One or more surface features (e.g., capacitive buttons, fingerprint sensor) may be exposed on a surface of a card (e.g., chi payment card). The card may store multiple applications/accounts of a user. The card receives a selection of one of the accounts by the user placing a finger on or pressing on a surface feature associated with the selected account. The card provides credentials associated with the selected account to a terminal. The multi-application card may disable credentials associated with the remaining accounts thereby appearing as a single-application card to the terminal during a transaction.
G06Q 20/34 - Architectures, schémas ou protocoles de paiement caractérisés par l'emploi de dispositifs spécifiques utilisant des cartes, p.ex. cartes à puces ou cartes magnétiques
G06K 19/07 - Supports d'enregistrement avec des marques conductrices, des circuits imprimés ou des éléments de circuit à semi-conducteurs, p.ex. cartes d'identité ou cartes de crédit avec des puces à circuit intégré
G06K 19/073 - Dispositions particulières pour les circuits, p.ex. pour protéger le code d'identification dans la mémoire
G06K 19/077 - Supports d'enregistrement avec des marques conductrices, des circuits imprimés ou des éléments de circuit à semi-conducteurs, p.ex. cartes d'identité ou cartes de crédit avec des puces à circuit intégré - Détails de structure, p.ex. montage de circuits dans le support
A method includes an access device determining an interaction value associated with an interaction. The access device prompts a user operating a user device for a secret. The access device receives the secret. The access device receives an initial communication then a user device certificate comprising a public key from the user device. The access device then verifies the certificate. The access device concatenates at least the secret and an unpredictable number to form a concatenated value. The access device encrypts the concatenated value with the public key, then transmits the encrypted concatenated value. The user device decrypts the encrypted concatenated value with a private key, verifies the unpredictable number, verifies the secret, determines whether or not the interaction is approved, produces an interaction authorization result, and then provides the interaction authorization result to the contactless access device. The access device receives the interaction authorization result.
Techniques of generating a lattice-based verification matrix and signature vector are disclosed. The method enables a generating device to sample a gadget matrix and then generate a reduced gadget matrix. The generating device may then sample a trapdoor matrix and use the trapdoor matrix and the reduced gadget matrix to generate a verification matrix. A sending device may receive the trapdoor matrix and the verification matrix from the generating device, in addition to receiving a message. The sending device may then use the trapdoor matrix and the verification matrix to generate a signature vector for the message. A verification device can receive the verification matrix, the message, and the signature vector. The verification device may use the verification matrix and the signature vector to verify the message.
H04L 9/32 - Dispositions pour les communications secrètes ou protégées; Protocoles réseaux de sécurité comprenant des moyens pour vérifier l'identité ou l'autorisation d'un utilisateur du système
H04L 9/30 - Clé publique, c. à d. l'algorithme de chiffrement étant impossible à inverser par ordinateur et les clés de chiffrement des utilisateurs n'exigeant pas le secret
Techniques of generating a lattice-based verification matrix and signature vector are disclosed. The method enables a generating device to sample a gadget matrix and then generate a reduced gadget matrix. The generating device may then sample a trapdoor matrix and use the trapdoor matrix and the reduced gadget matrix to generate a verification matrix. A sending device may receive the trapdoor matrix and the verification matrix from the generating device, in addition to receiving a message. The sending device may then use the trapdoor matrix and the verification matrix to generate a signature vector for the message. A verification device can receive the verification matrix, the message, and the signature vector. The verification device may use the verification matrix and the signature vector to verify the message.
H04L 9/32 - Dispositions pour les communications secrètes ou protégées; Protocoles réseaux de sécurité comprenant des moyens pour vérifier l'identité ou l'autorisation d'un utilisateur du système
5.
TERMINAL TYPE IDENTIFICATION IN INTERACTION PROCESSING
A method is disclosed. The method includes receiving, by a user device from an access device, an available applications request message. The available applications request message includes an access device type identifier. The method also includes determining whether an association exists between the access device type identifier and one or more application identifiers of a plurality of application identifiers stored on the user device. The plurality of application identifiers respectively correspond to different applications on the user device. The method also includes transmitting, by the user device, to the access device, based in part on whether the association exists, an available applications response. The available applications response includes the one or more application identifiers of the plurality of application identifiers associated with the access device type identifier.
G06Q 20/40 - Autorisation, p.ex. identification du payeur ou du bénéficiaire, vérification des références du client ou du magasin; Examen et approbation des payeurs, p.ex. contrôle des lignes de crédit ou des listes négatives
H04W 4/12 - Messagerie; Boîtes aux lettres; Annonces
G06Q 20/32 - Architectures, schémas ou protocoles de paiement caractérisés par l'emploi de dispositifs spécifiques utilisant des dispositifs sans fil
G06Q 20/36 - Architectures, schémas ou protocoles de paiement caractérisés par l'emploi de dispositifs spécifiques utilisant des portefeuilles électroniques ou coffres-forts électroniques
H04W 4/30 - Services spécialement adaptés à des environnements, à des situations ou à des fins spécifiques
A system and method are provided which include receiving, from a first application on a user device, an indication that a user has been authenticated and receiving, from a second application on the user device, an indication that the user is detected. The user device receives the indication that the user is detected from a wearable device on the user. Based on receiving the two indications within a time period, a trust token is generated or maintained for the user.
H04W 12/33 - Sécurité des dispositifs mobiles; Sécurité des applications mobiles utilisant des dispositifs portables, p.ex. utilisant une montre intelligente ou des lunettes intelligentes
Techniques are disclosed which include receiving, by a central entity computer, a request for digital currency. The request includes a serial number and a denomination of a physical currency. The central entity computer generates the digital currency for the denomination and linked to the serial number. The generating includes recording the digital currency on a blockchain. The central entity computer transmits a notification of the generation of the digital currency. The central entity computer causes removal of the physical currency from circulation in a fiat currency system.
