Inventors list

Assignees list

Classification tree browser

Top 100 Inventors

Top 100 Assignees


Secure transaction (e.g., EFT/POS)

Subclass of:

705 - Data processing: financial, business practice, management, or cost/price determination

705050000 - BUSINESS PROCESSING USING CRYPTOGRAPHY

Patent class list (only not empty are listed)

Deeper subclasses:

Class / Patent application numberDescriptionNumber of patent applications / Date published
705065000 Including intelligent token (e.g., electronic purse) 189
705071000 Including key management 122
705075000 Transaction verification 113
705076000 Electronic credential 43
705072000 Verifying PIN 40
705077000 Including remote charge determination or related payment system 21
705073000 Terminal detail (e.g., initializing) 6
705074000 Anonymous user system 3
20100241571SYSTEM AND METHOD FOR CARDLESS SECURE ON-LINE CREDIT CARD/DEBIT CARD PURCHASING - The invention is a system and method for cardless secure on-line purchasing using a credit/debit card. There is provided an on-line purchaser executing an on-line purchase with an on-line vendor having a credit/debit card payment screen. There is also at least one on-line credit/debit card service provider having an interface with the on-line purchaser the said on-line vendor. An e-authentication and credential service provider has an interface with the on-line purchaser and said at least one on-line credit/debit card service provider and provides means for secure on-line purchasing on a subscription basis by providing anonymity to the on-line purchase by hiding credit/debit card data during the on-line purchase making the purchase invisible to identity thieves and hackers.09-23-2010
20120203702APPARATUS AND METHOD FOR SECURING BANKCARD NUMBERS IN BANKCARDS AND DATABASES FOR PROTECTION AGAINST IDENTITY THEFT - Apparatus and method of securing bankcard data with an aliasing function that aliasing an original bank card number, having fields of a bank code, a serial number, and an expiration date, into an aliased bankcard number having substantially the same format. The aliasing function uses a heuristic algorithm for deriving an aliased bankcard number. The heuristic algorithm is referenced by a reference number in a database that stores a large number of heuristic algorithms. The reference number is appended to the aliased card number. The aliased card number with the reference number is encoded on a payment card substrate.08-09-2012
20080243704Method and apparatus for certified secondary market inventory management - A certified secondary market inventory platform maintains a certified catalog of items for sale on a secondary market. Certified items are tracked by the platform and have a verified chain of custody between the manufacturer and the current owner. The certified catalog of items is presented anonymously, such that current owners of certified items are not revealed to potential buyers. Anonymity also extends to fulfillment, with shipment of a certified item to a buyer being performed without revealing the buyer and the current owner to each other. Verification of the chain of custody may, for example, include evidence such as a goods-received note corresponding to a shipment of the certified item from the manufacturer to the current owner, or a shipping notification from the manufacturer. A physical audit may also be conducted in association with publication of the certified catalog of items, as a pre-requisite for such publication.10-02-2008
705070000 Home banking 2
20090132423SEND MONEY PLUG IN FOR WEB MAILS - In one example embodiment, a system and method is shown as including receiving an email address selection displayed as part of a screen widget, the screen widget included within the display of an interface associated with an Internet-utilizing application. Further, this method may, for example, include executing a plug in having a send money function, the plug in associated with the Internet-utilizing application, the send money function executed due, in part, to a signal received from an input device. The method may additionally include generating a payment request identifying a recipient of funds by the e-mail address selection.05-21-2009
20080208758METHOD AND APPARATUS FOR SECURE TRANSACTIONS - A method and apparatus is provided for secure terminals that facilitate secure data transmission and are compliant with the payment card industry (PCI) data security requirements. A security processor is combined with an application processor and a display into a secure display control unit (SDCU) that provides tamper resistance and other security measures. Modular secure I/O devices are interfaced to the SDCU via a wired, or wireless, medium so as to facilitate secure data transfer to the SDCU during a point-of-sale (POS) transaction or other transaction that requires secure data entry. The secure I/O devices implement one-time-pad (OTP) encryption, where the random keys, or pads, are generated by a derived unique key per transaction (DUKPT) generator. Other embodiments facilitate interconnection of the secure I/O devices to a hardware security module (HSM) or a personal computer (PC) while maintaining a high level of data security.08-28-2008
Entries
DocumentTitleDate
20080275821SYSTEMS AND METHODS FOR RISK TRIGGERING VALUES - The invention includes systems and methods for facilitating risk assessment for point of sale transactions utilizing at least one risk triggering value (RTV) stored within a distributed (e.g., local and/or regional) processing site. An RTV is a condensed version of a set of complex risk data and strategies usually found in central processing sites. The distributed site, after receiving a request for payment authorization, a risk value is calculated for the request. The distributed processing site compares the risk value to the RTV to determine whether to authorize payment. If the risk value is less than or equal to the RTV, the payment is authorized while a risk value greater than the RTV will not be authorized. After one or more authorizations, the distributed processing site forwards the information from the transaction(s) to the central site, wherein the central site calculates a new RTV for the account and distributes the new RTV to the distributed processing site.11-06-2008
20110196796PROCESS OF SELLING IN ELECTRONIC SHOP ACCESSIBLE FROM THE MOBILE COMMUNICATION DEVICE - The process encompasses the communication between trade system accessible over GUI of the mobile communication device (08-11-2011
20090144201TARGETING MESSAGES - The invention generally relates to systems and methods for directing information to people and/or households likely to be receptive to the information. Systems and methods according to the invention can be used to target one or more marketing messages, such as various types of offers, to one or more consumers determined likely to be receptive to the message(s).06-04-2009
20120246078METHOD FOR MAKING SECURE TRANSACTIONS - The invention concerns a method for carrying out a transaction comprising prior steps of identifying the card by reading its number and authenticating the bearer optionally by writing in the secret code using a keyboard. The invention is characterised in that the secret code and/or the card number, comprise(s) in a specific position at least a character modified at each transaction. The modified character(s) (n) of the secret code and/or the card is/are modified in accordance with at least a character of a predetermined parameter.09-27-2012
20100042546Multimedia (VO) IP Solution for Mobile Telephones - The invention relates to a novel mobile hotspot value-added service VAS (telephony, internet, IP-TV, M-Payment etc) solution using W-Lan, WiMAX, Bluetooth, DMV, DVB-H, NFC or any other known GSM and UMTS mobile radio technology, with a ticketing system on a handset (mobile, PDA, laptop), said solution being operated as a club system such as Skype for VoIP. In addition to the ticketing system, other rights, duties, or services are carried out/offered/operated or managed, and the operator of the hotspot can make their own profits on the value-added services when they sell the same individually, especially when the handset already contains an electronic ticket (MMS etc). According to the invention, a mobile VAS telephony solution (telephone exchange/platform) is operated as a club system by means of W-Lan, Bluetooth or any other mobile radio technology, such as is known for Skype with VoIP, but not as is claimed in the present invention with mobile telephones, by means of hotspots (with a proprietary software) simultaneously together with and against other rights, duties and inter alia commercial models etc. (such as ticketing systems, payment or controlling in stadiums or trains).02-18-2010
20090157554CLIENT SYSTEM FACILITATING AN ONLINE CARD PRESENT TRANSACTION - An online card-present transaction system facilitates card-present type transactions with a merchant over a public network. A host system is configured to accept authentication data from a user via an authentication device. The host system, after authenticating a user is configured to retrieve the user's account information from a user database system and translate a user account number into a temporary transaction number. The temporary transaction number is then transmitted directly from the host system to the merchant, thereby eliminating the need for the user to send to the merchant over the internet, the user's transaction account number.06-18-2009
