Inventors list

Assignees list

Classification tree browser

Top 100 Inventors

Top 100 Assignees


Including intelligent token (e.g., electronic purse)

Subclass of:

705 - Data processing: financial, business practice, management, or cost/price determination

705050000 - BUSINESS PROCESSING USING CRYPTOGRAPHY

705064000 - Secure transaction (e.g., EFT/POS)

Patent class list (only not empty are listed)

Deeper subclasses:

Class / Patent application numberDescriptionNumber of patent applications / Date published
705067000 Including authentication 130
705066000 Intelligent token initializing or reloading 20
705069000 Electronic cash detail (e.g., blinded, divisible, or detecting double spending) 3
20110099113Virtual Account Based New Digital Cash Protocols With Combined Blind Digital Signature and Pseudonym Authentication - Virtual account based digital cash protocols use a combination of blind digital signatures and pseudonym authentication with at least two pairs of public and private keys. A user is provided with one master pair of private and public keys and as many pseudonym pairs of private and public keys as desired. The resulting virtual account based hybrid protocols combine the advantages of blind digital signature and pseudonym authentication. Blind digital signatures based on the master pair of keys are used to withdraw digital cash from the user's bank account under the user's real identity. A pseudonym pair of keys is used for converting digital cash into virtual account based digital cash by a digital cash issuer. All pseudonyms can be used for spending the virtual account based digital cash. These protocols ensure anonymity when withdrawing digital cash from the user's account under the user's real identity in addition to providing pseudonym authentication when spending virtual cash based digital cash under a pseudonym.04-28-2011
20110191251Token Based New Digital Cash Protocols With Combined Blind Digital Signature and Pseudonym Authentication - Digital cash token protocols use a combination of blind digital signatures and pseudonym authentication with at least two pairs of public and private keys. A user is provided with one master pair of private and public keys and as many pseudonym pairs of private and public keys as desired. The resulting digital cash token based hybrid protocols combine the advantages of blind digital signature and pseudonym authentication. Blind digital signatures based on the master pair of keys are used to withdraw digital cash from the user's bank account under the user's real identity. A pseudonym pair of keys is used for converting digital cash into digital cash tokens by a digital cash issuer. All pseudonyms can be used for spending the digital cash tokens. These protocols ensure anonymity when withdrawing digital cash from the user's account under the user's real identity in addition to providing pseudonym authentication when spending digital cash tokens under a pseudonym.08-04-2011
20080243703VIRTUAL ACCOUNT BASED NEW DIGITAL CASH PROTOCOLS WITH COMBINED BLIND DIGITAL SIGNATURE AND PSEUDONYM AUTHENTICATION - Virtual account based digital cash protocols use a combination of blind digital signatures and pseudonym authentication with at least two pairs of public and private keys. A user is provided with one master pair of private and public keys and as many pseudonym pairs of private and public keys as desired. The resulting virtual account based hybrid protocols combine the advantages of blind digital signature and pseudonym authentication. Blind digital signatures based on the master pair of keys are used to withdraw digital cash from the user's bank account under the user's real identity. A pseudonym pair of keys is used for converting digital cash into virtual account based digital cash by a digital cash issuer. All pseudonyms can be used for spending the virtual account based digital cash. These protocols ensure anonymity when withdrawing digital cash from the user's account under the user's real identity in addition to providing pseudonym authentication when spending virtual cash based digital cash under a pseudonym.10-02-2008
705068000 Balancing account 1
20090254484Anon virtual prepaid internet shopping card - The invention is a new generation of system of payments, designed for the millions of customers around the world who are victims of identity theft and fraud with credit card; because it is anonymous, prepaid, disposable, non-reloadable, non-refundable, and easy to doing any purchase online, telephone, mail or retailer. The invention has both features such as 1) is a prepaid debit card (expiration date & security code) and 2) is a prepaid phone card (PIN), with an amount assigned on every account/card, which is exhausted when the cash amount is expended and works with the same physical characteristics, electronic and financial mechanisms of a debit card as they do major credit cards, are an open loop. It is distributed by retailers (plastic card) or Internet (virtual account) and must be pre-activated for use after purchased.10-08-2009
Entries
DocumentTitleDate
20130046696Method and Apparatus for Object Transaction Session Validation - According to one embodiment, an apparatus may store a plurality of token-based rules. A token-based rule may facilitate access to a resource. The apparatus may further store a plurality of tokens. The apparatus may receive a first token indicating that a transaction associated with the resource has been requested. The apparatus may determine at least one token-based rule based at least in part upon the first token. The at least one token-based rule may condition access to the resource upon a second token. The apparatus may determine that the plurality of tokens includes the second token associated with the at least one token-based rule and generate a session token based at least in part upon the first token and the second token in response to the determination that the plurality of tokens includes the second token. The apparatus may then allow the transaction.02-21-2013