G06Q 20/06 - Circuits privés de paiement, p.ex. impliquant de la monnaie électronique utilisée uniquement entre les participants à un programme commun de paiement
G06Q 20/36 - Architectures, schémas ou protocoles de paiement caractérisés par l'emploi de dispositifs spécifiques utilisant des portefeuilles électroniques ou coffres-forts électroniques
G06Q 20/38 - Architectures, schémas ou protocoles de paiement - leurs détails
G06Q 20/40 - Autorisation, p.ex. identification du payeur ou du bénéficiaire, vérification des références du client ou du magasin; Examen et approbation des payeurs, p.ex. contrôle des lignes de crédit ou des listes négatives
H04L 9/32 - Dispositions pour les communications secrètes ou protégées; Protocoles réseaux de sécurité comprenant des moyens pour vérifier l'identité ou l'autorisation d'un utilisateur du système
8.
SYSTEM, METHOD, AND COMPUTER PROGRAM PRODUCT FOR MOBILE DEVICE TRANSACTIONS
Provided is a system, method, and computer program product for conducting a transaction with a mobile device. The method includes generating, on the mobile device, a limited use key based at least partially on at least one biometric input from a user, receiving, on the mobile device, transaction data from a point-of-sale system via a direct wireless communication with the mobile device, the transaction data corresponding to a transaction between the user and a merchant, generating, on the mobile device, a cryptogram based at least partially on the limited use key and the transaction data, and communicating, from the mobile device, the cryptogram to the point-of-sale system via the direct wireless communication.
G06Q 20/20 - Systèmes de réseaux présents sur les points de vente
G06Q 20/40 - Autorisation, p.ex. identification du payeur ou du bénéficiaire, vérification des références du client ou du magasin; Examen et approbation des payeurs, p.ex. contrôle des lignes de crédit ou des listes négatives
G06F 21/32 - Authentification de l’utilisateur par données biométriques, p.ex. empreintes digitales, balayages de l’iris ou empreintes vocales
H04W 12/033 - Protection de la confidentialité, p.ex. par chiffrement du plan utilisateur, p.ex. trafic utilisateur
A system, method, and computer program product for authenticating a transaction initiated with a mobile device are discloses. The method includes receiving, from a point-of-sale system associated with a merchant, a cryptogram, an account identifier, and transaction data corresponding to a transaction between a user of the mobile device and the point-of-sale system, the cryptogram generated by the mobile device based on a limited use key, the limited use key generated by the mobile device based on at least one biometric input of the user; retrieving stored biometric data corresponding to the account identifier; generating a recreated limited use key based at least partially on the stored biometric data; generating a recreated cryptogram based at least partially on the recreated limited use key; comparing the recreated cryptogram to the cryptogram received from the point-of-sale system; and in response to determining that the recreated cryptogram matches the cryptogram received from the point-of-sale system, authenticating the transaction.
G06Q 20/40 - Autorisation, p.ex. identification du payeur ou du bénéficiaire, vérification des références du client ou du magasin; Examen et approbation des payeurs, p.ex. contrôle des lignes de crédit ou des listes négatives
Techniques for managing an application token may include providing, by a first service provider application on a communication device to a first service provider computer, a first request for a first application token, receiving, by an account management application on the communication device from a token service computer in communication with the first service provider computer, the first application token, and storing the first application token in a token container in the account management application.
H04W 80/12 - Protocoles de couche application, p.ex. protocole WAP [protocole d'application sans fil, Wireless Application Protocol]
H04W 12/04 - Gestion des clés, p.ex. par architecture d’amorçage générique [GBA]
G06Q 20/32 - Architectures, schémas ou protocoles de paiement caractérisés par l'emploi de dispositifs spécifiques utilisant des dispositifs sans fil
G06Q 20/36 - Architectures, schémas ou protocoles de paiement caractérisés par l'emploi de dispositifs spécifiques utilisant des portefeuilles électroniques ou coffres-forts électroniques
G06Q 20/38 - Architectures, schémas ou protocoles de paiement - leurs détails
H04W 12/30 - Sécurité des dispositifs mobiles; Sécurité des applications mobiles
11.
SYSTEMS AND METHODS FOR RECORDING DATA REPRESENTING MULTIPLE INTERACTIONS
A method for combining multiple interactions into a single record entry is disclosed. A data package can be created that represents a set of interactions, and each entity associated with an interaction can review the data package. Each entity can indicate agreement with the interactions by digitally signing the data package. Once signed by each involved entity, the data package can be stored in a record such as a blockchain.
H04L 9/30 - Clé publique, c. à d. l'algorithme de chiffrement étant impossible à inverser par ordinateur et les clés de chiffrement des utilisateurs n'exigeant pas le secret
H04L 9/32 - Dispositions pour les communications secrètes ou protégées; Protocoles réseaux de sécurité comprenant des moyens pour vérifier l'identité ou l'autorisation d'un utilisateur du système
The present disclosure relates generally to tokenization of a co-network account. A co/network account, as used herein, refers to an account associated with a first transaction processing network for processing transactions initiated using the account and a second transaction processing network for processing transactions initiated using the account. During provisioning of a co-network account onto a user device, a first token is generated for use with the first transaction processing network and a second token is generated for use with the second transaction processing network. Embodiments use the authentication result generated during the provisioning of the first token for the provisioning of the second token. Embodiments automatically provision multiple payment tokens on the user device upon determining that the account is associated with more than one transaction processing networks (e.g. the account is a co-network account).
H04L 9/32 - Dispositions pour les communications secrètes ou protégées; Protocoles réseaux de sécurité comprenant des moyens pour vérifier l'identité ou l'autorisation d'un utilisateur du système
G06F 21/30 - Authentification, c. à d. détermination de l’identité ou de l’habilitation des responsables de la sécurité
G06F 21/44 - Authentification de programme ou de dispositif
13.
SYSTEM AND METHOD EMPLOYING REDUCED TIME DEVICE PROCESSING
Methods and systems for facilitating a transaction are provided. A transaction involving an integrated circuit user device in contact with an access device is processed in less time, such that the user device can be removed at an earlier time. In embodiments, an access device provides an estimated value to a user device such that a cryptogram can be generated without waiting for a final value. Additionally, the access device can store user device data and then complete the transaction with the user device before authorizing the transaction, such that the user device can be removed without waiting for an authorization response.
H04L 9/32 - Dispositions pour les communications secrètes ou protégées; Protocoles réseaux de sécurité comprenant des moyens pour vérifier l'identité ou l'autorisation d'un utilisateur du système
14.
