Inventors list

Assignees list

Classification tree browser

Top 100 Inventors

Top 100 Assignees


Including authentication

Subclass of:

705 - Data processing: financial, business practice, management, or cost/price determination

705050000 - BUSINESS PROCESSING USING CRYPTOGRAPHY

705064000 - Secure transaction (e.g., EFT/POS)

705065000 - Including intelligent token (e.g., electronic purse)

Patent class list (only not empty are listed)

Deeper subclasses:

Entries
DocumentTitleDate
20120173435HANDY TERMINAL AND PAYMENT METHOD TO BE USED IN SAME - There is provided a handy terminal in which inputting of an application program and of a PIN is executed and a keyboard and a display device are commonly used thus security is secured with a simple system. A card reader control program 07-05-2012
20120173434BIOMETRIC AUTHENTICATION OF MOBILE FINANCIAL TRANSACTIONS BY TRUSTED SERVICE MANAGERS - A method for authenticating a financial transaction at a point of sale (POS) includes storing an application program in a first secure element of a mobile phone. The application is configured to generate instruction codes to effect the financial transaction upon verification of a user's identity. The user's credentials are stored in a second SE of the phone, which is operable to verify the user's identity from a biometric trait of the user input to the phone and to generate data authenticating the financial transaction in response to the verification of the user's identity. At the POS, the user invokes the application and then inputs a biometric trait to the phone. The second SE verifies the user's identity, and upon verification, generates data authenticating the transaction. The financial transaction data, including the instruction codes and the authenticating data, are then transmitted from the phone to the POS.07-05-2012
20110202466Multifactor Authentication - An electronic device with radio and GNSS receiving capabilities is used to provide a second or further authentication factor to current and future transaction systems. The device's embedded characteristics are combined with GNSS data into a unique identifiable device code. The device can be used initially to put a bank or credit card into a “transaction enabled” mode. The location of the electronic device can be compared to the location from which a request to use the enabled card originates.08-18-2011
20110202465SYSTEM AND METHOD FOR FACILITATING POINT OF SALE TRANSACTIONS WITH MINIMAL TRANSFER OF SENSITIVE DATA - Disclosed herein are a system and method for facilitating point of sale transactions with minimal transfer of sensitive data corresponding to a consumer or merchant. The system and method comprise connecting to a central banking system using a communications apparatus for connecting to a landline or mobile communications network. The communications apparatus is coupled to one or more slots for receiving a merchant digital token and a consumer digital token storing merchant public and private keys and consumer public and private keys, respectively. The merchant and consumer public keys are used to identify the merchant and consumer, respectively, to the central banking system. The merchant and consumer private keys are used to sign, and thereby authenticate, a merchant sign-on agreement and a payment authorization form, respectively.08-18-2011
20130085944SYSTEM AND METHOD FOR APPLICATION SECURITY - A secured hardware token includes an embedded processor, secured persistent storage, and read only memory. The storage includes functionality to store data that includes an account master secret for an account at a financial institution. The memory includes a security application, which causes the processor to receive, from a financial institution application executing on a mobile device, a call for an n-bit result. The security application further causes the processor to obtain, from the secured persistent storage, the account master secret, construct the n-bit result specific to the call using the account master secret and the n-bit generator input as input to an n-bit generator in the security application, and return the n-bit result to the financial institution application. The financial institution application provides the n-bit result to the financial institution, which completes a financial transaction when the n-bit result is verified using a copy of the account master secret.04-04-2013
20130036058SYSTEMS AND METHODS FOR SECURELY PROCESSING TRANSACTIONS - This disclosure includes a system, method, and article of manufacture for securely processing a transaction. The method may comprise performing a three factor authentication, communicating and/or generating, to a web client, a token in response to a transaction request and based upon the three factor authentication, comparing the token to a received token, and authorizing the transaction request based upon the comparing. Three factor authentication may comprise authenticating a web client to a transaction account associated with an individual, authenticating a web client to a payment network associated with the transaction account, and authenticating an individual to the transaction account based upon a biometric sample.02-07-2013
20130138570LAYERED SECURITY FOR AGE VERIFICATION AND TRANSACTION AUTHORIZATION - A user may be willing to purchase items or participate in a pay-for service offered by a service provider. A service provider may wish to verify characteristics of the user prior to allowing transactions to take place, and may want to secure the transactions once the transactions are allowed. A credential issued to a user and a transaction application uploaded to a user device may be used to secure transactions between the user and a service provider interface, such as a webserver or a point-of-sale. The transaction application may capture real-time user data and comparing the real-time user data to prior user data stored on the credential, authenticate the service provider interface to the user and the user to the service provider interface; and establish an encrypted session between the service provider interface and the transaction application adapted to authenticate the transactions between the user and the service provider interface.05-30-2013
20090157557MERCHANT SYSTEM FACILITATING AN ONLINE CARD PRESENT TRANSACTION - An online card-present transaction system facilitates card-present type transactions with a merchant over a public network. A host system is configured to accept authentication data from a user via an authentication device. The host system, after authenticating a user is configured to retrieve the user's account information from a user database system and translate a user account number into a temporary transaction number. The temporary transaction number is then transmitted directly from the host system to the merchant, thereby eliminating the need for the user to send to the merchant over the internet, the user's transaction account number.06-18-2009
20090157555BILL PAYMENT SYSTEM AND METHOD - Automated authorization and processing of an interim payment is disclosed. When a merchant requests payment prior to a recurring payment process being enabled, the system handles the payment request without customer intervention. The system requests and receives a transaction coordination code for an interim payment from a financial processor. The system passes the interim payment transaction coordination code to the merchant so the merchant may obtain an authorized payment.06-18-2009
20100106649System And Method For Authorizing Transactions Via Mobile Devices - A system and method for authorizing transactions via mobile devices is provided. The system includes a mobile device executing a transaction authorization application. The transaction authorization application generates a transaction code for a transaction upon request by a user. The transaction authorization application includes a presentation module for presentation of the transaction code on the mobile device, and a communication module for communicating at least a part of the transaction code over a first channel. A server is in communication with the mobile device over the first channel for receiving the at least partial transaction code. The server is also in communication with a merchant system over a second channel for receiving a transaction request for the transaction. The transaction request includes the transaction code. The server executes transaction processing software for validating the transaction code received via the second channel by determining if the transaction code received via the second channel matches the at least partial transaction code received via the first channel. The server then communicates a transaction response to the merchant system.04-29-2010
20100106648Method and apparatus for acquiring encryption key to provide pay channel - A mobile terminal is configured to acquire an encryption key to decrypt a pay channel encrypted with a smartcard profile by the mobile terminal in a Multimedia Broadcast/Multicast Service (MBMS) mobile broadcast system. The mobile terminal is configured to purchase a specific pay channel, determine validity of an encryption key, store a range of a valid encryption key identification value, and initialize a reference Time Stamp (TS) value. The mobile terminal also; extracts an encryption key identification value and a TS value from a last received Short Term Key Message (STKM), when a view request for the specific pay channel is created; and determines that an encryption key is valid, when the extracted TS value satisfies the reference TS and the extracted encryption key identification value falls within a range of the valid encryption key identification value, and extracts and acquires an encryption key from the STKM.04-29-2010
20100106647METHOD AND SYSTEM FOR CLOSE RANGE COMMUNICATION USING AUDIO TONES - The present invention relates to a method for close range secured communication using audio tones and a system for carrying out such method. The invention is related to the field of financial transactions through relatively-mobile devices using audio tones. More particularly, the present invention is directed to a method for communicating information between two mobile phones using the speaker and Mic of the mobile devices04-29-2010
20090144202MODULE ID BASED ENCRYPTION FOR FINANCIAL TRANSACTIONS - A server is operable to receive a media device identifying number (ID) and establish an association between a media device and a payment account and, in one embodiment, supports at least one of payment authorization and payment clearing based at least in part on the media device ID and the payment account. A network and system includes a payment card processor server that is operable to receive a payment authorization request and to determine if an authorized media device generated a purchase selection message and to determine to approve a received payment authorization request based, in part, if the media device was authorized for the purchase selection based upon a received media device ID. The system is further operable to perform a key rotation to protect payment account information.06-04-2009
20090125446System and Method for Secure Transactions Manageable by a Transaction Account Provider - A system and method for securing a financial transaction using a proxy code, which is assigned a transaction account number. An account issuer permanently assigns the proxy code to a transaction account correlated to the transaction device. The proxy code is uploaded onto the transaction device for later use in completing a transaction request. During transaction completion, the proxy code is provided to a merchant system in lieu of any sensitive account information. Since the proxy code is permanently assigned, the number need not be changed or updated on the merchant system once uploaded into a payment device or merchant database. The account issuer may manipulate the sensitive account information without need to alter the information stored on the merchant database. Since the proxy code contains no sensitive information, the sensitive information related to the transaction account is secured from theft.05-14-2009
20130046697Using Mobile Device to Prevent Theft of User Credentials - Systems and methods are provided to prevent unauthorized credit and debit transactions. A system creates a transactional, or one-time-use PIN in response to a request from a mobile device, such as a smartphone or tablet computer, belonging to an authorized user. This PIN is securely transmitted to the mobile device, and used in combination with a credit or debit account number to complete the transaction. The user is determined to be authorized by the fact that they are able to access an application on the mobile device that sends the request. The application itself may be protected using a non-changing PIN.02-21-2013