20130036057WEB-BASED ELECTRONIC CONTROLLED SUBSTANCE TRANSFER MANAGEMENT SYSTEM AND METHOD - A Web-based Electronic Controlled Substance (CS) Transfer Management System and Method designed to fully comply with the DEA requirements for a prescription of controlled substances. The system and method allows the buyer to securely order and confirm the receipt of the controlled substances over an existing Internet infrastructure of the buyer such as a Web browser as the buyer's software, thus avoiding the necessity of any additional proprietary software or hardware to be built and installed onto the buyer's computer. The system and method further utilizes various validation functions, related to signing the controlled substance prescription with the utilization of the PKI certificate therefore, completely eliminating the necessity of the paper DEA 222 Form. The transfer of the controlled substances is managed through a secured database server, wherein signed validated orders are posted for fulfillment and reporting to the DEA.02-07-2013
20130041830METHODS AND APPARATUS TO PROVISION PAYMENT SERVICES - Methods and apparatus to provision payment services are disclosed. An example method includes receiving an indication of a service to be provisioned to a mobile device, generating a token indicative of the service, wherein the token includes a cryptographically signed portion that was cryptographically signed by a secure element of the mobile device, sending the token to an entity for verification, and provisioning the service when the token is verified.02-14-2013
20120191612PORTABLE E-WALLET AND UNIVERSAL CARD - Universal cards are used in place of all the other traditional cards which a person may want to carry. The universal card can include a short range communications transceiver to communicate with a mobile device. The mobile device can include a user interface and an e-wallet application so that the user can interface with the e-wallet application for programming the universal card via the short range communication link. Once programmed, the universal card emulates a function of a traditional card.07-26-2012
20120109828PRE-AUTHENTICATED IDENTIFICATION TOKEN - A wearable identification token includes a housing, a transmitter for transmitting user identification data to a proximity reader, a switch for switching the identification token between an enabled state and a disabled state, and a sensor for detecting removal of the housing from the user's body. The switch is responsive to the sensor to switch the identification token from the enabled state to the disabled state in response to the housing being removed from the user's body, and is responsive to a signal received from a trusted electronic device to switch the identification token from the disabled state to the enabled state.05-03-2012
20090164380FINANCIAL TRANSACTION NETWORK - The manufacture and control of payment cards used in consumer financial transactions circulates a population of payments cards with user identification and account access codes. Each use of an individual card produces a variation of its user access code according to an encryption program seeded with encryption keys or initialization vectors. A portion of the magnetic stripe is made dynamic with a Q-Chip magnetic MEMS device. The job of personalizing payment cards with the user identification and account access codes is outsourced to a personalization company. The encryption keys and initialization vectors are kept private from the personalization company by using the encryption program to generate tables of computed results. Respective ones of the tables of computed results are sent for loading by the personalization company into new members of the population of payments cards. New payment cards are manufactured and distributed that include and operate with the tables of computed results.06-25-2009
20080319912POWERING FINANCIAL TRANSACTION TOKEN WITH ONBOARD AND EXTERNAL POWER SOURCE - A card or token used in financial transactions has an onboard energy storage device that enables onboard electronics to operate when the card is not in the proximity of a merchant Point-Of-Service (POS) terminal. In one implementation, the onboard energy storage device includes a capacitor such as a thin-film capacitor that stores sufficient energy to power onboard electronics without the need for an onboard battery. The card or token may be incorporated within various conventional apparatus such as a see-through and/or protective substrate, an item of clothing, an item of jewelry, a cell phone, a Personal Digital Assistant (PDA), a credit card, an identification card, a money holder, a wallet, a personal organizer, a keychain payment tag, and like personality.12-25-2008
20080319911FINANCIAL TRANSACTION TOKEN WITH ONBOARD POWER SOURCE - There is provided a card or token for use in financial transactions. The financial transaction token or card has an onboard energy storage device that enables onboard electronics to operate when the card is not in the proximity of a merchant Point-Of-Service (POS) terminal. In one implementation, the onboard energy storage device includes a capacitor such as a thin-film capacitor that stores sufficient energy to power onboard electronics without the need for an onboard battery. The card may be incorporated within various conventional apparatus such as a see-through and/or protective substrate, an item of clothing, an item of jewelry, a cell phone, a Personal Digital Assistant (PDA), a credit card, an identification card, a money holder, a wallet, a personal organizer, a keychain payment tag, and like personality.12-25-2008
