are used to withdraw digital cash from the user's bank account under the user's real identity. A pseudonym pair of keys is used for converting digital cash into digital cash tokens by a digital cash issuer. All pseudonyms can be used for spending the digital cash tokens. These protocols ensure anonymity when withdrawing digital cash from the user's account under the user's real identity in addition to providing pseudonym authentication when spending digital cash tokens under a pseudonym. | 07-16-2009 |
20090187507 | SECURE FINANCIAL TRANSACTION NETWORK - A secure financial transaction network works with payment cards that includes a magnetic device readable by a legacy card reader that presents dynamic magnetic data such that each use of an individual card produces a cryptographic series of variations of a respective user access code according to an encryption program seeded with secret encryption keys or initialization vectors. Data processing generates a cryptographic series of variations of respective user access codes for each and all of the plurality of payment cards, to transmit to third parties for payment card manufacturing only tables of said cryptographic series of variations of respective user access code and not said secret encryption keys or initialization vectors, and to authorize financial transaction requests from a payments processor if a user access code it receives in a transaction request is a member of said cryptographic series of variations of respective user access codes for the particular one of the plurality of payment cards. | 07-23-2009 |
20090198618 | DEVICE AND METHOD FOR LOADING MANAGING AND USING SMARTCARD AUTHENTICATION TOKEN AND DIGITAL CERTIFICATES IN E-COMMERCE - Device, system, and method for loading, managing and using smartcard authentication token and digital certificates in e-commerce. System for making and accepting payments in on-line transaction between parties including transaction server coupled with storage device in which subscriber data structure is defined and stores transaction subscriber information and configured to communicate via network with certificate issuer and with card issuer. Computer implemented method for making and accepting payments in online transaction. Computer implemented method of issuing authentication certificate. Authentication token (smart card or SIM card) apparatus. Device for performing reading and/or writing operation to dual media smart card and SIM cards. Device, system, and method for using unique digital values to prevent fraudulent access or use of authentication token embedded with security digital certificate. System and method and business model for enabling payments to be made using Internet on secure basis using certificates and transaction facilitator payments portal. | 08-06-2009 |
20090292641 | UNIVERSAL SECURE REGISTRY - In one embodiment, a user device is configured to allow a user to select any one of a plurality of accounts associated with the user to employ in a financial transaction. In one embodiment, the user device includes a biometric sensor configured to receive a biometric input provided by the user, a user interface configured to receive a user input including secret information known to the user and identifying information concerning an account selected by the user from the plurality of accounts. In a further embodiment, the user device includes a communication link configured to communicate with a secure registry, and a processor coupled to the biometric sensor to receive information concerning the biometric input, the user interface, and the communication link. According to one embodiment, the processor is configured to generate a non-predictable value and to generate encrypted authentication information from the non-predictable value, the identifying information, and at least one of the information concerning the biometric input and the secret information, and to communicate the encrypted authentication information via the communication link to the secure registry. | 11-26-2009 |
20090319431 | Using Smartcards to Enable Probabilistic Transactions on an Untrusted Device - The present intention permits a user to conduct remote transactions without a network while using an untrusted computing device, such as a hand held personal digital assistant or a laptop computer. The computing device is augmented with a smartcard reader, and the user obtains a smartcard and connects it to the device. This design can be used by an untrusted user to perform financial transactions, such as placing bets on the outcome of a probabilistic computation. Protocols are presented for adding (purchasing) or removing (selling) value on the smartcard, again without requiring a network connection. Using the instant protocols, neither the user nor the entity issuing the smartcards can benefit from cheating. | 12-24-2009 |
20100131413 | METHODS AND SYSTEMS TO SECURELY LOARD / RELOAD A CONTACTLESS PAYMENT DEVICE - Embodiments allow loading and reloading contactless payment devices using only a contactless terminal interface, while providing user authentication. The contactless terminal interface could be at a merchant POS location, kiosk, or embedded or attached to a personal computing device with contactless read/write capability such as a personal computer or mobile phone or Internet device. | 05-27-2010 |
20110153502 | SYSTEMS, METHODS, AND APPARATUS FOR IDENTIFYING INFLUENTIAL INDIVIDUALS - In some embodiments, a method includes adding at least one virtual token to an account associated with a user of a token server, upon initial association of the user with the token server. The token server can be configured to transfer virtual tokens to and from accounts associated with a plurality of users. The token server can be accessible by one or more electronic devices in communication with the token server via a network. At least one virtual token can be transferred from an account associated with a first user of the token server to an account associated with a second user of the token server based upon a request received from the first user of the token server via an electronic device. The transferred virtual token can be associated, for example, with a popularity rating of the user receiving the virtual token. | 06-23-2011 |