20090043709METHOD AND SYSTEM FOR DETECTING TRACE STATUS, TRACE AGENT AND TRACE CONTROL SERVER - The embodiments of the invention disclose a method for detecting status of a trace task, including: calculating a Token Digest value of a Service Level Tracing (SLT) Token according to information of the SLT Token; and verifying whether the Token Digest is changed. If the Token Digest is unchanged, it is determined that the trace task is not tampered; otherwise, it is determined that the trace task is tampered. The embodiments of the invention further disclose a corresponding system for detecting the status of the trace task as well as a trace agent and a trace control server. According to the embodiments of the invention, the status of the trace task can be effectively detected through calculating and verifying the Token Digest, so that it can be determined whether the trace task is tampered.02-12-2009
20090043708Method and apparatus for reducing optical emissions in an integrated circuit - A method of hindering optical detection of a pattern of data being stored, moved or processed by at least one active circuit in an integrated circuit, the active circuit including at least first and second active devices that change state within a period of time, such that each device exhibits low resistance in one state and high resistance in another state, the method comprising controlling timing of the change of state of the first active device relative to the second active device so as to prevent the devices having simultaneous intermediate resistances between the low and high resistances, thereby to reduce optical emission by the at least one active circuit compared to causing the changes of state of the two devices to happen simultaneously. 02-12-2009
20120191613SYSTEMS AND METHODS FOR VIRTUAL MOBILE TRANSACTION - Disclosed is a computer based method including receiving a request, by a virtual mobile transaction computer, from a user device or from an application running on the user device. The user and the user device are verified and authenticated based on one or more parameters. A transaction account is determined, where the transaction account is associated with the user. A barcode is sent to the user device and the barcode is used to initiate a payment for a purchase transaction associated with the request.07-26-2012
20110022521Authentication arrangement and method for use with financial transaction - A system and method for generating an authentication token which is used by an issuer associated with a integrated circuit card to authenticate a transaction. A personal card reader receives data, including an authentication cryptogram, from the integrated circuit card. The personal card reader uses the data received from the integrated circuit card to select one of at least two default bitmaps stored in a memory portion of the personal card reader. The personal card reader uses the selected default bitmap and the authentication cryptogram to build the authentication token.01-27-2011
20120116976VERIFICATION OF PORTABLE CONSUMER DEVICE FOR 3-D SECURE SERVICES - Apparatuses, methods, and systems pertaining to the verification of portable consumer devices for 3-D Secure Systems are disclosed. In one implementation, a verification token is coupled to a computer by a USB connection so as to use the computer's networking facilities. The verification token reads identification information from a user's portable consumer device (e.g., credit card) and sends the information to a validation entry over a communications network using the computer's networking facilities. The validation entity applies one or more validation tests to the information that it receives from the verification token. If a selected number of tests are passed, the validation entity sends a 3-D Secure datum to the verification token. The verification token may enter the 3-D Secure datum into a hidden field of a Purchase Authentication Page appearing on the computer's display.05-10-2012
20090248581DISPLAY PAYMENT CARD WITH FRAUD AND LOCATION DETECTION - A payment card comprises a display to support card-not-present transactions where no card reader is available to automate the transaction, and an account number retrieval method for dynamic, one-time use virtual account numbers whose use can assist authorities in rapid fraud and location detection. The account number generator is able to produce a sequence of virtual account numbers over its life that are predictable by the issuing bank and useful in authenticating transactions. A server for the issuing bank logs the merchant locations associated with each use or attempted use, and provides real-time detection of fraudulent attempts to use a virtual account number outside the predicted set. Fraud identification efforts can then be directed in a timely and useful way.10-01-2009
20090248579Method and System for Accepting and Processing Financial Transactions over a Mobile Computing Device - A system includes a processing component; a communication interface receiving transaction data when a mobile device is coupled to the system; at least one data capture input element receiving payment data from an item external to the system and the mobile device; and a display displaying at least the transaction data.10-01-2009
20080301056ONLINE PAYER AUTHENTICATION SERVICE - A payment authentication service authenticates the identity of a payer during online transactions. The authentication service of the present invention allows a card issuer to verify a cardholder's identity using a variety of authentication methods, such as the use of passwords. Also, the only system participant requiring a certificate is the issuing financial institution. One embodiment of the invention for authenticating the identity of a cardholder during an online transaction involves querying an access control server to determine if a cardholder is enrolled in the payment authentication service, requests a password from the cardholder, verifies the password, and notifies a merchant whether the cardholder's authenticity has been verified. In another aspect of the invention, a chip card and the authentication service independently generate cryptograms that must match in order for the service to verify that the correct chip card is being used by the cardholder.12-04-2008
20090307139BIOMETRIC AUTHENTICATION OF MOBILE FINANCIAL TRANSACTIONS BY TRUSTED SERVICE MANAGERS - A method for authenticating a financial transaction at a point of sale (POS) includes storing an application program in a first secure element of a mobile phone. The application is configured to generate instruction codes to effect the financial transaction upon verification of a user's identity. The user's credentials are stored in a second SE of the phone, which is operable to verify the user's identity from a biometric trait of the user input to the phone and to generate data authenticating the financial transaction in response to the verification of the user's identity. At the POS, the user invokes the application and then inputs a biometric trait to the phone. The second SE verifies the user's identity, and upon verification, generates data authenticating the transaction. The financial transaction data, including the instruction codes and the authenticating data, are then transmitted from the phone to the POS.12-10-2009
20130191289METHOD AND SYSTEM FOR UTILIZING AUTHORIZATION FACTOR POOLS - One embodiment of the present disclosure provides a system and associated processes for sharing cardholder data (CHD) between a merchant that utilizes tokenization and a second merchant that may or may not utilize tokenization. In one embodiment, the merchant, or an employee of the merchant, can use the system and associated processes to reacquire CHD from a tokenization provider system. In one embodiment, the merchant identifies to the tokenization provider system a desire to share CHD, which is associated with a token, with a second merchant. The merchant and/or the tokenization provider system can then invite the second merchant to register with the tokenization provider system. Once registered with the tokenization provider system, the second merchant can access any CHD that the merchant associated with the second merchant.07-25-2013
20110302088TOKEN BASED NEW DIGITAL CASH PROTOCOLS - Digital cash token protocols employ two pairs of private and public keys. Each public key is certified separately and the protocols do not use any blind signature schemes. As a result, the digital cash token protocols provide strong protection of user privacy by using two certified public keys instead of a blind signature. One pair of certified keys consists of one master user private key and one master user public key. A second pair of certified keys consists of one pseudonym user private key and one pseudonym user public key. The use of a master key pair and a pseudonym key pair circumvents the need for blind signatures. As a result, the proposed protocols do not require blind signatures and do not add additional overhead and security requirements necessitated by conventional blind signature schemes. The protocols use public key protocols and digital signatures and symmetric key protocols, which may be readily implemented in standard information security based systems based on cryptographic constructs. In addition, the protocols may be deployed in mobile, off-line, and on-line settings.12-08-2011
20100036773INTEGRATED WIRELESS RESONANT POWER CHARGING AND COMMUNICATION CHANNEL - A power delivery system wirelessly deliver electric power and a communication signal to a target device. The power delivery system includes a power transmitting unit having a power source operable to source alternating current power and a sending resonant coupling component operable to couple the alternating current power to a coil for wireless power transmission by a non-radiated magnetic field at a target resonant frequency. The power transmitting unit is capable of dynamically tuning the wireless power transmission to the target resonant frequency wherein the target resonant frequency is specified dynamically. A communication module couples to the power transmitting unit and is operable to couple the communication signal to the non-radiated magnetic field. Operations may include target device authentication, target resonant frequency information communication, billing, and device management.02-11-2010
20110191249Methods and Apparatus for Conducting Electronic Transactions - A system and method for facilitating electronic transactions using an intelligent instrument is disclosed. An authorization server enables users to obtain authorization credentials through the use of the intelligent instrument by issuing a challenge to an intelligent token of the intelligent instrument. The intelligent token generates a challenge response and transmits the challenge response to the authorization server, which assembles credentials including a key for the electronic transaction upon validating the response. The authorization server sends the assembled credentials to the intelligent instrument and the intelligent instrument transmits the assembled credentials to the authorization server during a subsequent transaction. The authorization server validates the assembled credentials and provides authorization for the transaction in response to the validating the assembled credentials.08-04-2011
20110191248Methods and Apparatus for Conducting Electronic Transactions - A system and method for facilitating electronic transactions using an intelligent instrument is disclosed. An authorization server enables users to obtain authorization credentials through the use of the intelligent instrument by issuing a challenge to an intelligent token of the intelligent instrument. The intelligent token generates a challenge response and transmits the challenge response to the authorization server, which assembles credentials including a key for the electronic transaction upon validating the response. The authorization server sends the assembled credentials to the intelligent instrument and the intelligent instrument transmits the assembled credentials to the authorization server during a subsequent transaction. The authorization server validates the assembled credentials and provides authorization for the transaction in response to the validating the assembled credentials.08-04-2011
20100121767INTERMEDIARY SERVICE AND METHOD FOR PROCESSING FINANCIAL TRANSACTION DATA WITH MOBILE DEVICE CONFIRMATION - A transaction processing service operates as an intermediary between acquirers of financial transaction requests and issuing institutions that process the financial transaction requests. The intermediary service utilizes a customer's mobile device as an out-of-band communication channel to notify a customer of a received financial transaction request. To send the notification, the intermediary service retrieves stored customer information, including an address of the customer's mobile device and a list of payment instruments that can be used to pay for the transaction. Before continuing to process the received financial transaction request, the service may first require the customer to confirm the transaction via the mobile device. The intermediary service retrieves financial account information associated with the customer from issuing institutions, and, if the transaction is confirmed, provides the account information to acquirers in order to allow transactions to be processed.05-13-2010
