Entries |
Document | Title | Date |
20080228654 | NETWORK INDEPENDENT LOCATION SERVICES - Techniques for supporting network independent location services (LCS) are described. In one design, a location center may communicate with a terminal to establish an account for the terminal with the location center for location services. The location center may establish the account for the terminal independent of a home network or a serving network for the terminal. During signup to establish the account, the location center may (i) provide address information for the location center, security information, and/or other information for the location center and (ii) receive public identity information and/or other information for the terminal. The location center may thereafter provide location services to the terminal based on the established account and without interacting with the home or serving network for the terminal. Techniques for supporting delivery of assistance data are also described. | 09-18-2008 |
20080281759 | System and Method for Registration Control - The invention concerns a control unit ( | 11-13-2008 |
20080288413 | Method for the Automatic Generation and Processing of an Invoice Document - The invention relates to a method for automated invoice generation and settlement from a payer ( | 11-20-2008 |
20080301057 | Online Commercial Transaction System and Method of Operation Thereof - A system for conducting commercial transactions comprises an application server that hosts a software application that can be accessed by users to conduct commercial transactions thereon, an application user database of authorised users capable of accessing the application server, each authorised user in the application user database being uniquely identifiable by means of corresponding login name and password, and a proxy server communicable with the application server and accessible by a plurality of registered users from respective mobile phones The proxy server provides each one of the plurality of registered users with access to the application server from that user's respective mobile phone. A proxy database is associated with the proxy server, the proxy database containing details of authorised users in the application user database who are also registered to access the application server through the proxy server from their respective mobile phones. Each registered user in the proxy database is uniquely identifiable by means of a corresponding user identification code, the proxy database also providing, for each registered user, a mapping of that user's user identification code and the user's corresponding user information contained in the application user database. The proxy database stores each registered user's corresponding user information in encrypted format, and the system includes a encryption engine capable of encrypting any data passed between the proxy server and the mobile phone of each registered user. The proxy database also stores an active encryption key for each registered user, the active encryption key being used by the encryption engine to encrypt and decrypt data passed between the proxy server and the user's mobile access terminal. The encryption engine is dynamic, using a different encryption key during each session in which the user accesses the application server from his respective mobile phone, the encryption engine generating, during each session, a further encryption key for the user and transferring the further encryption key to the user's mobile phone for storage therein. | 12-04-2008 |
20080306875 | METHOD AND SYSTEM FOR SECURE NETWORK CONNECTION - Methods and systems for secure payment via a network are disclosed. In an example embodiment, a system includes components to receive a globally unique identifier (GUID) and a client-hello message from a client, generate a tag and sending the tag and a server hello message to the client, receive the tag, a client-key-exchange message, a change-c-spec message, an encrypted-finished message, and secured payload from the client, and send an encrypted-finished message and secured response payload to the client. | 12-11-2008 |
20090030845 | SYSTEM AND METHOD FOR ACCOUNT IDENTIFIER OBFUSCATION - A method is disclosed. The method includes generating an obfuscated portion using a dynamic cryptogram unique to a transaction, where the dynamic cryptogram is determined using a uniquely derived key. The method also includes replacing a middle portion of the account identifier with the obfuscated portion to form an obfuscated account identifier. | 01-29-2009 |
20090083190 | System and Method for Electronic Bidding - In an electronic bidding system and method, it is unnecessary to disclose to bidders a list of public keys matched to bid prices, and in which price secrecy may be proved. In a function of encryption of a bidding device | 03-26-2009 |
20090144204 | MODULE ID BASED TARGETED MARKETING - A server is operable to receive a media device identifying number (ID) and establish an association between a media device and a payment account and, in one embodiment, supports at least one of payment authorization and payment clearing based at least in part on the media device ID and the payment account. A network and system includes a payment card processor server that is operable to receive a payment authorization request and to determine if an authorized media device generated a purchase selection message and to determine to approve a received payment authorization request based, in part, if the media device was authorized for the purchase selection based upon a received media device ID. The system is further operable to perform a key rotation to protect payment account information. | 06-04-2009 |
20090150295 | VALIDATION SERVICE FOR PAYMENT CARDS WITH PRELOADED DYNAMIC CARD VERIFICATION VALUES - QSecure Validation Service (QVS™) is part of the QSecure Suite and includes a CVQ Table Generator (QTG) for use with a QBox™ card personalizer. In general, the QVS/QVM compares dynamic CVQ token data fetched by an issuer authorization host from a transaction then occurring in the field. An array of acceptable CVQ values computed in real-time from the original keys and algorithms used by the QTG and QBox to personalize the particular card are applied in the comparison. There is an order to the CVQ values in such array, and the dynamic CVQ token data will step through these over time. Small deviations in the order actually received can normally occur for reasons other than fraud, so a moving window of acceptance is needed to cope with normal deviations. A running account of which CVQ values have already been used is maintained for, or by, the QVS, and these help predict where the acceptance window should next be positioned in the array of acceptable CVQ values. | 06-11-2009 |
20090171850 | TRANSACTION AUTHENTICATION PLATFORM USING VIDEO - A transaction authentication platform using video is provided. In an illustrative implementation, a computing environment comprises a video transaction authentication engine and an instruction set comprising at least one instruction to the video transaction authentication to process, store, manage, and monitor data representative of video transaction authentication requests to generate a trust capsule representative of video authentication trust for a consumer. Consumers, merchants, and transaction processors can illustratively cooperate with the video transaction authentication engine as part of transaction fulfillment and reconciliation. Illustratively, a merchant can request generated trust capsule data for a consumer and compare the received data with the consumer at the point of sale to determine whether to fulfill a transaction. Additionally, the video data about a consumer can be captured at the point of sale and stored as part of a transaction dispute resolution process. | 07-02-2009 |
20090198619 | AGGREGATED HASH-CHAIN MICROPAYMENT SYSTEM - Disclosed are a system and method for aggregating micropayment hash chains. An end user (the “payer”) cryptographically signs “commitments” and transmits then to a vendor. The commitments include an “accumulated count” field which tracks the total number of micropayments made thus far in the payment transaction between the payer and the vendor. The payer can also transmit payment tokens to the vendor. These payment tokens include micropayments verified by a hash chain. When the vendor seeks reimbursement from a broker, the vendor tells the broker the total number of micropayments in the payment transaction and sends verification information to the broker. The broker checks this information against a verification system established with the payer. If the information is verified to be correct, then the broker reimburses the vendor for the services provided and charges the payer. The verification information ensures that the payer and vendor cannot cheat each other. | 08-06-2009 |
20090216679 | METHOD AND SYSTEM FOR VALIDATING A DEVICE THAT USES A DYNAMIC IDENTIFIER - A method that comprises obtaining a currently received signature from a device; obtaining a candidate identifier associated with the device; consulting a database to obtain a set of previously received signatures associated with the candidate identifier; and validating the currently received signature based on a comparison of the currently received signature to the set of previously received signatures associated with the candidate identifier. Also, a method that comprises obtaining a currently received signature from a device; decrypting the currently received signature to obtain a candidate identifier; and a candidate scrambling code; consulting a database to obtain a set of previously received scrambling codes associated with the candidate identifier; and validating the currently received signature based on a comparison of the candidate scrambling code to the set of previously received scrambling codes associated with the candidate identifier. | 08-27-2009 |
20090222383 | Secure Financial Reader Architecture - Methods and systems are provided for secure transaction processing. A secure processor may include an integrated wireless card reader and optionally a secure memory. When a request for payment information associated with an on-line transaction is received, the integrated wireless card reader reads data from the payment card. The secure processor may retrieve a set of transaction identifiers from the payment card issuer or optionally a trusted third party. The secure processor transmits one of the retrieve transaction identifiers to the on-line merchant instead of payment card data. The on-line merchant communicates the transaction identifier to the payment card issuer or the trusted third party for validation. Alternatively, the secure processor may encrypt the read payment card data utilizing the payment card number as the shared secret required by the cryptographic algorithm. The secure processor then forwards the encrypted payment card data to the on-line merchant. | 09-03-2009 |
20090248582 | System to enable a telecom operator provide financial transactions services and methodsfor implementing such transactions - The invention relates to a system, enabling subscribers of a wireless Telecom Operator to execute financial transactions with a mobile phone, or an electronic device which can be connected to the wireless communication network, wherein a subscriber has one or several Financial Transaction Accounts open and managed by the Telecom Operator, which can receive monetary deposits, and on which debit and credit operations can be executed. The system is composed of a Transaction Processing Platform, which is installed on the computers of the Telecom Operator, is connected to the wireless communication network, is interfaced with other elements of the Telecom Operator, manages the Financial Transactions Accounts, verifies/executes financial transactions sent by the subscribers, and executes other tasks like confirmations of transactions, account statement preparation, reporting, etc. The system is also composed of a client software that runs on the Mobile Phone of the subscriber or his connectable electronic device or on the Subscriber Identify Module which is inserted in the mobile phone or connectable electronic device. Such client software enables the subscriber to prepare, validate and send through the wireless communication network, transactions orders to the Transaction Processing Platform. | 10-01-2009 |
20090254485 | METHOD AND SYSTEM FOR ANONYMOUS ELECTRONIC TRANSACTIONS USING A MOBILE DEVICE - A method for conducting transactions, includes: encoding concatenated transaction information at a cash point; sending the encoded concatenated transaction information from the cash point to a mobile device; receiving verification information from the mobile device formed in response to the encoded concatenated transaction information; confirming the received verification information; completing a transaction in the event of successfully confirming the received verification information. | 10-08-2009 |
20090265279 | SYSTEM AND METHOD FOR MANAGING AND DISTRIBUTING HEDGE FUND DATA - A system for managing hedge funds includes a storage unit operable to store hedge fund information. The hedge fund information comprises at least one of a fund name, a fund share class, and denominated currency of a fund share class for a hedge fund. The system further includes a determination unit operable to determine, upon receiving hedge fund information, if the hedge fund information corresponds to a known hedge fund based on the received hedge fund information. The determination unit is operable to compare hedge fund information from a plurality of information sources so as to confirm whether the received hedge fund information relates to the same hedge fund. | 10-22-2009 |
20090271321 | Method and system for verification of personal information - In one form, there is disclosed a system ( | 10-29-2009 |
20090292642 | Method and system for automatically issuing digital merchant based online payment card - An online payment card is a digital form card derived from a credit/debit card or bank account of a customer. A central service provider issues the online payment card electronically to a registered merchant system under the authorization of the owner of the ordinary credhVdebit or bank account. The central service provider maintains the association of the online payment card with the ordinary credit/debit card or bank account of the customer, and the identity of the merchant that the payment is issued to. The merchant handles the online payment card in the same manner as ordinary card. When the merchant submits a request for authorization, the central service provider verifies if the online payment card is associated with the merchant who submits the authorization request. If the verification successes, the central service provider process the authorization request using the ordinary credit/debit which is associated with the online payment card. | 11-26-2009 |
20090307140 | MOBILE DEVICE OVER-THE-AIR (OTA) REGISTRATION AND POINT-OF-SALE (POS) PAYMENT - A method for enabling secure registration of a mobile device OTA and for conducting a financial transaction at a point-of-sale (POS) has been described herein. In one embodiment, a method of mobile device registration over-the-air (OTA) comprises enabling a pre-loaded payment application having payment account information; enabling a certificate request; receiving payment credentials; associating the payment credentials with the payment account information; transmitting the payment account information and the certificate request OTA; and receiving a certificate of registration of the mobile device OTA. | 12-10-2009 |
20090313172 | METHOD AND SYSTEM FOR LINKING AN ANONYMOUS ELECTRONIC TRADE ORDER TO AN IDENTITY OF A TRADER - A method for automatically linking an anonymous electronic trade order having an order quantity (q) to an identity of a trader by providing an identity marker (s) of the trader; embedding the identity marker (s) by splitting the anonymous trade order into a number (n) of trade orders each having a corresponding order quantity x (i) to generate a trade order set; and placing the generated trade order set in an electronic order book. | 12-17-2009 |
20090319432 | SECURE TRANSACTION PERSONAL COMPUTER - A secure computer for secure transactions that includes an operating system, a processor, an identity security module, and a loss protection device. The operating system has built-in security features. The processor is manufactured with security features and configured to execute software in a virtualized state outside of the operating system. The computer may include or be able to create at least one virtualized software module configurable to operate outside of the operating system. | 12-24-2009 |
20090327139 | Loosely coupled hosted application system - Technologies are described herein for loosely coupling a hosted application system with other computing systems that provide related functionality. A hosted application system is provided in one embodiment that is loosely coupled to a marketing system, a sign-up system, a billing system, and a support system. The loose coupling of the systems allows the hosted application system to be easily configured to restrict the software to which a particular customer can subscribe based upon the capacity of the hosted application system, the qualifications of a customer, or other factors. The computing systems may be configured to communicate via idempotent network APIs, thereby permitting multiple retries to ensure successful completion of requests. | 12-31-2009 |
20090327140 | System and Method for Secure Online Transaction - Methods and systems for secure electronic commerce (eCommerce) transactions having one or more trusted payment hosts where consumers/buyers can register credit card information and/or any payment card information and the corresponding secret keys for the credit card or payment card with the one or more payment hosts are provided. Embodiments of the invention include a method of engaging a purchase order in an online electronic transaction on the spot, where a seller posts and advertises at least one online electronic link embedded in a web-page or in an e-mail provided by a server. | 12-31-2009 |
20100010933 | TRACEABILITY VERIFICATION SYSTEM, METHOD AND PROGRAM FOR THE SAME - A system for enabling verification in traceability of a supply chain while maintaining confidentiality of private suppliers. A group signature is applied to an undisclosed supplier. The undisclosed supplier previously receives registration to the certificate authority device, and performs a group signature based on the certificate issued by the certificate authority device. A disclosed supplier and the undisclosed supplier sign and generate a signature chain when they ship parts. A verifier device receives a signature chain with products shipped from the supplier manager device, divides a signature of the disclosed supplier from a signature chain, and verifies the undisclosed supplier from the group signature. Identification of the undisclosed supplier is performed by a third-party auditor system requested to do so by the verifier device by using a group private key. | 01-14-2010 |
20100017334 | AUTHENTICATION SYSTEM AND AUTHENTICATION METHOD - In order appropriately to prevent leakage of an authentication symbol string such as a credit card number, and for it to be possible for a user to be authenticated as a legitimate user: an ID issuance server | 01-21-2010 |
20100017335 | METHOD AND APPARATUS FOR ORDERING GOODS, SERVICES AND CONTENT OVER AN INTERNETWORK - A billing system that allows a consumer to order products from computers connected to the Internet, wherein the consumer is automatically billed for the ordered product by its telephone service provider. When a product is ordered over the Internet, a plug-in component of the consumer's computer establishes an Internet connection to a billing server. A billing server component transfers an encrypted version of the product to the plug-in component. The plug-in component then disconnects from the Internet and establishes a point-to-point (PPP) connection with the billing server. During the PPP connection, the billing server component transfers an access key assigned to the order to the plug-in component so that the plug-in component may decrypt the product. The consumer is charged a unit rate or “drop-charge” for the product by the telephone service provider using a premium telephone number assigned and administered by the telephone service provider. | 01-21-2010 |
20100030696 | BIOMETRIC ELECTRONIC PAYMENT TERMINAL AND TRANSACTION METHOD - An electronic payment terminal includes a device for acquiring biometric data and a program capable of: acquiring biometric data during a transaction by a biometric data acquisition device; and storing the biometric data in the payment terminal. A corresponding transaction method is also provided. | 02-04-2010 |
20100057620 | Mobile personal point-of-sale terminal - A customer mobile personal point-of-sale terminal (CMPPT) includes a Point-Of-Sale (POS) sleeve portion that slidingly engages, and couples to, a cellular telephone. The cellular telephone is used to communicate encrypted information between a financial transaction verification entity (FTVE) and the POS sleeve portion. The sleeve portion includes a mechanism for reading in a merchant account number at the point-of-sale, and for communicating in a secure encrypted fashion with the FTVE via the cellular telephone portion. Rather than a customer entering sensitive financial information into a merchant's POS terminal (MPT) and trusting the merchant with such information, merchant information is entered into the CMPPT. The CMPPT initiates a transaction by sending the customer's account information and the merchant information to the FTVE. The FTVE receives information about the transaction directly from the MPT. The FTVE verifies the transaction, and after authorization, the FTVE forwards approval codes to the CMPPT and MPT. | 03-04-2010 |
20100057621 | PAYMENT PROCESSING SYSTEM SECURE HEALTHCARE DATA TRAFFICKING - Healthcare purchase data from a transaction upon a patient's account may be required to be transported and stored for safeguarding patient confidentiality if sufficient to identify the patient and the purchase. To avoid non-compliance, a transaction hander (TH) receives the data from a merchant's acquirer as encrypted by a key known to both the acquirer and TH. After decrypting the data with that key, the TH re-encrypts it with a key known only to the TH, and then stored. After receiving an issuer's request for the data, the TH decrypts the data using its own key, re-encrypts it using a key known only to the TH and the issuer, and then sends it to the issuer who will decrypt the data using that key. The unencrypted data may be used by the issuer to demonstrate the issuer's regulatory compliance to a governmental entity. | 03-04-2010 |
20100057622 | Distributed Quantum Encrypted Pattern Generation And Scoring - Transaction scoring is performed in a distributed manner across a client-server computing system. A computing system for processing a transaction includes a server system and a client system. The server system is arranged to process information associated with the transaction, while the client system communicates with the server system and includes a key engine which is arranged to generate keys. The client system and the server system are arranged to cooperate to make probabilistic determinations associated with the transaction. The client is arranged to send the keys generated by the key engine as a transaction to the server system. | 03-04-2010 |
20100070419 | SYSTEM AND METHOD TO INITIATE A FUNCTION WITH AN EMAIL MESSAGE - This document discusses, among other things, initiating a function with an email message. Various example embodiments relate to a machine that is to receive an email message. The machine may determine, based on an email address of the sender, whether the sender is a valid sender. In some example embodiments, based on the machine determining that the sender is valid, the machine may execute a command included within the email message. | 03-18-2010 |
20100076893 | METHOD FOR PROCESSING AND ROUTING FINANCIAL TRANSACTIONS FROM CAPTURE POINTS AND AUTHORIZED BY FINANCIAL INSTITUTIONS, IMPLEMENTED THROUGH SOFTWARE - A method for the routing of messages coming from capture points directly, or indirectly, connected to the Tecban network, and authorized by the Financing Institutions, which are also connected to the Tecban network, remarkably conceived to consolidate the ATM network of Tecban, as well as the proprietary networks of the Financing institutions administered by Tecban, through a number of encoded instructions, contained in a software used in computer networks to exchange messages among the several elements involved. | 03-25-2010 |
20100082493 | System and Method for Utility Sampling for Trust Metrics in PKI - A method for measuring trust in a transaction over a public key certificate network includes associating each edge K | 04-01-2010 |
20100094760 | TRANSACTION METHOD BETWEEN TWO ENTITIES PROVIDING ANONYMITY REVOCATION FOR TREE-BASED SCHEMES WITHOUT TRUSTED PARTY - The invention proposes an off-line divisible e-cash scheme where a user can withdraw a divisible coin of monetary value n | 04-15-2010 |
20100145860 | UNIFIED IDENTITY VERIFICATION - In some example embodiments, a system and method is shown that includes receiving a purchase request through an Electronic Payment Financial Network (EPFN), the purchase request including a token to identify a merchant server. The system and method further includes comparing the token against a merchant identifier value to determine that that token is assigned to the merchant server. Additionally, the system and method includes transmitting a purchase request authorization authorizing an online transaction, where the token and merchant identifier value are equivalent. | 06-10-2010 |
20100153274 | METHOD AND APPARATUS FOR MUTUAL AUTHENTICATION USING SMALL PAYMENTS - One embodiment provides a system for mutual authentication. During operation, a first entity receives an access request from a second entity. In response, the first entity requests information about the second entity's account with a financial service provider (FSP) and transfers a fund to the account. The first entity sends first and second messages through the FSP to the second entity with the fund. Subsequently, the first entity receives from the second entity a first input corresponding to the first message and determines that a first condition is met based on the received first input and the first message. The first entity sends a second input to the second entity based on the second message, thereby allowing the second entity to verify that a second condition is met based on the second input and the second message. The system then produces a result indicating that both the first and second entities are mutually authenticated. | 06-17-2010 |
20100153275 | METHOD AND APPARATUS FOR THROTTLING ACCESS USING SMALL PAYMENTS - One embodiment of the present invention provides a system for controlling access to resources using small payments. The system receives a request from an entity to access a resource. In response, the system requests the entity to submit information about the entity's account with a financial service provider (FSP). The system then transfers a fund to the entity's account and sends a message through the FSP to the entity with the fund transfer. The system receives from the entity an input corresponding to the message and determines that a first condition is met based on the received input and the message. As a result, the system grants the entity access to the resource. | 06-17-2010 |
20100161493 | METHODS, APPARATUS AND COMPUTER PROGRAM PRODUCTS FOR SECURELY ACCESSING ACCOUNT DATA - Customer data is securely downloaded to a browser toolbar by performing a check to determine whether a request for customer data includes a request for personal identifiable information requiring encryption by a public encryption key generated by the browser toolbar. The customer is authenticated based on a set of a user credential and an account specific access credential. The account specific access credential is associated with the account of the customer. Requested personal identifiable information is encrypted using the public encryption key generated by the browser toolbar. Encrypted personal identifiable information is transmitted to the browser toolbar. | 06-24-2010 |
20100169224 | PROTECTING PRIVACY OF PERSONALLY IDENTIFYING INFORMATION WHEN DELIVERING TARGETED ASSETS - Techniques are disclosed herein for protecting personally identifying information (PII) and behavioral data while delivering targeted assets. In one aspect, a profile is created based on a template and desired characteristics of users to receive one or more targeted assets. The template provides a framework for the user characteristics. One or more clients are provided the template. A manifest that identifies the targeted assets is encrypted based on the profile. The encrypted manifest is sent to the one or more clients. A user profile is generated at a client based on a template. The client attempts to decrypt the encrypted manifest based on the profile created at the client. The client sends a request for any targeted assets that were identified through the attempt to decrypt the encrypted manifest. | 07-01-2010 |
20100174653 | Secure method and device of financial transaction - A secure method and device thereof is provided for financial transaction without being access of any personal and confidential transaction information by any unwanted party, which includes the following steps. Receive transaction information and personal information of a user in a secure financial transaction device. Encrypt the transaction information, the personal information and a secure PIN of the user in the device and transfer the encrypted transaction information, personal information and the secure PIN to a designate financial entity through the Internet. Verify a payment amount to a designated financial account with the financial entity. Receive a confirmation in the device for the transaction of the payment amount to the designated financial account, after the payment amount is transferred to the designated financial account from the financial entity, by the financial entity through the Internet. | 07-08-2010 |
20100211507 | OVER THE AIR UPDATE OF PAYMENT TRANSACTION DATA STORED IN SECURE MEMORY - A system, apparatus, and method for processing payment transactions that are conducted using a mobile device that includes a contactless element, such as an integrated circuit chip. The invention enables the updating, correction or synchronization of transaction data maintained by an Issuer with that stored on the device. This is accomplished by using a wireless (cellular) network as a data communication channel for data provided by an Issuer to the mobile device, and is particularly advantageous in circumstances in which the contactless element is not presently capable of communication with a device reader or point of sale terminal that uses a near field communications mechanism. Data transferred between the mobile device and Issuer may be encrypted and decrypted to provide additional security and protect the data from being accessed by other users or applications. If encryption keys are used for the encryption and decryption processes, they may be distributed by a key distribution server or other suitable entity to a mobile gateway which participates in the data encryption and decryption operations. | 08-19-2010 |
20100217710 | ELECTRONIC MONEY SYSTEM AND ELECTRONIC MONEY TRANSACTION METHOD - An electronic money system is directed to avoid unauthorized use of certificate-type electronic money. The electronic money system is provided with a management server, a verification sever, a remittance terminal, and a receptor terminal. In response to a request from the remittance terminal, the management server issues an inactive electronic certificate including a certificate ID and notifies the verification server of the certificate ID. The remittance terminal gives a group signature to the inactive electronic certificate to generate an active electronic certificate. The reception terminal verifies the active electronic certificate obtained from the remittance terminal on the basis of the group signature. The verification server matches the certificate ID notified from the management server with the certificate ID included in the active electronic certificate verified by the reception terminal to verify availability of the active electronic certificate. | 08-26-2010 |
20100223186 | Method and System for Conducting Secure Payments - A proximity device transmits a first dynamic authentication value contactlessly to a terminal. The first authentication value is included in a discretionary data field of message data arranged in an ISO Track 1 and/or ISO Track 2 format. Message data is sent from the terminal to an issuer. The issuer separately derives a second authentication value and compares it with the first authentication value. | 09-02-2010 |
20100228675 | Issuing machine and issuing system - An issuing system for issuing unmodifiable and/or unforgeable hardcopy documents or securities includes a server and a plurality of issuing machines connected to the server via a network. Each of the issuing machines receives an ID recording medium provided by a potential purchaser, retrieves an identification recoded in the received ID recording medium, requests the potential purchaser to input request for a transaction of the security or fixed rate financing instrument, processes the requested transaction by retrieving information via a network from the server, and prints out on demand a hardcopy of the security or fixed rate financing instrument as purchased by the potential purchaser and a checksum thereon. A method for forming a new market with the issuing system. | 09-09-2010 |
20100268650 | METHOD AND SYSTEM FOR THE SUPPLY OF DATA, TRANSACTIONS AND ELECTRONIC VOTING - A method and system for supply of data, including generating a first digital certificate referred (empowerment certificate) signed with a first signing entity's electronic signature. The empowerment certificate includes attributes of the described entity, information identifying the first signing entity, indication of data relating to the described entity, indication of a source of the data, and identification of a relying entity to which the data can be supplied. The relying entity forwards the empowerment certificate to a source supplying the data indicated in the empowerment certificate. The data may be supplied to the relying entity by a second digital certificate (custom certificate), signed with a second signing entity's electronic signature. Custom certificates may appear in custom certificate revocation lists. A system and method for transfer of ownership of electronic property from a first entity to a second entity, and a method and system for electronic voting are also provided. | 10-21-2010 |
20100299266 | Digital Incentives Issuance, Redemption, and Reimbursement - A system and method for issuance, redemption, and reimbursement of digital incentives. A central database connected to the internet: enables customers to register unique customer registration information; is able to store this information and assign unique identifiers to it; and is accessible to incentives providers to make available digital incentives. Existing point-of-sale terminals: are authenticated to have access to the central database; have payment devices; are connected to the internet; and are provided with a message broker that facilitates communication with the central database. The customer redeems digital incentives at one of the existing point-of-sale terminals at the time of purchase by first presenting their unique identifier. The message broker routes the unique identifier to the central database which authenticates and validates the existing point-of-sale terminal, the customer's unique identifier, and the payment device. The central database then returns validated applicable digital incentives to the message broker which forwards the validated digital incentives for redemption. | 11-25-2010 |
20100332399 | SYSTEM AND METHOD FOR PARTNER KEY MANAGEMENT - A system and method for implementing an interoperable credential management protocol for processing online transactions. The protocol, referred to as the Partner Key Management (PKM) protocol provides an improved alternative to traditional public key, infrastructure (PKI), particularly for use in high-value commercial transactions which require additional controls on the use of credentials for authentication and authorization. According to the PKM protocol, a user may take advantage of credential interoperability by using the same credential at a plurality of different financial institutions for authentication or digital signatures. Additionally, the credential interoperability achieved according to the PKM protocol allows the user to employ the same credential at a plurality of financial institutions for the purpose of digital or electronic signatures. | 12-30-2010 |
20110071947 | AUCTION VERIFICATION - An auction verification subsystem provides verification, without revealing actual bid values, that bid values remained sealed prior to a closing time for the auction and that an announced winning bidder for the auction provided a highest bid. The verification subsystem receives encrypted bids from bidders and generates commitment data based on the bids and provides the commitment data to each of the bidders. In response to receiving the commitment data, the bidders provide decryption keys for the encrypted bids. In turn, the bids are decrypted and an auction is performed using the decrypted bids. The results of the auction can be verified based on bid representations that do not reveal the actual values of bids, thereby maintaining the secrecy of bids. Providing access to an exchange between bidders and the verification subsystem facilitates verification that the auction is performed as a sealed bid auction. | 03-24-2011 |
20110071948 | AUCTION VERIFICATION - An auction verification subsystem provides verification, without revealing actual bid values, that bid values remained sealed prior to a closing time for the auction and that an announced winning bidder for the auction provided a highest bid. The verification subsystem receives encrypted bids from bidders and generates commitment data based on the bids and provides the commitment data to each of the bidders. In response to receiving the commitment data, the bidders provide decryption keys for the encrypted bids. In turn, the bids are decrypted and an auction is performed using the decrypted bids. The results of the auction can be verified based on bid representations that do not reveal the actual values of bids, thereby maintaining the secrecy of bids. Providing access to an exchange between bidders and the verification subsystem facilitates verification that the auction is performed as a sealed bid auction. | 03-24-2011 |
