Patent application number | Description | Published |
20080319869 | SYSTEMS AND METHODS FOR SECURE AND TRANSPARENT CARDLESS TRANSACTIONS - Systems, methods, and apparatus for handling and/or authorizing payment requests by a consumer for a transaction are provided. Payment information can be sent directly from a consumer to a non-merchant, thereby allowing no new entities to obtain the payment information. Transaction identifiers can be used to facilitate communications among the entities. The payment information can be sent to the non-merchant via a merchant application with a submit payment button directed to the non-merchant so little or no deviations from standard practices are required. | 12-25-2008 |
20080319896 | CARDLESS CHALLENGE SYSTEMS AND METHODS - Systems, methods, and apparatus for handling and/or authorizing payment requests by a consumer for a transaction are provided. Challenge questions may be presented from the non-merchant to the consumer after receiving the payment information, thereby allowing a judicious determination of when to ask such challenge questions and allowing complex and probative questions. The time limit for such challenge questions may advantageously be unconstrained, while still preserving security. Also, a risk analysis may be started prior to the consumer submitting payment information, thus allowing an efficient and complex risk analysis. Information about an access device used by the consumer may be obtained at the non-merchant from the access device with code sent to the access device from the merchant, and the device information may be used in the risk analysis. | 12-25-2008 |
20080319904 | SEEDING CHALLENGES FOR PAYMENT TRANSACTIONS - Systems, methods, and apparatus are provided for authenticating a consumer using challenge questions. A response to a challenge question is verified via seeding the challenge question, receiving response, and deductively determining the answer. The verified response and challenge question may then be used to authenticate a consumer as part of an authorization process. | 12-25-2008 |
20090112721 | VALUE-ADDED SERVICES ENGINE - Systems and methods for conducting a transaction using a Value-Added Services Engine. The method initiates sending transaction information with a product identifier identifying a product associated with a transaction conducted between a merchant and a consumer to the Value-Added Services Engine. The Value-Added Services Engine is programmed to determine a benefit associated with the product. The benefit is determined after communicating with a supplier of the product. The method also receives an indication of the benefit. | 04-30-2009 |
20090112757 | MOBILE DEVICE INCLUDING COMPUTER READABLE MEDIUM SUITABLE FOR TAX PROCESSING AND CURRENCY CONVERSION - Systems and methods of converting transactions to a new currency and tax processing based on the location of the mobile communication device. The systems and methods send transaction information including a transaction amount associated with a transaction conducted between a merchant and a consumer at an access device, to a server computer. The server computer determines a location of a mobile communication device operated by the consumer and converts an transaction amount to a currency based on a conversion rate based on the location of the mobile communication device or determines a tax amount based on the transaction amount and based on the location of the mobile communication device. The method also receives the converted transaction amount or the tax amount. | 04-30-2009 |
20090112766 | DEVICE INCLUDING MULTIPLE PAYMENT APPLICATIONS - Embodiments of the invention are directed to a method, a system, a device and a computer-readable media for selecting one or more payment application at the point-of-sale and using the select one or more payment applications to conduct a transaction. One embodiment is directed to a method for automatically selecting one or more payment applications to use in a transaction so that the selected payment applications give the consumer an optimized benefit or benefits. | 04-30-2009 |
20090112767 | ESCROW SYSTEM AND METHOD - A system and method for conducting purchasing transactions using escrow. A central processing entity secures the terms to a purchasing transaction on behalf of the various parties to the transaction. Once the terms of the purchasing transaction are agreed upon, the central processing entity holds any funds used in the transaction in escrow until confirmation is received that a supplier's contractual obligations have been fulfilled. | 04-30-2009 |
20090112768 | PAYMENT TRANSACTION USING MOBILE PHONE AS RELAY - Systems and methods of conducting a payment transaction using a mobile phone as a relay. The systems and methods receive transaction information associated with a transaction at a mobile communication device from a merchant. They send the transaction information with the mobile communication device to an issuer associated with the mobile communication device. The issuer thereafter sends an authorization response message to the merchant. | 04-30-2009 |
20090119170 | PORTABLE CONSUMER DEVICE INCLUDING DATA BEARING MEDIUM INCLUDING RISK BASED BENEFITS - A system and method for distributing coupons to consumers at the point-of-sale, where the benefit offered in the coupon can be determined according to a risk analysis. The coupon can then be applied to a transaction taking place at the point-of-sale or stored for future use. | 05-07-2009 |
20090119213 | ON-LINE AUTHORIZATION IN ACCESS ENVIRONMENT - A method is disclosed. The method includes interacting with a gate access device that is capable of preventing access to a location, where the gate access device subsequently sends an authorization request message to an issuer for approval, the authorization request message including a request to charge a predetermined amount of money to pay for access to a location, and entering the location if the gate access device receives an authorization response message indicating that the charge is authorized. | 05-07-2009 |
20090121016 | On-Line Authorization In Access Environment - A method for allowing on-line authorization in an access environment. The method includes receiving a request for access to a location at a gate access device from a user. After receiving the request for access to the location, an authorization request message is generated. The authorization request message includes an authorization to charge a predetermined amount of money. The authorization request message is then sent to an issuer for approval. An authorization response message is then received. The authorization response message indicates whether or not the charge is authorized or not authorized. If the authorization response message indicates that the authorization response message is authorized, then the user is allowed to access the location. | 05-14-2009 |
20090187492 | LOCATION BASED AUTHENTICATION - A portable consumer device that is used to conduct a transaction at a merchant is authenticated. Information provided to a server computer includes locations of a merchant and a mobile communication device possessed by a consumer. If the location of the mobile communication device corresponds to the location of the merchant, the portable consumer device that is used to conduct the transaction is authenticated. | 07-23-2009 |
20090202081 | KEY DELIVERY SYSTEM AND METHOD - A method for delivering a key is disclosed. The method includes encrypting a first key using a second uniquely derived key to form an encrypted first key, and providing the encrypted first key to a transaction device. The transaction device contains the second uniquely derived key. | 08-13-2009 |
20090313134 | RECOVERY OF TRANSACTION INFORMATION - Online transaction processing over a communication network involves receiving a transaction input comprising an authorization request message for a transaction conducted over a communication network between a consumer and a merchant using a portable consumer device having a memory, wherein the authorization request message contains data comprising a transaction total amount for the transaction and additional information not stored in the memory of the portable consumer device and related to the transaction. Issuer authorization processing is performed in response to the authorization request message data, and a decision output is produced in response to the transaction input and the issuer authorization processing. Thus, a decision output is produced in an efficient manner using additional information for the issuer authorization processing, and the additional information reduces the likelihood of declining a transaction that should otherwise be authorized. | 12-17-2009 |
20090319430 | MOBILE PHONE INCLUDING DYNAMIC VERIFICATION VALUE - A method for forming a dynamic verification value. The method includes altering a first data string to form a second data string, and forming a first dynamic verification value using at least a portion of the second data string. The first dynamic verification value is used to authenticate a phone in a first transaction. The second data string is used to form a third data string. A second dynamic verification value is formed using at least a portion of the third data string. The second dynamic verification value is used to authenticate the phone in a second transaction. | 12-24-2009 |
20090319638 | GATEWAY SERVICE PLATFORM - A gateway service platform is disclosed that provides access to a payment processing system via an open network such as the internet. The gateway service platform also provides access to service systems that provide a variety of services and applications offered by or affiliated with the payment processing system. The gateway service platform allows the payment processing system to reach users and to facilitate transactions on a wide variety of devices that may not otherwise be able to connect to payment processing system. Other devices, such as payment terminal devices, can also interact with a payment processing system through the gateway service platform using the same network and protocol. Embodiments of the invention allow devices on these open networks to connect with the payment processing system without having to change the existing infrastructure of the payment processing system. | 12-24-2009 |
20090319784 | DYNAMIC VERIFICATION VALUE SYSTEM AND METHOD - A method for forming a dynamic verification value. The method includes altering a first data string to form a second data string, and forming a first dynamic verification value using at least a portion of the second data string. The first dynamic verification value is used to authenticate a portable consumer device in a first transaction. The second data string is used to form a third data string. A second dynamic verification value is formed using at least a portion of the third data string. The second dynamic verification value is used to authenticate the portable consumer device in a second transaction. | 12-24-2009 |
