Entries |
Document | Title | Date |
20080208759 | PROCESSING OF FINANCIAL TRANSACTIONS USING DEBIT NETWORKS - Methods and systems are disclosed for executing financial transactions between customers and merchants. An identifier of a financial account is received from the customer at a merchant system. A one-time password is also received from the customer at the merchant system, with the customer having been provided with the one-time password by a mobile electronic device or contactless presentation instrument. A cryptogram is generated to included the identifier of the financial account encrypted using the one-time password. An authorization request is formulated at the merchant system. The authorization request includes the cryptogram and transaction information describing at least a portion of the financial transaction. The authorization request is transmitted from the merchant system to an authorization processor for authorization of the financial transaction. | 08-28-2008 |
20090030846 | SYSTEM AND METHOD FOR FACILITATING PAYMENT TO A PARTY NOT HAVING AN ACCOUNT WITH A FINANCIAL INSTITUTION - A system for facilitating payment to a party not having an account with a financial institution, including: a payments facilitator; and at least one account established by the payments facilitator with at least one financial institution. When a payer sends a communication message to the payments facilitator to make a payment to the party, the payments facilitator allocates one of the at least one accounts to the party and links the allocated account with a unique identifier assigned to the party. Payment is thereafter made by the payer to the allocated account. Preferably, the payment is an electronic payment. In a further arrangement of the invention there is a system for facilitating transfer of load between dealers and/or customers of a telecommunications carrier that can include the system already described. | 01-29-2009 |
20090037339 | Methods of authenticating a bank customer desiring to conduct an electronic check deposit transaction - A method is provided of a bank authenticating a bank customer desiring to electronically deposit at least one check. The method comprises receiving a secret password from the bank customer, retrieving information relating to the bank customer, receiving an image of a security document which has been optically scanned by the bank customer, extracting information from the image of the physical security document, and authenticating the bank customer when both the secret password received from the bank customer and the extracted information from the image of the security document match the retrieved information relating to the bank customer. | 02-05-2009 |
20090106159 | PORTABLE ELECTRONIC DEVICE FOR EXCHANGING VALUES AND METHOD OF USING SUCH A DEVICE - The invention concerns a portable electronic transfer device using a near-field wireless communication module and a method of using it. The device includes an element for entering an amount and an acceptance command so that a debitor can enter their personal identification number on their portable device and not on that of a third party. If the acceptance command is authenticated, a secure message containing the amount is sent via the near-field wireless communication module to a creditor. The creditor can then add their references to the message and send it to effect the transaction. Alternatively, the creditor sends their references to the debitor via the near-field wireless communication module and the debitor can formulate a transaction request including the amount and the references of the creditor. | 04-23-2009 |
20090171851 | REGISTERING A BIOMETRIC FOR RADIO FREQUENCY TRANSACTIONS - An authorized sample receiver configured to verify an RF device in response to proffered biometric sample data is disclosed. The authorized sample receiver may be configured to receive data from the RF device and decrypt an encrypted authentication code using a unique device identification code. The RF device is authenticated in response to verifying proffered biometric sample data and the authentication code. | 07-02-2009 |
20090182674 | FACILITATING FINANCIAL TRANSACTIONS WITH A NETWORK DEVICE - Systems and methods provide for communicating with a user device via a network, receiving a first numeric identifier from the user device, associating the first numeric identifier with a user account, and processing a financial transaction requested by the user device. The user device includes a mobile phone, and the first numeric identifier includes a mobile phone number associated with the user device. | 07-16-2009 |
20090182675 | METHOD AND SYSTEM FOR CONDUCTING ELECTRONIC COMMERCE OVER A NETWORK USING A SHADOW CREDIT CARD NUMBER - A method and system are disclosed for conducting electronic commerce over a computer network. A first processor can be configured to receive first data including information of a buyer, and generate second data based on the first data. The first processor sends the second data to the second processor and the second processor processes the second data which causes a product and/or service to be provided to the buyer. The second processor does not receive first data. | 07-16-2009 |
20090187508 | Business method for using a phone to transact financial transactions - A business method for using phones to transact financial transactions in a secured and verified manner. The business method for using phones to transact financial transactions comprises registering the user with a registration system. Having the user initiate a financial transaction over a specific telephone. Verifying if the initiated user financial transaction is legitimate. Lastly, transferring funds in accordance with user instructions previously provided. | 07-23-2009 |
20090259592 | SYSTEM AND METHOD FOR IMPLEMENTING A VIRTUAL AUTOMATED TELLER MACHINE - Method and system for implementing a virtual automated teller machine (“VATM”) system are described. In one embodiment, the system includes a VATM host connectable to each of a plurality of registered disbursement entities (“DEs”) via a secure connection, such as an SSL connection. The system further includes an accessing computer connectable to the VATM host via a secure connection, such as an SSL connection, the accessing computer comprising a card reader for reading user information from an ATM card and having installed thereon VATM client software executable by the accessing computer to interact with the VATM host to validate user information read from the ATM card and an associated PIN entered by a user and, responsive to the validation, present the user with a list of DEs comprising at least one of the registered DEs, prompt the user to select one DE from the list of DEs from which funds are to be disbursed to the user, and specify an amount of funds to be disbursed. The VATM host sends a disbursement order to the selected DE indicating the specified amount of funds to be disbursed. | 10-15-2009 |
20090287608 | MULTIPLE CUSTOMER AND MULTIPLE LOCATION PC SERVICE PROVIDER SYSTEM - The present invention contemplates a system whereby a service provider can service a large number of customers (millions) and connect them to their rented PC from millions of locations around the world. Many customers (10 to 100 thousand) can be connected simultaneously. The service provider is responsible for maintaining the latest PC Hardware and Software configurations available on the market instead of the customer. The rented PC operates in essentially the same manner as if one purchased and maintained their PC at home or office. Access to the individuals rented PC can be obtained from any existing PC, office network computer, a Web TV computer or other customer interface computer which has been authorized by the service provider. The current invention will greatly improve existing Client/Server systems being used to service large global offices. However The greatest improvement, is to make the PC much more convenient and easier for the individual to use in the future and shift the PC hardware and software update burden to the service provider. | 11-19-2009 |
20090307141 | Secure Card Services - Methods and systems are provided to increase the security of a user's information as well as perform secure transactions. More particularly, in one exemplary embodiment, a user inputs information into a database which enables or disables information which may be requested by a third party establishment. In another exemplary embodiment, location based transaction authentication is used. | 12-10-2009 |
20090307142 | TRUSTED SERVICE MANAGER (TSM) ARCHITECTURES AND METHODS - A client device comprises a first secure element and a second secure element. The first secure element comprises a first computer-readable medium having a payment application comprising instructions for causing the client device to initiate a financial transaction. The second secure element comprises a second computer-readable medium having a security key, a payment instrument, stored authentication data and instructions for generating a secure payment information message responsive to the payment application. The secure payment information message comprises the payment instrument and is encrypted in accordance with the security key. | 12-10-2009 |
20100042547 | METHODS AND SYSTEMS FOR MONEY TRANSFER WITH CABLE AND/OR SATELLITE PROVIDERS - The invention provides various systems and methods for providing money transfers executed in connection with cable and/or satellite providers. The method includes presenting an interface to a user on a service provider's signal receiving device. The interface includes money transfer options. The method further includes receiving a money transfer initiation request from the user, and verifying the user's identity. The method then forwards the money transfer initiation request to a money transfer provider, and generates a money transfer control number associated with the money transfer initiation request. Furthermore, the method includes activating the money transfer control number, and transmitting the money transfer control number to a recipient. | 02-18-2010 |
20100057623 | System and Method of Secure Payment Transactions - A system and method for secure payment transactions is provided. The system may include an adaptive payment server including one or more processors configured to receive a first communication including first identification information from a first communication device on a first communication channel. The adaptive payment server may identify a second communication device based on the first identification information and initiate a second communication to the second communication device on a second communication channel, which may be discrete from the first communication channel. The adaptive payment server may receive second identification information from the second communication device on the second communication channel and authenticate the payment transaction using the first identification information and the second identification information. | 03-04-2010 |
20100153276 | METHOD AND SYSTEM FOR ONLINE PAYMENT AND IDENTITY CONFIRMATION WITH SELF-SETTING AUTHENTICATION FOMULA - A system and a method are used for certification when paying online or confirming the user's identity using the communication network. The system mainly includes a certification system ( | 06-17-2010 |
20100161494 | TECHNIQUE FOR PERFORMING FINANCIAL TRANSACTIONS OVER A NETWORK - Embodiments of a system (such as a computer system), a method, and a computer-program product (e.g., software) for use with the computer system are described. These embodiments may be used to perform financial transactions over a network. In particular, the system allows customers to use personal PIN pads when conducting financial transactions (such as debit-card transactions) with multiple merchants and their associated acquirer processors (which assist the merchants in processing financial transactions), even though different groups of merchants and acquirer processors may use different encryption techniques. For a given financial transaction, this capability may be implemented by decrypting financial information associated with a personal PIN pad from a customer and re-encrypting it using a separate encryption technique of a merchant and the associated acquirer processor. | 06-24-2010 |