LOCATION VERIFICATION DURING DYNAMIC DATA TRANSACTIONS
Described herein is a platform and method for determining a confidence level associated with a transaction that utilizes dynamic data. In some embodiments, the confidence level is determined based on location data received in relation to the transaction. For example, some embodiments are directed to storing first location information collected from a mobile device provided in a request for the dynamic data, receiving second location information related to a transaction conducted using the dynamic data, and comparing the two with respect to the amount of time that has elapsed between collection of each to determine a confidence level associated with a likelihood that the transaction is authentic.
H04W 4/029 - Services de gestion ou de suivi basés sur la localisation
G06Q 20/40 - Autorisation, p.ex. identification du payeur ou du bénéficiaire, vérification des références du client ou du magasin; Examen et approbation des payeurs, p.ex. contrôle des lignes de crédit ou des listes négatives
G07C 9/29 - Enregistrement de l’entrée ou de la sortie d'une entité isolée comportant l’utilisation d’un laissez-passer le laissez-passer comportant des éléments électroniques actifs, p.ex. des cartes à puce
H04W 12/033 - Protection de la confidentialité, p.ex. par chiffrement du plan utilisateur, p.ex. trafic utilisateur
A reader device may include a midrange wireless transceiver, a controller coupled to the midrange wireless transceiver, and a memory coupled to the controller. The memory may store executable code, which when executed by the controller, causes the reader device to implement various operations including maintaining a transaction service attributes database in the memory. The operations may also include broadcasting a beacon including a transaction service indicator at a periodic interval using the midrange wireless transceiver, receiving a connection request from a communication device, and establishing a wireless connection with the communication device. The operations may further include performing an application selection process with the communication device, performing application data processing with the communication device, and performing authorization request processing for the communication device.
H04W 4/00 - Services spécialement adaptés aux réseaux de télécommunications sans fil; Leurs installations
H04W 4/06 - Répartition sélective de services de diffusion, p.ex. service de diffusion/multidiffusion multimédia; Services à des groupes d’utilisateurs; Services d’appel sélectif unidirectionnel
G06K 17/00 - Méthodes ou dispositions pour faire travailler en coopération des équipements couverts par plusieurs des groupes principaux , p.ex. fichiers automatiques de cartes incluant les opérations de transport et de lecture
16.
METHODS AND SYSTEMS FOR USING DIGITAL SIGNATURES TO CREATE TRUSTED DIGITAL ASSET TRANSFERS
A method and system are provided for transferring digital assets in a digital asset network. Network users can be centrally enrolled and screened for compliance. Standardized transfer processes and unique identifiers can provide a transparent and direct transfer process. Digital assets can include sufficient information for ensuring that a value will be provided, including one or more digital signatures, such that value can be made immediately available to recipients.
G06Q 20/38 - Architectures, schémas ou protocoles de paiement - leurs détails
G06Q 20/06 - Circuits privés de paiement, p.ex. impliquant de la monnaie électronique utilisée uniquement entre les participants à un programme commun de paiement
17.
AUTHENTICATION SYSTEMS AND METHODS USING LOCATION MATCHING
According to some embodiments of the invention, an authentication method is provided. Transaction data for a transaction is received at a communication device from an access device or a resource provider. The transaction data comprises a location of the access device. A location of the communication device is determined by the communication device. It is determined whether a distance between the location of the access device and the location of the communication device is within a predetermined threshold. The transaction is not authorized if the distance between the location of the access device and the location of the communication device is not within a predetermined threshold.
H04L 9/32 - Dispositions pour les communications secrètes ou protégées; Protocoles réseaux de sécurité comprenant des moyens pour vérifier l'identité ou l'autorisation d'un utilisateur du système
G06K 19/06 - Supports d'enregistrement pour utilisation avec des machines et avec au moins une partie prévue pour supporter des marques numériques caractérisés par le genre de marque numérique, p.ex. forme, nature, code
A computer-implemented method presents on a merchant checkout graphical user interface associated with a payment processor widget. The payment processor widget determines affiliations of a plurality of accounts and a plurality of issuers of a user. The payment processor widget via the merchant checkout graphical user interface defines at least one selectable graphic configured for receiving interactions of the user on the selectable graphic. In response to receiving the selection of the selectable graphic, the payment processor widget presents a field within the merchant checkout graphical user interface for receiving a credential from the user associated with an authentication widget of the particular issuer. The authentication widget communicates the credential to the particular issuer for authentication of the user. In response to receiving a successful authentication indicator from the particular issuer, the payment processor widget displays a message indicating that a transaction was approved.
G06Q 20/20 - Systèmes de réseaux présents sur les points de vente
G06Q 20/24 - Schémas de crédit, c. à d. de "paiement différé"
G06Q 20/30 - Architectures, schémas ou protocoles de paiement caractérisés par l'emploi de dispositifs spécifiques
G06Q 20/40 - Autorisation, p.ex. identification du payeur ou du bénéficiaire, vérification des références du client ou du magasin; Examen et approbation des payeurs, p.ex. contrôle des lignes de crédit ou des listes négatives
Techniques for provisioning access data may include receiving, by a first application installed on a communication device, user input selecting an account to provision to a second application installed on the communication device. The first application may invoke the second application and send a session identifier (ID) to the second application. The second application may send a user ID associated with the second application, a device ID, and the session ID to the first application. The first application may then generate encrypted provisioning request data and send the encrypted provisioning request data to the second application. The second application may send the encrypted provisioning request data to a remote server computer to request access data that can be used to access a resource. The second application may receive the access data provided by the remote server computer based on validation of the encrypted provisioning request data.
G06Q 20/36 - Architectures, schémas ou protocoles de paiement caractérisés par l'emploi de dispositifs spécifiques utilisant des portefeuilles électroniques ou coffres-forts électroniques
H04W 4/50 - Fourniture de services ou reconfiguration de services
G07C 9/29 - Enregistrement de l’entrée ou de la sortie d'une entité isolée comportant l’utilisation d’un laissez-passer le laissez-passer comportant des éléments électroniques actifs, p.ex. des cartes à puce
The dynamic checkout button apparatuses, methods and systems (DCB) transforms product page checkout request input and user identification input via DCB components such as offer/discount determination component and checkout button embedding component, into dynamic checkout button outputs.