20110082798 | SYSTEM AND METHOD FOR SECURELY TRANSMITTING DATA ACROSS A SYSTEM LANDSCAPE - A system and method for securely transferring sensitive payment data across a system landscape. The system and method may utilize machine-readable media including program code stored therein executable by one or more processors to perform the transferring of payment data. The transferring of data includes generating and encrypting a data container to combine all sensitive payment data. The encryption logic is configured to automatically transfer keys between systems. | 04-07-2011 |
20110106710 | ENCRYPTION SWITCH PROCESSING - Techniques for eliminating the need for merchants and acquirers to conduct Payment Card Industry (“PCI”) security audit procedures are provided. Merchants and acquirers can eliminate the operating expenses associated with conducting audits to ensure compliance with PCI Data Security Standards (“DSS”), while at the same time ensuring that cardholders' data remains secure, thus protecting the cardholders from fraudulent transactions. System security is further enhanced through the use of per transaction audits, with the scope of the audit being directly between the Point of Sale (POS) terminal and the payment processing network. PCI DSS compliance can thus be assured on a per transaction basis, as opposed to only ensuring compliance generally for a merchant or acquirer on a periodic basis. Per transaction PCI DSS compliance is assured, while at the same time eliminating the need for merchants or acquirers to conduct compliance audits. | 05-05-2011 |
20110131138 | COLLECTIVE SUSPENSION/SETTLEMENT REPRESENTATION PROCESSING SERVER DEVICE AND PROGRAM - Provided is a collective suspension processing server device, collective suspension representation processing server device, settlement representation processing server device, method, and program, wherein there is no chance that the encryption key leaks. Also provided is the implementation of preventing the leakage of any piece of information under management. The collective suspension processing server device, collective suspension representation processing server device, settlement representation processing server device, method, and program does not hold the encryption key and the decryption key which are used to encrypt users' card information in a management database, but instead, dynamically generates the encryption key and the decryption key. Regarding the common key which is used in encryption, the common key is generated and encrypted for each authentication information table without destructing the rank order of strings of characters and numbers which constitute the authentication information, and encrypted strings of characters and numbers are searched using the common key generated and encrypted for each authentication information table. The decryption key which is used to decrypt the encrypted card information is unique to each user. | 06-02-2011 |
20110161232 | VIRTUALIZATION OF AUTHENTICATION TOKEN FOR SECURE APPLICATIONS - Data and financial transactions are secured on a mobile electronics device, with three downloadable modules. A first module provides for the mobile electronics device and a network server to interactively register a cryptographic abstract of an object usually carried by the user. These objects represent physical passwords from which processing can derive characterizing information. A second module is invoked by a transaction and signals the mobile electronics device to collect a new sample of the physical password. A cryptographic abstract of it is distilled and compared to preregistered cryptographic abstracts. A third module is a key recovery process for use when the preregistered physical password sound or object is no longer available to the user. | 06-30-2011 |
20110161233 | SECURE TRANSACTION MANAGEMENT - Methods, systems, and devices for secure transaction management are provided. Embodiments include a method for providing secure transactions that include receiving an identifier of a financial account at a payment processor system. A token may be generated that is linked with the identifier of the financial account at the payment processor system. The identifier of the financial account and the token may be stored securely at the payment processor system. The token may be transmitted without the identifier of the financial account to at least a recipient system or a recipient device where the token replaces the identifier of the financial account. | 06-30-2011 |
20110173124 | AUTHENTICATION OF TRANSACTIONS IN A NETWORK - A technique for conducting a transaction via a network is described. In this technique, in response to receiving transaction information associated with the transaction via the network from a network browser in a computer, a computer system provides an encrypted version of the received transaction information via the network to an application that executes in the computer, which facilitates a comparison of the received transaction information with original transaction information provided by a user to the computer. Note that this application is separate from the network browser, and the communication with the application via the network is independent of the network browser. Moreover, if the received transaction information matches the original transaction information, the computer system receives approval for the transaction from the computer via the network. | 07-14-2011 |
20110173125 | Information processing device, method thereof, information processing system, and method thereof - An information processing device includes: an exchange unit configured to exchange information concerning a communication state with, respect to a server using a first communication with another information processing device which becomes the other party of communication in a second communication; and a method selection unit configured to select a transmission/reception method of content data with respect to another information processing device using the second communication based on the information exchanged by the exchange unit in accordance with the communication state of each device with respect to the server using the first communication. | 07-14-2011 |
20110173126 | CONTENT SECURITY FOR REAL-TIME BIDDING - A real-time-bidding process that includes security mechanisms that limits access to various aspects of the bidding process including communications between bidders, the user browser, and the auctioneer, and the content of bids received and utilized by the user browser. | 07-14-2011 |
20110178933 | DYNAMICALLY REACTING POLICIES AND PROTECTIONS FOR SECURING MOBILE FINANCIAL TRANSACTION DATA IN TRANSIT - A secure mobile financial transaction is provided by receiving, over a communication network, a list of protection mechanisms available for implementation by an external terminal. Security-related data is received from one or more sensors and an attack signature is computed based on the security-related data. An appropriate security policy is selected from multiple security policies stored in a database based on the list of protection mechanisms and the attack signature. A secure communication session is established between the external terminal and an internal network component according to the selected security policy. A data message associated with a mobile financial transaction is communicated over the communication network during the communication session. | 07-21-2011 |
20110191252 | Secured Point-Of-Sale Transaction System - The present invention relates to a secured transaction system. In one embodiment, a point-of-sale (POS) system includes an input module configured to receive a transaction description from a mobile client device, an encryption engine configured to generate an encrypted transaction description using the transaction description from the mobile client device, and a communication module configured to transmit the encrypted transaction description for processing. | 08-04-2011 |
20110191253 | USE OF MOBILE DEVICES FOR COMMUNICATING SOUND-BASED VIRTUAL TRANSACTION DATA - The present application relates to the use of mobile devices for viewing and publishing location-based user information. One example allows a user of a mobile device to access content associated with a virtual version of an entity that exists at a physical location regardless of a location of the mobile device. This example enables the user to submit content to the virtual version when the mobile device is proximate the physical location. | 08-04-2011 |
20110196797 | WIRELESS PAYMENT AND BARTER PLATFORM - The present invention is directed to a wireless payment platform that may offer a payment, negotiation and or barter mechanism for users with a mobile device. The wireless payment platform may utilize the convenience and adaptability of the mobile device of the users. Such a payment, barter and negotiation mechanism may offer more security to transactions by adding a transaction confirmation facility using conventional communications technologies, such as the Short Message Service or SMS, Interactive Voice Response (IVR) technology, and the like. Financial transactions may be conducted on a person-to-person basis where each user may be identified by a unique identifier such as a telephone number, caller ID, and the like. The wireless payment platform may also include a negotiating and barter module capable of allowing users to exchange offers of settlement until one offer is accepted. | 08-11-2011 |
20110213711 | METHOD, SYSTEM AND APPARATUS FOR PROVIDING TRANSACTION VERIFICATION - A system and method provides electronic transaction verification using multiple different units. A first unit initiates an electronic transaction in response to user authentication affirmation by, for example, a server (such as a web server). After the user has been authenticated, another unit, such as a mobile device, receives a transaction confirmation request for the electronic transaction that is ongoing via the first unit. In addition, the second unit also receives from, for example, the server, transaction information based on the electronic transaction. The second device through a user interface and without requiring a user to enter transaction information, provides the received transaction information from the server for evaluation by a user of the second unit. The second unit requests from the user, in response to the transaction confirmation request, confirmation of the transaction. The second unit generates a transaction confirmation code based on the received transaction information if the transaction is confirmed by the user of the second unit and sends it to the server for verification by the server. | 09-01-2011 |
20110231319 | Method to Make Payment or Charge Safe Transactions Using Programmable Mobile Telephones - A system, method and mobile application for conducting financial transactions wherein a mobile device operated by a user is operably coupled to a server over a mobile communication network. Both the server and the user's mobile device store a user encryption key (UEK) and a user access key (UAK). A software application stored on the user's mobile device and the server are configured to conduct a transaction wherein a session key (SK) specific to the transaction is exchanged in an encrypted form based upon the UEK. The software application is further configured to i) generate transaction data, ii) access the UAK stored on the mobile device, iii) encrypt the UAK and transaction data into an encrypted form based upon the SK, and iv) send the UAK and transaction data in encrypted form from the mobile device to the server over the mobile communication network in order to conduct the transaction. | 09-22-2011 |
20110251961 | PROCESS AND SYSTEM FOR DATA TRANSMISSION - The present invention relates to a process and a system for data transmission. Authentication data and an electronic key are generated, whereby the electronic key is stored as assigned to the authentication data. At least part of the electronic key is transmitted by means of an authentication module of the central module to a communications terminal. Asynchronously to that, data are encrypted into encrypted data by means of an encryption module and by means of at least part of the electronic key. The encrypted data are transmitted between a central module and a communications terminal. The encrypted data are decrypted by means of a decryption module and by means of at least part of the electronic key. | 10-13-2011 |
20110270763 | METHODS AND APPARATUS FOR A FINANCIAL DOCUMENT CLEARINGHOUSE AND SECURE DELIVERY NETWORK - An electronic clearinghouse system (ECS) for securely delivering, retrieving, authenticating, storing, generating and distributing messages, such as financial documents and/or records are described. For message providers, the ECS can provide a secure and trusted venue for delivering messages, such as messages including financial data to their clients that reduces their delivery costs. For users of the ECS, the ECS can provide a central location where each user can receive and consolidate their messages, such as financial documents and associated financial data from a number of different financial data providers. To facilitate these functions, the ECS can include an automated system for recording delivery status as well as evidence of delivery of messages, including whether a message has been viewed by a particular user. Further, the ECS can include components for scheduling events, such as monetary transfers and bill payments, and providing reminders for such events. Also, the ECS can provide utilities that allow a user to package and securely deliver messages to other users. | 11-03-2011 |
20110276495 | ONE-TIME USE PASSWORD SYSTEMS AND METHODS - According to the invention, a method of using a one-time password for a transaction between a user and a merchant is disclosed. The method may include generating the one-time password. The method may also include authenticating the user by the authentication server in response to a request from the user to use the one-time password. The method may further include authorizing the use of the one-time password for the transaction in response to authenticating the user by the authentication server. The method may moreover include using the one-time password in combination with an account number to settle the transaction between the user and the merchant. The method may additionally include sending a message to the authentication server originating from the merchant, wherein the message comprises the one-time password, and wherein the message requests a determination whether the one-time password is authorized for use in the transaction. The method may also include sending a message to the merchant originating from the authentication server, wherein the message includes a determination whether the transaction should be approved in response to the authentication server determining whether the one-time password is authorized for use in the transaction. | 11-10-2011 |
20110289004 | METHOD AND DEVICE FOR CONDUCTING TRUSTED REMOTE PAYMENT TRANSACTIONS - A method, device, and system for conducting trusted payment transactions including establishing a trust relationship between a first mobile computing device and a second mobile computing device. The first mobile computing device may initiate a payment transaction with a point-of-sale device, communicate with the second mobile communication device to retrieve payment information from the second mobile communication device, and complete the payment transaction with the point-of-sale device using the payment information. The second mobile computing device is configured to verify the user and identity of the first mobile computing device prior to providing the payment information. Communications between the mobile computing devices may be encrypted using pre-determined encryption techniques. | 11-24-2011 |
20110320359 | SECURE COMMUNICATION METHOD AND DEVICE BASED ON APPLICATION LAYER FOR MOBILE FINANCIAL SERVICE - A secure communication method and device based on application layer for mobile financial service. According to the invention, the exchanged messages in the financial transaction are few, and the requirement for the processing capability of the mobile terminal is low. The invention uses the digital signature technology for information abstract based on asymmetric secret keys, and the integrity of the transaction information is guaranteed and non-repudiation requirement is met. The invention also uses digital envelop technology based on asymmetric secret keys, and the secrecy of the transaction information. The strand space theory proves that the security of the preferred embodiment of the invention can be guaranteed. | 12-29-2011 |
20120047075 | METHOD AND APPARATUS FOR GLOBAL REPLACEMENT CARD SERVICES - A prompt-response card issuing system providing temporary financial transaction cards includes a communications module, a personal account number (PAN) mapping module, and a security measure determination module. The communications module communicates with a plurality of financial card issuers, each having different profile standards for generating security measures, and also receives, from an issuer, an authorization for a new PAN associated with a financial account of a cardholder. The PAN module maps the new PAN to a temporary personal account number (TPAN) for the cardholder. The security measure determination module determines at least one security measure requirement according to a system profile standard of said prompt-response card issuing system rather than the system profile standard of the authorizing issuer. The TPAN, the security measure requirement, and personal information regarding the cardholder are communicated to a physical card producer so that a physical card bearing the TPAN, the security measure, and at least one item of personal information about the cardholder, can be produced and delivered to the cardholder. | 02-23-2012 |
20120089519 | SYSTEM AND METHOD FOR SINGLE USE TRANSACTION SIGNATURES - A system and method for providing transaction-level security, such as authentication, authorization, or non-repudiation of business-related and other transactions, using shared keys and single use transaction signatures (SUTS). In accordance with an embodiment, to utilize the system, a user registers a client device with an identity service provider (IdP). The client device can be a computing device such as a mobile phone, personal digital assistant (PDA), netbook, or other specialized computer or computing device, each of which are hereinafter generally referred to as a “client device”. The registration process typically involves setting-up a shared secret key and personal identification number (pin). Once registered, all communication between the client device and the IdP is encrypted using a key generated with some combination of the secret key, pin, and/or timestamp, over a secured channel (e.g. https). For a particular transaction, users can generate digital transaction signatures using the client device, and third-party applications or parties can verify the transaction signature by providing a transaction identifier (id) and the signature to the IdP. In accordance with various embodiments, the transaction signature comprises encoding some combination of a transaction id, shared secret key (or manipulation thereof), secret pin, timestamp, and/or transaction type, which in accordance with some embodiments can be based on message authentication code (MAC). In accordance with an embodiment, a third-party, such as a bank, can validate a transaction themselves through a special arrangement with the IdP. In these scenarios, the bank can act as a delegated IdP between the user and a merchant, protecting the user and the merchant from malicious transactions. | 04-12-2012 |
20120089520 | TRUSTED SERVICE MANAGER (TSM) ARCHITECTURES AND METHODS - A client device comprises a first secure element and a second secure element. The first secure element comprises a first computer-readable medium having a payment application comprising instructions for causing the client device to initiate a financial transaction. The second secure element comprises a second computer-readable medium having a security key, a payment instrument, stored authentication data and instructions for generating a secure payment information message responsive to the payment application. The secure payment information message comprises the payment instrument and is encrypted in accordance with the security key. | 04-12-2012 |
20120101951 | Method and System for Secure Financial Transactions Using Mobile Communications Devices - The present invention employs public key infrastructure to electronically sign and encrypt important personal information on a mobile communications device (MCD), without disclosing private, personal information to the transaction counterparts and middleman, thus preserving highly elevated and enhanced security and fraud protection. In one embodiment, the present invention can use a mobile device identifier, such as a cell phone number or email address, for example, as an index/reference during the entire transaction, so that only the account holder and the account issuer know the underlying account number and other private information. | 04-26-2012 |
20120116977 | METHODS AND APPARATUS FOR PREVENTING FRAUD IN PAYMENT PROCESSING TRANSACTIONS - A method includes receiving an authorization request for a purchase transaction, and determining whether the authorization request arose from proximity-reading a proximity payment device. The method further includes mapping a first account number included in the authorization request into a second account number associated with the first account number if it is determined that the authorization request arose from proximity-reading a proximity payment device and if the first account number is qualified for mapping. In addition, the method includes transmitting the authorization request to an issuer financial institution with the second account number substituted for the first account number in the authorization request. | 05-10-2012 |
20120130902 | WIRELESS ESTABLISHMENT OF IDENTITY VIA BI-DIRECTIONAL RFID - A method, a system, and a computer program product are provided for wireless establishment of identity via bi-directional radio-frequency identification (RFID). The method is implemented in a computer infrastructure having computer executable code tangibly embodied on a computer readable storage medium having programming instructions operable for sending device data including at least a username and a password to a transceiver. The method also includes receiving an identifier of an access point in a wireless network from the transceiver, the transceiver sending the device data to the access point via a security server. The device data is sent to the access point based on the identifier of the access point, the access point establishing a secure connection to the computer infrastructure based on the device data received from the transceiver and the computer infrastructure. | 05-24-2012 |
20120130903 | BACK END OF PAYMENT SYSTEM ASSOCIATED WITH FINANCIAL TRANSACTIONS USING CARD READERS COUPLED TO MOBILE DEVICES - A method of reconstructing a packet that includes financial card information from a mobile device uses a card reader. The card reader has a read head, a slot for swiping a magnetic stripe of a card and device electronics that includes a microcontroller with logic resources with code. The card reader has a unique identifier and associated cryptographic key. The same code is used to produce an encrypted and signed signal. The encrypted and signed signal, that includes the card reader identifier, is sent to the mobile device. The mobile device sends an encrypted and signed packet to a back end of a payment system. A cryptographic key is sued to decrypt and verify the contents of the packet at the back end. Non-encrypted financial card information is sent to a payment gateway. | 05-24-2012 |
20120136798 | SECURING MOBILE TRANSACTIONS - Systems and methods for securing mobile transactions are provided. An order including a credit card number and a user is sent from the user's mobile device over a communication network to a gateway server, which may be coupled to a point-of-sale terminal. The gateway server generates an encryption key that is based on the user key and a server key stored at the server. The encryption key is used to encrypt the credit card number, and the encrypted credit card number is sent to the mobile device for use in subsequent orders. | 05-31-2012 |
20120143769 | COMMERCE CARD - Commerce card techniques are described. In one or more implementations, one or more credentials are received at a commerce card, the credentials encrypted using a public key. The one or more credentials are decrypted using a private key that corresponds to the public key, the decrypting performed by a secure element implemented in tamper-resistant hardware of the commerce card without exposing the private key outside of the secure element. The decrypted one or more credentials are stored within the secure element of the commerce card such that the decrypted one or more credentials are not exposed outside of the secure element, the one or more credentials usable by the commerce card as part of a transaction to purchase a good or service. | 06-07-2012 |
20120143770 | PURCHASE TRANSACTION SYSTEM WITH ENCRYPTED PAYMENT CARD DATA - Online ordering systems allow a user to submit sensitive information such as payment card information to a merchant in encrypted form. A payment card processor server may be used to provide the user's web browser with code for an encryption function, a cryptographic key, and a key identifier. The web browser may encrypt the payment card information by executing the encryption function and using the key. The encrypted payment card information may be supplied to the merchant over the internet. A key identifier that identifies which cryptographic key was used in encrypting the payment card information may be provided to the merchant without providing the merchant with access to the key. The merchant can forward the encrypted payment card information to the credit card processor server with the key identifier. The processor server can use the key identifier to obtain the key and decrypt the payment card information for authorization. | 06-07-2012 |
20120150747 | MOBILE COMMUNICATION DEVICES - A mobile communication device, the device comprising: a memory; an encryption module for encrypting data using an encryption key; a first communication channel configured to transfer the encryption key from the mobile communication device to a separate terminal; and a second communication channel for transferring payment details stored in the memory from the mobile communication device to the separate terminal, which payment details are encrypted using the encryption key; and wherein the first communication channel is different to the second communication channel. | 06-14-2012 |
20120150748 | SYSTEM AND METHOD FOR AUTHENTICATING TRANSACTIONS THROUGH A MOBILE DEVICE - A user may claim to have not made or allowed a transaction and that the transaction was made in error. Where it appears the user has not authorized the transaction, the funds of the transaction are returned to the user, or are charged back. Systems and methods provide a way to confirm whether or not a transaction was actually authorized by the user, thereby settling a chargeback dispute for a previously executed transaction. The method comprises receiving the dispute regarding the transaction including associated transaction data, and retrieving a digital signature associated with the transaction data, the digital signature computed by signing the transaction data. The digital signature is then verified using a public key, wherein the public key corresponds to a private key stored on a mobile device. It is then determined whether or not the transaction is fraudulent based on a verification result of the digital signature. | 06-14-2012 |
20120150749 | METHOD AND SYSTEM FOR SECURING PIN ENTRY ON A MOBILE PAYMENT DEVICE UTILIZING A LOCKED BUFFER - A mobile communication device | 06-14-2012 |
20120185397 | VARIABLE FRACTIONS OF MULTIPLE BIOMETRICS WITH MULTI-LAYER AUTHENTICATION OF MOBILE TRANSACTIONS - Virtually fraud-proof authentication for wireless mobile financial transactions. A mobile telephone, genius card or dongle may capture multiple biometrics, such as fingerprint, voiceprint, retinal recognition data, facial biometric data, ear biometric data and bio print, iris scanning data, pupil movement recognition data, and send segments of each of them to a server computer that re-constitutes them and stores them for matching during an attempted financial transaction. A purchasing individual has multiple biometrics read by separate readers integrated into a single hand-held device. An automatic process of the server computer has previously sent a command packet to the hand-held device defining percentage and portion of each biometric to select and the sequence and channel of transmission for matching along with other out of band security data. During the charging phase, the hand-held device may utilize a slidable antenna for swiping a magnetic strip of a charge card reader or may display credit card data for a limited amount of time. | 07-19-2012 |
20120191614 | SYSTEM FOR LOCATION BASED TRANSACTION SECURITY - A system for improving transaction security based on location information. The system includes a transaction processing center in communication with a first transaction device and a second transaction device. The transaction processing center includes a receiver that receives respective identification and location from at least one of the first and second transaction devices. The transaction processing center also includes a transaction processor that validates the identifications, validates the locations, and executes a transaction between the first and second transaction devices when the identifications and locations are validated. | 07-26-2012 |
20120197807 | SECURE ONLINE TRANSACTION PROCESSING - Various methods for securely processing an online transaction between a customer and a merchant are disclosed. In one method, an authentication credentials request that includes a transaction identifier is received from a merchant system. In response, an encryption key is transmitted to the merchant system. From a customer system, the personal account data associated with the customer is received, which is encrypted with the encryption key. A transaction processing request from the merchant system prompts the generating of a transaction processing response based upon its execution. | 08-02-2012 |
20120203701 | SYSTEMS AND METHODS FOR ESTABLISHING A COMMUNICATION SESSION BETWEEN COMMUNICATION DEVICES - Embodiments of the invention include systems and methods for establishing a communication session between an inviter communication device and an invitee communication device. Data messages to be exchanged between inviter communication device and the invitee communication device without any other entity or communication device being able to analyze, access or understand the data messages. To exchange data messages, a bucket for storing the data messages is set up on a server or other database. A bucket uniform resource identifier is generated by the server and provided to the inviter and invitee communication devices. The inviter and invitee communication devices send each other data messages via the bucket uniform resource identifier. | 08-09-2012 |
20120239578 | Mobile Secure Transactions Using Human Intelligible Handshake Key - A software library could be called by an ecommerce application on a mobile phone to improve security of the transaction. When a human user wishes to purchase a product through the ecommerce application, the software library could present a passkey, such as a unique word, phrase, image, sound, or song, which is only recognizable by the human user. The human user authenticates the passkey by recognizing the passkey as the one he/she designated, and then authorizes the payment for the product, preferably through a passkey of his or her own, such as a password that the system recognizes. | 09-20-2012 |
20120246080 | METHOD AND SYSTEM FOR REAL TIME ONLINE DEBIT TRANSACTIONS - An online payment method is disclosed which permits users to make realtime debit card payments over the Internet. The payor and payee pre-register with the system by sending their PAN, encrypted PIN and encryption key to the system database using a debit card reader, and then enter user names and secret IDs to be associated with the PAN and PIN numbers. When an online transaction is made the payor enters its user name and ID which is sent to the system along with the transaction amount and the payee user name. The system sends out a standard POS transaction using the stored PAN, encrypted PIN and encryption key. If approved it sends out a credit POS transaction to the payee in the same way. | 09-27-2012 |
20120265688 | Secure and Mobile Financial Transaction - A portable device is configured to transmit a first encrypted message to an account database server. The first encrypted message may comprise a request to get information about a financial account. The portable device receives a second encrypted message comprising the financial account information. The portable device wirelessly receives a signal from a merchant machine and wirelessly transmits a response message to the merchant machine. The response message comprises account related information for the merchant machine to trigger a financial transaction. | 10-18-2012 |
20120265689 | Methods for Customizing Secured Transactions that are Verified by a Money Source - Methods for providing secure transactions in which a customization parameter and an encrypted transaction validation code are received from a user to positively identify a transaction for a user who has a first entity identifier. The validation code and first entity identifier are used by a money source which electronically verifies that the transaction is valid by use of the first entity identifier and the validation code while the first transaction is customized through use of the customization parameter. | 10-18-2012 |
20120284195 | METHOD AND SYSTEM FOR SECURE USER REGISTRATION - A method and system are described for registering an online account associated with a mobile device configured for contactless payment operations in a mobile payment account system. The method includes generating, by a mobile device, a passcode based at least on an encryption key stored securely in the mobile device. In a computing device, a registration process is initiated to register the online account. The computing device receives user input data identifying a passcode generated by the mobile device. An online account server stores online account data defining a user account associated the mobile device, the online account data including a data defining an encryption key. The online account server receives user input data identifying the passcode generated by the mobile device, generates a passcode based at least on the encryption key stored in the online account server, compares the received generated passcode to the passcode generated by the online account server, and verifies the user account associated the mobile device when the generated passcodes match. | 11-08-2012 |
20120284196 | METHOD FOR INITIATING AND PERFORMING A CNP BUSINESS TRANSACTION, SOFTWARE FOR THE SAME AND A COMMUNICATION DEVICE COMPRISING SUCH SOFTWARE - The invention relates to a method for performing authenticated bank card payment transaction, comprising registering a user ( | 11-08-2012 |
20120290483 | METHODS, SYSTEMS AND NODES FOR AUTHORIZING A SECURIZED EXCHANGE BETWEEN A USER AND A PROVIDER SITE - Methods, systems and nodes for authorizing a securized exchange between a user and a provider site are described herein. User credentials are stored in a personal security module and in an authentication server. The personal security module is a user terminal or otherwise connects to a user terminal. The user terminal accesses the provider site, which in turn provides a unique transaction number to the authentication center and to the personal security module. The authentication center provides user authorization information to the provider site. When the personal security module sends the same unique transaction number to the authentication center, the authentication center provides the user authorization information to the personal security module. The user terminal uses the user authorization information for having the securized exchange with the provider site. | 11-15-2012 |
20120290484 | Method and System for Sending Surveys and Receipts Electronically to Customers Purchasing with Credit Cards - A system and method provide customers making purchases with a credit card with electronically delivered receipts and surveys from the merchant. A user subscribes to the system and provides credit card information and an electronic message address (e.g. and email address or mobile phone number). The system does not store the entire credit card information. Upon a purchase, a credit card processor forwards credit card information to the system. A related message address is identified. A survey previously created by the merchant is transmitted to the address. The customer receives the receipt and survey. The customer completes the survey and submits it to the system. The system forwards the survey results to the merchant. | 11-15-2012 |
20120296830 | METHOD AND MOBILE TERMINAL FOR REALIZING NETWORK PAYMENT - For solving the problem that multiple Universal Serial Bus (USB) Keys are required to be taken to realize multiple network payments in the conventional art, the provides a method and a mobile terminal for realizing network payment. The method includes: a mobile terminal selects a network payment system which is needed to implement current network payment from a plurality of network payment systems according to an instruction input by a user; when the user is confirmed to be a legal user according to the digital certificate, the mobile terminal logs on the selected network payment system and implements the network payment. The selects a network payment system which is needed to implement the current network payment from a plurality of network payment systems, thus it is not needed to take multiple USB Keys. | 11-22-2012 |