20090327134 | SYSTEMS AND METHODS FOR GEOGRAPHIC LOCATION NOTIFICATIONS OF PAYMENT TRANSACTIONS - A method and system for providing geographic location notifications of payment transactions is disclosed. One embodiment of the invention is directed to a method including receiving an authorization request message associated with a transaction, the transaction associated with a portable consumer device and an access device at a merchant. A geographic location of the transaction is determined. It is determined whether a notification message indicating that the transaction is occurring is required. Upon determining that the notification message is required, the notification message is sent to a notification device operated by a consumer and the notification device receives the notification message substantially simultaneously with the merchant's receipt of an authorization response message. A graphical depiction of the notification message is displayed on a map on the notification device. | 12-31-2009 |
20090327151 | SYSTEMS AND METHODS FOR VISUAL REPRESENTATION OF OFFERS - A method and system for providing geographic location notifications for targeted offers is disclosed. One embodiment of the invention is directed to a method including monitoring for an event to trigger a targeted offer. Upon detection of the event, the offer is generated. The offer is targeted to a consumer and is generated using payment data generated in response to transactions conducted by the consumer with a plurality of different merchants. A geographic location for redeeming the offer is determined. A notification message is generated about the offer. The notification message includes the offer and the geographic location for redeeming the offer. The notification message is sent to a notification device which is operated by the consumer. A graphical depiction of the offer is displayed on a map on the notification device. | 12-31-2009 |
20100027786 | DYNAMIC ENCRYPTION AUTHENTICATION - A method is disclosed. The method includes generating a uniquely derived data string using personalized information and a first encryption algorithm, generating at least one uniquely derived key using the uniquely derived data string, and creating a dynamic verification value using a second encryption algorithm using the at least one uniquely derived key, wherein the first encryption algorithm is different than the second encryption algorithm. | 02-04-2010 |
20100114677 | SYSTEM INCLUDING AUTOMATED TELLER MACHINE WITH DATA BEARING MEDIUM - Embodiments of the present invention relate to systems and methods of providing customized offers to a consumer at an automated teller machine. The automated teller machine comprises a processor, a computer readable medium coupled to the processor, an output device coupled to the processor, and a reader coupled to the processor. The computer readable medium comprises code for receiving data from a portable ATM device and code for receiving a customized offer after receiving data from the portable ATM device. | 05-06-2010 |
20100114776 | ONLINE CHALLENGE-RESPONSE - Embodiments of the invention enable cardholders conducting an online transaction to be authenticated in real-time using a challenge-response application. The challenge-response application can be administered by an issuer or by a third party on-behalf-of an issuer. A challenge question can be presented to the cardholder, and the cardholder's response can be verified. The challenge question presented can be selected based on an analysis of the risk of the transaction and potentially other factors. A variety of dynamic challenge questions can be used without the need for the cardholder to enroll into the program. Additionally, there are many flexible implementation options of the challenge-response application that can be adjusted based on factors such as the location of the merchant or the location of the consumer. | 05-06-2010 |
20100117792 | DEVICE INCLUDING AUTHENTICATION GLYPH - A device used in an authentication process. The device includes a processor, a display coupled to the processor, and a computer readable medium coupled to the processor. The computer readable medium includes (i) code for displaying a first authentication image including a plurality of image elements including a set of image elements, where the image elements in the set of image elements are located at a first set of positions on a display screen, (ii) code for receiving a first glyph having a first configuration corresponding to the set of image elements from a user while the first authentication image is displayed, (iii) code for displaying a second authentication image including the plurality of image elements including the set of image elements, where the image elements in the set of image elements are located at a second set of positions on the display screen, where the second set of positions is different than the first set of positions, and (iv) code for receiving a second glyph having a second configuration corresponding to the set of image elements from a user while the first authentication image is displayed | 05-13-2010 |
20100120396 | DEVICE INCLUDING AUTHENTICATION GLYPH - A phone used in an authentication process. The phone includes a processor, a display coupled to the processor, and a computer readable medium coupled to the processor. The computer readable medium includes (i) code for displaying a first authentication image including a plurality of image elements including a set of image elements, where the image elements in the set of image elements are located at a first set of positions on a display screen, (ii) code for receiving a first glyph having a first configuration corresponding to the set of image elements from a user while the first authentication image is displayed, (iii) code for displaying a second authentication image including the plurality of image elements including the set of image elements, where the image elements in the set of image elements are located at a second set of positions on the display screen, where the second set of positions is different than the first set of positions, and (iv) code for receiving a second glyph having a second configuration corresponding to the set of image elements from a user while the first authentication image is displayed | 05-13-2010 |
20100127065 | Authenticating a document with a magnetic stripe - Methods, systems, and apparatus for efficiently authenticating a document (e.g. a credit card) having a magnetic stripe are provided. The magnetic field at different points of the magnetic stripe are measured, e.g., by a checkout scanner to create a magnetic signature. Digital samples of the measurements may be transformed into coefficients of continuous basis functions, e.g., a Fourier transform. These coefficients are then compared to reference values (e.g. corresponding coefficients) to produce a measure of the authenticity of the document. The number of coefficients used can advantageously be smaller than the number of digital samples without compromising accuracy, thus using less bandwidth between a scanner and an authentication entity. | 05-27-2010 |
20100127071 | VERIFYING CARDHOLDER IDENTITY USING SIGNATURE OF THE CARD - Methods, systems, and apparatus for verifying the identity of a cardholder are provided. A digital representation of a magnetic characteristic of a magnetic stripe of the card is stored on a portable electronic device of the cardholder. During a transaction, the digital signature is then transmitted so that it can be compared with a reference signature. The identity may be verified, and a response sent to a party requesting the verification, e.g., during a transaction between the requesting party and the verified party. | 05-27-2010 |
20100127072 | AUTHENTICATION OF DOCUMENTS HAVING MAGNETIC STRIPE - Methods, systems, and apparatus for efficiently authenticating a document (e.g. a credit card) having a magnetic stripe are provided. The magnetic field at different points of the magnetic stripe are measured, e.g., by a checkout scanner to create a magnetic signature. Digital samples of the measurements may be transformed into coefficients of continuous basis functions, e.g., a Fourier transform. These coefficients are then compared to reference values (e.g. corresponding coefficients) to produce a measure of the authenticity of the document. The number of coefficients used can advantageously be smaller than the number of digital samples without compromising accuracy, thus using less bandwidth between a scanner and an authentication entity. | 05-27-2010 |
20100127079 | UPDATING OF REFERENCE MAGNETIC SIGNATURE FOR AUTHENTICATING A DOCUMENT WITH A MAGNETIC STRIPE - Methods, systems, and apparatus for accurately authenticating a document (e.g. a credit card) having a magnetic stripe are provided. The magnetic field at different points of the magnetic stripe are measured, e.g., by a checkout scanner to create a magnetic signature. Digital samples of the measurements may be used to create a representation of the magnetic signature. The representation can then be compared to reference values to produce a measure of the authenticity of the document. The reference values are updated over time to reflect changes in the magnetic stripe of the authentic document, as may occur due to physical deterioration. For example, reference values may be optimized based on recent measurements of the authenticated document to provide a more accurate determination of authenticity for future measurements. | 05-27-2010 |
20100243733 | AUTHENTICATION USING PHYSICAL CHARACTERISTICS OF TOKENS - A portable consumer device having a substrate layer, a protective layer and a brittle material layer having an intentionally created unique fissure patterns and systems and methods for making and using same are disclosed. The unique fissure pattern of the brittle material layer is detected and used to authenticate the portable consumer device. | 09-30-2010 |
20100252623 | METHOD AND SYSTEM FOR GENERATING A DYNAMIC VERIFICATION VALUE - A method is disclosed. The method includes generating a verification value in response to a transaction involving a portable consumer device, where the verification value is generated using a first dynamic data element and a second dynamic data element. The verification value is sent to a service provider associated with the portable consumer device so that the service provider can verify the transaction. | 10-07-2010 |
20100268557 | ENROLLMENT SERVER - Systems, methods and apparatus for processing enrollment requests are provided. Enrollment requests may be sent from a user to an enrollment server. The enrollment server may verify the information in the enrollment request with entities that may contain authoritative data reflecting the validity of the information in the enrollment request. The authenticity of devices involved in the enrollment request may also be verified. In addition, the user's transaction history can be reviewed to determine if the enrollment fits the user's transaction history profile. Based on the verified information and a level of risk associated with the enrollment, the enrollment server may allow or deny the enrollment request. | 10-21-2010 |
20100270371 | OBSERVABLE MOMENT ENCRYPTION - A method, system and apparatus for encrypting a consumer identification number contained in a portable consumer device by gradually changing a consumer identification number when an observable moment is observed is disclosed. Observable moments can be exposure to light or an electromagnetic field, use of the portable consumer device or a change in temperature. A pattern or history of how the consumer identification number is gradually changed is used to authenticate the portable consumer device or the consumer. | 10-28-2010 |