20120023024 | Programmable Card - Embodiments of the invention are directed to programming a payment device that can be in the same form factor as a typical credit or debit card and which can be programmed and reprogrammed with various payment profiles. The payment device is interfaced with a mobile device, such as through insertion into a module capable of holding the payment device within proximity to a main housing of the mobile device. The payment device can include both a magnetic stripe and an IC chip which is capable of near field communication. In embodiments of the invention, the mobile device, such as a cellular phone, includes a memory element. The memory element securely stores payment profiles of financial accounts which are commonly found on credit, debit, gift, transit and loyalty cards. When a payment profile stored in the memory element of the mobile phone is selected, the mobile phone writes the profile onto the payment device. The payment device can then be utilized to communicate payment profile information to a payment device reader during contact or contactless transaction. | 01-26-2012 |
20120136795 | Smart Card Loading Transactions Using Wireless Telecommunications Network - Smart card transactions allow consumers to load value onto and make purchases using smart cards with a mobile telephone handset over the telecommunications network. To load the smart card, the handset receives a request to load value. The handset generates a funds request message and sends the message to a funds issuer computer that debits a user account. Next, the handset authenticates the smart card and receives a response message including approval to load. The handset validates the response and loads the value onto the smart card. For payment, the handset sends an order request message to the merchant server computer, and in return receives a purchase instruction message. The handset processes the message locally, and sends a draw request message to a payment server computer. The payment server computer sends an approval to debit the smart card. The handset validates the approval and debits the smart card. | 05-31-2012 |
20120284194 | SECURE CARD-BASED TRANSACTIONS USING MOBILE PHONES OR OTHER MOBILE DEVICES - A “Portable Card Generator” is implemented within a portable device, such as a mobile phone, and provides various techniques for writing secure account information from user selected accounts to a “wildcard” having rewritable magnetic stripes, rewritable RFID tags, and/or rewritable smartcard circuitry. The account information is retrieved by the portable device from local or remote stores of user accounts. Once that account information is written, the wildcard is then available for immediate use for credit card or debit-type payments, loyalty card use, etc. Consequently, by providing a credit card sized object having a rewriteable magnetic stripe, RFID tag, and/or smartcard circuitry, in combination with account information for various credit cards, debit cards, consumer loyalty cards, insurance cards, ID cards or badges, etc., the user is no longer required to physically carry those cards in order to use the corresponding accounts within existing card-based infrastructures. | 11-08-2012 |
20130031006 | PASSING PAYMENT TOKENS THROUGH AN HOP / SOP - Embodiments of the invention are directed to methods, a computer-readable medium, servers and systems for enabling merchants to pass payment tokens, instead of actual payment information, to third party HOPs and SOPs. This, for example, enables a merchant to charge a consumer, such as on a recurring basis or for a one-off purchase, without having the consumer enter payment information each time and without the merchant actually having to handle payment information. As such, merchants can avoid costs and responsibilities associated with handling and storing consumer payment data, while at the same time it also gives merchants the benefit of engaging in purchase transactions with consumers without requiring that the consumers reenter payment data each time they want to make a purchase. | 01-31-2013 |
20130159194 | SYSTEMS AND METHODS FOR AUTHENTICATING BENEFIT RECIPIENTS - Remote authentication that allows a previously enrolled individual to be remotely authenticated and provided with a benefit from a first party payor through a third-party agent. Remote authentication may include biometric authentication including voice biometric authentication. Use of an authorization token to prove current eligibility to receive a benefit transfer from a third-party agent that is not going to perform an independent biometric authentication. Processes for beneficiaries with a bank account and those without a bank account are disclosed. | 06-20-2013 |
20130191288 | Smart Card Loading Transactions Using Wireless Telecommunications Network - Smart card transactions allow consumers to load value onto and make purchases using smart cards with a mobile telephone handset over the telecommunications network. To load the smart card, the handset receives a request to load value. The handset generates a funds request message and sends the message to a funds issuer computer that debits a user account. Next, the handset authenticates the smart card and receives a response message including approval to load. The handset validates the response and loads the value onto the smart card. For payment, the handset sends an order request message to the merchant server computer, and in return receives a purchase instruction message. The handset processes the message locally, and sends a draw request message to a payment server computer. The payment server computer sends an approval to debit the smart card. The handset validates the approval and debits the smart card. | 07-25-2013 |
20130311380 | NETWORK TRANSACTIONS - A system and method which enable online network participants to enter into transactions with each other are provided. Accounts are maintained for first and second network participants, and an authentication token is generated that is associated with the account of the first network participant. The first network participant may use the authentication token in a transaction request, and the transaction request can then be applied to the accounts of both participants. | 11-21-2013 |