20120317035 | PROCESSING TRANSACTIONS WITH AN EXTENDED APPLICATION ID AND DYNAMIC CRYPTOGRAMS - Methods, systems, and machine-readable media are disclosed for handling information related to a transaction conducted with a presentation instrument at a POS device. Extended application IDs and dynamic cryptograms are use for the transaction. According to one embodiment, a method of processing a financial transaction for an account having a primary account number (PAN) can comprise detecting initiation of the transaction with the presentation instrument, and providing from the presentation instrument to the POS device a list of one or more applications IDs. Each application ID identifies an application that can be used to communicate data concerning the transaction between the presentation instrument and the POS device. The POS device selects one of the application IDs and returns it to the presentation instrument. Under the control of the selected application, the presentation instrument generates a Dynamic Transaction Cryptogram (DTC) and a dynamic PAN that are each valid for only a single transaction. | 12-13-2012 |
20120330845 | ANIMATED TWO-DIMENSIONAL BARCODE CHECKS - Systems and methods are disclosed to provide an animated 2D barcode check that is used to securely and efficiently transmit financial information between mobile devices. The financial information includes a check written by a payer and transmitted to a merchant. The check includes account information of the payer and of the merchant with a payment service provider, a payment amount, and a cryptographic signature that has been certified by the payment service provider. The payer's mobile device encodes the check into a sequence of 2D barcodes and displays the sequence of 2D barcodes in a loop that is scanned by a camera on the merchant's mobile device. The merchant uses the cryptographic signature to verify the validity of the signature on the check without having Internet connectivity to the payment service provider. The merchant may later present the check to the payment service provider to receive payment. | 12-27-2012 |
20130024383 | Mobile Device With Secure Element - Embodiments of the present invention are directed to methods, systems, and apparatuses for securely communicating issuer updates, upgrades, and allowing configuration of payment-related applications on a mobile communication device using a mobile security application. One embodiment is directed to a method of using a mobile communication device comprising a mobile security application, a key associated with the mobile security application, a first mobile payment application in communication with the mobile security application and a second mobile payment application in communication with the mobile security application. The method includes communicating, by the first mobile payment application in the mobile communication device with a mobile gateway, in a first communication, wherein the first communication is encrypted using the key and communicating, by the second mobile payment application in the mobile communication device with a mobile gateway, in a second communication, wherein the second communication is encrypted using the key. | 01-24-2013 |
20130024384 | HAND GEOMETRY BIOMETRICS ON A PAYMENT DEVICE - The present invention discloses a system and methods for biometric security using multiple biometrics in a transponder-reader system. The biometric security system also includes a biometric sensor that detects biometric samples and a device for verifying biometric samples. In one embodiment, the biometric security system includes a transponder configured with a biometric sensor. In another embodiment, the system includes a reader configured with a biometric sensor. In yet another embodiment, the present invention discloses methods for proffering and processing multiple biometric samples to facilitate authorization of transactions. | 01-24-2013 |
20130036059 | ELECTRONIC PRICE-PROPOSING SYSTEM, ELECTRONIC PRICE-PROPOSING DEVICE, AND ELECTRONIC PRICE-PROPOSING METHOD - An electronic price-proposing server is provided with: a secret-key recording means for recording identification codes assigned individually to multiple user terminals and calculation values thereof, in association with each of the users as secret keys thereof, an encrypting means for generating encryption data with the chaotic encryption method, a price-data recording means for recording the encryption data in association with the corresponding item and user, a searching means for searching for and reading encryption data corresponding to requests from user terminals, and a transmitting means for transmitting the result thereof to the user terminals. Meanwhile, the user terminals are provided with: a decrypting means for decrypting the received encrypted data, using an identification-code value read out from an identification-code value reading means, and generating the original price data, and a displaying means for displaying the decrypted price data. | 02-07-2013 |
20130046698 | SYSTEM AND METHOD OF CREATING AND AUTHENTICATING A SECURE FINANCIAL INSTRUMENT - A system and method for creating secure financial paper documents (such as checks and money orders) by issuing agents that can be readily verified by redeeming agents in real time using existing computer and network technology. | 02-21-2013 |
20130054472 | SYSTEM AND METHOD OF WIRELESSLY DOWNLOADING DIGITAL MEDIA ITEMS - A system and method of wirelessly downloading digital media items which automatically downloads the digital media items to portable communication devices in environments where users are engaged with other activities. An example system includes a network including a wireless network defining a zone of coverage, and a server. The server stores locked digital media items, establishes an account for a digital media customer, automatically downloads selected locked digital media items to a portable communication device of the customer when the customer has brought the portable communication device within the zone of coverage and the portable communication device is connected to the server through the wireless network, processes payment from the customer for a number of downloaded locked digital media items, and provides keys for unlocking the number of downloaded locked digital media items. | 02-28-2013 |
20130054473 | Secure Payment Method, Mobile Device and Secure Payment System - The invention discloses a secure payment method, a mobile device and a secure payment system. The secure payment method including steps of: transmitting an encrypted payment request packet from a payment service provider to a mobile device; receiving the encrypted payment request packet by a first operating system running within a normal domain of the mobile device; bypassing the encrypted payment request packet to a second operating system running within a secured domain on the mobile device; decrypting payment request data from the encrypted payment request packet under the secured domain; generating payment response data according to the payment request data under the secured domain; encrypting the payment response data into an encrypted payment response packet under the secured domain; bypassing the encrypted payment response packet to the first operating system under the normal domain; and, transmitting the encrypted payment response packet to the payment service provider. | 02-28-2013 |
20130054474 | SYSTEMS AND METHODS FOR AUTHORIZING A TRANSACTION WITH AN UNEXPECTED CRYPTOGRAM - Methods are described for performing a timely authorization of digital credential data delivered from a mobile device that is without access to a local persistently stored permanent cryptographic key; through an interrogation with a point-of-sale that behaves according to the direction of a card specification; wherein the card specification expects the mobile device to create a cryptogram that is calculated, at least in part, using the permanent cryptographic key and, at least in part, from unpredictable data delivered from the point-of-sale to the mobile device during the interrogation. | 02-28-2013 |
20130060705 | METHOD AND SYSTEM TO SECURELY STORE CUSTOMER DATA IN A NETWORK-BASED COMMERCE SYSTEM - A system and method for securely storing customer data in a network-based commerce system. Customer data is received via a network connection through an application interface. A symmetric key is generated and the customer data is encoded with the symmetric key. The symmetric key is encoded with an asymmetric key to generate an encoded symmetric key. The encoded customer data and the encoded symmetric key are stored. | 03-07-2013 |
20130060706 | OVER THE AIR UPDATE OF PAYMENT TRANSACTION DATA STORED IN SECURE MEMORY - A system, apparatus, and method for processing payment transactions that are conducted using a mobile device that includes a contactless element, such as an integrated circuit chip. The invention enables the updating, correction or synchronization of transaction data maintained by an Issuer with that stored on the device. This is accomplished by using a wireless (cellular) network as a data communication channel for data provided by an Issuer to the mobile device, and is particularly advantageous in circumstances in which the contactless element is not presently capable of communication with a device reader or point of sale terminal that uses a near field communications mechanism. Data transferred between the mobile device and Issuer may be encrypted and decrypted to provide additional security and protect the data from being accessed by other users or applications. If encryption keys are used for the encryption and decryption processes, they may be distributed by a key distribution server or other suitable entity to a mobile gateway which participates in the data encryption and decryption operations. | 03-07-2013 |
20130060707 | INTER-NETWORK FINANCIAL SERVICE - Systems and methods for making a payment on behalf of a payer to a payee are provided. A request to make a payment on behalf of a payer to a payee is received at a first payment service provider. The first payment service provider supports a first payment network within a plurality of payment networks that each include a respective plurality of payers and payees. The payer is one of the plurality of payers and payees associated with the first payment network, and the payor is not one of the plurality of payers and payees associated with the first payment network. A second payment network within the plurality of payment networks with which the payee is associated is identified by the first payment service provider. A payment instruction to make the payment to the payee is transmitted by the first payment service provider to a second payment service provider associated with the second payment network. | 03-07-2013 |
20130066786 | METHOD AND SYSTEM FOR PROVIDING AN INTERNET BASED TRANSACTION - A method of providing an Internet based transaction for goods or services offered via a website, the method comprising requesting from the website a secure financial transaction from a merchant associated with the website for said goods or services using an Internet access device, activating an encryption device in data communication with the Internet access device, receiving from the encryption device encrypted user financial card details for the secure financial transaction, the Internet access device transmitting the received encrypted user financial card details over the Internet to a transaction server, decrypting the received encrypted user financial card details at the transaction server, and forwarding the decrypted card details to a financial institution in data communication with the transaction server and thereafter using the decrypted card details to complete the secure financial transaction for the Internet based transaction for said goods or services. | 03-14-2013 |
20130066787 | SYSTEM AND TREATMENT PROCESS OF A FINANCIAL TRANSACTION - The invention relates to a system and treatment process of a bank reimbursement transaction of a user of the system having made a first bank expense transaction for a company ( | 03-14-2013 |
20130073467 | METHOD AND SYSTEM FOR CONDUCTING FINANCIAL TRANSACTIONS USING MOBILE DEVICES - An approach for conducting financial transactions using mobile devices is described. Authentication transaction information for a financial transaction event is received from a mobile device. A determination is made as to whether the mobile device is registered with a financial service. A message that includes an access code for completing the financial transaction event at a banking device associated with the financial service is generated if the mobile device is registered with the financial service. | 03-21-2013 |
20130080331 | System and Method for Instantaneous Retail Payment - A system for performing a retail payment between a customer and a merchant is provided. The system includes a signed scrip having a public key, a credit value, a signed scrip validation stamp, a credit value, and a validation stamp; a signed invoice comprising a transaction list and an invoice validation stamp; and a private key complementary to the public key, wherein the public key is used to decode the signed scrip; the private key is stored in a server coupled to a network; and the private key is used by the server to validate the authenticity of the signed invoice. Also provided is a method for performing a financial transaction using a system as above; and a non-transitory machine-readable medium including a plurality of machine-readable instructions to cause a server to perform a method as above, is provided. | 03-28-2013 |
20130080332 | EFFICIENT AUTHENTICATION OF A USER FOR CONDUCT OF A TRANSACTION INITIATED VIA MOBILE TELEPHONE - A method and system for authenticating a user for conduct of a transaction initiated by the user via a data-enabled telephone is presented. Efficient use is made of keystrokes on the data-enabled telephone. The data-enabled telephone is capable of initiating telephone calls over a telephone network and of engaging in two-way data communication with a data server in a network and the server enables conduct of the transaction. Caller identification information is received at the server. The information is associated with a telephone call request initiated by the user via the data-enabled telephone to a service number. The caller identification provides basis for authentication of the user and the caller identification information received at the service number is used to address a message to the user. Included in such a message is a logon key for use by the user in accomplishing the transaction. Thus the user can use the logon key to enter into data communication with the server for conduct of the transaction. | 03-28-2013 |
20130091062 | Secure Mobile-Based Financial Transactions - Devices, systems and methods are disclosed which relate to securing payments from a mobile communications device. In exemplary embodiments, a mobile communications device communicates with a payment server via a point-of-sale device to conduct a transaction. The mobile communications device uses a client payment logic to send payment information to the point-of-sale device. The point-of-sale device uses a vendor payment logic to forward the payment information to the payment server. The payment server verifies the payment information and sends confirmation to the point-of-sale device. | 04-11-2013 |
20130124421 | SECURE AUTHENTICATION METHOD AND SYSTEM FOR ONLINE TRANSACTIONS - Embodiments of the invention relate to a secure authentication method for online transactions, an online transaction secure authentication system, an online transaction secure authentication client, and a computer program product for secure authentication of online transactions thereof. The secure authentication method includes: generating, using one or more computer processors, a random session key to encrypt communications between a client and a server; verifying a user identity of a user using the client based on the generated random session key; in the event that the verification of the user identity is successful, generating transaction image information, encrypting the transaction image information based on the random session key, and transmitting the encrypted transaction image information to the client; receiving a confirmation of the transaction image information, the confirmation comprising a transaction signature; and verifying the transaction signature based on the random session key. | 05-16-2013 |
20130124422 | SYSTEMS AND METHODS FOR AUTHORIZING TRANSACTIONS VIA A DIGITAL DEVICE - In various embodiments, transactions initiated by or on behalf of users between client systems and transaction systems are sent to authorization systems for approval. An authorization system contacts one or more registered devices for approval from a user of the registered devices for the transactions initiated by or on behalf of the users that are being handled by the transaction systems. A registered device sends an approval or denial based on user input. The authorization server then sends the approval or denial to a transaction system to complete a transaction. | 05-16-2013 |
20130138571 | Systems and Protocols for Anonymous Mobile Payments with Personal Secure Devices - Disclosed is a multi-purpose secure and anonymous payment system based on a variety of cryptographic confidentiality, authentication, and privacy methods. Users pay anonymously over the Internet using their mobile phones supported by the secure SIM card. The SIM cards do not reveal any personal payment information that is not directly necessary for the transaction to either the merchant or the bank. The system allows configuration of different cryptographic methods or hardware components to allow proper balancing of any specific implementation while maintaining strong security and privacy. It is resilient to connection breakdowns and allows users and merchants to recover from such disruptions without maintaining complex transaction states on the SIM card and without financial losses to any of the parties. The system and protocols can also be configured for electronic cash payments with smart cards or software agents on the Internet or at conventional merchant sale terminals. | 05-30-2013 |
20130159195 | AUTHENTICATION OF DEVICES - Disclosed are systems and techniques that authenticate and authorize a mobile device to conduct transactions over a network with a banking server. Once a mobile device is authenticated, the server generates a client device identifier and a secret key, which is then stored on the mobile device. In response to a transaction request sent by the mobile device, the server authorizes a session by generating a random code and communicates the random code to the mobile device. By using a combination of the secret key and the random code, the mobile device generates two keys, a hash code and a symmetrical key. The server receives the hash code and the unique client device identifier, and based upon a determination, authorizes the transaction on the banking server. | 06-20-2013 |
20130173476 | Computer system and method for initiating payments based on cheques - A system and method for initiating electronic payments based on paper cheques, including a paying party chip-and-PIN terminal arranged to input cleartext data including a cheque number and an amount from a cheque issued by a first bank, at which the paying party has an account, and generating from it encoded data using a key, for the user to write on the cheque; and a computer associated with the first bank, arranged to accept, from a paid party via the internet, data defining a second bank and an account at the second bank, associated with the paid party; accepting, from the paid party, the cleartext data and the encoded data from the cheque, and validating the cleartext data from the cheque using the encoded data and the key; and initiating an electronic funds transfer from the first bank to the second bank of the amount specified on the cheque. | 07-04-2013 |
20130179351 | SYSTEM AND METHOD FOR AN AUTHENTICATING AND ENCRYPTING CARD READER - A system for encrypting and authenticating a payment transaction includes a card reader, a computing device, a card swipe application and a checkout application. The card reader includes a reader head, a secure microcontroller, and an interface. The reader head reads payment card data from a payment card. The secure microcontroller stores a unique reader identification (reader ID), and at least a first encryption key, and includes a payment card decoder application and an encryption application. The encryption application encrypts the payment card data and produces encrypted payment card data. The encryption application further encrypts the transaction data with the first encryption key and produces encrypted transaction data. The checkout application receives the encrypted payment card data and the encrypted transaction data and forwards them to a payment server for processing of the payment transaction. | 07-11-2013 |
20130179352 | SECURE WIRELESS TRANSACTIONS WHEN A WIRELESS NETWORK IS UNAVAILABLE - Methods, systems, and devices are disclosed for conducting offline transactions using mobile devices at a point of sale device while the point of sale device is disconnected from a network. The point of sale device may receive a request from a user for a transaction code associated with a transaction between the mobile device and a point of sale device; generate an offline transaction code based on a current offline transaction code key stored at the mobile device and a time code associated with the transaction in response to a determination that the mobile device is disconnected from a payment authority server; provide the generated offline transaction code from the mobile device to the point of sale device; and receive an indication from the point of sale device that the payment authority server has approved the transaction based on the generated offline transaction code. | 07-11-2013 |
20130191290 | METHOD, DEVICE AND SYSTEM FOR SECURING PAYMENT DATA FOR TRANSMISSION OVER OPEN COMMUNICATION NETWORKS - A method for securing payment data for transmission over open communication networks is disclosed. The method comprises establishing a data connection between a first and a second transceiver device, the first transceiver device configured as a merchant device and the second transceiver device configured as a customer transceiver device. The merchant device transmits a first data package which comprises a unique merchant identifier and transaction request data, to the customer transceiver device over the data connection. The merchant device receives a cryptogram from the customer transceiver device. The cryptogram having been generated from using a secret key and a counter value together with the received unique merchant identifier and the transaction request data. The method comprises forming an authorisation request comprising the received cryptogram, merchant identifier and the transaction request data and submitting said authorisation request to at least one of an issuer and an acquirer to facilitate authorisation and processing of said transaction request data. | 07-25-2013 |
20130198086 | TRUSTED SERVICE MANAGER (TSM) ARCHITECTURES AND METHODS - A client device comprises a first secure element and a second secure element. The first secure element comprises a first computer-readable medium having a payment application comprising instructions for causing the client device to initiate a financial transaction. The second secure element comprises a second computer-readable medium having a security key, a payment instrument, stored authentication data and instructions for generating a secure payment information message responsive to the payment application. The secure payment information message comprises the payment instrument and is encrypted in accordance with the security key. | 08-01-2013 |
20130204795 | Wireless Payment with a Portable Device - A portable device transmits a payment card number to a merchant machine. The portable device generates an encrypted first message comprising a request to get information about a financial transaction. A packet filter maps the encrypted first message to a pre-established non-GBR bearer. The portable device generates a fourth message by encrypting the encrypted first message and transmits the fourth message. The portable device receives and decrypts a second encrypted message. The portable device decrypts the decrypted second message and sends financial transaction information to a display. | 08-08-2013 |
20130212025 | MECHANISM TO ALLOW THE USE OF DISPOSABLE CARDS ON A SYSTEM DESIGNED TO ACCEPT CARDS CONFORMING TO THE STANDARDS OF THE GLOBAL PAYMENTS INDUSTRY - At a terminal assembly associated with a physical access point, payment device data is obtained from a reduced-functionality payment device, and the data is identified as emanating from such a device. In response, the payment device data emanating from the reduced-functionality payment device is converted into an authorization request or an access request, of a format consistent with full-functionality payment devices. The authorization request or access request is dispatched into a payment infrastructure which is configured to handle same, but is not configured to handle the reduced-functionality payment device. | 08-15-2013 |
20130212026 | DATA PROTECTION WITH TRANSLATION - Systems and methods are disclosed in which data associated with a transaction are protected with encryption. At an access device, a PIN associated with a payment account may be encrypted with a first key derived from an initial key of the access device and sensitive data associated with the payment account may be encrypted with a second key derived from the initial key. At a secure module associated with a host server encrypted sensitive data of an authorization request message may be decrypted. The secure module associated with the host server can re-encrypt the sensitive data using a zone encryption key associated with a payment processing network. A translated authorization request message including the re-encrypted sensitive data can be transmitted by the merchant server to the payment processing network. | 08-15-2013 |
20130212027 | SYSTEMS, METHOD AND COMPUTER-ACCESSIBLE MEDIUMS FOR PROVIDING SECURE PAPER TRANSACTIONS USING PAPER FIBER IDENTIFIERS - Exemplary systems, methods and computer-accessible mediums can receive information comprising a first speckle pattern(s) associated with a portion(s) of the paper. The information can be generated by an optical arrangement, and the first speckle pattern(s) can be compared with a second speckle pattern(s) to determine if a similarity, measure based on local or global descriptors is of equal to a predetermined amount or within a predetermined range. | 08-15-2013 |
20130226814 | MEDIA DEVICE PAYMENTS REMOTE CONTROL PERSONALIZATION AND PROTECTION - A server is operable to receive a media device identifying number (ID) and to create an established association between the media device with a payment account and to support at least one of payment authorization and payment clearing based at least in part on the media device ID and the payment account. The server is further operable to produce the payment account information to a smart card personalization service server to facilitate creation of a smart card with the payment account information that is associated with the media device. The server is also operable to produce the media device ID to the smart card personalization service server to facilitate creation of a smart card with the payment account information based in part on the media device ID. | 08-29-2013 |
20130226815 | METHOD OF PERFORMING A FINANCIAL TRANSACTION VIA UNSECURED PUBLIC TELECOMMUNICATION INFRASTRUCTURE AND AN APPARATUS FOR SAME - A method of performing a financial transaction via unsecured public telecommunication infrastructure comprising collecting data relating to a specified financial transaction type; building a transaction token including collected data and/or data derived from the collected data; encrypting the transaction token; creating a financial transaction protocol message incorporating the encrypted transaction token as dependent on a selected transport channel through which the message is to be conveyed; and conveying the financial transaction protocol message using the selected transport channel and by way of the unsecured public telecommunication infrastructure to a destination where the financial transaction protocol message will be further processed is disclosed. | 08-29-2013 |
20130246280 | SECURE DIGITAL INVOICE PROCESSING - A method of processing a digital invoice may include receiving, at the access device, a digital invoice for the transaction; sending, from the access device to an identity repository, information associated with the digital invoice; receiving, from the identity repository, a first signature for the digital invoice; providing, by the access device, a second signature for the digital invoice; and sending, from the access device, the first signature and the second signature for use in the transaction. | 09-19-2013 |
20130246281 | SERVICE PROVIDING SYSTEM AND UNIT DEVICE - According to one embodiment, the verifying device sends, to the service providing device, the user identification information in the user identification information certificate and the execution result that indicates properness when all the verification results are proper. the service providing device reads service user identification information associated with the user identification information in response to user identification information and a verification result. The service providing device sends the service information to the user terminal in accordance with the read service user identification information. | 09-19-2013 |
20130254116 | SYSTEM AND METHOD FOR AUTHENTICATING A PAYMENT TERMINAL - A method of authenticating a payment terminal, involves the terminal generating a terminal activation request from a private encryption key and from at least one terminal credential that is uniquely associated with the terminal. The terminal activation request includes a public encryption key. The public encryption key and the private encryption key comprise an asymmetric encryption key pair. The terminal transmits the terminal activation request to a certificate server, and receives an activation response from the certificate server in response. The activation response includes a digital authentication certificate that includes the public encryption key. The terminal authenticates to a computer server, that is distinct from the certificate server, using the digital authentication certificate. | 09-26-2013 |
20130254117 | SECURED TRANSACTION SYSTEM AND METHOD - Systems and methods for performing financial transactions are provided. In one embodiment, the invention provides for method for bank card transactions, including: reading the token information at the point of swipe for traditional and non-traditional POS platforms; performing a low-security task on the token information using a first microprocessor, wherein the non-security task includes one or more tasks from the group of encryption determination, encryption-decryption request, key management, token information delivery, or transactional data delivery; and performing a security-related task on the token information using a second microprocessor based on a request from the first microprocessor, wherein the security-related task includes one or more tasks from the group of token information authentication, token information decryption, or token information encryption. Formatting the encrypted information such that it is compatible with the format of the current POS system. | 09-26-2013 |
20130254118 | Decoding system coupled to a payment system that includes a cryptographic key - A decoding system includes a decoding engine running on a mobile device that decodes signals produced from a read of a first party's financial transaction card. The decoding engine accepts and initializes incoming signals from a read of the first party's financial transaction card until the signals reach a steady state, detects the read once the incoming signals are in a steady state, identifies peaks in the incoming signals and digitizes the identified peaks in the incoming signals into bits. A transaction engine runs on the mobile device and is coupled to the decoding engine. The transaction engine receives as its input decoded first party's financial transaction card information from the decoding engine, and serves as an intermediary between the first party and a second party, so that the first party does not have to share his/her financial transaction card information with the second party. | 09-26-2013 |
20130254119 | SYSTEM AND METHOD FOR AUTHENTICATING A NETWORK GATEWAY - A method of network gateway authenticating involves a network gateway receiving an authentication request from a communications terminal. The communications terminal is in communication with an identity token. The authentication request includes a token cryptogram generated from a cryptographic key stored on the identity token. The network gateway transmits the authentication request to a communications network, and receives an authentication response from the communications network in accordance with a validity of the token cryptogram. The authentication response includes a gateway authentication certificate. The gateway authentication certificate is configured to authenticate the network gateway to a network device of the communications network. | 09-26-2013 |
20130262317 | SYSTEMS AND METHODS FOR PROCESSING MOBILE PAYMENTS BY PROVISONING CREDENTIALS TO MOBILE DEVICES WITHOUT SECURE ELEMENTS - A method for generating and provisioning payment credentials to a mobile device lacking a secure element includes: generating a card profile associated with a payment account, wherein the card profile includes at least payment credentials corresponding to the associated payment account and a profile identifier; provisioning, to a mobile device lacking a secure element, the generated card profile; receiving, from the mobile device, a key request, wherein the key request includes at least a mobile identification number (PIN) and the profile identifier; using the mobile PIN; generating a single use key, wherein the single use key includes at least the profile identifier, an application transaction counter, and a generating key for use in generating a payment cryptogram valid for a single financial transaction; and transmitting the generated single use key to the mobile device. | 10-03-2013 |
20130262318 | METHOD AND SYSTEM FOR PERFORMING A COMMERCIAL TRANSACTION BY USING A SHORT MESSAGE SERVICE TERMINAL - Method for performing a commercial transaction wherein a customer having a computer connected to a public network such as the Internet network and a SMS terminal is able to receive and send SMS messages over a telephone network and can order an article by using the computer to a commercial server connected to the public network. | 10-03-2013 |
20130268444 | THREE-FACTOR USER AUTHENTICATION METHOD FOR GENERATING OTP USING IRIS INFORMATION AND SECURE MUTUAL AUTHENTICATION SYSTEM USING OTP AUTHENTICATION MODULE OF WIRELESS COMMUNICATION TERMINAL - The present invention authenticates a user using iris information in order to generate OTP, generates OTP using a 3-factor authentication method based on HMAC, and performs encryption thereof, and also relates to a security system that secures and controls a wireless communication terminal owned by a user through the following methods: a method for managing the storage of a program memory having a management program and encrypted key values stored therein, by directly inputting the iris information in real-time; a method for authenticating a wireless communication terminal by mutually authenticating two methods having different directions, the methods being an authentication by an OTP integrated authentication server through a service providing server, and an authentication by a public authentication facility through a wireless authentication server; a method for enabling the service usage of packets for communication between a user and a server only through iris authentication in order to prevent a DoS attack during the communication; and a method for protecting the system by protecting the original and patch files of the applications and the drives using iris information and constantly monitoring same, thus enabling secure electronic transaction services. | 10-10-2013 |
20130275308 | SYSTEM FOR VERIFYING ELECTRONIC TRANSACTIONS - The invention is an electronic payment system designed to capture payments from customers in an ecommerce environment, including on-line via a browser, a mobile browser or a mobile application, which can support any card payment method but can also integrate with e Wallets such as Pay Pal and Google checkout, and which enhances security for all parties using two factor two channel authentication and card fragmentation solutions, and which simplifies and enhances the payment process for shoppers and consumers. | 10-17-2013 |
20130275309 | Electronic-payment authentication process with an eye-positioning method for unlocking a pattern lock - This invention discloses an eye-positioning method for unlocking a pattern lock by a user, comprising: showing to the user a pattern diagram on a display, the pattern diagram being pre-stored in a storage device at a back-end server, and is transmitted to the display via a network; capturing a facial image of the user by a video-taking equipment coupled to the display; an on-screen marker real-time tracking an eye of the payer, enabling the marker to move on the pattern diagram to form a marker-movement path according to movement of the eye relative to the video-taking equipment, the eye being either a left eye or a right eye as pre-agreed; and determining if the marker-movement path includes an entirety of a pre-set action path. This invention also provides an electronic-payment authentication method using the aforementioned pattern-unlocking method, for payments at retail sites and for online payments. | 10-17-2013 |
20130275310 | TERMINAL DATA ENCRYPTION - A method is disclosed. The method includes generating an initial key after interacting with an access device, storing the initial key at a key storage location, altering the initial key with a public key to form an altered key, and sending the altered key to a server computer along with an identifier for the access device. The altered key is changed to the initial key at the server computer and is stored with the identifier in a database in operative communication with the server computer. The initial keys that are stored at the key storage location and in the database are used to alter and restore transaction data associated with multiple financial transactions that are conducted using the access device. | 10-17-2013 |
20130275311 | Witnessed Ad-Hoc Uservices - A service may be any device hardware and/or software, or portion thereof, that can be identified by a provider for sharing with or selling to a consumer device in accord with a negotiation for its sharing or selling. The consumer may be any machine capable of consuming or providing a service; artificial intelligence may facilitate the sharing/selling. A witness may: track negotiations for sharing/selling, authenticate consumers/providers, and facilitate financial payments between consumers/providers. Financial charges may be micro-charges, e.g., very low cost. A consumer/provider may have an associated reputation that may affect the negotiation, and a party may be transitory and/or in an environment risking interruption of the sharing or selling, and these characteristics may affect the negotiation. The witness may electively cover losses to the consumer/provider, particularly when the cost of the transaction is a micro-charge. | 10-17-2013 |