20100191653 | PORTABLE HANDHELD DEVICE FOR WIRELESS ORDER ENTRY AND REAL TIME PAYMENT AUTHORIZATION AND RELATED METHODS - A portable handheld device for wireless order entry and real time payment authorization may include a portable housing, a display carried by the housing, an order entry input device carried by the housing, a transaction card input device carried by the housing for reading user sensitive information from a transaction card, a wireless transceiver carried by the housing, and a processor carried by the housing and connected to the display, order entry input device, transaction card input device and wireless transceiver. The processor may be for wirelessly sending input order information, and encrypting and wirelessly sending the user sensitive information from the transaction card without storing and without displaying. The processor may also be for wirelessly receiving and displaying payment authorization information based upon real time authorization from a transaction card issuing entity. | 07-29-2010 |
20100274726 | SYSTEM AND METHOD OF CONTACTLESS AUTHORIZATION OF A PAYMENT - The system consists of a POS terminal ( | 10-28-2010 |
20100280957 | SYSTEM, METHOD AND DEVICE FOR ENABLING INTERACTION WITH DYNAMIC SECURITY - A code-generating device is for enabling interaction with dynamic security between a user and a transaction service provider. The code-generating device includes at least one information acquisition device and processing circuitry. In at least one embodiment, the processing circuitry is configured to receive, via the at least one information acquisition device, a transaction-specific code generated by the transaction service provider, evaluate the transaction-specific code, perform, based on the evaluation of the transaction-specific code, a transaction-specific sequence of functions, each involving prompting the user to indicate a respective function-related value, resulting in a sequence of function-related values indicated by the user, and determine a transaction-specific response code based on the sequence of function-related values, thereby enabling secure authentication of the transaction. | 11-04-2010 |
20100293101 | METHOD AND DEVICE FOR GENERATING A SINGLE-USE FINANCIAL ACCOUNT NUMBER - A device for facilitating financial account transactions is described which includes a processing unit including a cryptographic processor. The device also includes an input unit, a display unit and a memory device connected to the processing unit. The memory device contains a private cryptographic key, a first data element and a second data element. The processing unit encrypts the first data element using the private cryptographic key and the second data element, modifies the second data element, combines the encrypted first data element and the second data element to generate a single-use financial account identifier, and displays the single-use financial account identifier. This identifier is then transmitted to a central processor for authorization of the transaction. The central processor extracts and decrypts data elements from the transmitted identifier using the private cryptographic key, compares those data elements with data elements stored in a memory, and verifies the single-use financial account identifier in accordance with the comparison. | 11-18-2010 |
20100325053 | SYSTEM AND METHOD FOR NEW EXECUTION AND MANAGEMENT OF FINANCIAL AND DATA TRANSACTIONS - A system and method for execution of financial and data transactions includes a point-of-sale device configured to execute a transaction in which at least one good or service is sold to an individual having a card with a storage medium encoding a card number. The transaction is completed after said point-of-sale device receives a data transmission authorizing said transaction. The point-of-sale device is configured to communicate via the Internet with a first computing system. The first computing system stores a set of instructions that cause the first computing system to evaluate the transaction to determine whether the transaction is to be authorized, and to send a transmission authorizing the transaction via the open network to said point-of-sale device. | 12-23-2010 |
20110029437 | Information System, Processing Station and Credit Card Payment Method - Disclosed are an information system, processing station and credit card payment method. The system comprises at least one mobile device and an information processing station communicating with the mobile device. The information processing station comprises at least one logistics information server and at least one money flow information server. The logistics information server stores shipping status messages, and the money flow information server receives and stores the shipping status messages output from the logistics information server. After the money flow information server receives at least one trading message from mobile device on an encrypted channel, the trading message is directed on another encrypted channel with at least one encrypting protocol and an authorization message from one of bank servers is received. After the authorization message is encrypted, the authorization message is stored in correspondence with the shipping status messages and a delivery confirmation message is output to the logistics information server. | 02-03-2011 |
20110055086 | SECURE CIRCUIT BOARD ASSEMBLY - A secure circuit board assembly is provided. The secure circuit board assembly comprises: a control board including a cryptographic processor; a spacer portion mounted on the control board; and a lid mounted on the spacer portion. The control board, the spacer portion, and the lid collectively provide a secure enclosed chamber in which the cryptographic processor is mounted. The spacer portion provides protection against side-on attacks against the cryptographic processor. | 03-03-2011 |
20110060690 | ELECTRONIC PAYMENTS IN A MOBILE COMMUNICATION SYSTEM - The present invention relates to electronic payments in a mobile communication system, methods and arrangements for secure transmission using SMS in a mobile communication system. In a method data and a PIN-code are stored in a memory in a mobile terminal. A first bit sequence is created from the data and the PIN-code where different 8-bit combinations represent each character of the data and the PIN-code. Next the first bit sequence is encrypted using a PKI (Public Key Infrastructure) public-key to create a second bit sequence. A sequence of characters is then created from the second bit sequence, where each character in the sequence of characters is represented by an 8-bit combination. The characters are then transposed to 7-bit characters to create a third bit sequence which is transmitted to a server using SMS. The data, PIN-code and first bit sequence are also erased from the memory in the mobile terminal. | 03-10-2011 |
20110071949 | SECURE PIN ENTRY DEVICE FOR MOBILE PHONES - A secure mobile phone-point of sale (POS) system includes a mobile phone integrated with a secure PED module. The secure PED module is integrated with the mobile phone via the phone's serial port or directly to the phone's Printed Circuit Board Assembly (PCBA). The secure PED module conforms to security standards imposed by the payment card industry. The secure mobile phone-POS system has the functionality of both the secure PED and the mobile phone and the look and feel of the mobile phone. | 03-24-2011 |
20110251962 | Transaction method for secure electronic gift cards - Disclosed is a novel method of sending electronic gift cards. The cards enable people when they are in a hurry and they want to do last minute shopping for special occasions, the holidays, including those special events such as anniversaries, birthdays and special event days. The invention allows anyone with a mobile device to send a personalize “gift card” to anyone else who also has a mobile device anywhere. Through secure personal accounts, the consumer may tell the transaction server, about whom to send the gift to, how much, and select the occasion or customized message. The electronic “gift card” can be in one of the alternative forms, such as just text, image, or video message. The delivery of the “gift card” can be scheduled instantly or anytime in the future. It can also be periodic. The delivery of the card is secured and guaranteed as is the redemption and transaction process. The innovation also allows setup of recurring delivery of gifts as well as reminder alerts of upcoming special events or occasions. | 10-13-2011 |
20110295753 | PIN PROTECTION FOR PORTABLE PAYMENT DEVICES - A method and system of encrypting a Personal Identification Number (PIN) using a portable payment device includes a portable payment device in communication with a network and a payment processor, and may be configured to receive a first encryption key from the payment processor, to receive a PIN, to encrypt the PIN using the first key, and to provide the encrypted PIN to the payment processor in a form useable to process a payment authorization message or transaction request. The first key may be protected by cryptographic camouflaging using a password. The password may be received by the device and used to decamouflage the first key, and the decamouflaged first key may be used to encrypt the PIN. In one configuration, the first key may be a symmetric key, such that a PIN encrypted by the first key may be of a standard format usable in existing payment systems. | 12-01-2011 |
20120011070 | Apparatus and Method for Combining Cryptograms for Card Payments - At least a first cryptogram and a second cryptogram are transmitted from a payment device reader component to a terminal component. A message including at least the first cryptogram and the second cryptogram is transmitted from the terminal component to an issuer of a payment device presented to the reader component, through a payment network. A message is obtained from the issuer, corresponding to authentication, by the issuer, of the payment device (and optionally the owner of the payment device) presented to the reader component, based at least on the first cryptogram and the second cryptogram. The payment network is configured in accordance with at least one of (i) a standard, and (ii) a specification, which normally employs only a single cryptogram for the message and the authentication. Apparatuses and computer program products are also disclosed. | 01-12-2012 |
20120116978 | METHOD OF AND SYSTEM FOR SECURELY PROCESSING A TRANSACTION - A method of securely processing a transaction includes storing a plurality of encrypted financial transaction instrument identifiers in a memory wherein there is no decryption key for these stored in the memory and further wherein the encrypted financial transaction instrument identifiers are each associated with a mobile communications device. Receiving at a server a request to process a transaction, the request including an identification of a mobile communications device. Retrieving from the memory the encrypted financial transaction instrument identifier associated with the mobile communications device identified in the request. Transmitting the retrieved encrypted financial transaction instrument identifier to the mobile communications device. Receiving from the mobile communications device transaction data and using the received transaction data to effect a financial transaction. | 05-10-2012 |