20080228651Public Key Crytography Method and System - A system is disclosed relating to the use of digital certificates to improve internet communications. In one embodiment digital certificates are used to facilitate payment for goods or services, where the digital certificate is designated as having a certain value. In a further embodiment digital certificates are used for reducing or preventing unsolicited emails or spam. In a still further embodiment digital certificates are used in a digital Lottery System.09-18-2008
20090006263TECHNIQUE FOR SECURELY COMMUNICATING INFORMATION - A system that communicates information is described. During operation, this system receives an encryption key through a first wireless communication technique, wherein the first wireless communication technique includes near field communication. Then, the system communicates a document through a second wireless communication technique, where the document is associated with a financial transaction being conducted with a commercial establishment. Next, the system receives encrypted information through the second wireless communication technique, where the encrypted information is, at least in part, encrypted using the encryption key, and where the second wireless communication technique includes a technique other than near field communication.01-01-2009
20120296828Method and System for Distributing Electronic Tickets with Visual Display - This invention discloses a novel system and method for distributing electronic ticketing such that the ticket is verified at the entrance to venues by means of an animation or other human perceptible verifying visual object that is selected by the venue for the specific event. This removes the need to use a bar-code scanner on an LCD display of a cell phone or other device and speeds up the rate at which human ticket takers can verify ticket holders. The system providing the service also can maintain a persistent communication channel with the user device in order to control the ticket verification process.11-22-2012
20120296827PERFORMING AUTOMATICALLY AUTHORIZED PROGRAMMATIC TRANSACTIONS - Techniques are described for facilitating interactions between computing systems, such as by performing transactions between parties that are automatically authorized via a third-party transaction authorization system. In some situations, the transactions are programmatic transactions involving the use of fee-based Web services by executing application programs, with the transaction authorization system authorizing and/or providing payments in accordance with private authorization instructions previously specified by the parties. The authorization instructions may include predefined instruction rule sets that regulate conditions under which a potential transaction can be authorized, with the instruction rule sets each referenced by an associated reference token. After one or more of the parties to a potential transaction supply reference tokens for the parties, the transaction authorization system can determine whether to authorize the transaction based on whether the instruction rule sets associated with the reference tokens are compatible or otherwise satisfied.11-22-2012
20120296826METHOD AND SYSTEM FOR DISTRIBUTING ELECTRONIC TICKETS WITH VISUAL DISPLAY - This invention discloses a novel system and method for distributing electronic ticketing such that the ticket is verified at the entrance to venues by means of an animation or other human perceptible verifying visual object that is selected by the venue for the specific event. This removes the need to use a barcode scanner on an LCD display of a cell phone or other device and speeds up the rate at which human ticket takers can verify ticket holders.11-22-2012
20090164381METHOD OF MAKING SECURE PAYMENT CARDS - A method of making secure payment cards for financial transactions over networks includes building payment card blanks by integrating plastic, circuit, battery, semiconductor chips, magnetic stripe, magnetic MEMS device, and other components into a debit/credit card format conforming to ISO industry standards, all in response to an order from an issuing bank. Then personalizing each payment card blank with a personal account number (PAN) of which a portion is variable according to an encryption processor and secret encryption key kept by said issuing bank, and only computed results are loaded in embedded crypto-tables for presentation during financial transactions by said magnetic MEMS device. A population of secure payment cards is produced which can be circulated for use in the commercial markets.06-25-2009
20090198617Method and apparatus for performing delegated transactions - A computer implemented method for enabling a third party by a user to execute a transaction on behalf of the user, said method comprising: 08-06-2009
