Inventors list

Assignees list

Classification tree browser

Top 100 Inventors

Top 100 Assignees


Transaction verification

Subclass of:

705 - Data processing: financial, business practice, management, or cost/price determination

705050000 - BUSINESS PROCESSING USING CRYPTOGRAPHY

705064000 - Secure transaction (e.g., EFT/POS)

Patent class list (only not empty are listed)

Deeper subclasses:

Entries
DocumentTitleDate
20130031007LATENCY LOCATOR - A method for capturing data packets sent on a network for evaluating response time performance, the network including a financial institution and a partner bank. The method includes associating a captured data packet sent to the partner bank with a captured data packet received from the partner bank, by comparing at least one coded field of a data portion of the captured data packet sent to the partner bank with at least one coded field of a captured data portion of the data packet received from the partner bank. The method also includes measuring a response time of the associated data packet received from the partner bank, relative to a transmission time of the captured data packet sent to the partner bank.01-31-2013
20080262971DEVICE, SYSTEM AND COMPUTER WRITEABLE MEDIA FOR ACCOMPLISHING REAL TIME DOWNLOADING OF TRANSACTIONAL INFORMATION TO A PERSONAL DIGITAL ASSISTANT, INCLUDING REMOTE SERVER INCORPORATING PERSONAL ASSISTANT MANAGER SOFTWARE - A user operated device, operating system and associated computer writeable media for retrieving, storing and displaying data associated with at least one personal financial account. A handheld body includes a built in microprocessor and memory communicating with a keypad, screen display and power supply. A built-in modem and wireless communication protocol associated with said processor soliciting the retrieving and downloading of digital information, in real-time fashion from a remote server (including such as a Personal Assistant Manager subscription based server for compiling, storing and regularly updating transactional information relating to each of a plurality of unrelated user accounts), said transmitted information being selectively stored into said memory and/or presented on said screen display.10-23-2008
20090192944SYMMETRIC VERIFICATION OF WEB SITES AND CLIENT DEVICES - A method and apparatus for symmetric verification of a client device and a web site are described. In one embodiment, the method comprises receiving an identity verification request for an electronic transaction between a client device and a website. In one embodiment, the method may also comprise verifying an identity of both a user associated with the client device and the web site using symmetric verification, and transmitting verification results to the web site and the client device.07-30-2009
20100082494METHOD AND SYSTEM FOR CASH TRANSFER - A method and system for transferring cash electronically from a sender to a receiver through cash machines and a mobile device is disclosed. On initiation of a transaction by a sender on a cash machine, a coupon containing details of the transaction is generated by the system. The coupon is sent to the mobile device of the receiver. The receiver uses the coupon for withdrawing cash from a designated cash machine. On withdrawal of the cash by the receiver, the sender receives a confirmation from a bank.04-01-2010
20130080333ELECTRONIC WALLET USING ALLOCATION OF FUNDS - A user may instruct a host to transmit an allocation of electronic money to the user's mobile electronic device from a user's payment account managed by the host. The allocation may include credentials, authentication key(s), a signature, a limited amount of funds, and/or other types of payment information. The allocation may be limited to the amount of funds that, when exhausted or expired, prevents further payments using the mobile electronic device. The user may reload the mobile electronic device with electronic money by reconnecting to the host via the secure channel. The user may spend the allocation using the electronic device with use of minimal or no user-based security measures (e.g., passwords, biometrics, etc.), thereby making it quick and easy to make payments with the electronic money.03-28-2013
20100030697END-TO-END SECURE PAYMENT PROCESSES - Systems and method for performing secure electronic payment transactions to allow merchants to perform payment processing such that the merchant payment system is not required to store data specific to a particular payment device.02-04-2010
20090132424SECURE PAYMENT CAPTURE PROCESSES - Methods and processes for securely capturing payment device information and conveying the securely captured payment device information to a client application on a merchant's client device in a manner that does not require that the payment device information to be displayed to the merchant. The client application generates and submits a payment authorization request to a payment authorization service in a manner that does not require the payment information to be displayed to the merchant. The merchant receives a status of the payment authorization request as approved, denied, or process failure. Payment capture can be made before an active connection is made with the merchant's client device, or can occur in real-time.05-21-2009
20120215701FLEXIBLE MONETIZATION SERVICE APPARATUSES, METHODS AND SYSTEMS - The FLEXIBLE MONETIZATION SERVICE APPARATUSES, METHODS AND SYSTEMS (“FMS”) transform requests for on-demand and flexible monetization and related services via FMS components into currency transfers, purchase receipt notifications, social networking communications and transaction analytics reports. In some embodiments, the FMS obtains a request from a computing device of a merchant to process a user purchase checkout by a user from a point of sale device. In some embodiments, the request may include a merchant identifier. The FMS may determine that the merchant is authorized to obtain servicing of the request to process the user purchase checkout, by querying a database using the merchant identifier. The FMS may generating a user interface customized to the merchant and the point of sale device, upon determining that the merchant is authorized to obtain the service of the request, and provide the customized user interface to process the user purchase checkout by the user.08-23-2012
20090106160AUTHORIZATIONS FOR MOBILE CONTACTLESS PAYMENT TRANSACTIONS - Embodiments generally relate to systems and methods for processing electronic payments for retail services and goods delivered by unattended retail device. In embodiments, an unattended retail device leverages a consumer's mobile appliance to send the transaction and payment information to an authorizing authority. The authorizing authority receives the payment and transaction information, authorizes or declines the payment of the transaction, and forwards the authorization or declination to the mobile appliance. The mobile appliance then sends the authorization or declination to the unattended retail device. If authorized, the unattended retail device provides the retail good or service.04-23-2009
20120191615Secure Credit Transactions - A system and method for engaging in a credit or debit transaction do not transmit an individual's account number to a vendor or merchant. The individual provides the account number to a transaction acquiring device (TAD). The TAD requires the individual to provide one or more pseudo-random numbers that identify the individual. These numbers are only obtainable from an authentication device that can be unlocked only by passing an authentication challenge. The TAD then provides transaction data to a credit or debit issuer and the vendor, but does not provide or store the account number. The issuer provides the merchant with an identifier other than the account number that is nevertheless unique to the individual. This identifier may be used to track the individual's purchase history or perform other business functions.07-26-2012
