Entries |
Document | Title | Date |
20080201267 | Remote product ordering using mobile phones - Systems and methods for placing and fulfilling orders for products that include visual content using a mobile telephone. An image processing operator provides a unique authenticator in return for a monetary payment. A user of the system provides a message that includes a digital image with an order indicator, a delivery address and the unique authenticator. The image processing operator extracts the message components and checks the validity of the authenticator. If the authenticator is valid, the image processor generates the desired image that includes at least a portion of the digital image and a portion of another digital image to produce a completed product. The completed combined image can be provided as any of a digital image, a printed image, and an image rendered on a physical object. The completed product is sent to the user or to a third party as the user directs. | 08-21-2008 |
20080208760 | Method and system for verifying an electronic transaction - A method for verification of an electronic transaction between a consumer and a merchant, a credit issuers or any combination thereof. This method includes the steps of: obtaining a network data set including a plurality of data fields reflecting network data; obtaining a transaction data set including a plurality of data fields reflecting transaction data, consumer data, merchant data, credit issuer data or any combination thereof, directed to the electronic transaction; analyzing at least one field of the network data set and at least one field of the transaction data set; and based upon the results of the analysis, initiating an action directed to the transaction. An apparatus and system are also disclosed. | 08-28-2008 |
20080222049 | Digital Signature Authentication - A systems and methods for authenticating a consumer with a transaction card using digital signatures according to one embodiment of the invention is disclosed. These systems and methods allow consumers to digitally sign transaction information with a private key. The private key may be used to digitally sign the transaction, for example, through a hosted or local system that protects the integrity of the private key. A financial institution may authenticate the consumer by decrypting the digital signature with a public key. | 09-11-2008 |
20080249949 | Data Exchange method between multiple peer systems in a peer-to-peer network - A data exchange method between a first peer system having a requested data chunk and a second peer system having a credit includes: exchanging the credit of the second peer system for the requested data chunk of the first peer system; and using the credit received by the first peer system to exchange for a future data chunk from the second peer system at a later time. | 10-09-2008 |
20080249950 | Method and apparatus for conducting transactions generated at point-of-sale locations - A system and method for conducting credit card or debit card transactions in a wired or wireless network. A merchant utilizing one of a number of terminals would input information through one of a particular number of gateways to a central credit card processing center. The credit card processing center would review each transaction and process the transaction and then send a conformation or disapproval of the transaction to the appropriate merchant, as well as transmitting the transaction to one of a plurality of credit card or debit card processors. In this manner, a terminal provider would not be forced to certify the terminal with each of the credit card processors, but would only have to certify to the system itself. Additionally, the system includes a website allowing each merchant to review and alter any one of a number of transactions. | 10-09-2008 |
20080262971 | DEVICE, SYSTEM AND COMPUTER WRITEABLE MEDIA FOR ACCOMPLISHING REAL TIME DOWNLOADING OF TRANSACTIONAL INFORMATION TO A PERSONAL DIGITAL ASSISTANT, INCLUDING REMOTE SERVER INCORPORATING PERSONAL ASSISTANT MANAGER SOFTWARE - A user operated device, operating system and associated computer writeable media for retrieving, storing and displaying data associated with at least one personal financial account. A handheld body includes a built in microprocessor and memory communicating with a keypad, screen display and power supply. A built-in modem and wireless communication protocol associated with said processor soliciting the retrieving and downloading of digital information, in real-time fashion from a remote server (including such as a Personal Assistant Manager subscription based server for compiling, storing and regularly updating transactional information relating to each of a plurality of unrelated user accounts), said transmitted information being selectively stored into said memory and/or presented on said screen display. | 10-23-2008 |
20080262972 | Order confirmation devices, systems, and methods - Devices, systems, and methods for confirming online orders are provided. In some embodiments, a method of confirming an online food order is provided, where the method includes providing a confirmation device at a vendor facility, where the confirmation device is adapted to receive an order and send the order to a display or printing device; receiving an online order through the confirmation device; printing or displaying the order and an associated confirmation code; and entering the confirmation code into the confirmation device to confirm receipt of the order. The confirmation device may be dedicated to the single purpose of confirming online orders and may be incorporated into a point-of-sale device. | 10-23-2008 |
20080262973 | Apparatus and method for secured commercial transactions - A transaction security code database and a method and apparatus for generating the transaction security code database. The transaction security code database is comprised of multiple transaction security codes, each transaction security code constituting a transaction code generated based upon a transaction initiated by a user, which is appended to or linked to a security code which is based upon a biometric sensor code generated by a biometric sensor from a biometric presentation of a biometric feature of the user. | 10-23-2008 |
20080288414 | Sales data processor and computer readable medium - A sales data processor connected to a server device via a communication network. A connection unit connects to the sales data processor a recording medium which has stored access information on the server device and identification information on the sales data processor. A CPU reads the access information and the identification information stored in the recording medium. A communication unit is authenticated by the server device based on the read access destination information and identification information to communicate with the server device. | 11-20-2008 |
20080319914 | TRANSACTIONAL SECURITY OVER A NETWORK - A system and method facilitating purchase transactions over a computer network, including the purchase of electronically storable items. The embodiments herein encrypt “customer identifier string” in an encryption stream and cause the encryption stream to be transferred from the customer to a merchant in the purchase transaction. A verification entity receives the encryption stream which is sent by the merchant for identity verification and payment authorization. Then, the verification entity verifies the identifiers contained in the encryption stream and transfers an identity verification and payment authorization from the verification entity to the merchant. | 12-25-2008 |
20090024533 | Payment systems and methods - In one embodiment the present invention includes a payment system for a commercial transaction. The payment system includes an account server that a consumer accesses using the consumer's mobile telephone number. The account server updates the consumer's account and the merchant's account according to the transaction. The account server sends a confirmation directly to the consumer's mobile telephone. | 01-22-2009 |
20090063353 | Payment System and Method - In one embodiment, transferring payment between a first user and a second user of a communication system includes displaying a contact list in a user interface of a client executed at a user terminal of the first user, the contact list including the second user. The client retrieves and displays at least one page from a payment provider responsive to the first user selecting the second user from the contact list. The client transmits, to the payment provider, information related to the payment entered into the page by the first user, which causes the payment provider to transfer the payment from an account of the first user to an account of the second user. | 03-05-2009 |
20090063354 | ACCOUNT TRANSACTION FRAUD DETECTION - A merchant conducting a transaction on an account forms transaction data with a sensitive data field. To obscure the account prior to transmitting information about the transaction, for each character in the sensitive data field, a combined character is formed with a character of a generated pad. A replacement character is formed by a modulus operation on the combined character and is stored in the corresponding position in the sensitive data field. A transmission containing the sensitive data field with replacement characters is delivered to the merchant's acquirer. Subsequently, a first transmission is received for another transaction from a merchant that contains transaction data upon an account and a sensitive data field. Using the sensitive data field, an attempt is made to retrieve a transaction data record that contains data from a previous transaction that includes the account upon which the previous transaction was conducted. The sensitive data field, which is encrypted as the corresponding account upon which the previous transaction was conducted, was encrypted by a character-by-character modulo operation using a generated pad. If the transaction data record is retrieved, a second transmission is sent that contains a fraud notification of the attempt to conduct a transaction upon the encrypted account in the sensitive data field. If there is no retrieval of the transaction data record, a third transmission containing a no-fraud notification is sent. | 03-05-2009 |
20090070271 | SYSTEMS, METHODS AND APPARATUSES FOR SECURE DIGITAL TRANSACTIONS - A method for authorizing recurring transaction according to one embodiment includes receiving a defined payment amount associated with a user or entity. Additionally, the method includes receiving a first code associated with a first predetermined currency value, where the first code is also associated with the user or entity. Furthermore, the method includes verifying an availability of funds to pay the defined payment amount and authorizing payment of the defined payment amount if funds are available to pay the defined payment amount. Further still, the method includes generating a new code associated with a new predetermined currency value, and sending the new code to a sender of the defined payment amount. | 03-12-2009 |
20090070272 | WIRELESSLY EXECUTING FINANCIAL TRANSACTIONS - The present disclosure is directed to a system and method for wirelessly executing financial transactions. A payment card includes an interface, a communication module, secure memory, a user-interface module, and a processing module. The interface connects to a slot of a mobile host device. The communication module wirelessly receives RF signals from and transmits RF signals to a retail terminal. The secure memory stores user credentials and a payment application used to execute financial transactions with the retail terminal. The user credentials and the payment application are associated with a financial institution. The user-interface module presents and receives information through the GUI of the mobile host device. The processing module executes the payment application using the user credentials in response to at least a transaction request received by the communication module and transmits a transaction response to the retail terminal based, at least in part, on the executed application. | 03-12-2009 |
20090083191 | TRACK DATA ENCRYPTION - A method for conducting a secure transaction using a secondary PAN is disclosed. The method includes providing a secondary PAN associated with a primary PAN, where the secondary PAN has at least one end portion that is the same as the primary PAN, but has a middle portion that is different than the primary PAN. | 03-26-2009 |
20090106160 | AUTHORIZATIONS FOR MOBILE CONTACTLESS PAYMENT TRANSACTIONS - Embodiments generally relate to systems and methods for processing electronic payments for retail services and goods delivered by unattended retail device. In embodiments, an unattended retail device leverages a consumer's mobile appliance to send the transaction and payment information to an authorizing authority. The authorizing authority receives the payment and transaction information, authorizes or declines the payment of the transaction, and forwards the authorization or declination to the mobile appliance. The mobile appliance then sends the authorization or declination to the unattended retail device. If authorized, the unattended retail device provides the retail good or service. | 04-23-2009 |
20090106161 | APPARATUS AND METHOD FOR DATA INTERCHANGE - An apparatus and method for data interchange provides a universal transaction mechanism for translating and sharing data, particularly financial data, thereby streamlining the exchange of financial information and approvals typically utilized in many brokerage transactions, including the verification of free funds or Prime Broker relationship through an electronic Letter of Free Funds or Prime Broker SIA 150, SIA 151 Schedule A in compliance with Regulation T and Prime Broker documentation rules related government-mandated rules and requirements. | 04-23-2009 |
20090132424 | SECURE PAYMENT CAPTURE PROCESSES - Methods and processes for securely capturing payment device information and conveying the securely captured payment device information to a client application on a merchant's client device in a manner that does not require that the payment device information to be displayed to the merchant. The client application generates and submits a payment authorization request to a payment authorization service in a manner that does not require the payment information to be displayed to the merchant. The merchant receives a status of the payment authorization request as approved, denied, or process failure. Payment capture can be made before an active connection is made with the merchant's client device, or can occur in real-time. | 05-21-2009 |
20090144205 | SERIAL NUMBER AND PAYMENT DATA BASED PAYMENT CARD PROCESSING - A server is operable to receive a media device identifying number (ID) and establish an association between a media device and a payment account and, in one embodiment, supports at least one of payment authorization and payment clearing based at least in part on the media device ID and the payment account. A network and system includes a payment card processor server that is operable to receive a payment authorization request and to determine if an authorized media device generated a purchase selection message and to determine to approve a received payment authorization request based, in part, if the media device was authorized for the purchase selection based upon a received media device ID. | 06-04-2009 |
20090182676 | Remote Electronic Payment System - The invention concerns a remote electronic payment system comprising an authentication device ( | 07-16-2009 |
20090192944 | SYMMETRIC VERIFICATION OF WEB SITES AND CLIENT DEVICES - A method and apparatus for symmetric verification of a client device and a web site are described. In one embodiment, the method comprises receiving an identity verification request for an electronic transaction between a client device and a website. In one embodiment, the method may also comprise verifying an identity of both a user associated with the client device and the web site using symmetric verification, and transmitting verification results to the web site and the client device. | 07-30-2009 |
20090198620 | Mobile commerce receipt system - A mobile commerce receipt system and method providing a user of a mobile telecommunications terminal with a reliable electronic proof of reservation, purchase and/or payment made. By e-commerce means, the user places an order with a vendor or merchant and makes electronic payment. The vendor issues an electronic contract, sending the contract to a Trusted Third Party (TTP) receipt server. The TTP validates the contract, generates an electronic, digital receipt which is to sent the vendor. The vendor sends the receipt to the mobile terminal of the user, the mobile terminal storing the receipt for subsequent presentation at the point of delivery of the ordered goods or services. | 08-06-2009 |
20090204545 | Electronic financial transactions - A new electronic financial transaction (EFT) system is proposed, wherein the business logic of a transaction is defined at a location remote from a secure point of sale terminal, thus having a framework wherein the business logic can be easily customised or updated. | 08-13-2009 |
20090204546 | Electronic payment and associated systems - By linking together mobile telephony systems having small message service capacity and payment clearance systems such as those operated by banks and credit card companies, substantial facilitation of electronic payments may be achieved. Existing security systems designed to protect the mobile telephony system, for example SIM cards and optional encryption provide a base level of transaction security which may be enhanced by suitable programming to require the use of a PIN to validate a transaction. By linking such systems with e.g. ATMs, the usefulness of a mobile telephone, where each assigned telephone number essentially functions as a player identity number (or, in certain enhancements, as an account number), substantial transaction economies can be achieved without compromising security, with excellent audit trail features and with automatically generated confirmations and acknowledgements. | 08-13-2009 |