20120130904 | UNIVERSAL SECURE REGISTRY - A device is configured to allow a user to select any of a plurality of accounts to employ in a financial transaction. The user device includes a biometric sensor configured to receive a biometric input provided by the user, a user interface configured to receive a user input including secret information known to the user and identifying information concerning an account selected by the user from the plurality of accounts. The user device includes a communication link configured to communicate with a secure registry, and a processor coupled to the biometric sensor to receive information concerning the biometric input, the user interface, and the communication link. The processor is configured to generate a non-predictable value and to generate encrypted authentication information from the non-predictable value, the identifying information, and at least one of the information concerning the biometric input and the secret information, and communicate the authentication information via the communication link to the secure registry. | 05-24-2012 |
20120143771 | METHOD AND SYSTEM FOR SECURING PIN ENTRY ON A MOBILE PAYMENT DEVICE BY DISABLING TONE EMISSIONS - A mobile communication device | 06-07-2012 |
20120239579 | Systems and methods for performing ATM fund transfer using active authentication - A method of performing a fund transfer at an ATM includes receiving an active authentication transaction key at an ATM from a mobile financial transaction instrument via a wireless communication protocol, generating a PIN at the ATM, and storing the PIN in a machine readable storage medium. An authorization request message is transmitted to a financial institution identified by the active authentication transaction key. The authorization request message includes the PIN and at least a portion of the active authentication transaction key. The PIN is received from a user of the mobile financial transaction instrument, and the funds are dispensed in response to receiving the PIN. | 09-20-2012 |
20120303534 | SYSTEM AND METHOD FOR A SECURE TRANSACTION - The present disclosure relates to a system and method for a secure payment. More, specifically the present disclosure relates to an automated method for enhanced security at point-of-sale (POS) terminals, cash machines (ATMs), or other similar electronic transfer devices during financial electronic transactions. The method includes receiving a request for an xPIN by a mobile device via a mobile gateway, sending the xPIN via the mobile gateway to the mobile device, receiving a transaction request at a transaction means for authorization and an xPIN verification request an interface, verifying the xPIN via the mobile gateway; and authorizing the transaction via the interface. | 11-29-2012 |
20130041831 | SECURE AND SHAREABLE PAYMENT SYSTEM USING TRUSTED PERSONAL DEVICE - The invention relates to a system and method of making a financial transaction using a Trusted Personal Device. More particularly, the invention relates to a highly secure and less cumbersome payment platform for making a financial transaction using a trusted personal device, that too without any requirement of any formal means of communication between the customer and the merchant. The system and method is devised to obviate the problems of frauds relating to electronic cards like credit card, debit card, recharge cards, loyalty cards, other chip based cards, traveller's cheques etc. | 02-14-2013 |
20130097087 | PORTABLE HANDHELD DEVICE FOR WIRELESS ORDER ENTRY AND REAL TIME PAYMENT AUTHORIZATION AND RELATED METHODS - A portable handheld device for wireless order entry and real time payment authorization may include a portable housing, a display carried by the housing, an order entry input device carried by the housing, a transaction card input device carried by the housing for reading user sensitive information from a transaction card, a wireless transceiver carried by the housing, and a processor carried by the housing and connected to the display, order entry input device, transaction card input device and wireless transceiver. The processor may be for wirelessly sending input order information, and encrypting and wirelessly sending the user sensitive information from the transaction card without storing and without displaying. The processor may also be for wirelessly receiving and displaying payment authorization information based upon real time authorization from a transaction card issuing entity. | 04-18-2013 |
20130124423 | ONLINE PAYMENT USING AN NFC ENABLED DEVICE - A method and system for conducting an online payment transaction through a point of sale device. The method includes receiving input from a user selecting an item for purchase through the point of sale device; calculating a total purchase amount for the item in response to a request from the user to purchase the item; and sending payment authorization for the total purchase amount from the point of sale device to a payment entity, in which the payment authorization is sent to the payment entity via a mobile communication device of the user. The method further includes receiving a result of the payment authorization from the payment entity through the mobile communication device; and completing the payment transaction based on the result of the payment authorization. | 05-16-2013 |
20130144793 | Systems and Methods for Providing NFC Secure Application Support in Battery On and Battery Off Modes - Systems and methods for providing secure application support for NFC devices in both battery on and battery off modes are provided. A first application that requires available host battery supply and a second application that does not require available host battery supply are loaded onto a mobile device. When the second application is enabled, the reader requests user input on a POS device. The first application is enabled when host battery supply is available, and the second application is enabled when no host battery supply is available. | 06-06-2013 |
20130151418 | AUTHORIZATION OF CASH DELIVERY - A computer-based method includes receiving, at a computer-based authorization system, a request to authorize payment to a first party at an electronic payment device from an account with funds that have been paid by a second party. The request includes an encrypted indication of an account number that corresponds to the account and a cash card number entered by the first party at the electronic payment device. The method further includes deriving an unencrypted version of the account number from the encrypted indication; comparing the unencrypted version of the account number to one or more identification codes in an electronic database, where one of the identification codes corresponds to the account; and authorizing payment from the account at the payment device based, at least in part, on whether the comparing yields a match between the unencrypted version of the account number and the identification code that corresponds to the account. | 06-13-2013 |
20130159196 | Secure PIN Verification for Mobile Payment Systems - Methods and systems are provided for secure electronic payment for merchandise at a point of sale. The secure verification of a personal identification number (PIN) via a mobile payment system is facilitated. A memory stores account information for a plurality of users, the account information includes a personal identification number (PIN) for at least some of the users. A processor receives a communication including an indication of a desire of a user to purchase an item from a merchant. The processor accesses an account of the user and provides a random keypad to the merchant. The user uses the random keypad to enter the PIN. The processor receives touch screen information from a mobile device of the user and makes a reconstructed PIN from the random keypad and the touch screen information. The processor authorizes the purchase if the reconstructed PIN is the PIN of the user. | 06-20-2013 |
20130218779 | DUAL FACTOR DIGITAL CERTIFICATE SECURITY ALGORITHMS - Technologies are generally described for security algorithm methods in authorizing and using digital certificates to perform banking transactions. A customer can register and associate a personal identification number with a digital certificate. The personal identification number can be used by a client device to generate a certificate request. A request to perform a banking transaction along with a certificate request can be sent to a bank server, where, upon authorization of a valid certificate request, the banking operation can be performed. Using the digital certificate as one authentication factor and a customer login and password as a second authentication factor, banking transactions can be performed more reliably and securely. | 08-22-2013 |
20140019366 | METHOD AND A SYSTEM FOR SECURING FINANCIAL TRANSACTION - The present disclosure is related to a method for securing financial transaction. The method includes encrypting transaction information on a server | 01-16-2014 |
20140074725 | FINANCIAL TRANSACTIONS WITH A VARYING PIN - The present invention provides a financial transaction facilitating device for facilitating a financial transaction at an ATM, point of sale station, via the Internet or to login to a financial account by generating a PIN in response to a correct biometric identifier being supplied. Also provided are a financial transaction processing facility, a method of facilitating a financial transaction and a method of processing a financial transaction. | 03-13-2014 |
20140081874 | AUTOMATED TELLER MACHINE WITH AN ENCRYPTING CARD READER AND AN ENCRYPTING PIN PAD - A banking system operates responsive to data read from data bearing records. The system includes an automated banking machine comprising a card reader. The card reader includes a movable read head that can read card data along a magnetic stripe of a card that was inserted long-edge first. The card reader includes a card entry gate. The gate is opened for a card that is determined to be properly oriented for data reading. The card reader can encrypt card data, including account data. The machine also includes a PIN keypad. The card reader can send encrypted card data to the keypad. The keypad can decipher the encrypted card data. The keypad can encrypt both deciphered card data and a received user PIN. The card data and the PIN are usable by the machine to authorize a user to carry out a financial transfer involving the account. | 03-20-2014 |
20140089205 | System and Method of Processing PIN-Based Payment Transactions Via Mobile Devices - A system and method for using a Personal Identification Number (“PIN”) to authenticate payment transactions via a mobile device coupled to a reader device is described. The reader device may be modified to not only read and encrypt first identification information from a payment medium such as a magnetic strip of a payment card, but also receive a PIN from the mobile device and encrypt the PIN. The mobile device may be configured to prompt for and receive the PIN. The PIN may be communicated to the reader device for encryption. The mobile device may receive the encrypted first identification information and encrypted PIN and communicate the encrypted data to an adaptive payment server that decrypts the encrypted data for processing the payment transaction. The system may be used to securely process PIN-based payment transactions using a mobile device that is communicably coupled to a reader device. | 03-27-2014 |
20140156535 | SYSTEM AND METHOD FOR REQUESTING AND PROCESSING PIN DATA USING A DIGIT SUBSET FOR SUBSEQUENT PIN AUTHENTICATION - A system and method for authenticating a personal identification number (PIN) associated with a payment card of a cardholder, the PIN being a code having a sequence of digits, the method comprising the steps of: presenting a PIN entry request including identifying a digit subset of the code, such that the digits in the digit subset is at least one digit less than the digits of the code; receiving the digit subset in response to the PIN entry request; sending an authentication request based on the digit subset; receiving an authentication response including response data; and presenting a response to the cardholder based on the response data, the response including information representative of whether the PIN was successfully authenticated or not using the digit subset. | 06-05-2014 |