20090063352METHODS AND SYSTEMS FOR MONETARY EXCHANGE AND TRANSFER - A system for monetary exchange and transfer comprises a centralized location, wherein the centralized location comprises at least a first account at the centralized location comprising first funds for a first user and a second account at the centralized location comprising second funds for a second user. The system may further comprise a first device associated with the first account configured to electronically store by the first device an accounting of the first funds, a second device associated with the second account configured to electronically store by the second device an accounting of the second funds, and an electronic transfer system configured to transfer at least a portion of the first funds from the first device directly to the second device. The system may further comprise a receiver system configured to receive at least a portion of the first funds by the second device directly from the first device, a first device accounting reconciliation system configured to reconcile the accounting of the first funds by the first device, and a second device accounting reconciliation system configured to reconcile the accounting of the second funds by the second device.03-05-2009
20100211506MOBILE TRANSACTION SYSTEM AND METHOD - A mobile transaction system and method are carried out by a plurality of remote trading servers, a mobile barcode trading device and a data transmission server. The remote trading server generates and transmits a two-dimensional barcode image to at least one store client to display thereon after a user selects at least one product from the store client. The mobile barcode trading device captures the two-dimensional barcode image, analyzes the two-dimensional barcode image to obtain an encrypted key data and a trade data, and generates an encrypted payment data by the encrypted key data after the user input a payment data. The encrypted payment data and the trade data are combined to generate an encrypted trade data being transmitted to at least one of a plurality of the remote trading servers via a data transmission server, so as to carry out a mobile transaction.08-19-2010
20090106157Funding a Radio Frequency Device Transaction - A transponder-reader payment system includes an RFID reader for interrogating a transponder and an RFID transponder device. The RFID reader receives, from the RFID transponder device, a code that is associated with a first funding source and a second funding source. The RFID reader communicates a request associated with a transaction to a payment processor. The request includes the code and the transaction is funded using the first funding source and the second funding source associated with the code. In one embodiment, the transaction is funded according to a funding account protocol associated with the code.04-23-2009
20090240625POWERING FINANCIAL TRANSACTION TOKEN WITH ONBOARD POWER SOURCE - There is provided a card or token for use in financial transactions. The financial transaction token or card has an onboard energy storage device that enables onboard electronics to operate when the card is not in the proximity of a merchant Point-Of-Service (POS) terminal. In one implementation, the onboard energy storage device includes a capacitor such as a thin-film capacitor that stores sufficient energy to power onboard electronics without the need for an onboard battery. The card may be incorporated within various conventional apparatus such as a see-through and/or protective substrate, an item of clothing, an item of jewelry, a cell phone, a Personal Digital Assistant (PDA), a credit card, an identification card, a money holder, a wallet, a personal organizer, a keychain payment tag, and like personality.09-24-2009
20080243701TRANSPARENTLY SECURING DATA FOR TRANSMISSION ON FINANCIAL NETWORKS - Systems and methods for performing financial transactions are provided. In one embodiment, the invention provides a method for processing token data for a bank card transaction, the method includes: receiving a string of first token data from a token at a token reader; modifying the first token data and generating second token data, the second token data including modified token data; performing a modulo arithmetic operation on the second token data and determining a mod 10-02-2008
20120310838LOCAL USAGE OF ELECTRONIC TOKENS IN A TRANSACTION PROCESSING SYSTEM - A method for the use of electronic transactional tokens includes: generating a plurality of transactional tokens including a first token; associating each of the transactional tokens with a plurality of users, the first token associated with a first user; monitoring usage of the transactional tokens in a plurality of transactions in a local region or network; and in response to receiving transactional data for the first transaction, updating the first token from a first state to a second state (e.g., to provide a benefit when the token is applied in the local region or network). The tokens may be generated and monitored using a token processing system, which uses transaction data received by a transaction handler that is handling transaction processing for the transactions.12-06-2012
20110137802PURCHASE TRANSACTION SYSTEM WITH ENCRYPTED PAYMENT CARD DATA - Systems and methods are provided for securing payment card information. A user may present a payment card such as a credit card to point-of-sale equipment. The point-of-sale equipment may encrypt the payment card information. An encryption algorithm may be used that takes as inputs a first part of the payment card information, a tweak formed by a second part of the payment card information, and an encryption key. The encrypted payment card information may be conveyed to a gateway over a communications network. The gateway may identify which encryption algorithm was used in encrypting the payment card information and may re-encrypt the payment card information using a format preserving encryption algorithm. A network-based service may be used to remotely perform functions for the gateway.06-09-2011