20090157556MERCHANT FACILITATION OF ONLINE CARD PRESENT TRANSACTION - An online card-present transaction system facilitates card-present type transactions with a merchant over a public network. A host system is configured to accept authentication data from a user via an authentication device. The host system, after authenticating a user is configured to retrieve the user's account information from a user database system and translate a user account number into a temporary transaction number. The temporary transaction number is then transmitted directly from the host system to the merchant, thereby eliminating the need for the user to send to the merchant over the internet, the user's transaction account number.06-18-2009
20080249947MULTI-FACTOR AUTHENTICATION USING A ONE TIME PASSWORD - A method of authenticating a user includes receiving a one time password from the user. The received one time password is compared to a first one time password associated with the user and provided to the user on a receipt corresponding to a transaction. The user is authenticated into a service only if the received one time password matches the first one time password associated with the user.10-09-2008
20100057619ACCOUNT AUTHENTICATION SERVICE WITH CHIP CARD - A payment authentication service authenticates the identity of a payer during online transactions. The authentication service of the present invention allows a card issuer to verify a cardholder's identity using a variety of authentication methods, such as the use of passwords. Also, the only system participant requiring a certificate is the issuing financial institution. One embodiment of the invention for authenticating the identity of a cardholder during an online transaction involves querying an access control server to determine if a cardholder is enrolled in the payment authentication service, requests a password from the cardholder, verifies the password, and notifies a merchant whether the cardholder's authenticity has been verified. In another aspect of the invention, a chip card and the authentication service independently generate cryptograms that must match in order for the service to verify that the correct chip card is being used by the cardholder.03-04-2010
20120109829METHOD AND SYSTEM FOR PROCESSING TRANSACTIONS USING A TOKEN - Methods and systems of preventing fraud in electronic transaction and verification are described herein. The method includes obtaining information from a recipient; splitting the information into multiple parts; encrypting one or more of the multiple parts and encoding said encrypted part on different locations of a token; and encrypting the remaining portions of the split information and storing the encrypted remaining portions in one or more information stores. At a subsequent time, when the recipient provides the token to complete a transaction or to establish identity, retrieving the multiple portions from the one or more information stores and the token and combining or re-mating the multiple portions retrieved from the token and the one or more information stores.05-03-2012
20110137803SECURE ELECTRONIC RECEIPT SYSTEMS AND METHODS - The present disclosure relates to secure electronic receipt systems and methods. The present invention removes the need for paper-based receipts while preserving security through use of a digital signature on each electronic receipt verifying the transaction and other data related to the transaction. In an exemplary embodiment, the present invention includes a trusted email server, an authentication server, a point-of-sale (POS) terminal or the like, and a smart card or the like. A buyer can utilize the smart card to instruct the terminal to provide an electronic receipt. The terminal can utilize the trusted email server and the authentication server to digitally sign the electronic receipt with credentials trusted by the buyer, and these credentials can later be utilized to verify the electronic receipt.06-09-2011
20080319913ANONYMOUS ONLINE PAYMENT SYSTEMS AND METHODS - In various embodiments, a central server grants access to a plurality of anonymous one-time-usable, time-sensitive encrypted tokens that identify consumer purchase orders. A plurality of certified merchant servers are certified by being provided with an application to securely connect the certified merchant servers to the central server for, among other things, transmitting purchase order data to the central server for use in generating the tokens. A plurality of financial institution servers can also be certified by being configured for use with an application that enables secure connection to the central server for, among other things, requesting the tokens.12-25-2008
20090281951Payment Processing Platform - A method for generating a child product that is linked to a core account. A payment processing platform receives a user selection of control parameters that define use restrictions for the child product and the core account that provides financial backing for the child product. The child product is generated and may be used for payment transactions within the use restrictions defined by the control parameters. The child product is delivered to a recipient as a physical card or as a virtual card or both as a physical card and a virtual card. Advantageously, the financial institution needs to modify its legacy payment processing infrastructure minimally in order to process payment transactions made using the child product. From a user perspective, child products protect consumers from fraud or identity theft and limit a customer's exposure when child products are lost or stolen.11-12-2009
20120296829Unlinkable Priced Oblivious Transfer with Rechargeable Wallets - A protocol that allows customers to buy database records while remaining fully anonymous, i.e. the database server does not learn who purchases a record, and cannot link purchases by the same customer; the database server does not learn which record is being purchased, nor the price of the record that is being purchased; the customer can only obtain a single record per purchase, and cannot spend more than his account balance; the database server does not learn the customer's remaining balance. In the protocol customers keep track of their own balances, rather than leaving this to the database server. The protocol allows customers to anonymously recharge their balances.11-22-2012
20100293099PURCHASE TRANSACTION SYSTEM WITH ENCRYPTED TRANSACTION INFORMATION - Systems and methods are provided for securing payment card information. A user may present a payment card such as a credit card to point-of-sale equipment. The point-of-sale equipment may use a symmetric key to encrypt payment card information associated with the payment card. The symmetric key may be encrypted at the point-of-sale equipment using the identity-based-encryption (IBE) public key of a purchase transaction processor to produce a key transfer block. The key transfer block and the encrypted payment card information may be conveyed from the point-of-sale equipment to the purchase transaction processor over a communications network. At the purchase transaction processor, an IBE private key may be used to recover the symmetric key from the key transfer block. The symmetric key can be used to decrypt the encrypted payment card information for processing and re-encryption using a key associated with the purchase transaction processor.11-18-2010
20100131414PERSONAL IDENTIFICATION DEVICE FOR SECURE TRANSACTIONS - A portable identification apparatus and an associated identification and authentication system are described. The portable apparatus can store biometric data of an authorised user of the apparatus and includes a biometric scanner for acquiring biometric data of a user of the apparatus. A processor compares acquired biometric data with the stored biometric data to identify a user of the apparatus, and generates identification information relating to the authorised user if the acquired biometric data matches the stored biometric data. A wireless communication interface transmits the identification information to a communication terminal such as a mobile telephone, for use in a transaction. At an authentication centre comprising a server with an associated database, data is stored identifying each identification apparatus, as well as biometric data corresponding to the stored biometric data in each identification apparatus, and encryption keys for decrypting data in the identification information transmitted via the communication terminal. In a method of use of the apparatus and system, a user of the identification apparatus can be identified to a third party participating in a transaction.05-27-2010
20090138405System and method for performing secure online transactions - The system and method performing secure online-transactions based on challenge/response procedures executed by a terminal of at least one customer and by a terminal of a service provider, such as a bank, which terminals are connected to a network, preferably the Internet. The inventive method including: 05-28-2009
20090030844SMART CARD LOADING TRANSACTIONS USING WIRELESS TELECOMMUNICATIONS NETWORK - A smart card transaction allows a consumer to load value onto a smart card and to make purchases using a smart card with a mobile telephone handset over the telecommunications network. For loading, the system includes: a mobile telephone handset including a card reader; a gateway computer; a funds issuer computer; and an authentication computer. The mobile telephone handset receives a request from a user to load a value onto the smart card. The handset generates a funds request message which includes the value and sends the funds request message to a funds issuer computer. The funds issuer computer debits an account associated with the user. Next, the handset generates a load request message with a cryptographic signature and sends the load request message to an authentication computer which authenticates the smart card. The handset receives a response message which includes a cryptographic signature and an approval to load. Finally, the handset validates the second cryptographic signature and loads the value onto the smart card. For payment, the system includes a merchant server and a payment server. First, the handset sends an order request message to the merchant server computer, and in return receives a purchase instruction message. The handset processes the purchase instruction message locally, and then sends a draw request message to a payment server computer. The payment server computer sends a debit message which includes a cryptographic signature and an approval to debit the smart card. Finally, the handset validates the cryptographic signature and debits the smart card.01-29-2009
20110208657Mobile monetary transactions and banking for rural populations - Authenticating users for mobile transactions conducted over mobile phones. In general, the present invention makes it possible to securely authenticate a rural user (using the unique user ID from the uWallet, the client certificate in the mobile phone of the rural user and PIN code/password provided by the rural user) and then permit mobile banking transactions over the mobile phone. Both participating individuals employ their individual mobile phones and secure USB/Bluetooth based mobile banking devices (the uWallet) to authenticate themselves and conduct monetary transactions (funds transfer, mobile payments, etc.).08-25-2011
20090164382SYSTEM FOR MANAGING MULTIPLE CREDIT ACCOUNTS - In an improved method and system for managing consumer credit accounts a consumer registers a plurality of credit accounts through a secure web page establishing a priority of accounts in the process. The web page aggregates data from all of the registered accounts and a single credit card or device is issued to access the aggregated accounts. The single card is used at points of sale like an ordinary credit card except that it requires a password like a debit card. When a purchase is made the request is relayed to the credit account that has the top priority and sufficient available credit. A single card can access a plurality of separate credit accounts so there is no need to carry multiple cards. If the single card is stolen, it can be rapidly inactivated with a single call. It will not be necessary to cancel the underlying accounts.06-25-2009
20090006264Methods and Systems For Secure Voice-Authenticated Electronic Payment - This application discloses systems, methods, and processes for providing a secure, voice-authenticated form of electronic payment from a device. The described exemplary system provides an infrastructure for receiving an electronic payment request, verifying the request using voice authentication, and allowing or denying the request based on the authentication or non-authentication of the user.01-01-2009
20090177586AUTHENTICATION DEVICE AND PAYMENT SYSTEM - The payment system according to the present invention comprises an electronic payment device (07-09-2009
20090177585Conditional access system for broadcast digital television - A method for managing access to scrambled broadcast or transmitted events received from a variety of service providers (including broadcast television networks, cable television networks, digital satellite systems). Each service provider employs the same public key for descrambling the access information message thereby permitting a user to access events from various service providers without changing the smart card. The method may also be expanded to manage access to a scrambled package of broadcast events.07-09-2009