20140188737 | AUTOMATED MONEY ALLOCATION SYSTEM AND METHOD - Disclosed is a method and system for controlling allocation and transfer of funds among multiple recipients. The method includes receiving registration information from a user, storing the registration information, assigning to the user a primary account, and multiple sub-accounts linked to the primary account in a waterfall hierarchy, receiving recipient account information to be linked to the sub-accounts, receiving a set of selectively repeating predefined rules corresponding to the sub-accounts. The rules include a funds allocation rule for allocating a portion of funds deposited in the primary account into the sub-accounts, and determining if allocated funds in the sub-accounts has hit the allocated target, a payment transfer rule for transferring the allocated target funds in the sub-accounts to the recipient account, and an authentication verification rule for verifying authentication of the user for updating the rules corresponding to the sub-accounts. | 07-03-2014 |
20140195441 | SECURITY ASPECTS OF A SELF-AUTHENTICATING CREDIT CARD - A self-authenticating credit card includes an input device for entering a PIN. The PIN is accepted by a micro-controller that uses the entered PIN as an encryption key for decrypting stored account information. A portion of the account information includes data, that when decrypted, contains an image that is rendered on an integral display, with account information sent to a transaction terminal. A timer is used to limit access to account data while in the unlocked state. | 07-10-2014 |
20140201086 | METHOD AND SYSTEM FOR REVERSED NEAR FIELD CONTACT ELECTRONIC TRANSACTION - A system and method for conducting payment transaction using a mobile device equipped with a NFC interrogator, comprising: creating a payer user account in a server and associating a payer mobile device with the payer user account; registering, by the server, a payee NFC identity tag; recording, by the server, a payment transaction and associating the payment transaction record to the payee NFC identity tag; interrogating the payee NFC identity tag by the payer mobile device; transmitting the acquired identifier of the payee NFC identity tag to the server; matching the received identifier to the associated payment transaction record; retrieving and sending to the payer mobile device the matched associated payment transaction information; displaying the payment transaction information in the payer mobile device for user confirmation; transmitting the confirmed information and the payer mobile device identification data to the server to complete the payment transaction. | 07-17-2014 |
20140201087 | TOUCH SCREEN HAVING INTEGRATED EPP, AND INPUT INFORMATION PROCESSING METHOD FOR AUTOMATED TELLER MACHINE USING SAME - The present invention relates to a touch screen having an integrated EPP and an input information processing method for an automated teller machine using the same, and more particularly, to a touch screen provided as user interface in an automated teller machine, wherein the touch screen and an EPP module are formed integrally such that a screen displayed on the touch screen is configured to be controlled by a security CPU of the EPP module integrated with the touch screen when a customer using the automated teller machine inputs information required to be encrypted, such as a password required for a financial transaction, through the touch screen of the automated teller machine during the financial transaction, thereby initially preventing the leakage of important financial information through the illegal hacking of the CPU of the automated teller machine and the like. | 07-17-2014 |
20140207687 | SECURE PAYMENT AND BILLING METHOD USING MOBILE PHONE NUMBER OR ACCOUNT - A system, method and computer program product for processing payments for goods or services, including a payment processor that receives a payment request from a merchant for goods or services and that includes a mobile phone number or mobile phone account of a user, sends a payment authorization request text message to the mobile phone requesting payment authorization, and receives a payment authorization text message from the mobile phone authorizing or not authorizing the payment. If the payment is authorized, the payment processor pays the merchant and charges the mobile phone account for the payment. If the payment is not authorized or if the payment is not received within a predetermined period of time, the payment processor declines to pay the merchant for the goods or services. | 07-24-2014 |
20140207688 | SECURE PAYMENT AND BILLING METHOD USING MOBILE PHONE NUMBER OR ACCOUNT - A system, method and computer program product for processing payments for goods or services, including a payment processor that receives a payment request from a merchant for goods or services and that includes a mobile phone number or mobile phone account of a user, sends a payment authorization request text message to the mobile phone requesting payment authorization, and receives a payment authorization text message from the mobile phone authorizing or not authorizing the payment. If the payment is authorized, the payment processor pays the merchant and charges the mobile phone account for the payment. If the payment is not authorized or if the payment is not received within a predetermined period of time, the payment processor declines to pay the merchant for the goods or services. | 07-24-2014 |
20140222689 | SECURE AND EFFICIENT PAYMENT PROCESSING SYSTEM - A method of processing commercial transactions carried out over the Internet ( | 08-07-2014 |
20140236840 | Payepos Card or Payepos Top Up Card - Payepos Card or Payepos Top Up Card is a card to send and receive money is a most robust way to curb payments fraud. This is a magnetic swipe card with 16 or more digit card number, barcode, PIN OR SECURITY CODE etc. User can pay in cash or use their bank debit or credit card at POS to top up their account to pay websites, shopping, businesses and individuals. Similarly they can receive money from other Payepos account users, websites, businesses and individuals straight through POS. Furthermore trusted bank or building societies and companies are able to transfer money to Payepos from their existing arrangements. User is able to transfer balance to their bank account. www.payepos.com and any form of future developments, processes, charges, web shopping cart, tools, devices; software and hardware interfaces are integral content of Payepos Card and or Payepos Top Up Card. | 08-21-2014 |
20140236841 | SYSTEM AND A METHOD FOR RECEIVING AND DISBURSING DONATION - A system for facilitating the transaction of donation funds is disclosed. The system allows for the collection and disbursement of recurring donations. The system comprises a plurality of donors ( | 08-21-2014 |
20140250018 | DUAL/MULTIPLE PIN PAYMENT ACCOUNT - The present invention relates to a method of authorising a transaction process, whereby a communication between a payment device and a payment processing network is established. Subsequently a transaction is initialised at the payment device, the input of a first User Identification Metric (UIM) is requested, the input of a second UIM is requested, the first and second UIMs are verified and the transaction process proceeds if both UIMs are verified. | 09-04-2014 |
20140279564 | ANONYMOUS TEXT AND PAYMENT SYSTEM - Methods, systems, apparatus, and computer program products are provided for facilitating anonymous texts and payments between a buyer and a seller. In one embodiment, a method is provided comprising (a) receiving input indicating a user selection of an item associated with a seller and a price that a user is interested in buying; (b) receiving a first text message from the user comprising a buy command; (c) providing a prompt to the user to provide a passcode via a second text message; (d) receiving a third text message from the user comprising a passcode; and (e) facilitating payment by the user to the seller of an amount based at least in part on the price associated with the item. | 09-18-2014 |
20140279565 | SYSTEM FOR SECURE AUTOMOTIVE IN-VEHICLE WIRELESS PAYMENTS - A system and method for providing a touch sensor disposed in a vehicle, wherein the touch sensor may be a portable device that is removable from the vehicle such as a tablet computer or it may be a built-in device, wherein the touch sensor may store account information in a secure element in order to make a secure payment by wirelessly communicating with a merchant terminal from within the vehicle in order to make a financial transaction without giving a physical credit or debit card to the merchant. | 09-18-2014 |
20140289131 | Messaging Protocol for Secure Communication - An illustrative method, system, and device for communicating a message over a network between a trusted service manager and a mobile device having a security element includes the steps of: providing a message having a header field and a message field; providing a number in the header field that is unique to the mobile device; providing a message in the message field, the message coming from the mobile device if communicated from the mobile device to a trusted service manager and coming from the trusted service manager if communicated from the trusted service manager to the mobile device; and providing a messaging protocol that enables the network to distinguish between a message having the unique mobile device number in the header field and a message that is without the unique mobile device number in the header field. | 09-25-2014 |
20140289132 | FLEXIBLE QUASI OUT OF BAND AUTHENTICATION ARCHITECTURE - To obtain user approval of network transactions at different levels of security, a network site selects a form in which a transaction with be presented to the user from a group of transaction presentation forms including presentation of the transaction in a browser pop-up window on a user network device, in a security software application window on the user network device, and in a security application window on another user network device. The network site also selects a type of approval of the transaction required from the user from a group of transaction approval types including approval requiring no action by the user after presentation of the transaction, the user to actively approve the presented transaction, and the user to sign the presented transaction. The transaction, the selected transaction presentation form, and the selected type of user transaction approval, are transmitted to obtain approval of the transaction by the user. | 09-25-2014 |
20140289133 | MULTIMODE RETAIL SYSTEM - A multimode system for receiving data in a retail environment includes: a secure input module for receiving high security input and low security input from a customer, the high security input to be communicated by the secure input module in cipher text, and the low security input to be communicated by the secure input module in plaintext. The multimode system is adapted to operate in a high security mode and a low security mode. The multimode system is adapted to enter the low security mode upon detection by the multimode system of a security breach condition. In the high security mode, the secure input module accepts low security input and high security input. In the low security mode, the secure input module accepts the low security input and does not accept the high security input. | 09-25-2014 |
20140297541 | ID Authentication - A secure ID authentication system for authenticating over the Internet network a response from a user module such as an Internet-enabled mobile phone or a computer to a request from an application-programming interface (API) to authenticate a transaction, in which; a PIN request is sent to the user module which displays an “enter pin” prompt; the user module encodes a message comprising its user ID and the PIN using a first code and transmits the thus encoded message to an identity application server (IAS) which has a database of user IDs and associated PINs; the IAS encodes the received message using a second code and transmits the thus twice encoded message back to the user module; the user module part decodes the now twice encoded message by reversing the first code and transmits the part decoded message back to the IAS: the IAS fully decodes the message by reversing the second code; the IAS checks the fully decoded message against the database to confirm or otherwise that it holds the combination user ID and PIN; and if it is confirmed, the ISA sends a “PIN authenticated” message to the API. | 10-02-2014 |