20090210348 | System and method for electronic commerce - A method of identifying altered order critical data in a system for conducting electronic commerce over a public data network in which orders are placed by a customer using a computer. The method includes the step of transmitting an electronic order of the customer over the public data network from the customer computer to a validation server. The validation server validates order critical data included in the order by executing the steps of verifying the order critical data, and generating an indication of the validity or otherwise of the order critical data. The method enables, for example, orders generated by untrusted devices, such as a customer computer, to be verified by a trusted validation server thereby improving the security of electronic commerce systems employing client-side ordering. | 08-20-2009 |
20090210349 | VIRTUAL ACCOUNT BASED NEW DIGITAL CASH PROTOCOLS - Virtual account based digital cash protocols employ two pairs of private and public keys. Each public key is certified separately and the protocols do not use any blind signature schemes. As a result, the virtual account based digital cash protocols provide strong protection of the user privacy by using two certified public keys instead of a blind signature. One pair of certified keys consists of one master user private key and one master user public key. A second pair of certified keys consists of one pseudonym user private key and one pseudonym user public key. The use of a master key pair and a pseudonym key pair circumvents the need for blind signatures. As a result, the proposed protocols do not require blind signatures and do not add additional overhead and security requirements necessitated by conventional blind signature schemes. The protocols use public key protocols, digital signatures and symmetric key protocols, which may be readily implemented in standard information security based systems based on cryptographic constructs. In addition, the protocols may be deployed in mobile, off-line, and on-line settings. | 08-20-2009 |
20090216680 | Systems and Methods for Performing File Distribution and Purchase - A secure computing module (SCM) is configured for connection with a host device. The SCM includes a processor for performing secure processing operations, a host interface for coupling the processor to the host device, and a memory connected to the processor wherein the processor logically isolates at least some of the memory from access by the host device. The SCM generates a secure digital signature for a financial transaction and enables controlled content received through the host device. File distribution is performed from a content provider to a buyer or from a reseller to a buyer. The file distribution includes a financial transaction using secure digital signatures and possibly message encryption. The digital signatures and transaction details are communicated to appropriate financial organizations to authenticate the transaction parties and complete the transaction. The controlled content is transferred to the buyer from either the content provider or the reseller. | 08-27-2009 |
20090216681 | SYSTEMS AND METHODS FOR PERFORMING WIRELESS FINANCIAL TRANSACTIONS - A secure computing module (SCM) is configured for connection with a host device. The SCM includes a processor for performing secure processing operations, a host interface for coupling the processor to the host device, and a memory connected to the processor wherein the processor logically isolates at least some of the memory from access by the host device. The SCM also includes a proximate-field wireless communicator connected to the processor to communicate with another SCM associated with another host device. The SCM generates a secure digital signature for a financial transaction package and communicates the package and the signature to the other SCM using the proximate-field wireless communicator. Financial transactions are performed from person to person using the secure digital signature of each person's SCM and possibly message encryption. The digital signatures and transaction details are communicated to appropriate financial organizations to authenticate the transaction parties and complete the transaction. | 08-27-2009 |
20090240626 | Customer Initiated Payment Method Using Mobile Device - The invention concerns a method of making a payment transaction by a customer including steps of receiving, by a mobile device ( | 09-24-2009 |
20090271322 | Electronic receipt system and method - A system and method for auto generating an electronic receipt from virtually any type of public facing business having a live point-of-purchase and utilizing an electronic payment systems, namely, a point-of-sale (POS) system having a credit card terminal and/or an electronic cash registers (ECR). The system includes a software add-on which authenticates and identifies consumers at the POP using a pre-registered credit/debit card, deactivates normal receipt printing functionality, captures electronic receipt information and transmits this information to a membership or subscriber based Internet web-site, where consumers may then view and manage the information. The system can be used to automate a product return and/or generate and transmit a gift receipt. The system further includes a membership or provider based Internet website for merchants to view and manage information related to previous customers, from which merchants may distribute coupons and/or advertisements to these consumers. | 10-29-2009 |
20090319433 | ELECTRONIC CURRENCY, ELECTRONIC WALLET THEREFOR AND ELECTRONIC PAYMENT SYSTEMS EMPLOYING THEM - Electronic currency consists of data in a form suitable to be stored in a user's data storage medium, comprising information on the data value, identification of each specific set of data or data point, and authentication information suitable to verify that said data has been generated by a specific Currency Issuing Authority (CIA). A method and a system for effecting currency transactions between two users over the Internet or other communication network are also described. | 12-24-2009 |
20090319434 | MAINTAINING PRIVACY FOR TRANSACTIONS PERFORMABLE BY A USER DEVICE HAVING A SECURITY MODULE - The present invention discloses a method and system for maintaining privacy for transactions performable by a user device having a security module with a privacy certification authority and a verifier. The system comprises an issuer providing an issuer public key PKI; a user device having a security module for generating a first set of attestation-signature values DAA | 12-24-2009 |
20090327141 | HIGHLY EFFICIENT SECRECY-PRESERVING PROOFS OF CORRECTNESS OF COMPUTATION - Presented are methods and systems for highly efficient proofs of correctness of computations that preserve secrecy of the input values and calculations. One embodiment includes a method for verifiably determining at least one output for a secrecy preserving computations where the method includes acts of calculating an output from submitted inputs according to an announced calculation, translating a value in the calculation into two components that are a randomized representation of that value, publishing commitments to the at least two components, revealing a portion of the randomized representation in response to a verification request, and enabling verification of the calculation of the output using the revealed portion of the randomized representation. According to one aspect of the secrecy preserving verification the numbers involved in the secrecy preserving calculation are represented by a randomly constructed representing pair. In another aspect, revealing one member of the pair allows for verification without compromising secrecy. In one embodiment, arrangement of the translation process ensures that in the verification only truly independently random numbers, or operations on them, are revealed and checked. | 12-31-2009 |
20090327142 | Fair Payment Protocol with Semi-Trusted Third Party - Described is an optimistic fair payment protocol in electronic commerce that provides fair payment while resisting an unconscious double spending attack and other attacks. A buyer receives encrypted e-goods from a merchant, and sends payment to the merchant. If decryption information is not received in exchange for the payment, or the decryption information does not render the e-goods useable, the buyer launches a dispute with a third party dispute resolution service. If the decryption information is received and renders the e-goods useable, the buyer determines whether the e-goods are valid, according to a corresponding description. If not valid, the buyer launches a dispute and provides the e-goods and the description. The third party uses the description to evaluate the validity of the goods to determine whether to refund the payment to the buyer or release it to the merchant. | 12-31-2009 |
20090327143 | Method and apparatus to send cash to any person in the world - A method to send a monetary value corresponding to the value of a US dollar bill feed to a device operated by the person that want to send a cash to a friend or relative. In one embodiment of the invention, the person that wants to send monetary value to another person just places a phone call on the device described on this invention and during the conversation feeds one bill to the device which could be returned back if in few seconds there is no verification that a corresponding monetary value has been received by the other person, similarly additional bills could be fed to the device. To gain trust, the device could show the pictures of the recipient, sound bites and other information such as name, address, and account balance to mention some examples. | 12-31-2009 |
20090327144 | SYSTEM FOR EXECUTING REMOTE ELECTRONIC NOTARIZATION AND SIGNATORY VERIFICATION AND AUTHENTICATION - A system for remote electronic verification and authentication and screening of potential signatories for remote electronic notary transactions via remote pc encrypted platform to a broadband digitally or WIFI cellular/PDA device or portable pc device. The system implements the following electronic components, but not limited to, electronic signature device, digital certificates, electronic document, electronic biometric devices, electronic audio/visual software/hardware, and electronic payment systems and devices, all electronically synchronized to afford capable notary publics in executing remote electronic notary transactions via a satellite kiosk network or on-line virtual kiosk application. | 12-31-2009 |
20100030697 | END-TO-END SECURE PAYMENT PROCESSES - Systems and method for performing secure electronic payment transactions to allow merchants to perform payment processing such that the merchant payment system is not required to store data specific to a particular payment device. | 02-04-2010 |
20100082494 | METHOD AND SYSTEM FOR CASH TRANSFER - A method and system for transferring cash electronically from a sender to a receiver through cash machines and a mobile device is disclosed. On initiation of a transaction by a sender on a cash machine, a coupon containing details of the transaction is generated by the system. The coupon is sent to the mobile device of the receiver. The receiver uses the coupon for withdrawing cash from a designated cash machine. On withdrawal of the cash by the receiver, the sender receives a confirmation from a bank. | 04-01-2010 |
20100088237 | METHODS AND SYSTEMS FOR USING PHYSICAL PAYMENT CARDS IN SECURE E-COMMERCE TRANSACTIONS - Pursuant to some embodiments, methods, systems, apparatus, computer program code and means for conducting an online transaction by a user operating a computer are provided which include identifying, at the computer, that the user has selected a secure payment option during a transaction with a merchant. The computer is caused to enter a private session. During the private session, payment card data from a physical payment card held by the user is received, and the payment card data is forwarded to a payment provider to cause the payment provider to provide substitute payment card details to the merchant to complete the transaction. | 04-08-2010 |
20100125524 | SECURITY TRANSACTION SYSTEM AND THE METHOD FOR THE SAME - The present invention discloses a web transaction system and the method for the same. The web transaction system includes a plurality of merchant severs which deal with customers through a trading platform. Financial providers supply the merchant servers or customers with financial services respectively. A trustee service provider, coupled to the financial providers, provides the merchant servers with entrusting services for reduction in trading risks. | 05-20-2010 |
20100131415 | ELECTRONIC PAYMENT SYSTEM INCLUDING MERCHANT SERVER AND ASSOCIATED METHODS - An electronic payment system is for a merchant server to transfer funds from a purchaser account to a merchant account, the merchant server to send a merchant transaction identification (ID) and transaction information. The electronic payment system includes a mobile wireless communications device to send a purchaser transaction ID and purchaser account access information. A payment processor server is to receive the purchaser transaction ID and purchaser account access information, and is also to send the transaction information to the mobile wireless communications device if the merchant transaction ID matches the purchaser transaction ID. The mobile wireless communications device is also to send confirmation of the transaction information to the payment processor server. The payment processor server is also to effect a transfer of funds from the purchaser account to the merchant account based upon the confirmation of the transaction information and the purchaser account access information. | 05-27-2010 |
20100191654 | MULTI-FUNCTIONAL CONTROL UNIT FOR AN IONIC FOOT BATH SYSTEM - One particular implementation of the present invention may involve a control unit of an ionic foot bath or other health product. The control unit may be connected to a network or the Internet such that the control unit may be monitored or controlled by a third party, such that the third party may provide programming updates, adjust the programming of the control unit to conform to the user's preferences and provide flexibility to a practitioner with several foot bath systems. The control unit may also provide the functionality of a pay-per-use method for use of the ionic foot bath. The method may allow a user or an operator of the product to purchase operational time that is desired to use the product. Once the operating time is purchased, the product may be operated for the purchased amount of time, at which point, more usage time may be purchased. | 07-29-2010 |
20100198732 | COMMUNICATION SYSTEM, A MEDIA PLAYER USED IN THE SYSTEM AND A METHOD THEREOF - There is provided a communication system including a plurality of content receiver cum transmitter devices connected to a network, each device being for receiving content, selectively storing content and for selectively re-transmitting content. The system may include at least one server for storage of advertisements and transmission of advertisements either directly to the plurality of content receiver cum transmitter devices, or the transmission of advertisements being directed by at least one chaincast manager, the at least one server for storage of advertisements and transmission of advertisements being either online or offline. There may also be at least one content server connected to the network for storage of content and transmission of content either directly to the plurality of content receiver cum transmitter devices, or the transmission of content being directed by at least one chaincast manager. The at least one chaincast manager connected to the network may preferably be for registering the plurality of content receiver cum transmitter devices, and for scheduling content and advertisement transfers amongst the plurality of content receiver cum ransmitter devices. It is advantageous that the system enables simultaneous recording and transmission of content by each content receiver cum transmitter device with minimal lag time. A corresponding method of the aforementioned system and an embodiment of the content receiver cum transmitter device are also described. | 08-05-2010 |
20100198733 | Enabling Payment Using Paperless Image Of A Check - Payment or financial transactions are facilitated between two parties by utilizing mobile devices. A payor's mobile device may be adapted to generate an electronic/paperless version or image of a check. The payor may make the paperless image of a check out to a particular payee so that it can be cashed from the payor's checking account. The electronically-generated check may be in the form of an image than can be transmitted by the payor's mobile device to the recipient's mobile device. The payee then submits the received check, electronically or in paper form, to a financial institution for redemption. | 08-05-2010 |
20100205098 | E-MAIL LAUNCHED WEB TRANSACTION - A method includes receiving, at a processor, an e-mail including a description of an offer and a selectable indicia configured to indicate acceptance of the offer in response to actuation of the selectable indicia. A browser is launched on a display coupled to the processor in response to actuation of the selectable indicia. An indication of acceptance of the offer to a transaction server in response to actuation of the selectable indicia is transmitted. | 08-12-2010 |
20100223187 | SYSTEM AND METHOD FOR ELECTRONIC PAYMENT, AND SERVER, COMMUNICATION TERMINAL AND PROGRAM THEREFOR - A secure, inexpensive, convenient payment system which allows an existing communication to be used to make an expensive payment terminal unnecessary, makes local communication unnecessary to make it possible to use the system by a seller and a buyer, uses closed-loop type electronic money to make it possible to make payment on delivery is obtained. An account database | 09-02-2010 |
20100223188 | Online Payment System and Method - An online payment system uses an electronic check system to make a payment to a merchant on behalf of an online customer. The electronic check system receives a check application request of the customer, creates an electronic check number and a password for the check, outputs the check information to the customer, and stores the check information in the electronic check system. When a merchant system receives an online payment request of the customer, it sends the request to the electronic check system, which then parses out a payment electronic check number and a payment check password from the payment request, verifies the parsed information with the stored check the information, and makes a payment to the merchant. The electronic check system is centralized and shared by multiple merchants. A payment only needs access to the electronic check system, without requiring participation of multiple receipt-acquiring systems of individual merchants. | 09-02-2010 |