G06Q 20/36 - Architectures, schémas ou protocoles de paiement caractérisés par l'emploi de dispositifs spécifiques utilisant des portefeuilles électroniques ou coffres-forts électroniques
H04B 5/00 - Systèmes de transmission à induction directe, p.ex. du type à boucle inductive
21.
ILLUSTRATION TO CONDUCT AN EXPEDITED ELECTRONIC TRANSACTION
A method to display an illustration to conduct an expedited electronic transaction is provided. Consumer identification information identifying a consumer is received. The consumer identification information is stored in association with a web browser of a consumer's device. A customized illustration is displayed based on the received consumer identification information on the consumer's device. A request is received for the expedited electronic transaction by swiping the customized illustration across a portion of the display of the consumer's device. Transaction data sufficient to complete the electronic transaction is sent to the merchant based on the swipe of the customized illustration across display of the consumer's device.
G06Q 20/40 - Autorisation, p.ex. identification du payeur ou du bénéficiaire, vérification des références du client ou du magasin; Examen et approbation des payeurs, p.ex. contrôle des lignes de crédit ou des listes négatives
22.
DYNAMIC CHECKOUT BUTTON APPARATUSES, METHODS AND SYSTEMS
The DYNAMIC CHECKOUT BUTTON APPARATUSES, METHODS AND SYSTEMS ("DCB") transforms product page checkout request input and user identification input via DCB components such as offer/discount determination component and checkout button embedding component, into dynamic checkout button outputs.
G06Q 20/10 - Architectures de paiement spécialement adaptées aux systèmes de banque à domicile
G06Q 20/12 - Architectures de paiement spécialement adaptées aux systèmes de commerce électronique
G06Q 20/32 - Architectures, schémas ou protocoles de paiement caractérisés par l'emploi de dispositifs spécifiques utilisant des dispositifs sans fil
G06Q 20/36 - Architectures, schémas ou protocoles de paiement caractérisés par l'emploi de dispositifs spécifiques utilisant des portefeuilles électroniques ou coffres-forts électroniques
G06Q 30/02 - Marketing; Estimation ou détermination des prix; Collecte de fonds
G06Q 30/06 - Transactions d’achat, de vente ou de crédit-bail
G06F 3/0481 - Techniques d’interaction fondées sur les interfaces utilisateur graphiques [GUI] fondées sur des propriétés spécifiques de l’objet d’interaction affiché ou sur un environnement basé sur les métaphores, p.ex. interaction avec des éléments du bureau telles les fenêtres ou les icônes, ou avec l’aide d’un curseur changeant de comport
G06F 3/0484 - Techniques d’interaction fondées sur les interfaces utilisateur graphiques [GUI] pour la commande de fonctions ou d’opérations spécifiques, p.ex. sélection ou transformation d’un objet, d’une image ou d’un élément de texte affiché, détermination d’une valeur de paramètre ou sélection d’une plage de valeurs
G06F 21/45 - Structures ou outils d’administration de l’authentification
Embodiments of the invention are directed to methods, apparatuses, computer readable media and systems for providing, along with a token, a token assurance level and data used to generate the token assurance level. At the time a token is issued, one or more Identification and Verification (ID&V) methods may be performed to ensure that the token is replacing a PAN that was legitimately used by a token requestor. A token assurance level may be assigned to a given token in light of the type of ID&V that is performed and the entity performing the ID&V. Different ID&Vs may result in different token assurance levels. An issuer may wish to know the level of assurance and the data used in generating the level of assurance associated with a token prior to authorizing a payment transaction that uses the token.
H04L 9/30 - Clé publique, c. à d. l'algorithme de chiffrement étant impossible à inverser par ordinateur et les clés de chiffrement des utilisateurs n'exigeant pas le secret
G06Q 20/40 - Autorisation, p.ex. identification du payeur ou du bénéficiaire, vérification des références du client ou du magasin; Examen et approbation des payeurs, p.ex. contrôle des lignes de crédit ou des listes négatives
H04L 9/32 - Dispositions pour les communications secrètes ou protégées; Protocoles réseaux de sécurité comprenant des moyens pour vérifier l'identité ou l'autorisation d'un utilisateur du système
24.
SYSTEM AND METHOD FOR GENERATING PAYMENT CREDENTIALS
A method and system for generating payment credentials are provided. A remotely accessible server receives a request for payment credentials for use in conducting a financial transaction, the request originating from a requesting entity and associated with a transaction amount. The remotely accessible server obtains a raw account identifier, pads the raw account identifier with the transaction amount, and performs a predefined calculation on the raw account identifier padded with the transaction amount to yield at least one check digit. The at least one check digit is incorporated into the raw account identifier to yield a processed account identifier for onward transmission to the requesting entity and for use in conducting the financial transaction.
G06Q 20/40 - Autorisation, p.ex. identification du payeur ou du bénéficiaire, vérification des références du client ou du magasin; Examen et approbation des payeurs, p.ex. contrôle des lignes de crédit ou des listes négatives
25.
METHODS AND SYSTEMS FOR PROVISIONING MOBILE DEVICES WITH PAYMENT CREDENTIALS
Embodiments are described that are directed to optimizing the provisioning of payment account credentials to mobile devices utilizing mobile wallets. In some embodiments, one of multiple provisioning schemes may be selectively chosen for payment account credential provisioning based upon a determined risk involved with a particular provisioning request. A low risk provisioning request leads to an immediate provisioning of a payment credential, whereas a provisioning request of high risk results in the provisioning request being denied. In some embodiments, medium risk provisioning requests will cause an additional user authentication to be performed before the payment account provisioning is finalized. The additional user authentication may occur using a separate communication channel than the channel in which the provisioning request was received.
G06Q 20/32 - Architectures, schémas ou protocoles de paiement caractérisés par l'emploi de dispositifs spécifiques utilisant des dispositifs sans fil
G06Q 20/36 - Architectures, schémas ou protocoles de paiement caractérisés par l'emploi de dispositifs spécifiques utilisant des portefeuilles électroniques ou coffres-forts électroniques
26.