20140316993 | MOBILE TERMINAL, TRANSACTION TERMINAL, AND METHOD FOR CARRYING OUT A TRANSACTION AT A TRANSACTION TERMINAL BY MEANS OF A MOBILE TERMINAL - The invention relates to a method for carrying out a transaction at a transaction terminal ( | 10-23-2014 |
20140324708 | RAW SENSOR INPUT ENCRYPTION FOR PASSCODE ENTRY SECURITY - A method of encrypting sensor input entries for passcode entry security is disclosed. The method in one embodiment includes presenting a passcode entry interface on an electronic device for a user to input a passcode entry. The electronic device then receives an input event, which is indicative of at least part of the passcode entry by the user, from a sensor of the electronic device. The electronic device then encrypts a sensor value of the input event and transmits the encrypted sensor value to an external system over a network to cause the external system to decipher the passcode entry from the encrypted sensor value. | 10-30-2014 |
20140330729 | PAYMENT PROCESSING USING BIOMETRIC IDENTIFICATION - Facial recognition is used to associate, organize, identify, select, execute, and transfer payment, data files, and personal information to and from a user's profile in the cloud through a C2C and B2C network. The information—financial, professional, and personal—is securely delivered to a POS system, to a credit-card company/acquirer, to a cloud database, to a checkout tablet, and/or to a consumer-owned and operated smartphone device or tablet. | 11-06-2014 |
20140344166 | SYSTEM AND METHOD FOR MOBILE PIN SYNCHRONIZATION - The present invention relates to a method and system for synchronising a personal identification number (PIN) value stored in a mobile computing device, with a PIN value stored on a remote server. | 11-20-2014 |
20140372320 | SYSTEMS AND METHODS FOR EMV CHIP AND PIN PAYMENTS - In transactions between a consumer and a merchant (or other third party) using services of a payment provider (e.g., credit card company, or financial services provider), methods and systems are provided for enabling any third party to accept chip and PIN payment and payment provider services using a payment provider device that is enabled using the third party's own application (referred to herein as “app”) and not the app of the payment provider. Enabling a merchant to accept chip and PIN payments usually requires the merchant to certify (accredit) their application (e.g., a point-of-sale (POS) system) end to end with the payment providers (e.g., Visa, MasterCard). A software development kit (SDK) modification to the application allows the merchant to accept chip and PIN cards the without the need to certify the application. The SDK includes the functionality that needs to be certified, and certifies it once with a service provider. | 12-18-2014 |
20140372321 | SECURE AUTHENTICATION BETWEEN MULTIPLE PARTIES - Systems and methods are disclosed herein to allow a party to a multiple-party transaction to perform authentications using identification information received from another party while allowing the party generating the identification information to maintain confidentiality of information. A user may enter an access code to identify the user to a first party that will be generating identification information to a second party in the transaction. The access code may be entered without requiring the entry of an alphanumeric PIN (Personal Identification Number). The first party may convert the access code to a second code for transmission to the second party so that the access code is not revealed to the second party. The second party may use the second code to authenticate the user, to authenticate a payment transaction or other types of communications from the user or the first party. Thus, parties in a multiple-party transaction may perform authentications while maintaining the confidentiality of information. | 12-18-2014 |
20150032635 | SYSTEM AND METHOD FOR EXCHANGING DATA WITH SMART CARDS - A system that includes an issuer system that receives, via a network, registration information from a mobile device, wherein the issuer system is associated with a financial institution that issues a smart card to a user and wherein the registration information includes an identifier of the mobile device, and a mobile device application associated with the issuer system, that when executed on a mobile device, communicates with the issuer system to validate the mobile device as a trusted device and enables the trusted device to communicate with the smart card and enable smart card management features mobile device application. | 01-29-2015 |
20150046340 | VARIABLE AUTHENTICATION PROCESS AND SYSTEM - Efficient methods and systems for verifying personal identifiers in transactions such as financial transactions are disclosed. In an exemplary method, an authentication server computer may provide an account number and a personal identifier such as a PIN to a payment processing network server computer. The payment processing network server computer may then determine which of a plurality of authentication processes to initiate. | 02-12-2015 |
20150066779 | COMMUNICATION SYSTEM, A METHOD AND A DEVICE FOR REAL TIME MANAGEMENT, DATA ANALYSIS, TRACKING AND GEOGRAPHIC LOCATION OF BUSINESS DEALS - Disclosed is a communication system, a method and a device for real time management, data analysis and geographic location of business deals. In one implementation, a system ( | 03-05-2015 |
20150073997 | SECURING A TRANSACTION BETWEEN A TRANSPONDER AND A READER - A transponder-reader payment system includes a fob including a transponder, and a RFID reader for interrogating the transponder. The system may further include a personalization system for populating onto the fob and RFID reader identifying information and security and authentication keys which may be used during mutual authentication of the fob and the reader and for completing a transaction. In exemplary operation, the fob and RFID reader may be personalized, the fob may be presented to the RFID reader for interrogation, the fob and reader may engage in mutual authentication, and fob identifying information may be provided to the reader for transaction completion. In another exemplary embodiment, operation of the transponder-reader payment system may be controlled by an activation circuit. Further, the fob may be responsive to multiple interrogation signals. | 03-12-2015 |
20150088760 | AUTOMATIC INJECTION OF SECURITY CONFIRMATION - Technology is described to monitor incoming channels or messages for a security confirmation code, capture a received confirmation code, recognize a designated field or other destination opportunity to enter a security confirmation code, and automatically inject the captured code to the recognized destination. Various other aspects of the technology are described herein. | 03-26-2015 |
20150095239 | CARD ACCOUNT IDENTIFIERS ASSOCIATED WITH CONDITIONS FOR TEMPORARY USE - Systems, methods and computer-readable media are disclosed for providing a cardholder with a card account identifier for temporary use in emergency situations in which an existing card account identifier has potentially been compromised, as a result of theft or loss of a transaction card or other potential misappropriation of the existing identifier, or situations in which the existing identifier is otherwise unavailable for use. The card account identifier for temporary use may be associated with conditions that restrict the manner and scope according to which the identifier may be used to gain access to funds. | 04-02-2015 |
20150095240 | CARD ACCOUNT IDENTIFIERS ASSOCIATED WITH CONDITIONS FOR TEMPORARY USE - Systems, methods and computer-readable media are disclosed for providing a cardholder with a card account identifier for temporary use in emergency situations in which an existing card account identifier has potentially been compromised, as a result of theft or loss of a transaction card or other potential misappropriation of the existing identifier, or situations in which the existing identifier is otherwise unavailable for use. The card account identifier for temporary use may be associated with conditions that restrict the manner and scope according to which the identifier may be used to gain access to funds. | 04-02-2015 |
20150095241 | SCRAMBLING PASSCODE ENTRY INTERFACE - A method of secured passcode entry is disclosed. The method, in one embodiment, includes: receiving a request to authenticate a user; in response to receiving the request, generating a passcode entry interface that includes a plurality of buttons for the user to compose a passcode entry, each button representing a character of a set of characters, the set of characters having a natural sequence, wherein said generating includes displaying the buttons on a touchscreen of the electronic device in an arrangement that does not reflect the natural sequence of the set of characters; detecting a touch event, represented as a coordinate on the touchscreen, interacting with the touchscreen while the passcode entry interface is displayed, wherein the touch event is indicative of at least a portion of a passcode entry by the user; and verifying an authenticity of the passcode entry based at least partly on the touch event. | 04-02-2015 |
20150100498 | SECURE PASSCODE ENTRY USER INTERFACE - A method for secure passcode entry is disclosed. The method, in one embodiment, includes: receiving a request for authenticating a user; in response to the request, generating a passcode entry interface including buttons corresponding to character options for composing a passcode entry, wherein the passcode entry interface is used to receive the passcode entry to authenticate a user of the payment card; identifying, on a touchscreen of the electronic device, a traffic region that experienced touch events prior to receiving the request; and displaying the passcode entry interface on the touchscreen such that at least a portion of the passcode entry interface is positioned in the traffic region. | 04-09-2015 |
20150106274 | CREDIT CARD SECURITY ENHANCEMENTS FOR AUTHORIZING A CREDIT CARD TRANSACTION - A method, non-transitory computer readable medium, and apparatus for authorizing a credit card transaction are disclosed. For example, the method receives a request to validate a transaction with a vendor using a credit card account, sends a request to an owner of the credit card account for a personal identification number (PIN) associated with the credit card account, wherein the PIN comprises one or more parameters, receives the PIN, determines that the PIN matches one of one or more PINs that were generated and associated with the credit card account and that each one of the one or more parameters associated with the PIN is met by the transaction and authorizes the transaction with the vendor using the credit card account. | 04-16-2015 |
20150106275 | SYSTEMS AND METHODS FOR PERFORMING ATM FUND TRANSFER USING ACTIVE AUTHENTICATION - A method of performing a fund transfer at an ATM includes receiving an active authentication transaction key at an ATM from a mobile financial transaction instrument via a wireless communication protocol, generating a PIN at the ATM, and storing the PIN in a machine readable storage medium. An authorization request message is transmitted to a financial institution identified by the active authentication transaction key. The authorization request message includes the PIN and at least a portion of the active authentication transaction key. The PIN is received from a user of the mobile financial transaction instrument, and the funds are dispensed in response to receiving the PIN. | 04-16-2015 |