20140279553 | VENDOR TOKEN GENERATOR - A method for generating tokens for use in an email-based e-commerce transaction between third party vendor and a customer that is facilitated by a payment server is disclosed. The method may comprise generating a token for use with an email checkout, wherein the token comprises a customer name, and customer email address. The processor may generate an email message for at least one recipient, the email message including a mailto hyperlink including the token, wherein the mailto hyperlink generates an email response message addressed to the payment server including the token. The method may comprise receiving a notification from the payment server indicating that the at least one recipient that the email response message was successfully received by the payment server and the email-based e-commerce transaction is successful. | 09-18-2014 |
20140379583 | SMART CARD LOADING TRANSACTIONS USING WIRELESS TELECOMMUNICATIONS NETWORK - A smart card transaction allows a consumer to load value onto a smart card and to make purchases using a smart card with a mobile telephone handset over the telecommunications network. For loading, the system includes: a mobile telephone handset including a card reader; a gateway computer; a funds issuer computer; and an authentication computer. The mobile telephone handset receives a request from a user to load a value onto the smart card. The handset generates a funds request message which includes the value and sends the funds request message to a funds issuer computer. The funds issuer computer debits an account associated with the user. Next, the handset generates a load request message with a cryptographic signature and sends the load request message to an authentication computer which authenticates the smart card. The handset receives a response message which includes a cryptographic signature and an approval to load. Finally, the handset validates the second cryptographic signature and loads the value onto the smart card. For payment, the system includes a merchant server and a payment server. First, the handset sends an order request message to the merchant server computer, and in return receives a purchase instruction message. The handset processes the purchase instruction message locally, and then sends a draw request message to a payment server computer. The payment server computer sends a debit message which includes a cryptographic signature and an approval to debit the smart card. Finally, the handset validates the cryptographic signature and debits the smart card. | 12-25-2014 |
20150134536 | Mobile terminal and method and system for inquiring information of intelligent card - Described is a mobile terminal. The mobile terminal includes: a SIM card identity registration module, configured to acquire registration information of a user; a security management module, configured to encrypt the registration information to acquire encrypted registration information; and a NFC authentication module, configured to acquire and transmit information about an intelligent card to the security management module which is also configured to decrypt the encrypted registration information to acquire the decrypted information, match the information about the intelligent card with the decrypted information, and if the matching is successful, output a balance and/or transaction information stored in the intelligent card. Described also is a method and a system for inquiring information stored in an intelligent card by using a mobile terminal. With what described, the balance and the transaction information in the intelligent card can be quickly inquired through the mobile terminal by using NFC communication technology. | 05-14-2015 |
20150363770 | Cryptocurrency Transaction Payment System - A system comprises a memory operable to store a customer account associated with a customer and a processor communicatively coupled to the memory. The processor is able encode cryptocurrency information associated with the customer account onto a payment instrument. The processor is also able to receive a request for a cryptocurrency transaction from the customer using the payment instrument. In response to receiving the request, the processor is able to determine cryptocurrency information associated with the customer account and determine cryptocurrency information associated with a recipient. The processor is further able to associate the first amount of cryptocurrency with the customer account and initiate a transfer of the first amount of cryptocurrency to an account associated with the recipient. | 12-17-2015 |
20160071094 | SYSTEMS AND METHODS FOR IMPLEMENTING HYBRID DYNAMIC WALLET TOKENS - A system or method may be provided to implement dynamic hybrid wallet tokens. A payment network architecture may be established to allow a payment service provider to implement seamless flow of payment transactions. Hybrid dynamic wallet tokens may be morphed with additional information based on the types of transactions to be performed and may be communicated over industry payment networks. In particular, the payment service provider may use Industry Standard BINs as tokens to transmit information in lieu of actual funding source information to all interacting parties with the provision of securely allowing each party to de-tokenize via secure connection from the backend to identify the true funding instrument only when needed. | 03-10-2016 |