ENABLING PAYMENTS TO BE PROCESSED BY ONLY ONE MERCHANT
Systems and methods for enabling payments to be processed against an account identifier by only one merchant are provided. In a method, a remotely accessible server obtains an account identifier and stores the account identifier in a database in response to a consumer electing to generate an account identifier. The server receives a request originating from an acquiring entity to process a payment against the account identifier and a merchant identifier of a merchant in favor of which the payment is to be processed. The server looks up the account identifier and stores the merchant identifier in the database in association with the account identifier, linking the account identifier to the merchant. Upon subsequent payment requests against the account identifier in favor of a merchant, the server receives a merchant identifier and, if the merchant identifier matches the merchant identifier associated with the account identifier, the server allows the payment.
G06Q 20/40 - Autorisation, p.ex. identification du payeur ou du bénéficiaire, vérification des références du client ou du magasin; Examen et approbation des payeurs, p.ex. contrôle des lignes de crédit ou des listes négatives
G06Q 20/12 - Architectures de paiement spécialement adaptées aux systèmes de commerce électronique
27.
SYSTEMS AND METHODS FOR INTEROPERABLE NETWORK TOKEN PROCESSING
Systems and methods for interoperable network token processing are provided. A network token system provides a platform that can be leveraged by external entities (e.g., third party wallets, e-commerce merchants, payment enablers / payment service providers, etc.) or internal payment processing network systems that have the need to use the tokens to facilitate payment transactions. A token registry vault can provide interfaces for various token requestors (e.g., mobile device, issuers, merchants, mobile wallet providers, etc.), merchants, acquirers, issuers, and payment processing network systems to request generation, use and management of tokens. The network token system further provides services such as card registration, token generation, token issuance, token authentication and activation, token exchange, and token life-cycle management.
G06Q 20/40 - Autorisation, p.ex. identification du payeur ou du bénéficiaire, vérification des références du client ou du magasin; Examen et approbation des payeurs, p.ex. contrôle des lignes de crédit ou des listes négatives
28.
SYSTEMS AND METHODS FOR COMMUNICATING RISK USING TOKEN ASSURANCE DATA
Systems and methods for communicating risk using token assurance data are provided. A network token system provides a platform that can be leveraged by external entities (e.g., third party wallets, e-commerce merchants, payment enablers / payment service providers, etc.) or internal payment processing network systems that have the need to use the tokens to facilitate payment transactions. An authorization request message can include a token assurance level code that is indicative of a token assurance level associated with a generated token. External or internal entities may use the token assurance level to evaluate risk associated with a payment transaction that uses the token.
G06Q 20/40 - Autorisation, p.ex. identification du payeur ou du bénéficiaire, vérification des références du client ou du magasin; Examen et approbation des payeurs, p.ex. contrôle des lignes de crédit ou des listes négatives
H04L 9/32 - Dispositions pour les communications secrètes ou protégées; Protocoles réseaux de sécurité comprenant des moyens pour vérifier l'identité ou l'autorisation d'un utilisateur du système
29.
METHODS AND SYSTEMS FOR PROVIDING PAYMENT CREDENTIALS
The invention provides systems and methods for providing payment credentials usable in a transaction. In method conducted at a token processor, the token processor receives a request for single-use payment credentials from a communication device of a consumer. In response, the token processor obtains or generates single-use payment credentials and obtains or generates a loyalty identifier which is uniquely associated with the consumer. The token processor then transmits the single-use payment credentials and the loyalty identifier to the communication device as a combined single-use payment token capable of being presented using the communication device. In some embodiments, the loyalty identifier is the same for all requests by the consumer for single-use payment credentials, such that the loyalty identifier is usable by a merchant in updating a record of the consumer.
Embodiments of the invention relate to payment cards and methods for making payment cards. In one embodiment, a card comprises a first layer and a second layer adjacent to the first layer. The second layer comprises a plurality of particles comprising metal, and the plurality of particles comprise at least about 15 volume % of the second layer. In another embodiment, a mixture is prepared comprising polymer and a plurality of particles comprising metal. The plurality of particles comprise at least about 15 volume % of the mixture. The mixture is pressed and an outer layer is applied. The mixture and outer layer are then cut to form the card.
G06K 19/077 - Supports d'enregistrement avec des marques conductrices, des circuits imprimés ou des éléments de circuit à semi-conducteurs, p.ex. cartes d'identité ou cartes de crédit avec des puces à circuit intégré - Détails de structure, p.ex. montage de circuits dans le support
31.
INTEGRATION OF VERIFICATION TOKENS WITH MOBILE COMMUNICATION DEVICES
Apparatuses, methods, and systems pertaining to the verification of portable consumer devices are disclosed. In one implementation, a verification token is communicatively coupled to a computer by a USB connection so as to use the computers networking facilities. The verification token reads identification information from a users portable consumer device (e.g., credit card) and sends the information to a validation entry over a communications network using the computers networking facilities. The validation entity applies one or more validation tests to the information that it receives from the verification token. If a selected number of tests are passed, the validation entity sends a device verification value to the verification token, and optionally to a payment processing network. The verification token may enter the device verification value into a CVV field of a web page appearing on the computers display, or may display the value to the user using the computers display.
G06Q 20/00 - Architectures, schémas ou protocoles de paiement
H04L 9/32 - Dispositions pour les communications secrètes ou protégées; Protocoles réseaux de sécurité comprenant des moyens pour vérifier l'identité ou l'autorisation d'un utilisateur du système
32.
SYSTEM AND METHOD FOR SECURELY VALIDATING TRANSACTIONS
Systems and methods for validating and processing payment transactions are disclosed. In the embodiments of the invention a first authorization request message and a first verification value are received at a server computer. The verification value is validated and a second authorization request message with a second verification value is generated. The first verification value may be a dynamic value and the second verification value may be static value. The second verification value is associated with portable device used to perform a transaction and it is what the issuer computers of the portable device expect to receive as part of an authorization request message in a payment transaction.