20130073468SYSTEM AND METHOD OF ASSOCIATING AN ARTICLE DISPENSING MACHINE ACCOUNT WITH A CONTENT PROVIDER ACCOUNT - A method of associating a first customer account for an article dispensing machine with a second customer account at a content provider. The article dispensing machine has a user interface. The method receives a unique customer identifier through the user interface, accesses the first customer account based on the unique customer identifier, and associates the second customer account at the content provider with the first customer account. The second customer account can include a customer subscription with access permission for a digital media selection at the content provider. In addition, the unique customer identifier can include at least one of a credit card number or a debit card number, and the method can apply a hash function to at least one of the credit card number or the debit card number to produce at least one of a hashed credit card number or a hashed debit card number.03-21-2013
20130060708USER VERIFICATION FOR ELECTRONIC MONEY TRANSFERS - Techniques for efficient transfer of funds between parties using personal communication devices are presented. A sender can use a first communication device to transfer funds from an account associated with the sender to a recipient via a communication address associated with the recipient's second communication device even if the recipient is not registered with a financial service provider associated with the account of the sender, without requiring the recipient to travel to a physical office or present a physical personal identification to obtain the funds. A transfer fund request can include the recipient's communication address, and a fund transfer message, comprising a link that facilitates retrieving the funds, can be sent to the recipient's communication address, and the recipient can be validated based on the communication address and/or a validation code. When validated, the funds can be made available to the recipient via an account of the recipient.03-07-2013
20090271322Electronic receipt system and method - A system and method for auto generating an electronic receipt from virtually any type of public facing business having a live point-of-purchase and utilizing an electronic payment systems, namely, a point-of-sale (POS) system having a credit card terminal and/or an electronic cash registers (ECR). The system includes a software add-on which authenticates and identifies consumers at the POP using a pre-registered credit/debit card, deactivates normal receipt printing functionality, captures electronic receipt information and transmits this information to a membership or subscriber based Internet web-site, where consumers may then view and manage the information. The system can be used to automate a product return and/or generate and transmit a gift receipt. The system further includes a membership or provider based Internet website for merchants to view and manage information related to previous customers, from which merchants may distribute coupons and/or advertisements to these consumers.10-29-2009
20130066788END-TO-END SECURE PAYMENT PROCESSES - Systems and method for performing secure electronic payment transactions to allow merchants to perform payment processing such that the merchant payment system is not required to store data specific to a particular payment device.03-14-2013
20090327144SYSTEM FOR EXECUTING REMOTE ELECTRONIC NOTARIZATION AND SIGNATORY VERIFICATION AND AUTHENTICATION - A system for remote electronic verification and authentication and screening of potential signatories for remote electronic notary transactions via remote pc encrypted platform to a broadband digitally or WIFI cellular/PDA device or portable pc device. The system implements the following electronic components, but not limited to, electronic signature device, digital certificates, electronic document, electronic biometric devices, electronic audio/visual software/hardware, and electronic payment systems and devices, all electronically synchronized to afford capable notary publics in executing remote electronic notary transactions via a satellite kiosk network or on-line virtual kiosk application.12-31-2009
20110302089ELECTRONIC CREDIT CARD WITH FRAUD PROTECTION - A method for verifying permission to use a payment system such as an electronic credit card, using a hand held communication device such as a smart phone, where the customer presents the communication device to a merchant who extracts account information from the hand held device, and the merchant sends a request for identification verification information to be sent to the hand held communication device directly or to an alternate display. The verification information can be in the form of a photograph, fingerprint, or the like. The merchant can then compare the identification verification data to the customer to determine if the customer is authorized to used the account according to the request.12-08-2011
20120130905TRANSACTION VERIFICATION ON RFID ENABLED PAYMENT AND TRANSACTION INSTRUMENTS - A display enabled RFID tag (DERT) receives transaction details from the reader. DERT verifies that the details match their counterparts in the reader public key certificate. The process is aborted in case of a mismatch. DERT extracts and displays user-verifiable data. It then enters a countdown stage that lasts for a predetermined duration. A user observes the transaction information and, if the transaction amount and other details are deemed correct, presses an accept button provided on the DERT before the timer runs out. DERT signs the time-stamped transaction statement and sends it to the reader. This signed statement is then sent to the payment gateway and eventually to the financial institution that issued the payment DERT.05-24-2012
20090210348System and method for electronic commerce - A method of identifying altered order critical data in a system for conducting electronic commerce over a public data network in which orders are placed by a customer using a computer. The method includes the step of transmitting an electronic order of the customer over the public data network from the customer computer to a validation server. The validation server validates order critical data included in the order by executing the steps of verifying the order critical data, and generating an indication of the validity or otherwise of the order critical data. The method enables, for example, orders generated by untrusted devices, such as a customer computer, to be verified by a trusted validation server thereby improving the security of electronic commerce systems employing client-side ordering.08-20-2009
20090204545Electronic financial transactions - A new electronic financial transaction (EFT) system is proposed, wherein the business logic of a transaction is defined at a location remote from a secure point of sale terminal, thus having a framework wherein the business logic can be easily customised or updated.08-13-2009
20080208760Method and system for verifying an electronic transaction - A method for verification of an electronic transaction between a consumer and a merchant, a credit issuers or any combination thereof. This method includes the steps of: obtaining a network data set including a plurality of data fields reflecting network data; obtaining a transaction data set including a plurality of data fields reflecting transaction data, consumer data, merchant data, credit issuer data or any combination thereof, directed to the electronic transaction; analyzing at least one field of the network data set and at least one field of the transaction data set; and based upon the results of the analysis, initiating an action directed to the transaction. An apparatus and system are also disclosed.08-28-2008
20120109830APPARATUS, SYSTEM AND METHOD FOR A DECENTRALIZED SOCIAL NETWORK SYSTEM AND DECENTRALIZED PAYMENT NETWORK SYSTEM - In the context of social networks, a social network based peer computing system, apparatus and method for a decentralized social network system and decentralized payment system in a peer to peer network environment. Two one way relationships involving a public key/private key pair allow two users of the system to establish a secure online relationship where an object can be sent securely from one user to a second user. A user having more than one device connected to the system can have information updated on one device auto migrate and replicate on remaining connected devices. This same user can also have this updated information auto migrated and replicated onto friend's devices connected to the system. A user may also establish a privacy profile wherein only certain information is auto migrated and replicated on friend's devices.05-03-2012