20120191611SYSTEMS AND METHODS FOR ENCODED ALIAS BASED TRANSACTIONS - Disclosed is a computer based method for securing a financial transaction. A transaction device does not include any human readable data that can be used to identify the account owner and/or the transaction account. A first code and a second code are combined to determine an alias transaction account code. A transaction account is determined based upon the alias transaction account code.07-26-2012
20090094163SECONDARY IDENTIFICATION FOR REMITTANCE DELIVERY - There are provided a method, system and program storage device perform a remittance transaction. The method includes generating a remittance transaction to transfer funds from an account associated with a sender to a receiver; receiving a visual or audio identification of the receiver from the sender for the remittance transaction; and transmitting the generated remittance transaction, the received identification and the funds associated with the remittance transaction to a disbursement agent to selectively disburse funds to the receiver if the identification of the receiver matches the receiver.04-09-2009
20090271320SYSTEM FOR ELECTRONIC BUSINESS TRANSACTIONS - An electronic business transaction system is provided. The electronic business transaction system requests an ordering party to select an electronic business and input order information for the electronic business through a terminal of the ordering party, receives the order information for the electronic business from the ordering party, announces a bid for the electronic business, requests bidders to select the electronic business, input bid information for the electronic business, and organize execution groups for the electronic business through a terminal of the bidders, receives the bid information and information for the execution groups from the bidders, analyzes the bid information and the information for the execution groups, selects an order-taking party from among the bidders according to the results of the analysis, concludes an electronic contract for the electronic business between the order-taking party and the ordering party, and provides an application for processing the electronic business regarding the electronic contract to terminals of execution group members belonging to an execution group of the order-taking party so that the execution group members process the electronic business through the terminals of the execution group10-29-2009
20130166455CREATING AND USING DIGITAL CURRENCY - Among other things, a physical device carries value and can be physically delivered in a transaction. The physical device includes a representation of the value carried by the physical device. The representation is usable to transfer the value from the physical device to a digital domain. A security feature can change from a state indicating that the value carried by the physical device has not been compromised to a state indicating that the value carried by the physical device may have been compromised. The change in state is detectable, the representation of the value carried by the physical device being inaccessible except in a manner that causes the security feature to change state.06-27-2013
20120109827Methods, Devices and Computer Program Products for Voucher Access Code Creation and Management - Methods, devices and computer program products are provided that provide refills for pre-paid subscriptions. A voucher activation code is received for a subscriber account. The voucher activation code is processed to obtain a voucher serial number, where the processing includes performance of a decryption operation. The voucher serial number is used to identify a voucher for use in updating the subscriber account.05-03-2012
20110295752PRACTICAL SECRECY-PRESERVING, VERIFIABLY CORRECT AND TRUSTWORTHY AUCTIONS - A system and method for conducting verifiably correct auctions that preserves the secrecy of the bids while providing for verifiable correctness and trustworthiness of the auction is disclosed. Some of the elements of the method and apparatus are that the auction operator accepts all bids submitted and follows the published rules of the auction. In one embodiment, the bids are maintained secret from the auctioneer and all bidders until the auction closes and no bidder is able to change or repudiate her bid. In another embodiment, the auction operator computes the auction results and publishes proofs of the results' correctness. In yet another embodiment, any party can check these proofs of correctness via publicly verifiable to computations on encrypted bids.12-01-2011
20110191247AUTHENTICATION FRAMEWORK EXTENSION TO VERIFY IDENTIFICATION INFORMATION - Systems and methods for authenticating parties involved in a transaction are disclosed. Some embodiments of the disclosure are directed to systems and methods for authenticating various identification attributes of a participant in a transaction. The attributes can include items such as the participant's name, address, social security number, date of birth, or any other identifying attributes. In some embodiments, all participants in a transaction may have identification information authenticated. The 3-D Secure protocol and framework is extended and enhanced to provide the ability to authenticate the identification details of participants in transactions.08-04-2011
20080208757Systems and Methods for Processing Claims in Real-Time - Claim processing system providing an interface to permit pharmacy and medical management systems to use the Internet to transmit third-party insurance claims on a claim-by-claim basis in real-time or near-real-time to one or more claim servers that receive insurance claim requests over the Internet in an encrypted form. The one or more claim servers decrypt the claim requests and forward them to a health network application which facilitates the submission of the claims to insurance payers and the response of the insurance payers to the requests. Payer responses are received by the claim servers, encrypted and forwarded to the pharmacy and medical management systems in real-time or near real-time.08-28-2008
20120109826TECHNIQUES FOR CONDUCTING SINGLE OR LIMITED USE PURCHASES VIA A MOBILE DEVICE - A customer uses a mobile device to acquire a mobile app thereon. The mobile device is configured by a cloud-based service to escrow one or more card numbers mapped by a financial facility to the customer's primary account's number. Further security limitations can be configured into the mobile app by the cloud-based service. Subsequently, the customers uses the mobile app at a point-of-sale location to access one or more of the escrowed card numbers to make purchases; these purchases can be made while the mobile device lacks any connectivity to a network.05-03-2012
20090024532PHONE-MEDIATING TRADING METHOD - A phone-mediating trading system and a method for use with the same are provided. After the user uses a user phone to construct linkage to the trading host, the trading host generates a set of random data to the user phone where the set of random data is encrypted with a private key designated to the user phone. The encrypted set of random data is transmitted to the trading host, and decrypted through the use of a public key that is stored in the trading host and corresponds to the user's phone number. If the decrypted set of random data, as determined by the trading host, is the same as the originally-generated set of random data, the user is allowed to perform trading with the trading host. This method is efficient and convenient to implement without performing a conventional complex identification process for identifying the user.01-22-2009
20100082490Systems and methods for secure wireless transactions - There is provided systems and methods for to conducting wireless transactions using portable electronic devices. Specifically, for example, a method of conducting a wireless transaction is provided that includes initiating a wireless transaction using a short range wireless communication system of a portable electronic device. The method also includes obtaining security information via at least one secondary system of the portable electronic device and utilizing the security information obtained via the at least one secondary system to authenticate the portable electronic device for the wireless transaction.04-01-2010
20090070269SYSTEMS, METHODS AND APPARATUSES FOR SECURE DIGITAL TRANSACTIONS - A method for safeguarding data according to one embodiment includes receiving a data package comprising data and a timestamp. Additionally, the method includes receiving or retrieving authentication information. Furthermore, the method includes determining a validity of the authentication information. Further still, the method includes granting access to the data if the authentication information is determined to be valid, corrupting data upon receipt of invalid authentication information, and corrupting data after expiration of a predetermined amount of time from the timestamp.03-12-2009