A system, method, and server computer configured to authenticate a consumer device. The consumer device is authenticated via a mobile gateway using challenge-response authentication. If the consumer device is successfully authenticated, a secure channel is established between the consumer device and a first entity. The secure channel allows for secure communication between the consumer device and the first entity.
H04L 9/32 - Dispositions pour les communications secrètes ou protégées; Protocoles réseaux de sécurité comprenant des moyens pour vérifier l'identité ou l'autorisation d'un utilisateur du système
G06Q 20/00 - Architectures, schémas ou protocoles de paiement
34.
SYSTEM AND METHOD FOR FINANCIAL TRANSACTION AUTHENTICATION USING TRAVEL INFORMATION
Systems and methods for verifying a distant-from-home financial transaction related to a customer account based on travel indicators in earlier purchase transactions made by that customer.
G06Q 20/40 - Autorisation, p.ex. identification du payeur ou du bénéficiaire, vérification des références du client ou du magasin; Examen et approbation des payeurs, p.ex. contrôle des lignes de crédit ou des listes négatives
A remote variable authentication processing system is disclosed. A sending entity initiates a remote payment using an alias over an initiation channel. The alias may be associated with one or more nicknames that identify portable consumer devices and metadata. The metadata describes which channels are available for authentication. The sending entity selects a nickname and an associated authentication channel. The sending entity authenticates with an issuer over the selected authentication channel.
A token based transaction authentication system is disclosed. Issuer, merchants, and a payment processing network generate unique tokens or keys to authenticate messages between themselves and to authenticate a sending entity or consumer as they are redirected between entities. The tokens are also used to identify the particular authentication thread a message or sending entity is associated with. The sending entity authentication occurs over a web-based channel or a mobile based channel.
Systems and method for producing, validating, and registering authentic verification tokens are disclosed. Such systems and methods include generating verification token specific key pairs. The key pairs can be signed by a verification token manufacturer master key or public key certificate for an additional level of authenticity. Related methods and systems for authenticating and registering authorized verification token manufacturers are also disclosed. Once a verification token manufacturer is authenticated, it can be assigned a manufacturer-specific key pair or certificate and in some cases, a predetermined set of serial numbers to assign to the verification tokens it produces. Each serial number can be used to generate a verification token specific key pair specific to the associated verification token. One component of the verification token key pair can be stored to the verification token. Optionally, the component of the verification token key pair stored to the verification token can be signed by the manufacturer specific master key or certificate and stored a verification token public certificate.
H04L 9/32 - Dispositions pour les communications secrètes ou protégées; Protocoles réseaux de sécurité comprenant des moyens pour vérifier l'identité ou l'autorisation d'un utilisateur du système
G06Q 20/00 - Architectures, schémas ou protocoles de paiement
H04L 9/14 - Dispositions pour les communications secrètes ou protégées; Protocoles réseaux de sécurité utilisant plusieurs clés ou algorithmes
38.
PAYMENT CHANNEL RETURNING LIMITED USE PROXY DYNAMIC VALUE
A central platform provides proxy dynamic values for any one of a number of a cardholder's portable payment devices, upon a request for such information made during a transaction. The proxy dynamic value can be provided to the merchant, who then can route it into the acceptance network in order to initiate the authentication process. The central platform provides the actual primary account number associated with the proxy dynamic value during the authentication process.
A system, apparatus, and method for conducting payment transactions using a mobile device. Embodiments of the invention are directed to an architecture or system design for the functional elements residing in a mobile device that may be used to conduct a payment transaction. The inventive architecture may be implemented as a set of functional modules resident in a secure element that is embedded or otherwise incorporated into the mobile device.
Systems and methods for administering merchant funded third-party administered rewards programs are provided. The system receives information about a transaction made using a payment device and determines whether the payment device is enrolled in the rewards program. If the payment device is enrolled in the rewards program, the system determines if the transaction qualifies for a reward. If the transaction qualifies for the reward, the system determines a rewards value for the transaction. Thereafter, the system determines a prepaid payment token associated with the payment device and instructs an issuer of the prepaid payment token to load the rewards value onto the prepaid payment token.
Systems and methods for verifying a financial transaction based on an account number, a mobile directory number associated with the financial transaction, a mobile directory number associated with the account number, an email address associated with the account number, internet protocol address data associated with the financial transaction, and internet protocol address data associated with accesses of the email address.
G06Q 20/40 - Autorisation, p.ex. identification du payeur ou du bénéficiaire, vérification des références du client ou du magasin; Examen et approbation des payeurs, p.ex. contrôle des lignes de crédit ou des listes négatives
A method for controlling a contactless interface on a dual interface portable device are provided. The method allows for contactless enablement and disablement on both a temporary and semi-permanent basis, dependent on commands sent to the device by the issuer of the portable device. The commands are received through a terminal device and are transferred to the portable device during a contact transaction. Configuration data on the portable device is modified according to the received commands. An application on the portable device controls the transmission of data through the contactless interface dependent on the configuration data.
G06Q 20/20 - Systèmes de réseaux présents sur les points de vente
G06Q 20/32 - Architectures, schémas ou protocoles de paiement caractérisés par l'emploi de dispositifs spécifiques utilisant des dispositifs sans fil
G06Q 20/34 - Architectures, schémas ou protocoles de paiement caractérisés par l'emploi de dispositifs spécifiques utilisant des cartes, p.ex. cartes à puces ou cartes magnétiques
G06Q 20/40 - Autorisation, p.ex. identification du payeur ou du bénéficiaire, vérification des références du client ou du magasin; Examen et approbation des payeurs, p.ex. contrôle des lignes de crédit ou des listes négatives
Apparatuses, methods, and systems pertaining to the verification of portable consumer devices are disclosed. In one implementation, a verification token is coupled to a computer by a USB connection so as to use the computer's networking facilities. The verification token reads identification information from a user's portable consumer device (e.g., credit card) and sends the information to a validation entry over a communications network using the computer's networking facilities. The validation entity applies one or more validation tests to the information that it receives from the verification token. If a selected number of tests are passed, the validation entity sends a device verification value to the verification token, and optionally to a payment processing network. The verification token may enter the device verification value into a CVV field of a web page appearing on the computer's display, or may display the value to the user using the computer's display.