20100125524SECURITY TRANSACTION SYSTEM AND THE METHOD FOR THE SAME - The present invention discloses a web transaction system and the method for the same. The web transaction system includes a plurality of merchant severs which deal with customers through a trading platform. Financial providers supply the merchant servers or customers with financial services respectively. A trustee service provider, coupled to the financial providers, provides the merchant servers with entrusting services for reduction in trading risks.05-20-2010
20100088237METHODS AND SYSTEMS FOR USING PHYSICAL PAYMENT CARDS IN SECURE E-COMMERCE TRANSACTIONS - Pursuant to some embodiments, methods, systems, apparatus, computer program code and means for conducting an online transaction by a user operating a computer are provided which include identifying, at the computer, that the user has selected a secure payment option during a transaction with a merchant. The computer is caused to enter a private session. During the private session, payment card data from a physical payment card held by the user is received, and the payment card data is forwarded to a payment provider to cause the payment provider to provide substitute payment card details to the merchant to complete the transaction.04-08-2010
20080249950Method and apparatus for conducting transactions generated at point-of-sale locations - A system and method for conducting credit card or debit card transactions in a wired or wireless network. A merchant utilizing one of a number of terminals would input information through one of a particular number of gateways to a central credit card processing center. The credit card processing center would review each transaction and process the transaction and then send a conformation or disapproval of the transaction to the appropriate merchant, as well as transmitting the transaction to one of a plurality of credit card or debit card processors. In this manner, a terminal provider would not be forced to certify the terminal with each of the credit card processors, but would only have to certify to the system itself. Additionally, the system includes a website allowing each merchant to review and alter any one of a number of transactions.10-09-2008
20080249949Data Exchange method between multiple peer systems in a peer-to-peer network - A data exchange method between a first peer system having a requested data chunk and a second peer system having a credit includes: exchanging the credit of the second peer system for the requested data chunk of the first peer system; and using the credit received by the first peer system to exchange for a future data chunk from the second peer system at a later time.10-09-2008
20100131415ELECTRONIC PAYMENT SYSTEM INCLUDING MERCHANT SERVER AND ASSOCIATED METHODS - An electronic payment system is for a merchant server to transfer funds from a purchaser account to a merchant account, the merchant server to send a merchant transaction identification (ID) and transaction information. The electronic payment system includes a mobile wireless communications device to send a purchaser transaction ID and purchaser account access information. A payment processor server is to receive the purchaser transaction ID and purchaser account access information, and is also to send the transaction information to the mobile wireless communications device if the merchant transaction ID matches the purchaser transaction ID. The mobile wireless communications device is also to send confirmation of the transaction information to the payment processor server. The payment processor server is also to effect a transfer of funds from the purchaser account to the merchant account based upon the confirmation of the transaction information and the purchaser account access information.05-27-2010
20080288414Sales data processor and computer readable medium - A sales data processor connected to a server device via a communication network. A connection unit connects to the sales data processor a recording medium which has stored access information on the server device and identification information on the sales data processor. A CPU reads the access information and the identification information stored in the recording medium. A communication unit is authenticated by the server device based on the read access destination information and identification information to communicate with the server device.11-20-2008
20120296831TRANSACTIONAL SECURITY OVER A NETWORK - A system and method facilitating purchase transactions over a computer network, including the purchase of electronically storable items. The embodiments herein encrypt “customer identifier string” in an encryption stream and cause the encryption stream to be transferred from the customer to a merchant in the purchase transaction. A verification entity receives the encryption stream which is sent by the merchant for identity verification and payment authorization. Then, the verification entity verifies the identifiers contained in the encryption stream and transfers an identity verification and payment authorization from the verification entity to the merchant.11-22-2012
20110208658Multifactor Authentication Using A Directory Server - A method and a server computer are provided for authenticating a cardholder account. The server computer implements the method, which includes obtaining a first identifier and a cryptogram from a first entity, identifying an issuer associated with the cardholder account, forwarding the first account identifier and the cryptogram to a second entity for validation, receiving a second identifier from the second entity, and sending the second identifier to the first entity. The first identifier can be associated with the cardholder account. The second identifier can be generated by the second entity and associated with a validated form of the first identifier.08-25-2011
20120185398MOBILE PAYMENT SYSTEM WITH TWO-POINT AUTHENTICATION - A transaction processing system uses a mobile phone to make payments at point of sale (POS), over the internet, and over the phone, and also to make money transfers. Transaction security is provided by using various combinations of authentication using the mobile phone. Account numbers linked to payment cards, and public/private keys that encrypt/decrypt customer data, dynamically change on mobile phone and a server, based on a specified number of transactions or time interval. No credit/debit account information is shown on mobile phones. GPS location and time stamps facilitate identification of unusual shopping patterns during internet and over-the-phone transactions. Customers can remotely delete data on mobile phone in case of loss. Three-level security used at POS combines industry-standard encryption; dynamically-changing account numbers and keys; and visual identification of customer, followed by software signature recognition.07-19-2012
20110270764METHOD AND A SYTEM FOR ELECTRONIC TRANSACTION USING POINT OF SALES (POS) DEVICE - The various embodiments herein provide a method and system for providing electronic transaction on a Near-Sound Communication Point-of-Sale (NSC_POS) device through a cell phone of a payer. The method comprises of dialling a central server number by a payer through a registered cell phone, arranging the cell phone in the vicinity of the NSC_POS device, broadcasting a sound signal by the central server to the NSC_POS device through the speaker of the cell phone, receiving the sound signal by the microphone of the NSC_POS device, transmitting the received sound signal back to the central server in an encrypted form through the microphone of the cell phone, decoding the received sound signal by the central server. The central server transfers the required amount from the payer's mobile virtual account to a virtual account associated with the NSC_POS device based on information provided in the sound signal.11-03-2011