20110173123System and Method for Managing Issuance of Financial Accounts - A system for managing issuance of a corporate meeting account for use in making purchases related to a meeting. The system comprises a communication interface adapted to communicate with a client computer executing an event management software and with a computer from each issuer, a processor coupled to the communication interface, and a management module executable by the processor. The management module receives, through the communication channel, a request to issue a financial account related to the meeting from the event management software. The request includes an issuer identifier and meeting account parameters. The management module generates an account issuance message and transmits the message to a computer of the issuer identified by the issuer identifier. This way, the process of opening a financial account associated with a meeting event is automatically done without having to manually contact the issuer.07-14-2011
20120143767Secure Distributed Single Action Payment System - Methods and systems for enabling and performing secured, single action payments from a mobile device are disclosed. One method includes receiving user credentials at an application installed on a mobile device, and transmitting the user credentials from the mobile device to a server alongside a device identifier. The method includes receiving data at least partially defining encrypted personal payment information and saving the encrypted personal payment information in a memory of the mobile device in association with the application. At least prior to receiving a user request to make a payment via the application, the mobile device lacks a decryption key capable of decrypting the encrypted personal payment information.06-07-2012
20120197805METHOD AND APPARATUS FOR CAPTURING FINANCIAL DATA USING A CAMERA-EQUIPPED COMPUTING DEVICE - The disclosed embodiments provide a system that captures financial data using a camera. During operation, the system uses the camera to scan a barcode that is associated with a financial document. The system decodes the barcode to generate a financial data set that is then input into a financial application. Allowing data to be input by capturing and decoding a scanned barcode reduces errors and generally improves the user data entry experience.08-02-2012
20090055322REMOVABLE MODULE IN PERSONAL HANDHELD DEVICES FOR PERSONAL INFORMATION EXCHANGE - A personal information exchange module in a standardized form is used as a plug-in to a personal handheld device for information exchange such as financial transactions, facility access, medical information exchange, and the like while protecting sensitive code and data associated with the module by separating those from the operating environment of the personal handheld device. Functional capabilities of the module may also be adjusted based on available power from the personal handheld device.02-26-2009
20090327138Securing Online Transactions - Disclosed herein is a method and system that addresses the need of securing an online transaction of a consumer. The user is provided with a client application on a mobile device. The user registers the mobile device on a transaction server. The user inputs transaction details for the online transaction on a web portal hosted on the transaction server. The transaction server creates a challenge to the user on a confirmation page to confirm the online transaction. The challenge comprises a challenge code and a transaction confirmation image. The graphical image and the transaction details are computationally inseparable in real time. The user conveys the challenge to the mobile device by inputting the challenge code in the client application. The client application generates a response for the challenge. The user then inputs the response on the confirmation page. The transaction server validates the response and authorizes the online transaction.12-31-2009
20090012900Making Secure Data for Customer Loyalty Programs - A portable device, a terminal, a system, and a method of storing data relating to transactions by terminals (01-08-2009
20090248578METHODS AND APPARATUS FOR MEDICAL DEVICE INVESTMENT RECOVERY - A method of providing a consumer or user with an investment recovery from a pay-per-use device. The investment recovery system involves a computer implemented method of determining the residual number of uses on a product, and crediting a user with the residual number. Also described are apparatus and systems for use with the method of providing medical device investment recovery.10-01-2009
20090063351System And Method For Providing Consumer Rewards - An automated consumer rewards/incentive program that accepts a registration of a consumer. The registration entitles the consumer to receive the benefits of the incentive program. To track the fulfillment of reward earning criteria established by member businesses, the registration includes information indicative of a credit card of the consumer. The system may track member consumer credit card transactions without receiving personal information for non-members by using a one way hash function. The system uses the credit card information to determine when member customers perform a transaction at a member business. When a member customer performs a transaction at a member business using the registered credit card, the system and method examines the credit card transactional information to determine if the consumer fulfilled the requirements of the incentive program for the member business. If the transactional information indicates that the consumer fulfilled the criteria of the rewards program of the member business, the consumer is rewarded in accordance with the benefits of the incentive program.03-05-2009
20090083189SECURING PAYMENT DATA - The claimed subject matter relates to an architecture or arrangement that can limit access to sensitive information by means of encryption. In particular, data obtained from a payment instrument at, e.g., a Point-Of-Sale (POS) location can be encrypted at an early stage such that a POS (or another) application does not have access to the data in an unencrypted form and/or does not have access to a means for decrypting the data. For example, a Public Key Infrastructure (PKI) arrangement can be employed such that a back-end payment processor can define encryption algorithms, associate itself with a public key, and maintain a private key for decryption. The public key can be delivered to the POS location and employed for data encryption, and, moreover, the PKI can be regulated by the more trusted parties.03-26-2009
20090083188Secure Data Systems and Methods - Various embodiments of secure data systems and methods are disclosed. One method embodiment, among others, comprises associating information corresponding to a first negotiable instrument with a data structure, and providing a checksum to the data structure to prevent unauthorized modification of the information.03-26-2009
20080262970System and method of electronic information delivery - A system and method for web browser based, secure or authenticated electronic delivery of information, wherein the security or authentication is provided by a means of a public key cryptography encryption method. The system can be used as a web-based blind bidding method, wherein software is located and operated on a central server and within the end user's web browser. Thus, no software is installed onto the end user's computer. In addition, the bidding system uses two-way PKC encryption technology or symmetric encryption technology to sign and seal the bid data submitted by each bidder, said encryption technology being completely browser based.10-23-2008
20080306874SYSTEM AND METHOD FOR MANAGING A PRODUCT THROUGH A DISTRIBUTION CHAIN - A method and system for distributing products is provided. The distribution system enables a manufacturer of a product to define one or more allowed distribution paths, and to limit distribution of their product to only an allowed distribution path. The system provides an embedded processor in or on a product, with the embedded processor controlling access to some utility or feature of the product. In this way, the product is not usable or is undesirable until an authorized activation process has occurred. To control the distribution chain, a set of distribution rules is defined that sets allowed or excluded distributors and retailers for products or sets of products. When the product is moved to the next distributor, or presented at a point-of-sale, the rules are compared to the actual recorded distribution chain. If the distribution chain is proper, then the product may be activated, or moved to the next distribution entity. If the distribution chain is not proper, than the product may be permanently disabled, or a response may be generated that penalized the infracting distributor.12-11-2008
20100211505SYSTEM AND METHOD FOR MASS TRANSIT MERCHANT PAYMENT - Methods, systems and computer program products are provided for enabling payment of transit system fees using a financial transaction instrument. Entry is permitted onto a transit system by recognition of information included in an identification number stored on a financial transaction instrument. The identification number stored on the financial transaction instrument is associated with a transit system fee registered for each use of the transit system. A plurality of transit system fees associated with the same identification number from use of the financial transaction instrument is aggregated, and payment for the aggregated transit system fees is requested from a transaction account associated with the financial transaction instrument.08-19-2010