20150112872 | SYSTEM AND METHOD FOR GUIDED PASSCODE ENTRY - Systems and methods are provided for facilitating guided entry of a passcode. The exemplary guided passcode entry system provides additional security to traditional secret PIN or passcode entry systems by generating a randomized input sequence (order of entry) and prompting the user to input the passcode according to the randomized input sequence. The system also causes a test of the user's input data against a database of passcodes associated with the particular user for an exact match. The testing step can include comparing the characters of the input data to a particular passcode associated with the user which is stored in a database in accordance with the randomized input sequence in regard to the order that the input data was received. Based on the comparison of the received pin to the stored pin, the system can advance the transaction with the user. | 04-23-2015 |
20150120571 | Method for Carrying Out Smart Transactions - The present invention describes a method for carrying out smart transactions involving the use of a variable PIN. In this process the variable PIN is a set of numbers and letters that are modified through every transaction based on specific information of the person that is making the transaction. As the person prepares to make a transaction over the internet, at a bank teller, at a store, with a check or any other type of monetary transaction, the user or this invention will calculate their variable PIN by using certain information known only by the account owner such as home address, company address, home phone number, social security number, other types of personal information & transaction information like the check number, the time, amount to be paid, date of issue, expiration of the credit card or even use mathematical constants such as Pi (3.1416). All of this information will be assembled together to create a certain formula which produces a variable PIN that only the costumer and verification entity will know. As a result of the before mentioned concepts, the objective of our invention is to create a smart variable PIN that is continuously modified with each transaction that is executed giving the customer added security when making a transaction. | 04-30-2015 |
20150127553 | INTELLIGENT PAYMENT CARD AND A METHOD FOR PERFORMING SECURE TRANSACTIONS USING THE PAYMENT CARD - An intelligent payment card and a method for performing a financial transaction using the payment card are disclosed. The payment card includes inter-alia a biometric sensor, an input module, and a display screen. The payment card is activated when a primary user successfully authenticates himself by the way of providing valid finger print(s) to the biometric sensor of the payment card. The payment card is removably embedded with criteria that dictate at least a maximum transaction amount, maximum number of transactions to be performed on the card and maximum threshold time for completing a transaction. The payment card also includes a processor unit which compares the authorization code input by the user with a unique identification number stored within the payment card, and upon successful authentication enables the user to perform desired financial transaction and also ensures that the removably embedded criteria are not violated during the financial transaction. | 05-07-2015 |
20150127554 | MERCHANT MANAGED METHOD AND SYSTEM FOR TEXT-TO-PAY SUBSCRIPTIONS AT A SUBSCRIPTION SERVER - A subscription identifier is communicated between the billing server and subscription server. The billing server receives a subscription identifier text message from the user device. The billing server identifies a carrier server from the subscription identifier text message. The billing server receives an authorization text message from the user device in response to an authorization request text message and charges an account of the carrier server that has been identified. If the charge has been successful, then the billing server transmits a renewal notification text message to the subscription server. The subscription server updates an account having the subscription identifier to reflect a new expiration. | 05-07-2015 |
20150127555 | ELECTRONIC PAYMENT ANTI-FRAUDULENT SYSTEM THROUGH REAL-TIME PHONE BASED VERIFICATION CODE - The Electronic Payment Anti-Fraudulent System through Real-Time Phone based Verification Code is introduced to provide a method or a mechanism to secure the online payments and transactions for both registered online buyers and electronic merchants; this is mainly performed through 2 major sub methods:
| 05-07-2015 |
20150134539 | SYSTEM AND METHOD OF PROCESSING POINT-OF-SALE PAYMENT TRANSACTIONS VIA MOBILE DEVICES - A system and method for processing POS payment transactions via mobile devices is described. Encrypted first identification information is received from a merchant mobile device. Encrypted second identification information is received from a cardholder mobile device. A determination is made regarding whether the encrypted first identification information and the encrypted second identification information are associated with one another. In response to a determination that the determination that the encrypted first identification information and the encrypted second identification information are associated with one another, the encrypted first identification information and the encrypted second identification information are decrypted. The POS payment transaction is processed based on the decrypted first and second identification information. | 05-14-2015 |
20150134540 | SYSTEMS AND METHODS FOR FACILITATING A TRANSACTION USING A VIRTUAL CARD ON A MOBILE DEVICE - Systems and methods are provided for facilitating contactless payment using cloud-based wallet containing payment credentials (e.g. Visa, Mastercard, American Express) using a near field communication (NFC)-capable device and payment gateway servers. A user can use their existing payment card, herein referred to as a funding card, for contactless payments. A second payment card, herein referred to as a virtual card, is generated. The virtual card is associated with the funding card on a payment gateway server. The virtual card is used on a NFC-enabled mobile device. When a payment is initiated, the virtual card data is sent through the NFC system from a point of sale terminal. This information is sent to the payment gateway server, which retrieves the funding card to make the payment. The funding card, not the virtual card, is used to transfer the money to make payment. | 05-14-2015 |
20150134541 | CHIP-AND-PIN READER DEVICE AND COMMERCIAL TRANSACTION SYSTEM INCLUDING SAME - The invention provides a chip-and-PIN reader device, which includes a slot for a chip card and a plurality of keys including numeric keys 0-9 and possibly an enter key and a restart key. The enter key is used to indicate to the device that the PIN has been fully entered and the restart key is used to indicate to the device that a mistake has been made in entering the PIN and that the PIN is to be re-entered. A set of electrodes is provided for making contact with corresponding electrodes on the chip card. A reading means connected to the set of electrodes reads the entered PIN and the card-number data stored on the chip. A comparing means compares the PIN entered by the user with the PIN stored on the chip and provides a signal indicative of a wrong entered PIN. A restart means is provided, which allows the PIN to be re-entered. If the correct PIN is entered, then an encryption means encrypts the card-number data and a wireless transmitter transmits the encrypted card-number data to a mobile communications device. The reader device may also be equipped to read a magnetic-strip type card. | 05-14-2015 |
20150134542 | TECHNIQUES FOR PROCESSING PIN-INCLUSIVE TRANSACTIONS IN CONNECTION WITH AN ELECTRONIC DEVICE - Certain exemplary embodiments relate to techniques for processing PIN-inclusive transactions in connection with an electronic device or terminal, e.g., where PIN code encryption keys are not necessarily stored on the electronic device or terminal, and/or where payment instrument data is maintained in a separate system from PIN code data at least until certain elements are combined in a highly secure system for submission to an electronic funds transfer network. One or more separate or physically separated systems may be used in this regard, e.g., taking advantage of more prevalent computer networks such as the Internet. Similarly, the ability to provide less expensive terminals or electronic devices at a point-of-sale, point-of-purchase, etc., may be advantageous. The interchange rate is not necessarily driven up in certain example instances. | 05-14-2015 |
20150294295 | Integrated RFID Capable Communication Device - Various switchable RFID devices are disclosed. These switchable RFID devices may include one or more RFID tags and one or more switches. Some of these one or more switches are optionally wireless. In various embodiments, the switchable RFID devices include cellular phones, security devices, identity devices, financial devices, remote controls, and the like. In some embodiments, switches are configured to enter data into a switchable RFID device, for example to select a financial account. | 10-15-2015 |
20150294301 | METHOD FOR PURCHASING A PRODUCT USING A PORTABLE COMMUNICATION DEVICE - Method for purchasing a product using a portable communication device ( | 10-15-2015 |
20150302389 | SYSTEM AND METHOD FOR MOBILE PAYMENTS - A system and method for distributing incentives via mobile devices is described. One embodiment, a computer-server-based method, receives a request from a merchant to generate an incentive which incentive is funded and initiated by the merchant, receives the incentive, associates the incentive with a recipient's phone number, and transmits a notification of the incentive to a mobile device associated with the recipient's phone number, the computer server acting as a server-side wallet for the incentive, the incentive being usable, through interaction with the computer server, by the recipient for the purchase of goods or services from the merchant associated with the incentive. | 10-22-2015 |
20150302391 | METHOD FOR MAKING A PAYMENT USING A PORTABLE COMMUNICATION DEVICE - Method for making a payment using a portable communication device ( | 10-22-2015 |
20150302411 | PROXIMITY TO A LOCATION AS A FORM OF AUTHENTICATION - Disclosed is a system and associated method of authenticating a transaction based at least partially on the location of a mobile device. The system typically includes a processor, a memory, and a transaction authentication module stored in the memory. The module is typically configured for: receiving a request from a user to complete a transaction; receiving geographic location information for a point-of-transaction associated with the transaction; receiving geographic location information for the mobile device associated with the user; determining whether the geographic location of the point-of-transaction is geographically proximate to the geographic location of the mobile device; and based at least partially on the geographic location of the point-of-transaction being geographically proximate to the geographic location of the mobile device, enabling the user to complete the transaction. | 10-22-2015 |
20150310419 | CARDLESS POINT-OF-SALE PAYMENT METHOD - A cardless point-of-sale payment method capable of completing patient transactions when a connection to a wireless network is not available is provided, including verifying a personal identification number (PIN) provided to an application installed on a registered mobile internet device, retrieving a backup authorization token from a memory of the registered mobile internet device, displaying the backup authorization token on the registered mobile internet device for entry to a point-of-sale device, providing sale transaction information to a purchase authorization processing company (APC) via a transmission between the point-of-sale device and the APC wherein the sale transaction information includes the backup authorization token and a sale transaction value, verifying the backup authorization token, verifying the sale transaction value against an approved transaction value associated with the backup authorization token, providing an approval to the point-of-sale device via a transmission between the APC and the point-of-sale device, and completing the payment. | 10-29-2015 |