20130282590 | ELECTRONIC PAYMENTS USING VISUAL CODE - A payer can present an electronic payment to a payee using a visual code. Such a visual code may be created by generating a semi-payment that records and secures the electronic payment to be made to the payee, encrypting a semi-payment identifier with the payee's encryption key, and encoding the encrypted semi-payment identifier into a visual code. The visual code may be received by the payee or by any user authorized to accept payments on behalf of the payee, who can accept the visual code payment by capturing the visual code using a user device. The captured visual code may be decrypted using the payee's decryption key installed on the user device, so that the semi-payment identifier can be retrieved and transmitted to a payment service provider, which completes the payment by processing the semi-payment located using the semi-payment identifier. | 10-24-2013 |
20130282591 | Method And System Using Candidate Dynamic Data Elements - A method and computer readable medium for conducting a transaction, comprising receiving a verification value and a portion of a dynamic data element, determining candidate dynamic data elements using the portion of the dynamic data element, calculating candidate verification values using candidate dynamic data elements, and determining if the received verification value matches any of the candidate verification values, wherein the transaction is thereafter authenticated if a candidate verification value matches a candidate verification value. | 10-24-2013 |
20130290192 | PORTABLE HANDHELD DEVICE FOR WIRELESS ORDER ENTRY AND REAL TIME PAYMENT AUTHORIZATION AND RELATED METHODS - A portable handheld device for wireless order entry and real time payment authorization may include a portable housing, a display carried by the housing, an order entry input device carried by the housing, a transaction card input device carried by the housing for reading user sensitive information from a transaction card, a wireless transceiver carried by the housing, and a processor carried by the housing and connected to the display, order entry input device, transaction card input device and wireless transceiver. The processor may be for wirelessly sending input order information, and encrypting and wirelessly sending the user sensitive information from the transaction card without storing and without displaying. The processor may also be for wirelessly receiving and displaying payment authorization information based upon real time authorization from a transaction card issuing entity. | 10-31-2013 |
20130297514 | Two-Level Authentication for Secure Transactions - A system and method provide efficient, secure, and highly reliable authentication for transaction processing and/or access control applications. A Personal Digital Key stores one or more profiles (e.g., a biometric profile) in a tamper-proof memory that is acquired in a secure trusted process. Biometric profiles comprise a representation of physical or behavioral characteristics that are uniquely associated with an individual that owns and carries the PDK. The PDK wirelessly transmits the biometric profile over a secure wireless transaction to a Reader for use in a biometric authentication process. The Reader compares the received biometric profile to a biometric input acquired at the point of transaction in order to determine if the transaction should be authorized. | 11-07-2013 |
20130297515 | Wireless Payment with a Portable Device - A portable device receives an account information request signal from a merchant machine. The portable device transmits a response message to the merchant machine. The response message comprises the account information for a purchase. The portable device transmits a first message to an account server. The first message comprises a request to get information comprising the purchase amount. The portable device receives a second message comprising the information from the account server. The portable device sends the purchase amount to a display. | 11-07-2013 |
20130297516 | PAYMENT TRANSACTION METHOD AND CORRESPONDING APPLICATIONS - A payment transaction is to be executed between a user terminal (TU | 11-07-2013 |
20130304652 | CONTENT TRANSACTION MANAGEMENT SERVER DEVICE, CONTENT-PROVIDING SERVER DEVICE, AND TERMINAL DEVICE AND CONTROL PROGRAM - A content transaction management server device includes: a memory storing decryption keys used in decryption of encrypted content data; a communication unit for information; a payment-request reception unit receiving, through the communication unit, a first storage address indicating a storage area where the decryption keys of encrypted content data in the memory are stored and user identifiers identifying users who are purchasers of the encrypted content data; a payment-procedure processing unit implementing payment-procedure processes related to purchase transactions of encrypted content data by a user identified by user identifiers in the payment request; and a decryption-key transmission unit that, after payment-procedure processing based on the payment-procedure processing unit is completed, reads out, from the memory, decryption keys stored in the storage area indicated by the first storage address included in the payment request and transmits, through the communication unit, the decryption keys to the transmission source of the payment request. | 11-14-2013 |
20130311382 | OBTAINING INFORMATION FOR A PAYMENT TRANSACTION - A computer-readable medium embodies a computer program for obtaining information for a payment transaction. The computer program comprises computer-readable program code for: generating a first message including an identifier and a request for the information, sending the first message via a first communication path, receiving a second message including the information and the identifier via a second path different from the first communication path, and processing the payment transaction using the information obtained in the second message. | 11-21-2013 |
20130311383 | GLOBAL SECURE SERVICE PROVIDER DIRECTORY - Systems and methods enable members of a secure transaction network to readily identify the appropriate trusted service manager (TSM) to support a particular transaction. A global directory of TSM providers is provided that a secure service provider can use for determining which TSM provider is the authorized manager of a security domain for the particular transaction. In aspect the directory of TSM providers may be stored within a mobile device secure element. In another aspect, the directory of TSM providers may be stored in a central TSM repository. In a further aspect, the directory of TSM providers may be distributed among a number of secondary TSM repositories. The appropriate TSM may be identified based upon a secure element identifier and an application identifier provided by a secure element as part of the transaction. Communication of the identifiers from mobile devices may be via cellular or near field communication links. | 11-21-2013 |
20130332367 | SOFTWARE PIN ENTRY - A card reader configured to read a smart card can be detachably connected to a mobile computing device. When the card reader is attached to the mobile device, an application installed on the mobile computing device permits the mobile device to communicate with the card reader in order to process transactions. | 12-12-2013 |
20130339252 | FORMAT-PRESERVING CRYPTOGRAPHIC SYSTEMS - Format-preserving encryption and decryption processes are provided. The encryption and decryption processes may use a block cipher. A string that is to be encrypted or decrypted may be converted to a unique binary value. The block cipher may operate on the binary value. If the output of the block cipher that is produced is not representative of a string that is in the same format as the original string, the block cipher may be applied again. The block cipher may be repeatedly applied in this way during format-preserving encryption operations and during format-preserving decryption operations until a format-compliant output is produced. Selective access may be provided to portions of a string that have been encrypted using format-preserving encryption. | 12-19-2013 |
20130339253 | Mobile Device Based Financial Transaction System - A system and method for conducting financial transactions by means of a smartphone is disclosed. A barcode is printed on the invoice, which is scanned by the mobile device screen. The mobile device is used instead of a credit card or cash. Provisions for data security, transaction verification, and communications protocols are disclosed. | 12-19-2013 |
20130346318 | SECURE TRANSACTION SYSTEMS AND METHODOLOGIES - A secure transaction system including a content delivery network defining edge gates for secure communication with entities outside the network, each edge gate including at least one of encryption and decryption functionality, the encryption functionality being operative to encrypt customer payment card information into no payment card zone (NPCZ) capsules and the decryption functionality being operative to decrypt the NPCZ capsules into customer payment card information securely supplied to at least one of a plurality of payment processing entities, the content delivery network defining a NPCZ, and a plurality of seller entities within the NPCZ which conduct transactions with a plurality of customers and with at least one of the payment processing entities, and receive, process and transmit customer payment information using the NPCZ capsules, the plurality of seller entities not having access to unencrypted payment card information and not having the ability to decrypt encrypted payment card information. | 12-26-2013 |
20130346319 | SYSTEM AND METHODS FOR USING LIMIT-USE ENCRYPTED CODE TO TRANSFER VALUES SECURELY AMONG USERS - A system and method for facilitating a secured value transfer. A first user and the system obtain a pair of encryption and decryption apparatuses. The first user creates a request including his unique identifier and a value to be transferred. The first user encrypts the request using the encryption apparatus and sends it to the second user. The second user sends to the system the request and the second user's unique identifier. The system uses the decryption apparatus to decrypt the request. The system checks the usage of the request against a threshold limit. After a successful usage check, the system then transfers the value from the first user to the second user. The system may comprise (a) a plurality of system server for exchanging data with users' personal computing devices, registering users, and conducting transactions, and (b) data storages storing user accounts and other persistent data. | 12-26-2013 |
20140006289 | SECURE PAYMENT MADE FROM A MOBILE DEVICE THROUGH A SERVICE PROVIDER | 01-02-2014 |
20140012763 | MONEY TRANSFER FRAUD PREVENTION METHODS AND SYSTEMS - Embodiments of the invention provide a fraud deterrent for retail money transfer or stored value product. In some embodiments, a two dimensional grid of number, letters, characters, and/or symbols can be provided retail packaging or cards that can be used as a second authentication factor in order to redeem funds. In some embodiments, methods and/or systems are also provided that associate control numbers with the grid, create the grid, provide the grid on packaging, and/or use the grid to authenticate a customer. | 01-09-2014 |
20140019365 | Processing payment information for online orders at a local merchant's point of sale via direct payment - An online catalog system and method provide customers with a way to place online orders with local merchants, while providing local merchants with the ability to receive payment on an order for order basis prior to shipping the order to the customer. A local merchant's inventory and pricing information is hosted on an online catalog system. An order processing device in communication with the online catalog system is provided to the local merchant. The order processing device receives online order requests and payment information from customers via the online catalog system. The order processing devices generates a payment article at the local store comprising payment information that is then processed at the local merchant's point of sale device. | 01-16-2014 |
20140025584 | INDICIA ENCODING SYSTEM WITH INTEGRATED PURCHASE AND PAYMENT INFORMATION - An indicia encoding system is disclosed herein that encodes integrated information on products and/or services selected for purchase and payment information for purchasing the selected products and/or services, in accordance with a variety of embodiments involving various methods, devices and systems. In one illustrative embodiment, a method may include entering purchase order information via one or more input/output components. The purchase order may include an indication for one or more products and/or one or more services. The method may also include entering payment information, including information on a method of payment, via one or more input/output components. The method may also include generating a machine-readable indicia that encodes both the purchase order information and the payment information, with the payment information in an encrypted form; and displaying the machine-readable indicia on a screen. | 01-23-2014 |
20140040147 | SECURE AND CONVENIENT MOBILE AUTHENTICATION TECHNIQUES - Security and convenience are provided by a system, apparatus, method, and computer program product that stores two or more encryption keys that correspond to two or more levels of authentication. The encryption keys may be encrypted and decrypted utilizing an endorsement key and trusted computing techniques. Or the encryption keys may be stored in a secure manner utilizing key protection techniques, such as cryptographic camouflaging. A first encryption key is recovered automatically for the first level of authentication. And input is requested to recover the second encryption key for the second level of authentication. | 02-06-2014 |
20140040148 | SYSTEMS AND METHODS FOR ARBITRAGED ENHANCED PAYMENT PROCESSING - An arbitraged enhanced payment processing system in association with a distributed enhanced payment processing system includes a merchant point of sale (POS) terminal system and a remote payment management system. The POS terminal system initiates a transaction that includes receiving a payment amount, a purchaser account identifier, a virtual electronic payment indicator, and a merchant ID via a payment client. Subsequently, the POS terminal system outputs the transaction to the remote payment management system which generates a token for the transaction. The payment management system then provides the purchaser account identifier, a merchant account identifier, and the payment amount to a payment processing servicer. Upon receiving a payment processing servicer response, the payment management system outputs the response and token to the POS terminal system. | 02-06-2014 |
20140040149 | PAYMENT SYSTEM - Methods, apparatus and computer software are provided for authorizing an EMV transaction between a user device and a point of sale terminal, particularly, but not exclusively, in situations where a secure element is not made available for the deployment of a payment application on the user device. The payment application is instead deployed to a processing environment that is outside of any secure element on the user device. An ICC Master Key corresponding to the payment application is held by a trusted authority, such as the issuing bank. The trusted authority is adapted generate time-limited session keys on the basis of the ICC Master Key and distribute session keys to the payment application. Receipt of a session key by the payment application enables the payment application to conduct an EMV payment transaction. The session key is used to authorize a single EMV payment transaction. | 02-06-2014 |
20140046855 | DATA COMMUNICATION SYSTEM USING PROXIMITY AUTHENTICATION - A touchscreen input device providing a predetermined pattern of “touches” on a touchscreen provides proximity authentication to a mobile device communicating with a terminal such as a vending machine or the like. A “point configuration” generated on the mobile device by the touchscreen input device ma be communicated to a coordinating computer that matches the point configuration to the point configuration of the terminal to determine that the mobile device is proximate to the terminal. This proximity may be used as a requirement to complete the vending machine transaction or further data communication between the mobile device and the terminal. | 02-13-2014 |
20140052641 | Electronic Invoice Issuing System For Electronic Commerce Website - An electronic invoice issuing system for an electronic commerce website is provided. The system comprises: an online trading platform; a security electronic invoice apparatus, preset with a code table of goods and services, an electronic invoice template and a digital signature of an electronic commerce enterprise, and configured to receive a payer information and a trading information from the online trading platform, to add the payer information and the trading information into the electronic invoice template according to the code table of goods and services so as to issue an electronic invoice, and to digitally sign the electronic invoice by the digital certificate of the electronic commerce enterprise; and an electronic invoice information management platform with an access interface, configured to receive the electronic invoice from the security electronic invoice apparatus, to store a registration of the electronic invoice and to provide the electronic invoice to a predesignated user. | 02-20-2014 |
20140052642 | PURCHASE TRANSACTION SYSTEM WITH ENCRYPTED PAYMENT CARD DATA - Systems and methods are provided for securing payment card information. A user may present a payment card such as a credit card to point-of-sale equipment. The point-of-sale equipment may encrypt the payment card information. An encryption algorithm may be used that takes as inputs a first part of the payment card information, a tweak formed by a second part of the payment card information, and an encryption key. The encrypted payment card information may be conveyed to a gateway over a communications network. The gateway may identify which encryption algorithm was used in encrypting the payment card information and may re-encrypt the payment card information using a format preserving encryption algorithm. A network-based service may be used to remotely perform functions for the gateway. | 02-20-2014 |
20140058952 | SYSTEMS AND METHODS FOR CONDUCTING TRANSACTIONS AND COMMUNICATIONS USING A TRUSTED THIRD PARTY - Systems and methods are provided for performing transactions and managing communications using a trusted third party. In one embodiment, a sender transfers an encrypted version of a file (such as a digitally encoded audio track, movie, document, or the like) to someone who wishes to receive it. The receiver computes a first hash of at least a portion of the encrypted data content, and sends the first hash to a third party configured to compare at least a portion of the first hash to at least a portion of a second hash. The receiver receives a file decryption key from the third party, and decrypts at least the portion of the received encrypted data content with the decryption key. In some cases, multiple hashes of the encrypted data content may be computed, each using a different portion of the encrypted data content. | 02-27-2014 |
20140058953 | POS PAYMENT TERMINAL AND A METHOD OF DIRECT DEBIT PAYMENT TRANSACTION USING A MOBILE COMMUNICATION DEVICE, SUCH AS A MOBILE PHONE - A POS payment terminal ( | 02-27-2014 |
20140067688 | GAMING SYSTEM WITH SECURE ELECTRONIC PAYMENT COUPON REDEMPTION - A cryptographic key is associated with an identifier (ID) of an electronic gaming machine (EGM). A computing device receives a coupon redemption request including an electronic payment coupon having the EGM ID and a credit amount. The computing device authenticates the electronic payment coupon based at least in part on the cryptographic key associated with the EGM ID and transmits a redemption confirmation when the electronic payment coupon is successfully authenticated. The computing device also stores a cancellation associated with the electronic payment coupon. The cancellation indicates that the electronic payment coupon has been redeemed for the credit amount. Such an electronic payment coupon may, for example, be generated by an EGM and/or be redeemed using an EGM and/or any other computing device capable of receiving the electronic payment coupon, transmitting a redemption request, and providing the credit amount to a user. | 03-06-2014 |
20140067689 | SECURITY MODULE AND METHOD OF SECURING PAYMENT INFORMATION - A security module of a computer which is invisible to an operating system executed by a processor of the computer and which establishes an encrypted session for receiving payment data from a payment peripheral. | 03-06-2014 |
20140067690 | ENSURING SECURE ELECTRONIC TRANSACTIONS WITH A CLUSTER OF SERVICE FACILITIES - Ensuring secure electronic transactions between clusters of service facilities and at least one electronic transaction facility provided at a user device involves enrolling and registering the electronic transaction facility with a main service facility via software delivered from the main service facility to the user device, establishing security credentials for the clusters of service facilities with the main service facility, and configuring the electronic transaction facility with transaction credentials of at least one service facility in the clusters of service facilities when a user opts to avail a service from the service facility. | 03-06-2014 |
20140067691 | ESTABLISHING TRUST FOR CONDUCTING ELECTRONIC TRANSACTIONS AMONG SERVICE PROVIDERS AND USERS - Establishing trust to conduct direct, secure electronic transactions between a user and a service provider includes establishing trust between a wallet service center and an electronic traction facility, a user of the electronic transaction facility, and a service provider. Conducting the direct secure electronic transactions involves the wallet service center providing representations of individual trust established between the wallet service center and each of the user and the service provider to the service provider and user respectively. | 03-06-2014 |
20140074721 | HYBRID VIRTUAL ACCOUNT AND TOKEN-BASED DIGITAL CASH PROTOCOLS - The hybrid virtual account and token-based digital cash protocols provide a user with many pairs of secret and public keys. One of the pairs is the master pair, which consists of one master user private key and one master user public key. Other pairs are pseudonym pairs, wherein each consists of one pseudonym user private key and one pseudonym user public key. The use of a master key pair and pseudonym key pairs circumvents the need for blind signatures. None of the invention's protocols require blind signatures. The protocols comprise public key protocols, digital signatures and symmetric key protocols. | 03-13-2014 |
20140074722 | USE OF STATE OBJECTS IN NEAR FIELD COMMUNICATION (NFC) TRANSACTIONS - A near field communication (NFC)-enabled client device includes one or more computer-readable storage media and an NFC interface component operational in a card emulation mode of an NFC protocol. The client device also includes an application for performing a transaction using the NFC protocol. The application is stored on the one or more computer-readable storage media. Programming logic is configured to receive and store a state object (e.g., a cookie) provided by a security authority using the NFC protocol when performing a transaction using the application. The state object includes an identifier, data payload and a public key associated with the security authority. The programming logic is also configured to transmit the state object to the security authority upon receiving an HTTP operation identifying the state object. | 03-13-2014 |
20140074723 | COMMUNICATING PAYMENTS - For communicating payments, a mobile device reads a point-of-sale code from a point-of-sale device. A clearing house generates a payment authorization comprising an authorization code and a transaction amount. The clearing house communicates the payment authorization through the mobile device to the point-of-sale device. The point-of-sale device completes the transaction in response to receiving the payment authorization. | 03-13-2014 |
20140074724 | SYSTEMS AND METHODS FOR REAL-TIME ACCOUNT ACCESS - Systems, methods, and computer-readable media are provided for processing and settling financial transactions. An example method comprises receiving a transaction from an originator. The transaction comprises information associated with an identification of an initiating user or the account. The method comprises determining the actual account number, transmitting a financial services transaction request comprising the actual account number to a financial institution, receiving a response, and transmitting a response back to the originator. Another method comprises receiving, from a user device, a request to associate a financial account with a user account. The method comprises generating and sending an association message to a payment network and receiving a key associated with the financial account for use in initiating financial transactions. Another method comprises utilizing such a key to generate and process a transaction request. Other systems, methods, and media are also provided. | 03-13-2014 |
20140081872 | APPARATUS FOR SECURING ELECTRONIC TRANSACTIONS USING SECURE ELECTRONIC SIGNATURES - Chip card for an electronic transaction including a display, a keypad, a network interface, a processing unit, a microcontroller and a memory area for signature information and/or key information, characterised by a means which enables the chip card to connect to a host system via the network interface so as to appear to the host system as an integrated card reader with inserted chip card, whereby the transaction data relating to the chip card are received by the host system via the network interface for presentation on the display so that the transaction data can be confirmed by key input on the keypad, provided with the signature, and then sent to the PC. | 03-20-2014 |
20140081873 | ONLINE PAYMENT INTERACTIVE PROCESSING METHOD AND ONLINE PAYMENT INTERACTIVE PROCESSING SYSTEM - An online payment interactive processing method and system are provided. The method includes: sending a payment request associated with a user account from a client terminal to a payment processing server; receiving a payment completion notification from the payment processing server, the payment completion notification including a unique notification identifier associated with the payment request; sending a payment verification request based on the unique notification identifier to the payment processing server; receiving a payment verification result from the payment processing server; and updating the user account based on information in the payment verification result. According to the present invention, a person with malicious intent who obtains a key associated with the client terminal is prevented from forging a payment completion notification because the person does not have the notification ID, which greatly enhances the security of online payment interactive processing. | 03-20-2014 |
20140089202 | CRM Security Core - A security core supports a networked banking app for a client application device communicating with a server, such as e.g. a smartphone. It provides a secure environment for the banking app to conduct registration, enrollment, and transaction workflows with corresponding back-end servers on the network. It includes defenses against static analysis, attempts at reverse engineering, and real-time transaction fraud. A principal defense employed is obfuscation of the protocols, APIs, algorithms, and program code. It actively detects, thwarts, misdirects, and reports reverse engineering attempts and malware activity it senses. A routing obfuscator is configured to operate at the outer layer. Previous core designs are retained as camouflage. An internal TLS library is used rather than the OS TLS layer. Cookies are managed internally in the core rather than in the webkit-browser layer. | 03-27-2014 |
20140089203 | FORMAT-PRESERVING CRYPTOGRAPHIC SYSTEMS - Key requests in a data processing system may include identifiers such as user names, policy names, and application names. The identifiers may also include validity period information indicating when corresponding keys are valid. When fulfilling a key request, a key server may use identifier information from the key request in determining which key access policies to apply and may use the identifier in determining whether an applicable policy has been satisfied. When a key request is authorized, the key server may generate a key by applying a one-way function to a root secret and the identifier. Validity period information for use by a decryption engine may be embedded in data items that include redundant information. Application testing can be facilitated by populating a test database with data that has been encrypted using a format-preserving encryption algorithm. Parts of a data string may be selectively encrypted based on their sensitivity. | 03-27-2014 |
20140089204 | FORMAT-PRESERVING CRYPTOGRAPHIC SYSTEMS - Key requests in a data processing system may include identifiers such as user names, policy names, and application names. The identifiers may also include validity period information indicating when corresponding keys are valid. When fulfilling a key request, a key server may use identifier information from the key request in determining which key access policies to apply and may use the identifier in determining whether an applicable policy has been satisfied. When a key request is authorized, the key server may generate a key by applying a one-way function to a root secret and the identifier. Validity period information for use by a decryption engine may be embedded in data items that include redundant information. Application testing can be facilitated by populating a test database with data that has been encrypted using a format-preserving encryption algorithm. Parts of a data string may be selectively encrypted based on their sensitivity. | 03-27-2014 |
20140101055 | SYSTEMS, METHODS, AND COMPUTER PROGRAM PRODUCTS FOR MANAGING REMOTE TRANSACTIONS - Systems, methods, and computer-program products are provided for managing remote transactions. A first request including a wallet identifier (WID) is received from a merchant system. One or more sets of account data, each including an account identifier, are retrieved from at least one memory, based on the WID. A first response including the one or more sets of account data retrieved from the at least one memory are transmitted to the merchant system. An authorization request including an account identifier corresponding to one of the one or more sets of account data retrieved from the at least one memory are received, from either the merchant system or an acquirer system. A transaction data request including the account identifier is transmitted to an issuer system. A transaction data response including transaction data is received from the issuer system and the transaction data is transmitted to the merchant system or the acquirer system. | 04-10-2014 |
20140101056 | PORTABLE NEAR-FIELD COMMUNICATION DEVICE - An embodiment of the present invention may be deployed in a mobile payment device configured to communicate with a payment terminal via an RF near-field communication channel. The payment device comprises a sensor to detect and log usage parameters corresponding to behaviors of the user of the payment device. Sensors may take the form of any from movement sensors, light sensors or orientation sensors for example. In order to prevent inadvertent execution of a payment instruction from the terminal, the log of parameters created due to the user's behaviors is compared with a predetermined set of parameters compatible with a user's expected behaviors should he be intentionally performing payment behaviors and payment is only authorized if a match is achieved. | 04-10-2014 |
20140101057 | SYSTEM FOR MANAGEMENT OF ALTERNATIVELY PRICED TRANSACTIONS - A system and method thereof, comprising means for: communicating through at least one computer network interface with each of (i) a plurality of providers of accountable resources, and (ii) a plurality of registrars which register clients, each client having access to accountable resources of providers, and maintain client-associated accounts therewith; generating a token verifying that a client is authenticated by a registrar; logging accountable transactions identifying a client-associated account and a transaction valuation, maintained by the registrar; and periodically accounting for the logged accountable transactions between respective registrars and respective providers; wherein a valuation of the accountable transaction is dependent at least on information conveyed in the token. | 04-10-2014 |
20140108262 | Privacy Preserving E-Payment Architecture, Systems, and Methods - A method for providing privacy in online transactions. The method can include receiving, at a service provider system, a purchase request from a client, the purchase request including banking information, and the banking information being encrypted with a third party public key such that the service provider system cannot decrypt the encrypted banking information. The encrypted banking information can be transmitted to a bank system, such that the banking information cannot be used to identify the identity of the client. The method can also include receiving an authorization message if the client's purchase request is authorized. | 04-17-2014 |
20140108263 | VIRTUALIZATION AND SECURE PROCESSING OF DATA - Systems, methods, and non-transient machine-interpretable data representing executable instruction sets and/or other products for the processing of data for the secure creation, administration, manipulation, processing, and storage of electronic data useful in the processing of payment transactions and other secure data processes. In various aspects and embodiments the disclosure provides secure means for the authorization of sensitive and other data processes subject to controlled access. Such processes include, for example the creation, administration, authorization, virtualization, storage, and other manipulation or processing of electronic data representing characteristics of, instructions for, and information associated with consumer, business, and other payment accounts, and other forms of secure payment elements, such as payment tokens; and data useful in processing transactions using such accounts and elements. Information associated with particular payment means, such as accounts or payment tokens, can be stored, for example, in a data set, usually secure, sometimes referred to as a virtual or electronic wallet, or a secure payment token. | 04-17-2014 |
20140108264 | SERVICE INTERACTION METHOD OF FLASH SERVICE PLATFORM AND CORRESPONDING FLASH SERVICE PLATFORM - A computer-implemented method is implemented while rendering an application in a Flash interface, wherein the Flash interface is connected to a Flash server. The method comprises: suspending the application and displaying a payment selection option in the Flash interface; upon detecting a user selection of the payment selection option, sending a request for downloading a payment plug-in to the Flash server; receiving and initializing the payment plug-in, the payment plug-in including an SWF file and a callback function; displaying a payment authorization option in the Flash interface based on the SWF file; upon detecting a user selection of the payment authorization option, sending payment authorization information to the payment platform; receiving payment confirmation from the payment platform by invoking the callback function; and resuming the application by updating displayed content of the Flash interface based on the payment confirmation. | 04-17-2014 |
20140108265 | SYSTEM AND METHOD OF AUTHENTICATING A NETWORK GATEWAY - A method of network gateway authenticating involves a network gateway receiving an authentication request from a communications terminal. The communications terminal is in communication with an identity token. The authentication request includes a token cryptogram generated from a cryptographic key stored on the identity token. The network gateway transmits the authentication request to a communications network, and receives an authentication response from the communications network in accordance with a validity of the token cryptogram. The authentication response includes a gateway authentication certificate. The gateway authentication certificate is configured to authenticate the network gateway to a network device of the communications network. | 04-17-2014 |
20140114861 | HAND-HELD SELF-PROVISIONED PIN PED COMMUNICATOR - A device for storing and transmitting information stored data cards preferably includes a case, a central processing unit (CPU), an operating system, a keypad, a screen display, a secure memory device and a transmission element. A PIN must be entered through the keyboard to operate the electronic card device. The PIN is stored in the secure memory device, Data cards may be entered through a card swipe, a global platform smart card device, a NUMI Key system and manual entry. The transmission element includes a programmable magnetic stripe. The programmable magnetic stripe is programmed to replicate the data on a magnetic stripe of a card. A programmable magnetic stripe is readable by a card transaction device. The operating system displays the cards retained in the memory device through the screen display. The electronic card device preferably includes a global platform smart card device for reading and writing NFC data. Inputs and presentments are performed primarily by end user self-provisioning. | 04-24-2014 |
20140136420 | SYSTEM AND METHOD FOR NEW EXECUTION AND MANAGEMENT OF FINANCIAL AND DATA TRANSACTIONS - A system and method for execution of financial and data transactions includes a point-of-sale device configured to execute a transaction in which at least one good or service is sold to an individual having a card with a storage medium encoding a card number. The transaction is completed after said point-of-sale device receives a data transmission authorizing said transaction. The point-of-sale device is configured to communicate via the Internet with a first computing system. The first computing system stores a set of instructions that cause the first computing system to evaluate the transaction to determine whether the transaction is to be authorized, and to send a transmission authorizing the transaction via the open network to said point-of-sale device. | 05-15-2014 |