20100235283 | FINANCIAL TRANSACTIONS USING A COMMUNICATION DEVICE - A computer implemented system provides a method of conducting a financial transaction. The method begins when the system assigns a designator of a value using a preauthorization by a payor. The system associates the payor with an authorized payor telephone identifier. When the system receives a telephone call with the authorized payor telephone identifier at a specified Direct Inward Dial (DID) telephone number associated with a transaction type, the system responds by sending at least one transaction code to the payor. When the system receives the transaction code from the payee, the designator of value is re-asssigned to from the payor to the payee. The system allows the transaction code to be delivered directly from the payor to the payee or sent automatically to the payee. Each DID telephone number represents different transaction types such as Automatic Teller Machine (ATM), Person-To-Person (P2P), merchant transactions, vending transactions and other types of transactions. | 09-16-2010 |
20100235284 | METHOD AND SYSTEMS FOR GENERATING AND USING TOKENS IN A TRANSACTION HANDLING SYSTEM - A method and systems for generating and using transaction tokens including a plurality of interfaces for communication over a network, the plurality of interfaces communicatively coupled to a plurality of information sending devices and a plurality of information receiving devices, at least one database including a token data table and a user profile table, the token data table storing at least one token, the at least one token having a user-defined value and a plurality of data fields, and a business software component communicatively coupled to the plurality of interfaces and the at least one database that is operative to receive at least one request from the plurality of interfaces, generate at least one token in response to the at least one request received from the plurality for interfaces, lock the at least one token generated in response to the received at least one request, and redeem the user-defined value of the locked at least one token. | 09-16-2010 |
20100235285 | GAME THEORETIC PRIORITIZATION SYSTEM AND METHOD - A method for allocation among agents, comprising providing to at least two each having a respective wealth generation function adapted to generate a virtual currency; conducting an auction, having an auction outcome with respect to an auction transaction, in which each respective agent bids an amount of the generated virtual currency; and transferring an amount of the generated virtual currency in accordance with the auction outcome, in consideration of an auction transaction. | 09-16-2010 |
20100241572 | Payment System and Method Using IC Identification Card - A payment system utilizes an IC identification card to identify a user, finds and verifies a bank account of the user. The payment system uses an IC identification card reader to read user identity information which includes a user identification card number. The system encrypts user identity information using a first encryption key and encrypts the user-entered bank account password using a bank encryption key corresponding to a participating bank, and sends the encrypted information to an intermediary platform, which sends a bank transaction request including user identity information, bank account password and transaction amount to the participating bank subsystem. The participating bank subsystem conducts the requested bank transaction with a user bank account, which is determined according to the user identification card number either by the intermediary platform or by the participating bank subsystem based on a mapping relationship between the user identity information and bank accounts. | 09-23-2010 |
20100250442 | METHOD AND SYSTEM FOR SECURING A PAYMENT TRANSACTION WITH A TRUSTED CODE BASE - A mobile payment device | 09-30-2010 |
20100262546 | PAYMENT SERVICE AUTHENTICATION FOR A TRANSACTION USING A GENERATED DYNAMIC VERIFICATION VALUE - Methods and systems for dynamically generating a verification value for a transaction and for utilizing such value to verify the authenticity of the payment service application. The dynamically created verification value may be generated on a payment device, such as an integrated circuit credit card or smart card, embedded into the payment data, and transmitted to a point of sale terminal. Alternatively, payment data is sent by a payment device to a point of sale terminal, which generates a verification value and embeds it into the payment data. The embedded verification value is used by a service provider to verify the authenticity of the transaction. The methods and systems may be used in a contactless (wireless) environment or a non-wireless environment. | 10-14-2010 |
20100280958 | SYSTEM FOR CONTROLLING USER ACCESS TO A SERVICE - The invention concerns a system for controlling user access to a service having a read device ( | 11-04-2010 |
20100332400 | Use of Fingerprint with an On-Line or Networked Payment Authorization System - A method for selectively authorizing a transaction at one or more servers comprises steps for receiving a request to authorize the transaction, receiving machine fingerprint data related to the request to authorize the transaction, saving the machine fingerprint data in a memory, receiving associated payment information related to the request to authorize the transaction, saving the payment information in a memory, retrieving previously stored machine fingerprint data associated with the payment information, comparing the received machine fingerprint data with previously stored machine fingerprint data associated with the payment information, and determining, using the machine fingerprint data, whether to authorize the transaction. | 12-30-2010 |
20110016054 | SIGNATURE BASED NEGATIVE LIST FOR OFF LINE PAYMENT DEVICE VALIDATION - At each of a plurality of transit readers of a transit system, for each of a plurality of riders, where each rider seeks to conduct an access transaction with the transit system for access into the transit facility by using a payment device issued by an issuer in a payment system, data is read from the payment device. The data includes an encryption code that uniquely corresponds to the payment device and was created by the issuer using one or more encryption keys and a predetermined algorithm. A check will be performed, remotely and/or locally, of one or more lists of other encryption codes to determine if the encryption code is on the list. On the basis of whether the encryption code is on the list, the rider is permitted access to the facility of the transit system. The payment device need not be changed for the rider's fare. Decryption of the encryption code read from the payment device is not required to complete the access transaction. | 01-20-2011 |
20110022522 | METHOD AND SYSTEM FOR PROVIDING REAL-TIME ACCESS TO MOBILE COMMERCE PURCHASE CONFIRMATION EVIDENCE - A method and system are provided for providing a real-time access to mobile commerce payment evidence. The method includes receiving and storing evidence that a mobile handset user has confirmed his intention of making a purchase to be billed to his mobile operator account. The method further includes authenticating the confirmation received, and storing evidence of that authentication. Further, the method includes providing at least some of that evidence to at least one of the subscriber, the utility provider, and a provider of the product purchased. | 01-27-2011 |
20110035321 | MULTI-WAY TRANSACTION RELATED DATA EXCHANGE APPARATUS AND METHODS - Methods and apparatus for conducting electronic transactions such as commerce transactions or purchases and exchanging related information. In one aspect, a robust and integrated apparatus and associated method is provided whereby a purchaser can securely provide transaction data and/or information in an electronic format to another party such as a vendor. In one exemplary embodiment, the purchaser can authenticate his or her right to use the billing information contained therein to complete a purchase without actually having to disclose the billing information in a human readable format, thereby enabling the vendor to obtain and authenticate the purchaser's identity and billing information while still protecting the purchaser's privacy, and without requiring disclosure of the purchaser's billing information to the vendor's employees or any other parties. In another aspect, the vendor can provide information about the transaction in an electronic form that can be authenticated and verified for accuracy. | 02-10-2011 |
20110047081 | SECURE REPORTS FOR ELECTRONIC PAYMENT SYSTEMS - A system, device, and method for generating and transmitting secure reports or documents in a retail environment or payment system comprising both secure and unsecure portions, where users of the unsecure portions may require access to sensitive information stored by the secure portions for various purposes, such as reporting, accounting, or reconciliation. | 02-24-2011 |
20110047082 | Remote Electronic Payment System - The invention concerns a remote electronic payment system comprising an authentication device ( | 02-24-2011 |
20110082799 | SYSTEM AND METHOD FOR GENERATING A DATA CONTAINER - A system and method for securely transferring sensitive payment data across a system landscape. The system and method may utilize machine-readable media including program code stored therein executable by one or more processors to perform the transferring of payment data. The transferring of data includes generating and encrypting a data container to combine all sensitive payment data. | 04-07-2011 |
20110082800 | Secure Transaction Systems and Methods - A user request to implement a secure transaction is received and communicated to a web server. Transaction details signed with a secret key are received from the web server and displayed to the user. The user is requested to confirm the secure transaction by providing biometric data. If the user's biometric data is validated, an authentication token is received from a biometric device and the authentication token is communicated to the web server. The web server processes the secure transaction if the authentication token is confirmed as a valid authentication token. | 04-07-2011 |
20110082801 | Secure Transaction Systems and Methods - A transaction request containing transaction details from a requesting device is generated by a web-enabled application executing on the requesting device. A secure signature associated with the transaction details is calculated using a secret key. The transaction details and the secure signature associated with the transaction details are communicated to the requesting device. Confirmation information is received from the requesting device and validated. If the confirmation information is valid, the requested transaction is implemented. | 04-07-2011 |
20110082802 | Secure Financial Transaction Systems and Methods - A user request to implement a secure financial transaction is received and communicated to a web server capable of implementing the transaction. Transaction details signed with a secret key are received from the web server and displayed to the user. The user is requested to confirm the secure financial transaction by providing biometric data. If the user's biometric data is validated, an authentication token is received from a biometric device and the authentication token is communicated to the web server. The web server processes the secure financial transaction if the authentication token is confirmed as a valid authentication token. | 04-07-2011 |
20110093399 | Saloot's online enhanced reciprocation service - Saloot at its core is a money transferring service designed specifically around online voluntary micro payments, aka donations, tips, and other forms of reciprocation. It allows a web browser give amounts as small as a penny towards content they appreciate. Inherent to a voluntary payment is a power by the giver to choose when to give. Saloot.com utilizes this fact to tally these tips rather than attempt transactions at the time of each tip, which eliminates overbearing transaction charge issues for micro payments. Also with the transaction being delayed for a later date these pending tallies can be adjusted up or down, creating a certain impermanence which makes it safe to tip with-out filling in passwords or log-ins at each instance. | 04-21-2011 |
20110153504 | POSTCARD GREETINGS FOR DIRECT MARKETING - A method for customizing direct marketing campaigns, by utilizing relationships within a computer social network and information that is known about the social network members to find the best opportunity to provide an offer for goods and services to potential customers; providing offers for the goods and the services via the computer based upon receiving recommendations from acquaintances of potential customers via the social networks; and sending offers to the potential customers via the computer on behalf of their acquaintance. | 06-23-2011 |
20110161234 | ORDERING SCHEME - An ordering scheme is described, for example an ordering and payment scheme for mobile communication devices. The ordering scheme enables an Internet shop or another service provider to issue binding offers to a mobile communication device or the like and to receive an acceptance of the offer from the mobile device. The acceptance is encrypted using a private key of mobile device and the offer may be encrypted using a private key of the service provider. The service provider liaises with a payment broker and a charging system for controlling the transfer of funds from the user to the service provider. An identity management system may be provided to control access to the modules of the ordering scheme. | 06-30-2011 |
20110161235 | SYSTEM AND METHOD FOR SECURING RF TRANSACTIONS USING A RADIO FREQUENCY IDENTIFICATION DEVICE INCLUDING A RANDOM NUMBER GENERATOR - A system and method for securing a Radio Frequency (RF) transaction using a RF identification device (RFID) transaction device is provided. The method includes a RFID transaction device including a random number generator for generating a random number. The random number may be used by an account issuer to verify the validity of a RFID transaction device or RFID reader communicating on the RF transactions network. The authorizing agent may receive the random number and compare the random number to a device validating code. | 06-30-2011 |
20110208658 | Multifactor Authentication Using A Directory Server - A method and a server computer are provided for authenticating a cardholder account. The server computer implements the method, which includes obtaining a first identifier and a cryptogram from a first entity, identifying an issuer associated with the cardholder account, forwarding the first account identifier and the cryptogram to a second entity for validation, receiving a second identifier from the second entity, and sending the second identifier to the first entity. The first identifier can be associated with the cardholder account. The second identifier can be generated by the second entity and associated with a validated form of the first identifier. | 08-25-2011 |
20110225092 | Secure Transaction Execution - A method and system for executing a transaction is described. A payment obligation for a transaction is issued including a transaction value and details of goods and/or services to be provided by a seller following the transaction. An acceptance of the payment obligation is received from the buyer. A determination may be made regarding whether there is sufficient insured credit issued by an insurer for the buyer to cover the transaction value. A funder may be instructed to pay seller funds covering the transaction value following the buyer's acceptance of the payment obligation. A payment to reimburse the funder such that the transaction is executed may be received from the buyer. | 09-15-2011 |
20110225093 | Depository-Based Security Trading System - A system for protecting individuals (including institutions) involved in securities transactions has been created that utilizes an “independent” depository as an intermediary between a security owner and a brokerage firm. The inclusion of a depository is considered to protect the security owner from untoward actions on the part of the brokerage firm. The depository is used to “hold” the securities behalf of the owner. The security owners and brokerage firms must be registered with the depository and maintain accounts with the depository. All transactions involving the securities are still performed by the broker, but the requests are transmitted from the security owner to the depository, and the depository then relays messages regarding the transactions to the broker. Thus, the securities are only in the possession of the broker on a transaction-by-transaction basis. | 09-15-2011 |
20110225094 | SYSTEM AND METHOD INCLUDING DYNAMIC VERIFICATION VALUE - System and methods for generating a dynamic verification value for electronic payment transactions are disclosed. An account identifier and an account attribute associated with an account of a user are received at a server computer. A dynamic account attribute is created and concatenated with the account identifier. The concatenated account identifier and the dynamic account attribute are then used to generate a dynamic verification value. The dynamic verification value and the dynamic account attribute are then sent to a user communication device and used for authentication in a payment transaction. | 09-15-2011 |
20110246372 | SYSTEM AND METHOD FOR POINT-TO-POINT ENCRYPTION WITH ADJUNCT TERMINAL - A system for point-to-point encryption is provided. A card reader system reads unencrypted card data stored on a magnetic stripe of a card and encrypts the card data, the card reader system being contained in a first housing. A point of sale device coupled to the card reader system and contained in a second housing separate from the first housing has a user interface for obtaining a transaction amount. A transaction request system transmits the transaction amount and the encrypted card data to an authorization gateway, wherein the unencrypted card data is prevented from being processed by the point of sale device. | 10-06-2011 |