20100280880 | DETERMINING TARGETED INCENTIVES BASED ON CONSUMER TRANSACTION HISTORY - Systems, apparatus, and methods for determining incentives based on consumer history. When, how, and to whom incentives are sent can be determined. For example, an incentive can be sent to a consumer to encourage a transaction at a time when the particular consumer is predisposed to initiate the transaction. Also, an incentive for a transaction can be sent to a consumer when that transaction has a high likelihood of leading to other transactions. An incentive can also be sent after a consumer initiates a transaction that is known to not have many subsequent transaction correlated to it. | 11-04-2010 |
20100280881 | DEMOGRAPHIC ANALYSIS USING TIME-BASED CONSUMER TRANSACTION HISTORIES - Systems, apparatus, and methods for determining groups of similar consumers and for identifying a trend in consumer behavior are provided. Likelihoods of a transaction being initiated at various times by one consumer can be calculated based on previous transactions of the consumer. The likelihoods for different consumers can be used to determine a group of similar consumers as a demographic. The likelihoods of a transaction being initiated at various times by a consumer of a demographic (or other entity) can be used to forecast trends (such as a demand for a product) and make business decisions, such as for marketing campaigns, inventory levels (e.g. at particular stores or for all stores), pricing, and store locations. Such likelihoods when focused to a particular category of transactions can provide even greater accuracy. | 11-04-2010 |
20100280882 | FREQUENCY-BASED TRANSACTION PREDICTION AND PROCESSING - Methods, apparatus, and systems are provided for tracking and analyzing data of consumer activity. The tracked data can be organized (e.g. as stored in cache, RAM, hard drives) in certain types of tables, where the tables can be associated with certain tags (keys) for efficiently accessing the data. The organization and associations of the data can also provide simple mechanisms for manipulating the data to obtain results specifically relevant for a task, such as detection of fraud or prediction of consumer behavior to provide better customer service or new services. For example, the tables may contain counters that store the number of times that two correlated consumer events occur within specific time intervals of each other. Such time data can provide efficient determination of patterns of consumer activity. | 11-04-2010 |
20100280927 | PRE-AUTHORIZATION OF A TRANSACTION USING PREDICTIVE MODELING - Systems, apparatus, and methods are provided for efficiently authorizing a transaction initiated by a consumer. An authorization can be generated before the consumer actually initiates the transaction. For example, a future transaction can be predicted, and an authorization can be generated for the predicted transaction. In this manner, the authorization can be ready and quickly used when the consumer does initiate the transaction. Previous transactions made by the consumer can be used to predict when the future transaction is likely. In various examples, the authorization can be sent to a specific merchant or to the consumer for use when the consumer initiates the predicted transaction, or saved by an authorization server for use in response to an authorization request from the merchant. | 11-04-2010 |
20100280950 | TRANSACTION AUTHORIZATION USING TIME-DEPENDENT TRANSACTION PATTERNS - Systems, apparatus, and methods for authorizing a transaction initiated by a consumer are provided. A likelihood function can approximate a pattern of previous transactions and provide a measure of how likely it is for a transaction to occur as a function of time. The time of a current transaction can be used to determine a corresponding likelihood value of a likelihood function associated with the transaction. The likelihood value can then be used to determine a score for authorizing the transaction. As the likelihood corresponds to a particular time of a pattern, the score can be tailored to the current transaction and achieve greater accuracy. | 11-04-2010 |
20100287250 | Merchant Alert Based System and Method Including Customer Presence Notification - Embodiments of the present invention disclosed herein include systems and methods for sending merchant alert messages. The merchant can specify criteria indicating the types of customers for which he desires to receive alerts. Merchant alert messages can be sent based on characteristics of a customer, including the customer's proximity to the merchant. The merchant can use the alert message to provide better service to the customer or prevent the customer from engaging in transactions, depending on the contents of the merchant alert message. | 11-11-2010 |
20100299208 | MERCHANT COMPETITION ALERT - Embodiments of the present invention are directed to a system and method for determining the products involved in a transaction, and transmitting messages containing product specific data. Systems may be implemented to product identifiers during payment processing. The messages may be sent including product identifiers, and further information regarding the products associated with the product identifiers. | 11-25-2010 |
20100299249 | SKU LEVEL CONTROL AND ALERTS - Embodiments of the present invention are directed to a system and method for determining the products involved in a transaction conducted with a subsidiary user of a payment account, and transmitting messages containing product specific information. Systems may be implemented to transmit product identifiers during payment processing. The product specific information may be included in alert messages sent to an account holder. | 11-25-2010 |
20100299267 | DEVICE INCLUDING ENCRYPTED DATA FOR EXPIRATION DATE AND VERIFICATION VALUE CREATION - In order to make it more difficult to obtain numbers that can be used to conduct fraudulent transactions, a portion of a real account number is encrypted. The encrypted portion of the account number is used to generate a new account number, a new expiration date, and a new verification value. This information can be determined using processor that may reside in a point of sale terminal, a smart card, or a computer operated by a user. The new account number, the new expiration date, and the new verification value can be used in a payment transaction. A server computer in a central payment processing network may determine that the new account information is not the real account information, and may subsequently generate a modified authorization request message using the real account information and may send it to an issuer for approval. The transmission of data is more secure, since real account information is not sent from the merchant to the payment processing network. | 11-25-2010 |
20100318783 | SERVICE ACTIVATION USING ALGORITHMICALLY DEFINED KEY - Systems and methods for service activation using algorithmically defined keys are disclosed. A consumer who has a relationship with a first party may wish to enroll in a service provided by a third party. The first party can maintain control of such enrollments through the use of algorithmically defined keys. The algorithmically defined keys also allow the third party service provider to verify data provided by the consumer as matching data stored by the first party. The verification provides for data synchronization without requiring the third party to have access to the first parties data systems. | 12-16-2010 |
20110004526 | PORTABLE CONSUMER DEVICE VERIFICATION SYSTEM - A method for verifying a portable consumer device. The method includes receiving an authorization request message associated with a transaction conducted using a portable consumer device. The portable consumer device includes a portable consumer device fingerprint. The authorization request message includes an altered portable consumer device fingerprint and an algorithm identifier. The method also includes selecting an algorithm from among a plurality of algorithms using the algorithm identifier, determining the portable consumer device fingerprint using selected algorithm and the altered portable consumer device fingerprint, determining if the portable consumer device fingerprint matches a stored portable consumer device fingerprint, and sending an authorization response message after determining if the portable consumer device fingerprint matches the stored portable consumer device fingerprint. | 01-06-2011 |
20110046969 | ALIAS HIERARCHY AND DATA STRUCTURE - Methods for creating an alias data structure are provided. A representative method includes receiving transaction information related to a first alias associated with an entity, receiving transaction information between a first object and the entity, and associating the first object with the first alias based at least in part on the transaction information related to the first alias and transaction information between the first object and the entity. The method further includes continually monitoring transaction information related to the first object and updating the association of the first object with the first alias in response to the transaction information. | 02-24-2011 |
20110047040 | ALIAS IDENTITY AND REPUTATION VALIDATION ENGINE - Methods and system for determining reputation information are provided. The method includes analyzing transactional and non-transactional information for an alias associated with an entity and determining reputation information for that alias. The reputation information is transferable across multiple domains. A user can request the reputation information about an entity prior to doing business with that entity. The reputation information is generated for merchants as well as users. The system can generate transaction risk score for every transaction to be conducted between two or more aliases. The system includes an alias identity and reputation validation server computer that receives inputs from various external systems and generated reputation information based on the inputs. Additionally, every individual user/merchant can manage his profile within the reputation database and enter some information manually. | 02-24-2011 |
20110047076 | ALIAS REPUTATION INTERACTION SYSTEM - Systems and method for generating reputation information for an alias are provided. The alias is associated with an entity. Payment transaction information related to a first alias associated with a first entity is received. The payment transaction information includes payment transactions performed by the first entity. In addition, non-payment transaction information related to the first alias is also received. The non-payment transactions include transaction between the first alias and one or more objects. The payment transaction information and the non-payment transaction information is analyzed to associate the one or more objects with the first alias. Thereafter, reputation information for the first alias is generated based at least in part on the payment transaction information and the non-payment transaction information. | 02-24-2011 |