20100082491System and method for providing electronic event tickets - Systems, methods, and devices for providing and managing electronic event tickets are provided. For example, a device for managing an electronic event ticket may include a processor configured to run an electronic ticket management application, a memory device configured to store data associated with the electronic ticket management application, an electronic display configured to display at least a portion of the data associated with the electronic ticket management application, and an input/output interface configured to receive an electronic ticket and the data associated with the electronic ticket for management by the electronic ticket management application. The electronic ticket management application may be configured to enable the electronic device to gain entry to an event and to obtain at least one other event-related benefit after the electronic ticket is received by the input/output interface.04-01-2010
20110307387Method and System for Distributed Point of Sale Transactions - A method and system for a fully distributed on-line selling environment is presented. Any webpage can contain a program module that for each customer that view any webpage with the module embedded in it, automatically associates that customer with their corresponding shopping cart stored at a central server. The module can initiate a sale transaction for a product presented on the webpage and cause the central server to complete the purchase and fulfillment. The module automatically updates the customer shopping cart and presents updated inventory availability. The website hosting the webpages with the module do not operate any back end transaction processing or order fulfillment.12-15-2011
20130151416SYSTEM AND METHOD FOR TARGETED INFORMATION DELIVERY THROUGH SOCIAL NETWORK - A method for delivering information to a targeted group of users includes establishing a network that includes a plurality of users and a plurality of entities being connected with each other based on the interest of the users in the entities; searching for a targeted group of users who match a specification of an interest profile and a specification of a spatial temporal profile among the users in the network; and delivering information to the targeted group of users. The interest profile is based on the relationships between each user and the entities that the user is interested in. The spatial temporal profile is based on the location and the time on which the user accesses the network. A system for delivering information to a targeted group of users is also provided.06-13-2013
20120317034TRANSPARENT VIRTUAL CURRENCY USING VERIFIABLE TOKENS - Users make online purchases using a virtual currency. A series of secret encryption keys is generated, where each key in the series is associated with a different epoch. A token tracking table is initialized. Whenever real currency is received from a user wanting to purchase tokens, a semantically secure encryption method is used in conjunction with the secret encryption key in the series that is associated with the current epoch to generate a set of encrypted tokens which includes one or more encrypted paid tokens. The set of encrypted tokens is sent to the user wanting to purchase tokens, and each encrypted paid token in the set is entered into the token tracking table, where the entry for each encrypted paid token includes information specifying that the token has not yet been spent and has not yet been encashed.12-13-2012
20120123947LATE BINDING TOKEN IN SYSTEM AND METHOD FOR VERIFYING INTENT IN A CARD NOT PRESENT TRANSACTION - A system for verifying intent in a card not present transaction is provided. The system includes a late binding token that is distributable to consumers without necessarily being bound to an account. The system also includes a client software that locates a token server configured to facilitate managing and communicating with the late binding token. The system also includes a protocol concerning how to build a verifiably secure structured proposal that carries an offer to the consumer through the client software.05-17-2012
20120173432SELF-AUTHORIZING TOKEN - Self-authorizing tokens are disclosed. Typical embodiments employ a secure element and a secure element interrogator. Such tokens may be used for authorization of financial payments and other secure transactions. In some embodiments the secure element is provisioned with information about a particular payment card holder account. A secure element reader interrogates the smart element and derives information needed to authorize a transaction. In some embodiments the secure element and the secure element interrogator communicate using communications formatted according to ISO 7816-4.07-05-2012
20120173431SYSTEMS AND METHODS FOR USING A TOKEN AS A PAYMENT IN A TRANSACTION - Embodiments of the invention relate to systems and methods for using a token as a payment in a transaction. In one embodiment, a method for facilitating a payment transaction using a mobile device can be provided. The method can include validating a user's identity; providing a token to the user; receiving the token and user identification information from a merchant as payment for a transaction; and authorizing the transaction.07-05-2012