20090144203SERIAL NUMBER AND PAYMENT DATA BASED PAYMENT CARD PROCESSING - A server is operable to receive a media device identifying number (ID) and establish an association between a media device and a payment account and, in one embodiment, supports at least one of payment authorization and payment clearing based at least in part on the media device ID and the payment account. A network and system includes a payment card processor server that is operable to receive a payment authorization request and to determine if an authorized media device generated a purchase selection message and to determine to approve a received payment authorization request based, in part, if the media device was authorized for the purchase selection based upon a received media device ID.06-04-2009
20090248580SECURE ONLINE BANKING TRANSACTION APPARATUS AND METHOD - A secure online banking transaction apparatus to communicate with a server over a non-secure connection is provided and includes a selector configured to allow for a selection of a mode of the apparatus, a processing unit coupled to the selector and including a secure communication unit, which is configured to set up a secure connection, along which a secure transaction occurs, with the server via the non-secure connection in accordance with the mode, an input unit coupled to the processing unit and configured to allow for a input of data into the apparatus, which is at least partly related to the secure transaction, and an interface coupled to the processing unit and configured to convey at least a status of the secure transaction and the contents off the inputted data.10-01-2009
20110145152SYSTEMS, APPARATUS, AND METHODS FOR IDENTITY VERIFICATION AND FUNDS TRANSFER VIA A PAYMENT PROXY SYSTEM - Systems, apparatus, and methods for verifying a user's identity and conducting a transfer of funds via a payment proxy system are herein provided. A message including a request for verification of the user's identity and/or a transfer of funds via a proxy payment system may be received. The message may also include user identification information and/or a token. Completion of the identification verification and/or requested funds transfer may be dependent upon verification of user identification information and/or a token.06-16-2011
20110145151FINANCIAL CARD SYSTEM, COMMUNICATIONS DEVICE, AUTHENTICATION TERMINAL, AUTHENTICATION METHOD, AND PROGRAM - Disclosed herein is a financial card system. The system includes a communications device on which a non-contact integrated circuit chip is installed; and an authentication terminal having a reader/writer allowing reading/writing information on the communications device and capable of transmission and reception of information with the communications device through the reader/writer. The communications device has a storage block, a common area information transmission block, and an individual area information transmission block. The reader/writer of the authentication terminal has a storage block, a common area information reception block, and an individual area information reception block.06-16-2011
20120143768Device Enrollment System and Method - Embodiments related to systems and methods comprising receiving payment data at an access device; receiving an identifier for a phone at the access device; and generating and sending an authorization request message to a payment processing network, wherein the payment processing network generates a verification token, which is then sent to the phone whereby the phone is thereafter used to conduct payment transactions.06-07-2012
20120078799SECURE PAYMENT SERVICE AND SYSTEM FOR INTERACTIVE VOICE RESPONSE (IVR) SYSTEMS - A secure payment method includes receiving, at a computer of a payment service, a request from a requester for a one time use transaction identification token for a transaction. The one time use transaction identification token is provided from the payment service computer to the requester. The one time use transaction identification token is received at the payment service from a merchant communications apparatus under the control of a merchant. Electronic payment information for the transaction is issued from the payment service to the merchant upon validating the one time use transaction identification token.03-29-2012
20110029436Methods And Systems For Delivering Sponsored Out-Of-Band Passwords - Methods and systems for delivering advertising content to selected users in combination with out-of-band passwords or access code information delivered over a selected communication medium.02-03-2011
20090210347Method and System for a Virtual Safe - A transaction server for performing a transaction over a network using a virtual smart card the server comprising, a virtual smart card database having a plurality of records each record including a virtual card identification and a value corresponding to a single virtual smart card; a security module; an emulator for emulating a smart card, the emulator for receiving smart card commands and processing the commands in conjunction with the virtual smart card database and the security module; and a virtual card reader module for receiving the smart card commands and relaying the commands to the smart card emulator whereby transactions are performed over the network using one or more the records and the virtual smart card database.08-20-2009
20090177587METHOD AND SYSTEM FOR PROVIDING ONLINE AUTHENTICATION UTILIZING BIOMETRIC DATA - A system and method for securely authenticating a user for the purpose of accessing information, such as private financial or personal information, in an online environment are disclosed. In addition, a system and method for allowing consumers to make secure payments from an electronic wallet with biometric authentication are disclosed.07-09-2009
20090150294SYSTEMS AND METHODS FOR AUTHENTICATING FINANCIAL TRANSACTIONS INVOLVING FINANCIAL CARDS - A system for authenticating financial transactions comprising a plurality of financial cards, a plurality of financial terminals, and at least one authorization center connected to the plurality of financial terminals. Each of the financial cards having a card data storage device for storing identification data, and a GPS module for generating geographical position indicative of a current geographical position of the financial card. Each of the financial terminals having a card reader configured to receive one of the financial cards and access the identification data and geographical position data associated therewith. The Authorization center is configured to receive transactional data associated with a financial transaction, the transactional data including the identification data and the geographical position data for the particular financial transaction involving a particular financial terminal and a particular financial card, and for each financial transaction, determine whether that transaction is potentially fraudulent based on an analysis of the geographical position data for that transaction and previously stored geographical position data related to the particular financial card.06-11-2009
20090094164REMOTE ACCESS VERIFICATION ENVIRONMENT SYSTEM AND METHOD - A system and method for authentication of the location of a user requesting remote access to an application server for processing a transaction requiring user location authentication. The system includes a client for enabling the user to request remote access to the application server, an access server for receiving and processing the request for access, an authenticating server for authenticating the user location responsive to receipt of the processed request from the access server, and a network for interconnecting the client, the access server, the authenticating server, and the application server. The client includes an identifier associated with the user's location, and the authenticating server is adapted to authenticate the client location identifier. The client may include a dialer, including a number associated therewith, and the authenticating server may be adapted to identify the number associated with the dialer to authenticate the user's location, and may further be adapted to identify the first number dialed to further authenticate the user location. The authenticating server may issue a security challenge to the client, and the client may interrogate the security challenge, generate a response, and transmit the response to the authenticating server.04-09-2009
20100179909USER DEFINED UDK - A server computer including a processor and a computer readable medium coupled to the processor. The computer readable medium includes code executable by the processor, where the code includes code for receiving user input, code for forming a concatenated value by concatenating the user input with a data string associated with a portable consumer device, and code for deriving the user defined key from the concatenated value.07-15-2010
20120197806SONIC BASED DIGITAL NETWORKING - Systems, apparatuses and methods of using an acoustic communication mechanism to transmit data in the form of acoustic data from a mobile device to an electronic device are described. In one embodiment, a method of completing a purchase with a merchant using a mobile device starts with the mobile device sending a request message to a central server through a network interface. The mobile device then receives a token from the central server through the network interface that confirms that a payment in the purchase amount has been received at the merchant's account. This token is then translated into acoustic data and transmitted from the mobile device to an electronic device being associated with the identification of a merchant. Other embodiments are also described.08-02-2012
20100153273SYSTEMS FOR PERFORMING TRANSACTIONS AT A POINT-OF-SALE TERMINAL USING MUTATING IDENTIFIERS - A point-of-sale (POS) terminal for use in performing a transaction between a first entity and a second entity at a POS, the POS terminal associated with the second entity. The POS terminal stores a second mutating identified, receives encrypted transaction information from an account information carrier device over a communication link, sending the encrypted first and second transaction information to an authenticator, and receiving the second mutating identifier from the authenticator and a processor configured to encrypt transaction information with the second mutating identifier to create second encrypted transaction information.06-17-2010
20100235281Method Guaranteeing Payment for Electronic Commerce in Particularly by Mobile Telephone and a System Implementing It - An electronic payment method for a retailer using an operator network and a financial organization. During a transaction two certificates are produced; one using an operator key and the other using a banking key. The first certificate is sent to the operator and the other certificate is securely placed under the control of the financial organization.09-16-2010
20100241570SECURE AND EFFICIENT PAYMENT PROCESSING SYSTEM - A method of processing commercial transactions carried out over the Internet (09-23-2010
20100235282SMART CARD PURCHASE TRANSACTIONS USING WIRELESS TELECOMMUNICATIONS NETWORK - A mobile handset includes a card reader; a gateway; a funds issuer computer; and an authentication computer. The handset receives a request to load a value onto the smart card. The handset generates a funds request and sends it to a funds issuer computer. The funds issuer computer debits an account. The handset generates a load request with a signature and sends it to an authentication computer. The handset receives a response. The handset validates the second signature and loads value onto the smart card. For payment, the system includes a merchant server and a payment server. The handset sends an order request to the merchant computer, and receives a purchase instruction. The handset processes the message, and then sends a draw request message to a payment server. The payment server sends a debit message to debit the smart card. The handset validates the signature and debits the smart card.09-16-2010
20120173433METHOD AND SYSTEM FOR PROVIDING FINANCIAL SERVICE - A system and a method for providing a financial service. The system for providing a financial service can include: a first user terminal which signs financial transaction information with a pre-stored first private key, the financial transaction information including withdrawal account information, a PIN of the withdrawal account, deposit account information and amount information; a second user terminal which receives the signed financial transaction information by being connecting with the first user terminal through near field communication and which further signs the signed financial transaction information with a pre-stored second private key; and a financial server configured to transfer an amount corresponding to the amount information from an account of the withdrawal account information to an account of the deposit account information.07-05-2012