20110049233 | AUTHENTICATION USING PHYSICAL CHARACTERISTICS OF TOKENS - A point of issuance cracking device for producing and recording intentionally created unique crack patterns in a brittle material layer of portable consumer devices and methods of using same for authentication are disclosed. When a conductive material is used for the brittle material layer, the electromagnetic field (EMF) signature of the intentionally created cracks can be detected, stored and compared for the purposes of the authenticating the portable consumer device. | 03-03-2011 |
20110066516 | Portable Consumer Device Configured to Generate Dynamic Authentication Data - Embodiments of the invention provide a portable consumer device configured to store dynamic authentication data in memory. The portable consumer device also includes an interface for transmitting data to and receiving power from an external device. The dynamic authentication data is read from the memory by a read-write device located on the portable consumer device. The authentication data is updated and the updated data may be written into memory using the read-write device. In some embodiments, an authentication value read from the memory may be used to generate another authentication value based on an algorithm. The portable consumer device is further configured to transmit authentication data to an external device. The process of reading, updating, generating, transmitting, and rewriting the authentication data may occur each time external power is provided to the portable consumer device via the interface. The power for operating the components of the portable consumer device may be drawn exclusively from the power received from the external device (i.e., the external power). In some embodiments, a portion of the external power may be temporarily stored on an energy storage means of the portable consumer device. | 03-17-2011 |
20110066551 | Method and System for Providing Risk Information in Connection with Transaction Processing - A system for providing real-time risk mitigation for an authorization system. The system receives authorization requests from multiple merchants (or their respective acquirers) and processes such requests. Each processed request is then forwarded to its corresponding issuer for further authorization. Each processed request includes an authorization message. The authorization message can include a risk score, a number of reason codes, and a number of condition codes. The use of the risk score, reason codes and condition codes allows issuers to make better informed decisions with respect to providing authorizations. | 03-17-2011 |
20110073640 | EMF SIGNATURE DEVICE - Systems, methods and devices for making and using EMF signature enabled portable consumer devices are disclosed. EMF signature enabled portable consumer devices, such as credit cards, can include a conductive or semiconductive brittle material layer with an intentionally created random crack or fissure pattern. The intentionally created unique random crack patterns can be created by cost effective and highly scalable standardized processes. When an input signal is applied to the portable consumer device, an EMF signature based on the unique random crack pattern can be induced. The resulting EMF signature can be detected, processed and used as the basis for various encryption, security or authentication protocols. | 03-31-2011 |
20110093397 | ANTI-PHISHING SYSTEM AND METHOD INCLUDING LIST WITH USER DATA - A server computer is disclosed. It comprises a processor and a computer readable medium coupled to the processor. The computer readable medium comprises code executable by the processor for implementing a method comprising: (i) receiving a request to conduct a transaction, (ii) providing a user interface to a user in response to the request, wherein the user interface includes a list of candidate identification tokens, wherein the list of candidate identification tokens includes an authentic identification token and one or more non-authentic identification tokens, wherein the authentic identification token is associated with a user account. | 04-21-2011 |
20110106659 | Encryption Switch Processing - A method for delivering non-financial electronic data through a secure communications channel between a payment processing network and an access device is disclosed. One embodiment of the invention is directed to a method comprising receiving, at a payment processing network, a request to establish a secure communications channel between a consumer device and the payment processing network. Upon establishing a secure communications channel with the consumer device, the payment processor network receives non-financial electronic content from a merchant at the payment processing network where the non-financial electronic content is selected at the merchant by a user associated with the consumer device. The non-financial electronic content is sent to the consumer device from the payment processing network via the secure communications channel between the consumer device and the payment processing network. | 05-05-2011 |
20110106710 | ENCRYPTION SWITCH PROCESSING - Techniques for eliminating the need for merchants and acquirers to conduct Payment Card Industry (“PCI”) security audit procedures are provided. Merchants and acquirers can eliminate the operating expenses associated with conducting audits to ensure compliance with PCI Data Security Standards (“DSS”), while at the same time ensuring that cardholders' data remains secure, thus protecting the cardholders from fraudulent transactions. System security is further enhanced through the use of per transaction audits, with the scope of the audit being directly between the Point of Sale (POS) terminal and the payment processing network. PCI DSS compliance can thus be assured on a per transaction basis, as opposed to only ensuring compliance generally for a merchant or acquirer on a periodic basis. Per transaction PCI DSS compliance is assured, while at the same time eliminating the need for merchants or acquirers to conduct compliance audits. | 05-05-2011 |
20110112954 | Method and System for Providing Risk Information in Connection with Transaction Processing - A system for providing real-time risk mitigation for an authorization system. The system receives authorization requests from multiple merchants (or their respective acquirers) and processes such requests. Each processed request is then forwarded to its corresponding issuer for further authorization. Each processed request includes an authorization message. The authorization message can include a risk score, a number of reason codes, and a number of condition codes. The use of the risk score, reason codes and condition codes allows issuers to make better informed decisions with respect to providing authorizations. | 05-12-2011 |
20110119155 | VERIFICATION OF PORTABLE CONSUMER DEVICES FOR 3-D SECURE SERVICES - Apparatuses, methods, and systems pertaining to the verification of portable consumer devices for 3-D Secure Systems are disclosed. In one implementation, a verification token is coupled to a computer by a USB connection so as to use the computer's networking facilities. The verification token reads identification information from a user's portable consumer device (e.g., credit card) and sends the information to a validation entry over a communications network using the computer's networking facilities. The validation entity applies one or more validation tests to the information that it receives from the verification token. If a selected number of tests are passed, the validation entity sends a 3-D Secure datum to the verification token. The verification token may enter the 3-D Secure datum into a hidden field of a Purchase Authentication Page appearing on the computer's display. | 05-19-2011 |
20110159850 | AUTHENTICATION AND HUMAN RECOGNITION TRANSACTION USING A MOBILE DEVICE WITH AN ACCELEROMETER - Methods, devices, and systems are presented for screen locking or delaying the screen locking of mobile devices, such as smart phones, based on whether the gait of the current user match that of its true, authorized owner. A user's gait can be measured using accelerometers embedded in the device. Other movements, such as where a user normally goes to work, can be measured using GPS or other positional location data and used to lock or delay locking of the screen. | 06-30-2011 |
20110159857 | INPUT DEVICE WITH AN ACCELEROMETER - Methods, devices, and systems are described for bumping a mobile device, such as a smart phone, against a fixed poster board display at a store to initiate a download of coupons, advertisements, or other benefits to the mobile device. Products can be rated by a user's up/down bump or other bump patterns. Using accelerometer-based inertial measurements, multiple users can control multiple mouse cursors on a large display with their mobile devices in order to select information to be downloaded to their mobile devices. | 06-30-2011 |
20110161136 | CUSTOMER MAPPING USING MOBILE DEVICE WITH AN ACCELEROMETER - Methods, devices, and systems are presented for detecting where shoppers in a store stop, turn, and look from accelerometers in their own smart phones or other mobile devices. These movement events can be correlated with merchandise on their receipts as well as the movement events and merchandise on the receipts of other users so that a map of the store's wares can be generated. The map can be used to inform manufacturers where their merchandise is stocked in the store or to advertise to shoppers as they browse the store. | 06-30-2011 |
20110187505 | Access Using a Mobile Device with an Accelerometer - Embodiments of the present invention are directed to systems, apparatuses and methods for using a mobile device with an accelerometer to gain access into a secured or restricted area. A first device and a second device interact by making physical contact with each other thereby generating interaction data that is representative of the physical interaction between the first and second device. The first and second device may be mobile phones. The second device may be a point of sale terminal, access point device, or any other stationary (i.e., in a fixed position) device positioned at a line, door, gate, or entrance. A server computer determines, based on interaction data, that the first device and the second device made physical contact. After determining that the first device and the second device made contact, communications may be initiated between the devices. Communications may relate an access transaction comprising an exchange of information, such as credentials, between a prospective entrant (operating the first device) and a gatekeeper (operating the second device) to verify that the prospective entrant is permitted or is not permitted access to a particular area that is secured or restricted by the gatekeeper. Other embodiments are direct to confirmation transactions. Access transaction and confirmation transactions may be combined with a financial transaction using a payment processing network. | 08-04-2011 |