20110246373 | PAYMENT MANAGEMENT ON MOBILE DEVICES - Embodiments of techniques and systems for asynchronous offline bill review and payment are described. A bill payment management module, operated on a manageability engine on a mobile device, communicates with an online bill payment service. The bill payment management module may receive information about bill payments, including bills which are due, and presents selective information to a bill payment client application. A bill payer can then access the information on the mobile device through the bill payment client application and review or change the payment amounts. The review and the modifications may be performed when the mobile device is offline and the modifications may be stored until a later time when the mobile device can connect to a network. Once a network is available, the bill payment management module may send payment instructions to the online bill payment service. Other embodiments may be described and claimed. | 10-06-2011 |
20110258123 | DEVICES, SYSTEMS, AND METHODS FOR TOKENIZING SENSITIVE INFORMATION - Devices, systems, and methods for tokenizing sensitive information are provided herein. Methods may include the steps of receiving sensitive information via an input device, the input device being communicatively coupled to a transaction terminal, tokenizing the sensitive information at the input device to generate a token, and associating the token and the sensitive information together in a storage medium associated with the input device. | 10-20-2011 |
20110270764 | METHOD AND A SYTEM FOR ELECTRONIC TRANSACTION USING POINT OF SALES (POS) DEVICE - The various embodiments herein provide a method and system for providing electronic transaction on a Near-Sound Communication Point-of-Sale (NSC_POS) device through a cell phone of a payer. The method comprises of dialling a central server number by a payer through a registered cell phone, arranging the cell phone in the vicinity of the NSC_POS device, broadcasting a sound signal by the central server to the NSC_POS device through the speaker of the cell phone, receiving the sound signal by the microphone of the NSC_POS device, transmitting the received sound signal back to the central server in an encrypted form through the microphone of the cell phone, decoding the received sound signal by the central server. The central server transfers the required amount from the payer's mobile virtual account to a virtual account associated with the NSC_POS device based on information provided in the sound signal. | 11-03-2011 |
20110276496 | SECURE PROTOCOL FOR TRANSACTIONS - A secure protocol for transactions, such as electronic commerce transactions, is described that provides improved security through exploiting an independent (where this independence is logical and/or physical) communication path (e.g., between a customer and a back-end financial institution), ensuring that key financial information remains within the back-end financial institutions themselves. Hence, this protocol directly reduces cyber-crime risks through improvements to transaction security. In addition, various implementations of the secure protocol provide non-repudiation for one or more of the entities involved in the transaction. | 11-10-2011 |
20110302089 | ELECTRONIC CREDIT CARD WITH FRAUD PROTECTION - A method for verifying permission to use a payment system such as an electronic credit card, using a hand held communication device such as a smart phone, where the customer presents the communication device to a merchant who extracts account information from the hand held device, and the merchant sends a request for identification verification information to be sent to the hand held communication device directly or to an alternate display. The verification information can be in the form of a photograph, fingerprint, or the like. The merchant can then compare the identification verification data to the customer to determine if the customer is authorized to used the account according to the request. | 12-08-2011 |
20110307390 | SECURE AND RECOVERABLE DATABASE FOR ON-LINE VALUE-BEARING ITEM SYSTEM - An on-line value bearing item (VBI) printing system that includes one or more cryptographic modules and a secure database is disclosed. The secure database includes account balances and other information for all of the on-line value-bearing item system customers and is capable of preventing access by unauthorized users. Also, a secure communication network is in operation to prevent unauthorized access to the users' data stored in the database. | 12-15-2011 |
20120011071 | Remote invoice and negotiable instrument processing - A method of creating an electronic invoice is provided. A mobile application is downloaded to an operating system of a wireless electronic communication device. The mobile application is capable of processing a point of sale type operation. The operating system captures information required for invoice/receipt and payment. The invoice/receipt information is created and outputted for import into an accounting system. The payment information is created and outputted for import into a payment processing system. The invoice/receipt information is created and outputted for the customer. Upon receipt of a payment, the payment is processed. | 01-12-2012 |
20120023025 | SECURE DONATION SYSTEM AND ITS METHOD - A secure donation system is connectible to information processing device of donor, donee, and specific store via network. The system includes: a database for storing donation intention data of donor, requirement data of donee, and merchandise and/or service transaction data of specific store; a resource allocation module for generating donee data meeting donation intention data by analyzing and matching donation intention data with requirement data; a donation module for donor to choose donee from donee data meeting donation intention data generated by resource allocation module and for generating donation usage certificate after confirming donation data including donation intention data and donee data; and an authorization module for transmitting donation usage certificate to electronic device of chosen donee, so as for donee to perform verification and shopping in specific store via electronic device. Besides, a secure donation method having mechanisms of requirement matching and postpaid is also provided. | 01-26-2012 |
20120023026 | MOBILE WALLET AND DIGITAL PAYMENT - The claimed subject matter provides a system and/or a method that facilitates securing a wireless digital transaction. A terminal component can receive a portion of data related to a payment for at least one of a good or a service. A mobile device can include at least one mobile payment card (m-card), wherein the m-card is created by establishing a link to an account associated with a form of currency. The mobile device can employ public-key cryptography (PKC) to securely and wirelessly transmit a payment to the terminal component utilizing the m-card and linked account. | 01-26-2012 |
20120036076 | PREPAID DISTRIBUTION APPLICATION AND DEVICE - A method comprising includes receiving an encrypted over-the-air message from a mobile wireless device requesting that the balance of a merchant's prepayment account for a distributor be reloaded by a requested amount, where the mobile wireless device stores the balance in a secure element holding data encrypted by a key, authorizing a reload of the merchant's prepayment account for the distributor, transmitting an encrypted over-the-air message to the mobile wireless device to enable the mobile wireless device to increase the balance of the merchant's prepayment account for the distributor by the requested amount where the wireless mobile device is able to display the balance of the merchant's prepayment account for the distributor, notifying the distributor that the balance of the merchant's prepayment account for the distributor has been increased by the requested amount so that the distributor can authorize an unscheduled delivery to the merchant, transmitting an over-the-air message including an encrypted version of the key to a reader device used by delivery personnel acting on behalf of the distributor so that the reader device can access the secure element of the mobile wireless device using offline near field communication to alter the balance of the merchant's prepayment account for the distributor, receiving a settlement over-the-air message from a reader device indicating an amount to be deleted from the balance of the merchant's prepayment account for the distributor that reflects the cost of merchandise delivered by delivery personnel on behalf of the distributor, where the distributor has decrypted the received encrypted key and accessed the secure element of the mobile wireless device to decrease the balance of the merchant's prepayment account for the distributor stored in the secure element by the cost of merchandise delivered. | 02-09-2012 |
20120041882 | METHOD OF AND COMPUTER PROGRAMME FOR CHANGING AN IDENTIFICATION CODE OF A TRANSACTION AUTHORISATION MEDIUM - The present invention relates to a method of changing an identification code of a transaction authorisation medium, wherein the transaction authorisation medium is designed for authorising transactions of a credit parameter. The identification code is registered by the transaction authorisation medium and by a management server. The transaction authorisation medium is operatively connected to a terminal for changing the identification code, and the terminal is operatively and communicatively connected to the management server via a public telecommunication network. The method comprises the steps of: initiating a transaction; storing the changed identification code in the transaction authorisation medium; and transmitting a changed identification code in encrypted form to the management server via the telecommunication network for carrying out the transaction. | 02-16-2012 |
20120078800 | METHOD FOR SECURE TRANSACTIONS - The present invention relates to a method for a secure transaction wherein a buying part of the secure transaction utilizes a portable radio communication device ( | 03-29-2012 |
20120089521 | METHOD AND APPARATUS FOR BILLING PURCHASES FROM A MOBILE PHONE APPLICATION - A method and apparatus is provided for mobile communication device application user to purchase content or functionality for the application while in the midst of using it and without interrupting his user experience. In an embodiment, the user's mobile carrier subscriber account is billed directly for the purchase. The method includes receiving a request for the purchase from the communication device application, where the request includes information about the amount of the purchase. Further, the method includes sending a confirmation request to the communication device. On receiving the confirmation, authenticating the communication device at the public mobile operator network of the communication device. Finally, the method includes providing access to the purchased content or functionality on or in conjunction with the communication device. | 04-12-2012 |
20120109830 | APPARATUS, SYSTEM AND METHOD FOR A DECENTRALIZED SOCIAL NETWORK SYSTEM AND DECENTRALIZED PAYMENT NETWORK SYSTEM - In the context of social networks, a social network based peer computing system, apparatus and method for a decentralized social network system and decentralized payment system in a peer to peer network environment. Two one way relationships involving a public key/private key pair allow two users of the system to establish a secure online relationship where an object can be sent securely from one user to a second user. A user having more than one device connected to the system can have information updated on one device auto migrate and replicate on remaining connected devices. This same user can also have this updated information auto migrated and replicated onto friend's devices connected to the system. A user may also establish a privacy profile wherein only certain information is auto migrated and replicated on friend's devices. | 05-03-2012 |
20120130905 | TRANSACTION VERIFICATION ON RFID ENABLED PAYMENT AND TRANSACTION INSTRUMENTS - A display enabled RFID tag (DERT) receives transaction details from the reader. DERT verifies that the details match their counterparts in the reader public key certificate. The process is aborted in case of a mismatch. DERT extracts and displays user-verifiable data. It then enters a countdown stage that lasts for a predetermined duration. A user observes the transaction information and, if the transaction amount and other details are deemed correct, presses an accept button provided on the DERT before the timer runs out. DERT signs the time-stamped transaction statement and sends it to the reader. This signed statement is then sent to the payment gateway and eventually to the financial institution that issued the payment DERT. | 05-24-2012 |
20120136799 | SYSTEM AND METHOD FOR SELECTION OF AIRLINE SEATS AND PAYMENT VERIFICATION - This invention relates to an electronic means by which people can select the exact seat or seats they want for any type of event or reserve an appointment for any activity. More specifically, a customer or a ticket re-seller or a venue operator can go, for example, to the internet and select the event or activity for which he wants a ticket or tickets or reserve a time and reserve and order the exact seat or seats or the time of his choosing directly online. The seat or seats or reserved time he selects is then paid for using payment information that is verified with a payment verification server. | 05-31-2012 |
20120143772 | Secure Distributed Single Action Payment Authorization System - Methods and systems for enabling and performing secured, single action payments from a mobile device are disclosed. One method includes transmitting user credentials from an application installed on a mobile device to a server alongside a device identifier. The method includes receiving data at least partially defining encrypted personal payment information and saving the encrypted personal payment information in a memory of the mobile device in association with the application. At least prior to receiving a user request to make a payment via the application, the mobile device lacks a decryption key capable of decrypting the encrypted personal payment information. | 06-07-2012 |
20120158595 | OPERATOR EXTERNAL SERVICE PROVISIONING AND CHARGING - Presented is a system and methods for allowing a user, through their end user device, to online purchase a service from a service provider and provide online payment for the service from the operator network associated with the end user device. The service provider and the operator network can authenticate each other through encrypted data appended to HTTP communications associated with interacting on the internet. | 06-21-2012 |
20120166344 | SECURE WIRELESS PAYMENT SYSTEM AND METHOD THEREOF - A secure wireless payment system and method thereof allow a consumer to acquire transaction information generated by a payment requesting unit of a seller with a handheld payment responding unit. The payment responding unit has a storage unit embedded with payment authentication data. After the consumer confirms that the transaction information is correct, a payment request is generated and transmitted to a banking unit releasing the payment authentication data through a secure wireless voice channel so that the banking unit can directly approve to pay. Accordingly, consumers need not present credit cards for sellers to charge and fully eliminate the risk of credit card piracy. Additionally, the payment responding unit of the present invention can be automatically connected with the banking unit releasing the payment authentication data for payment of a transaction. | 06-28-2012 |
20120185398 | MOBILE PAYMENT SYSTEM WITH TWO-POINT AUTHENTICATION - A transaction processing system uses a mobile phone to make payments at point of sale (POS), over the internet, and over the phone, and also to make money transfers. Transaction security is provided by using various combinations of authentication using the mobile phone. Account numbers linked to payment cards, and public/private keys that encrypt/decrypt customer data, dynamically change on mobile phone and a server, based on a specified number of transactions or time interval. No credit/debit account information is shown on mobile phones. GPS location and time stamps facilitate identification of unusual shopping patterns during internet and over-the-phone transactions. Customers can remotely delete data on mobile phone in case of loss. Three-level security used at POS combines industry-standard encryption; dynamically-changing account numbers and keys; and visual identification of customer, followed by software signature recognition. | 07-19-2012 |
20120191615 | Secure Credit Transactions - A system and method for engaging in a credit or debit transaction do not transmit an individual's account number to a vendor or merchant. The individual provides the account number to a transaction acquiring device (TAD). The TAD requires the individual to provide one or more pseudo-random numbers that identify the individual. These numbers are only obtainable from an authentication device that can be unlocked only by passing an authentication challenge. The TAD then provides transaction data to a credit or debit issuer and the vendor, but does not provide or store the account number. The issuer provides the merchant with an identifier other than the account number that is nevertheless unique to the individual. This identifier may be used to track the individual's purchase history or perform other business functions. | 07-26-2012 |
20120197808 | METHOD OF USING PERSONAL DEVICE WITH INTERNAL BIOMETRIC IN CONDUCTING TRANSACTIONS OVER A NETWORK - A method of authorizing a commercial transaction between a customer and a provider of goods or services over a network, wherein the provider of goods or services requests that the customer provide authentication by activating a fingerprint identification device, and the provider of goods or services receives at least an authentication code of the customer over the network from the fingerprint identification device, the method comprising the steps of: providing the customer with the fingerprint identification device which produces the authentication code when a fingerprint of the customer matches a stored fingerprint within the fingerprint identification device; receiving at least the authentication code from the provider of goods or services over the network; and authorizing the transaction if at least the authentication code is valid. | 08-02-2012 |