20080249948FINANCIAL INFORMATION INPUT METHOD USING SYMMETRICAL KEY SECURITY ALGORITHM AND COMMERCIAL TRANSACTION SYSTEM FOR MOBILE COMMUNICATIONS - A financial information input method using a symmetric key security algorithm and a mobile communications commercial transaction system using the same encrypts financial information such as a customer's identification number and a valid date with a symmetric key algorithm by use of an electronic wallet administration number of a customer's terminal used as an encryption key at the time of applying an issuance of a card, and directly inputs the encrypted financial information into a customer's electronic wallet terminal or inputs the same via a communications network. In the case that a commercial transaction settlement is accomplished with a mobile communications terminal in which the encrypted financial information is stored, his or her own electronic wallet administration number is input so that the encrypted financial information and the administration number are optically transmitted to a POS terminal/card inquiry machine of an affiliated shop. The POS terminal/card inquiry machine which has received the encrypted financial information and administration number uses the received electronic wallet administration number and decodes the encrypted financial information with the administration number. Thus, although an unauthorized person knows an encryption algorithm unless a customer's electronic wallet administration number is exposed illegally, customer's financial information cannot be used. That is, an effect of fundamentally preventing customer's financial information from being illegally copied can be provided.10-09-2008
20100191652SYSTEMS AND METHODS FOR ADDING FUNCTIONALITY TO A UIS FOR USE AT A POINT OF INTERACTION - Systems and methods for the addition of functionality to a user identification string (UIS) at a point of interaction (POI) are provided. A UIS is first requested from the user at a POI. According to some embodiments, the user enters a modified UIS (MUIS) at the POI. The MUIS can include a UIS along with a user code. An authorization request is then created by the POI device, wherein the request can include information such as, but not limited to, a vehicle code, the MUIS, POI location identifier, function deduction amounts, and/or the like. An action (e.g. rounding sweep, linking a function to the user operation vehicle, etc.) associated with the user code, if present, is determined and implemented. An approval or denial of the authorization request is then sent to the POI device after the action has been applied and the request has been processed.07-29-2010
20120271771METHODS AND APPARATUS FOR CONDUCTING ELECTRONIC TRANSACTIONS - A system and method for conducting electronic commerce are disclosed. In various embodiments, the electronic transaction is a purchase transaction. A user is provided with an intelligent token, such as a smartcard containing a digital certificate. The intelligent token suitably authenticates with a server on a network that conducts all or portions of the transaction on behalf of the user. In various embodiments a wallet server interacts with a security server to provide enhanced reliability and confidence in the transaction. In various embodiments, the wallet server includes a toolbar. In various embodiments, the digital wallet pre-fills forms. Forms may be pre-filled using an auto-remember component.10-25-2012
20120271770MANAGING ELECTRONIC TOKENS IN A TRANSACTION PROCESSING SYSTEM - A method for the use of electronic transactional tokens includes: generating transactional tokens including a first token; associating each of the transactional tokens with one of a group of users; monitoring usage of the transactional tokens in a multitude of transactions by the users; and responsive to the monitoring, updating the first token from a first state to a second state. The tokens may be generated and monitored using a token processing system, which uses transaction data received by a transaction handler that is handling transaction processing for the transactions.10-25-2012
20080313088IDENTIFICATION VERIFICATION SYSTEM - An identification verification system having several applications is disclosed. First, a sender sends a person an offer that requests information. The person replies to the sender, who forwards the reply to a verifying entity. If the sender is legitimate, the verifying entity forwards the reply to a UDID service, which requests authorization from the person to send the information to the sender. Second, a passenger can only access a boarding pass online after entering in a UDID and password. A code string is also generated in a document verification field that is decoded to determine information. Third, an online shopper requests verification from a merchant. The merchant then asks a credit card company for a token. If the merchant has a merchant account with the company, the merchant receives the token that generates a certificate for the shopper, who sends the certificate to the company to verify it is valid.12-18-2008
20080228653SYSTEMS AND METHODS FOR ENROLLING A TOKEN IN AN ONLINE AUTHENTICATION PROGRAM - An online transaction system configured to implement authentication methods that allow for strong multi-factor authentication in online environments. The authentication methods can be combined with strong security methods to further ensure that the authentication process is secure. Further, the strong multi-factor authentication can be implemented with zero adoption dependencies through the implementation of automated enrollment methods.09-18-2008
20100325052WIRELESS TRANSACTION PAYMENT SERVICE APPLICATION SELECTION - A method of performing a transaction over a contactless interface placing a first device in wireless communication with a second device, selecting the interface over which the first and second device with communicate, selecting the application to be used to approve or disapprove the transaction, communicating to the second device the data necessary for the application to approve or disapprove the transaction.12-23-2010
20090089213TRACK DATA ENCRYPTION - A portable consumer device using a secondary PAN is disclosed. The portable consumer device includes a secondary PAN associated with a primary PAN, where the secondary PAN has at least one end portion that is the same as the primary PAN, but has a middle portion of that is different than the primary PAN.04-02-2009
20100250441METHOD AND SYSTEM FOR SECURING A PAYMENT TRANSACTION WITH TRUSTED CODE BASE ON A REMOVABLE SYSTEM MODULE - A trusted code base is provided on a removable system module that is inserted in a mobile payment device 09-30-2010
20110082797VEHICLE USAGE-BASED TOLLING PRIVACY PROTECTION ARCHITECTURE - A client-side on-board computing device is partitioned into a trusted computing module, and a private computing platform. When a metric report is required, the private computing platform retrieves an original data file and transfers the original data file to the trusted computing module. The original data file includes a global positioning system coordinate stream and time information. Communication between the private computing platform and the trusted computing module is via an unencrypted serial link. The private computing platform applies at least one billing algorithm to the original data file to determine a billing charge. The private computer platform signs and hashes the billing charge using a private key of a public-private endorsement key pair to create a signed metric report. The private computer platform forwards the signed metric report to the trusted computing module via the unencrypted serial link. The trusted computing module then forwards the signed metric report by the trusted computing module to a billing authority.04-07-2011
20090048979TOKEN BASED NEW DIGITAL CASH PROTOCOLS - Digital cash token protocols employ two pairs of private and public keys. Each public key is certified separately and the protocols do not use any blind signature schemes. As a result, the digital cash token protocols provide strong protection of user privacy by using two certified public keys instead of a blind signature. One pair of certified keys consists of one master user private key and one master user public key. A second pair of certified keys consists of one pseudonym user private key and one pseudonym user public key. The use of a master key pair and a pseudonym key pair circumvents the need for blind signatures. As a result, the proposed protocols do not require blind signatures and do not add additional overhead and security requirements necessitated by conventional blind signature schemes. The protocols use public key protocols and digital signatures and symmetric key protocols, which may be readily implemented in standard information security based systems based on cryptographic constructs. In addition, the protocols may be deployed in mobile, off-line, and on-line settings.02-19-2009
20120246079AUTHENTICATION USING APPLICATION AUTHENTICATION ELEMENT - Embodiments of the present invention can be directed to systems, apparatuses, and methods for performing transactions through mobile communication devices using telecommunications networks, systems, or proximity near-field communications systems. Embodiments may be directed to a mobile communication device displaying an application authentication element including a pre-selected authentication element. The application authentication element may include transaction data associated with a transaction conducted by a mobile communication device. The mobile communication device may obtain the pre-selected authentication element by either transmitting a request to a server computer or retrieving the pre-selected authentication element from a secure memory in the mobile communication device. A user authentication token may then be received by the mobile communication device from the user. The mobile communication device may then generate a secret token derived from the user authentication token, and if the secret token is correlated to a secret reference token, a transaction may be conducted.09-27-2012
20110153503Device and Method for Identity Theft Resistant Transcations - An authorization device includes an input module, a key generator, and an output module. The input module receives a request to authorize a transaction between a mobile device and a merchant terminal. The key generator generates a key used for authorizing the transaction. The key relates only to the transaction. The output module transmits an authorization for the transaction that is based on a processing of the key.06-23-2011
20120136797SYSTEM AND METHOD FOR CONSOLIDATING NETWORK, IDENTIFICATION AND TRANSACTION FUNCTIONS ON A COMMUNICATION DEVICE - The present invention relates generally to a smart card device that is configured to facilitate wireless network access and credential verification. Specifically, the device is configured to meet the physical and electrical specification for commercially available mobile devices utilizing a standard Subscriber Identity Module (SIM) for network access. The device combines the features of the SIM with Common Access Card or Personal Identity Verification card features to allow a network subscriber to invoke secure payment transactions over a carrier's network. The system includes data storage for maintaining a plurality of network and transaction instrument profiles and a profile gateway for receiving transaction information from a payment gateway, sending an authorization request to a user's mobile device, receiving a transaction authorization from the mobile device, and sending transaction information to a payment gateway to finalize the payment transaction.05-31-2012
20120278241TRACEABLE AND NON-REPUTABLE TRANSACTION DEVICES AND METHODS - Data and financial transactions are secured on a mobile electronics device for traceability and non-repudiation. A mobile personal trusted device (PTD) is needed to communicate over a network to a transaction server. Characteristic abstracts of objects carried by users have distinctive features that can be associated with and registered to a particular user and are recorded. An abstract contemporaneously obtained during a secure transaction is sent to a server for use as an authenticator for comparison to an abstract previously obtained and registered to said user. A traceable transaction record is rendered that is highly identifiable and substantially indisputable.11-01-2012
20130166456System and Method for Remote Payment Based on Mobile Terminal - The present invention discloses a method for remote payment based on a mobile terminal. The method includes: an authentication server asking a mobile terminal for a digital certificate, the mobile terminal transmitting an certificate reading instruction to the built-in smart card, and after the smart card exports the stored digital certificate, the mobile terminal transmitting it to the authentication server for certificate registration, and the authentication server sending a signature instruction to the mobile terminal, the mobile terminal transmitting a private key signature instruction to the built-in smart card, the smart card sending out the signature result and the mobile terminal reporting the signature result to the authentication server. The present invention also discloses a system for remote payment based on mobile terminal, a mobile terminal and a smart card. The present invention not only breaks through the limitation of short of transmitting the personal ID and password by using short message and WAP.06-27-2013