20150310428 | Mobile Payment System and Method Using Alias - Methods and systems are disclosed for allowing financial transactions to be conducted using mobile phones. A payer initiates a transaction by sending a payment request message from a mobile phone which specifies the payee and amount to be paid. Payees are identified by unique aliases, which are maintained in a database. Methods for assembling the enrollment and alias database are included. | 10-29-2015 |
20150324800 | System and Method of Processing PIN-Based Payment Transactions via Mobile Devices - A system and method for using a Personal Identification Number (“PIN”) to authenticate payment transactions via a mobile device coupled to a reader device is described. The reader device may be modified to not only read and encrypt first identification information from a payment medium such as a magnetic strip of a payment card, but also receive a PIN from the mobile device and encrypt the PIN. The mobile device may be configured to prompt for and receive the PIN. The PIN may be communicated to the reader device for encryption. The mobile device may receive the encrypted first identification information and encrypted PIN and communicate the encrypted data to an adaptive payment server that decrypts the encrypted data for processing the payment transaction. The system may be used to securely process PIN-based payment transactions using a mobile device that is communicably coupled to a reader device. | 11-12-2015 |
20150324801 | PAYMENT IDENTIFICATION CODE AND PAYMENT SYSTEM USING THE SAME - A method for effecting electronic payment, safeguarding banking and account information, while utilizing existing payment systems. The method comprises generating a system routing number and a payment identification code (PIC) relating to the beneficiary's account information, distributing payment identification codes to the existing payment system and financial institutions owning the account related to the payment identification codes, and the originator receiving a system routing number and the beneficiary's PIC number. The method also includes the originator communicating a payment instruction to a financial institution of the originator, wherein the payment instruction includes the system routing number beneficiary's payment identification code, the originator's financial institution receiving the payment instruction from the originator, wherein if the received PIC matches the originator's financial institution internal list of PICs, the originator's financial institution performs an “on us” transaction, and transmitting a payment instruction to an existing payment system in a case where the received PIC does not match originator's financial institution internal list of PICs. The method also includes the existing payment system validating the received PIC, wherein if the PIC is invalid, the payment instruction is returned to the originator's financial institution, converting the PIC and system routing number to a receiving payment instruction in a case where the PIC is a valid PIC, wherein the receiving payment instruction includes the beneficiary's financial institution's routing number and the beneficiary's account number. The existing payment system transmits the receiving payment instruction to a financial institution of the beneficiary, that financial institution credits the beneficiary's account if no problem exists, and otherwise returns a receiving payment instruction to the existing payment system. Upon receipt of the returned receiving payment instruction, the existing payment system translates the receiving payment instruction into the payment instruction prior to transmitting the payment instruction back to originator's financial institution. | 11-12-2015 |
20150348035 | WIRELESS DEVICES FOR STORING A FINANCIAL ACCOUNT CARD AND METHODS FOR STORING CARD DATA IN A WIRELESS DEVICE - A wireless device is enabled to receive a financial account card that is inserted into a card slot of the wireless device. The wireless device reads card data from the financial account card when it is inserted into the slot and programs an RFID (radio frequency identification) tag or a memory included in the wireless device. The wireless device may then be used to provide payment by transmitting the card data via radio frequency to a nearby RFID reader using the RFID tag. The financial account card may also be ejected from the wireless device and swiped by a magnetic card reader. | 12-03-2015 |
20150348044 | SECURE CREDIT CARD TRANSACTIONS BASED ON A MOBILE DEVICE - A mobile device may facilitate secure credit card transactions. The mobile device may initialize a mobile credit card verification (MCCV) generator using parameters that are shared with a credit card verifier, and then initialize a rollover timer, where the rollover timer may be synchronized with the credit card verifier. The mobile device may generate an MCCV value based on the parameters, and provide the generated MCCV value to verify a credit card transaction. The mobile device may determine if the rollover timer has reached a predetermined time value, and generating a new MCCV value, based on updated parameters, in response to determining the rollover timer has reached the predetermined time value. | 12-03-2015 |
20150356561 | MOBILE INFORMATION APPARATUS SUPPORTING MOBILE PAYMENT HAVING SECURITY BASED, AT LEAST IN PART, ON DEVICE IDENTIFICATION NUMBER, PASSWORD OR PIN CODE, DATA ENCRYPTION, AND SHORT PHYSICAL DISTANCE WIRELESS COMMUNICATION - A mobile information apparatus for making mobile payments associated with a credit card, via a near distance radio frequency wireless communication unit, is herein disclosed and enabled. At least part of the payment information and part of a device identification number associated with the mobile information apparatus are stored in the mobile information apparatus with an encryption technique. To make a payment, the user moves the mobile information apparatus to within a limited local physical distance from a wireless output controller; the user authorizes the payment by providing a password or pin code authentication; and subsequent to the password or pin code authentication, the mobile information apparatus releases the payment information and the device identification number that includes encrypted data over a short range radio frequency communication link to the wireless output controller for authorizing payment and transaction processing. | 12-10-2015 |
20150371187 | SYSTEMS AND METHODS FOR CONTROL OF ELECTRONIC PARCEL LOCKERS - Systems, devices and methods for storage, delivery, receipt, and/or other handling of an item in an electronically controllable storage receptacle are disclosed. The disclosure provides features for keyless access to the storage receptacle by use of user access information, such as a PIN or bar code. Further, features are disclosed for receiving and/or transmitting data related to the recipient and the item to facilitate the various handling actions of the item. | 12-24-2015 |
20150371213 | Authentication Device & Related Methods - The invention provides a portable device for input of a Personal Identification Code (PIC). It comprises a card reading component and a touch screen. The screen is arranged and configured to display a pinpad and receive a PIC upon entry by a user via the pinpad. The card reading component and the touch screen are integral to the input device. The device can comprise a mobile phone, which may have a camera. The device can be a handheld card payment terminal for use in fmancial transactions, where a user's PIN must be authenticated. A security mechanism may be used with the device wherein an image of a scrambled keypad is displayed over an operable keypad, this enabling the device to store an encoded version of the user's input. As the user's real PIN is never stored in the device, no bank session key needs to be stored or encrypted. This enables the terminal to be produced at a lower cost than prior art arrangements. | 12-24-2015 |
20160005040 | SECURE PAYMENT MADE FROM A MOBILE DEVICE THROUGH A SERVICE PROVIDER - Methods and systems enable merchants to accept payments through a service provider from a consumer using an app on a mobile device, for example, without redirecting the consumer to the service provider and without collecting the customer's service provider password (a separate PIN may be used). An example of an app on a mobile device is given, but secure payments are also enabled for purchases and other transactions for a website, a merchant, or a service provider who needs to accept payments from customers. A two-key approach allows a merchant, using the two keys—a collection key for merchant apps and general servers and a private, more secure, charge key for merchant “back-end” systems—to collect a user's username and personal identification number (PIN) for acquiring payments through a service provider without compromising the user's service provider username and password (the PIN is distinct from the password). | 01-07-2016 |
20160012433 | SYSTEMS AND METHODS FOR SENDING PAYMENT DATA USING A MOBILE ELECTRONIC DEVICE TO TRANSACT WITH OTHER COMPUTING DEVICES | 01-14-2016 |
20160019531 | A METHOD OF PROCESSING A CARD PRESENT, CARD PAYMENT TRANSACTION - This invention relates to a method of processing a card present, card payment transaction. The method ( | 01-21-2016 |
20160019548 | Secure Electronic Identification Device - In accordance with one embodiment of the present invention a secure electronic identification device (SEID) is presented. The SEOD includes a display mode for displaying government furnished information, a display mode for displaying user furnished information, and a public display mode for displaying public information. The SEID also includes a banking module with logic and resources for initiating financial transactions between the SEID and a payment gateway. The SEID includes a removable card having a magnetic strip and an EMV chip encodable by the SEID. | 01-21-2016 |
20160027015 | MANAGING A SECURE TRANSACTION - A method, system or computer usable program product for secure short range protocol based transaction processing including using a mobile device capable of short range protocol communication to receive a user password; exchanging transaction data between the mobile device and a point of transaction device through a short range protocol communication, the transaction data including a timestamp; using the mobile device, generating a hash including the user password and the timestamp as inputs; providing the hash and the timestamp to an authorization agent; and receiving an authorization from the authorization agent for an account transaction with the point of transaction device based on the password in the hash. | 01-28-2016 |
20160027016 | Deposit for Non-Account Holders/US - Systems and methods for depositing monetary funds into an account are described. A first request from a first individual to deposit monetary funds into an account associated with an entity may be received. The first individual is not an account owner of the account. Monetary funds from the first individual may be received for deposit in the account. The monetary funds may include cash, checks, credit card transfers, and/or debit card transfers. The receipt of the first request may be receipt of a paper ticket with an access code authorizing deposit of monetary funds into the account. One or more restrictions may be reviewed to authorize the deposit of monetary funds in the account. | 01-28-2016 |
20160034875 | METHOD TO DISBURSE FUNDS USING RETAILER'S POINT OF SALE SYSTEM - A unique and novel method is disclosed whereby funds are made available in a secure fashion to people who do not have bank accounts but want the security of a direct deposit system. Employers receive the benefit of the reduction in paperwork and increase in safety, and the employee receives also safety in obtaining funds at greatly reduced costs and fees to the employee. This system uniquely operates using the return or refund portion of a retailers POS system at the cash register or through their customer service desk. This method also works with people wanting to transfer funds to others in a safe manner with reduced fees. This unique method uses a single transaction process to reduce complicated back end systems hardware and architecture to calculate remaining balances. Vendors benefit from this system in that they are able to accomplish the number one goal of any retailer: getting the customers into their stores. | 02-04-2016 |