20090254483Payment system and method using tokens - A method of payment using tokens issued by a third party comprising the steps of: a. A transaction management unit receives a request to perform a service for which payment with tokens is required; b. The management unit checks whether there are yet unused tokens available; If an unused token was found, go to step (c); If there are no available tokens, then indicate that, then END; c. The management unit requests information on an available token from a database. The status of the used token is changed to “used”; d. During the subsequent transaction, the management unit sends information relating to the token now used. A system for managing and monitoring the use of tokens, comprising: a. a transactions management unit using tokens, wherein the unit is activated when a local user requires to perform a service for which payment using tokens is required; b. a tokens database which includes information on tokens acquired from the third party; c. a tokens use monitoring unit, to verify the correct use of tokens; d. a database of tokens reports; e. a communication channel to other users.10-08-2009
20090070268SYSTEMS, METHODS AND APPARATUSES FOR SECURE DIGITAL TRANSACTIONS - A method for generating a code representative of a currency value according to one embodiment includes generating a first code, and combining a security code with the first code for creating a larger composite code, the composite code being associated with a predetermined currency value. Further, the composite code is usable in a monetary transaction.03-12-2009
20100332398PERSONAL IDENTIFICATION NUMBER DISTRIBUTION DEVICE AND METHOD - The method of distributing a personal identification number to a user of a financial instrument associated with the personal code includes: a step of sending to a user, via a first channel, a request code associated with the financial instrument; a step of receiving the request code via a second channel; a step of matching the request code with one personal code; and a step of sending the matched personal code via a third channel to the user. In particular embodiments, the financial instrument is sent to a user via the first channel together with the corresponding request code. In particular embodiments, the step of matching the request code with one personal code includes a step of checking the user mobile phone number and the method further includes a step of decrypting the personal code using the request code as a decryption key.12-30-2010
20120036075DETERMINING MOBILE ACCOUNT TO APPLY MARKETPLACE CHARGES - Identifying a mobile operator account associated with a user to apply charges incurred by the user at a mobile marketplace service. The mobile operator provides an account identifier for the account to a billing token service associated with the mobile marketplace service. The billing token service creates a billing token including the account identifier, and provides the billing token to the user. When subsequently ordering from the mobile marketplace service, the user sends order requests with the billing token to the mobile marketplace service. The mobile marketplace service extracts the account identifier from the billing token and provides the order requests and the extracted account identifier to a mobile operator billing service. The mobile operator billing service applies a charge to the mobile operator account identified by the account identifier. Based on a charge status from the mobile operator billing service (e.g., a successful or unsuccessful charge), the mobile marketplace service allows or denies access by the user to an item identified in the order request.02-09-2012
20100057618System, method, and software to manage financial securities via a 3-dimensional landscape - This disclosure involves systems, methods, and software for viewing, managing, or otherwise analyzing financial securities utilizing a three-dimensional display of related data and metrics. This disclosure describes techniques that facilitate the combination of financial data with 3D search technology to provide a user-friendly view and analysis of securities market data. The intuitive visual landscape offers a contextual picture that allows the user to display several layers of information simultaneously. Moreover, the disclosure describes this intuitive mechanism for looking at financial markets and identifying opportunities within a multi-dimensional landscape linked to additional integrated data panes, thus helping enable rapid analysis. The techniques may utilize or facilitate customizable metrics, seamless system compatibility, and integrated portfolio tools. The securities landscape may allow on-the-fly changes to quickly answer user queries. The disclosure further discusses various optimizations that help enable this real-time and intuitive landscape, such as vertex optimizations, color map optimizations, and hypersorting.03-04-2010
20100070418METHOD FOR RECEIVING ELECTRONICALLY TRANSFERRED FUNDS USING AN AUTOMATED TELLER MACHINE - A method for performing a money transfer receive transaction involving a desired amount of money to be transferred from a sender to a recipient includes receiving transaction identifying information provided by the recipient; comparing the transaction identifying information with transaction data stored on a host computer system; providing a confirmation code, to be issued to the recipient, if the transaction identifying information matches the transaction data stored on the host computer system; storing the confirmation code on the host computer system; receiving at the host computer system input corresponding to the confirmation code from a dispensing terminal in communication with the host computer system; comparing the input to the stored confirmation code; and allowing funds, corresponding to at least a portion of the desired amount of money, to be dispensed by the dispensing terminal if the input matches the stored confirmation code.03-18-2010
20110099112APPARATUS AND METHOD FOR CONDUCTING SECURING FINANCIAL TRANSACTIONS - A system and method are disclosed for conducting secure electronic transactions using dual-authentications. A secure server stores security information for a plurality of users and authorizes transactions being conducted by these users. A user computer system having a trusted platform module is used for storing security information relating to at least one user account. Protected environments are created to facilitate secure connections based on at least the security information stored in the trusted platform module. Transactions between the user/electronic merchants and between the user/secure server are conducted within protected environments. When a user conducts an electronic transaction with an electronic merchant, the transaction is authenticated by the secure server before can be completed.04-28-2011
20100280956SYSTEMS AND METHODS FOR CONDUCTING COMMERCE IN A VEHICLE - A system for a vehicle and for conducting a transaction with a remote system includes a circuit configured to wirelessly obtain data from a payment mechanism brought into the vehicle and to wirelessly transmit the data to the remote system.11-04-2010
20100280955SYSTEMS AND METHODS FOR VERIFYING IDENTITY - Systems and methods of verifying identity through the use of a plurality of identifying devices is provided. The identity information may be acquired electronically from a plurality of identity devices, which may include credit cards, cell phones, or other personal items fitted with wireless communicators such as RFID tags, for example. In various embodiments, the transaction may be approved or denied based on a number of factors, including the number identity devices, the types of identity information provided by the identity devices, and the level of security specified for the requested transaction.11-04-2010
20090119220AUTHORIZED SAMPLE RECEIVER - In an exemplary embodiment of the invention, an authorized sample receiver (ASR) comprises a processor that is configured to verify biometric sample data in order to create registered biometric sample data. The ASR may also comprise a communications device configured to receive a transaction request from an RF transaction device, wherein the transaction request comprises transaction biometric sample data, a reload protocol update request, and an RF device identification code. The ASR may also be configured to authorize the transaction request in response to the transaction biometric sample data substantially matching the registered biometric sample data. The ASR may further comprise a reload protocol data file associated with the device identification code, and the reload protocol data file may be configured to be updated in accordance with the reload protocol update request.05-07-2009