20120203700TOKENIZED CONTACTLESS PAYMENTS FOR MOBILE DEVICES - According to an exemplary embodiment of the invention, a method is discloses for facilitating a credit card transaction wirelessly via a mobile device. The method includes receiving registration information for a credit card and a mobile device, the registration information for the credit card including a primary account number (PAN) of the credit card; associating the registration information for the credit card with a unique token; generating a pseudo-PAN based on the PAN, the pseudo-PAN being different than the PAN; and providing the unique token and the pseudo-PAN to the mobile device for use in one or more credit card transactions.08-09-2012
20110258122PAYMENT SYSTEM TO FACILITATE TRANSACTIONS - Disclosed herein are systems and method for facilitating transactions between a merchant-partner and a customer. In general, the systems and methods include: (a) staging a transaction between the merchant-partner and the customer; (b) tokenizing the transaction by linking one or more transaction instructions to a token ID; (c) providing the customer with the token ID, wherein the customer can then present the token ID and a payment to a point-of-sale terminal; (d) receiving confirmation that the customer has presented, to a point-of-sale terminal, the token ID and a payment in accordance with the one or more transaction instructions; (e) notifying the merchant-partner that the customer provided the payment to the point-of-sale terminal; and (f) settling the transaction between the point-of-sale terminal and the merchant-partner.10-20-2011
20100185545DYNAMIC PRIMARY ACCOUNT NUMBER (PAN) AND UNIQUE KEY PER CARD - Methods, systems, and machine-readable media are disclosed for handling information related to a financial transaction including utilizing dynamic cryptograms. According to one embodiment, a method of processing a financial transaction related to a financial account can comprise detecting initiation of the transaction with a device used as a presentation instrument in the transaction. A Dynamic Transaction Cryptogram (DTC) and a dynamic PAN can be generated at the device. The DTC can be used to authenticate the transaction and the dynamic PAN can comprise an encrypted form of a real PAN of the financial account that is valid for a single transaction. The DTC and the dynamic PAN can be provided by the device for use in the transaction.07-22-2010
20120310839Method and service platform for implementing account transfer using mobile terminal - The disclosure discloses a method for implementing account transfer using a mobile terminal, which includes: an uplink processing module receives a transfer-out transaction request from a transferor and a transfer-in transaction request from a transferee or an agent; an encryption and decryption module performs format verification and decryption of the transfer-out transaction request and transfer-in transaction request, randomly generates a withdrawal password according to the transfer-out transaction request, and provides the withdrawal password to a transaction processing module and a transferee; the transaction processing module authenticates a user accessing to the mobile terminal wallet transaction, performs the transfer-out operation according to the transfer-out transaction request, and performs the transfer-in operation according to the transfer-in transaction request and the withdrawal password provided by the encryption and decryption module; and a downlink processing module returns a response message to the mobile terminal of the transferor, transferee or agent after the transaction processing is completed. The disclosure also discloses a service platform for a mobile terminal wallet transaction. By adopting the disclosure, the inconvenience caused by the fact that the current transfer way using the mobile terminal must be supported by the bank outlet is overcome.12-06-2012
20110191250Methods and Apparatus for Conducting Electronic Transactions - A system and method for facilitating electronic transactions using an intelligent instrument is disclosed. An authorization server enables users to obtain authorization credentials through the use of the intelligent instrument by issuing a challenge to an intelligent token of the intelligent instrument. The intelligent token generates a challenge response and transmits the challenge response to the authorization server, which assembles credentials including a key for the electronic transaction upon validating the response. The authorization server sends the assembled credentials to the intelligent instrument and the intelligent instrument transmits the assembled credentials to the authorization server during a subsequent transaction. The authorization server validates the assembled credentials and provides authorization for the transaction in response to the validating the assembled credentials.08-04-2011
20100030695MOBILE DEVICE SECURITY USING WEARABLE SECURITY TOKENS - The claimed subject matter provides systems and/or methods that effectuates and establishes mobile device security. The system can include devices that detect point of sale mechanisms or secure token devices and based at least in part on the detection of secure token devices the system effectuates release of electronic funds persisted on a mobile device in order to satisfy a debt accrued at the point of sale mechanism.02-04-2010
20090076966Methods and apparatus for conducting electronic transactions - A system and method for facilitating electronic transactions using an intelligent instrument is disclosed. An authorization server enables users to obtain authorization credentials through the use of the intelligent instrument by issuing a challenge to an intelligent token of the intelligent instrument. The intelligent token generates a challenge response and transmits the challenge response to the authorization server, which assembles credentials including a key for the electronic transaction upon validating the response. The authorization server sends the assembled credentials to the intelligent instrument and the intelligent instrument transmits the assembled credentials to the authorization server during a subsequent transaction. The authorization server validates the assembled credentials and provides authorization for the transaction in response to the validating the assembled credentials.03-19-2009
20090030843SMART CARD LOAD AND PURCHASE TRANSACTIONS USING WIRELESS TELECOMMUNICATIONS NETWORK - A smart card transaction allows a consumer to load value onto a smart card and to make purchases using a smart card with a mobile telephone handset over the telecommunications network. For loading, the system includes: a mobile telephone handset including a card reader; a gateway computer; a funds issuer computer; and an authentication computer. The mobile telephone handset receives a request from a user to load a value onto the smart card. The handset generates a funds request message which includes the value and sends the funds request message to a funds issuer computer. The funds issuer computer debits an account associated with the user. Next, the handset generates a load request message with a cryptographic signature and sends the load request message to an authentication computer which authenticates the smart card. The handset receives a response message which includes a cryptographic signature and an approval to load. Finally, the handset validates the second cryptographic signature and loads the value onto the smart card. For payment, the system includes a merchant server and a payment server. First, the handset sends an order request message to the merchant server computer, and in return receives a purchase instruction message. The handset processes the purchase instruction message locally, and then sends a draw request message to a payment server computer. The payment server computer sends a debit message which includes a cryptographic signature and an approval to debit the smart card. Finally, the handset validates the cryptographic signature and debits the smart card.01-29-2009
20120041881SECURING EXTERNAL SYSTEMS WITH ACCOUNT TOKEN SUBSTITUTION - Systems, apparatuses, and methods for providing an account token to an external entity during the lifecycle of a payment transaction. In some embodiments, an external entity may be a merchant computer requesting authorization of a payment message. In other embodiments, the external entity may be a support computer providing a payment processing network or a merchant support functions.02-16-2012
20090171849TRACK DATA ENCRYPTION - A method for using a secondary PAN is disclosed. The method includes providing a secondary PAN associated with a primary PAN, where the secondary PAN has at least one end portion that is the same as the primary PAN, but has a middle portion of that is different than the primary PAN.07-02-2009
20120233078ELECTRONIC SETTLEMENT SYSTEM, SETTLEMENT MANAGEMENT DEVICE, STORE DEVICE, CLIENT DEVICE, DATA STORAGE DEVICE, COMPUTER PROGRAM, AND STORAGE MEDIUM - An electronic settlement system includes a data storage device such as an IC card in which value information is stored, a client device provided with an information input/output function to the data storage device, a settlement management device for managing settlement between the data storage device and a store device, and a communication system for connecting the client device, and the settlement management device so as to enable bidirectional communication. The settlement management device creates settlement information for making settlement by the data storage device, subjects the settlement information to an encryption processing by using a common key shared by the settlement management device and the data storage device, and transmits the settlement information subjected to the encryption processing to the client device, and the client device outputs the settlement information received from the settlement management device to the data storage device.09-13-2012
20110093397ANTI-PHISHING SYSTEM AND METHOD INCLUDING LIST WITH USER DATA - A server computer is disclosed. It comprises a processor and a computer readable medium coupled to the processor. The computer readable medium comprises code executable by the processor for implementing a method comprising: (i) receiving a request to conduct a transaction, (ii) providing a user interface to a user in response to the request, wherein the user interface includes a list of candidate identification tokens, wherein the list of candidate identification tokens includes an authentic identification token and one or more non-authentic identification tokens, wherein the authentic identification token is associated with a user account.04-21-2011
20120158594TRANSFER METHOD OF ELECTRONIC CASH - A card to card transfer method used in the financial system is provided in the present invention, and comprises an initializing step, a transferring step and a transaction confirming step, wherein the initializing step includes the steps of calculating and obtaining the public key certificate and checking the amount of the transaction and so on, and the transferring step includes the steps of performing the transaction and so on. The present invention can achieve the function of transferring the electronic cash between two cards and can prevent the risk of repeatedly transferring the money into the card for transfer-in by using the card for transfer-out and so on.06-21-2012
20120221475MOBILE TRANSACTION DEVICE SECURITY SYSTEM - Embodiments of the invention include apparatuses, methods, and computer-program products that provide for a unique financial transaction security system. In one embodiment, the financial transaction security system receives a security protocol from a user. The security protocol includes instructions for allowing transactions without authentication and security features for the user if authentication is necessary. The system then determines that the user is conducting a transaction, evaluates the instructions, and determines whether the transaction can occur without authentication. If the user is required to authenticate his identity, the system requests input from the user, compares the input to the security feature, and determines if the user is authenticated. The user is able to customize both the instructions and the security features to provide greater control over financial transaction security.08-30-2012
20120136796Device Enrollment System and Method - Embodiments related to systems and methods comprising receiving payment data at an access device; receiving an identifier for a mobile device at the access device; and generating and sending an authorization request message to a payment processing network, wherein the payment processing network generates a verification token, which is then sent to the mobile device whereby the mobile device is thereafter used to conduct payment transactions.05-31-2012