20120036076PREPAID DISTRIBUTION APPLICATION AND DEVICE - A method comprising includes receiving an encrypted over-the-air message from a mobile wireless device requesting that the balance of a merchant's prepayment account for a distributor be reloaded by a requested amount, where the mobile wireless device stores the balance in a secure element holding data encrypted by a key, authorizing a reload of the merchant's prepayment account for the distributor, transmitting an encrypted over-the-air message to the mobile wireless device to enable the mobile wireless device to increase the balance of the merchant's prepayment account for the distributor by the requested amount where the wireless mobile device is able to display the balance of the merchant's prepayment account for the distributor, notifying the distributor that the balance of the merchant's prepayment account for the distributor has been increased by the requested amount so that the distributor can authorize an unscheduled delivery to the merchant, transmitting an over-the-air message including an encrypted version of the key to a reader device used by delivery personnel acting on behalf of the distributor so that the reader device can access the secure element of the mobile wireless device using offline near field communication to alter the balance of the merchant's prepayment account for the distributor, receiving a settlement over-the-air message from a reader device indicating an amount to be deleted from the balance of the merchant's prepayment account for the distributor that reflects the cost of merchandise delivered by delivery personnel on behalf of the distributor, where the distributor has decrypted the received encrypted key and accessed the secure element of the mobile wireless device to decrease the balance of the merchant's prepayment account for the distributor stored in the secure element by the cost of merchandise delivered.02-09-2012
20090063354ACCOUNT TRANSACTION FRAUD DETECTION - A merchant conducting a transaction on an account forms transaction data with a sensitive data field. To obscure the account prior to transmitting information about the transaction, for each character in the sensitive data field, a combined character is formed with a character of a generated pad. A replacement character is formed by a modulus operation on the combined character and is stored in the corresponding position in the sensitive data field. A transmission containing the sensitive data field with replacement characters is delivered to the merchant's acquirer. Subsequently, a first transmission is received for another transaction from a merchant that contains transaction data upon an account and a sensitive data field. Using the sensitive data field, an attempt is made to retrieve a transaction data record that contains data from a previous transaction that includes the account upon which the previous transaction was conducted. The sensitive data field, which is encrypted as the corresponding account upon which the previous transaction was conducted, was encrypted by a character-by-character modulo operation using a generated pad. If the transaction data record is retrieved, a second transmission is sent that contains a fraud notification of the attempt to conduct a transaction upon the encrypted account in the sensitive data field. If there is no retrieval of the transaction data record, a third transmission containing a no-fraud notification is sent.03-05-2009
20090063353Payment System and Method - In one embodiment, transferring payment between a first user and a second user of a communication system includes displaying a contact list in a user interface of a client executed at a user terminal of the first user, the contact list including the second user. The client retrieves and displays at least one page from a payment provider responsive to the first user selecting the second user from the contact list. The client transmits, to the payment provider, information related to the payment entered into the page by the first user, which causes the payment provider to transfer the payment from an account of the first user to an account of the second user.03-05-2009
20090144205SERIAL NUMBER AND PAYMENT DATA BASED PAYMENT CARD PROCESSING - A server is operable to receive a media device identifying number (ID) and establish an association between a media device and a payment account and, in one embodiment, supports at least one of payment authorization and payment clearing based at least in part on the media device ID and the payment account. A network and system includes a payment card processor server that is operable to receive a payment authorization request and to determine if an authorized media device generated a purchase selection message and to determine to approve a received payment authorization request based, in part, if the media device was authorized for the purchase selection based upon a received media device ID.06-04-2009
20090327141HIGHLY EFFICIENT SECRECY-PRESERVING PROOFS OF CORRECTNESS OF COMPUTATION - Presented are methods and systems for highly efficient proofs of correctness of computations that preserve secrecy of the input values and calculations. One embodiment includes a method for verifiably determining at least one output for a secrecy preserving computations where the method includes acts of calculating an output from submitted inputs according to an announced calculation, translating a value in the calculation into two components that are a randomized representation of that value, publishing commitments to the at least two components, revealing a portion of the randomized representation in response to a verification request, and enabling verification of the calculation of the output using the revealed portion of the randomized representation. According to one aspect of the secrecy preserving verification the numbers involved in the secrecy preserving calculation are represented by a randomly constructed representing pair. In another aspect, revealing one member of the pair allows for verification without compromising secrecy. In one embodiment, arrangement of the translation process ensures that in the verification only truly independently random numbers, or operations on them, are revealed and checked.12-31-2009
20110225094SYSTEM AND METHOD INCLUDING DYNAMIC VERIFICATION VALUE - System and methods for generating a dynamic verification value for electronic payment transactions are disclosed. An account identifier and an account attribute associated with an account of a user are received at a server computer. A dynamic account attribute is created and concatenated with the account identifier. The concatenated account identifier and the dynamic account attribute are then used to generate a dynamic verification value. The dynamic verification value and the dynamic account attribute are then sent to a user communication device and used for authentication in a payment transaction.09-15-2011
20110225092Secure Transaction Execution - A method and system for executing a transaction is described. A payment obligation for a transaction is issued including a transaction value and details of goods and/or services to be provided by a seller following the transaction. An acceptance of the payment obligation is received from the buyer. A determination may be made regarding whether there is sufficient insured credit issued by an insurer for the buyer to cover the transaction value. A funder may be instructed to pay seller funds covering the transaction value following the buyer's acceptance of the payment obligation. A payment to reimburse the funder such that the transaction is executed may be received from the buyer.09-15-2011
20120143772Secure Distributed Single Action Payment Authorization System - Methods and systems for enabling and performing secured, single action payments from a mobile device are disclosed. One method includes transmitting user credentials from an application installed on a mobile device to a server alongside a device identifier. The method includes receiving data at least partially defining encrypted personal payment information and saving the encrypted personal payment information in a memory of the mobile device in association with the application. At least prior to receiving a user request to make a payment via the application, the mobile device lacks a decryption key capable of decrypting the encrypted personal payment information.06-07-2012
20090083191TRACK DATA ENCRYPTION - A method for conducting a secure transaction using a secondary PAN is disclosed. The method includes providing a secondary PAN associated with a primary PAN, where the secondary PAN has at least one end portion that is the same as the primary PAN, but has a middle portion that is different than the primary PAN.03-26-2009
20120078800METHOD FOR SECURE TRANSACTIONS - The present invention relates to a method for a secure transaction wherein a buying part of the secure transaction utilizes a portable radio communication device (03-29-2012