20140136421 | METHOD OF REGISTERING A MEMBERSHIP FOR AN ELECTRONIC PAYMENT, SYSTEM FOR SAME, AND APPARATUS AND TERMINAL THEREOF - The present invention relates to a method of registering a membership for an electronic payment, a system for same, and an apparatus and a terminal thereof. The system according to the present invention includes: a terminal for receiving an application identifier, registering payment means information and processing a membership registration completion, when at least one or more of first authentication information, second authentication information and fourth authentication information input by a user is authenticated; and a membership registration apparatus for, when at least one or more of a first authentication procedure completion signal, a second authentication procedure completion signal and a fourth authentication procedure completion signal is received from the terminal, confirming whether membership application of user information on the terminal is performed, allocating the application identifier to perform electronic payment, and completing membership registration for the user information on the terminal after registering the payment means information. | 05-15-2014 |
20140143155 | ELECTRONIC PAYMENT METHOD, SYSTEM AND DEVICE FOR SECURELY EXCHANGING PAYMENT INFORMATION - Electronic payment method for securely exchanging payment information between an authentication device and an authorization server via a communication device. The authentication device comprising an interface for data exchange with the device, a user interface for user authentication data input, a nonvolatile memory for storing an authentication device ID, a data memory for storing a cryptographic key and a crypto-processor for performing cryptographic operations. The communication device comprising a device ID and an interface for receiving and sending data, the authorization server comprising an interface for data exchange with the device, a database for storing a plurality of customer accounts each including an authentication device ID associated to a device holder authentication data, a data storage for storing a second cryptographic key, and a cryptographic unit for performing cryptographic operations. | 05-22-2014 |
20140149294 | METHOD AND SYSTEM FOR PROVIDING SECURE END-TO-END AUTHENTICATION AND AUTHORIZATION OF ELECTRONIC TRANSACTIONS - A method and system for performing secure end-to-end authentication of an electronic transaction initiated by a user using a user device is provided. At least one secret element comprising payload data encrypted using at least two cryptographic keys is generated and transmitted to the user device. An image of the at least one secret element is captured and analyzed by an authentication device. The image is analyzed to extract the payload data by decrypting the payload data using at least two cryptographic keys. Geo-location of the user device and the authentication device is determined if the extracted payload data is associated with a unique URL including a string. Based on the determination, a secure page displayed on the authentication is accessed using the unique URL. Finally, the transaction is processed after verification of the transaction details on the secure page and the transaction is confirmed. | 05-29-2014 |
20140156534 | METHOD FOR SECURELY STORING AND FORWARDING PAYMENT TRANSACTIONS - Method, systems, and apparatus for receiving transaction data for the payment transaction, where the transaction data includes at least card track data; encrypting the transaction data at the data processing apparatus using an encryption key of a cryptographic key pair to generate encrypted transaction data, where the cryptographic key pair includes the encryption key and a decryption key; storing a plurality of copies of the encrypted transaction data in a plurality of storage devices; receiving an instruction to submit the transaction data for processing; decrypting the encrypted transaction data using the decryption key; and submitting the transaction data for processing by an issuer. | 06-05-2014 |
20140164254 | Authenticating Remote Transactions Using a Mobile Device - Embodiments of the invention can combine card not present transaction processing with PIN verification. A merchant or a consumer can initiate transactions using any suitable transaction initiation channel. One aspect of the invention helps facilitate payment card authentication across multiple wallet providers/merchants using an encrypted card PIN and a digital certificate. One aspect of the invention can incorporate the use of different transaction networks to perform authentication and authorization processing. | 06-12-2014 |
20140172722 | SECURING COMMUNICATIONS WITH A PIN PAD - Described in an example embodiment herein is an apparatus comprising an input device and a processor communicatively coupled with the input device. The processor employs asymmetric encryption to provision the input device with a terminal master key. The processor employs the terminal master key with a symmetric encryption algorithm to transfer a communication key to the input device. | 06-19-2014 |
20140180930 | MEDIA DEVICE PAYMENTS REMOTE CONTROL PERSONALIZATION AND PROTECTION - A server is operable to receive a media device identifying number (ID) and to create an established association between the media device with a payment account and to support at least one of payment authorization and payment clearing based at least in part on the media device ID and the payment account. The server is further operable to produce the payment account information to a smart card personalization service server to facilitate creation of a smart card with the payment account information that is associated with the media device. The server is also operable to produce the media device ID to the smart card personalization service server to facilitate creation of a smart card with the payment account information based in part on the media device ID. | 06-26-2014 |
20140195440 | VIRTUAL ACCOUNT BASED NEW DIGITAL CASH PROTOCOLS - Virtual account based digital cash protocols employ two pairs of private and public keys. Each public key is certified separately and the protocols do not use any blind signature schemes. As a result, the virtual account based digital cash protocols provide strong protection of the user privacy by using two certified public keys instead of a blind signature. One pair of certified keys consists of one master user private key and one master user public key. A second pair of certified keys consists of one pseudonym user private key and one pseudonym user public key. The use of a master key pair and a pseudonym key pair circumvents the need for blind signatures. As a result, the proposed protocols do not require blind signatures and do not add additional overhead and security requirements necessitated by conventional blind signature schemes. The protocols use public key protocols, digital signatures and symmetric key protocols, which may be readily implemented in standard information security based systems based on cryptographic constructs. In addition, the protocols may be deployed in mobile, off-line, and on-line settings. | 07-10-2014 |
20140214688 | SYSTEM AND METHOD FOR SECURE TRANSACTION PROCESS VIA MOBILE DEVICE - A secure element with a user security domain thereon, the user security domain constituted of: a security domain control circuitry; an encoder/decoder functionality responsive to the security domain control circuitry; and a secured keys storage in communication with the security domain control circuitry, the encoder/decoder functionality arranged to: encode data responsive to at least one first key stored on the secured keys storage, and output an encoded data; and decode received data responsive to at least one second key stored on the secured keys storage, and output a decoded data. | 07-31-2014 |
20140222687 | APPARATUS AND METHOD FOR REVERSE AUTHORIZATION - An apparatus and method for user identity control are provided. The apparatus includes a communication unit, a storage unit including a unique ID and a plurality of sections, each section including different identity information, and a controller for, in response to a transaction request, transmitting a request for identity information to an authorization server via the communication unit, and for, in response to authorization information received from the authorization server, transmitting identity information to a third party to complete the transaction according to the received authorization information. | 08-07-2014 |
20140222688 | APPARATUS AND METHODS FOR SECURE ELEMENT TRANSACTIONS AND MANAGEMENT OF ASSETS - Methods and apparatus for the deployment of financial instruments and other assets are disclosed. In one embodiment, a security software protocol is disclosed that guarantees that the asset is always securely encrypted, that one and only one copy of an asset exists, and the asset is delivered to an authenticated and/or authorized customer. Additionally, exemplary embodiments of provisioning systems are disclosed that are capable of, among other things, handling large bursts of traffic (such as can occur on a so-called “launch day” of a device). | 08-07-2014 |
20140236837 | PROXIMITY SENSOR FOR CLOUD-BASED ENTITLEMENT - A server receives a first key from a mobile device. The mobile device comprises a mobile device proximity-based device that receives the first key from a product and/or product package proximity-based device associated with a product and/or a product package when the mobile device is within a proximity to the product and/or product package proximity-based device. Further, the server receives a second key from the mobile device. In addition, the server receives a third key from a checkout device after purchase of the product and/or the product package. The server also provides cloud-based entitlement to media content associated with the product and/or the product package to a user identifier. | 08-21-2014 |
20140236838 | ACCOUNT ACCESS AT POINT OF SALE - A user makes a payment at a POS by entering the user's phone number (either through a keypad or via a card swipe) and PIN into a POS device (such as through a keypad). That information is communicated to a payment provider, who can then access the user's account, determine whether to approve or deny the payment, and notify the merchant of the decision. | 08-21-2014 |
20140236839 | USER-MEDIATOR MONITORING AND CONTROLLING ACCESS TO ELECTRONIC CONTENT - Methods, systems and apparatuses for a user-mediator controlling access to an electronic content, are disclosed. One method includes receiving, by a user-mediator server of the user-mediator, a second share SK | 08-21-2014 |
20140244514 | METHODS AND ARRANGEMENTS FOR SMARTPHONE PAYMENTS AND TRANSACTIONS - The disclosure relates to a smartphone-based virtual wallet, that manages payment options available to a user. One claim recites portable device comprising: a touch screen display; a video camera; a microphone for capturing ambient audio; memory for storing an image, and for storing components of a virtual wallet; and one or more processors. The one or more processors are configured for: controlling the video camera to capture imagery corresponding to a checkout terminal's display, the display displaying imagery including digital watermarking information hidden therein, the information including transaction information; processing captured imagery to decode the digital watermarking to obtain the transaction information; receiving user input corresponding to payment information included in a component of the virtual wallet; controlling communication with a remotely located third party, so that the transaction information and payment information are provided to the third party; outputting a request for user confirmation based on a request received from the third party; and controlling communication with the remotely located third party so that a user confirmation is provided to the third party. A great variety of other features, arrangements and claims are also detailed. | 08-28-2014 |
20140250017 | METHODS FOR SECURE TRANSMISSION OF SENSITIVE DATA AND DEVICES THEREOF - A method, non-transitory computer readable medium and transaction management device comprising receiving data encrypted using a public asymmetric key and a symmetric key from a mobile computing device, wherein the public asymmetric key and the symmetric key is shared between the transaction management device and the mobile computing device prior to receiving the data. The received data is decrypted using the received symmetric key and an asymmetric private key, wherein the asymmetric private key is generated by the transaction management device prior to receiving the data. One or more actions are performed on the decrypted data | 09-04-2014 |
20140258133 | Secure Mobile-Based Financial Transactions - Devices, systems and methods are disclosed which relate to securing payments from a mobile communications device. In exemplary embodiments, a mobile communications device communicates with a payment server via a point-of-sale device to conduct a transaction. The mobile communications device uses a client payment logic to send payment information to the point-of-sale device. The point-of-sale device uses a vendor payment logic to forward the payment information to the payment server. The payment server verifies the payment information and sends confirmation to the point-of-sale device. | 09-11-2014 |
20140279557 | METHOD AND SYSTEM FOR SECURE KEY ROTATION - This invention discloses a novel system for securing and using payment token data in a system for processing electronic payment transactions that does not require down-time for rekeying encryption keys when the keys are rotated. | 09-18-2014 |
20140279558 | Two-Way, Token-Based Validation for NFC-Enabled Transactions - Systems, methods and computer program products that facilitate the token-based validation of contactless payment and other transactions involving NFC-enabled mobile devices are disclosed. In an aspect, the system includes a server and field-located validator devices to which consumers can present their NFC-enabled mobile devices in order to validate their purchases/payments. In one aspect, a consumer can purchase an admission ticket to a public transport system using their mobile device which communicates directly with the server to receive a token. The user can later present their mobile device to the validator device to actuate a turnstile. Advantageously, the validator devices do not have to be in real-time communication with the server, and limit the duration between the mobile device's request for a token and the time by which the token expires. Increased security is provided through two-way, token-based validation between the mobile and validator devices. | 09-18-2014 |
20140279559 | SYSTEM AND METHOD FOR USING MULTIPLE PAYMENT ACCOUNTS USING A SINGLE PAYMENT DEVICE - A method and system for transmitting multiple payment accounts for use by a payment device. The method includes allocating a cryptographic personal account number (CPAN) and producing at least one cryptographic master key set relating to this CPAN and transmitting, by a transmitting device, at least one produced cryptographic master key set for storage in a payment device. Further, the method includes receiving, by a receiving device, at least one device personal account number (DPAN), wherein each of the at least one DPAN is associated with a payment account associated with a consumer; generating, by a processing device, a repersonalization script for each of the at least one DPAN, wherein the repersonalization script includes a set of data associated with the corresponding DPAN; and transmitting, by the transmitting device, at least one repersonalization script to the payment device. The payment device is configured to use the CPAN for selected cryptographic calculations, and use the DPAN and the associated set of data for other aspects of a financial transaction. | 09-18-2014 |
20140279560 | Authentication System - A two way authentication method, including receiving by an authentication server first encrypted data from a merchant computing device, receiving by the authentication server second encrypted data from a customer computing device, determining by the authentication server if the first encrypted data matches the second encrypted data, if the first encrypted data matches the second encrypted data, authenticating the customer computing device, if the first encrypted data does not matches the second encrypted data, not authenticating the customer computing device. | 09-18-2014 |
20140279561 | ALPHANUMERIC KEYPAD FOR FUEL DISPENSER SYSTEM ARCHITECTURE - A vending machine can include a secure payment platform comprising one or more secure components for communicating sensitive information, an alphanumeric keypad configured outside of the secure payment platform for receiving input., and a keypad application operating within the secure payment platform to obtain input received on the alphanumeric keypad. | 09-18-2014 |
20140279562 | SYSTEMS, METHODS AND APPARATUSES FOR SECURELY STORING AND PROVIDING PAYMENT INFORMATION - The systems, methods and apparatuses described herein provide a virtual integrated circuit card (ICC). In one aspect, a method of creating a virtual ICC may be provided. The method may comprise obtaining executable code configured to run on a user device to facilitate financial transactions, preparing a first encryption key usable by the executable code, receiving a second encryption key associated with the user device, forming a virtual ICC comprising the executable code and the first encryption key, and encrypting the virtual ICC with the second encryption key. In another aspect, a virtual ICC may be embodied on a non-transitory computer-readable medium. The virtual ICC may comprise executable code configured to run on a user device to facilitate financial transactions and a first encryption key usable by the executable code. The virtual ICC may be encrypted using a second encryption key associated with the user device. | 09-18-2014 |
20140279563 | SYSTEM AND METHOD FOR PERMITTING A USER TO SUBMIT A PAYMENT ELECTRONICALLY - A system and method for permitting a user to submit a payment electronically, which includes a network and an electronic device in communication. The electronic device is operated by the user to submit an electronic payment request. A first server in communication with the network receives the request and in response communicates an encryption key and process to the electronic device. The electronic device encrypts the financial information with the encryption key and process and communicates encrypted financial information to the first server. A second server is in communication with the first server at least some of the time via an Internet connection. If there is Internet connectivity, the first server communicates the encrypted financial information to the second server. If there is no Internet connectivity and the payment amount is less than a predefined amount, the first server communicates to the electronic device that the payment has been accepted. | 09-18-2014 |
20140289130 | SECURE REMOTELY CONFIGURABLE POINT OF SALE TERMINAL - The embodiment(s) relate to a method of remotely configuring a Point-of-Sale (PoS) terminal. The method includes generating, at a merchant device, payment information based on a transaction input, signing the generated payment information with a private key, and transmitting the signed payment information and a public key certificate signed by a certificate authority to the PoS terminal for validation of the payment information at the PoS terminal using the public key certificate. The PoS terminal configures a terminal profile of the PoS terminal according to instructions received in the payment information from the merchant device when the payment information is validated at the PoS terminal. | 09-25-2014 |
20140297539 | DONGLE DEVICE WITH RECHARGEABLE POWER SUPPLY FOR A SECURE ELECTRONIC TRANSACTION - The various embodiments herein provide a dongle device with rechargeable power supply for a secure electronic transaction. The dongle device comprises a slot for swiping a magnetic stripe card, a slot for inserting a contact type card, a rechargeable battery, a recharging circuit, a key pad, a key pad cover, a connector, wherein the connector is an audio jack, a cover for safeguarding the connector, a stylus, a universal serial bus (USB) port, a processor and a display. The rechargeable battery is powered by the recharging circuit when a residual battery level of the rechargeable battery falls below a preset value. The key pad is used to enter PIN and the key pad cover prevents an onlooker from viewing and learning the PIN entered by a user. | 10-02-2014 |
20140297540 | DONGLE DEVICE WITH TAMPER PROOF CHARACTERISTICS FOR A SECURE ELECTRONIC TRANSACTION - The various embodiments herein provide a dongle device with tamper proof characteristics for a secure electronic transaction. The dongle device comprises a housing which includes a first half comprising a main circuit board and a second half comprising a secondary circuit board, a slot for swiping a magnetic stripe card, a slot for inserting a contact type card, a communication module, a key pad, a connector, a cover for safeguarding the connector, a stylus, a universal serial bus (USB) port, a processor and a display. The processor continuously monitors a connection between the main circuit board and the secondary circuit board and kills the dongle device when processor detects a tampering. The first half and the second half of the dongle device are ultrasonically sealed together. The main circuit board and the secondary circuit board are electrically and electronically connected through a compressible connector. | 10-02-2014 |
20140304170 | REMOTE CREDIT ISSUANCE SYSTEM - Systems and methods for establishing a credit account are disclosed. The systems and methods may receive a first encrypted payload comprising application data associated with a credit application by a credit issuer. The first encrypted payload may be decrypted to provide intelligible application data comprising applicant identifying information. A credit application can be processed using the applicant identifying information and a credit account can be established based on the credit worthiness determined and associated with the applicant. A second encrypted payload comprising credit account information associated with the credit account can then be established and transmitted to a client at the first location. | 10-09-2014 |
20140304171 | METHOD AND SYSTEM TO FACILITATE SOCIAL ECOMMERCE - Method and system are provided to facilitate social ecommerce. A computer-implemented social ecommerce service may be deployed at one or more server computer systems that may be referred to, collectively as a provider system. A provider system may be in communication with one or more merchant computer systems and one or more on-line social network systems. The social ecommerce service executing at the provider system may be configured to interact with an on-line store and an on-line social service in order to facilitate a process of social ecommerce. | 10-09-2014 |
20140304172 | ELECTRONIC SIGNATURE SECURITY ALGORITHMS - Technologies are generally described for security algorithm methods in authorizing and linking devices associated with a customer. A first device can be linked to a customer account. Additional devices can be linked to the customer account. Those devices can be authenticated to perform banking operations using dual factor authentication wherein a customer's login information is a first factor and the customer using a previously authenticated device is a second factor. By using additional methods of authentication, transactions can be done more reliably and securely. | 10-09-2014 |
20140310182 | SYSTEMS AND METHODS FOR OUTPUTTING INFORMATION ON A DISPLAY OF A MOBILE DEVICE - Disclosed herein is a method for outputting information on a display of a mobile device | 10-16-2014 |
20140310183 | EMBEDDED ACCEPTANCE SYSTEM - Methods and systems can provide for unified processing of merchant transactions over various payment channels over which the transactions originate, such as in-person retail transactions and e-commerce transactions. For example, transactions can be received from payment channels through different payment channel-specific interfaces. The transactions from the various payment channels can then be sent to an entry point module that centrally manages the transactions. An orchestrator can then identify payment channel-agnostic transaction services to be applied to the transactions. This can allow for a unified end-to-end encryption implementation across a merchant's enterprise, reducing management costs and improving overall security. Similarly, universal tokenization services, payment and fraud management can be provided across a merchant's entire enterprise. | 10-16-2014 |
20140310184 | SMART CARD PURCHASING TRANSACTIONS USING WIRELESS TELECOMMUNICATIONS NETWORK - A smart card transaction allows a consumer to load value onto a smart card and to make purchases using a smart card with a mobile telephone handset over the telecommunications network. For loading, the system includes: a mobile telephone handset including a card reader; a gateway computer; a funds issuer computer; and an authentication computer. The mobile telephone handset receives a request from a user to load a value onto the smart card. The handset generates a funds request message which includes the value and sends the funds request message to a funds issuer computer. The funds issuer computer debits an account associated with the user. Next, the handset generates a load request message with a cryptographic signature and sends the load request message to an authentication computer which authenticates the smart card. The handset receives a response message which includes a cryptographic signature and an approval to load. Finally, the handset validates the second cryptographic signature and loads the value onto the smart card. For payment, the system includes a merchant server and a payment server. First, the handset sends an order request message to the merchant server computer, and in return receives a purchase instruction message. The handset processes the purchase instruction message locally, and then sends a draw request message to a payment server computer. The payment server computer sends a debit message which includes a cryptographic signature and an approval to debit the smart card. Finally, the handset validates the cryptographic signature and debits the smart card. | 10-16-2014 |
20140310185 | METHOD AND ARRANGEMENT FOR AUTHORIZING A USER - The present invention relates to a method and system for activating a first mobile terminal ( | 10-16-2014 |
20140316992 | METHOD FOR CHARGING AN ONBOARD-UNIT WITH AN ELECTRONIC TICKET - Methods are disclosed for charging an onboard unit with an electronic ticket and redeeming the ticket at a radio beacon. The onboard unit has a DSRC interface for radio communication with the radio beacon and a second interface for radio communication with a mobile phone. The second interface is separate from the DSRC interface. The onboard unit is provided with a public and a private electronic key of the onboard unit. In the mobile telephone, an encrypted ticket is received and the encrypted ticket is sent to the onboard unit. In the onboard unit, the encrypted ticket is received, the received ticket is decrypted, and the ticket is transmitted to the radio beacon for redemption. | 10-23-2014 |
20140324707 | SYSTEMS AND METHODS FOR ESTABLISHING A COMMUNICATION SESSION BETWEEN COMMUNICATION DEVICES - Embodiments of the invention include systems and methods for establishing a communication session between an inviter communication device and an invitee communication device. Data messages to be exchanged between inviter communication device and the invitee communication device without any other entity or communication device being able to analyze, access or understand the data messages. To exchange data messages, a bucket for storing the data messages is set up on a server or other database. A bucket uniform resource identifier is generated by the server and provided to the inviter and invitee communication devices. The inviter and invitee communication devices send each other data messages via the bucket uniform resource identifier. | 10-30-2014 |
20140330728 | METHOD AND SYSTEM FOR PERFORMING A COMMERCIAL TRANSACTION BY USING A SHORT MESSAGE SERVICE TERMINAL - Method for performing a commercial transaction wherein a customer having a computer connected to a public network such as the Internet network and a SMS terminal is able to receive and send SMS messages over a telephone network and can order an article by using the computer to a commercial server connected to the public network. | 11-06-2014 |
20140337234 | SYSTEMS AND METHODS FOR SECURE COMMUNICATION - In some embodiments, fast and secure communication can be achieved (e.g., in a fueling environment payment system) with systems and methods that validate an authentication request based on one or more pre-validated cryptographic keys. | 11-13-2014 |
20140337235 | PERSON-TO-PERSON ELECTRONIC PAYMENT PROCESSING - A method of person-to-person anonymous electronic payment processing may involve a payment processing server receiving from a payor payment device a payment initiation request for a payment from a payor account. The payment initiation request may identify a payment amount and excludes payee particulars and the payee account. The server may also receive from a payee payment device a payment completion request requesting completion of the payment. The payment completion request may include a payee identifier and exclude the payment amount, payor account and payor particulars. The server may confirm that the payment completion request is uniquely associated with the payee payment device and the payee identifier, and determine the payment amount and the payor account by correlating the payment completion request with the payment initiation request. In accordance with an outcome of the confirming, the payment processing server may effect a transfer in the payment amount from the payor account to the payee account. | 11-13-2014 |
20140337236 | DEVICE PROVISIONING USING PARTIAL PERSONALIZATION SCRIPTS - Embodiments of the invention relate to systems and methods for efficiently provisioning mobile devices with personalization data. For some embodiments, a method is disclosed comprising receiving a request for provisioning comprising device information for a mobile device and user authentication information for a user, generating a partial personalization script, an activation script, and a deletion script using the device information, sending the partial personalization script, the activation script, and the deletion script to an application provider computer, wherein the application provider computer initiates execution of the partial personalization script on the mobile device, authenticating the user authentication information, and sending an activation message to the application provider computer, wherein the application provider computer initiates execution of the activation script. | 11-13-2014 |
20140337237 | SYSTEM AND METHOD FOR AUTHENTICATING A PAYMENT TERMINAL - A method of authenticating a payment terminal to a computer server involves the terminal generating a terminal activation request from a private key uniquely associated with the terminal, and from a credential uniquely associated with the terminal. The activation request includes a public key that the payment terminal generates from the private key. The private key is both provided to and uniquely associated with the terminal by an entity other than the terminal prior to the terminal generating the activation request. The terminal transmits the activation request to a certificate server, and receives a digital certificate in response. The terminal initiates a transaction with a network client by authenticating to the computer server using the digital certificate. The computer server is in communication with the network client via a communications network. The terminal effects payment for the transaction via an acquirer network distinct from the communications network. | 11-13-2014 |
20140337238 | Method and system for handling sensitive data in a content delivery network - Using cryptographic techniques, sensitive data is protected against disclosure in the event of a compromise of a content delivery network (CDN) edge infrastructure. These techniques obviate storage and/or transfer of such sensitive data, even with respect to payment transactions that are being authorized or otherwise enabled from CDN edge servers. | 11-13-2014 |
20140344162 | METHOD AND SYSTEM FOR ENHANCING THE SECURITY OF ELECTRONIC TRANSACTIONS - A method of securing communications between a sales terminal and a server, including the construction by the server and the sales terminal respectively, of a first and second encrypted message; the construction by the sales terminal of a third encrypted message by using the second encrypted message, then its transmission to the server; the deciphering by the server of the third encrypted message by using the first encrypted message; the construction by the server of a fourth encrypted message based on the contents of the third deciphered message by using the first encrypted message, then its transmission to the sales terminal; and the deciphering by the sales terminal of the fourth encrypted message by using the second encrypted message. | 11-20-2014 |
20140344163 | Systems and Methods for Object Processing - Systems and methods are provided for processing objects. For example, a call request message is received, the call request message carrying an identification (ID) of order data associated with one or more objects, the order data including at least a total value of the objects and an ID of a second subject; a first account related to a first subject and a user password related to the first subject are acquired; the first account and the user password and the ID of the order data are sent; the first account and the user password and the ID of the order data are forwarded; and based on at least information associated with the first account and the user password and the ID of the order data, the total value is deducted from a first value included in the first account related to the first subject. | 11-20-2014 |
20140344164 | Purchase Transaction System with Encrypted Payment Card Data - Online ordering systems allow a user to submit sensitive information such as payment card information to a merchant in encrypted form. A payment card processor server may be used to provide the user's web browser with code for an encryption function, a cryptographic key, and a key identifier. The web browser may encrypt the payment card information by executing the encryption function and using the key. The encrypted payment card information may be supplied to the merchant over the internet. A key identifier that identifies which cryptographic key was used in encrypting the payment card information may be provided to the merchant without providing the merchant with access to the key. The merchant can forward the encrypted payment card information to the credit card processor server with the key identifier. The processor server can use the key identifier to obtain the key and decrypt the payment card information for authorization. | 11-20-2014 |
20140344165 | ULTRASONIC NEAR-FIELD COMMUNICATION - Systems and methods for near-field communications with a mobile device are disclosed. In one embodiment, a computer-implemented method for near-field communication may comprise: detecting, by a source device located at a point-of-sale, the proximity of a receiving device; encoding purchase data on an audio signal with one or more ultrasonic frequencies; and transmitting the encoded purchase data to the receiving device, wherein the encoded purchase data is transmitted using a speaker of the source device. | 11-20-2014 |
20140351145 | POINT OF SALE (POS) PERSONAL IDENTIFICATION NUMBER (PIN) SECURITY - A key is securely injected into a POS PIN pad processor in its usual operating environment. In response to entry of a personal identification number (PIN) into a PIN pad, the processor puts the PIN into a PIN block; puts additional random data into the PIN block; and encrypts the entire PIN block using asymmetric cryptography with a public key derived from the injected key residing in the PIN pad processor. The corresponding private key may be held securely and secretly by an acquirer processor for decrypting the PIN block to retrieve the PIN. The encrypted random data defends the PIN against dictionary attacks. Time stamp data and constant data encrypted with the PIN block enables a defense of the PIN against replay attacks and tampering. The method may also include accepting the PIN from a mobile phone in communication with the processor. | 11-27-2014 |
20140351146 | AUTHENTICATION FOR A COMMERCIAL TRANSACTION USING A MOBILE MODULE - Current embodiments provide for authorization and payment of an online commercial transaction between a purchaser and a merchant including verification of an identity of the purchaser and verification of an ability of the purchaser to pay for the transaction, where the identity provider and the payment provider are often different network entities. Other embodiments also provide for protocols, computing systems, and other mechanisms that allow for identity and payment authentication using a mobile module, which establishes single or multilevel security over an untrusted network (e.g., the Internet). Still other embodiments also provide for a three-way secure communication between a merchant, consumer, and payment provider such that sensitive account information is opaque to the merchant, yet the merchant is sufficiently confident of the consumer's ability to pay for requested purchases. In yet another embodiment, electronic billing information is used for authorization, auditing, payment federation, and other purposes. | 11-27-2014 |
20140358794 | TECHNIQUES FOR CREDIT CARD PROCESSING - Techniques for credit card processing are provided. A credit card with a wireless interface wirelessly connects with a mobile device of a consumer that possesses the credit card. The mobile device is a relay between the credit card and a transaction processing device for a transaction to prove the credit card is present for the transaction and obtain Card Present rates for a retailer of the transaction. | 12-04-2014 |