20120215700PAYMENT SYSTEMS AND METHODS USING MOBILE COMPUTING DEVICES - Systems and methods for the processing of payments to retail establishments using mobile computing devices. A user of a mobile computer device takes a digital image of a specific bar code at a retail establishment. A token is then derived from the bar code and the token is transmitted by the device to a server with whom the device and its user are registered with. The retail establishment packages the details regarding the proposed purchase by the user along with a token derived from the same bar code. The retail establishment then sends the package to the same server. The server then checks the two tokens received and, if they match, then the server effects payment from one of the user's payment options to the retail establishment. Both the user and the retail establishment are then notified of the payment.08-23-2012
20100017333METHODS AND SYSTEMS FOR CONDUCTING ELECTRONIC COMMERCE - Methods are disclosed of processing financial transactions. A connection is established over a public network between a customer client and a merchant server. A file is received over the connection from the merchant server at the customer client. An application is launched at the merchant server in response to receiving the file. Financial transaction data are received with the launched application. The received financial transaction data are transmitted with the launched application over the connection from the customer client to the merchant server to initiate processing of the financial transaction with the received financial transaction data.01-21-2010
20110004557Electronic Transaction Systems and Methods Therefor - The method includes the steps of receiving at the PEAD first digital data representing the transaction request. The PEAD provides information to the user regarding an ability to approve the transaction request. When the transaction request is approved by the user, the PEAD receives second digital data representing the electronic service authorization token. A remote agent server may provide a bridge between the electronic transaction system and the PEAD. In another embodiment, the private key is stored on the portable device, encrypted. The decryption key is stored outside of the device, at a trusted 301-06-2011
20110238581SECURE ELECTRONIC CASH-LESS PAYMENT SYSTEMS AND METHODS - Systems and methods to provide and maintain secure financial transaction conducted with a credit card or other cashless payment mechanism at a vending machine or other potentially unattended vending or point of sale device. Encapsulated card readers providing end-to-end encryption capabilities encrypt transaction data for secure transmission to a transaction host or server. Pre-authorization transaction data checking maintains account numbers in a secure encrypted format further enhancing security. Protection mechanisms that guard against, and provide warnings of equipment tampering, while also providing a visual indication to customers regarding the security of the system.09-29-2011
20110238580SYSTEM AND DEVICE FOR CONSOLIDATING SIM, PERSONAL TOKEN, AND ASSOCIATED APPLICATIONS FOR SECURE TRANSMISSION OF SENSITIVE DATA - The present invention relates generally to a smart card device that is configured to facilitate wireless network access and credential verification. Specifically, the device is configured to meet the physical and electrical specification for commercially available mobile devices utilizing a standard Subscriber Identity Module (SIM) for network access. The device combines the features of the SIM with Common Access Card or Personal Identity Verification card features to allow a network subscriber to invoke secure payment transactions over a carrier's network. The system includes data storage for maintaining a plurality of network and transaction instrument profiles and a profile gateway for receiving transaction information from a payment gateway, sending an authorization request to a user's mobile device, receiving a transaction authorization from the mobile device, and sending transaction information to a payment gateway to finalize the payment transaction.09-29-2011
20110238579SYSTEM AND DEVICE FOR FACILITATING A SECURE TRANSACTION WITH A VALIDATED TOKEN - The present invention relates generally to a smart card device that is configured to facilitate wireless network access and credential verification. Specifically, the device is configured to meet the physical and electrical specification for commercially available mobile devices utilizing a standard Subscriber Identity Module (SIM) for network access. The device combines the features of the SIM with Common Access Card or Personal Identity Verification card features to allow a network subscriber to invoke secure payment transactions over a carrier's network by way of a transaction account token. The system includes data storage for maintaining a plurality of network and transaction instrument profiles and a profile gateway for receiving transaction information from a payment gateway, sending an authorization request to a user's mobile device, receiving a transaction authorization from the mobile device, and sending transaction information to a payment gateway to finalize the payment transaction.09-29-2011
20120130901SYSTEM AND METHOD FOR CONSOLIDATING IDENTIFICATION AND TRANSACTION FUNCTIONS ON A COMMUNICATION DEVICE - The present invention relates generally to a smart card device that is configured to facilitate wireless network access and credential verification. Specifically, the device is configured to meet the physical and electrical specification for commercially available mobile devices utilizing a standard Subscriber Identity Module (SIM) for network access. The device combines the features of the SIM with Common Access Card or Personal Identity Verification card features to allow a network subscriber to invoke secure payment transactions over a carrier's network. The system includes data storage for maintaining a plurality of network and transaction instrument profiles and a profile gateway for receiving transaction information from a payment gateway, sending an authorization request to a user's mobile device, receiving a transaction authorization from the mobile device, and sending transaction information to a payment gateway to finalize the payment transaction.05-24-2012
20110258121METHOD AND APPARATUS FOR PROVIDING AUTOMATED PAYMENT - An approach is provided for conducting transactions via an audio token base payment system. An audio payment manager receives a request, at a device, for payment to a merchant, the request including a password. In response, the audio payment manager retrieves a personal identification number from a user of the device, an identifier associated with the user, a session code, or a combination thereof. The audio payment manager then generates an audio token at the device based, at least in part, on the password, the personal identification number, the identifier associated with the user, the session code, or the combination thereof, and causes, at least in part, conveyance of the audio token to the merchant to initiate the payment.10-20-2011
20110264586SYSTEM AND METHOD FOR MULTIPATH CONTACTLESS TRANSACTIONS - A system for multipath contactless transaction processing, comprising a point-of-sale system comprising a processing unit and a video screen, the video screen at least sometimes viewable by a purchaser interacting with the point-of-sale processing system, wherein, during a transaction, a graphical indicia is displayed on the video screen in a form suitable for photographing or scanning by a device held by the purchaser, and wherein, upon receipt by the point-of-sale processing unit of at least one non-graphical indicia the content of which is determined at least in part by the contents of the graphical indicia that was displayed to the purchaser, the point-of-sale completes the transaction.10-27-2011
20110276494METHOD AND APPARATUS FOR ORDERING GOODS, SERVICES, AND CONTENT OVER AN INTERNETWORK USING A VIRTUAL PAYMENT ACCOUNT - A secure, closed virtual payment system comprising registered buyers and sellers for ordering and paying for goods, services, and content over an internetwork is disclosed. A buyer becomes registered by applying for a virtual payment account. A seller becomes registered by applying for a seller account. A credit processing component (11-10-2011
20120330844MULTI FUNCTIONAL DUPLEX ENCRYPTED PROCUREMENT AND PAYMENT SYSTEM AND METHOD - A device having a processor, the processor executing program instructions causing the processor to: storing credit card information of an individual in an encrypted format only readable by the processor; function as a credit card terminal by receiving an invoice for payment, wherein the invoice has a merchant key to direct payment to a specified gateway; and transferring funds from the individual to the specified gateway.12-27-2012
20110307389Method and System for Distributed Point of Sale Transactions - A method and system for a fully distributed on-line selling environment is presented. Any webpage can contain a program module that for each customer that view any webpage with the module embedded in it, automatically associates that customer with their corresponding shopping cart stored at a central server. The module can initiate a sale transaction for a product presented on the webpage and cause the central server to complete the purchase and fulfillment. The website hosting the webpages with the module do not operate any back end transaction processing or order fulfillment. Instead the central server can retrieve a pending sales data associated with the customer and then initiate a payment process for the pending sale items as well as generate revenue share credits for the webpages associated with the sales.12-15-2011
20120101950ELECTRONIC CURRENCY AND AUTHENTICATION SYSTEM AND METHOD - An electronic currency and authentication system and method. An electronic money validator is attached to electronic money. The electronic money validator authenticates the electronic money originated by electronic money issuer. The electronic money might be originated when cash or cash equivalent is received from a customer for deposit into the customer's account. The electronic money validator is retired when the electronic money is removed from circulation.04-26-2012
20090012901Multifactor authentication system for "cash back" at the point of sale - Systems and methods are provided to allow for multifactor authentication of customers seeking to enter into “cash back” transactions at a merchant's point of sale. In an illustrative implementation, a user presents a prepaid payment card at a point of sale and requests a “cash back” transaction, the merchant thereupon verifying the customer has sufficient value to complete the transaction. The merchant then requests an authentication code from the user who then requests the authentication code from an outside party. The authentication code is delivered to the customer's mobile phone via a text message. The customer offers the authentication code to the merchant, who then allows the transaction to proceed if the authentication code is confirmed.01-08-2009
20100169223Payment System and Method Using an IC Identification Card - A payment system utilizes an IC identification card to identify a user, finds and verifies a bank account of the user. The system uses an IC identification card reader to read user identity information, and sends it along with user bank account information to an intermediary platform to be processed. The intermediary platform sends the received user identity information along with the other bank transaction information as part of a bank transaction request to a participating bank subsystem to be processed. The participating bank subsystem conducts the requested bank transaction with a user bank account determined according to the user identification either by the intermediary platform or by the participating bank subsystem based on a mapping relationship between the user identity and bank accounts. The decryption of the user identification information is done either by the IC identification card reader or at the intermediary platform.07-01-2010
20130173475SYSTEM FOR SECURE PAYMENT OVER A WIRELESS COMMUNICATION NETWORK - A method of conducting secure electronic credit payments to a payment acquirer using a credit payment unit, comprising of a smart card, a portable card reader device and a mobile phone, and a payment server. The method is based on using a unique reader key in the card reader device to encrypt all the sensitive smart card information communicated to the payment server, and thus being able to use an unsecure mobile phone to communicate with the payment server. The payment server then completes the transaction with the payment acquirer over a secure line.07-04-2013
20080235144Pre-authenticated identification token - An identification token such as a proximity payment device may be integrated with a wristwatch. For security purposes, the identification token may be disabled when removed from the user's wrist. The identification token may be re-enabled by interaction with a docking station or personal computer at the user's residence.09-25-2008