20080222046METHOD OF AND SYSTEM FOR EFFECTING ANONYMOUS CREDIT CARD PURCHASES OVER THE INTERNET - A transaction system for performing secure transactions over a communication network includes (i) a merchant server system including a computer processor and associated memory, the merchant server system offering items for sale; (ii) a buyer system including a computer processor and associated memory, the buyer system being selectively couplable to the merchant server system over the communication network to initiate a transaction, wherein, during the transaction, the buyer system selects one or more of the items for purchase; (iii) a security server system including a computer processor and associated memory and an encryption device, the security server system receiving buyer information from the buyer system, encrypting the buyer information in an encryption key that prevents the merchant server system from decrypting the buyer information, and transferring the encrypted buyer information to the merchant server system; and (iv) a third server system including a computer processor and associated memory, the third server system being selectively couplable to the merchant server system, wherein the merchant server system transmits at least a portion of the encrypted buyer information to the third server system for processing during the transaction.09-11-2008
20080243700METHODS AND APPARATUS FOR ROUTING SECURITIES ORDERS - According to some embodiments, a securities order trading system may determine, during a trading session, one or more attributes of an order destination. The attribute or attributes may be other than a price quoted or a size of an order booked on an order destination. The trading system may also determine during the trading session, and based on the order destination attribute or attributes, at least one of whether to route an order to the order destination, and a proportion of the order to allocate to the order destination.10-02-2008
20100293098PROCESS FOR CARRYING OUT A TRANSACTION BETWEEN A PAYMENT MODULE AND A SECURITY MODULE - This invention relates to a process for carrying out a transaction between a payment module and a security module connected to a user's unit, this process being characterized in that it comprises the following steps: entering an identifier representative of the transaction to be carried out by means of an input device; generating by the user's unit, a control message containing at least a representative code of said transaction and an identifier of the security module requiring the transaction; sending said control message to said payment module (PP); verifying in said payment module whether it is entitled to carry out the desired transaction; if the payment module is entitled to carry out this transaction, execution of the transaction, storage of the result of the transaction in said payment module and generation by the payment module, of a receipt relating to the desired transaction and to the related security module; sending said receipt to a management centre; sending an unlocking code to the security module (SC) by the management centre; registering the transaction in said security module.11-18-2010
20110125651SYSTEM AND METHOD FOR ADMINISTERING LIFE INSURANCE POLICIES ISSUED PRIOR TO UNDERWRITING - A computer system for administering applications for life insurance has a processor and a memory storage device in communication with the processor. The processor is configured to receive data indicative of an application and an initial premium payment from a proposed insured for life insurance; based on the received data, determine whether the proposed insured is uninsurable; responsive to a determination that the proposed insured is not uninsurable, generate an output signal having data indicative of a decision to respond to the application by issuing a policy and commencing a comprehensive underwriting process; receive data indicative of a result of the comprehensive underwriting process; based on the result of the comprehensive underwriting process, determine a rating of the proposed insured; and, based on the rating, provide an output signal indicative of a same or changed premium for the policy.05-26-2011
20110125652Issuing machine and issuing system for public-offering a financing instrument on-line - An issuing system for issuing unmodifiable and/or unforgeable hardcopy documents or securities includes a server and a plurality of issuing machines connected to the server via a network. Each of the issuing machines receives an ID recording medium provided by a potential purchaser, retrieves an identification recorded in the received ID recording medium, requests the potential purchaser to input a request for a transaction of the security or financing instrument, processes the requested transaction, and prints out on demand a hardcopy of the security or financing instrument as purchased by the potential purchaser and a checksum thereon. A method for forming a new market with the issuing system embodies preparing the financing instrument, public-offering the financing instrument, delivering to the purchaser a financial disclosure, requesting the purchaser to acknowledge receipt and review of the financial disclosure, confirming acknowledgement of the financial disclosure from the purchaser; and processing the requested transaction by retrieving information via the network to the server.05-26-2011
20100241569METHOD AND SYSTEM FOR MICROPAYMENT TRANSACTIONS - A micropayment system and method is presented for a payor U to establish payment to payee M for a transaction T, which typically has a very low value T09-23-2010
20090276361Transaction System and Method for Advance a Committed Time in the Future - Transaction systems and methods for advancing a committed time in the future are described herein. In the present transaction systems and methods, the first end can be permitted to pre-hatch a time capsule signature before the committed time. The time capsule signature scheme here is conducted based on an identity-based trapdoor relation (IDTR). Moreover, an extended time capsule signature scheme is conducted based on an extended identity-based trapdoor relation (IDTR). By using an extended IDTR primitive, the present transaction systems and methods can distinguish the time capsule signature is validated before or after the committed time t.11-05-2009
20100030693METHOD AND SYSTEM FOR HAND GEOMETRY RECOGNITION BIOMETRICS ON A FOB - The present invention discloses a system and methods for biometric security using hand geometry recognition biometrics in a transponder-reader system. The biometric security system also includes a hand geometry scan sensor that detects biometric samples and a device for verifying biometric samples. In one embodiment, the biometric security system includes a transponder configured with a hand geometry scan sensor. In another embodiment, the system includes a reader configured with a hand geometry scan sensor. In yet another embodiment, the present invention discloses methods for proffering and processing hand geometry scan samples to facilitate authorization of transactions.02-04-2010
20100030694METHOD FOR SECURING IP CONNECTIONS FOR NETWORK OPERATOR COMBINATORY CONNECTIONS - The invention relates to a method for securing IP connections with a combinatory connection of a communication network of a first network operator with a communication network of at least one second network operator using the Session Initiation Protocol, SIP. This method is based on the fact that portions of an SIP message, but at least the information necessary for the combinatory connection of the networks, is transmitted in encrypted form between a transmission channel of the first network operator and a reception channel of the second network operator.02-04-2010
20100017332INTER-NETWORK FINANCIAL SERVICE - Systems and methods for making a payment on behalf of a payer to a payee are provided. A request to make a payment on behalf of a payer to a payee is received at a first payment service provider. The first payment service provider supports a first payment network within a plurality of payment networks that each include a respective plurality of payers and payees. The payer is one of the plurality of payers and payees associated with the first payment network, and the payor is not one of the plurality of payers and payees associated with the first payment network. A second payment network within the plurality of payment networks with which the payee is associated is identified by the first payment service provider. A payment instruction to make the payment to the payee is transmitted by the first payment service provider to a second payment service provider associated with the second payment network.01-21-2010
20080301055 UNIFIED PLATFORM FOR REPUTATION AND SECURE TRANSACTIONS - The claimed subject matter provides a unified platform system and/or a method that facilitates optimizing an online transaction. The unified platform system can include a secured transaction component that can secure a portion of transactional data related to an online transaction between at least one buyer and at least one merchant utilizing a secure transaction technique. The unified platform system can include a reputation assessment component that can receive a portion of reputation data related to at least one of the buyer or the merchant based at least in part upon verifying completion of the online transaction between such buyer and merchant. The unified platform system can publish the portion of reputation data coupled with a portion of non-private transactional data to provide context for the reputation data.12-04-2008