20080262973Apparatus and method for secured commercial transactions - A transaction security code database and a method and apparatus for generating the transaction security code database. The transaction security code database is comprised of multiple transaction security codes, each transaction security code constituting a transaction code generated based upon a transaction initiated by a user, which is appended to or linked to a security code which is based upon a biometric sensor code generated by a biometric sensor from a biometric presentation of a biometric feature of the user.10-23-2008
20080262972Order confirmation devices, systems, and methods - Devices, systems, and methods for confirming online orders are provided. In some embodiments, a method of confirming an online food order is provided, where the method includes providing a confirmation device at a vendor facility, where the confirmation device is adapted to receive an order and send the order to a display or printing device; receiving an online order through the confirmation device; printing or displaying the order and an associated confirmation code; and entering the confirmation code into the confirmation device to confirm receipt of the order. The confirmation device may be dedicated to the single purpose of confirming online orders and may be incorporated into a point-of-sale device.10-23-2008
20090106161APPARATUS AND METHOD FOR DATA INTERCHANGE - An apparatus and method for data interchange provides a universal transaction mechanism for translating and sharing data, particularly financial data, thereby streamlining the exchange of financial information and approvals typically utilized in many brokerage transactions, including the verification of free funds or Prime Broker relationship through an electronic Letter of Free Funds or Prime Broker SIA 150, SIA 151 Schedule A in compliance with Regulation T and Prime Broker documentation rules related government-mandated rules and requirements.04-23-2009
20090204546Electronic payment and associated systems - By linking together mobile telephony systems having small message service capacity and payment clearance systems such as those operated by banks and credit card companies, substantial facilitation of electronic payments may be achieved. Existing security systems designed to protect the mobile telephony system, for example SIM cards and optional encryption provide a base level of transaction security which may be enhanced by suitable programming to require the use of a PIN to validate a transaction. By linking such systems with e.g. ATMs, the usefulness of a mobile telephone, where each assigned telephone number essentially functions as a player identity number (or, in certain enhancements, as an account number), substantial transaction economies can be achieved without compromising security, with excellent audit trail features and with automatically generated confirmations and acknowledgements.08-13-2009
20090210349VIRTUAL ACCOUNT BASED NEW DIGITAL CASH PROTOCOLS - Virtual account based digital cash protocols employ two pairs of private and public keys. Each public key is certified separately and the protocols do not use any blind signature schemes. As a result, the virtual account based digital cash protocols provide strong protection of the user privacy by using two certified public keys instead of a blind signature. One pair of certified keys consists of one master user private key and one master user public key. A second pair of certified keys consists of one pseudonym user private key and one pseudonym user public key. The use of a master key pair and a pseudonym key pair circumvents the need for blind signatures. As a result, the proposed protocols do not require blind signatures and do not add additional overhead and security requirements necessitated by conventional blind signature schemes. The protocols use public key protocols, digital signatures and symmetric key protocols, which may be readily implemented in standard information security based systems based on cryptographic constructs. In addition, the protocols may be deployed in mobile, off-line, and on-line settings.08-20-2009
20120197808METHOD OF USING PERSONAL DEVICE WITH INTERNAL BIOMETRIC IN CONDUCTING TRANSACTIONS OVER A NETWORK - A method of authorizing a commercial transaction between a customer and a provider of goods or services over a network, wherein the provider of goods or services requests that the customer provide authentication by activating a fingerprint identification device, and the provider of goods or services receives at least an authentication code of the customer over the network from the fingerprint identification device, the method comprising the steps of: providing the customer with the fingerprint identification device which produces the authentication code when a fingerprint of the customer matches a stored fingerprint within the fingerprint identification device; receiving at least the authentication code from the provider of goods or services over the network; and authorizing the transaction if at least the authentication code is valid.08-02-2012
20100223187SYSTEM AND METHOD FOR ELECTRONIC PAYMENT, AND SERVER, COMMUNICATION TERMINAL AND PROGRAM THEREFOR - A secure, inexpensive, convenient payment system which allows an existing communication to be used to make an expensive payment terminal unnecessary, makes local communication unnecessary to make it possible to use the system by a seller and a buyer, uses closed-loop type electronic money to make it possible to make payment on delivery is obtained. An account database 09-02-2010
20100235284METHOD AND SYSTEMS FOR GENERATING AND USING TOKENS IN A TRANSACTION HANDLING SYSTEM - A method and systems for generating and using transaction tokens including a plurality of interfaces for communication over a network, the plurality of interfaces communicatively coupled to a plurality of information sending devices and a plurality of information receiving devices, at least one database including a token data table and a user profile table, the token data table storing at least one token, the at least one token having a user-defined value and a plurality of data fields, and a business software component communicatively coupled to the plurality of interfaces and the at least one database that is operative to receive at least one request from the plurality of interfaces, generate at least one token in response to the at least one request received from the plurality for interfaces, lock the at least one token generated in response to the received at least one request, and redeem the user-defined value of the locked at least one token.09-16-2010
20100241572Payment System and Method Using IC Identification Card - A payment system utilizes an IC identification card to identify a user, finds and verifies a bank account of the user. The payment system uses an IC identification card reader to read user identity information which includes a user identification card number. The system encrypts user identity information using a first encryption key and encrypts the user-entered bank account password using a bank encryption key corresponding to a participating bank, and sends the encrypted information to an intermediary platform, which sends a bank transaction request including user identity information, bank account password and transaction amount to the participating bank subsystem. The participating bank subsystem conducts the requested bank transaction with a user bank account, which is determined according to the user identification card number either by the intermediary platform or by the participating bank subsystem based on a mapping relationship between the user identity information and bank accounts.09-23-2010
20100235285GAME THEORETIC PRIORITIZATION SYSTEM AND METHOD - A method for allocation among agents, comprising providing to at least two each having a respective wealth generation function adapted to generate a virtual currency; conducting an auction, having an auction outcome with respect to an auction transaction, in which each respective agent bids an amount of the generated virtual currency; and transferring an amount of the generated virtual currency in accordance with the auction outcome, in consideration of an auction transaction.09-16-2010