20140365375 | BATCH SETTLEMENT TRANSACTIONS SYSTEM AND METHOD - Systems and methods for performing settlement of token access transactions are provided. In one embodiment, the invention provides for batch processing bank card transactions, including receiving transaction records for a plurality of bank card transactions, wherein at least some of the transaction records include encrypted token information; determining whether the transaction records contain encrypted token information; decrypting the encrypted token information for a transaction record that is determined to have encrypted token information; and providing clear text token information obtained by decrypting the encrypted token information for a transaction record for transaction settlement. | 12-11-2014 |
20140372319 | METHODS AND APPARATUS FOR BROKERING A TRANSACTION - Methods of brokering a transaction between a first party and a second party with a trusted transaction server (TTS) and apparatus therefor. In an aspect, the method includes receiving at the TTS a request for a brokered transaction from the first party over a first communication channel and authenticating the identity of the first party with the TTS. The TTS stores a transaction code with at least some transaction details received from the first party. The TTS receives a message containing the transaction code from the second party over a second communication channel and matches the transaction code with the stored transaction details. The TTS sends a request for authorization for brokering the transaction to the second party. The TTS then authenticates the identity of the second party by way of a secret code and brokers the transaction. | 12-18-2014 |
20140379584 | ANTI-FRAUD FINANCIAL TRANSACTION METHOD - An anti-fraud financial method that enables a strong initial registration process for registering a financial payment instrument such as a credit card, debit card, money transfer, or checking account with a financial institution without external storage of private keys, so that only the registrant has the private key, and enables a strong financial transaction authentication and authorization process that is verifiable in real-time before the financial transaction is complete, that is computationally difficult to forge, cannot be replayed or otherwise altered after the financial transaction, and is backward compatible with existing financial transaction processing systems. | 12-25-2014 |
20150019442 | PRE-GENERATION OF SESSION KEYS FOR ELECTRONIC TRANSACTIONS AND DEVICES THAT PRE-GENERATE SESSION KEYS FOR ELECTRONIC TRANSACTIONS - Methods and devices for pre-generating session keys for securing transactions are provided. A plurality of session cryptographic keys are generated from a master cryptographic key and a respective plurality of possible values of a transaction counter. The session cryptographic keys are encrypted to provide a plurality of encrypted session cryptographic keys, which are stored in the user terminal. The master cryptographic key is deleted from the user terminal after the session keys are generated. To secure a transaction, a cryptogram is generated based on one of the encrypted session cryptographic keys and transaction data for the transaction, and the cryptogram is transmitted to a transaction terminal. The transaction counter is updated, and the encrypted session cryptographic key is deleted from the user terminal. | 01-15-2015 |
20150019443 | SECURE REMOTE PAYMENT TRANSACTION PROCESSING - Embodiments of the present invention are directed to methods, apparatuses, computer readable media and systems for securely processing remote transactions. One embodiment of the invention is directed to a method of processing a remote transaction initiated by a mobile device comprising a server computer receiving a payment request including encrypted payment information. The encrypted payment information being generated by a mobile payment application of the mobile device and being encrypted using a third party key. The method further comprises decrypting the encrypted payment information using the third party key, determining a transaction processor public key associated with the payment information, and re-encrypting the payment information using the transaction processor public key. The method further comprises sending a payment response including the re-encrypted payment information to a transaction processor. The transaction processor decrypts the re-encrypted payment information using a transaction processor private key and initiates a payment transaction. | 01-15-2015 |
20150026072 | GLOBAL WORLD UNIVERSAL DIGITAL MOBILE AND WEARABLE CURRENCY IMAGE TOKEN AND LEDGER - Provided are computer implemented methods and systems for using a global world universal digital mobile and wearable currency. The method commences with receiving a transfer request. The transfer request is associated with an amount represented in tokens of the global world universal digital mobile and wearable currency. The transfer request includes at least a sender account, a recipient account, and the amount. The method continues with transferring the amount from the sender account to the recipient account based on the transfer request. | 01-22-2015 |
20150032634 | CLOUD-BASED ELECTRONIC PAYMENT PROCESSING - A payment processing server generates an asymmetric cryptographic key pair, over one secure communications channel providing a mobile device with one cryptographic key of the cryptographic key pair, and saves another cryptographic key of the cryptographic key pair in a pending transaction database in unique association with a single-use payment number and a financial account. The server encrypts the payment number, which does not identify the financial account, with the another cryptographic key and provides the mobile device with the encrypted payment number over another secure communications channel distinct from the one secure communications channel. The server receives from a payment terminal a payment completion request that includes the encrypted payment number decrypted with the one cryptographic key. The payment processing server queries the pending transaction database with the decrypted payment number to identify the associated financial account, and effects completion of the transaction using the identified financial account. | 01-29-2015 |
20150039518 | PERSONALIZED MARKETING SYSTEM AND PERSONALIZED MARKETING METHOD - The present invention provides a personalized marketing system and a personalized marketing method. The personalized marketing system comprises: a display device, a detecting device, a database device, and a control device. The display device is utilized for displaying at least an information. The detecting device is utilized for detecting at least a viewer via at least a wireless signal that can identify the viewer. The database device is utilized for recording data of connections between the information and the detected viewer. The control device is utilized for controlling the display device to display a specific information according to the data recorded in the database device. | 02-05-2015 |
20150039519 | Tokenization in Mobile Environments - Data can be protected in mobile and payment environments through various tokenization operations. A mobile device can tokenize communication data based on device information and session information associated with the mobile device. A payment terminal can tokenize payment information received at the payment terminal during a transaction based on transaction information associated with the transaction. Payment data tokenized first a first set of token tables and according to a first set of tokenization parameters by a first payment entity can be detokenized or re-tokenized with a second set of token tables and according to a second set of tokenization parameters. Payment information can be tokenized and sent to a mobile device as a token card based on one or more selected use rules, and a user can request a transaction based on the token card. The transaction can be authorized if the transaction satisfies the selected use rules. | 02-05-2015 |
20150046339 | METHODS AND SYSTEMS FOR PROVISIONING MOBILE DEVICES WITH PAYMENT CREDENTIALS - Embodiments are described that are directed to optimizing the provisioning of payment account credentials to mobile devices utilizing mobile wallets. In some embodiments, one of multiple provisioning schemes may be selectively chosen for payment account credential provisioning based upon a determined risk involved with a particular provisioning request. A low risk provisioning request leads to an immediate provisioning of a payment credential, whereas a provisioning request of high risk results in the provisioning request being denied. In some embodiments, medium risk provisioning requests will cause an additional user authentication to be performed before the payment account provisioning is finalized. The additional user authentication may occur using a separate communication channel than the channel in which the provisioning request was received. | 02-12-2015 |
20150052061 | METHODS AND SYSTEMS FOR FACILITATING E-COMMERCE PAYMENTS - Methods for facilitating financial transactions include facilitating or otherwise increasing the ease and speed of checkout processes. In particular, one or more implementations comprise an e-commerce payment facilitator that acts as an intermediary between a commerce application and a payment gateway. The e-commerce payment facilitator can provide stored payment information to a commerce application based on a few simple selections by a user. This allows a user to easily and securely complete commerce transactions, which simplifies the user's checkout experience and reduces barriers to purchase. Furthermore, the e-commerce payment facilitator can pass payment details to the commerce application's payment gateway. In addition to the foregoing, methods involve dynamically and intelligently providing a user the option of using payment information stored by the network application. | 02-19-2015 |
20150052062 | E-COMMERCE SHOPPING AND PAYMENT PROCESS - A process that simplifies shopping on E-commerce platforms includes a program that naturally keeps sensitive user information and data more secure by removing large amounts of sensitive user information and data from multiple merchant sites. The process makes use of personal devices that are always available to users to store user, shipping and payment information and data. Transactions are completed by having the personal device communicate either directly with a merchant's gateway or merchant account, and then sending the transaction details and shipping information and data to both the user and the merchant. | 02-19-2015 |
20150052063 | Method for the Mutual Authentication of Entities Having Previously Initiated an Online Transaction - Methods and devices for enabling authentication may include a first stage in which a first electronic device of the first entity communicates with a second electronic device of the second entity via a telecommunications network. During the first stage, the first electronic device generates a first token and transmits it from the first electronic device to the second electronic device via the network; and the second electronic device generates a third token and transmits the third token to the first electronic device via the network. During a second stage, authenticating a first non-authenticated entity as being the second entity as a function of a second token contained in a first portable electronic device of the first non-authenticated entity occurs; and authenticating a non-authenticated entity as being the first entity as a function of a fourth token contained in a second portable electronic device of the second non-authenticated entity also occurs. | 02-19-2015 |
20150052064 | Secure Remote Payment Transaction Processing Using a Secure Element - Embodiments of the present invention are directed to methods, apparatuses, computer readable media and systems for securely processing remote transactions. One embodiment of the invention is directed to a method of processing a remote transaction initiated by a mobile device. The method comprises receiving, by a mobile payment application on a secure memory of the mobile device, transaction data from a transaction processor application on the mobile device. The method further comprises validating that the transaction processor application is authentic and in response to validating the transaction processor application, providing encrypted payment credentials to the transaction processor application. The transaction processor application further initiates a payment transaction with a transaction processor server computer using the encrypted payment credentials. | 02-19-2015 |
20150052065 | Secure Point of Sale Presentation of a Barcode at an Information Handling System Display - Unauthorized copying of a transaction barcode is prevented by including a sensed condition or other publicly-accessible data with the transaction barcode for use as a comparison with the publicly accessible data determined at a barcode reader. If the sensed condition included in the transaction barcode indicates that the transaction barcode was generated for a different transaction, then the barcode reader invalidates the transaction. For instance, if the barcode was generated too distant in time, position, or sequential transactions, then the barcode reader invalidates the transaction barcode as an unauthorized copy of a transaction barcode generated for a different transaction. | 02-19-2015 |
20150066778 | DIGITAL CARD-BASED PAYMENT SYSTEM AND METHOD - Disclosed is a digital card-based payment system and method. A digital card-based payment system includes a seller terminal configured to acquire a token from a purchaser terminal desiring to purchase a product and a card management server configured to store and manage one or more pieces of card information and one or more pieces of token information corresponding to the card information and, upon receipt of the token information and payment information for the product from the seller terminal, make payment for the product using card information corresponding to the received token. | 03-05-2015 |
20150073995 | SYSTEM AND METHOD FOR AUTHORIZING A FINANCIAL TRANSACTION - A method of authorizing a financial transaction involves a payment terminal receiving, from a payment card interfaced with the payment terminal, application data in response to a predetermined authorization amount provided to the payment card by the payment terminal. The application data comprises an account number uniquely associated with the payment card. The payment terminal generates an adjusted authorization amount based on the account number and from a preliminary authorization amount received at the payment terminal, provides the payment card with the adjusted authorization amount, receives a cryptogram from the payment card in response, and provides notification of authorization of a financial transaction for the adjusted authorization amount in accordance with a confirmation that the cryptogram received at the payment terminal from the payment card was generated by the payment card from the adjusted authorization amount and from a cryptographic key uniquely associated with the payment card. | 03-12-2015 |
20150073996 | Mobile Payment Application Provisioning And Personalization on a Mobile Device - Embodiments of the present invention are directed to systems and methods for providing a central entity that can provision mobile payment applications on mobile communication devices and personalize the mobile payment applications with consumer and account information. The personalization of the mobile payment application on the mobile communication device may include provisioning a payment account on the mobile payment application. The central entity may provision the account on the mobile payment application without interacting with the issuer during the provisioning of the account. The central entity may provision the account on the mobile communication device by decrypting, using a secure element key, encrypted payment account information received from the mobile communication device. The payment account information may be encrypted by a secure element of the mobile communication device using the same secure element key. | 03-12-2015 |
20150081567 | ELECTRONIC TRANSACTION SYSTEM AND METHOD WITH PARTICIPANT AUTHENTICATION VIA SEPARATE AUTHORITY FROM REAL-TIME PAYMENT VALIDATION - A system and method of exchanging assets splits authentication of the parties in the transaction from real-time validation of the assets used in the transaction. Electronic representations of currency or other value of an asset provide a mechanism for the electronic transfer of the ownership of those assets. Digital tokens or other electronic money is created, issued, purchased, validated, and redeemed within an electronic exchange. Ownership of the token is established by the physical possession of the token along with a public key certificate that decrypts the owner's copy of the token. Tokens are stored in digital wallets and are transferred using private p2p communications channels or NFC. The separation of the authentication of the parties using an authentication authority (registry) and the validation of the assets using a transaction authority allows personal anonymity. Privacy is maintained, and no single authority has a complete audit trail of the transaction. | 03-19-2015 |
20150088754 | METHOD AND SYSTEM FOR FULLY ENCRYPTED REPOSITORY - According to an embodiment of the present invention, a method for using information in conjunction with a data repository includes encrypting data associated with the information with an encryption key, sending at least the encrypted data to the data repository, and possibly deleting the information. The method also includes receiving a request for the information from a remote device, and sending a request for the encrypted data to the data repository. The method further includes receiving the encrypted data from the data repository, decrypting the encrypted data using the encryption key, and sending the information to the remote device. | 03-26-2015 |
20150088755 | SYSTEMS, METHODS, AND DEVICES FOR IMPROVED TRANSACTIONS AT A POINT OF SALE - Techniques for improved Point of Sale (PoS) transactions are disclosed. The techniques include a PoS terminal that receives biometric data from a consumer, determines an encryption key based on the biometric data, and transmits the encryption key to a mobile device associated with the consumer to cause the mobile device to decrypt a consumer key and transmit an indication of a successful decryption. The PoS terminal further receives the indication of the successful decryption from the mobile device, and retrieves consumer account information responsive to receiving the indication of the successful decryption. | 03-26-2015 |
20150088756 | Secure Remote Payment Transaction Processing Including Consumer Authentication - Embodiments of the invention are directed to methods, apparatuses, computer-readable media, and systems for securely processing remote transactions. One embodiment is directed to a method of processing a remote transaction initiated by a communication device. The method comprising a server computer receiving a payment request including encrypted payment information that is encrypted using a first key. The encrypted payment information including security information. The method further comprises decrypting the encrypted payment information using a second key, obtaining an authentication response value for the remote transaction from an authentication computer associated with an issuer, updating the decrypted payment information to include the authentication response value, re-encrypting the decrypted payment information using a third key, and sending a payment response including the re-encrypted payment information to a transaction processor. The transaction processor decrypting the re-encrypted payment information using a fourth key and initiating a payment transaction using the decrypted payment information. | 03-26-2015 |
20150088757 | ONE-TOUCH PAYMENT USING HAPTIC CONTROL VIA A MESSAGING AND CALLING MULTIMEDIA SYSTEM ON MOBILE DEVICE AND WEARABLE DEVICE, CURRENCY TOKEN INTERFACE, POINT OF SALE DEVICE, AND ELECTRONIC PAYMENT CARD - Provided are computer implemented methods and systems for messaging, calling, and one-touch payments via mobile and wearable devices. An exemplary system comprises a processor and a database in communication with the processor. The processor is configured to provide an integrated interface for selection of an activity mode. The activity mode includes a messaging mode, a calling mode, and a one-touch payment mode. The processor is further configured to receive the selection of the activity mode via the integrated interface from a user. If the messaging mode is selected, a message from the user is received and sent to a recipient via a data network. If the calling mode is selected, a data network call is initiated on a call request of the user. If the one-touch payment mode is selected, a payment request is transmitted to a financial organization. | 03-26-2015 |
20150088758 | AUTHENTICATING USERS TO ATMS AND OTHER SECURE MACHINES FOR CARDLESS TRANSACTIONS - Systems, apparatus, methods, and computer program products for using quick response (QR) codes for authenticating users to ATMs and other secure machines for cardless transactions are disclosed. Embodiments of the present disclosure read an image displayed on a display of an external device using a mobile device associated with a user authorized to access a secure resource, decode transaction information encoded in the image, transmit the transaction information and an identifier of the mobile device from the mobile device to an authentication system, and grant access to the secure resource if the transaction information and the identifier satisfy an authentication test performed at the authentication system. | 03-26-2015 |
20150088759 | Tokenizing Sensitive Data - Included are embodiments for tokenizing sensitive data. Some embodiments of systems and/or methods are configured to receive sensitive data from a vendor, determine a token key for the vendor, and utilize a proprietary algorithm, based on the token key to generate a vendor-specific token that is associated with the sensitive data. Some embodiments include creating a token identifier that comprises data related to the token key sending the vendor-specific token and the token identifier to the vendor. | 03-26-2015 |
20150095238 | ONLINE PAYMENTS USING A SECURE ELEMENT OF AN ELECTRONIC DEVICE - Systems, methods, and computer-readable media for securely conducting online payments with a secure element of an electronic device are provided. In one example embodiment, a method includes, inter alia, at an electronic device, generating first data that includes payment card data, generating second data by encrypting the first data and merchant information with a first key, transmitting to a commercial entity subsystem the generated second data, receiving third data that includes the first data encrypted with a second key that is associated with the merchant information, and transmitting the received third data to a merchant subsystem that is associated with the merchant information, where the first key is not accessible to the merchant subsystem, and where the second key is not accessible to the electronic device. Additional embodiments are also provided. | 04-02-2015 |
20150100497 | ARTICLE AND METHOD FOR TRANSACTION IRREGULARITY DETECTION - Articles and methods for transaction irregularity detection are disclosed. In one example, the article discloses: a memory including a record of a last-reported security-device transaction with the security-device, and including a last-reported transaction counter value associated with the last-reported security-device transaction; a previous device identifier; a record of the previous security-device transaction with the security-device, and including the previous device identifier associated with the previous security-device transaction; a record of a current security-device transaction with the security-device, and including a currently-reported transaction counter value associated with the current security-device transaction; and a back-end device tagging the previous device with fraud if the current transaction counter value differs from the last-reported transaction counter value by other than an increment. In one example, the method discloses: a transaction irregularity detection process based on the article. | 04-09-2015 |
20150120569 | VIRTUAL CURRENCY ADDRESS SECURITY - In an example, a network device is configured to generate a first public-private key pair. The network device is configured to receive, over an electronic network, public keys of two or more second public-private key pairs. The network device is configured to generate a digital currency address using the public keys of the two or more second public-private key pairs and a public key of the first public-private key pair. | 04-30-2015 |
20150120570 | SYSTEM AND METHOD FOR PROVIDING SECURE TRANSACTIONAL SOLUTIONS - The present invention provides a method and system for verifying and tracking transactional information. In an embodiment of the invention, a system for delivering security solutions is provided that includes at least one of the following: a radio frequency (RF) identification device, an identification mechanism (e.g., a card, sticker), and an RF reader. | 04-30-2015 |
20150127548 | METHOD AND SYSTEM FOR GENERATING ONE-TO-ONE MERCHANT OFFERS - A method for discounting a payment transaction includes: storing, in a memory, transaction data for a payment transaction, wherein the transaction data includes at least a transaction amount; receiving, by a receiving device, payment data submitted for payment for the payment transaction, wherein the payment data includes at least a consumer identifier corresponding to a consumer and payment information; receiving, by the receiving device, offer data, wherein the offer data includes an offer identifier corresponding to the consumer and a transaction modifier; encrypting, using a predetermined encryption key, the consumer identifier to obtain an encrypted consumer identifier; and updating, in the memory, the transaction amount included in the transaction data based on the transaction modifier if the encrypted consumer identifier corresponds to the offer identifier. | 05-07-2015 |
20150127549 | USING BIOMETRIC AUTHENTICATION FOR NFC-BASED PAYMENTS - In order to validate a user to facilitate conducting a high-valued financial transaction via wireless communication between an electronic device (such as a smartphone) and another electronic device (such as a point-of-sale terminal), the electronic device may authenticate the user prior to the onset of the high-valued financial transaction. In particular, a secure enclave processor in a processor may provide local validation information that is specific to the electronic device to a secure element in the electronic device when received local authentication information that is specific to the electronic device (such as a biometric identifier of the user) matches stored authentication information. Moreover, an authentication applet in the secure element may provide the local validation information to an activated payment applet in the secure element. This may enable the payment applet to conduct the high-valued financial transaction via wireless communication, such as near-field communication. | 05-07-2015 |
20150127550 | USING BIOAUTHENTICATION IN NEAR-FIELD-COMMUNICATION TRANSACTIONS - In order to authenticate a user to facilitate conducting a financial transaction via wireless communication between an electronic device (such as a smartphone) and another electronic device (such as a point-of-sale terminal), the electronic device may securely communicate an authentication-complete indicator to a secure element in the electronic device. In particular, a secure enclave processor in a processor may provide the authentication-complete indicator to the secure element using an encrypted token when received authentication information (such as a biometric identifier of the user) matches stored authentication information. Moreover, an authentication applet in the secure element may decrypt the token, and then may set an authentication-complete flag in an operating system of the secure element based on the authentication-complete indicator. This authentication-complete flag may enable an activated payment applet in the secure element to conduct the financial transaction via wireless communication, such as near-field communication. | 05-07-2015 |
20150127551 | SECURING COMMUNICATIONS WITH A PIN PAD - Described in an example embodiment herein is an apparatus comprising an input device and a processor communicatively coupled with the input device. The processor employs asymmetric encryption to provision the input device with a terminal master key. The processor employs the terminal master key with a symmetric encryption algorithm to transfer a communication key to the input device. The processor obtains data representative of a financial account. The processor receives data representative of the personal identification number for authorizing a financial transaction with the financial account from the input device, the data representative of the personal identification number is encrypted with the communication key. The processor receives a request for a financial transaction associated with the financial account via the input device. The processor determines whether the financial transaction is authorized based on the data representative of the personal identification number received from the input device. | 05-07-2015 |
20150127552 | Systems and Methods for RFID Security - An RFID system includes an RFID tag, an RFID reader, and a server. The RFID tag communicates to the server via encrypted information. The information may be encrypted with synchronized encryption keys. In this manner, the reader need not decrypt the information from the RFID tag. The effectiveness of malicious readers is thereby reduced, resulting in improved RFID tag security. | 05-07-2015 |
20150134538 | APPLICATION FOR USING MOBILE COMMUNICATION TERMINAL AS PAYMENT TERMINAL, AND APPLICATION SERVICE PROVIDER SYSTEM AND METHOD - A franchise Application Service Provider (ASP) server is disclosed. The franchise ASP server includes a token generating function unit that generates a token on the basis of transaction-related information included in a payment request upon receiving the payment request from a payment terminal, and generates a net key for payment on the basis of the generated token and a franchise identifier, a token processing unit that processes the generated token in conjunction with a smart safe for receiving the net key for payment from a buyer terminal having received the net key for payment, and a token confirmation unit that receives a confirmation request of the token from the payment terminal and confirms whether the token has been processed. | 05-14-2015 |
20150142669 | VIRTUAL PAYMENT CHIPCARD SERVICE - A virtual payment chipcard service depends on a secure, back-end network server configured to maintain chipcard authorization data and computational services as virtual assets in the Cloud. These are behind tamper resistant boundaries, and, on user transaction request, arranged to electronically sign a transaction on the user's behalf as a proxy to a virtual chip-card payment. Two independent and concurrent user communication channels connected to the network server are configured to receive user transaction requests on one user communication channel, and to enable the network server to make confirmations with said user on the other user communication channel. | 05-21-2015 |
20150142670 | SYSTEMS AND METHODS FOR SOFTWARE BASED ENCRYPTION - Systems, methods, and apparatuses are provided for enabling a merchant payment computer to obtain one or more encryption keys, and use the encryption keys to encrypt transaction data. The merchant payment computer may authenticate to a merchant management computer to obtain a signed digital certificate attesting the identity of the merchant payment computer. The merchant payment computer can provide the certificate and a device identifier to a key management computer to obtain an encryption key. The merchant payment computer can then use the encryption key to encrypt transaction data for a transaction. | 05-21-2015 |
20150149364 | SYSTEM AND METHOD FOR ENABLING A MOBILE COMMUNICATION DEVICE TO OPERATE AS A FINANCIAL PRESENTATION DEVICE - A provisioning system for enabling a mobile communication device to operate as a financial presentation device (FPD) which is presentable to providers of goods or service is provided. The provisioning system relies on a transaction processing system that normally routes authorization requests from merchants to issuers of FPDs for purposes of authorizing FPD transactions. The transaction processing system already stores security keys of all issuers in order to validate transaction data being sent from the merchants. The provisioning system monitors authorization requests being routed through the transaction processing system and retrieves an authorization request of a financial transaction that was initiated with a particular FPD. The provisioning system then transmits the FPD data contained in the retrieved authorization request and the security key stored in the transaction processing system to a secure memory element of the mobile communication device so as to enable the mobile communication device to operate as a FPD. | 05-28-2015 |
20150294309 | Method, Device and Service Provision Unit for Authenticating a Customer for a Service to be Provided by the Service Provision Unit - Method, device and service provision means for authenticating a customer for a service to be provided by a service provision means. The invention relates to a method for authenticating a customer for a service to be provided by a service provision means. The method comprises the steps of: authentication of a customer as member of a defined customer group on the service provision means by means of a first group signature assigned to the defined customer to prove authorization of the customer to avail himself of a service; request for the service from the service provision means by the authenticated customer; and authentication of the customer as a member of the defined customer group by means of a second group signature assigned to the defined customer group to demonstrate the customer's consent to a billing process for billing the requested service at the billing centre. The method allows for a secure use of the service while assuring the customer's anonymity. The invention further relates to a device for performing the method and a service provision means. | 10-15-2015 |
20150302401 | DISTRIBUTED CRYPTO CURRENCY UNAUTHORIZED TRANSFER MONITORING SYSTEM - Distributed crypto currency systems and methods include receiving a payer public key that is associated with a current transaction between a payer and a payee. It is determined whether the payer public key is included in a plurality of previous transaction public keys that are each associated with a respective unauthorized crypto currency transfer as a result of a previous transaction. In response to determining that the payer public key is included in the plurality of previous transaction public keys, a message is sent to the payee to not proceed with the current transaction. In response to determining that the payer public key is not included in the plurality of previous transaction public keys, a message is sent to the payee to proceed with the current transaction. | 10-22-2015 |
20150302402 | METHOD FOR AUTHENTICATING A TRANSACTION, AND CORRESPONDING SERVERS, SYSTEMS, DEVICES, COMPUTER-READABLE STORAGE MEDIUMS AND COMPUTER PROGRAMS - Various embodiments provide a method for authenticating a transaction, the method comprising: generating a first authentication code based on transaction information and a first cryptographic key, the transaction information relating to the transaction; providing a data carrier having data comprising the first authentication code and the transaction information; presenting the data carrier to a first server to cause the first server to extract the data from the data carrier; generating a second authentication code based on a second cryptographic key and the transaction information from the extracted data; and authenticating the transaction based on a comparison between the first authentication code from the extracted data and the second authentication code. | 10-22-2015 |
20150302403 | METHOD FOR DEACTIVATING A PAYMENT MODULE, CORRESPONDING COMPUTER PROGRAM PRODUCT, STORAGE MEDIUM AND PAYMENT MODULE - The invention concerns a method for deactivating a payment module attachable to a communications terminal, comprising:
| 10-22-2015 |
20150310431 | Secure Payments Using a Mobile Wallet Application - A payment system implemented on a mobile device authenticates transactions made via the mobile device. The mobile device generates a public-private key pair and receives an authenticating input from a user of the device. The public key is sent to a secure payment system, and the authenticating input is used to generate a symmetric key that encrypts the private key. After a transaction is initiated, the mobile device receives an authenticating input from the user. The symmetric key is generated from the authenticating input and the mobile device attempts to decrypt the private key from the encrypted private key using the symmetric key generated by the user's input. The decrypted key is used to sign a transaction authorization message which is sent to the secure payment system, along with payment information, which can verify the signed message via the public key. Additional techniques related to secure payments are also disclosed. | 10-29-2015 |
20150310432 | SECURE ELEMENT ARCHITECTURAL SERVICES - A method for securely adding financial accounts maintained by an issuer without an issuer-specific TSM to a secure element using a service system that creates a secure TSM add-on module for the issuer within the service system TSM, and a sub-domain that is specific to the issuer within the secure element. The issuer designates instructions and commands as insecure information and sensitive financial information as secure information, and communicates each type of information via a designated interface that is designed to correspond to the required security of the type of information. The issuer transmits insecure instructions to the service system and in turn a digital wallet application to create a new account record in the application. The issuer encrypts the secure financial information and transmits it to the issuer domain of the secure element through the account services system TSM over a dedicated interface. | 10-29-2015 |