20110187642 | Interaction Terminal - Embodiments of the present invention are directed to systems, apparatuses and methods for using a mobile device with an accelerometer to conduct a financial transaction by making contact with an interaction terminal, thereby generating interaction data that is representative of the physical contact between the mobile device and the interaction terminal. The mobile device may be a mobile phone. The interaction terminal may be a point of sale terminal, access point device, or any other stationary (i.e., in a fixed position) device positioned at a line, door, gate, or entrance. A mobile device with an accelerometer physically contacts the interaction terminal. The interaction terminal flexes, recoils, or moves and generates interaction data (e.g., accelerometer, location, time data, etc.) representative of the physical interaction between the mobile device and the interaction terminal. A server computer determines, based on interaction data, that the mobile device and the interaction terminal made physical contact. After determining that the mobile device and the interaction terminal made contact, communication may be initiated between the devices. Communications may relate to processing a payment transaction using a payment processing network. | 08-04-2011 |
20110189981 | Transaction Using A Mobile Device With An Accelerometer - Embodiments of the invention may use a first accelerometer to measure first acceleration data of a first device. Other interaction data, including time data and geographic location data, generated by the first device may also be recorded. First acceleration data is compared by a remote server computer to second acceleration data generated by a second accelerometer in a second device. If the first and second accelerometer data are substantially equal, it can be determined that the devices have interacted and communications can be initiated. After communications are initiated, a financial transaction is conducted. Accelerometer data may be stored and/or used as part of the authentication process in a payment processing network. Other embodiments of the invention use the accelerometer to generate movement security data to make financial transaction more secure. Accelerometer data is used for authentication, security, encryption, session keys, non-repudiation, or fraud protection. | 08-04-2011 |
20110191237 | Information Access Device and Data Transfer - Embodiments of the present invention are directed to systems, apparatuses and methods for using a first device with an accelerometer to transfer data by making contact with a second device with an accelerometer, thereby generating interaction data that is representative of the physical contact between the mobile device and the second device. The first device may be a mobile phone. The second device may be a mobile phone or a stationary kiosk or terminal. A first device with an accelerometer physically contacts the second device. Each of the first and second devices generate interaction data (e.g., accelerometer, location, time data, etc.) representative of the physical interaction between the first and second device. A server computer determines, based on interaction data, that the first device and the second device physically contact each other. After determining that the mobile device and the second device made contact, communications may be initiated between the devices. Communications may include customer-provided information (e.g., shopping lists) and merchant-provided information (e.g., items in stock or on sale from the consumer's shopping list). In some embodiments, at least two independent interactions between three devices transfer data from a first computing device to a second computing device, after each of the first and second computing devices independently interacts with a mobile device. | 08-04-2011 |
20110284626 | CRACK EMBOSSING USING DIAMOND TECHNOLOGY - A portable consumer device having a substrate layer, a protective layer and a diamond-based brittle material layer having an intentionally created unique fissure or cracked patterns or crystal zone boundaries and systems and methods for making and using same are disclosed. The diamond-based brittle material layer includes a diamond material. The unique random fissure or cracked pattern and crystal zone boundaries, or the electromagnetic signature based thereon, of the brittle material layer are detected and used to authenticate the portable consumer device. | 11-24-2011 |
20110291814 | AUTO ACTIVATION OF A MOBILE DEVICE - Embodiments of the invention are directed to apparatuses, systems, and methods for automatically activating a consumer device using a sensor capable of detecting an external stimulus and location determination system capable of providing current location data for the consumer device when a user receives a device. The location determination system provides location data, which is sent to the activation server, in response to the sensor actuating. The location data determined at the time the sensor senses the external stimuli is compared to location data stored on the activation server to automatically activate the consumer device. | 12-01-2011 |
20110320344 | EVOLVING PAYMENT DEVICE - A computer apparatus is provided that comprises processor and a computer-readable medium coupled to the processor. The computer readable medium comprises code executable by the processor for implementing a method that comprises receiving a first indication at a computer apparatus that an evolving token has been used in a first transaction. Use of the evolving token in the first transaction provides a first benefit. The method further comprises that in a subsequent transaction after the first transaction, the evolving token changes so that it is associated with a payment account and the evolving token can be used to make payments. | 12-29-2011 |
20120018506 | VERIFICATION OF PORTABLE CONSUMER DEVICE FOR 3-D SECURE SERVICES - Apparatuses, methods, and systems pertaining to the verification of portable consumer devices for 3-D Secure Systems are disclosed. In one implementation, a verification token is coupled to a computer by a USB connection so as to use the computer's networking facilities. The verification token reads identification information from a user's portable consumer device (e.g., credit card) and sends the information to a validation entry over a communications network using the computer's networking facilities. The validation entity applies one or more validation tests to the information that it receives from the verification token. If a selected number of tests are passed, the validation entity sends a 3-D Secure datum to the verification token. The verification token may enter the 3-D Secure datum into a hidden field of a Purchase Authentication Page appearing on the computer's display. | 01-26-2012 |
20120116975 | SYSTEM AND METHOD UTILIZING DEVICE INFORMATION - A method for correlating information received directly from an access device operated by a user, and information from a merchant server is disclosed. The method includes receiving, at a server computer of a non-merchant entity, device information specifically associated with an access device directly from the access device, and also receiving, at the server computer of the non-merchant entity, transaction information from a merchant server. The server computer then correlates and collected information and can perform additional processing. | 05-10-2012 |
20120116976 | VERIFICATION OF PORTABLE CONSUMER DEVICE FOR 3-D SECURE SERVICES - Apparatuses, methods, and systems pertaining to the verification of portable consumer devices for 3-D Secure Systems are disclosed. In one implementation, a verification token is coupled to a computer by a USB connection so as to use the computer's networking facilities. The verification token reads identification information from a user's portable consumer device (e.g., credit card) and sends the information to a validation entry over a communications network using the computer's networking facilities. The validation entity applies one or more validation tests to the information that it receives from the verification token. If a selected number of tests are passed, the validation entity sends a 3-D Secure datum to the verification token. The verification token may enter the 3-D Secure datum into a hidden field of a Purchase Authentication Page appearing on the computer's display. | 05-10-2012 |
20120123882 | Cardless Challenge Systems and Methods - Systems, methods, and apparatus for handling and/or authorizing payment requests by a consumer for a transaction are provided. Challenge questions may be presented from the non-merchant to the consumer after receiving the payment information, thereby allowing a judicious determination of when to ask such challenge questions and allowing complex and probative questions. The time limit for such challenge questions may advantageously be unconstrained, while still preserving security. Also, a risk analysis may be started prior to the consumer submitting payment information, thus allowing an efficient and complex risk analysis. Information about an access device used by the consumer may be obtained at the non-merchant from the access device with code sent to the access device from the merchant, and the device information may be used in the risk analysis. | 05-17-2012 |
20120136735 | METHOD AND SYSTEM FOR GENERATING A DYNAMIC VERIFICATION VALUE - A method is disclosed. The method includes generating a verification value in response to a transaction involving a portable consumer device, where the verification value is generated using a first dynamic data element and a second dynamic data element. The verification value is sent to a service provider associated with the portable consumer device so that the service provider can verify the transaction. | 05-31-2012 |
20120150744 | Systems and Methods for Secure and Transparent Cardless Transactions - Systems, methods, and apparatus for handling and/or authorizing payment requests by a consumer for a transaction are provided. Payment information can be sent directly from a consumer to a non-merchant, thereby allowing no new entities to obtain the payment information. Transaction identifiers can be used to facilitate communications among the entities. The payment information can be sent to the non-merchant via a merchant application with a submit payment button directed to the non-merchant so little or no deviations from standard practices are required. | 06-14-2012 |
20120158591 | CONSUMER AUTHENTICATION SYSTEM AND METHOD - A method for authenticating a consumer. The method includes receiving an authorization request message associated with a consumer conducting a transaction with a portable consumer device. A challenge message is sent to the consumer, where the challenge message is dynamic or semi-dynamic. A challenge response message is received from the consumer, and an authorization response message is sent to the consumer. The authorization response message indicates whether or not the transaction is authorized. | 06-21-2012 |
20120166341 | DEVICE INCLUDING AUTHENTICATION GLYPH - A method is disclosed. It includes displaying, by a device, an authentication image including a plurality of image elements comprising a set of image elements, wherein the image elements in the set of image elements are located at a set of positions on a display screen. The method also comprises receiving, at the device, a glyph having a configuration corresponding to the set of image elements from a user while the authentication image is displayed. The method further comprises determining if the glyph is authentic, and initiating a payment transaction after receiving the glyph. | 06-28-2012 |