20090006262FINANCIAL TRANSACTION PAYMENT PROCESSOR - A financial transaction payment processor includes an account access request processor for receiving dynamic swipe data from a payment card through a merchant infrastructure. A fraud detection processor is connected to analyze a dynamic data obtained by the account access request processor that should agree with values pre-loaded in a Crypto-Table by a card manufacturer. A payment authorization processor is connected to receive a message from the fraud detection processor and to then forward a response to the merchant infrastructure.01-01-2009
20120254041ONE-TIME CREDIT CARD NUMBERS - Various technologies related to one-time credit card numbers are presented. One-time credit card numbers can originate from a customer device and be independently generated by the customer device without online communication with an issuer. Signed transaction details can also be sent, providing non-repudiation of the purchase transaction. Merchant infrastructure need not be changed to accommodate the one-time credit card numbers. The technologies can be particularly resilient to replay, forgery, man-in-the-middle, and guessing attacks for credit card number generation or other usage by an attacker.10-04-2012
20120209777Monetary Transaction Control Code System - A payment system is provided having an internet interface. In one embodiment, the payment system issues instruments having control codes. The system may issue a first portion of the control code, and retain a second portion of the control code for later issuance. Such later issuance activates the instrument. Some embodiments have a role-based security access scheme. For example, one embodiment provides a security verification score to be used in assigning user permissions on the payment system. Customer service representatives having different security permissions complete different portions of the security scoring and permission assignment process. Some embodiments have automated processing of security verification items submitted by users.08-16-2012
20110167004ELECTRONIC SIGNATURE SECURITY SYSTEM - One embodiment of the invention enhances the security of electronic signatures during transmission. A peripheral device, which may be located remotely and separate from a host processing system, captures the signature. The peripheral device then binds the signature to the particular transaction record and transmits it to the host processing system. The host processing system validates or confirms the received signature before accepting the transaction. Binding the signature and record data together at the point-of-use reduces the likelihood that someone may be able to hack into the transmission medium, encrypted or not, and obtain the raw signature data. By binding or associating the signature and transaction record data together at the point-of-use, each transaction has a unique key, further foiling attempts at hacking. In various implementations, rather than associating the whole signature with the transaction record data, signature sample points or segments are encrypted with transaction record data.07-07-2011
20080262969Bit currency: transactional trust tools - Bit-currency Transactional Trust Tools (T3) is a set of tools and procedures based on expressing value through a bit string where the size of the string (bit count) reflects its value, and the identity of the bits is used to distinguish one such digital coin from the other, and for enabling an authentication hierarchy that alleviates the bottleneck of having a single source coin authentication for all transactions in coins issued (minted) by that mint; also enabling an instant split of a coin by simply splitting off a portion of the string of the coin, such that the bit count of the split-off string reflects its value. Each coin is comprised of that body string as described above, and a header that contains information regarding coin identifier, payment conditions, and suchlike. Such bit currency can be carried around everywhere bits are handled, and may be encrypted as necessary. Two online strangers could transact and make a payment by using the PINprivate procedure where by the strangers create a temporary secret which is sufficient for the payee to access the online location with the payment, and empty it before any third party can steal it; the temporary secret is based on the payer pre-calculating several computational tasks allowing the payee to randomly choose a task to compute, and communicating the identity of the chosen task (the temporary secret) by sending back the result, the task being a one-way function, it's unfeasible for any third party to find the secret before computing all the presented tasks. The bit currency can be exchanged between software applets carrying out rules of exchange and thereby allowing peer-to-peer networks to work more efficiently, and also allow for peer-to-peer distribution of digital goods to be carried out while honoring the digital rights of the digital file owner, so doing by allowing the mint to cut a portion of the payment digitally paid by the receiving node and allocate such cut to the digital rights owner.10-23-2008
20120059762Dynamic Card Verification Value - As described herein, a card services provider dynamically generates a card verification value (CVV) for a transaction card and sends the dynamically-generated CVV to a cardholder. The card services provider generates the dynamically-generated CVV such that the dynamically-generated CVV is substantially unpredictable based on other dynamically-generated CVVs for the transaction card. The dynamically-generated CVV is only valid for a limited period of time and/or for a limited number of economic transactions. The cardholder uses the dynamically-generated CVV as part of an economic transaction with a merchant. Because the dynamically-generated CVV is only valid for a limited number of economic transactions and/or for a limited period of time, it may be difficult for a thief to repeatedly use the transaction card to make economic transactions.03-08-2012
20120158593SYSTEMS AND METHODS FOR FACILITATING SECURE TRANSACTIONS - Various embodiments are directed to methods for generating proxy account data for a financial account and authorizing payment from an account of a customer based on proxy account data. Example methods may comprise selecting a serial number for a first customer and storing an association between the serial number and an account of the first customer. The methods may further comprise encrypting the serial number and consolidating the encrypted serial number with checkable data. An association between the encrypted serial number and the checkable data may be stored and the consolidated encrypted serial number and checkable data may be encrypted to generate proxy account data.06-21-2012
20120072353ENHANCED SYSTEM AND METHOD FOR MULTIPATH CONTACTLESS TRANSACTIONS - A system for multipath contactless transaction processing, comprising a networked server comprising a processing unit, a billing entity based on a first networked computing device comprising a processing unit and a video screen, the video screen at least sometimes viewable by a purchaser interacting with the point-of-sale processing system. According to the system, during a transaction, a graphical indicia is displayed on the video screen in a form suitable for photographing or scanning by a payment entity mobile device; and wherein, said indicia is being replaced each time a predetermined time period has elapsed, these replacements occurring regularly until the transaction is completed.03-22-2012
20110106709METHOD AND APPARATUS FOR RECOVERY DURING AUTHENTICATION - Techniques for recovery during authentication include initiating sending a HyperText Transfer Protocol (HTTP) authentication message from user equipment of a user to a merchant node of a merchant. If the user is not authenticated in response to the HTTP authentication message, then sending a Short Message Service (SMS) message from the user equipment to the merchant node is initiated. The SMS message indicates a transaction between the user and the merchant. In some embodiments, techniques include changing an access point to a network until an access point utilized is on a list of acceptable access points, in response to a buy response message that indicates a transaction between a merchant and a user. A hypertext transfer protocol authentication message is sent through the access point that is on the list of acceptable access points05-05-2011
20120084211SYSTEM AND METHOD FOR A SECURE TRANSACTION MODULE - A secure electronic payment transaction system includes a Secure Transaction Module (STM) and a host device. The STM includes hardware and software components that meet the security requirements of the payment card industry and provide secure payment transactions utilizing banking cards. The host device includes a communication modem for connecting to financial institutions via a network connection. The STM connects to the host device via an interface and communicates with the financial institutions via the host device's communication modem. The STM is self-sufficient and can be connected to any host device over any interface.04-05-2012