20120209778 | MEDIATION SYSTEM AND METHOD FOR RESTRICTED ACCESS ITEM DISTRIBUTION - Mediation systems and methods for restricted access item distribution are disclosed. In an embodiment, a method for facilitating payment from a user device for a restricted access item hosted by a host system is disclosed. In another embodiment, a system for facilitating payment from a user device to for a restricted access item hosted by a host system is disclosed. In another embodiment, a method for providing a mediated marketplace service is disclosed. | 08-16-2012 |
20120215701 | FLEXIBLE MONETIZATION SERVICE APPARATUSES, METHODS AND SYSTEMS - The FLEXIBLE MONETIZATION SERVICE APPARATUSES, METHODS AND SYSTEMS (“FMS”) transform requests for on-demand and flexible monetization and related services via FMS components into currency transfers, purchase receipt notifications, social networking communications and transaction analytics reports. In some embodiments, the FMS obtains a request from a computing device of a merchant to process a user purchase checkout by a user from a point of sale device. In some embodiments, the request may include a merchant identifier. The FMS may determine that the merchant is authorized to obtain servicing of the request to process the user purchase checkout, by querying a database using the merchant identifier. The FMS may generating a user interface customized to the merchant and the point of sale device, upon determining that the merchant is authorized to obtain the service of the request, and provide the customized user interface to process the user purchase checkout by the user. | 08-23-2012 |
20120239580 | VIRTUAL ACCOUNT BASED NEW DIGITAL CASH PROTOCOLS - Virtual account based digital cash protocols employ two pairs of private and public keys. Each public key is certified separately and the protocols do not use any blind signature schemes. As a result, the virtual account based digital cash protocols provide strong protection of the user privacy by using two certified public keys instead of a blind signature. One pair of certified keys consists of one master user private key and one master user public key. A second pair of certified keys consists of one pseudonym user private key and one pseudonym user public key. The use of a master key pair and a pseudonym key pair circumvents the need for blind signatures. As a result, the proposed protocols do not require blind signatures and do not add additional overhead and security requirements necessitated by conventional blind signature schemes. The protocols use public key protocols, digital signatures and symmetric key protocols, which may be readily implemented in standard information security based systems based on cryptographic constructs. In addition, the protocols may be deployed in mobile, off-line, and on-line settings. | 09-20-2012 |
20120265690 | METHODS AND APPARATUS FOR CONDUCTING ELECTRONIC TRANSACTIONS - A system and method for conducting electronic commerce are disclosed. In various embodiments, the electronic transaction is a purchase transaction. A user is provided with an intelligent token, such as a smartcard containing a digital certificate. The intelligent token suitably authenticates with a server on a network that conducts all or portions of the transaction on behalf of the user. In various embodiments a wallet server interacts with a security server to provide enhanced reliability and confidence in the transaction. In various embodiments, the wallet server includes a toolbar. In various embodiments, the digital wallet pre-fills forms. Forms may be pre-filled using an auto-remember component. | 10-18-2012 |
20120296831 | TRANSACTIONAL SECURITY OVER A NETWORK - A system and method facilitating purchase transactions over a computer network, including the purchase of electronically storable items. The embodiments herein encrypt “customer identifier string” in an encryption stream and cause the encryption stream to be transferred from the customer to a merchant in the purchase transaction. A verification entity receives the encryption stream which is sent by the merchant for identity verification and payment authorization. Then, the verification entity verifies the identifiers contained in the encryption stream and transfers an identity verification and payment authorization from the verification entity to the merchant. | 11-22-2012 |
20120317036 | PAYMENT CARD PROCESSING SYSTEM WITH STRUCTURE PRESERVING ENCRYPTION - A customer may provide a merchant with primary account number information in connection with a purchase transaction. The merchant may send an associated authorization request to a payment card processor. A tokenization server at the payment card processor may generate a token corresponding to the primary account number. To secure the token, the token may be encrypted at the payment card processor using a cryptographic key shared with the merchant. A structure preserving encryption algorithm may be used in encrypting the token. A processor identifier may be embedded in the encrypted version of the token during the structure preserving encryption operation. The merchant can use the shared key to decrypt the token and extract the processor identifier. A settlement request may be directed to the processor from the merchant to settle the transaction using the processor identifier. | 12-13-2012 |
20120317037 | Methods for Providing Secure Transactions - Methods in which an encrypted transaction validation code is received which positively identifies a first transaction for a first entity, the first entity having a first entity identifier, and the first transaction is electronically verified as being valid by use of the first entity identifier and the validation code. The first entity identifier can be transferred as an account number and the validation code transferred to the money source in a non-account data field. A money source can validate the validation code by duplicating the encryption process used to create the validation code and by then comparing the result to the validation code received. The validation code can be, at least in part, encrypted, and a money source can validate the validation code by duplicating a validation code encryption process and by then comparing the result to the validation code received. | 12-13-2012 |
20120330846 | DYNAMIC ELECTRONIC MONEY - The invention concerns a method of making an electronic payment by an electronic payment device comprising: transmitting from said electronic payment device ( | 12-27-2012 |
20130006872 | NEAR-FIELD COMMUNICATION BASED PAYMENT METHODS - A method of performing a payment transaction is provided. Transaction information is received from a payee, which has been provided to the payee by a payor using near-field communications and includes a payment amount and payee account information. A transaction authentication request is sent to the payor, and, after a transaction authentication is received from the payor, the payment amount is sent to the payee. After the payment has been completed, a payment confirmation is sent to the payor. A method for processing a payment transaction using a generated remittance key is also provided. The remittance key, which includes an encrypted alphanumeric key having a payment amount and payment provider account information for a payor, is generated and transmitted to a payee who, in turn, transmits the remittance key to a remittance agent. The remittance agent transmits the remittance key and a payment request to a payment provider who processes the request and transmits a payment to the payee. | 01-03-2013 |
20130013516 | SOCIAL NETWORK FINANCIAL PORTAL - A financial portal is provided which allows the transfer of funds between “friends” within a social network application. | 01-10-2013 |
20130018800 | Secure Authorization of a Financial Transaction - Embodiments herein include a method implemented by a client device used by a consumer to securely conduct a financial transaction. The method includes generating a unique message digest by applying a cryptographic hash function to payment information uniquely associated with the consumer. The method also entails encrypting the unique message digest using a public key of a public-private key pair uniquely issued to the consumer, to obtain an encrypted digest. Finally, the method includes encrypting the encrypted digest and an index value using a symmetric key, to generate a card number to be sent to an authorization server for authorization of the financial transaction. This index value maps at the authorization server to the private key of the public-private key pair and to the payment information. | 01-17-2013 |
20130031007 | LATENCY LOCATOR - A method for capturing data packets sent on a network for evaluating response time performance, the network including a financial institution and a partner bank. The method includes associating a captured data packet sent to the partner bank with a captured data packet received from the partner bank, by comparing at least one coded field of a data portion of the captured data packet sent to the partner bank with at least one coded field of a captured data portion of the data packet received from the partner bank. The method also includes measuring a response time of the associated data packet received from the partner bank, relative to a transmission time of the captured data packet sent to the partner bank. | 01-31-2013 |
20130060708 | USER VERIFICATION FOR ELECTRONIC MONEY TRANSFERS - Techniques for efficient transfer of funds between parties using personal communication devices are presented. A sender can use a first communication device to transfer funds from an account associated with the sender to a recipient via a communication address associated with the recipient's second communication device even if the recipient is not registered with a financial service provider associated with the account of the sender, without requiring the recipient to travel to a physical office or present a physical personal identification to obtain the funds. A transfer fund request can include the recipient's communication address, and a fund transfer message, comprising a link that facilitates retrieving the funds, can be sent to the recipient's communication address, and the recipient can be validated based on the communication address and/or a validation code. When validated, the funds can be made available to the recipient via an account of the recipient. | 03-07-2013 |
20130066788 | END-TO-END SECURE PAYMENT PROCESSES - Systems and method for performing secure electronic payment transactions to allow merchants to perform payment processing such that the merchant payment system is not required to store data specific to a particular payment device. | 03-14-2013 |
20130073468 | SYSTEM AND METHOD OF ASSOCIATING AN ARTICLE DISPENSING MACHINE ACCOUNT WITH A CONTENT PROVIDER ACCOUNT - A method of associating a first customer account for an article dispensing machine with a second customer account at a content provider. The article dispensing machine has a user interface. The method receives a unique customer identifier through the user interface, accesses the first customer account based on the unique customer identifier, and associates the second customer account at the content provider with the first customer account. The second customer account can include a customer subscription with access permission for a digital media selection at the content provider. In addition, the unique customer identifier can include at least one of a credit card number or a debit card number, and the method can apply a hash function to at least one of the credit card number or the debit card number to produce at least one of a hashed credit card number or a hashed debit card number. | 03-21-2013 |
20130080333 | ELECTRONIC WALLET USING ALLOCATION OF FUNDS - A user may instruct a host to transmit an allocation of electronic money to the user's mobile electronic device from a user's payment account managed by the host. The allocation may include credentials, authentication key(s), a signature, a limited amount of funds, and/or other types of payment information. The allocation may be limited to the amount of funds that, when exhausted or expired, prevents further payments using the mobile electronic device. The user may reload the mobile electronic device with electronic money by reconnecting to the host via the secure channel. The user may spend the allocation using the electronic device with use of minimal or no user-based security measures (e.g., passwords, biometrics, etc.), thereby making it quick and easy to make payments with the electronic money. | 03-28-2013 |
20130110728 | TECHNIQUES FOR AUTOMATED TRANSACTIONS | 05-02-2013 |
20130124425 | System and Method for In-Band Transaction Verification - Various embodiments of a system and method for in-band transaction verification are described. The system and method for in-band transaction verification may include a transaction verification component. The transaction verification component may be configured to provide a transaction confirmation request that includes one or more machine readable resistant security media objects to indicate one or more transaction details for a transaction as well as a confirmation code for confirming the transaction. The transaction verification component may also be configured to receive a response to the confirmation request, such as a response from the user that submitted the transaction request. If the response includes a response code that is the same as the confirmation code, the transaction verification component may complete the transaction. If the response includes a response code that is different than the confirmation code, the transaction verification component may abort the transaction. | 05-16-2013 |
20130151419 | Merchant Verification of In-person Electronic Transactions - Validation data, such as an image selected by a merchant, is rendered on a mobile device of a customer to provide the merchant confirmation that payment for an item submitted through the mobile device of the customer was in fact received by the merchant. The merchant may establish an account on a network-accessible computing device (e.g., in the “cloud”) that includes the validation data. The customer authorizes payment to the merchant from the mobile device using the network connectivity of the mobile device. When the payment is received by the merchant, the network-accessible computing device sends the validation data to the customer's mobile device. The merchant may be confident that he or she has in fact received an electronic payment from the customer when the validation data is presented on the mobile device. Techniques to prevent reuse and copying of the validation data are also discussed. | 06-13-2013 |
20140006290 | METHOD FOR AUTHENTICATING FIRST COMMUNICATION EQUIPMENT BY MEANS OF SECOND COMMUNICATION EQUIPMENT | 01-02-2014 |
20140019367 | METHOD TO SEND PAYMENT DATA THROUGH VARIOUS AIR INTERFACES WITHOUT COMPROMISING USER DATA - A commercial transaction method is disclosed. The method first establishes a secure link over a first air interface by a purchasing device. This secure link is between the purchasing device and a point of sale device. The method further identifies a second air interface, which is different from the first air interface, and the second air interface is used to conduct a secure commercial transaction. | 01-16-2014 |
20140067692 | Authenticating Parcel Consignees with Indicia Decoding Devices - In general, techniques are described for authenticating a parcel consignee. A device including an imaging module, processors, and an output module may implement the techniques. The imaging module images a first indicia of a parcel and a second indicia that is separate from the first parcel to obtain representations of the first and second indicia. The processors process the representations of the first and second indicia to determine a first key specified by the first indicia and a second key specified by the second indicia. The processors also determine whether the second key corresponds with the first key, and authenticate a consignee that provided the second indicia as an authorized recipient of the parcel based on the determination of whether the second key corresponds with the first key. The output module then indicates whether the one or more processors authenticate the consignee as the authorized recipient of the parcel. | 03-06-2014 |
20140180931 | System and Method for Secure Wi-Fi- Based Payments Using Mobile Communication Devices - A secure mobile payment method provides a customer with full functionality of a mobile communication device while operating in conjunction with security protocols for internet communication, such as TLS/SSL, and uses a digital signature to provide message integrity and sender verification. The method further employs a public-private key, where the sender hashes a message with a cryptographic hash and signs the hash with a private key, and a recipient uses the sender's public key to decrypt the hash value. | 06-26-2014 |
20140222690 | VERIFICATION OF A PERSON IDENTIFIER RECEIVED ONLINE - A system and method for verification of a person identifier received online is described. The method includes receiving a request for verifying a person identifier (PI1); and estimating whether (a) PI1 identifies the same person as another person identifier (PI2), (b) sender of PI1 is the same person as sender of PI2, and (c) PI2 identifies the sender of PI2. | 08-07-2014 |
20140222691 | SYSTEM AND METHOD FOR FORMLESS, SELF-SERVICE REGISTRATION FOR ACCESS TO FINANCIAL SERVICES - A system for enabling users to register to use external financial services comprises a central office comprising an operating platform including a communication interface and a user database having a plurality of records for individual users; wherein the central office communicates via the communication interface with a plurality of remote formless, self-service registration stations; whereby a registration station scans an identification card with a card scanner, photographs the user to create a verification image and records a biometric parameter unique to the user, whereupon the registration station transmits an image of the identification card, the biometric parameter and the verification image to the central office; wherein the operating platform translates text from the identification card and creates a record for the user and wherein the operating platform uses the translated text to populate fields in the user record and retrieves and displays the record to an administrator for review. | 08-07-2014 |