20150310436 | Securely Storing and Using Sensitive Information for Making Payments Using a Wallet Application - A payment system implemented on a mobile device authorizes and processes transactions. The mobile device generates a public-private key pair and receives payment information. The private key and the payment information are split into a local and a remote fragment. The public key, a private key fragment, and a payment information fragment are sent to a secure payment system, and the other fragments are stored on the mobile device. When a transaction is received by the mobile device to authorize, the mobile device sends a payment fragment to the secure payment system and receives a private key fragment from the secure payment system. The mobile device authorizes the transaction using the private key, recovered from the private key fragments. The secure payment system verifies the transaction using the public key and processes the transaction using the recovered payment information. Additional techniques to process transactions using data splitting are disclosed. | 10-29-2015 |
20150317700 | METHOD AND SYSTEM FOR INCORPORATING MARKETING IN USER AUTHENTICATION - A method, system and computing device for incorporating marketing into a user authentication enables valuable marketing information to be received from or provided to users, in an authentication context where the users are likely to be attentive and focused. Thus marketing information is likely to be thoroughly reviewed by the users, easily recalled by the users at a later time, and user profile data collected from the users is likely to be accurate. The method includes presenting an authentication challenge to a user of a computing device, the authentication challenge including a number of challenge elements; receiving a response to the authentication challenge from the user; and presenting a non-authentication marketing activity to the user, the non-authentication marketing activity including a number of activity elements, and where the activity elements correspond with the challenge elements. | 11-05-2015 |
20150324791 | STORAGE OF CREDENTIAL SERVICE PROVIDER DATA IN A SECURITY DOMAIN OF A SECURE ELEMENT - Systems, methods, and computer-readable media for efficiently storing credential service provider data in a security domain of a secure element of an electronic device are provided. In one example embodiment, an electronic device may include a secure element that, inter alia, receives credential service provider data from a secure element vendor subsystem, and that encrypts a key of the secure element with the received credential service provider data. The electronic device may also include a communications component that transmits the encrypted key to a credential service provider. Additional embodiments are also provided. | 11-12-2015 |
20150324792 | ESTABLISHMENT OF A SECURE SESSION BETWEEN A CARD READER AND A MOBILE DEVICE - Disclosed is a technique for establishing a secure communication session between a mobile device and a card reader. The technique can involve using a trusted, remote validation server to validate security information of both the card reader and a POS module in the mobile device prior to, and as a precondition of, the card reader and the POS module establishing a secure communication session with each other. In certain embodiments the POS module sends the security information of both the card reader and the POS module to the validation server. The security information can include cryptographic keys of the POS module and the card reader and additional security information related to the POS module and its software environment. | 11-12-2015 |
20150324793 | ESTABLISHMENT OF A SECURE SESSION BETWEEN A CARD READER AND A MOBILE DEVICE - Disclosed is a technique for establishing a secure communication session between a mobile device and a card reader. The technique can involve using a trusted, remote validation server to validate security information of both the card reader and a POS module in the mobile device prior to, and as a precondition of, the card reader and the POS module establishing a secure communication session with each other. In certain embodiments the POS module sends the security information of both the card reader and the POS module to the validation server. The security information can include cryptographic keys of the POS module and the card reader and additional security information related to the POS module and its software environment. | 11-12-2015 |
20150332224 | SYSTEM AND METHOD FOR RENDERING VIRTUAL CURRENCY RELATED SERVICES - Technique introduced here relates to virtual currency related services, and more specifically, to tools for providing crypto or other digital currency (e.g. bitcoin) related services, including bitcoin DNS service, sending bitcoins over social media communication networks, a bitcoin trading platform and secure storage services for bitcoin. | 11-19-2015 |
20150332248 | VERIFYING A SECURE CONNECTION BETWEEN A NETWORK BEACON AND A USER COMPUTING DEVICE - A beacon device establishes a network connection with a user computing device. The beacon device determines the received signal strength indicator of the user computing device (the “reverse RSSI”) and transmits it to the user computing device, which determines the received signal strength indicator (the “RSSI”) of the beacon device, and saves the RSSI with the reverse RSSI as a data pair. At a later time, the beacon device determines a subsequent reverse RSSI and transmits it to the user computing device, which determines a subsequent RSSI, and saves the subsequent RSSI with the subsequent reverse RSSI as a data pair. If the user computing device determines a correspondence in the changes of the RSSI values and reverse RSSI values in the two data pairs, a transaction between the two devices is allowed. If correspondence does not exist, then the user computing device terminates the network connection. | 11-19-2015 |
20150332258 | Identity Verification via Short-Range Wireless Communications - Embodiment methods, devices, non-transitory processor-readable storage media, and systems for conducting transactions based on proximity without sending secure information via short-range wireless signaling, comprising broadcasting, by a point-of-sale device, a short-range wireless message requesting a peripheral response, broadcasting, by a client device, a short-range wireless message indicating that the client device is available as a peripheral, receiving, at the point-of-sale device via an established short-range wireless connection, identifying data of the client device, transmitting, by the point-of-sale device to a server, a message including the received identifying data of the client device, transmitting, by the server to the point-of-sale device, an encrypted nonce, transmitting, by the point-of-sale device to the client device via the established connection, the encrypted nonce, decrypting, by the client device, the encrypted nonce, determining whether the decrypted nonce matches the unencrypted nonce, and conducting a transaction in response to the decrypted nonce matching the unencrypted nonce. | 11-19-2015 |
20150332262 | MASTER APPLET FOR SECURE REMOTE PAYMENT PROCESSING - Embodiments of the invention are directed to methods, apparatuses, and systems for processing transactions using a master applet on a mobile device. One embodiment of the invention is directed to a method comprising a master applet associated with a mobile application of a mobile device determining available applications on a mobile device, displaying the available applications to a user, and receiving a selection of one of the available applications from the user. The method further comprises obtaining encrypted credentials from the selected application, generating an encrypted payload including the encrypted credentials and transaction data using a master applet encryption key associated with the applet, and sending the encrypted payload to a processor computer. The processor computer decrypts the encrypted payload using a master applet decryption key, decrypts the encrypted credentials using a selected application decryption key, and uses the decrypted credentials and transaction data to initiate a transaction. | 11-19-2015 |
20150339664 | OFFLINE AUTHENTICATION - Techniques for enhancing the security of a communication device when conducting a transaction using the communication device may include using a limited-use key (LUK) to generate a transaction cryptogram, and using a signature key to generate a signature. The transaction can be an offline data authentication transaction, and access can be granted based on authentication of the signature prior to verifying the transaction cryptogram. | 11-26-2015 |
20150339665 | POST-MANUFACTURE CONFIGURATION OF PIN-PAD TERMINALS - A method of remotely configuring a pin-pad terminal involves a computer server receiving a merchant identifier over a network from a communications device associated with the pin-pad terminal. The computer server confirms from the merchant identifier that an entity associated with the communications device is authorized to use the pin-pad terminal, and authenticates the pin-pad terminal from a cryptographically-signed datum received from the communications device. The computer server then transmits to the pin-pad terminal via the communications device a configuration payload for installation in the pin-pad terminal. The configuration payload includes at least a payment symmetric cryptographic key set uniquely associated with the pin-pad terminal. The payment symmetric key set configures the pin-pad terminal to effect secure electronic payment via the communications device. | 11-26-2015 |
20150348022 | Apparatuses and Methods for Using a Random Authorization Number to Provide Enhanced Security for a Secure Element - A system for provisioning credentials onto an electronic device is provided. The system may include a payment network subsystem, a service provider subsystem, and one or more user devices that can be used to perform mobile transactions at a merchant terminal. The user device may communicate with the service provider subsystem in order to obtained commerce credentials from the payment network subsystem. The user device may include a secure element and a corresponding trusted processor. The trusted processor may generate a random authorization number and inject that number into the secure element. Mobile payments should only be completed if the random authorization number on the secure element matches the random authorization number at the trusted processor. The trusted processor may be configured to efface the previous random authorization number and generate a new random authorization number when detecting a potential change in ownership at the user device. | 12-03-2015 |
20150348026 | SECURITY FOR MOBILE APPLICATIONS - A mobile computing device has at least one processor and at least one memory together providing a first execution environment and a second execution environment logically isolated from the first execution environment. The following approach is taken to manage data items for an application executing the first execution environment. A trust relationship is established between a trust client in the second execution environment and a remote trusted party and the trust client receives one or more data items from the remote trusted party. On executing the application in the first execution environment, the trust client provides the data items or further data items derived therefrom to the application | 12-03-2015 |
20150348146 | IN-STORE SELF-SERVE AND ZONING USING GEO-FENCING - A geo-fencing system includes a plurality of beacons defining zones within a venue. The system receives a first beacon identifier from a mobile device and registers the mobile device in a first zone corresponding to the first beacon. The system causes a first menu to be displayed on the mobile device, indicating options for the first zone. In response to selection of one of the options, the system registers the mobile device as being active in the first zone. The system then receives a second beacon identifier and registers the mobile device as being in the second zone. The system also suspends the activity of the mobile device in the first zone and causes options to be displayed to continue or terminate the activity in the first zone. | 12-03-2015 |
20150356524 | SYSTEM AND METHOD FOR EXECUTING FINANCIAL TRANSACTIONS - A system for implementing at least one cryptocurrency transaction at a point-of-sale by using a mobile terminal is provided. The system is operable to provide authentication for implementing the one or more cryptocurrency transactions, wherein the system is operable to send at least one authentication request for the at least one cryptocurrency transaction from a payment terminal to a payment service hosted via one or more virtual computing machines, wherein the payment service is operable to provide a request for a PIN code at the mobile terminal; to send the PIN code from the mobile terminal via a secure channel to open a vault in the one or more virtual machines, wherein the vault contains one or more private keys which are useable for authenticating the at least one cryptocurrency transaction; and to confirm execution of the at least one cryptocurrency transaction to at least the payment terminal. | 12-10-2015 |
20150356555 | SYSTEM AND METHOD FOR EXECUTING FINANCIAL TRANSACTIONS - A system for implementing at least one cryptocurrency transaction at a point-of-sale by using a mobile terminal is provided. The system is operable to provide authentication for implementing the one or more cryptocurrency transactions, wherein the system is operable to send at least one authentication request for the at least one cryptocurrency transaction from a payment terminal to a payment service hosted via one or more virtual computing machines, wherein the payment service is operable to provide a request for a PIN code at the mobile terminal; to send the PIN code from the mobile terminal via a secure channel to open a vault in the one or more virtual machines, wherein the vault contains one or more private keys (PKI) which are useable for authenticating the at least one cryptocurrency transaction; and to confirm execution of the at least one cryptocurrency transaction to at least the payment terminal. | 12-10-2015 |
20150363772 | CRYPTOCURRENCY ONLINE VAULT STORAGE SYSTEM - A system may include a memory and processor. The processor may be configured to receive an electronic request to store a private key associated with a cryptocurrency. The processor may also be configured to generate a first vault key based at least in part upon the private key and generate a second vault key based at least in part upon the private key. The processor may also be able to facilitate the storage of the first vault key at a first data center and facilitate the storage of the second vault key at a second data center. | 12-17-2015 |
20150363773 | Cryptocurrency Aggregation System - A system includes a memory and a processor. The memory may store a customer account associated with a customer and an enterprise account associated with an enterprise. The processor may be communicatively coupled to the memory and may cause the system to receive a request to deposit a first amount of a cryptocurrency in the customer account from the customer. The processor may also cause the system to determine a public key associated with the customer account and receive the first amount of the cryptocurrency. The processor may further cause the system to determine a first value approximately equivalent to the first amount of cryptocurrency and associate the first value with the customer account. The processor is further able to aggregate the first amount of cryptocurrency with an aggregated amount of the cryptocurrency in the enterprise account and facilitate securing the public key in the enterprise account. | 12-17-2015 |
20150363775 | KEY PROTECTION METHOD AND SYSTEM - Proposed are a key protection method and system. The method comprises: a: receiving by a mobile terminal a registration instruction, generating a user's public key and private key, and sending the user's public key to a third-party e-business verification server, if the mobile terminal respectively passes identity verifications of the mobile bank server and a comprehensive pre-position bank server; b: performing a verification by the mobile bank server on user's trade information, and performing a trade by the comprehensive pre-position bank server if the verification is successful; c: generating by the mobile terminal an updated parameter for protecting a private key after the trade is performed, sending to the mobile bank server, receiving a successful updating result from the mobile bank server and encrypting and storing the user's private key. The present invention can increase the difficulty of an attack, and improve security. | 12-17-2015 |
20150363778 | CRYPTOCURRENCY ELECTRONIC PAYMENT SYSTEM - A system includes a memory and a processor coupled to the memory. The processor may communicate with an electronic payment service, the electronic payment service providing a virtual account associated with the customer and determine that the customer initiated a request for a financial transaction, the financial transaction configured to transfer an amount of currency from the virtual account to a destination. The processor is also able to validate the financial transaction based at least upon data received from the electronic payment service and determine the customer account is associated with the virtual account based at least upon data received from the electronic payment service. The processor also may determine a quantity of cryptocurrency equivalent to the amount of currency (the quantity of cryptocurrency associated with the customer account) and transfer the quantity of cryptocurrency to the electronic payment service. | 12-17-2015 |
20150363783 | CRYPTOCURRENCY RISK DETECTION SYSTEM - The system includes a processor operable to receive a request from a customer to perform a cryptocurrency transaction with a third party. The processor may also retrieve block chain information associated with the cryptocurrency transaction. The processor may also determine the amount of cryptocurrency associated with the cryptocurrency transaction. The processor may further calculate a risk score for performing the cryptocurrency transaction based at least in part upon the block chain information and the amount of cryptocurrency. | 12-17-2015 |
20150365283 | CRYPTOCURRENCY OFFLINE VAULT STORAGE SYSTEM - A system includes a memory that may store a customer account associated with a customer and a processor communicatively coupled to the memory. The processor is able to receive a request to deposit a quantity of cryptocurrency into the customer account and associate the quantity of cryptocurrency with the customer account. The processor is also able to deposit the quantity of cryptocurrency into a vault connected to a network and determine a total quantity of cryptocurrency deposited into the vault. The processor may also, in response to determining the total quantity of cryptocurrency deposited into the vault exceeds a threshold, facilitate the disconnection of the vault from the network. | 12-17-2015 |
20150371215 | SYSTEMS AND METHODS FOR MOBILE APPLICATION, WEARABLE APPLICATION, TRANSACTIONAL MESSAGING, CALLING, DIGITAL MULTIMEDIA CAPTURE AND PAYMENT TRANSACTIONS - Systems and method are disclosed for multimedia capture and encrypting using an ephemeral messaging and multimedia application associated with a digital device for secured payment by selecting as a first user input a haptic control for a particular type of multimedia content to be captured; interacting as a second user input with a touch display of the digital device by touching a touch display and holding a touch contact of a user finger or stylus for a predetermined time; capturing multimedia content based on the contact and sending a command to a sensor, of the digital device to capture video and starting a timer to determine a duration of the touch contact of the user with the touch display; and making a secured payment with the digital device. | 12-24-2015 |
20150371224 | CRYPTOCURRENCY INFRASTRUCTURE SYSTEM - Embodiments of the present invention are directed to methods and systems for managing a cryptocurrency payment network comprising one or more issuer nodes and one or more distributor nodes. Issuer nodes may be granted different rights from distributor nodes with respect to the issuance and distribution of digital currency within the cryptocurrency payment network. A management system server computer may generate unique node verification key pairs for each node in the cryptocurrency payment network, where the node verification key pairs may be used to identify and authenticate issuer nodes and distributor nodes. | 12-24-2015 |
20150371225 | DIGITAL WALLET BROADCASTING - A service provider generates a customer key and a merchant key for facilitating efficient provision of assistance, by the merchant, with the customer's shopping and payment, via customer-merchant key coupling. When a customer approaches or enters a merchant's store the customer has signed up with, the user device carried by the customer wirelessly broadcasts a signal for the customer key unique to the merchant key. When the merchant server picks up the signal, the service provider communicates to the merchant server information in the user's profile including identifiers, shopping preferences, or the shopping history of the customer, subject to any user-created restrictions contained in the profile so that a sales clerk of the store may approach the customer to give recommendations, suggestions, or other assistance with shopping, based on the information. | 12-24-2015 |
20150371235 | Mobile Payment System and Mobile Payment Method based on Biometric Authentication - The invention discloses a mobile payment system and mobile payment method based on biometric authentication. The mobile payment system comprises a mobile terminal, an identification code provided on a menu, a system server and a mobile payment platform. The mobile payment method comprises: scanning at least one identification code respectively corresponding to at lest one object on the menu by a mobile terminal to form a list, and sending the list and a number corresponding to the mobile terminal to the system server; sending the list to the mobile payment platform by a system server, and sending a payment instruction to the mobile payment platform to request a user of the mobile terminal to pay; sending the list to the mobile terminal after receiving the payment instruction by the mobile payment platform, and sending a confirmation message back to the mobile payment platform after the user confirming by the mobile terminal and paying biometrically; and sending an instruction of payment completion to the system server by the mobile payment platform. By means of the invention, waiting is not needed for ordering such that transactions can be achieved instantaneously, this greatly improves the security and efficiency. | 12-24-2015 |
20150379509 | DNA SAMPLE DATA IN A TRANSPONDER TRANSACTION - The present disclosure relates to the use of DNA sample data as part of a biometric security system in a transponder transaction. The biometric security system also includes a DNA sensor that detects biometric samples, and a device for verifying biometric samples. In one embodiment, the biometric security system includes a transponder configured with a DNA sensor. In another embodiment, the system includes a reader configured with a DNA sensor. In yet another embodiment, the present invention discloses methods for proffering and processing DNA samples and DNA sample data to facilitate authorization of transactions. | 12-31-2015 |
20150379510 | Method and system to use a block chain infrastructure and Smart Contracts to monetize data transactions involving changes to data included into a data supply chain. - A method and system to use a block chain infrastructure and smart contracts to monetize data transactions involving changes to data included into a data supply chain. | 12-31-2015 |
20150379511 | CRYPTOGRAPHIC TRUST VERIFICATION SYSTEM - A verification engine for verifying that a retailer is an authorized sales channel for goods created by a manufacturer includes a controller configured to receive a verification request from a purported retailer initiated by a customer seeking to purchase goods. The request includes verification data and a first signature. The verification data includes at least identification of the purported retailer and the goods manufacturer, and the first signature includes a result of an operation on the verification data by a cryptographic key provided by the purported retailer. The verification data is compared to a listing to determine if the purported retailer is an authorized retailer. If so, a second signature is generated and compared to the first. A message is sent to the customer verifying or denying a relationship between the purported retailer and the goods manufacturer based on one or more of the comparisons. | 12-31-2015 |
20160005009 | METHOD FOR CONDUCTING A TRANSACTION - A method for conducting a transaction between a merchant and a customer, a merchant device, and a computer storage medium for instructing a computing device to execute a method for conducting a transaction between a merchant and a customer are disclosed. The method includes establishing a secure wireless connection between a merchant device and a customer device, real-time synchronizing, via the secure connection, a shopping cart of the customer between the merchant and the customer devices, determining, via the secure connection, at least one payment option for checking out the shopping cart, and processing, at a transaction processing device, the payment based on a selected payment option out of the at least one payment option. | 01-07-2016 |
20160019540 | TRANSACTION METHOD AND TRANSACTION SYSTEM - A server transmits an encryption key or encryption key information for specifying the encryption key to a mobile terminal. The mobile terminal acquires play money at the game machine, generates encrypted information by encrypting an ID token with the received encryption key or an encryption key corresponding to the received encryption key information, and transmits the ID token and the encrypted information to the server through the game machine. The server decodes the encrypted information, transacts a payment based on a user ID identifying a user of the mobile terminal and the amount of play money when the ID token received by the server matches the ID token acquired by the decoding, and authorizes the game machine to let the user play up to the amount of play money. Therefore, the game can be started by exchanging electronic data between the mobile terminal and the game machine with high security. | 01-21-2016 |
20160019541 | SYSTEM AND METHOD FOR DYNAMIC FOB SYNCHRONIZATION AND PERSONALIZATION - A system generally for personalizing and synchronizing fob data in the context of a distributed transaction system is disclosed. A dynamic fob synchronization system may comprise point of service (POS) devices configured with transponder-readers to initiate a transaction in conjunction with a fob, an enterprise data collection unit, and a fob object database update system. An exemplary dynamic synchronization system (DSS) may comprise various fob POS devices, a secure support client server, a fob object database update system (FODUS), one or more enterprise data synchronization interfaces (EDSI), an update logic system, one or more enterprise data collection units (EDCUs), and one or more fob POS devices configured to interoperably accept and interface with fobs. In an exemplary embodiment, DSS may comprise a personalization system and an account maintenance system configured to communicate with FODUS. Personalization of multi-function fobs may be accomplished using a security server configured to generate and/or retrieve cryptographic key information from multiple enterprise key systems during the final phase of the fob issuance process. | 01-21-2016 |
20160020906 | TRUSTED TERMINAL PLATFORM - A point-of-sale (POS) terminal is provided for entering a PIN to enable a financial transaction. The point-of-sale terminal has a card reader for reading information from a credit card, a processor for running an operating system, with applications, a touch screen for displaying information and receiving user inputs, and a Security-Box connected between the touch screen and the processor to control the user input on the touch screen to the processor. The Security Box is configured to run in a “PIN Entry Mode” and a “Clear Text Mode.” When running in “PIN Entry Mode” the user input is not forwarded as touch coordinates to the processor and when running in “Clear Text Mode” the touch coordinates are transmitted to the processors. | 01-21-2016 |
20160027006 | ENCRYPTING PIN RECEIVER - In an example embodiment, an encrypting personal identification number (PIN) receiver operable to receive a PIN from a source via a contactless interface. The PIN is decrypted with a key associated with the source, and subsequently encrypted with a key associated with a destination for the PIN. The PIN encrypted with the key associated with the destination is forwarded towards the destination via a second interface. | 01-28-2016 |
20160027007 | Loosely Coupled Hosted Application System - Technologies are described herein for loosely coupling a hosted application system with other computing systems that provide related functionality. A hosted application system is provided in one embodiment that is loosely coupled to a marketing system, a sign-up system, a billing system, and a support system. The loose coupling of the systems allows the hosted application system to be easily configured to restrict the software to which a particular customer can subscribe based upon the capacity of the hosted application system, the qualifications of a customer, or other factors. The computing systems may be configured to communicate via idempotent network APIs, thereby permitting multiple retries to ensure successful completion of requests. | 01-28-2016 |
20160027017 | METHOD AND SYSTEM FOR USING DYNAMIC CVV IN QR CODE PAYMENTS - A method for using dynamic CVV in QR code payments is described. The method comprises generating a random number, via a payment module, on a mobile device for a mobile transaction, authenticating user account information, and decrypting encrypted user data when the user account information is authenticated. The method also comprises retrieving a user account unique key, determining a counter number via an application transaction counter, and generating a dynamic verification code, via the payment module, based on the generated random number, the user data, the counter number, and the user account unique key. The method further comprises generating track data, the track data comprising the user data, the random number, and the dynamic verification code, generating a two-dimensional matrix barcode from the track data, and displaying, via the payment module, the generated matrix barcode to a sales terminal for the mobile transaction. | 01-28-2016 |
20160034859 | SYSTEM AND METHOD FOR CASHLESS TRANSACTIONS - The present invention provides a method for cashless transaction at a point of sale. The method includes receiving unique information from a payment infrastructure corresponding to user. The unique information is received upon the user sending a request to the payment infrastructure. In addition, the method includes creating a data packet by a mobile device corresponding to the user. The data packet comprises an amount to be paid, the unique information, identity of the mobile device corresponding to the user a transaction number. The amount is entered by the user, wherein the data packet is encrypted. In addition, the method includes sending the data packet to a mobile device corresponding to a merchant. In addition, the method includes receiving an encrypted data from the merchant. In addition, the method includes sending information to the payment infrastructure, wherein the information comprises the decryption of the encrypted data received from the merchant. | 02-04-2016 |
20160042198 | DEIDENTIFIED ACCESS OF CONTENT - Generally, embodiments of the invention are directed to methods, computer readable medium, servers, and systems for deidentified access of data. The deidentified access is permitted with the use of an identifier that uniquely indicates an outcome, the coding of the identifier obscures unaided human interpretation of the outcome, and the identifier uniquely identifies data for remediating performance associated with future outcomes. | 02-11-2016 |
20160048827 | Method, system, and device for enabling micro-proximity location, detection and services - Techniques for enabling micro-proximity location, detection and services are described. One embodiment of the present invention pertains to location and micro-proximity services technology in conjunction with fixed or mobile devices using a type of low energy signals (e.g., Bluetooth Low Energy (BLE) technology). With the detected location before a specific object, various proximity services may be customized with respect to the specific object. | 02-18-2016 |
20160048833 | SYSTEMS, METHODS AND DEVICES FOR TRANSACTING - Methods, systems and devices for transacting are provided. In a method conducted at a mobile device of a consumer, having a mobile-based credential stored in a secure memory thereof and having an associated alias, a request for the mobile-based credential from a remotely accessible server is received in response to a requestor device receiving the alias from the consumer. The mobile-based credential is accessed from the secure memory and transmitted to the remotely accessible server. The mobile-based credential is then usable at the remotely accessible server in combination with a server-based credential stored thereat for obtaining payment credentials usable in completing the transaction. | 02-18-2016 |
20160048836 | SECURE PAYMENT TRANSACTION SYSTEM - The present invention proposes a payment transaction system, comprising: •—a merchant server; •—a client device for connecting to the merchant server and interacting with same; •—a secure customer data server, •—a secure payment server distinct from said secure customer data server, • said secure customer data server having a memory storing payment instrument data in relation with a plurality of users, and being capable of interacting with said client device by: • receiving a payment instrument data request corresponding to a given user account, • establishing a secure session between said client device and the secure payment data server, • within that session, performing a secure, challenge-response type authentication transaction, and • upon successful authentication, receiving payment instrument data at said client device for providing to said merchant server, at least part of said data being ciphered, • said client device being adapted to decipher said ciphered part of said data and to transmit to said merchant server, or to said secure payment server, payment instrument data in a form useable by said server. This allows streamlining the payment process while having a high degree of safety. Said challenge-response authentication involves a hash function applied to a combination of a user password entered on said client device and a challenge received from said secure customer data server, in order to generate a one-time password for sending to said secure customer data server | 02-18-2016 |
20160055484 | SYSTEMS AND METHODS FOR ENCODED ALIAS BASED TRANSACTIONS - Disclosed is a computer based method for securing a financial transaction. A transaction device does not include any human readable data that can be used to identify the account owner and/or the transaction account. A first code and a second code are combined to determine an alias transaction account code. A transaction account is determined based upon the alias transaction account code. | 02-25-2016 |
20160055485 | NETWORK ACCESS AUTHENTICATION USING A POINT-OF-SALE DEVICE - A user device can be configured for network access, such as for guest network access. In one example, a first device receives an indication of a transaction that uses the first device. The first device communicates a request for network access to an access point of the network in response to receiving the indication of the transaction. The first device then receives a first key from the access point. The first device provides the first key to the user device. The user device is to use the first key to obtain the network access to the network. | 02-25-2016 |
20160063462 | SECURITY DEVICE KEY MANAGEMENT - A method includes using a cryptographic infrastructure via a security processor in a device to communicate with a host, and managing, via the security processor, a cryptographic relationship with a security peripheral coupled to the security processor independent of the cryptographic infrastructure used to communicate with the host. | 03-03-2016 |
20160063490 | MOBILE-MERCHANT PROXIMITY SOLUTION FOR FINANCIAL TRANSACTIONS - In order to facilitate conducting a financial transaction via wireless communication between an electronic device (such as a smartphone) and another electronic device (such as another smartphone), a secure element in the electronic device may generate, using an encryption key associated with the secure element, a signed blob based on a transaction amount and a merchant identifier. Then, the electronic device communicates connection information between the electronic device and the other electronic device. Moreover, the electronic device may establish a connection between the electronic device and the other electronic device based on the connection information, and may concurrently provide the signed blob to the other electronic device. After receiving a signed transaction blob from the other electronic device using the connection (which includes information needed to conduct the financial transaction), the electronic device provides the information to a server to conduct the financial transaction. | 03-03-2016 |
20160063491 | SECURE ONLINE TRANSACTIONS USING A TRUSTED DIGITAL IDENTITY - Techniques for conducting secure online transactions are provided. Some techniques utilize a trusted, secure device that is distributed to a human user, and which only the user can access, a device reader, and a one-time secret valid only to authenticate a single transaction to improve on the traditional transaction model by isolating elements of the transaction with the user on the user's trusted, secure device. Isolating elements of the transaction on the trusted, secure device facilitates a secure transaction on an untrusted machine and over an untrusted network. | 03-03-2016 |