20100235283FINANCIAL TRANSACTIONS USING A COMMUNICATION DEVICE - A computer implemented system provides a method of conducting a financial transaction. The method begins when the system assigns a designator of a value using a preauthorization by a payor. The system associates the payor with an authorized payor telephone identifier. When the system receives a telephone call with the authorized payor telephone identifier at a specified Direct Inward Dial (DID) telephone number associated with a transaction type, the system responds by sending at least one transaction code to the payor. When the system receives the transaction code from the payee, the designator of value is re-asssigned to from the payor to the payee. The system allows the transaction code to be delivered directly from the payor to the payee or sent automatically to the payee. Each DID telephone number represents different transaction types such as Automatic Teller Machine (ATM), Person-To-Person (P2P), merchant transactions, vending transactions and other types of transactions.09-16-2010
20100250442METHOD AND SYSTEM FOR SECURING A PAYMENT TRANSACTION WITH A TRUSTED CODE BASE - A mobile payment device 09-30-2010
20100198732COMMUNICATION SYSTEM, A MEDIA PLAYER USED IN THE SYSTEM AND A METHOD THEREOF - There is provided a communication system including a plurality of content receiver cum transmitter devices connected to a network, each device being for receiving content, selectively storing content and for selectively re-transmitting content. The system may include at least one server for storage of advertisements and transmission of advertisements either directly to the plurality of content receiver cum transmitter devices, or the transmission of advertisements being directed by at least one chaincast manager, the at least one server for storage of advertisements and transmission of advertisements being either online or offline. There may also be at least one content server connected to the network for storage of content and transmission of content either directly to the plurality of content receiver cum transmitter devices, or the transmission of content being directed by at least one chaincast manager. The at least one chaincast manager connected to the network may preferably be for registering the plurality of content receiver cum transmitter devices, and for scheduling content and advertisement transfers amongst the plurality of content receiver cum ransmitter devices. It is advantageous that the system enables simultaneous recording and transmission of content by each content receiver cum transmitter device with minimal lag time. A corresponding method of the aforementioned system and an embodiment of the content receiver cum transmitter device are also described.08-05-2010
20100191654MULTI-FUNCTIONAL CONTROL UNIT FOR AN IONIC FOOT BATH SYSTEM - One particular implementation of the present invention may involve a control unit of an ionic foot bath or other health product. The control unit may be connected to a network or the Internet such that the control unit may be monitored or controlled by a third party, such that the third party may provide programming updates, adjust the programming of the control unit to conform to the user's preferences and provide flexibility to a practitioner with several foot bath systems. The control unit may also provide the functionality of a pay-per-use method for use of the ionic foot bath. The method may allow a user or an operator of the product to purchase operational time that is desired to use the product. Once the operating time is purchased, the product may be operated for the purchased amount of time, at which point, more usage time may be purchased.07-29-2010
20090319434MAINTAINING PRIVACY FOR TRANSACTIONS PERFORMABLE BY A USER DEVICE HAVING A SECURITY MODULE - The present invention discloses a method and system for maintaining privacy for transactions performable by a user device having a security module with a privacy certification authority and a verifier. The system comprises an issuer providing an issuer public key PKI; a user device having a security module for generating a first set of attestation-signature values DAA12-24-2009
20090070272WIRELESSLY EXECUTING FINANCIAL TRANSACTIONS - The present disclosure is directed to a system and method for wirelessly executing financial transactions. A payment card includes an interface, a communication module, secure memory, a user-interface module, and a processing module. The interface connects to a slot of a mobile host device. The communication module wirelessly receives RF signals from and transmits RF signals to a retail terminal. The secure memory stores user credentials and a payment application used to execute financial transactions with the retail terminal. The user credentials and the payment application are associated with a financial institution. The user-interface module presents and receives information through the GUI of the mobile host device. The processing module executes the payment application using the user credentials in response to at least a transaction request received by the communication module and transmits a transaction response to the retail terminal based, at least in part, on the executed application.03-12-2009
20100332400Use of Fingerprint with an On-Line or Networked Payment Authorization System - A method for selectively authorizing a transaction at one or more servers comprises steps for receiving a request to authorize the transaction, receiving machine fingerprint data related to the request to authorize the transaction, saving the machine fingerprint data in a memory, receiving associated payment information related to the request to authorize the transaction, saving the payment information in a memory, retrieving previously stored machine fingerprint data associated with the payment information, comparing the received machine fingerprint data with previously stored machine fingerprint data associated with the payment information, and determining, using the machine fingerprint data, whether to authorize the transaction.12-30-2010
20110035321MULTI-WAY TRANSACTION RELATED DATA EXCHANGE APPARATUS AND METHODS - Methods and apparatus for conducting electronic transactions such as commerce transactions or purchases and exchanging related information. In one aspect, a robust and integrated apparatus and associated method is provided whereby a purchaser can securely provide transaction data and/or information in an electronic format to another party such as a vendor. In one exemplary embodiment, the purchaser can authenticate his or her right to use the billing information contained therein to complete a purchase without actually having to disclose the billing information in a human readable format, thereby enabling the vendor to obtain and authenticate the purchaser's identity and billing information while still protecting the purchaser's privacy, and without requiring disclosure of the purchaser's billing information to the vendor's employees or any other parties. In another aspect, the vendor can provide information about the transaction in an electronic form that can be authenticated and verified for accuracy.02-10-2011
20100223188Online Payment System and Method - An online payment system uses an electronic check system to make a payment to a merchant on behalf of an online customer. The electronic check system receives a check application request of the customer, creates an electronic check number and a password for the check, outputs the check information to the customer, and stores the check information in the electronic check system. When a merchant system receives an online payment request of the customer, it sends the request to the electronic check system, which then parses out a payment electronic check number and a payment check password from the payment request, verifies the parsed information with the stored check the information, and makes a payment to the merchant. The electronic check system is centralized and shared by multiple merchants. A payment only needs access to the electronic check system, without requiring participation of multiple receipt-acquiring systems of individual merchants.09-02-2010
20110082800Secure Transaction Systems and Methods - A user request to implement a secure transaction is received and communicated to a web server. Transaction details signed with a secret key are received from the web server and displayed to the user. The user is requested to confirm the secure transaction by providing biometric data. If the user's biometric data is validated, an authentication token is received from a biometric device and the authentication token is communicated to the web server. The web server processes the secure transaction if the authentication token is confirmed as a valid authentication token.04-07-2011