20120198518 | OBSERVABLE MOMENT ENCRYPTION - A method, system and apparatus for encrypting a consumer identification number contained in a portable consumer device by gradually changing a consumer identification number when an observable moment is observed is disclosed. Observable moments can be exposure to light or an electromagnetic field, use of the portable consumer device or a change in temperature. A pattern or history of how the consumer identification number is gradually changed is used to authenticate the portable consumer device or the consumer. | 08-02-2012 |
20120215693 | METHOD AND SYSTEM FOR MANAGING DATA AND ENABLING PAYMENT TRANSACTIONS BETWEEN MULITPLE ENTITIES - A system for conducting payment transaction includes a network-enabled server that communicates with one or more user devices, other network-enabled server computers, and a payment processing network server computer. The network-enabled server facilitates transactions between one or more merchants and users by a managing data flow and interactions between the merchants and the users, providing storage area for storing of all transaction related documents, and providing seamless integration with a payment processing network for payment processing. | 08-23-2012 |
20120271660 | CLOUD SERVICE FACILITATOR APPARATUSES, METHODS AND SYSTEMS - The CLOUD SERVICE FACILITATOR APPARATUSES, METHODS AND SYSTEMS (“CSF”) transforms user purchase requests, refund requests, and product/service replacement requests via CSF components into transaction records, refunds, and replacement products/services outputs. The CSF may receive a consumer purchase request for a cloud service from a merchant. In response to the request, the CSF may generate a unique record key for the purchase and may transmit the unique record key to the merchant. The CSF may further receive additional transaction information and the unique record key from the merchant. In response to the received information and the unique key, the CSF may provide additional service to the merchant or the consumer. | 10-25-2012 |
20120271770 | MANAGING ELECTRONIC TOKENS IN A TRANSACTION PROCESSING SYSTEM - A method for the use of electronic transactional tokens includes: generating transactional tokens including a first token; associating each of the transactional tokens with one of a group of users; monitoring usage of the transactional tokens in a multitude of transactions by the users; and responsive to the monitoring, updating the first token from a first state to a second state. The tokens may be generated and monitored using a token processing system, which uses transaction data received by a transaction handler that is handling transaction processing for the transactions. | 10-25-2012 |
20120278155 | USING MIX-MEDIA FOR PAYMENT AUTHORIZATION - Techniques for identifying a user and authenticating payment transactions based on the identification include requesting the user to send his audio, video, and/or image from the point of sale location and comparing the received audio, video, and/or image to an audio/video/image on file to identify and authenticate the user as being the official holder of the payment device being used in the transaction. Once, the user is authenticated, the payment processing can be performed using conventional techniques. Some techniques involve use of accelerometer data associated with the user in addition to or in lieu of the audio, video, and/or image data to perform the identification and authentication of the user. | 11-01-2012 |
20120303425 | MERCHANT-CONSUMER BRIDGING PLATFORM APPARATUSES, METHODS AND SYSTEMS - The MERCHANT-CONSUMER BRIDGING PLATFORM APPARATUSES, METHODS AND SYSTEMS (“MCB-Platform”) various activity requests (e.g., transaction request, merchant information update request, offer issuance request, etc.) via MCB-Platform components into transaction records and merchant database updates outputs. In one implementation, a method is disclosed, comprising: receiving an activity request including merchant information associated with a merchant; retrieving a previously stored merchant record from a database; determining merchant information update indicia based on a comparison of the merchant information and the previously stored merchant record; determining a confidence metric for the merchant information update; retrieving a confidence requirement based on the activity request; determining, within a low-latency processing time-frame, whether the determined confidence metric satisfies the retrieved confidence requirement; performing the requested activity and updating the previously stored merchant record with the merchant information update indicia when the determined confidence metric satisfies the retrieved confidence requirement; and declining the activity request when the determined confidence metric satisfies the retrieved confidence requirement. | 11-29-2012 |
20120310831 | REPUTATION MANAGEMENT IN A TRANSACTION PROCESSING SYSTEM - A method includes: receiving information regarding a plurality of completed transactions from a plurality of users; receiving a query from a first user regarding a proposed transaction; determining at least one affinity between the first user and the plurality of users based on the information; determining a ranking or expectation of success for each of a plurality of potential entities for the proposed transaction based on the at least one affinity; selecting a plurality of selected entities based on the ranking or expectation of success for each of the potential entities; and sending, in response to the query, the plurality of selected entities to the first user. | 12-06-2012 |
20120310832 | PAYMENT TRANSACTION USING MOBILE PHONE AS RELAY - Systems and methods of conducting a payment transaction using a mobile phone as a relay. The systems and methods receive transaction information associated with a transaction at a mobile communication device from a merchant. They send the transaction information with the mobile communication device to an issuer associated with the mobile communication device. The issuer thereafter sends an authorization response message to the merchant. | 12-06-2012 |
20120310838 | LOCAL USAGE OF ELECTRONIC TOKENS IN A TRANSACTION PROCESSING SYSTEM - A method for the use of electronic transactional tokens includes: generating a plurality of transactional tokens including a first token; associating each of the transactional tokens with a plurality of users, the first token associated with a first user; monitoring usage of the transactional tokens in a plurality of transactions in a local region or network; and in response to receiving transactional data for the first transaction, updating the first token from a first state to a second state (e.g., to provide a benefit when the token is applied in the local region or network). The tokens may be generated and monitored using a token processing system, which uses transaction data received by a transaction handler that is handling transaction processing for the transactions. | 12-06-2012 |
20130036003 | INPUT DEVICE WITH AN ACCELEROMETER - Methods, devices, and systems are described for bumping a mobile device, such as a smart phone, against a fixed poster board display at a store to initiate a download of coupons, advertisements, or other benefits to the mobile device. Products can be rated by a user's up/down bump or other bump patterns. Using accelerometer-based inertial measurements, multiple users can control multiple mouse cursors on a large display with their mobile devices in order to select information to be downloaded to their mobile devices. The multiple users can bump the display in order to select their items simultaneously. | 02-07-2013 |
20130036043 | IMAGE-BASED PRODUCT MAPPING - Methods, systems, computer-readable media, and apparatuses for image-based product mapping are presented. In some embodiments, a server computer may receive, from a first computing device, a first image and information identifying a first location at which the first image was captured. The first image may include a first product. Subsequently, the server computer may receive, from a second computing device, a second image and information identifying a second location at which the second image was captured. The second image may include a second product, and the second location may be different from the first location. The server computer then may analyze the first image to identify the first product and the second image to identify the second product. Thereafter, the server computer may store, in at least one database, first information associating the first product with the first location, and second information associating the second product with the second location. | 02-07-2013 |
20130144888 | DYNAMIC NETWORK ANALYTICS SYSTEM - Embodiments of the invention is directed to a dynamic network analytics system capable of receiving and analyzing queries sent in data messages from data requesters. The queries contain a request from the data requester as to a risk level associated with an interaction conducted by a user. The dynamic network analytics system can determine an optimized process for determining the risk level of the interaction, based on an analysis of past interactions by the user and past interactions by users similar to the user. The dynamic network analytics system can retrieve data from internal and external data sources to generate a response to the query. The dynamic network analytics system conducts the optimized process and uses the retrieved data to generate risk assessments and risk scores in response to the query from the data requester. | 06-06-2013 |
20130191223 | SYSTEMS AND METHODS TO DETERMINE USER PREFERENCES FOR TARGETED OFFERS - A computing apparatus is configured to use a dynamic questionnaire, designed based on the spending patterns identified in the transaction data of a plurality of accounts, to determine the spending preferences of a user in accordance with the answers to the dynamic questionnaire and the spending patterns. Offers are customized for and targeted to the user based on the spending preferences of the user. | 07-25-2013 |
20130198077 | SEEDING CHALLENGES FOR PAYMENT TRANSACTIONS - Systems, methods, and apparatus are provided for authenticating a consumer using challenge questions. A response to a challenge question is verified via seeding the challenge question, receiving response, and deductively determining the answer. The verified response and challenge question may then be used to authenticate a consumer as part of an authorization process. | 08-01-2013 |
20130204886 | Multi-Source, Multi-Dimensional, Cross-Entity, Multimedia Encryptmatics Database Platform Apparatuses, Methods and Systems - The MULTI-SOURCE, MULTI-DIMENSIONAL, CROSS-ENTITY, MULTIMEDIA ENCRYPTMATICS DATABASE PLATFORM APPARATUSES, METHODS AND SYSTEMS (“EXDB”) transform data aggregated from various computer resources using EXDB components into updated entity profiles and/or social graphs. In one implementation, the EXDB aggregates data records including search results, purchase transaction data, service usage data, service enrollment data, and social data. The EXDB identifies data field types within the data records and their associated data values. From the data field types and their associated data values, the EXDB identifies an entity. The EXDB generates correlations of the entity to other entities identifiable from the data field types and their associated data values. The EXDB also associates attributes to the entity by drawing inferences related to the entity from the data field types and their associated data values. Using the generated correlations and associated attributes, the EXDB generates an updated profile and social graph of the entity. The EXDB provides the updated profile and social graph for an automated web form filling request. | 08-08-2013 |