20160063496 | Remote Secure Transactions - Embodiments of the disclosure can provide systems, methods, and apparatus for remote secure transactions. In one embodiment, a payment processing system can be provided, which can include a network interface communicating with a memory, the memory communicating with a processor for executing payments, and the processor, when executing a computer program, performing operations. The operations can include storing, by the processor and to a memory associated with the payment processing system, account information associated with the consumer mobile system, and receiving, by the processor and from a consumer mobile device, a request, wherein the request comprises an account identifier associated with the consumer mobile device. The operations can also include validating, by the processor and from a consumer mobile device, the consumer mobile device based at least in part on the account identifier, and sending, by the processor, payment processing data, based on the validation. | 03-03-2016 |
20160071081 | OFFLINE PIN AUTHENTICATION METHOD AND SYSTEM FOR IC CARD - The present invention relates to an off-line PIN authentication and an off-line PIN authentication system. The method comprises: inputting an off-line PIN1 to a POS terminal, the POS terminal generating a dynamic challenge code, and transmitting the dynamic challenge code and the off-line PIN1 to a card application; the card application verifying the first off-line PIN1 and the second off-line PIN2 are consistent with each other or not; if consistent, a digital signature being made on the first off-line PIN1 and the second off-line PIN2 to return signature data and a success status code to the POS terminal; the POS terminal verifying the signature data in case of receiving the success status code, and starting the subsequent transaction procedure if the signature data is verified successfully. According to the present invention, it not only can realize the verification of the IC card to the off-line PIN, but also can realize the verification of the terminal to the off-line PIN. The method is implemented simply, is practical, safe and reliable. | 03-10-2016 |
20160071101 | SELFIE FINANCIAL SECURITY TRANSACTION SYSTEM - A financial card activation and authorization system for a transaction is disclosed. An image of an account holder and his financial card is captured and used to develop an encryption key to secure the account information. Subsequent transactions are then authorized by sending an image of the purchaser's face and the financial card by comparing it to the original picture of the account holder who activated the card. | 03-10-2016 |
20160078434 | METHODS AND SYSTEMS FOR PROVISIONING PAYMENT CREDENTIALS - A method and system for provisioning payment credentials usable by a mobile device in conducting a payment. The method is conducted at a provisioning system and comprises the steps of: receiving payment credentials from a receiving device, the payment credentials having been obtained from a portable payment device presented by a consumer at the receiving device; receiving, from the receiving device, an identifier entered by the consumer; identifying a mobile device or a secure element corresponding to the identifier; and communicating the payment credentials or a derivation of the payment credentials to the identified mobile device or the secure element to be securely stored in association with the mobile device. The method may include: encrypting the received payment credentials, the encrypted payment credentials having a unique decryption key; and wherein communicating a derivation of the payment credentials communicates the unique decryption key. | 03-17-2016 |
20160078435 | Systems And Methods For Providing Security To Different Functions - Methods and systems are provided that use smartcards, such as subscriber identity module (SIM) cards to provide secure functions for a mobile client. One embodiment of the invention provides a mobile communication network system that includes a mobile network, a mobile terminal, a server coupled to the mobile terminal via the mobile network, and a subscriber identity module (SIM) card coupled to the mobile terminal. The SIM card includes a first key and a second key. The first key is used to authenticate an intended user of the mobile terminal to the mobile network. Upon successful authentication of the intended user to the mobile network, the mobile terminal downloads a function offered from the server through the mobile network. The second key is then used by the mobile terminal to authenticate the intended user to the downloaded function so that the intended user can utilize the function. | 03-17-2016 |
20160080151 | Systems and Methods of Authentication of Communications - A system and method of authenticating a communication network comprising a first computing device, a second computing device and an intermediary computing device, wherein there is a first path between the first computing device and the intermediary computing device and a second path between the second computing device and the intermediary computing device. The method is executed at the intermediary computing device, and comprises receiving, from the first computing device, a first session key generated by the first computing device using a function, wherein an input to the function comprises an incremented variable; receiving, from the second computing device, data associated with a second session key generated by the second computing device using the function; determining that the first session key and the second session key are the same; and defining the communication network as authentic when the first session key and the second session key are the same. | 03-17-2016 |
20160086151 | SYSTEM AND METHOD FOR MANAGING A PREPAYMENT ACCOUNT AND ASSOCIATED PREPAYMENT MESSAGES - A method is provided for mobile payment. The method is performed at a social networking system and includes receiving, from a first client device, a request to establish a prepayment account at the social networking system. In response to the received request, the prepayment account is established. The method further includes receiving a payment request from the first client device and, in response to the payment request, generating a unique identifier corresponding to the payment request. The unique identifier is sent to the first client device. The method further includes receiving, from a respective merchant, a transaction request that includes information corresponding to the unique identifier, a transaction amount, and an identifier of a user account of the respective merchant. The method further includes initiating transfer of the transaction amount from the prepayment account to the user account of the respective merchant. | 03-24-2016 |
20160086164 | NEAR FIELD COMMUNICATION ACTIVATION AND AUTHORIZATION - A method of activation and authorization of a near field communication (NFC) enabled device comprising: receiving login information from an NFC enabled device; sending packet data via a network in response to receiving the login information from the NFC enabled device; and receiving corresponding data from the NFC enabled device in response to the sending of the packet data, the sending of the packet data and the receiving of the corresponding code facilitates the activation and authorization of the NFC enabled device, and the subsequent activation of the NFC device via a NFC link without further authorization of the NFC enabled device, is described herein. | 03-24-2016 |
20160086168 | ESTABLISHING COMMUNICATION BETWEEN A READER APPLICATION AND A SMART CARD EMULATOR - Disclosed herein are systems and methods implementing a broker component. A broker component receives a request from a reader application executing on the computing device to establish communication with a smart card emulation application. The smart card emulation application is configured to emulate the functionality of a smart card. The broker component, responsive to at least the request from the reader application, determines a particular smart card emulation application and facilitates establishment of communication between the reader application and the particular smart card emulation application. | 03-24-2016 |
20160086172 | TRUSTED EXECUTION ENVIRONMENT FOR TRANSPORT LAYER SECURITY KEY PAIR ASSOCIATED WITH ELECTRONIC COMMERCE AND CARD NOT PRESENT TRANSACTIONS - According to some embodiments, a requesting application executing on a mobile device may request a transport layer security key pair in connection with a payment transaction. Responsive to the request, a trusted execution environment client of the mobile device may route a request to a payment application executing in a secure trusted execution environment of the mobile device. It may then be arranged, within the secure trusted execution environment, to create the transport layer security key pair and provide key pair to the requesting application. Moreover, in some embodiments, the mobile device may transmit payment transaction information to an access control server and receive a request for biometric authentication. It may then be arranged for hardware within the mobile device to biometrically authenticate a user of the mobile device. | 03-24-2016 |
20160086173 | Method and system for handling sensitive data in a content delivery network - Using cryptographic techniques, sensitive data is protected against disclosure in the event of a compromise of a content delivery network (CDN) edge infrastructure. These techniques obviate storage and/or transfer of such sensitive data, even with respect to payment transactions that are being authorized or otherwise enabled from CDN edge servers. | 03-24-2016 |
20160086183 | TRUST MANAGEMENT IN TRANSACTION SYSTEMS - The disclosure provides a method of updating time in a transaction between a transaction device and an offline terminal. Firstly, a transaction is initiated ( | 03-24-2016 |
20160088471 | SYSTEM FOR SECURELY ENTERING PARTICULAR INFORMATION AND METHOD THEREOF - A system for securely entering particular information includes a mobile device and a background server. The mobile device includes a first area which is a non-secure environment, a second area which is a secure environment and a switching module implementing switchings between the first and second areas. At least one first application module for executing a business function application is provided in the first area. A second application module for executing a particular information entering application and an encryption module for encrypting entered particular information are provided in the second area. If a particular information entering is required by the first application module, the switching module triggers the second application module to perform the particular information entering, and returns, to the first application module, an encryption result obtained by encrypting the entered particular information. The background server includes an authentication module for authenticating the encryption result. | 03-24-2016 |
20160092870 | SYSTEMS AND METHODS FOR GENERATING AND ADMINISTERING MOBILE APPLICATIONS USING PRE-LOADED TOKENS - The disclosed embodiments include computerized methods and systems that provide mobile application programs to devices of users and that administer these mobile application programs using tokens “pre-loaded” with data. In one aspect, the disclosed embodiments may generate a mobile payment product, such as a mobile wallet, that is “pre-loaded” with eligible financial products. For example, the disclosed embodiments may receive a request from a user device to obtain an application program that administers the mobile wallet, and in response to the received request, may obtain information identifying one or more financial products eligible for inclusion in the mobile wallet. The disclosed embodiments may generate a mobile wallet token based on the eligible financial product information and store the mobile wallet token in cloud-based storage. The user device may, upon authenticating the user, obtain the mobile wallet token and provision the mobile wallet with the eligible financial products. | 03-31-2016 |
20160098698 | METHODS FOR ENABLING MOBILE PAYMENTS - Methods for enabling secure online transactions using a mobile device are described. A mobile device may capture an image associated with a banking card in order to generate checkout information and to automatically populate checkout fields with the checkout information prior to completing an online transaction. In some cases, the mobile device may be used to select items to be purchased from an online merchant, access a checkout page of the online merchant for purchasing the selected items, acquire an image that encodes checkout information, acquire a personal code associated with an end user of the mobile device, generate the checkout information using the acquired image and the personal code, automatically populate one or more fields associated with the checkout page with the checkout information, delete the checkout information from the mobile device, and submit the checkout information to complete the purchase of the selected items. | 04-07-2016 |
20160098730 | System and Method for Block-Chain Verification of Goods - A method for block-chain verification of goods includes obtaining, by a first computing device, a first address. The method includes exporting, by the first computing device, the first address to a first code affixed to a first product. The method includes filing, by the first computing device, a first crypto-currency transaction to the first address, at a transaction register. The method includes receiving, by a second computing device, from a code scanner, the first address, scanned from the first code affixed to the first product. The method includes verifying, by the second computing device, the first crypto-currency transaction at the transaction register, using the first address. The method includes identifying, by the second computing device, based on the verification, that the first product is authentic. | 04-07-2016 |
20160110711 | METHOD AND SYSTEM FOR GENERATING CRYPTOGRAMS FOR VALIDATION IN A WEBSERVICE ENVIRONMENT - A method for generating cryptograms in a webservice environment includes: receiving, in a first environment of a computing system, a credential request transmitted by an external computing device using a secure communication protocol, the credential request including a transaction identifier and account identifier; transmitting, by the first environment, a data request to a second environment of the computing system, the data request including the account identifier; receiving, by the first environment, an account profile and session key from the second environment; transmitting, by the first environment, a cryptogram request to a third environment of the computing system, the cryptogram request including the account profile and session key; receiving, by the first environment, a cryptogram from the third environment generated using the account profile and session key; and transmitting, by the first environment, the cryptogram and transaction identifier to the external computing device via the secure communication protocol. | 04-21-2016 |
20160110720 | VALIDATION METHOD AND SYSTEM FOR USE IN SECURING NOMADIC ELECTRONIC TRANSACTIONS - A method involving a communication device, which comprises sending a request to a communication device; receiving a response from the communication device over a local communication path; deriving a received data set from said response; determining at least one data set that had been previously transmitted to the communication device over a wireless portion of a second communication path different from the local communication path; and validating the response based on the received data set and the at least one previously transmitted data set. | 04-21-2016 |
20160117668 | ESTABLISHING TRUST FOR CONDUCTING DIRECT SECURE ELECTRONIC TRANSACTIONS BETWEEN A USER AND SERVICE PROVIDERS - Ensuring security of electronic transactions between a user and a service provider involves establishing electronic trust among a user, device, transaction service provider, and service providers through OTAC processing, key generation and exchange, and verification. | 04-28-2016 |
20160117669 | ESTABLISHING TRUST FOR CONDUCTING DIRECT SECURE ELECTRONIC TRANSACTIONS BETWEEN A USER AND TRAVEL SERVICE PROVIDERS - Ensuring security of electronic transactions between a user and a travel service provider involves establishing electronic trust among a user, device, transaction service provider, and travel service providers through OTAC processing, key generation and exchange, and verification. | 04-28-2016 |
20160117673 | SYSTEM AND METHOD FOR SECURED TRANSACTIONS USING MOBILE DEVICES - A secure payment system provisions a payment transaction proxy with virtual EMV-type chipcards on secure backend servers. Users authorize the proxy in each transaction to make payments in the Cloud for them. The proxy carries out the job without exposing the cryptographic keys to risk. User, message, and/or device authentication in multifactor configurations are erected in realtime to validate each user's intent to permit the proxy to sign for a particular transaction on the user's behalf. Users are led through a series of steps by the proxy to validate their authenticity and intent, sometimes incrementally involving additional user devices and communications channels that were pre-registered. Authentication risk can be scored by the proxy, and high risk transactions that are identified are tasked by further incrementally linking in more user devices, communications channels, and user challenges to increase the number of security factors required to authenticate. | 04-28-2016 |
20160125403 | OFFLINE VIRTUAL CURRENCY TRANSACTION - A method of conducting an offline virtual currency transaction is disclosed. The method may include steps of generating one or more virtual wallets; depositing certain amount of virtual currency in said virtual wallets; a payer transmitting at least a portion of said virtual currency to a payee through an offline platform; and payee confirming reception of the virtual currency. In one embodiment, the step of transmitting at least a portion of said virtual currency to another user through an offline platform may include a step of scanning a QR (Quick Response) code to transmit the virtual currency. In another embodiment, the virtual currency can also be transmitted through infrared. In a further embodiment, the step of confirming reception of the virtual currency may include a step of said payee deleting private key. | 05-05-2016 |
20160125416 | AUTHENTICATION SYSTEM - A user having a computer hardware device can perform a secure transaction by entering on the device user data comprising unique knowledge of the user (such as a password) or biometric information of the user or both, generating with the device processor a pseudo random number, and generating a seed for a public/private key pair by combining the user data and the pseudo random number. The key pair is generated with the seed and transmitted to the server. Also a digital signature is created with the private key and the user data and also transmitted to the server. The digital signature is verified using the public key and if the user data matches previously stored user data, the transaction is allowed to proceed. | 05-05-2016 |
20160125417 | TERMINAL FOR MAGNETIC SECURE TRANSMISSION - Devices, systems, and methods for securely converting a user's existing static payment card data into dynamic card data that can be authenticated by card issuers or by a stand-in service provider, such as a payment network or processor without requiring the card issuers to make infrastructure changes. The dynamic data can be provisioned onto a magnetic secure transmission device (MST) either directly from a card issuer or using a swiper type device. Devices, systems, and methods are also disclosed for securely provisioning a dynamic card onto the MST by the card issuer. These dynamic cards may be used to transmit modified one-time-use card track data from the MST to a point of sale using a dynamic-CVV methodology to provide higher levels of security during a transaction. | 05-05-2016 |
20160132841 | TRANSACTING ACROSS MULTIPLE TRANSACTIONAL DOMAINS - One or more techniques and/or systems are provided for facilitating transactions across multiple transactional domains. For example, a first committer stores first data according to a first transactional domain (e.g., communication protocol data of a smart television) and a second committer stores second data according to a second transactional domain (e.g., communication protocol data of a mobile device). The first committer may commit to updating the first data from an old data state to a new data state (e.g., update from an unauthenticated protocol to an authenticated protocol). The first committer may instruct the second committer to perform a second commit of the second data to the new data state. If the second commit succeeds, then the first committer may utilize the new data state (e.g., utilize the authenticated protocol for communication) otherwise the first committer may utilize the old data state (e.g., utilize the unauthenticated protocol for communication). | 05-12-2016 |
20160132871 | SECURE REDEMPTION CODE GENERATION FOR GIFT CARDS AND PROMOTIONS - A stored value card management system and method secures against the fraudulent use of stored value cards. A secure redemption code is generated comprising multiple component parts including a look-up identifier and a secure code. The secure redemption code is printed on a face of a stored value card without any visible demarcation of the component parts. The look-up identifier allows access to stored value card records and a determination of the stored value card's activation status. A hash of the secure code is stored in a separate secure index and validation of the secure hash is required to complete redemption of the stored value card. Access privileges to the card index and secure hash index are distinct and possession of one component of the secure redemption code is not sufficient to redeem the stored value card. | 05-12-2016 |
20160132872 | SECURE DATA TRANSFER FROM A VENDING DEVICE TO PORTABLE DATA STORAGE DEVICES - Techniques for transferring secured data from a vending device to portable data storage device are described herein. The vending device receives a request from a user of the portable data storage device be stored on the portable data storage device and requests for a payment for the requested digital contents to be paid by the user. The vending device locates a first portable storage identification (PSID) parameter unique to the portable data storage device, and then generates a rights object including a second PSID parameter that is equal to the first PSID parameter to prevent the digital contents from accessed at a data storage medium other than the portable data storage device. It is to be appreciated some or all of the above processing can b completed by a back-end device separate from the vending device. | 05-12-2016 |
20160132873 | SECURE DATA ENTRY AND DISPLAY FOR A COMMUNICATION DEVICE - The present invention is a secure transaction apparatus for use with, arid that interacts with, a mobile communication device and a remote secure transaction sewer. A transaction can be initiated by the use of the mobile communications device, and subsequently completed using the secure transaction apparatus. The secure transaction apparatus is capable of receiving and sending data via secure wireless communications protocols to the secure transaction server, and the secure transaction apparatus is capable of displaying data to a user of the transaction apparatus via a secure screen element. The secure transaction apparatus includes means to interact with the remote transaction server so that a secure and trustworthy transaction can occur. | 05-12-2016 |
20160132874 | SECURE AUTHORIZATIONS USING INDEPENDENT COMMUNICATIONS AND DIFFERENT ONE-TIME-USE ENCRYPTION KEYS FOR EACH PARTY TO A TRANSACTION - A registered provider device encrypts provider input related to a transaction between the provider device and one of many registered user devices to create an encrypted one-time-use provider code (the encryption is performed using an encryption key produced, in part, using a uniquely sequenced number generated by a sequencer maintained by the provider device). Similarly, the user device encrypts user input to create an encrypted one-time-use user code using an encryption key produced, in part, using a uniquely sequenced number generated by a user sequencer maintained by the user device. The provider and user devices independently transmit their different encrypted one-time-use codes to an intermediate entity, which decrypts the encrypted codes. This decryption is performed using one-time-use encryption keys produced using sequencers maintained by the intermediate entity, and this decryption generates an authorization request. The intermediate entity obtains an authorization decision regarding the authorization request from the authorization entity. | 05-12-2016 |
20160132877 | SECURE AUTHORIZATIONS USING INDEPENDENT COMMUNICATIONS AND DIFFERENT ONE-TIME-USE ENCRYPTION KEYS FOR EACH PARTY TO A TRANSACTION - A registered provider device encrypts provider input related to a transaction between the provider device and one of many registered user devices to create an encrypted one-time-use provider code (the encryption is performed using an encryption key produced, in part, using a uniquely sequenced number generated by a sequencer maintained by the provider device). Similarly, the user device encrypts user input to create an encrypted one-time-use user code using an encryption key produced, in part, using a uniquely sequenced number generated by a user sequencer maintained by the user device. The provider and user devices independently transmit their different encrypted one-time-use codes to an intermediate entity, which decrypts the encrypted codes. This decryption is performed using one-time-use encryption keys produced using sequencers maintained by the intermediate entity, and this decryption generates an authorization request. The intermediate entity obtains an authorization decision regarding the authorization request from the authorization entity. | 05-12-2016 |
20160140548 | METHOD FOR PERFORMING NON-REPUDIATION, AND PAYMENT MANAGING SERVER AND USER DEVICE THEREFOR - A method for implementing non-repudiation of payment in a payment managing server includes receiving, from a user terminal, a terminal public key of a pair of asymmetric keys generated by the user terminal, receiving user authentication information, the user authentication information having been generated by a user authentication server and transmitted to the user terminal, storing the received terminal public key when validity of the user authentication information is confirmed through a communication with the user authentication server, receiving a payment request from the user terminal, receiving, from the user terminal, electronic signature information that has been encrypted with a terminal private key of the pair of asymmetric keys and decrypting the electronic signature information using the stored terminal public key, is provided. | 05-19-2016 |
20160140549 | MODULE ID BASED TARGETED MARKETING - A server is operable to receive a media device identifying number (ID) and establish an association between a media device and a payment account and, in one embodiment, supports at least one of payment authorization and payment clearing based at least in part on the media device ID and the payment account. A network and system includes a payment card processor server that is operable to receive a payment authorization request and to determine if an authorized media device generated a purchase selection message and to determine to approve a received payment authorization request based, in part, if the media device was authorized for the purchase selection based upon a received media device ID. The system is further operable to perform a key rotation to protect payment account information. | 05-19-2016 |
20160148204 | MOBILE COMMERCE PAYMENT SYSTEM - A mobile commerce system and components thereof are provided in which multiple wireless mobile communications devices (mobile devices) ( | 05-26-2016 |
20160155109 | Systems and Methods for Convenient and Secure Mobile Transactions | 06-02-2016 |
20160155113 | Method to Make Payment or Charge Safe Transactions Using Programmable Mobile Telephones | 06-02-2016 |
20160155119 | SYSTEMS AND METHODS FOR CONDUCTING TRANSACTIONS AND COMMUNICATIONS USING A TRUSTED THIRD PARTY | 06-02-2016 |
20160155120 | MODULE ID BASED TARGETED MARKETING | 06-02-2016 |
20160162883 | METHODS AND APPARATUS FOR CONDUCTING SECURE MAGNETIC STRIPE CARD TRANSACTIONS WITH A PROXIMITY PAYMENT DEVICE - Methods and apparatus for enabling a proximity payment device to generate dynamic data for securely conducting a transaction by emulating a magnetic stripe payment card. In an embodiment, a mobile device processor transmits information to a digital enablement service computer to activate a simulated magnetic stripe payment wallet application stored in the mobile device. The mobile device then receives one or more cryptographic keys, generates an unpredictable number (UN), generates dynamic CVC3 data based on the UN, and then assembles emulated magnetic stripe data. During initiation of a purchase transaction, the mobile device processor transmits the emulated magnetic stripe data to a communications interface associated with a merchant device. | 06-09-2016 |
20160162892 | METHOD FOR CONTROL OF AUTHENTICITY OF A PAYMENT TERMINAL AND TERMINAL THUS SECURED - A method and a payment terminal enable verification of the authenticity of a payment terminal. More particularly, a method is provided for processing a piece of initial data, carried out within the payment terminal, the payment terminal being configured to authorize a verification of its authenticity by using the piece of initial data. The method includes: obtaining at least one piece of information external to the payment terminal, called a piece of initial data; cryptographic processing of the piece of initial data, delivering a piece of processed data; visual and/or sound rendering of the piece of processed data. | 06-09-2016 |
20160162897 | System and method for user authentication using crypto-currency transactions as access tokens - A method for crypto-currency transaction authentication includes receiving, by a computing device, from a data storage device associated with a first entity, an authentication information demonstrating possession of a private key, retrieving, by the computing device, from an audit chain, at least one crypto-currency transaction to an address associated with a public key corresponding to the private key, and authenticating, by the computing device, based on the retrieved crypto-currency transaction, the first entity. | 06-09-2016 |
20160171492 | SECURE AUTHORIZATIONS USING INDEPENDENT COMMUNICATIONS AND DIFFERENT ONE-TIME-USE ENCRYPTION KEYS FOR EACH PARTY TO A TRANSACTION | 06-16-2016 |
20160180338 | Network System and Method for Transferring Cryptocurrencies Between a User Account and a Receiving Account | 06-23-2016 |
20160189146 | AUTOMOTIVE OPTICAL COMMUNICATION SYSTEM - Systems and methods for providing optical communication between a vehicle and an external actor include a system provider device that establishes, through communication over a network with at least one vehicle, the at least one vehicle as a communication proxy. Establishing the at least one vehicle as a communication proxy may include pairing the at least one vehicle with a user device. In various embodiments, the system provider also receives a communication trigger. In response to the communication trigger, the system provider may transmit a modulated optical signal via an illumination source of one of the at least one vehicle and an external actor, to the other of the at least one vehicle and the external actor. The system provider detects, at the other of the at least one vehicle and the external actor, the modulated optical signal and demodulates the transmitted optical signal. | 06-30-2016 |
20160189147 | Method And System For Authenticating A User - The invention relates to a method for authenticating a user ( | 06-30-2016 |
20160189148 | PCI-COMPLIANT METHOD FOR EXCHANGING CREDIT CARD INFORMATION IN ONLINE MARKETPLACES - A system and a method are disclosed for conducting a transaction of purchasing goods at online marketplaces including a secure electronic method of credit card information exchange that represents a physical handover of the credit card and return of the credit card. A consumer sends a request to view goods. The system responds with a list of available goods from one or more merchants. The consumer selects an available good and sends a request to purchase it by sending credit card information. The credit card information is encrypted with a public key retrieved from a server, and transmitted to the merchant device. The merchant device decrypts the information using a private key unique to the merchant device. Then credit card information is available at the merchant device for a specific period of time and is destroyed once the time expires or the purchase is marked as complete. | 06-30-2016 |
20160196553 | SYSTEM FOR ELECTRONICALLY TRANSFERRING ASSETS | 07-07-2016 |
20160196554 | Method and Apparatus for Processing Transactions | 07-07-2016 |
20160196556 | FUND TRANSFER | 07-07-2016 |
20160203479 | SYSTEM AND METHOD FOR THE PROTECTION OF CONSUMER FINANCIAL DATA UTILIZING DYNAMIC CONTENT SHREDDING | 07-14-2016 |
20160253656 | MODULATING MOBILE-DEVICE DISPLAYS BASED ON AMBIENT SIGNALS TO REDUCE THE LIKELIHOOD OF FRAUD | 09-01-2016 |
20160253662 | METHOD TO USE A PAYMENT GATEWAY AS CONTEXTUAL ENABLER BETWEEN DIFFERENT PARTIES | 09-01-2016 |
20160253664 | ATTESTATION BY PROXY | 09-01-2016 |
20160379205 | FACILITATING TRANSACTIONS WITH A USER ACCOUNT USING A WIRELESS DEVICE - A wireless device can store account identifiers and facilitate transactions. The wireless device can be loaded with user account identifiers and can be presented to various checkpoint devices. When presented, the wireless device can transmit a selected account identifier to the checkpoint device. In the context of a purchase transaction, the checkpoint device can be a point-of-sale terminal and the account data can be financial account data. In some instances, the wireless device can also facilitate a purchase transaction, e.g., by obtaining information about products to be purchased, constructing a purchase order from the product information, and transmitting the purchase order to a point-of-sale terminal. | 12-29-2016 |
20160379212 | SYSTEM, APPARATUS AND METHOD FOR PERFORMING CRYPTOGRAPHIC OPERATIONS IN A TRUSTED EXECUTION ENVIRONMENT - In one embodiment, an apparatus includes a calculation logic to receive a plurality of wait certificates, each associated with a validated block of transactions of a distributed ledger system, and to generate a local mean value based thereon; a timer generation logic to generate a wait time for a proof of wait associated with a first block of transactions of the distributed ledger system based at least in part on the local mean value; a timer logic to identify when the wait period has expired; and a certificate generation logic to generate a wait certificate for the first block of transactions responsive to expiration of the wait period, the wait certificate to validate the first block of transactions. Other embodiments are described and claimed. | 12-29-2016 |
20160379220 | Multi-Instance Shared Authentication (MISA) Method and System Prior to Data Access - A system and method to backup data on an entity such as a smart wallet by storing the data on a separate entity using intelligently connected personalized authentication. A first entity authenticates with two or more entities prior to data transfer, that are intelligently connected, meaning connected only when functioning to authenticate with other entities to perform the functions of data release, transfer, distribution, backup, and restoration. A primary entity holding sensitive private information (such as a smart wallet) authenticating with a second entity (such as a USB memory device on a PC), and a third entity (such as a cloud based server) before data is released or distributed to another entity. The system and method may personalize the data to the data owner by first requiring authentication of the owner. | 12-29-2016 |
20170236121 | METHOD AND SYSTEM FOR OFFLINE BLOCKCHAIN EXCHANGES | 08-17-2017 |
20180025332 | TRANSACTION FACILITATION | 01-25-2018 |
20180025353 | SYSTEM AND METHOD FOR END-TO-END KEY MANAGEMENT | 01-25-2018 |
20190147438 | DISTRIBUTED TRANSACTION PROPAGATION AND VERIFICATION SYSTEM | 05-16-2019 |
20190147440 | SECURED ACCOUNT PROVISIONING AND PAYMENTS FOR NFC-ENABLED DEVICES | 05-16-2019 |
20190147441 | METHOD AND DEVICE FOR PROVIDING AND OBTAINING GRAPHIC CODE INFORMATION, AND TERMINAL | 05-16-2019 |
20220138707 | METHODS, SYSTEMS, AND DEVICES FOR ON-CHAIN STABLE TRANSACTION IN DECENTRALIZED CRYPTOCURRENCIES - Disclosed herein are methods, systems, and devices for solving the technological problem of stabilization of value for transactions during transfer using volatile digital assets. An on-chain scalable solution of value stabilization with privacy is disclosed in addition to a Confidential Multi-chain with Intermediate Stable Account chain structure used to implement the methods. A method to cryptographically conceal the account balances and transacted amounts and collateral while staying publicly verifiable is also disclosed. A method to verify that a payment transaction with collateral between two accounts through the intermediate Stable account is valid without knowing the balances, transacted amounts, nor collateral is disclosed. A method to determine and store a digital asset price in a ledger is disclosed. A method to claim a payment from another account, so that the second account cannot refuse to pay in case is disclosed. Additional methods, systems, and devices are also disclosed. | 05-05-2022 |
20220138743 | Systems, Methods and Apparatuses for Securely Storing and Providing Payment Information - The systems, methods and apparatuses described herein provide a virtual integrated circuit card (ICC). In one aspect, a method of creating a virtual ICC may be provided. The method may comprise obtaining executable code configured to run on a user device to facilitate financial transactions, preparing a first encryption key usable by the executable code, receiving a second encryption key associated with the user device, forming a virtual ICC comprising the executable code and the first encryption key, and encrypting the virtual ICC with the second encryption key. In another aspect, a virtual ICC may be embodied on a non-transitory computer-readable medium. The virtual ICC may comprise executable code configured to run on a user device to facilitate financial transactions and a first encryption key usable by the executable code. The virtual ICC may be encrypted using a second encryption key associated with the user device. | 05-05-2022 |