20110082799SYSTEM AND METHOD FOR GENERATING A DATA CONTAINER - A system and method for securely transferring sensitive payment data across a system landscape. The system and method may utilize machine-readable media including program code stored therein executable by one or more processors to perform the transferring of payment data. The transferring of data includes generating and encrypting a data container to combine all sensitive payment data.04-07-2011
20090216681SYSTEMS AND METHODS FOR PERFORMING WIRELESS FINANCIAL TRANSACTIONS - A secure computing module (SCM) is configured for connection with a host device. The SCM includes a processor for performing secure processing operations, a host interface for coupling the processor to the host device, and a memory connected to the processor wherein the processor logically isolates at least some of the memory from access by the host device. The SCM also includes a proximate-field wireless communicator connected to the processor to communicate with another SCM associated with another host device. The SCM generates a secure digital signature for a financial transaction package and communicates the package and the signature to the other SCM using the proximate-field wireless communicator. Financial transactions are performed from person to person using the secure digital signature of each person's SCM and possibly message encryption. The digital signatures and transaction details are communicated to appropriate financial organizations to authenticate the transaction parties and complete the transaction.08-27-2009
20090216680Systems and Methods for Performing File Distribution and Purchase - A secure computing module (SCM) is configured for connection with a host device. The SCM includes a processor for performing secure processing operations, a host interface for coupling the processor to the host device, and a memory connected to the processor wherein the processor logically isolates at least some of the memory from access by the host device. The SCM generates a secure digital signature for a financial transaction and enables controlled content received through the host device. File distribution is performed from a content provider to a buyer or from a reseller to a buyer. The file distribution includes a financial transaction using secure digital signatures and possibly message encryption. The digital signatures and transaction details are communicated to appropriate financial organizations to authenticate the transaction parties and complete the transaction. The controlled content is transferred to the buyer from either the content provider or the reseller.08-27-2009
20110082802Secure Financial Transaction Systems and Methods - A user request to implement a secure financial transaction is received and communicated to a web server capable of implementing the transaction. Transaction details signed with a secret key are received from the web server and displayed to the user. The user is requested to confirm the secure financial transaction by providing biometric data. If the user's biometric data is validated, an authentication token is received from a biometric device and the authentication token is communicated to the web server. The web server processes the secure financial transaction if the authentication token is confirmed as a valid authentication token.04-07-2011
20120136799SYSTEM AND METHOD FOR SELECTION OF AIRLINE SEATS AND PAYMENT VERIFICATION - This invention relates to an electronic means by which people can select the exact seat or seats they want for any type of event or reserve an appointment for any activity. More specifically, a customer or a ticket re-seller or a venue operator can go, for example, to the internet and select the event or activity for which he wants a ticket or tickets or reserve a time and reserve and order the exact seat or seats or the time of his choosing directly online. The seat or seats or reserved time he selects is then paid for using payment information that is verified with a payment verification server.05-31-2012
20100280958SYSTEM FOR CONTROLLING USER ACCESS TO A SERVICE - The invention concerns a system for controlling user access to a service having a read device (11-04-2010
20110161234ORDERING SCHEME - An ordering scheme is described, for example an ordering and payment scheme for mobile communication devices. The ordering scheme enables an Internet shop or another service provider to issue binding offers to a mobile communication device or the like and to receive an acceptance of the offer from the mobile device. The acceptance is encrypted using a private key of mobile device and the offer may be encrypted using a private key of the service provider. The service provider liaises with a payment broker and a charging system for controlling the transfer of funds from the user to the service provider. An identity management system may be provided to control access to the modules of the ordering scheme.06-30-2011
20090240626Customer Initiated Payment Method Using Mobile Device - The invention concerns a method of making a payment transaction by a customer including steps of receiving, by a mobile device (09-24-2009
20090182676Remote Electronic Payment System - The invention concerns a remote electronic payment system comprising an authentication device (07-16-2009
20080222049Digital Signature Authentication - A systems and methods for authenticating a consumer with a transaction card using digital signatures according to one embodiment of the invention is disclosed. These systems and methods allow consumers to digitally sign transaction information with a private key. The private key may be used to digitally sign the transaction, for example, through a hosted or local system that protects the integrity of the private key. A financial institution may authenticate the consumer by decrypting the digital signature with a public key.09-11-2008
20110016054SIGNATURE BASED NEGATIVE LIST FOR OFF LINE PAYMENT DEVICE VALIDATION - At each of a plurality of transit readers of a transit system, for each of a plurality of riders, where each rider seeks to conduct an access transaction with the transit system for access into the transit facility by using a payment device issued by an issuer in a payment system, data is read from the payment device. The data includes an encryption code that uniquely corresponds to the payment device and was created by the issuer using one or more encryption keys and a predetermined algorithm. A check will be performed, remotely and/or locally, of one or more lists of other encryption codes to determine if the encryption code is on the list. On the basis of whether the encryption code is on the list, the rider is permitted access to the facility of the transit system. The payment device need not be changed for the rider's fare. Decryption of the encryption code read from the payment device is not required to complete the access transaction.01-20-2011
20110022522METHOD AND SYSTEM FOR PROVIDING REAL-TIME ACCESS TO MOBILE COMMERCE PURCHASE CONFIRMATION EVIDENCE - A method and system are provided for providing a real-time access to mobile commerce payment evidence. The method includes receiving and storing evidence that a mobile handset user has confirmed his intention of making a purchase to be billed to his mobile operator account. The method further includes authenticating the confirmation received, and storing evidence of that authentication. Further, the method includes providing at least some of that evidence to at least one of the subscriber, the utility provider, and a provider of the product purchased.01-27-2011
20110258123DEVICES, SYSTEMS, AND METHODS FOR TOKENIZING SENSITIVE INFORMATION - Devices, systems, and methods for tokenizing sensitive information are provided herein. Methods may include the steps of receiving sensitive information via an input device, the input device being communicatively coupled to a transaction terminal, tokenizing the sensitive information at the input device to generate a token, and associating the token and the sensitive information together in a storage medium associated with the input device.10-20-2011
20110082801Secure Transaction Systems and Methods - A transaction request containing transaction details from a requesting device is generated by a web-enabled application executing on the requesting device. A secure signature associated with the transaction details is calculated using a secret key. The transaction details and the secure signature associated with the transaction details are communicated to the requesting device. Confirmation information is received from the requesting device and validated. If the confirmation information is valid, the requested transaction is implemented.04-07-2011