20120166343FUEL DISPENSING PAYMENT SYSTEM FOR SECURE EVALUATION OF CARDHOLDER DATA - A system used in a retail environment for providing end-to-end encryption of payment cardholder data. An input device configured to receive cardholder data is operative to encrypt the cardholder data according to a first encryption method to produce first encrypted cardholder data. A cardholder data handling device is in electronic communication with the input device. A secure evaluation assembly (SEA) is operatively connected to the cardholder data handling device and comprises antitampering control electronics adapted to decrypt the first encrypted cardholder data to produce unencrypted cardholder data. The antitampering control electronics evaluate the unencrypted cardholder data to determine whether the unencrypted cardholder data is payment cardholder data or nonsensitive cardholder data. Finally, if the unencrypted cardholder data is payment cardholder data, the antitampering control electronics of the SEA are adapted to encrypt the unencrypted cardholder data according to a second encryption method to produce second encrypted cardholder data.06-28-2012
20110184869METHOD OF MANAGING FRANCHISES USING CREDIT-CARD PAYMENT SYSTEM - A method of managing franchises using a credit-card payment system is provided. The method includes (a) inputting a goods selection or service use statement of a customer at a franchise to a franchise client to calculate an estimated payment amount, inputting member information of the customer to the franchise client, and transmitting the member information to a customer information server of a head office to request member authentication; (b) receiving, by the customer information server, a member authentication request signal for the customer, comparing the member authentication request signal with previously stored member information of the customer to perform authentication processing, and transmitting the result of authentication processing to the franchise client; (c) inputting credit-card payment information for the estimated payment amount to the franchise client, requesting a card company for payment approval, and receiving approval information; (d) outputting selection items for a satisfaction survey for service provided by the franchise through a sign pad connected to the franchise client; (e) when customer response data for the survey selection items is received from the sign pad, analyzing and statistically processing customer satisfaction evaluation information for the franchise according to the selection items, and storing the resultant customer satisfaction evaluation information in a database of the customer information server; and (f) switching the sign pad to a screen for obtaining a digital signature.07-28-2011
20100049659Method, device, server and system for identity authentication using biometrics - A method, a device, a server and a system for authenticating the identity with the biological character in an authenticating system, the authenticating system at least includes a local device and an authenticating server, wherein the method comprises the following steps: inputting step, inputting the biological character data in the local device by a biological character sensor; matching step, matching the input biological character data with the original biological character data pre-stored in the memory of the local device; first identification code producing step, producing the first identification code in the local device if the input biological character data is matched with the original biological character data pre-stored in the memory; and authenticating step, sending the first identification code to the authenticating server, authenticating the first identification code by the authenticating server in order to authorize the system to perform the authorized operation.02-25-2010
20100049658SECURE ELECTRONIC TRANSACTION SYSTEM - Systems and methods for the secure processing of electronic transactions are disclosed. In accordance with an exemplary embodiment, a system and method for the secure processing of electronic transactions comprises: receiving, by a POS terminal, information for a financial transaction card; receiving, by the POS terminal, information for a financial transaction; encrypting, by the POS terminal, the financial card information and the financial transaction information into a first encrypted message; transmitting the first encrypted message to a regional chassis; encrypting, by the regional chassis, the first encrypted message into a second encrypted message; transmitting the second encrypted message to a central chassis; decrypting, by the central chassis, the second encrypted message into a decrypted message; and transmitting the decrypted message to a host processor for authorization.02-25-2010
20110004556 System and method of electronic information delivery - A system and method for web browser based, secure or authenticated electronic delivery of information, wherein the security or authentication is provided by a means of a public key cryptography encryption method. The system can be used as a web-based blind bidding method, wherein software is located and operated on a central server and within the end user's web browser. Thus, no software is installed onto the end user's computer. In addition, the bidding system uses two-way PKC encryption technology or symmetric encryption technology to sign and seal the bid data submitted by each bidder, said encryption technology being completely browser based.01-06-2011
20120239577Systems and methods for performing person-to-person transactions using active authentication - In some embodiments, a method of performing a person-to-person financial transaction includes receiving an active authentication transaction key at a mobile financial transaction instrument of a transferor from a financial institution, storing the active authentication transaction key in a non-transient machine-readable storage medium of the mobile financial transaction instrument of the transferor, and transferring the active authentication transaction key to a mobile financial transaction instrument of a transferee for completion of the person-to-person financial transaction using wireless transmission.09-20-2012
20110270762Secure Data Transfer From a Vending Device to Portable Data Storage Devices - Techniques for transferring secured data from a vending device to a portable data storage device are described herein. The vending device receives a request from a user of the portable data storage device for digital contents to be stored on the portable data storage device and requests for a payment for the requested digital contents to be paid by the user. The vending device locates a first portable storage identification (PSID) parameter unique to the portable data storage device, and then generates a rights object including a second PSID parameter that is equal to the first PSID parameter to prevent the digital contents from being accessed at a data storage medium other than the portable data storage device. It is to be appreciated some or all of the above processing, such as location or generation of parameters, can be completed by a back-end device separate from the vending device.11-03-2011
20120330843TRANSPARENTLY SECURING DATA FOR TRANSMISSION ON FINANCIAL NETWORKS - Systems and methods for performing financial transactions are provided. In one embodiment, the invention provides a method for processing token data for a bank card transaction, the method includes: receiving a string of first token data from a token at a token reader; modifying the first token data and generating second token data, the second token data including modified token data; performing a modulo arithmetic operation on the second token data and determining a mod 12-27-2012
20110246371ENCODING OF A BANK TRANSFER - Process for encoding and/or decoding of the contents of data fields of a form, the contents of several data fields being combined into a first character chain, this first character chain being encoded in the corresponding number of bits into a corresponding first bit code, and this first bit code by means of second encoding, especially using 6 bits per character, being converted into a second character chain, this second character chain conversely being decodable/decoded into the contents of the data fields.10-06-2011
20110246370FACILITATING TRANSACTIONS USING UNSUPPORTED TRANSACTION IDENTIFIER TYPES - Facilitating transactions using unsupported transaction identifier types entails receiving a unique transaction indicator having a transaction indicator type, and an indication that a corresponding transaction is to be carried out with a device that does not adequately support the transaction indicator type, and sending information to the device to allow the corresponding transaction to be completed. In one example, an encoded version of the unique transaction indicator is prepared by dividing an image constituting the unique transaction indicator into a plurality of sub-areas, and representing each of the sub-areas using the characters, which respectively represent the content of each sub-area.10-06-2011