20130204894 | Multi-Source, Multi-Dimensional, Cross-Entity, Multimedia Analytical Model Sharing Database Platform Apparatuses, Methods and Systems - The MULTI-SOURCE, MULTI-DIMENSIONAL, CROSS-ENTITY, MULTIMEDIA ANALYTICAL MODEL SHARING DATABASE PLATFORM APPARATUSES, METHODS AND SYSTEMS (“AMSDB”) transform data aggregated from various computer resources using AMSDB components into updated entity profiles and/or social graphs. In one implementation, the AMSDB aggregates data records including search results, purchase transaction data, service usage data, service enrollment data, and social data. The AMSDB identifies data field types within the data records and their associated data values. From the data field types and their associated data values, the AMSDB identifies an entity. The AMSDB generates correlations of the entity to other entities identifiable from the data field types and their associated data values. The AMSDB also associates attributes to the entity by drawing inferences related to the entity from the data field types and their associated data values. Using the generated correlations and associated attributes, the AMSDB generates an updated profile and social graph of the entity. The AMSDB provides the updated profile and social graph for an automated web form filling request. | 08-08-2013 |
20130218760 | FINANCIAL TRANSACTION TOKEN WITH ONBOARD POWER SOURCE - There is provided a card or token for use in financial transactions. The financial transaction token or card has an onboard energy storage device that enables onboard electronics to operate when the card is not in the proximity of a merchant Point-Of-Service (POS) terminal. In one implementation, the onboard energy storage device includes a capacitor such as a thin-film capacitor that stores sufficient energy to power onboard electronics without the need for an onboard battery. The card may be incorporated within various conventional apparatus such as a see-through and/or protective substrate, an item of clothing, an item of jewelry, a cell phone, a Personal Digital Assistant (PDA), a credit card, an identification card, a money holder, a wallet, a personal organizer, a keychain payment tag, and like personality. | 08-22-2013 |
20130226802 | VERIFICATION VALUE SYSTEM AND METHOD - A method is disclosed. The method includes generating a verification value in response to a transaction involving a portable consumer device, where the verification value is generated using a first dynamic data element and a second dynamic data element. The verification value is sent to a service provider associated with the portable consumer device so that the service provider can verify the transaction. | 08-29-2013 |
20130231974 | SYSTEMS AND METHODS TO QUANTIFY CONSUMER SENTIMENT BASED ON TRANSACTION DATA - A computing apparatus is configured to quantify consumer sentiment at an aggregated or micro level using transaction data that records the transactions processed by a transaction handler of a payment system. A quantification model is generated based on correlating transaction data with respective emotional content indices extracted from data sources, such as regional news, weather, stock markets, movie themes, local sports, employment, traffic conditions, etc. Using the quantification model, consumer sentiment can be evaluated at various granularity levels, based on the granularity of the user group and the time period of the transaction data used in the quantification model. | 09-05-2013 |
20130246215 | Multi-Source, Multi-Dimensional, Cross-Entity, Multimedia Merchant Analytics Database Platform Apparatuses, Methods and Systems - The MULTI-SOURCE, MULTI-DIMENSIONAL, CROSS-ENTITY, MULTIMEDIA MERCHANT ANALYTICS DATABASE PLATFORM APPARATUSES, METHODS AND SYSTEMS (“MDB”) transform data aggregated from various computer resources using MDB components into updated entity profiles and/or social graphs. In one implementation, the MDB aggregates data records including search results, purchase transaction data, service usage data, service enrollment data, and social data. The MDB identifies data field types within the data records and their associated data values. From the data field types and their associated data values, the MDB identifies an entity. The MDB generates correlations of the entity to other entities identifiable from the data field types and their associated data values. The MDB also associates attributes to the entity by drawing inferences related to the entity from the data field types and their associated data values. Using the generated correlations and associated attributes, the MDB generates an updated profile and social graph of the entity. The MDB provides the updated profile and social graph for an automated web form filling request. | 09-19-2013 |
20130246342 | Multi-Source, Multi-Dimensional, Cross-Entity, Multimedia Centralized Personal Information Database Platform Apparatuses, Methods and Systems - THE MULTI-SOURCE, MULTI-DIMENSIONAL, CROSS-ENTITY, MULTIMEDIA CENTRALIZED PERSONAL INFORMATION DATABASE PLATFORM APPARATUSES, METHODS AND SYSTEMS (“CPDB”) transform data aggregated from various computer resources using CPDB components into updated entity profiles and/or social graphs. In one implementation, the CPDB aggregates data records including search results, purchase transaction data, service usage data, service enrollment data, and social data. The CPDB identifies data field types within the data records and their associated data values. From the data field types and their associated data values, the CPDB identifies an entity. The CPDB generates correlations of the entity to other entities identifiable from the data field types and their associated data values. The CPDB also associates attributes to the entity by drawing inferences related to the entity from the data field types and their associated data values. Using the generated correlations and associated attributes, the CPDB generates an updated profile and social graph of the entity. The CPDB provides the updated profile and social graph for an automated web form filling request. | 09-19-2013 |
20130262312 | Mobile Alert Transaction System and Method - A method and system for providing geographic location notifications of payment transactions is disclosed. One embodiment of the invention is directed to a method including receiving an authorization request message associated with a transaction, the transaction associated with a portable consumer device and an access device at a merchant. A geographic location of the transaction is determined. It is determined whether a notification message indicating that the transaction is occurring is required. Upon determining that the notification message is required, the notification message is sent to a notification device operated by a consumer and the notification device receives the notification message substantially simultaneously with the merchant's receipt of an authorization response message. A graphical depiction of the notification message is displayed on a map on the notification device. | 10-03-2013 |
20130275310 | TERMINAL DATA ENCRYPTION - A method is disclosed. The method includes generating an initial key after interacting with an access device, storing the initial key at a key storage location, altering the initial key with a public key to form an altered key, and sending the altered key to a server computer along with an identifier for the access device. The altered key is changed to the initial key at the server computer and is stored with the identifier in a database in operative communication with the server computer. The initial keys that are stored at the key storage location and in the database are used to alter and restore transaction data associated with multiple financial transactions that are conducted using the access device. | 10-17-2013 |
20130282591 | Method And System Using Candidate Dynamic Data Elements - A method and computer readable medium for conducting a transaction, comprising receiving a verification value and a portion of a dynamic data element, determining candidate dynamic data elements using the portion of the dynamic data element, calculating candidate verification values using candidate dynamic data elements, and determining if the received verification value matches any of the candidate verification values, wherein the transaction is thereafter authenticated if a candidate verification value matches a candidate verification value. | 10-24-2013 |
20130332256 | EVOLVING PAYMENT DEVICE - A computer apparatus is provided that comprises processor and a computer-readable medium coupled to the processor. The computer readable medium comprises code executable by the processor for implementing a method that comprises receiving a first indication at a computer apparatus that an evolving token has been used in a first transaction. Use of the evolving token in the first transaction provides a first benefit. The method further comprises that in a subsequent transaction after the first transaction, the evolving token changes so that it is associated with a payment account and the evolving token can be used to make payments. | 12-12-2013 |
20130339249 | ONLINE CHALLENGE-RESPONSE - Embodiments of the invention enable cardholders conducting an online transaction to be authenticated in real-time using a challenge-response application. The challenge-response application can be administered by an issuer or by a third party on-behalf-of an issuer. A challenge question can be presented to the cardholder, and the cardholder's response can be verified. The challenge question presented can be selected based on an analysis of the risk of the transaction and potentially other factors. A variety of dynamic challenge questions can be used without the need for the cardholder to enroll into the program. Additionally, there are many flexible implementation options of the challenge-response application that can be adjusted based on factors such as the location of the merchant or the location of the consumer. | 12-19-2013 |
20130346294 | RISK MANAGER OPTIMIZER - Embodiments of the invention broadly described, introduce systems and methods for automatically generating rules. One embodiment of the invention discloses a method for generating a candidate rule. The method comprises receiving transaction data comprising a plurality of fields, wherein each field is associated with one or more field values, constructing a rule graph, wherein vertices in the rule graph correspond to a plurality of the one or more field values, generating a tree, wherein generating the tree comprises selecting an edge from a set of edges connecting a vertex in the tree with a vertex not in the tree, and adding the edge to the tree if the edge has a maximum signal-to-noise value of all edges in the set of edges, and converting the tree into a candidate rule. | 12-26-2013 |