20140236842 | PAYMENT SYSTEM - A method of making a payment in which payment data is received by a user's terminal from a point-of-sale terminal, a secret of a payment application is received by the terminal from the operator's server system, a trust card is activated in the user's terminal by utilizing said secret of the payment application, and data of the trust card is transmitted from the user's terminal to the point-of-sale terminal for making the payment transaction. A trust card is created in the server system, data of the trust card is transmitted to the terminal to be used for making the payment transaction, the secret of the payment application is formed in the server system, and access to the secret of the payment application is provided to the terminal for activating the trust card for making the payment transaction. | 08-21-2014 |
20140244515 | SYSTEMS AND METHODS FOR FACILITATING SECURE ACCESS - Various embodiments are directed to methods for generating proxy account data for a financial account and authorizing payment from an account of a customer based on proxy account data. Example methods may comprise selecting a serial number for a first customer and storing an association between the serial number and an account of the first customer. The methods may further comprise encrypting the serial number and consolidating the encrypted serial number with checkable data. An association between the encrypted serial number and the checkable data may be stored and the consolidated encrypted serial number and checkable data may be encrypted to generate proxy account data. | 08-28-2014 |
20140258134 | METHOD OF GENERATING ONE-TIME CODE - Provided is a method of generating one-time code that can enable credit payment with improved security to be carried out by enabling one-time code to be generated in a such a way that the one-time code issued to a payment device cannot be inferred or expected by other persons. The method of generating one-time code, which is performed by a card company server providing one-time codes to payment devices when one-time codes are requested by the payment devices, the method, comprising steps of: allocating the payment devices to an index table according to an order of one-time codes being requested when the one-time codes are requested from the payment devices; obtaining digit strings from a one-time code table having one-time codes using target addresses non-sequentially provided in an index table; and generating the one-time codes including the digit strings and a Bank Identification Number (BIN) in a published state. | 09-11-2014 |
20140258135 | PAYMENT METHOD USING ONE-TIME CARD INFORMATION - Provided is a payment method using one-time information, which is performed by a payment system network-connected to a relay server and a payment device and having actual card information, the method including: receiving a payment schedule message from the payment device; publishing a Bank Information Number in response to the payment schedule message, generating one-time card information not including the actual card information, and providing the generated one-time card information to the payment device; judging validity of a message for approval request transmitted from the relay server according to whether or not a difference between a first time when the one-time card information is returned through the relay sever and a second time when the one-time card information is provided to the payment device satisfies a predetermined reference time; and determining whether or not the message for approval request is approved according to a judgment result of the validity. | 09-11-2014 |
20140316994 | ELECTRONIC TRANSACTION METHOD - The invention relates to an electronic method for approving a transaction, to a corresponding transaction system, to a transaction application for carrying out the method, to a mobile terminal having such a transaction application, and to a payment system comprising the transaction system in order to execute the transaction. In this manner, an electronic method is made available that is easy to handle and that can be used to approve a transaction within the scope of a business transaction between buyers and sellers, that can be used virtually without limitations in terms of location, that requires a minimum of already available technical infrastructure, and that is nevertheless secure for all parties involved. For this purpose, the mobile terminal has to have a display element, it has to be suitable to establish a wireless data connection with the transaction server, and it has to have application and e-mail capabilities. | 10-23-2014 |
20140337239 | METHOD AND SYSTEM FOR OBTAINING OFFERS FROM SELLERS USING PRIVACY-PRESERVING VERIFIABLE STATEMENTS - A system and methods that preserve the privacy of personal information of consumers as they seek to take advantage of offers advertised by sellers is provided. A seller can advertise services or benefits with some criteria prospective consumers must satisfy to qualify for such services or benefits. A consumer can make a statement that shows that he or she satisfies the criteria. The requesting party is able to verify the correctness of the statement without being able to learn any additional information about the value of the attributes contained in the statement, other than the information directly implied by the statement. A consumer can be enrolled for the benefit or service after a statement has been successfully verified. | 11-13-2014 |
20140358795 | SECURE PAYMENT CAPTURE PROCESSES - Methods and processes for securely capturing payment device information and conveying the securely captured payment device information to a client application on a merchant's client device in a manner that does not require that the payment device information to be displayed to the merchant. The client application generates and submits a payment authorization request to a payment authorization service in a manner that does not require the payment information to be displayed to the merchant. The merchant receives a status of the payment authorization request as approved, denied, or process failure. Payment capture can be made before an active connection is made with the merchant's client device, or can occur in real-time. | 12-04-2014 |
20140372322 | REGISTERED TOKENS FOR SECURE TRANSACTION MANAGEMENT - Methods, systems, and devices for secure transaction management are provided. Embodiments include a method for providing secure transactions that include receiving an identifier of a financial account at a payment processor system. A token may be generated that is linked with the identifier of the financial account at the payment processor system. The identifier of the financial account and the token may be stored securely at the payment processor system. The token may be transmitted without the identifier of the financial account to at least a recipient system or a recipient device where the token replaces the identifier of the financial account. | 12-18-2014 |
20150073998 | Use of a Biometric Image in Online Commerce - An online store can transmit an online account token to an electronic device or to a biometric sensing device after a user successfully enters his or her account password. The electronic device or the biometric sensing device can countersign the online account token when the one or more biometric images match reference biometric images and the account password matches user identifier data stored in the electronic device or in the biometric sensing device. The countersigned online account token can then be transmitted to the online store. The user can then make one or more purchases after the online store receives the countersigned online account token. | 03-12-2015 |
20150095242 | MULTI-WAY TRANSACTION RELATED DATA EXCHANGE APPARATUS AND METHODS - Methods and apparatus for conducting electronic transactions such as commerce transactions or purchases and exchanging related information. In one aspect, a robust and integrated apparatus and associated method is provided whereby a purchaser can securely provide transaction data and/or information in an electronic format to another party such as a vendor. In one exemplary embodiment, the purchaser can authenticate his or her right to use the billing information contained therein to complete a purchase without actually having to disclose the billing information in a human readable format, thereby enabling the vendor to obtain and authenticate the purchaser's identity and billing information while still protecting the purchaser's privacy, and without requiring disclosure of the purchaser's billing information to the vendor's employees or any other parties. In another aspect, the vendor can provide information about the transaction in an electronic form that can be authenticated and verified for accuracy. | 04-02-2015 |
20150112873 | MANAGEMENT OF BUSINESS - First business process data obtained from a first trading participant includes a set of transaction messages having a first data format in accordance with a first protocol for conducting business transactions used by the first trading participant. A virtual trading participant receives fictitious business process data from the first trading participant and acknowledging the fictitious business process data and replying to the first trading participant that the fictitious business process data has been acknowledged. Operational characteristics and a connectivity of a currently trading participant connected to a process management platform accessible via an interconnection fabric are tested, by utilizing the virtual trading participant to determine if the data defining individual business processes is in a uniform format understood by a process management platform. The virtual trading participant is utilized to ensure compatibility with an identified version of the uniform format. | 04-23-2015 |
20150120574 | INFORMATION TRANSMISSION METHOD, APPARATUS AND SYSTEM - Methods and devices for information transmission and in particular for payment transfer from a paying terminal to a selling terminal. In some embodiments, the paying terminal scans an encrypted image, such as a two-dimensional code, displayed on the selling terminal. The paying terminal decrypts the encrypted image to obtain payment information and sends a payment request to a remote server for processing. Security verifications can be conducted by the paying terminal or the server, wherein the server may generate processing results approving or denying the payment request. When the payment amount is greater than a preset value, additional verification can be carried out using, e.g., biometric information. The paying terminal and/or the selling terminal then display the processing results and the remote server completes the payment transfer. | 04-30-2015 |
20150142671 | GENERATING TRANSACTION IDENTIFIERS - To facilitate conducting a financial transaction via wireless communication between an electronic device and another electronic device, the electronic device determines a unique transaction identifier for the financial transaction based on financial-account information communicated to the other electronic device. The financial-account information specifies a financial account that is used to pay for the financial transaction. Moreover, the unique transaction identifier may be capable of being independently computed by one or more other entities associated with the financial transaction (such as a counterparty in the financial transaction or a payment network that processes payment for the financial transaction) based on the financial-account information communicated by the portable electronic device. The electronic device may also associate receipt information, which is subsequently received from a third party (such as the payment network), with the financial transaction by comparing the determined unique transaction identifier to the computed unique transaction identifier. | 05-21-2015 |
20150149365 | SECURE PAYMENT CARD - A payment card includes interface circuitry and a processor coupled to the interface circuitry. The processor initiates operations using the interface circuitry as part of a transaction. The operations include receiving a certificate from a merchant system, encrypting the certificate, and sending the encrypted certificate to the merchant system with an instruction to forward the encrypted certificate to an authorization system for the payment card. An encrypted response is received. The encrypted response originates from the authorization system and is forwarded to the payment card by the merchant system. The merchant system is unable to decrypt the encrypted certificate and the encrypted response. The payment card decrypts the encrypted response and determines whether authentication of the merchant system is successful according to the response. | 05-28-2015 |
20150302400 | DISTRIBUTED CRYPTO CURRENCY REPUTATION SYSTEM - Distributed crypto currency reputation systems and methods include monitoring a crypto currency public ledger. A current crypto currency transaction is detected in the crypto currency public ledger and, in response, reputation markers may be allocated to both a payer and a payee that are involved in the current crypto currency transaction. At least some of the reputation markers are then determined to have been transferred from the payer to the payee and from the payee to the payer. When a request for reputation information for the payee or the payer is received, information associated with the transfer of the at least some of the reputation markers from the payer to the payee or from the payee to the payer may then be provided. | 10-22-2015 |
20150310441 | TRANSACTION SYSTEM METHOD, ELECTRONIC SIGNATURE TOOL, AND NETWORK BANK SERVER AUTHENTICATION - The present invention provides a transaction system and method, an electronic signature tool, and a network bank server authentication method. The system comprises: a telephone terminal, for receiving personal information entered by a user; a telephone bank server, for receiving the personal information sent by the telephone terminal and verifying the personal information, and receiving, after the verification succeeds, transaction information and an authentication password that are entered by the user; a network bank server, for receiving the transaction information and the authentication password that are sent by the telephone bank server, and performing encryption calculation on the transaction information according to the authentication password to generate authentication information; a network terminal, for acquiring the transaction information and authentication information from the network bank server; and an electronic signature tool, for receiving the transaction information and authentication information that are sent by the network terminal, verifying the transaction information and authentication information, and generating, after the verification succeeds, signature data of the transaction information and sending the signature data to the network bank server. The present invention reduces the transaction complexity, ensures the security, and facilitates the operation. | 10-29-2015 |
20150317632 | METHOD FOR PROCESSING TRANSACTION USING DYNAMIC PAN - The present invention relates to a method for processing a transaction using a dynamic primary account number (PAN), which can minimize changes of existing infrastructures such as a card reader, a VAN server, and a card company server; reduce burdens relating to such changes; and can improve the security of a transaction of payment devices such as a magnetic strip card, an IC card, and a portable terminal. To this end, the method for processing a transaction using a dynamic PAN, according to the present invention, is performed by a payment device which provides track 2 information of an international standardization organization (ISO) standard to a card reader and comprises the steps of: partitioning a PAN area of track 2 information into a first area which includes a bank information number (BIN) and a second area which does not include the BIN; forming a dynamic area by encoding the second area; forming one dynamic PAN area by combining the first area and the dynamic area; and providing track 2 information which includes the dynamic PAN area to the card reader. | 11-05-2015 |
20150332261 | METHOD FOR MUTUAL AUTHENTICATION FOR PAYMENT DEVICE - Disclosed is a mutual authentication method for a payment device, in which location information of track 2 information is hidden when a credit card faces an inappropriate payment processing terminal, thus improving security of the credit card. To this end, the method, performed by a payment processing terminal processing the payment of the payment device, comprises: generating a first random value and a first hash value for the random value; and providing the random value to the payment device, and comparing a second hash value returned by the payment device and the first hash value. The payment processing terminal authenticates the payment device when the first hash value is identical to the second hash value. The payment device recognizes the payment processing terminal as a normal terminal when receiving a request for generating the second hash value for the random value, and provides card information to the payment processing terminal. | 11-19-2015 |
20150332266 | SECURE MANAGEMENT OF TRANSACTIONS USING A SMART/VIRTUAL CARD - A method, system, and/or computer program product securely manages smart card transactions. A processing entity receives a smart card identifier from a smart card. The smart card identifier is a transaction-specific identifier for a transaction, and contains no financial data about a holder of the smart card. The smart card identifier is hidden from a second party to the transaction. The processing entity receives transaction data for the transaction from the second party, where the transaction data is blocked from the smart card. In response to determining that the transaction is valid, the processing entity issues a transaction confirmation to the smart card and a transaction approval to the second party to the transaction. | 11-19-2015 |
20150339739 | CORPORATE BILL SELLING SYSTEM WITH ANTI-COUNTERFEITING VERIFICATION - The invention relates to an automation technology. The invention solves existing problems of insufficient flexibility, convenience and low security in purchasing corporate bills, and provides a corporate bill selling system with anti-counterfeiting verification, the technical solution thereof can be summarized as follows: a corporate bill selling system with anti-counterfeiting verification comprises a corporate bill selling center platform and at least one front-end corporate bill self-service terminal, the corporate bill selling center platform is connected with the at least one front-end corporate bill self-service terminal; the corporate bill selling center platform is used for providing entry of system basic platform building information, data storage, equipment monitoring, optical character recognition (OCR), interface with an external system and system data inquiry statistics management; and the front-end corporate bill self-service terminal is used for storing corporate bills, achieving interaction with users, and acquiring and identifying key information of corporate bills. | 11-26-2015 |