20160078423 | SYSTEM AND METHOD FOR POINT OF SALE PRODUCT SOFTWARE ENHANCEMENT - A point-of-sale (POS) product enhancement system for the creation of enhanced software features in products at the POS. The POS product enhancement system comprising at least one register and contactless POS terminal operated by a retailer at a retail location and a central server operated by a central server company at a remote location. The register is configured for identifying a product, indicating one or more enhancements available for the product, and receiving indication of a selected enhancement from the customer. The contactless read/write terminal is in communication with the register and configured for receiving a PEA (product creation authorization) token for the selected enhancement, validating the PEA token and executing the enhancement of the product via an RFID tag coupled to the product, generating an audit record of the enhancement of the product, and sending the audit record from the contactless POS terminal to the central server. | 03-17-2016 |
20160086169 | AUTOMATED CUSTOMER ASSISTANCE PROCESS FOR TOKENIZED PAYMENT SERVICES | 03-24-2016 |
20160092988 | SYSTEMS AND METHODS FOR TRANSFERRING DIGITAL ASSESTS USING A DE-CENTRALIZED EXCHANGE - Systems and methods for transferring digital assets amongst a network of distributed users without the need to transfer the assets to an external party, such as an escrow agent, are provided. The transferring of assets may be in the form of electronic transactions between pluralities of currencies or assets. Temporary and localized escrow services may be created on a user terminal for safely overseeing the process of transferring digital assets. The trade instructions and execution orders for the transfer of assets may be validated over a de-centralized network of user terminals, such as the user terminals of traders. This type of network allows secure peer-to-peer electronic transactions to occur between distributed and anonymous users or participants, which are assumed to be trustless. In such networks, the transactions may be handled by cryptographic mathematical algorithms and which are known to be identical across all users or participants of the same network. | 03-31-2016 |
20160104153 | CONFIGURABLE PAYMENT TOKENS - Methods and systems are disclosed for the generation and use of merchant-customizable token formats that define tokens that represent credit card and other payment numbers in online transactions. The tokens, which are used instead of the card numbers themselves for security, can be specified by the token format to have a certain number of characters, have certain fields reserved for major card identifiers, use encryption and/or randomization, be alphanumeric, and have other formatting. The customized tokens can be used with legacy equipment that uses longer or shorter card numbers than the standard sixteen-digit payment card number format and can be less likely to be recognized as related to card numbers by identify thieves. | 04-14-2016 |
20160125397 | Systems for Storing Cardholder Data and Processing Transactions - Systems and methods for storing cardholder data and processing transactions are provided. Cardholder data is received at a server computer, the cardholder data including consumer credentials to be stored and at least one data item not to be stored. A unique consumer reference token is obtained and combined with the data item not to be stored and the combination encrypted to form an encrypted token. The encrypted token is transmitted to a third party for storage and is erased from the server computer. At the time of transaction, the encrypted token is received and decrypted to yield the data item not to be stored, so that a transaction can be initiated using stored consumer credentials and the data item not to be stored. The unique consumer reference token encrypted together with the data item enables the server computer to perform validation checks on the encrypted token. | 05-05-2016 |
20160155117 | ENABLING PAYMENTS TO BE PROCESSED BY ONLY ONE MERCHANT | 06-02-2016 |
20160162871 | TRAVEL ACCOUNT - A user can set up a travel account with a payment provider, to inform the payment provider of expected dates and locations of travel, along with limits or restrictions at the various locations and/or dates. When the user travels and attempts to make a payment, the payment provider can determine the location and date to aid in processing the payment request, resulting in an easier process for the user, while still providing additional security with the limits and restrictions. | 06-09-2016 |
20160162884 | ONLINE BANKING DIGITAL WALLET MANAGEMENT - Embodiments are directed to digital wallet management. Embodiments initiate presentation of a digital wallet management interface, comprising initiating presentation of at least one digital wallet; and initiating presentation of at least one representation of at least one payment credential and at least one indication of which of the at least one digital wallets are associated with each of the at least one payment credentials. | 06-09-2016 |
20160162885 | ONLINE BANKING DIGITAL WALLET MANAGEMENT - Embodiments are directed to digital wallet management. Embodiments initiate presentation of a digital wallet management interface, comprising initiating presentation of at least one digital wallet; and initiating presentation of at least one representation of at least one payment credential and at least one indication of which of the at least one digital wallets are associated with each of the at least one payment credentials. | 06-09-2016 |
20160203451 | SYSTEM AND METHOD FOR PROVIDING CONTROLLING SURCHARGE FEES CHARGED AT A COLLECTION OF ATMS | 07-14-2016 |
20160203475 | METHOD AND SYSTEM FOR MAKING A SECURE PAYMENT TRANSACTION | 07-14-2016 |
20160379203 | METHOD OF GENERATING A BANK TRANSACTION REQUEST FOR A MOBILE TERMINAL HAVING A SECURE MODULE - The invention provides a method of generating a bank transaction request and a mobile payment terminal hosting a payment application using a secure token for the transaction request and including a secure module. The method comprises the payment application executing a payment protocol with a trader application in order to generate the transaction request, and the payment application requesting an authorization cryptogram from an encryption application hosted in the secure module for verifying authorization of the transaction request in compliance with the payment protocol. The invention also provides the mobile terminal hosting the payment application and including a secure module hosting the encryption application. | 12-29-2016 |