20140006284 | PRE-AUTHORIZATION OF A TRANSACTION USING PREDICTIVE MODELING | 01-02-2014 |
20140040137 | SECURE CHECKOUT AND CHALLENGE SYSTEMS AND METHODS - A method for correlating information received directly from an access device operated by a user, and information from a merchant server is disclosed. The method includes receiving, at a server of a merchant entity from an access device used by a consumer, a checkout request to initiate a transaction, providing, from the merchant server to a server of a non-merchant entity, transaction information associated with said transaction, wherein the transaction information comprises a merchant ID, and receiving, at the merchant server from the non-merchant server, a response message regarding the transaction, wherein the response message is based on a correlation between the transaction information and device information specifically associated with the access device and provided directly from the access device to the non-merchant server, and is based on additional processing associated with the transaction information and the device information, performed by the non-merchant server. | 02-06-2014 |
20140067684 | SYSTEMS AND METHODS FOR SECURE AND TRANSPARENT CARDLESS TRANSACTIONS - Systems, methods, and apparatus for handling and/or authorizing payment requests by a consumer for a transaction are provided. Payment information can be sent directly from a consumer to a non-merchant, thereby allowing no new entities to obtain the payment information. Transaction identifiers can be used to facilitate communications among the entities. The payment information can be sent to the non-merchant via a merchant application with a submit payment button directed to the non-merchant so little or no deviations from standard practices are required. | 03-06-2014 |
20140115338 | DIGITAL BROADCAST METHODS USING SECURE MESHES AND WAVELETS - Methods and apparatuses are presented for securely providing digital streaming data to subscriber devices using encrypted wavelet meshes. A recorded image may be subdivided into three sources of data: light sources, camera angles, and the objects themselves. Each of these sources of data may be considered unique from each other, and the totality of the three sources of data may comprise a complete image. Without one of the sources of data, the image may not be complete. Each of the three sources of data may therefore be characterized as key spaces, wherein encrypting part of or the entirety of even one of these key spaces prevents the complete image from being viewed. Methods and apparatuses are provided for utilizing the concept of encrypting at least a portion of at least one of the three key spaces in order to securely and/or privately transmit image data to subscribers. | 04-24-2014 |
20140188697 | METHOD AND SYSTEM FOR PROVIDING RISK INFORMATION IN CONNECTION WITH TRANSACTION PROCESSING - A system for providing real-time risk mitigation for an authorization system. The system receives authorization requests from multiple merchants (or their respective acquirers) and processes such requests. Each processed request is then forwarded to its corresponding issuer for further authorization. Each processed request includes an authorization message. The authorization message can include a risk score, a number of reason codes, and a number of condition codes. The use of the risk score, reason codes and condition codes allows issuers to make better informed decisions with respect to providing authorizations. | 07-03-2014 |
20140236828 | SYSTEMS AND METHODS FOR SECURE AND TRANSPARENT CARDLESS TRANSACTIONS - Systems, methods, and apparatus for handling and/or authorizing payment requests by a consumer for a transaction are provided. Payment information can be sent directly from a consumer to a non-merchant, thereby allowing no new entities to obtain the payment information. Transaction identifiers can be used to facilitate communications among the entities. The payment information can be sent to the non-merchant via a merchant application with a submit payment button directed to the non-merchant so little or no deviations from standard practices are required. | 08-21-2014 |
20140244511 | ONLINE CHALLENGE-RESPONSE - Embodiments of the invention enable cardholders conducting an online transaction to be authenticated in real-time using a challenge-response application. The challenge-response application can be administered by an issuer or by a third party on-behalf-of an issuer. A challenge question can be presented to the cardholder, and the cardholder's response can be verified. The challenge question presented can be selected based on an analysis of the risk of the transaction and potentially other factors. A variety of dynamic challenge questions can be used without the need for the cardholder to enroll into the program. Additionally, there are many flexible implementation options of the challenge-response application that can be adjusted based on factors such as the location of the merchant or the location of the consumer. | 08-28-2014 |
20140249945 | SYSTEM AND METHOD FOR SECURED ACCOUNT NUMBERS IN PROXIMITY DEVICES - A method and system for using a secured account number for processing proximity types of wireless financial transactions associated with portable consumer proximity devices is disclosed. In one embodiment, the method includes receiving a proximity type of wireless financial transaction request along with a secured account number from a portable proximity consumer device such as a contactless smart card, converting the secured account number to the user's real account number, and transmitting the financial transaction request along with the user's real account number to the issuer of the user's real account number for authorization and processing. | 09-04-2014 |
20140258113 | SYSTEM AND METHOD FOR SECURED ACCOUNT NUMBERS IN PROXIMITY DEVICES - A method and system for using a secured account number for processing proximity types of wireless financial transactions associated with portable consumer proximity devices is disclosed. In one embodiment, the method includes receiving a proximity type of wireless financial transaction request along with a secured account number from a portable proximity consumer device such as a contactless smart card, converting the secured account number to the user's real account number, and transmitting the financial transaction request along with the user's real account number to the issuer of the user's real account number for authorization and processing. | 09-11-2014 |
20140304055 | Using Mix-Media for Payment Authorization - Techniques for identifying a user and authenticating payment transactions based on the identification include requesting the user to send his audio, video, and/or image from the point of sale location and comparing the received audio, video, and/or image to an audio/video/image on file to identify and authenticate the user as being the official holder of the payment device being used in the transaction. Once the user is authenticated, the payment processing can be performed using conventional techniques. Some techniques involve use of accelerometer data associated with the user in addition to or in lieu of the audio, video, and/or image data to perform the identification and authentication of the user. | 10-09-2014 |
20140325606 | SERVICE ACTIVATION USING ALGORITHMICALLY DEFINED KEY - Systems and methods for service activation using algorithmically defined keys are disclosed. A consumer who has a relationship with a first party may wish to enroll in a service provided by a third party. The first party can maintain control of such enrollments through the use of algorithmically defined keys. The algorithmically defined keys also allow the third party service provider to verify data provided by the consumer as matching data stored by the first party. The verification provides for data synchronization without requiring the third party to have access to the first parties data systems. | 10-30-2014 |
20140337175 | Universal Electronic Payment Apparatuses, Methods and Systems - The UNIVERSAL ELECTRONIC PAYMENT APPARATUS, METHODS AND SYSTEMS (“UEP”) transform touchscreen inputs into a virtual wallet mobile application interface via UEP components into purchase transaction triggers and receipt notices. In one implementation the UEP provides, via a user device, a product information search request; and obtains, in response to the product information search request, information on a first product for sale by a first merchant and a second product for sale by a second merchant. The UEP generates a single purchase transaction request, using the information on the first product for sale by the first merchant and the second product for sale by the second merchant. The UEP provides, via the user device, the single purchase transaction request for payment processing. Also, the UEP obtains an electronic purchase receipt for the first product for sale by the first merchant and the second product for sale by the second merchant. | 11-13-2014 |
20140344142 | Gateway Service Platform - A gateway service platform is disclosed that provides access to a payment processing system via an open network such as the internet. The gateway service platform also provides access to service systems that provide a variety of services and applications offered by or affiliated with the payment processing system. The gateway service platform allows the payment processing system to reach users and to facilitate transactions on a wide variety of devices that may not otherwise be able to connect to payment processing system. Other devices, such as payment terminal devices, can also interact with a payment processing system through the gateway service platform using the same network and protocol. Embodiments of the invention allow devices on these open networks to connect with the payment processing system without having to change the existing infrastructure of the payment processing system. | 11-20-2014 |
20140372315 | METHOD AND SYSTEM FOR MANAGING DATA AND ENABLING PAYMENT TRANSACTIONS BETWEEN MULTIPLE ENTITIES - A system for conducting payment transaction includes a network-enabled server that communicates with one or more user devices, other network-enabled server computers, and a payment processing network server computer. The network-enabled server facilitates transactions between one or more merchants and users by a managing data flow and interactions between the merchants and the users, providing storage area for storing of all transaction related documents, and providing seamless integration with a payment processing network for payment processing. | 12-18-2014 |
20150025946 | ON-LINE AUTHORIZATION IN ACCESS ENVIRONMENT - A method is disclosed. The method includes interacting with a gate access device that is capable of preventing access to a location, where the gate access device subsequently sends an authorization request message to an issuer for approval, the authorization request message including a request to charge a predetermined amount of money to pay for access to a location, and entering the location if the gate access device receives an authorization response message indicating that the charge is authorized. | 01-22-2015 |