20080228652INTERNET BUSINESS SECURITY METHOD - An internet business security method is disclosed. According to this method, first, a one-time password is generated based on a smart card that includes a chip to perform the processes of storing data, processing data and encoding/decoding data. Then, the one-time password is identified by the website. When the one-time password is correct, the smart card holder is permitted to login to the website for further trading. The trade object for this website is the smart card holder identity registered in the bank.09-18-2008
20080222048Distributed Payment System and Method - The present invention provides a payment system that allows a mobile communications device (MCD) to interact with a merchant processing device (MPD) and a payment engine. A communications component associated with the payment engine can send requested barcodes to the MPD, receive barcodes or alphanumeric Universal Product Codes from customer MCDs, and handle payment authorizations and settlements. A barcode management component can generate and interpret barcodes based upon merchant offerings and client requests. A security algorithms component can employ an offset pair algorithm to convert each digit from a payment card information into an offset pair of digits to facilitate security in accordance with one embodiment of the present invention.09-11-2008
20080222047Device and Method for Conducting Secure Economic Transactions with a Programmable Magnetic Stripe - A secure economic transaction device includes a memory for storing user account information, a temporary code generator coupled to the memory and operable to generate a time-based code that is valid for only a finite amount of time, a programmable magnetic stripe on a surface of the device and operable to magnetically transmit at least a portion of the user account information and the temporary code to a stripe reader, and stripe programming circuitry located on the device, coupled to the temporary code generator, and operable to dynamically program the magnetic stripe with the code. Also provided is a method for conducting the transaction.09-11-2008
20130144792STAND-ALONE SECURE PIN ENTRY DEVICE FOR ENABLING EMV CARD TRANSACTIONS WITH SEPARATE CARD READER - A method of conducting secure electronic payments to a payment acquirer using a credit card payment unit, comprising of a smart card, a portable card reader device, a mobile phone, a stand-alone PIN entry device and a payment server. The method is based on eliminating the unsecure keyboard in a mobile phone used for entering personal identification information, and instead use a separate secure PIN entry device which fulfils the EMV Level specification. Since all sensitive payment information, communicated to the payment server from the card reader and the PIN entry device, is encrypted using unique encryption keys an unsecure mobile phone may be used for relaying the communication between the card reader device and the PIN entry device to and from the payment server.06-06-2013
20130173474OFFLINE MOBILE PHONE PAYMENTS - A method for performing vending transactions includes generating a token upon request by a wireless appliance is provided. The method includes placing the token in a remote server; placing the token in the wireless appliance; providing the token from the wireless appliance to a point-of-sale (POS) terminal; authenticating the token with the remote server; validating the token to perform the vending transaction; and deleting the token from the remote server when the vending transaction is complete. A method for using a wireless appliance in vending transactions is provided. A method for using a remote server configured to connect to a wireless appliance and a POS terminal in vending transactions is provided. A system to perform vending transactions using an internet connection as above is provided. The system may include a remote server including a private account; the remote server configured to communicate with a POS terminal and a wireless appliance.07-04-2013
20130132283SYSTEM AND METHOD FOR PROCESSING AN ONLINE TRANSACTION REQUEST - A method of processing an online transaction request involves a network gateway generating a revised transaction request from an incoming transaction request that is received from a client terminal. The revised transaction request includes a revised transaction message that is derived from the incoming transaction request and a revised transaction request cryptogram that is generated from the revised transaction message. The revised transaction request cryptogram is uniquely associated with an identity token that is interfaced with the client terminal. The network gateway receives a transaction authorization from an issuer server for the revised transaction request, and provides a revised transaction authorization message to the client terminal in accordance with the received transaction authorization. The revised transaction authorization message provides an indication of authorization of the revised transaction request.05-23-2013
20080201266Communications System - A method for controlling payment in a communications system including the steps of providing a service accessing a service provider from the or one user device, selecting a product for purchase from the service provider, the service agent receiving a request for payment from the service provider via a payment operator and the service agent issuing a payment authorisation to a payment provider via the payment operator. The service agent is installable in a variety of user devices and provides a uniform interface to the payment system from a plurality of the user devices. The service agent may also provide a uniform interface to an ordering system from a plurality of the user devices.08-21-2008
20080201265Smart card with random temporary account number generation - The smart card with random temporary account number generation provides an authenticating system coupled with an access or transaction card, such as a credit card. The card includes first and second memory storage media, with the first memory medium containing a plurality of temporary account or authentication numbers. The card also has a biometric sensor, such as a fingerprint scanner, and the second memory stores the biometric parameters of the authorized user. A processor compares the biometric parameters with the measured biometric readings to enable the card. The processor has a random number generator, allowing for the randomized selection of one of the account numbers stored in the first memory, thus providing a temporary account number for the transaction. A remote site includes an identical random number generator and set of account numbers, allowing the temporary account number to be verified and then discarded, following the transaction.08-21-2008
20080201264PAYMENT CARD FINANCIAL TRANSACTION AUTHENTICATOR - A payment card financial transaction authenticates for providing overall financial network security computes a number of results from a cryptographic key that match values that were selectively used to personalize individual payment cards with their individual user identification and account access codes. An account access code is later presented daring a financial transaction involving at least one of those individual payment cards. A dynamic portion is included in a merchant's magnetic reading of the payment card. Then authenication can proceed by matching it with values computed from the cryptographic key.08-21-2008
20100287101APPARATUS FOR CALCULATING NUTRIENT REQUIREMENT AMOUNT, AN APPARATUS FOR SUGGESTING A NUTRITIONAL SUPPLEMENT, A BLENDING APPARATUS OF A NUTRITIONAL SUPPLEMENT AND A BLENDING SYSTEM OF A NUTRITIONAL SUPPLEMENT - It is provided with a medical inquiry processing unit for acquiring the response to a medical inquiry presenting medical inquiry items to a person to be examined, a nutrient requirement amount calculating unit for calculating the nutrient requirement amount of the person to be examined from the response to the medical inquiry, a nutritional supplement suggesting unit for suggesting the blend of a nutritional supplement based on the nutrient requirement amount of the person to be examined and a nutritional supplement blending unit for blending nutrients to prepare the nutritional supplement based on the blend of the nutritional supplement.11-11-2010
20130204793Smart communication device secured electronic payment system - Systems, apparatuses, and methods enabling secure payment transactions, and methods for sharing secure documents, via a mobile device, for example a mobile telephone, smartphone, cellular telephone, other wireless device, a Near Field Communications (NFC) device, or the like. Actual user account information is substituted with temporary account information such that the temporary account information may be manipulated in a manner similar to actual user account information, with the result that actual account information is masked thereby greatly reducing the likelihood of misuse.08-08-2013
20100293100Authenticated Payment11-18-2010
20100299265METHODS AND SYSTEMS FOR SECURITY AUTHENTICATION AND KEY EXCHANGE - This is for a payment device that may be constructed from separate modules in a secure fashion such that the aggregation of the modules constitutes an overall secure device without the use of additional covers, cases, or tamper-resistant housings. The methods and system are provided whereby the devices within a modular payment system can exchange data between each-other in a secure fashion. While data encryption is being used elsewhere, the present invention extends the security zone from each secure payment module within a modular device out over the cable to the next device. This allows the user to purchase payment device components, place them as they see fit, and not have to obtain certification on their end product as a POS-A level payment device.11-25-2010
20110307388METHODS AND SYSTEMS FOR PAYMENT PROCESSING BASED ON A MOBILE PHONE NUMBER - Described herein are methods and systems for processing a consumer payment based on a mobile phone number of a mobile device of a consumer. In one embodiment, a method includes initiating a payment between the consumer and a merchant. A payment system receives the mobile phone number associated with the mobile device of the consumer. The payment system generates and sends to the mobile device a one time passcode (OTP) in response to receiving the mobile phone number from the consumer. The payment system authenticates the consumer based on receiving the OTP from the consumer. The payment system completes the payment transaction by granting micro-credit to the consumer with no pre-registration.12-15-2011
20120030121SECURE ACTIVATION BEFORE CONTACTLESS BANKING SMART CARD TRANSACTION - The invention relates to a portable token equipped with non-volatile memory, the token comprising authentication means to authenticate a holder of the token, authorization means to define the rights of the holder, and payment means to trigger a payment transaction. The authorization means are set to store the rights in non-volatile memory after the authentication means are invoked, and the payment means have the capacity to retrieve the rights from non-volatile memory, and to subject the execution of the payment transaction to the verification of the rights. The invention also relates to a related portable device, to a system comprising a portable token and a portable token, and to a method for carrying out a payment transaction with a portable token.02-02-2012
20100082492PAYMENT SYSTEM - An electronic transaction payment system is provided having a vendor terminal associated with a vendor who provides goods or services to a purchaser, a vendor smart-card and a vendor smart-card reader for transmitting data to and receiving data from the vendor smart-card. The system also includes a purchaser smart-card reader which is connected to the vendor terminal and which is operable for transmitting data to and receiving data from a purchaser smart-card. In operation, payment for goods purchased by the purchaser is made between the purchaser smart-card and the vendor smart-card. In a preferred embodiment, the payment data is encrypted using an encryption key specific to the transaction between the purchaser and the vendor. A third party registry terminal may also be provided for providing validation of the vendor and/or the purchaser.04-01-2010
20130204794PAYMENT SERVICE AUTHENTICATION FOR A TRANSACTION USING A GENERATED DYNAMIC VERIFICATION VALUE - Methods and systems for dynamically generating a verification value for a transaction and for utilizing such value to verify the authenticity of the payment service application. The dynamically created verification value may be generated on a payment device, such as an integrated circuit credit card or smart card, embedded into the payment data, and transmitted to a point of sale terminal. Alternatively, payment data is sent by a payment device to a point of sale terminal, which generates a verification value and embeds it into the payment data. The embedded verification value is used by a service provider to verify the authenticity of the transaction. The methods and systems may be used in a contactless (wireless) environment or a non-wireless environment.08-08-2013

Patent applications in class Including authentication