20150363766 | TRANSACTION MANAGEMENT - A method for performing a transaction initiated with near field communication, NFC, interaction between a user terminal including a subscriber identity module residing in the user terminal and a NFC reader. In the method a request including an amount of the transaction and an identifier obtained from a secure element of the subscriber identity module residing in the user terminal is delivered and a payment card number corresponding to the identifier is obtained. Finally, a transaction request is initiated towards a transaction management system and in response to a successful acknowledgment from the transaction management system an acknowledgement on successful transaction is delivered, and in response to an unsuccessful acknowledgement from the transaction management system the transaction request, canceling the transaction. | 12-17-2015 |
20150363774 | METHODS AND SYSTEMS FOR PERMISSIONS MANAGEMENT WITH ENHANCED SECURITY - Intercommunicating applications (“apps”) on a computational device (typically, but not necessarily, a mobile device) facilitate completion of an eletronic transaction via interaction with a device user and a remote permissions-management server. | 12-17-2015 |
20150363777 | CRYPTOCURRENCY SUSPICIOUS USER ALERT SYSTEM - The system includes a memory and a processor. The memory may store user profiles of an enterprise. The processor may be communicatively coupled to the memory and may receive a request from a user to perform a cryptocurrency transaction with a third party. The processor may retrieve block chain information associated with the cryptocurrency transaction and determine whether one of the user profiles is associated with the user based on the retrieved block chain information and a stored cryptoidentifier associated with one of the user profiles. The processor may further determine whether one of the user profiles is associated with the third party based on the retrieved block chain information and at least one stored cryptoidentifier associated with one of the user profiles. The processor may determine whether the cryptocurrency transaction is suspicious based on the associated user profile and communicate an alert to the enterprise. | 12-17-2015 |
20150363782 | CRYPTOCURRENCY TRANSACTION VALIDATION SYSTEM - The system includes a memory and a processor. The memory may store a customer profile associated with a customer. The processor may be communicatively coupled to the memory and may receive a request from the customer to perform a cryptocurrency transaction with a third party. The processor may calculate a risk score for the cryptocurrency transaction and determine a number of required validations to confirm the cryptocurrency transaction based at least in part upon the risk score. The processor may further receive a number of validations from a plurality of miners and compare the number of received validations to the number of required validations. The processor is further able to determine whether the number of received validations complies with the number of required validations. | 12-17-2015 |
20160005035 | SECURE FINANCIAL TRANSACTION USING PLAIN TEXT SMS - Methods and apparatus, including computer program products, are provided secure payments. In one aspect there is provided a method. The method may include initiating, by an application at a user equipment, generation of a short message service message to carry at least financial transaction information; generating, in response to the initiating, a plaintext descriptor portion and an encrypted portion, wherein the plaintext descriptor portion provides a plaintext representation of the financial transaction information carried by the short message service message, and wherein the encrypted portion includes the financial transaction information in an encrypted form; and sending, via the short message service message, the plaintext descriptor portion and the encrypted portion. Related apparatus, systems, methods, and articles are also described. | 01-07-2016 |
20160019539 | SYSTEMS AND METHODS FOR BIOMETRIC AUTHENTICATION OF TRANSACTIONS - Systems and methods are provided for authorizing a user in connection with a transaction at a transaction terminal. The systems and methods described herein enable a series of operations whereby a user using a mobile device can capture a code that uniquely identifies a transaction terminal. In addition the mobile device can also capture a user's biometrics, generate a biometric identifier and biometrically verify the user's identity by comparing the biometric identifier to a previously generated biometric identifier. If the user is biometrically authenticated the mobile device can generate a transaction request including, a user identifier, a mobile device identifier, and the transaction terminal code and transmit the transaction request to a system server. Based on the transaction request, the system server can further authenticate the user and/or approve the requested transaction. If the user is authenticated, the system server can instruct the terminal to advance the financial transaction. | 01-21-2016 |
20160026997 | Mobile Communication Device with Proximity Based Communication Circuitry - A mobile computing device has processors, memory, voice communication circuitry, and communication circuitry configured to receive a request from a server for information to complete an information exchange. The computing device also has a display device configured to display at least one user interface window in response to receiving the request from the server. The user interface window includes a plurality of data entry fields corresponding to the request. The computing device has a proximity based communication circuitry configured to energize an external proximity based card that is brought into proximity with the mobile computing device. When the external proximity based card is energized, the computing device receives information from the external proximity based card to populate at least one of the data entry fields. The communication circuitry is configured to submit data from the data entry fields to the server to facilitate the completion of the information exchange. | 01-28-2016 |
20160027011 | TRANSACTION TERMINAL DEVICE, TRANSACTION PROCESSING METHOD, AND TRANSACTION PROCESSING SYSTEM - A transaction terminal device connected to a settlement destination device includes a non-secure first information processing unit, and a secure second information processing unit. The first information processing unit includes a settlement processing unit that performs a transaction settlement process, and a certificate request transmitting unit that transmits a request for a certificate indicating regularity of the settlement destination device to the settlement destination device. The second information processing unit includes a signature verifying unit that verifies legality of a signature obtained by encrypting at least a part of a program code for operating the settlement processing unit. The certificate request transmitting unit transmits the request for the certificate to the settlement destination device when the legality of the signature is verified by the signature verifying unit. The settlement processing unit performs a settlement process between the settlement destination device and the transaction terminal device by using the certificate. | 01-28-2016 |
20160071108 | ENHANCED AUTOMATED ANTI-FRAUD AND ANTI-MONEY-LAUNDERING PAYMENT SYSTEM - A computerized anti-money-laundering and anti-fraud transaction analysis system may include a computerized cryptocurrency analysis tool system operatively coupled over a computerized network to a cryptocurrency exchange, a cryptocurrency exchange ledger and/or a know-your-customer facility. The computerized cryptocurrency analysis tool may include an automated payment cluster analysis routine for analyzing transaction data for a plurality of proposed cryptocurrency transactions. The transaction data for the plurality of proposed cryptocurrency transactions may be obtained from the cryptocurrency exchange, cryptocurrency ledger and/or the know-your-customer facility. The automated payment cluster analysis routine automatically identifies a cluster of related transactions in the plurality of proposed cryptocurrency transactions based upon an analysis of a plurality of transaction data items associated with each of the proposed cryptocurrency transactions. The computerized cryptocurrency analysis tool may also include automated summary routine for flagging a first transaction in the identified cluster as potentially associated with at fraud and/or money-laundering. | 03-10-2016 |
20160078415 | METHOD AND APPARATUS FOR DIGITAL TICKET INSPECTION - A method, apparatus and computer software are disclosed, with obtaining from a backend ( | 03-17-2016 |
20160078442 | USER ID WITH INTEGRATED DEVICE SETUP PARAMETERS - To eliminate the need for a user to laboriously enter device setup parameters into each of plural devices, a user ID is provided with a secure part, having the user's login credentials, and an unsecure device parameter part which defines device parameters desired by the user to be set in computing devices. | 03-17-2016 |
20160078446 | METHOD AND APPARATUS FOR SECURE ONLINE CREDIT CARD TRANSACTIONS AND BANKING - A hardware based system and method that detects fraudulent financial activity originating from malicious programs on a user's computer and ensures that user sensitive information is not accessible to programs on the user's computer. The system includes an untrusted service process on the user's computer, a back end server/cloud based infrastructure, and a user device that records the user's computer at the time the transactions are executed. The device has a minimal TCB (Trusted Computing Base) and is trusted to carry out its functions. The device stores sensitive user information and enters this information into secure channels ensuring that the user's computer does not have access to this information. Periodic statement review is accomplished by comparing the device's record of transactions against the record in the payment system and discrepancies result in notifications to the user. The payment system entities may be unaware of the system, or they may exchange information with the system in order to obtain security benefits including fraud detection and tokenization services. | 03-17-2016 |
20160078447 | METHOD AND SYSTEM FOR DISTRIBUTING ELECTRONIC TICKETS WITH DATA INTEGRITY CHECKING - This invention discloses a novel system and method for distributing electronic ticketing to mobile devices such that the ticket stored on the device is checked for its integrity from tampering and the device periodically reports on ticket usage with a central server. | 03-17-2016 |
20160092879 | Switch Server System Interoperable With Mobile Devices Providing Secure Communications For Transactions - Methods and systems for conducting a secure transaction over a network using one or more gateway servers. The methods include exchanging first cryptographic information with a user. The first cryptographic information adapted to encrypt and decrypt communications. The methods further include receiving, from the user, identifying information associated with the user. The methods also include validating the identifying information and converting the user to a participating user after the validating operation. The methods include exchanging second cryptographic information with the participating user. The second cryptographic information adapted to encrypt and decrypt communications. The methods also include receiving, from the participating user, encrypted personal data being encrypted using the second cryptographic information. The encrypted personal data being received via a data equity programmable user interface. The methods include performing a transaction with the user in accordance with an encrypted payment authorization. | 03-31-2016 |
20160098716 | SECURE PAYMENT CARD TRANSACTIONS - Payment card transactions at a point of sale (POS) are secured in certain embodiments by intercepting, with a POS security layer installed on a POS terminal, payment data from the POS terminal, transmitting the payment data from the POS security layer to a server security application installed on a POS server, and providing false payment data from the POS security layer to a POS terminal application installed on the POS terminal. The false payment data in various embodiments is processed as if it were the payment data, such that the POS terminal transmits an authorization request to the POS server using the false payment data. In addition, the authorization request may be transmitted from the POS server to a payment gateway. | 04-07-2016 |
20160098723 | System and method for block-chain verification of goods - A method for block-chain verification of goods includes scanning, by a computing device, using a code scanner, an address from a code affixed to a product, verifying, by the computing device, that the address is associated with a crypto-currency transaction recorded at a transaction register, obtaining, by the computing device, at least one current transaction datum, and determining, based on the verification and the at least one current transaction datum, that the product is authentic. | 04-07-2016 |
20160098725 | DYNAMIC CARD VALIDATION USING USER REQUESTED CELL IDENTIFIERS - A card validation system receives a request to validate a card and receives a request from a user for a set of cell identifiers. The system determines a set of cell identifiers of a card validation matrix to associate with the user and transmits the set of cell identifiers to the user. The system further receives a set of received cell values corresponding to set of cell identifiers of a card validation matrix. The system determines the set of stored cell values corresponding to the set of cell identifiers of the card validation matrix. The system compares the set of received cell values to the set of stored cell values. Based at least in part upon the comparison, the system determines whether the card is validated. | 04-07-2016 |
20160110695 | ONE-SCAN AND ONE-TOUCH PAYMENT AND BUYING USING HAPTIC CONTROL VIA MESSAGING AND CALLING MULTIMEDIA SYSTEM ON MOBILE AND WEARABLE DEVICE, CURRENCY TOKEN INTERFACE, POINT OF SALE DEVICE, AND ELECTRONIC PAYMENT CARD - Provided are computer implemented methods and systems for messaging, calling, and one-touch and one-scan payments and buying via mobile and wearable devices. An exemplary system comprises a processor and a database in communication with the processor. The processor is configured to provide a haptic control associated with the system. The haptic control is shown on a display of a mobile and wearable device overlapping other visual elements. The haptic control provides mode selection elements associated with a payment, messaging, and calling modes. The processor receives a selection of the payment mode via the mode selection elements from a user. Upon the selection, context is extracted from the display. Based on the context, a payment transaction type which the user intends to perform is determined. The payment transaction type includes a payment receiving transaction and a payment sending transaction. Based on the determining, a transaction request is sent to a financial institution using the extraction. | 04-21-2016 |
20160110709 | SYSTEMS AND METHODS FOR DETECTING POTENTIALLY COMPROMISED PAYMENT CARDS - A computer-implemented method for detecting potentially compromised payment cards is provided. The method uses a processor in communication with a memory. The method includes storing a plurality of tokens. Each token includes merchant identification data corresponding to a first merchant. The method also includes transmitting the plurality of tokens to the first merchant and receiving an authorization request message from a merchant. The authorization request message includes a token and a merchant identifier corresponding to the merchant. The method further includes determining that the received token is one of the plurality of tokens associated with the first merchant, determining that the merchant identifier does not correspond to the first merchant, transmitting a message including instructions to decline the transaction, and attaching a potentially compromised flag to the first merchant. The potentially compromised flag indicates a heightened probability of fraudulent activity. | 04-21-2016 |
20160110713 | METHOD AND SYSTEM FOR SECURE GLOBAL TOKENIZATION - A method for transmitting tokenized data includes: storing a plurality of token profiles, each profile including data related to a tokenized data element including a token, data value, and associated data element; receiving a transaction message via a payment network, the message being formatted pursuant to one or more standards governing the interchange of transaction messages and including data in one or more data elements reserved for private use in the one or more standards; identifying, for each data elements, a corresponding token profile where the included associated data element is the respective data element and where the included token corresponds to the data included in the respective data element; updating the transaction message by replacing the data included in each of the one or more data elements with the data value included in the identified corresponding token profile; and transmitting the updated transaction message via the payment network. | 04-21-2016 |
20160110714 | Encapsulated Digital Remittance Solution Within Messaging Application - An encapsulated digital remittance solution that provides a remote money transfer server and a digital money transfer application installed on a personal computing device. The digital money transfer application integrates a money transfer shortcut into a digital interface of a digital messaging application, wherein the digital money transfer application can be launched from within the digital messaging application. When the money transfer shortcut is selected, the digital money transfer application initiates an encrypted connection between the personal computing device and the remote money transfer server to ensure the secure transfer of information. A currency transfer amount and a transfer recipient are selected by a user through a money transfer interface displayed within the digital messaging application. A money transfer confirmation is then generated and sent to the transfer recipient via the digital messaging application. Money is the digitally transferred between account via the remote money transfer server. | 04-21-2016 |