G06F 21/34 - Authentification de l’utilisateur impliquant l’utilisation de dispositifs externes supplémentaires, p.ex. clés électroniques ou cartes à puce intelligentes
G06Q 20/32 - Architectures, schémas ou protocoles de paiement caractérisés par l'emploi de dispositifs spécifiques utilisant des dispositifs sans fil
G06Q 20/40 - Autorisation, p.ex. identification du payeur ou du bénéficiaire, vérification des références du client ou du magasin; Examen et approbation des payeurs, p.ex. contrôle des lignes de crédit ou des listes négatives
Apparatuses, methods, and systems pertaining to the verification of portable consumer devices are disclosed. In on implementation, a verification token is coupled to a computer by a USB connection so as to use the computer's networking facilities. The verification token reads identification information from a user's portable consumer device (e.g., credit card) and sends the information to a validation entry over a communications network using the computer's networking facilities. The validation entity applies one or more validation tests to the information that it receives from the verification token. If a selected number of tests are passed, the validation entity sends a device verification value to the verification token, and optionally to a payment processing network. The verification token may enter the device verification value into a CVV field of a web page appearing on the computer's display, or may display the value to the user using the computer's display.
G06Q 20/40 - Autorisation, p.ex. identification du payeur ou du bénéficiaire, vérification des références du client ou du magasin; Examen et approbation des payeurs, p.ex. contrôle des lignes de crédit ou des listes négatives
Embodiments of the invention are directed to methods, systems, and computer program products pertaining to obtaining, providing, and using dynamic card verification values for portable consumer devices, such as credit cards and debit cards. An exemplary method comprises receiving, at a server, a request for a device verification value for a portable consumer device associated with a user; obtaining, at the server, a datum indicative of a device verification value for a portable consumer device; and sending, from the server, the datum to at least one of a phone number or network address of a personal communication device associated with the user.
A system and method for recognizing patterns in wireless device locations using wireless device location data derived from a communications signaling network is provided. By using wireless network supported signaling operations and messages, location data concerning the whereabouts of wireless devices, and hence wireless device users, may be obtained. The location data derived from the communications signaling network may be statistically analyzed to reveal potential geographic patterns that may indicate meaningful behaviors of the purported users of the wireless devices.
A system, apparatus, and method for preventing the unauthorized access to a payment application installed on a mobile payment device, or to transaction data stored in the device. The mobile payment device may be a mobile phone that includes a contactless element (such as a contactless smart chip) and that is capable of communication and data transfer using a wireless communications network and a near field communications capability. Unauthorized access to the payment application is prevented by requiring that access control data be received from a trusted source, such as a controller or application in charge of managing inputs from a phone keypad, in order to activate the payment application or to access stored data.
G06Q 20/32 - Architectures, schémas ou protocoles de paiement caractérisés par l'emploi de dispositifs spécifiques utilisant des dispositifs sans fil
G06Q 20/40 - Autorisation, p.ex. identification du payeur ou du bénéficiaire, vérification des références du client ou du magasin; Examen et approbation des payeurs, p.ex. contrôle des lignes de crédit ou des listes négatives
48.
OVER THE AIR UPDATE OF PAYMENT TRANSACTION DATA STORED IN SECURE MEMORY
A system, apparatus, and method for processing payment transactions that are conducted using a mobile device that includes a contactless element, such as an integrated circuit chip. The invention enables the updating, correction or synchronization of transaction data maintained by an Issuer with that stored on the device. This is accomplished by using a wireless (cellular) network as a data communication channel for data provided by an Issuer to the mobile device, and is particularly advantageous in circumstances in which the contactless element is not presently capable of communication with a device reader or point of sale terminal that uses a near field communications mechanism. Data transferred between the mobile device and Issuer may be encrypted and decrypted to provide additional security and protect the data from being accessed by other users or applications.
A system, apparatus, and method for processing payment transactions that are conducted using a mobile payment device that includes a contactless element, such as an integrated circuit chip. The invention enables one or more of the operations of activation of a payment application, transfer of transaction data, updating of account records, setting or re-setting of a payment application counter or register, or transfer or processing of a script, command, or instruction, with these functions being performed with minimal impact on a consumer. This is accomplished by introducing a pre- tap and/or two-tap operation prior to, or as part of, the transaction flow.
A system, apparatus, and method for processing payment transactions that are conducted using a mobile device that includes a contactless element, such as an integrated circuit chip. The invention enables the updating, correction or synchronization of transaction data maintained by an Issuer with that stored on the device. This is accomplished by using a wireless (cellular) network as a data communication channel for data provided by an Issuer to the mobile device, and is particularly advantageous in circumstances in which the contactless element is not presently capable of communication with a device reader or point of sale terminal that uses a near field communications mechanism. Data transferred between the mobile device and Issuer may be encrypted and decrypted to provide additional security and protect the data from being accessed by other users or applications.
Embodiments of the invention are directed to a method, a system, a device and a computer-readable media for selecting one or more payment application at the point-of-sale and using the select one or more payment applications to conduct a transaction. One embodiment is directed to a method for automatically selecting one or more payment applications to use in a transaction so that the selected payment applications give the consumer an optimized benefit or benefits.
G06Q 20/32 - Architectures, schémas ou protocoles de paiement caractérisés par l'emploi de dispositifs spécifiques utilisant des dispositifs sans fil
G06Q 20/40 - Autorisation, p.ex. identification du payeur ou du bénéficiaire, vérification des références du client ou du magasin; Examen et approbation des payeurs, p.ex. contrôle des lignes de crédit ou des listes négatives
The present invention provides a method for conducting a transaction that includes receiving a pseudo account identifier that corresponds to a primary account identifier. The pseudo account identifier may be received at a portable wireless device and may be generated by a remote server computer. The portable wireless device can receive the pseudo account identifier over a first network and provide the pseudo account identifier to an access device. The access devices generally comprises a reader that can receive the pseudo account identifier, and thereafter send a message to request authorization of a transaction. The authorization request message may include the pseudo account identifier and is sent to a payment processing network. The authorization request message is sent to the payment processing network over a second network. The payment processing network may then process the authorization message and return a response that indicates if the transaction is authorized or not.