20160055486 | APPLICATION SERVER AND MOBILE DEVICE FOR IMPLEMENTING AN ENHANCED MOBILE WALLET - A mobile device and application server, configured to implement a Mobile Wallet (mWallet) facility capable of storing a quanta of value, and enabling a user of the mobile device to update the quanta of value stored in the mWallet, as well as engage in a transaction with a merchant system so that the user may use the mobile device to complete at least the payment portion of the transaction using only their mobile phone. | 02-25-2016 |
20160055575 | Locked Asset Rental System - The present invention relates to a system for the commercial rental of physical assets locked and secured at a specific location, including, without limitation, of bicycles, motorcycles, automobiles, tools, machines, computers, smart phones, or tablet computers. | 02-25-2016 |
20160063481 | System and Method of Electronic Authentication at a Computer Initiated Via Mobile - A system, method, and computer-readable storage medium configured to facilitate cash transactions at an Automated Teller Machine when an ATM card is not present, regardless of whether the accountholder is a customer of the financial institution that owns the ATM. | 03-03-2016 |
20160071088 | Wireless Mobile Transaction System and the Procedure for Carrying Out Transactions with a Mobile Phone - A method of carrying wireless mobile transactions, includes starting an application at a mobile terminal, receiving, at said mobile terminal, input indicative of a selected mode of communication between said mobile terminal and a transaction terminal, establishing a packet data connection between said mobile terminal and a transaction processing center, examining a security certificate retrieved from a storage element within said mobile terminal or a personal identification number (PIN) input and transmitting transaction data between said transaction processing centre and said transaction terminal, wherein at least part of said transaction data is transmitted between said transaction processing center and said transaction terminal through said mobile terminal, wherein data between said mobile terminal and said transaction terminal is transmitted in accordance with said selected mode of communication, sound modulating and acoustically reproducing transaction data received at said mobile terminal for said transaction terminal. A wireless mobile transition system is also described. | 03-10-2016 |
20160078441 | PORTABLE OBJECT INCLUDING A DISPLAY AND APPLICATION FOR CARRYING OUT ELECTRONIC TRANSACTIONS - The invention relates to a smart portable object including a safety component and a display, wherein the display is directly or indirectly interactive between a user and the safety component. The invention also relates to the use of a portable object for implementing an electronic transaction, including a display step for displaying all or some of the information that is useful to a user for the transaction and/or a step of interacting with the user, wherein the display and/or interaction step is carried out via said interactive display. | 03-17-2016 |
20160092877 | SECURE USER AUTHENTICATION INTERFACE TECHNOLOGIES - Technologies for secure user authentication include a computing device with a touch screen display coupled to an electronic paper display, and a security engine isolated from a host processor. To process a payment transaction, the computing device invokes the security engine to generate a random virtual keypad layout that is not accessible by the host processor. The virtual keypad layout includes virtual keypad buttons that may be randomly positioned. The security engine displays the virtual keypad layout on the electronic paper display that overlays the touch screen display. The computing device detects touch input using the touch screen and transmits the touch input to the security engine. The security engine determines keypad input based on the touch input by mapping coordinates of the touch input to virtual buttons of the virtual keypad. The security engine authorizes the transaction based on the keypad input. Other embodiments are described and claimed. | 03-31-2016 |
20160092878 | METHOD AND APPARATUS FOR STREAMLINED DIGITAL WALLET TRANSACTIONS - A method includes maintaining a digital wallet in a computer, and receiving a request for a transaction. The computer may receive and verify user authentication data, and then allow the user to access any payment card account in the digital wallet without requiring additional user authentication, regardless of the account selected for the transaction by the user. In some embodiments, cryptogram generation may be performed with an EMV server in association with the digital wallet, to enhance the level of security assurance for merchants, issuers and users. | 03-31-2016 |
20160098720 | QUICK SERVICE TERMINAL FOR IDENTIFYING CUSTOMERS USING LEGACY CUSTOMER IDENTIFICATION INSTRUMENTS - Apparatus for providing a QST are disclosed herein. The QST may identify a customer in response to a swipe of a customer identifying instrument. The QST may include a reading head, a processor, a keypad, and a communications medium. The reading head may detect identification information in response to the swipe of the instrument. The identification information may be associated with a personal identification instrument. The processor may bypass a PIN acceptance state and perform a search for at least one banking record corresponding to the personal identification instrument. The processor may terminate the identification session in response to failure to obtain a record corresponding to the identification instrument. In response, at least in part, to identification of at least one record that corresponds to the personal identification instrument, the communications medium may receive a session-auth instruction from a remote location. The session-auth instruction may initiate a banking session. | 04-07-2016 |
20160104147 | METHODS FOR RISK MANAGEMENT IN PAYMENT-ENABLED MOBILE DEVICE - A payment-enabled mobile device such as a “smart phone” incorporates risk management features applicable when used for a contactless payment transactions. In some embodiments, a mobile device processor includes a non-volatile memory storing a first counter and an associated first accumulator used for financial risk management purposes, and storing a second counter and an associated second accumulator used for enforcing a cardholder verification requirement, and storing a payment application program. In some embodiments, features govern when cardholder verification is required for consummation of the current transaction, and such features may be configurable by the payment card account issuer and/or the user of the mobile device. | 04-14-2016 |
20160125376 | SECURE POINT OF SALE TERMINAL AND ASSOCIATED METHODS - Methods and systems for processing secure information are disclosed. One method includes receiving secure data from a user via an input device. The method also includes routing the secure data to a secure processor using a hardware multiplexer. The method also includes processing the secure data using the secure processor. The method also includes receiving non-secure data from the user via the input device. The method also includes routing the non-secure data to a second processor using the hardware multiplexer. The method also includes processing the non-secure data using the second processor. The method also includes altering a routing state of the hardware multiplexer using the secure processor. The routing state of the hardware multiplexer is only controlled by the secure processor. | 05-05-2016 |
20160155123 | SYSTEM AND METHOD FOR USER AUTHENTICATION BY USING A PHYSICAL FINANCIAL CARD AND MOBILE COMMUNICATION TERMINAL | 06-02-2016 |
20160162903 | UNIVERSAL SECURE REGISTRY - A user device is configured to allow a user to select any one of a plurality of accounts associated with the user to employ in a financial transaction. In one embodiment, the user device includes a biometric sensor configured to receive a biometric input provided by the user, a user interface configured to receive a user input identifying information concerning an account selected by the user from the plurality of accounts. In a further embodiment, the user device a processor coupled to the biometric sensor to receive information concerning the biometric input and to the user interface. According to one embodiment, the processor is configured to generate a non-predictable value and to generate encrypted authentication information from the non-predictable value and any of the account identifying information, information concerning the biometric input, and secret information. | 06-09-2016 |
20160180321 | METHOD TO ENABLE CONSUMERS TO MAKE PURCHASES AT E-COMMERCE WEBSITES USING THEIR MOBILE NUMBER | 06-23-2016 |
20160180323 | METHOD TO ENABLE CONSUMERS TO MAKE PURCHASES AT POINT OF SALE DEVICES USING THEIR MOBILE NUMBER | 06-23-2016 |
20160180331 | REMOTE ACTIVATION OF HARDWARE SECURE ELEMENT/SECURE ENVIRONMENT | 06-23-2016 |
20160189145 | Consumer / Merchant payment processing system and methods of system use and operation - A method for a customer to establish a system account on my Payment Processing System website for executing merchant payment transactions; the customer visiting the website; the customer purchasing system service and receiving a code number and a personal identification number and receiving an email from customer service and the customer transferring funds from a bank account or a credit card account into the customer account by purchasing a corresponding number of website currency units; and the website storing and indicating the amount of website units in stored values. The method includes the additional steps for a new merchant to register to use the website; the website processing all data received from the merchant and confirming; and designating the merchant as a website registered merchant and the website operator integrate the merchant contents database into the present Payment Processing System merchant database. The method further includes the steps to execute a transaction with a registered merchant, including: the registered merchant accessing the customer account; the merchant entering an identification of an item and a service or contents to be purchased and the amount of the purchase; the customer pressing the system icon; the customer entering his or her code; the customer entering his or her personal PIN; the website verifying entered merchant information and customer code and PIN data and one of: approving and completing the transaction, and denying and canceling the transaction; and where the transaction is approved the website generating a confirmation code. | 06-30-2016 |
20160189156 | APPARATUS FOR AUTHENTICATION AND PAYMENT BASED ON WEB, METHOD FOR AUTHENTICATION AND PAYMENT BASED ON WEB, SYSTEM FOR AUTHENTICATION AND PAYMENT BASED ON WEB AND NON-TRANSITORY COMPUTER READABLE STORAGE MEDIUM HAVING COMPUTER PROGRAM RECORDED THEREON - The present invention provides that a credit card authentication value is divided into meaningless information block | 06-30-2016 |
20160203480 | PIN CREATION SYSTEM AND METHOD | 07-14-2016 |
20160205096 | SYSTEM AND METHOD FOR AUTHORIZING ACCESS TO ACCESS-CONTROLLED ENVIRONMENTS | 07-14-2016 |
20160253643 | METHOD OF COMPLETING A PURCHASE TRANSACTION | 09-01-2016 |
20160253666 | METHOD AND DEVICE FOR CONTROLLING PAYMENT FUNCTION | 09-01-2016 |
20160253668 | SECURE PAYMENT DEVICE | 09-01-2016 |
20160253670 | ELECTRONIC DEVICE PROVIDING ELECTRONIC PAYMENT FUNCTION AND OPERATING METHOD THEREOF | 09-01-2016 |
20180025343 | METHOD FOR PROCESSING A TRANSACTION FROM A COMMUNICATION TERMINAL | 01-25-2018 |