20110208656METHOD, APPARATUS, AND COMPUTER PROGRAM PRODUCT FOR FACILITATING PROMOTIONS WITH AN E-WALLET - An electronic wallet platform obtains, from a check-out web page of a merchant, (i) a unique identification of a given consumer, of a plurality of consumers, who is purchasing at least one item from the merchant in an on-line transaction, and (ii) associated transaction data. The electronic wallet platform supplies, to a transaction qualification service, the unique identification of the given consumer; and retrieves, from a consumer enrollment database, a record wherein at least one useful token is stored in association with the unique identification of the given consumer. The transaction qualification service determines, based on rules from an offers registry database, whether the at least one useful token is applicable to the on-line transaction. The rules are stored in the offers registry database in association with the at least one useful token, and the rules take into account at least one of the unique identification of the given consumer and the associated transaction data in determining the applicability. If, based on the determining step, the at least one useful token is applicable to the on-line transaction, a further step includes providing the at least one useful token to the merchant, using the transaction qualification service and the electronic wallet platform. The at least one useful token is provided to the merchant prior to payment card authorization, clearing, and settlement for the on-line transaction.08-25-2011
20120233077ELECTRIC CHARGING STATION RESERVATION SYSTEM AND METHOD - A method for reserving a vehicle charging station includes receiving a desired destination, and automatically verifying the availability of a designated station at an expected arrival time. The method further includes reserving the designated station when the designated station is available at the expected arrival time, and transmitting an electronic token to the client device. The token confirms the reservation and uniquely identifies the vehicle. A system for reserving the station includes a server in communication with the station, and with a client device configured for communicating a desired destination to the server. The server automatically verifies the availability of the designated charging station at an expected arrival time at the desired destination, reserves the designated station when it is available at the expected arrival time, and then generates and transmits the token to the client device.09-13-2012
20110161231POSTAL SERVICES KIOSK HAVING PAYMENT CARD SECURITY - An apparatus for facilitating payment using a payment card includes a computerized sales transaction device structured to determine a monetary amount for a sale, and a secure card activated terminal (CAT) device in electronic communication with the computerized sales transaction device. The computerized sales transaction device sends the monetary amount to the secure CAT device. The secure CAT device is structured to: (i) obtain sensitive payment card information from the card, (ii) automatically request in a secure, encrypted manner authorization for the sale using the monetary amount and the sensitive payment card information, (iii) receive in a secure, encrypted manner authorization approval for the sale, and (iv) in response to receiving the authorization approval, send purchase authorization approval information to the computerized sales transaction device. The computerized sales transaction device never receives the sensitive payment card information.06-30-2011
20130091061SECURE PAYMENT SYSTEM - A method for handling secure information using a first application that has a link to a second, separate secure data handling application, the method comprising: presenting to the user using the secure data handling application a secure data entry screen in response to selection of the link in the first application; receiving secure data from the user using the secure data entry screen; and re-directing the user to the first application once the secure data entry is completed.04-11-2013
20110238578MODULE ID BASED ENCRYPTION FOR FINANCIAL TRANSACTIONS - A server is operable to receive a media device identifying number (ID) and establish an association between a media device and a payment account and, in one embodiment, supports at least one of payment authorization and payment clearing based at least in part on the media device ID and the payment account. A network and system includes a payment card processor server that is operable to receive a payment authorization request and to determine if an authorized media device generated a purchase selection message and to determine to approve a received payment authorization request based, in part, if the media device was authorized for the purchase selection based upon a received media device ID. The system is further operable to perform a key rotation to protect payment account information.09-29-2011
20130151417DYNAMIC WIDGET GENERATOR APPARATUSES, METHODS AND SYSTEMS - The DYNAMIC WIDGET GENERATOR APPARATUSES, METHODS AND SYSTEMS (“DWG”) transforms developer credentials, codes and parameter inputs via DWG components into buy widgets, payment acceptance and purchase transaction outputs. In one embodiment, the DWG may facilitate obtaining a plurality of authentication parameters and widget customization parameters. The DWG may authenticate a user using a parameter derived from the plurality of authentication parameters and may dynamically generating a purchase widget for the authenticated user using the plurality of widget customization parameters.06-13-2013

Patent applications in class Including intelligent token (e.g., electronic purse)

Patent applications in all subclasses Including intelligent token (e.g., electronic purse)