20110246369EVENT ACCESS WITH DATA FIELD ENCRYPTION FOR VALIDATION AND ACCESS CONTROL - The utility of a portable consumer device is extended by allowing account holders the ability to gain entry into access-controlled venues (e.g., baseball or soccer game, cinema, public transit) using a portable consumer device that is associated with an account that was used to purchase the admission or tickets to the event at the access-controlled venue. Techniques disclosed allow cardholder authentication in a non-payment setting that enables cardholders access to a location or a specific event. A first validation cryptogram is generated in the purchase cycle and is stored. A second validation cryptogram is generated in the validation cycle at the venue. If the second validation cryptogram matches the first validation cryptogram, the consumer is granted access. Validation cryptograms may be based on input data that is specific to the payment card holder (e.g., primary account number), specific to the ticket selling merchant (e.g., merchant identifier), specific to the event (e.g., event identifier, date/time, location, etc.), and/or specific to the transaction (e.g., authorization code from a payment network). Based on the input data, validation cryptograms may be generated using encryption, hashing, a combination of encryption and hashing, and/or other operations on the input data.10-06-2011
20130179350ELECTRONIC SIGNATURE SECURITY ALGORITHMS - Technologies are generally described for security algorithm methods in authorizing and linking devices associated with a customer. A first device can be linked to a customer account. Additional devices can be linked to the customer account. Those devices can be authenticated to perform banking operations using dual factor authentication wherein a customer's login information is a first factor and the customer using a previously authenticated device is a second factor. By using additional methods of authentication, transactions can be done more reliably and securely.07-11-2013
20130103591AUTHENTICATION - The user's SIM 20 is adapted to store a seed for generating an authentication code which is usable to authenticate a transaction. The mobile telecommunications device 1 has a processor including means operable to obtain the seed from the SIM, to calculate the authentication code and to generate a transaction message for enabling the transaction with the entity, the transaction message including the authentication code.04-25-2013
20130132282APPARATUS AND METHODS FOR PAYMENT TRANSACTIONS USING NEAR FIELD COMMUNICATION - In one embodiment, the mobile device includes an NFC tag for near field communication. The NFC tag may include a first storage device and a second storage device. Personal data is stored on the first storage device, which is not accessible by a NFC reader device. Prior to a transaction, the personal data is transmitted from the first storage device to the second storage device, where the data is readable or accessible by the reader device. After transmission of the data to the reader device, the data on the second storage is erased. In this respect, the data is not available for eavesdropping by an unauthorized reader device. In one embodiment, the data remains stored in the first storage device and available for future use. In another embodiment, the data comprises financial product data.05-23-2013
20130132281COMPUTER-IMPLEMENTED METHOD FOR CAPTURING DATA USING PROVIDED INSTRUCTIONS - A computer-implemented method for capturing data including sending a set of select processing instructions for capture of a set of select data to a first party computer from an instruction provider computer; combining a set of non-select processing instructions for capture of a set of non-select data with the set of select processing instructions into a set of data requests, where the combining is performed by the first party computer; sending the set of data requests from the first party computer to an end user computer; processing the set of data requests on the end user computer according to the set of select processing instructions and the set of non-select processing instructions; sending the set of select data from the end user computer to a second party computer; and, sending the set of non-select data from the end user computer to the first party computer.05-23-2013
20110231318PAY AT PUMP ENCRYPTION DEVICE - Embodiments of the present invention are drawn to systems and methods for securing information using cryptographically keyed units. Specifically, in one embodiment of the present invention, a system is provided for securing information that uses two cryptographically keyed units to encrypt information flowing between a fuel pump device and a remote device. Thus, even if the information is intercepted, it could not be used to perpetrate fraud.09-22-2011
20120284193SYSTEM AND METHOD FOR SECURE COMMUNICATION FOR CASHLESS TRANSACTIONS - Embodiments of the present invention provide a system and method for an access point providing client to point-of-sale communication over a network, comprising: receiving credentials from the point-of-sale; sending at least one beacon message; receiving a probe request from a client; sending a probe response to the client; authenticating a connection with the client: exchanging capabilities with the client; performing a security handshake with the client; assigning at least one dynamic IP address to the client; and establishing an https session between the client and the point-of-sale over the network.11-08-2012
20110313930DYNAMICALLY ADAPTIVE POLICY MANAGEMENT FOR SECURING MOBILE FINANCIAL TRANSACTIONS - A system for securing a mobile financial transaction using an adaptive security policy is provided by presenting, via an external terminal, an input request associated with a vertex of the security policy. User input is received via the external terminal in response to the input request. A rule associated with the vertex is retrieved from a database. An edge is selected from a plurality of edges associated with the vertex according to the retrieved rule. A communication session of the external terminal is routed to a subsequent vertex via the selected edge.12-22-2011
20120078798SYSTEMS AND METHODS FOR TRANSMITTING FINANCIAL ACCOUNT INFORMATION - Described herein are methods and systems for securely transmitting information, including financial account information. An irreversibly encrypted account number can be transmitted to a processing party as part of a transmission packet. The processing party can extract other information from the transmission packet to determine one or more registered account numbers that may match the irreversibly encrypted account number. Using the same encryption algorithm used to create the transmission packet, the processing party can create a verification packet by encrypting the one or more registered account numbers and determine if the verification packet matches the transmission packet. As a result, financial account information can be transmitted in such a way that it cannot be intercepted and then used to perform an unauthorized transaction.03-29-2012
20120084210MOBILE DEVICE PAYMENT SYSTEM - Technology is provided for using a mobile device as part of a payment system. The mobile device utilizes an accessory with a security feature based on its connection state to the mobile device. When the accessory detects disconnection, the accessory deletes user account information on the accessory. When in a valid connection state, the accessory transmits a user payment service account identification and an accessory identification to a transceiver of a merchant computer system to initiate a transaction. A payment service system eventually receives the information transmitted by the accessory, and contacts the mobile device associated with the account for transaction approval in one example. Thus, the user initiates the transaction at his/her mobile device using the connected mobile device accessory, and approves the transaction on his/her mobile device. In other examples, the user can send approval in a transmission to the merchant system or set up other pre-authorization criteria.04-05-2012
20130212024TOKENIZATION IN DISTRIBUTED PAYMENT ENVIRONMENTS - Data can be protected in mobile and payment environments through various tokenization operations. A mobile device can tokenize communication data based on device information and session information associated with the mobile device. A payment terminal can tokenize payment information received at the payment terminal during a transaction based on transaction information associated with the transaction. Payment data tokenized first a first set of token tables and according to a first set of tokenization parameters by a first payment entity can be detokenized or re-tokenized with a second set of token tables and according to a second set of tokenization parameters. Payment information can be tokenized and sent to a mobile device as a token card based on one or more selected use rules, and a user can request a transaction based on the token card. The transaction can be authorized if the transaction satisfies the selected use rules.08-15-2013

Patent applications in class Secure transaction (e.g., EFT/POS)

Patent applications in all subclasses Secure transaction (e.g., EFT/POS)