20160110716 | CREDIT CARD READER AUTHENTICATOR - A credit card reader is attached to a mobile device to process credit card transactions at the point of sale. A user of the credit card reader slides an authenticator card through the credit card reader to activate the credit card reader. Accordingly, the credit card reader may compare data stored in the authenticator card to an expected value for the data to determine whether the user is authorized to utilize the credit card reader. If there is a match, the credit card reader displays a unique password, known to the user, which the user can use to verify that the credit card reader is authentic. Further, if there is a match, the credit card reader may allow the user to process credit card transactions through the credit card reader. | 04-21-2016 |
20160110717 | SECURING AN ELECTRONIC TRANSACTION VIA A THREE-DIMENSIONAL ELECTRONIC TRANSACTION AUTHENTICATION PROTOCOL - Ensuring security of electronic transactions between a user and a service provider involves employing three-dimensional transaction authentication based on user-facilitated authentication of a device and user-facilitated authentication of a service provider transaction domain. | 04-21-2016 |
20160125407 | Systems and Methods for Secure Remote Payments - Systems and methods for secure payments are disclosed herein. Authentication of devices with a payment gateway, for making purchases, may occur prior to effecting purchases. Once authentication of the device has occurred with the payment gateway the device user may quickly and easily transact with any vendor in trusted communication with the payment gateway. The device may be altered to allow it to request purchases, as well as to allow vendors, trusted by the payment gateway, to request purchases be made. | 05-05-2016 |
20160125410 | System and Method for Detecting and Preventing Social Engineering-Type Attacks Against Users - The invention relates to system for validating a transaction in an institution and ensuring that said transaction has not been exploited by use of social-engineering, which comprises: (A). in an institution server: (a) a validation engine which is configured to: (a.1)receiving a request message for the performance of a transaction validation against a possibility of social-engineering type manipulation, said request comprises parameters of said transaction; (a.2) based on a set of predefined rules and on a storage of predefined template messages, selecting a message template from said storage, filling fields of the message with specific data, and sending an inquiry message to an application of said institution within a customer device; and (a.3) receiving a response message from said application, and either repeating formulation and sending of an additional message to said application, or concluding the request; (B.) in a customer device: (b) an application and a user interface for: (b.1) receiving said inquiry message, and displaying the same to the customer; (b.2) receiving a customer response to said inquiry message, formulating a response message, and forwarding to said institution server; wherein said rules and said template messages are particularly designed to allow formulation of messages by said validation engine that inquire the customer with respect to social-engineering types of issues. | 05-05-2016 |
20160132869 | ENCRYPTING FINANCIAL ACCOUNT NUMBERS SUCH THAT EVERY DECRYPTION ATTEMPT RESULTS IN VALID ACCOUNT NUMBERS - A decryption module is enabled on one or more authorized devices. A user's financial account information is encrypted using a card verification number, or some secret known to the user and replicated onto the authorized devices. The user requests processing of a financial transaction using the previously-encrypted financial account information. The authorized device retrieves the encrypted financial account information and prompts the user to enter the card verification number (or other secret known to the user that was used to encrypt the financial account information). The decryption module decrypts the financial account information using the card verification number entered by the user, and the decrypted financial account information resembles a valid credit card or debit card number and will pass a Luhn test. The decrypted financial account information is transmitted to process the financial transaction initiated by the user. | 05-12-2016 |
20160132878 | Payment Card Including User Interface for Use with Payment Card Acceptance Terminal - A payment card, for use with a payment card acceptance terminal, and related systems and methods are disclosed. The payment card includes an acceptance terminal interface component for interfacing with a payment card acceptance terminal and a user input receiving component for receiving an input by a user directly. The payment card also includes an integrated circuit which is in communication with the acceptance terminal interface and the user input receiving component and is configured to provide payment credentials to the payment card acceptance terminal on receipt of an input at the user input receiving component. | 05-12-2016 |
20160140547 | SYSTEM AND METHOD FOR PROVIDING TRANSACTION VERIFICATION - A transaction verification process performed by a transaction network operator in communication with a client computing device and a third party provider. A computing device may be equipped with an integrity verification module for verifying the system integrity of the computing device, and a cryptographic module for digitally signing transaction requests. The transaction network operator may verify that transaction requests processed by the third party provider are properly associated with a valid computing device by verifying signatures from the cryptographic module and the integrity verification module. In response to a request from the third party provider, the transaction network operator may verify that the computing device is authorized to complete the transaction by challenging the computing device for proper credentials. The transaction network operator may verify the credentials provided by the client device and indicate to the third party provider that the transaction is valid. | 05-19-2016 |
20160140560 | AUTONOMOUS FRAUD INTERROGATION BY MOBILE DEVICE - A system, method and a device for offline authentication of transactions using mobile device, based on, analytic engine such as behavioral pattern detection are provided. The behavioral pattern can be for a specific person, for group of people with similar characteristics, or a combination of the two. The invention has the advantage over the prior art centralized authentication and fraud detection systems in that it is more precise in identifying and preventing fraud in real time. The precision is better for both customer and merchant frauds. The present invention also requires fewer investments in infrastructure and uses less communication traffic when compared to the prior art. | 05-19-2016 |
20160155188 | USABLE SECURITY WITH SOCIAL NETWORK ASSISTANCE | 06-02-2016 |
20160162898 | AUTHENTICATION ON MOBILE DEVICE USING TWO-DIMENSIONAL CODE - A two-dimensional code generated from encrypted original authentication data can be displayed on an authentication device. The code is read and decrypted by an authentication application on a mobile device. This can generate and display a new two-dimensional code. The new code can contain additional information, and the new two-dimensional code is read by the two-dimensional code reading unit of an authentication device. It is then authenticated. | 06-09-2016 |
20160180343 | SYSTEM AND METHOD FOR SECURED COMMUNICATIONS BETWEEN A MOBILE DEVICE AND A SERVER | 06-23-2016 |
20160189126 | METHOD AND SYSTEM FOR SAFELY TRANSMITTING TRANSACTION SENSITIVE DATA BASED ON CLOUD POS - The present application discloses a secure transfer method for cloud-based POS transaction sensitive data, comprising steps of: (a) exchanging a transaction process key with the cloud POS terminal; (b) receiving, from the cloud POS terminal, the transaction request packet encrypted by using the transaction process key; and (c) obtaining the transaction sensitive data from the transaction request packet, and using the transaction process key to operate on the transaction sensitive data so as to upload to the financial acquiring platform. The present invention also discloses a secure transfer system for cloud-based POS transaction sensitive data. | 06-30-2016 |
20160189151 | DISTRIBUTED AUTHENTICATION FOR MOBILE DEVICES - An electronic commerce server connected to a network has access to user data, device data and public key data. The server receives transaction details including a digital signature from a mobile device, the digital signature generated using a first private key associated with a first public key. The server generates a challenge based on the transaction details and transmits the challenge to at least one computing device according to device data associated with the mobile device or user data associated with the user of the mobile device. The server may then receive a response to the challenge from the at least one computing device, the response including a digital signature generated using a second private key associated with a second public key. The server authorizes the transaction based on reading the first digital signature using the first public key and reading the second digital signature using the second public key. | 06-30-2016 |
20160203455 | Point of sale (pos) docking station system and method for a mobile barcode scanner gun system with mobile tablet device or stand alone mobile tablet device | 07-14-2016 |
20160203468 | METHOD FOR AUTHENTICATING TRANSACTIONS | 07-14-2016 |
20160203482 | SYSTEM AND METHOD FOR GENERATING PAYMENT CREDENTIALS | 07-14-2016 |
20160203483 | Personal Account Authorization Controls | 07-14-2016 |
20160253663 | TRANSACTION SIGNING UTILIZING ASYMMETRIC CRYPTOGRAPHY | 09-01-2016 |
20160253669 | METHOD FOR PROVIDING PAYMENT SERVICE AND ELECTRONIC DEVICE THEREOF | 09-01-2016 |
20160379211 | SYSTEMS AND METHODS FOR BIOMETRIC AUTHENTICATION OF TRANSACTIONS - Systems and methods are provided for authorizing a user in connection with a transaction at a transaction terminal. The systems and methods described herein enable a series of operations whereby a user using a mobile device can capture a code that uniquely identifies a transaction terminal. In addition the mobile device can also capture a user's biometrics, generate a biometric identifier and biometrically verify the user's identity by comparing the biometric identifier to a previously generated biometric identifier. If the user is biometrically authenticated the mobile device can generate a transaction request including, a user identifier, a mobile device identifier, and the transaction terminal code and transmit the transaction request to a system server. Based on the transaction request, the system server can further authenticate the user and/or approve the requested transaction. If the user is authenticated, the system server can instruct the terminal to advance the financial transaction. | 12-29-2016 |
20160379217 | SECURE COMMUNICATION OF PAYMENT INFORMATION TO MERCHANTS USING A VERIFICATION TOKEN - Disclosed are apparatuses, systems, and methods pertaining to the secure communication of payment information from portable consumer devices, such as credit cards, to online merchants using verification tokens. | 12-29-2016 |
20160379221 | SYSTEM AND METHOD FOR SELECTING LOAD OPTIONS FOR USE IN RADIO FREQUENCY IDENTIFICATION IN CONTACT AND CONTACTLESS TRANSACTIONS - A transponder-reader payment system includes a fob including a transponder, and a RFID reader for interrogating the transponder. In exemplary operation, the fob identifying information may be presented to the RFID reader for completion of a transaction request. The transaction request may be provided to a fob issuer system which retrieves a value for satisfying the transaction request from a fob associated transaction data file. The issuer system may deplete the transaction data file in accordance with the transaction request and replenish the data file in accordance with fob user or fob issuer defined reload protocol. | 12-29-2016 |
20170236110 | METHODS AND APPARATUS FOR NON-CONTACT RADIO FREQUENCY DETECTION AND AUTOMATIC ESTABLISHMENT OF CORRESPONDING COMMUNICATION CHANNEL | 08-17-2017 |
20170236123 | DECENTRALIZED PROCESSING OF GLOBAL NAMING SYSTEMS | 08-17-2017 |
20180025358 | MOBILE REAL-TIME SHARING SECURITY MANAGEMENT SYSTEM | 01-25-2018 |
20190147450 | REAL-TIME ENRICHMENT OF RAW MERCHANT DATA FROM ISO TRANSACTIONS ON DATA COMMUNICATION NETWORKS FOR PREVENTING FALSE DECLINES IN FRAUD PREVENTION SYSTEMS | 05-16-2019 |
20220138309 | SYSTEMS AND METHODS FOR DECRYPTION AS A SERVICE - Systems and methods for decryption of payloads are disclosed herein. In various embodiments, systems and methods herein are configured for decrypting thousands of transactions per second. Further, in particular embodiments, the systems and methods herein are scalable, such that many thousands of transactions can be processed per second upon replicating particular architectural components. | 05-05-2022 |
20220138745 | Method and system of transferring cryptocurrency credits through a blockchain with leaf blocks - A method of transferring cryptocurrency credits employs leaf blocks to transfer cryptocurrency credits which are settled by cryptocurrency through blockchain transaction(s). It comprises: maintaining two types of accounts—one for cryptocurrency and the other for cryptocurrency credits; creating at least a leaf block, by a sending financial institution, containing a plurality of business transactions that intend to transfer customers' cryptocurrency credits to customers at a receiving financial institution; calculating a mathematical summary of said leaf block; creating at least a blockchain transaction tying to said leaf block through said mathematical summary serving as a settlement to said leaf block; submitting said blockchain transaction to a blockchain; sharing said leaf block with the receiving financial institution; accessing said leaf block by the receiving financial institution, validating it and crediting transaction amounts in it to corresponding customer accounts at the receiving financial institution. A system configured to implement said method. | 05-05-2022 |
20220138747 | Round trip resource sharing method with time slot locking - A round trip resource sharing method and system with time slot locking is disclosed. The method may include issuing a time slot-based owner certificate and an owner resource profile through a shared resource transaction system; setting a shared resource to a time slot authentication and authorization device with the owner certificate and resource profile; disclosing the set shared resource to the transaction system; setting a lessee certificate and a lessee resource profile of a lessee who concluded a transaction to the time slot authentication and authorization device; using, by the lessee, the shared resource through the time slot authentication and authorization device or disclosing the shared resource to the transaction system for resale permitted by the owner. | 05-05-2022 |
20220138749 | METHOD AND SYSTEM FOR SECURED AND STABLE BLOCKCHAIN TRANSACTION BY OBTAINING PRE-APPROVAL OF BOTH PARTIES - A method for transaction initiator and recipient to both pre-approve the form and content of a blockchain transaction generates a transaction request by the initiator, and transmits the transaction request to the transaction recipient for verification of the content of the transaction request. The method also signs a digital signature of the transaction recipient on the transaction request if the verification is passed. And a transfer of funds into an account of the transaction recipient can then be made from an account of the transaction initiator. A related system is also disclosed. | 05-05-2022 |
20220138756 | SYSTEMS AND METHODS FOR A CONTEXT-DRIVEN ELECTRONIC TRANSACTIONS FRAUD DETECTION - Systems and methods are disclosed for establishing a multi-dimensional fraud detection system and payment analysis. One method includes: receiving transaction history of a user, the transaction history including a first payment vehicle and a second payment vehicle; determining, of the received transaction history, one or more instances of switching from one the first payment vehicle to the second payment vehicle; and determining a user-specific abandonment score for the user, based on the determined instances of switching from the first payment vehicle to the second payment vehicle. | 05-05-2022 |
20220138759 | SYSTEM, METHOD, AND COMPUTER PROGRAM PRODUCT FOR VIRTUAL ACCOUNTS BASED ON BIOMETRIC MEASUREMENTS - Provided is a method for providing a virtual account based on a biometric measurement, the method includes receiving biometric data associated with a biometric measurement of an individual, generating an virtual account of the individual based on receiving the biometric data associated with the biometric measurement of the individual, provisioning access to the virtual account of the individual based on the biometric measurement of the individual, and sending a message to a user device based on generating the virtual account associated with the individual, where the notification message includes an indication associated with the virtual account. A system and computer program product are also disclosed. | 05-05-2022 |
20220141021 | METHODS, SYSTEMS, AND DEVICES FOR CONCEALING ACCOUNT BALANCES IN LEDGERS - Disclosed herein are methods, systems, and devices for concealing account balances of permissionless distributed ledgers using multi-chain and/or directed acyclic graph (DAG) based structures, while maintaining publicly verifiable transactions. According to one embodiment, a computer-based method for recording a transaction in a ledger having a transacted amount, a first account balance associated with a sender and a second account balance associated with a receiver is disclosed. The computer-based method includes encrypting the transacted amount using a first shared key, decreasing the first account balance by the transacted amount, encrypting the first account balance with a first private key, increasing the second account balance by the transacted amount, encrypting the second account balance with a second private key. | 05-05-2022 |