G06Q 20/40 - Autorisation, p.ex. identification du payeur ou du bénéficiaire, vérification des références du client ou du magasin; Examen et approbation des payeurs, p.ex. contrôle des lignes de crédit ou des listes négatives
G06Q 20/32 - Architectures, schémas ou protocoles de paiement caractérisés par l'emploi de dispositifs spécifiques utilisant des dispositifs sans fil
53.
SYSTEM AND METHOD FOR AUTOMATED ANALYSIS COMPARING A WIRELESS DEVICE LOCATION WITH ANOTHER GEOGRAPHIC LOCATION
A system and method for automatically comparing obtained wireless device location information from a wireless network and comparing that location with another independent source geographic location is provided. Location information is derived from two or more sources in a multiplicity of ways and a comparison is made within a Location Comparison Engine. The Location Comparison Engine makes use of databases that assist in resolving obtained raw positioning information and converting that positioning information into one or more formats for adequate location comparison. Results of the location comparison are deduced to determine if the wireless device is in some proximity to some other activity source location. Other location information used for comparison may be obtained from a multiplicity of sources, such as another network based on some activity of the wireless device user, another wireless device via a wireless network, or any system capable of providing location information to the Location Comparison Engine.
H04W 64/00 - Localisation d'utilisateurs ou de terminaux pour la gestion du réseau, p.ex. gestion de la mobilité
G06Q 20/40 - Autorisation, p.ex. identification du payeur ou du bénéficiaire, vérification des références du client ou du magasin; Examen et approbation des payeurs, p.ex. contrôle des lignes de crédit ou des listes négatives
Disclosed herein is a system for processing a purchase comprising a merchant for providing to a consumer an electronic shopping cart, providing to a consumer a prompt to enter a consumer identifier, and submitting content of the shopping cart and the consumer identifier for payment and a service platform for storing the consumer's payment information, receiving the content of the shopping cart and the consumer identifier, authenticating the consumer's the payment information, processing payment for the content of the shopping cart using the consumer's payment information, and sending confirmation of payment to the merchant.
G06Q 20/40 - Autorisation, p.ex. identification du payeur ou du bénéficiaire, vérification des références du client ou du magasin; Examen et approbation des payeurs, p.ex. contrôle des lignes de crédit ou des listes négatives
H04L 9/32 - Dispositions pour les communications secrètes ou protégées; Protocoles réseaux de sécurité comprenant des moyens pour vérifier l'identité ou l'autorisation d'un utilisateur du système
H04L 12/16 - Dispositions pour la fourniture de services particuliers aux abonnés
Disclosed herein is a system for processing a purchase comprising a merchant for providing to a consumer an electronic shopping cart, providing to a consumer a prompt to enter a consumer identifier, and submitting content of the shopping cart and the consumer identifier for payment and a service platform for storing the consumer's payment information, receiving the content of the shopping cart and the consumer, identifier, authenticating the consumer's the payment information, processing payment for the content of the shopping cart using the consumer's payment information, and sending confirmation of payment to the merchant.
G06Q 20/38 - Architectures, schémas ou protocoles de paiement - leurs détails
G06Q 20/40 - Autorisation, p.ex. identification du payeur ou du bénéficiaire, vérification des références du client ou du magasin; Examen et approbation des payeurs, p.ex. contrôle des lignes de crédit ou des listes négatives
56.
SYSTEM AND METHOD FOR SECURED ACCOUNT NUMBERS IN PROXIMITY DEVICES
A method and system for using a secured account number for processing proximity types of wireless financial transactions associated with portable consumer proximity devices is disclosed. In one embodiment, the method includes receiving a proximity type of wireless financial transaction request along with a secured account number from a portable proximity consumer device such as a contactless smart card, converting the secured account number to the user's real account number, and transmitting the financial transaction request along with the user's real account number to the issuer of the user's real account number for authorization and processing.
G06Q 20/32 - Architectures, schémas ou protocoles de paiement caractérisés par l'emploi de dispositifs spécifiques utilisant des dispositifs sans fil
G06Q 20/40 - Autorisation, p.ex. identification du payeur ou du bénéficiaire, vérification des références du client ou du magasin; Examen et approbation des payeurs, p.ex. contrôle des lignes de crédit ou des listes négatives
A programmable smartcard device (10) carries a file system (22, 24) and operating software enabling the on-device file system to interface with at least one off-device file and/or application. It also has a script engine (32) capable of running one or more Application Protocol Data Units (1APDUs') associated with a particular form of transaction so as to modify the structure and/or content of the file system, or the commands to be used for accessing the file system or any security conditions associated therewith. The smartcard device (10) is provided with comparator means (34) configurable by a security APDU run by the script engine (32) so that it operates in use to compare the commands carried out in implementing the transaction with one or more reference commands and to restrict or prevent further access or modifications to the on-device data, file system, commands or security conditions in dependence on the outcome of the comparison carried out by the comparator means (34). Thus, the smartcard device can, because the comparator (34) is configured for each different kind of transaction to be carried out, provide improved security within the contraints of memory storage and processing power availableon the smartcard device itself.
G06K 19/07 - Supports d'enregistrement avec des marques conductrices, des circuits imprimés ou des éléments de circuit à semi-conducteurs, p.ex. cartes d'identité ou cartes de crédit avec des puces à circuit intégré
Methods and systems for enabling contactless communications with a contactless card are disclosed. A contactless card may include a contactless interface activation mechanism that includes one or more sense contacts, a processor, and a processor-readable storage medium in communication with the processor. The processor-readable storage medium may contain programming instructions for performing one or more applications. The processor may be in a protected state in which the processor is prevented from performing the instructions for at least one application in the processor-readable storage medium unless a load is placed on at least one sense contact.
G06K 19/06 - Supports d'enregistrement pour utilisation avec des machines et avec au moins une partie prévue pour supporter des marques numériques caractérisés par le genre de marque numérique, p.ex. forme, nature, code
G06K 7/08 - Méthodes ou dispositions pour la lecture de supports d'enregistrement avec des moyens de perception des modifications d'un champ électrostatique ou magnétique, p.ex. par perception des modifications de la capacité entre des électrodes