20090327142Fair Payment Protocol with Semi-Trusted Third Party - Described is an optimistic fair payment protocol in electronic commerce that provides fair payment while resisting an unconscious double spending attack and other attacks. A buyer receives encrypted e-goods from a merchant, and sends payment to the merchant. If decryption information is not received in exchange for the payment, or the decryption information does not render the e-goods useable, the buyer launches a dispute with a third party dispute resolution service. If the decryption information is received and renders the e-goods useable, the buyer determines whether the e-goods are valid, according to a corresponding description. If not valid, the buyer launches a dispute and provides the e-goods and the description. The third party uses the description to evaluate the validity of the goods to determine whether to refund the payment to the buyer or release it to the merchant.12-31-2009
20110153504POSTCARD GREETINGS FOR DIRECT MARKETING - A method for customizing direct marketing campaigns, by utilizing relationships within a computer social network and information that is known about the social network members to find the best opportunity to provide an offer for goods and services to potential customers; providing offers for the goods and the services via the computer based upon receiving recommendations from acquaintances of potential customers via the social networks; and sending offers to the potential customers via the computer on behalf of their acquaintance.06-23-2011
20110307390SECURE AND RECOVERABLE DATABASE FOR ON-LINE VALUE-BEARING ITEM SYSTEM - An on-line value bearing item (VBI) printing system that includes one or more cryptographic modules and a secure database is disclosed. The secure database includes account balances and other information for all of the on-line value-bearing item system customers and is capable of preventing access by unauthorized users. Also, a secure communication network is in operation to prevent unauthorized access to the users' data stored in the database.12-15-2011
20120041882METHOD OF AND COMPUTER PROGRAMME FOR CHANGING AN IDENTIFICATION CODE OF A TRANSACTION AUTHORISATION MEDIUM - The present invention relates to a method of changing an identification code of a transaction authorisation medium, wherein the transaction authorisation medium is designed for authorising transactions of a credit parameter. The identification code is registered by the transaction authorisation medium and by a management server. The transaction authorisation medium is operatively connected to a terminal for changing the identification code, and the terminal is operatively and communicatively connected to the management server via a public telecommunication network. The method comprises the steps of: initiating a transaction; storing the changed identification code in the transaction authorisation medium; and transmitting a changed identification code in encrypted form to the management server via the telecommunication network for carrying out the transaction.02-16-2012
20090198620Mobile commerce receipt system - A mobile commerce receipt system and method providing a user of a mobile telecommunications terminal with a reliable electronic proof of reservation, purchase and/or payment made. By e-commerce means, the user places an order with a vendor or merchant and makes electronic payment. The vendor issues an electronic contract, sending the contract to a Trusted Third Party (TTP) receipt server. The TTP validates the contract, generates an electronic, digital receipt which is to sent the vendor. The vendor sends the receipt to the mobile terminal of the user, the mobile terminal storing the receipt for subsequent presentation at the point of delivery of the ordered goods or services.08-06-2009
20090070271SYSTEMS, METHODS AND APPARATUSES FOR SECURE DIGITAL TRANSACTIONS - A method for authorizing recurring transaction according to one embodiment includes receiving a defined payment amount associated with a user or entity. Additionally, the method includes receiving a first code associated with a first predetermined currency value, where the first code is also associated with the user or entity. Furthermore, the method includes verifying an availability of funds to pay the defined payment amount and authorizing payment of the defined payment amount if funds are available to pay the defined payment amount. Further still, the method includes generating a new code associated with a new predetermined currency value, and sending the new code to a sender of the defined payment amount.03-12-2009
20120209778MEDIATION SYSTEM AND METHOD FOR RESTRICTED ACCESS ITEM DISTRIBUTION - Mediation systems and methods for restricted access item distribution are disclosed. In an embodiment, a method for facilitating payment from a user device for a restricted access item hosted by a host system is disclosed. In another embodiment, a system for facilitating payment from a user device to for a restricted access item hosted by a host system is disclosed. In another embodiment, a method for providing a mediated marketplace service is disclosed.08-16-2012
20120011071Remote invoice and negotiable instrument processing - A method of creating an electronic invoice is provided. A mobile application is downloaded to an operating system of a wireless electronic communication device. The mobile application is capable of processing a point of sale type operation. The operating system captures information required for invoice/receipt and payment. The invoice/receipt information is created and outputted for import into an accounting system. The payment information is created and outputted for import into a payment processing system. The invoice/receipt information is created and outputted for the customer. Upon receipt of a payment, the payment is processed.01-12-2012
20080319914TRANSACTIONAL SECURITY OVER A NETWORK - A system and method facilitating purchase transactions over a computer network, including the purchase of electronically storable items. The embodiments herein encrypt “customer identifier string” in an encryption stream and cause the encryption stream to be transferred from the customer to a merchant in the purchase transaction. A verification entity receives the encryption stream which is sent by the merchant for identity verification and payment authorization. Then, the verification entity verifies the identifiers contained in the encryption stream and transfers an identity verification and payment authorization from the verification entity to the merchant.12-25-2008
20110093399Saloot's online enhanced reciprocation service - Saloot at its core is a money transferring service designed specifically around online voluntary micro payments, aka donations, tips, and other forms of reciprocation. It allows a web browser give amounts as small as a penny towards content they appreciate. Inherent to a voluntary payment is a power by the giver to choose when to give. Saloot.com utilizes this fact to tally these tips rather than attempt transactions at the time of each tip, which eliminates overbearing transaction charge issues for micro payments. Also with the transaction being delayed for a later date these pending tallies can be adjusted up or down, creating a certain impermanence which makes it safe to tip with-out filling in passwords or log-ins at each instance.04-21-2011
20120023025SECURE DONATION SYSTEM AND ITS METHOD - A secure donation system is connectible to information processing device of donor, donee, and specific store via network. The system includes: a database for storing donation intention data of donor, requirement data of donee, and merchandise and/or service transaction data of specific store; a resource allocation module for generating donee data meeting donation intention data by analyzing and matching donation intention data with requirement data; a donation module for donor to choose donee from donee data meeting donation intention data generated by resource allocation module and for generating donation usage certificate after confirming donation data including donation intention data and donee data; and an authorization module for transmitting donation usage certificate to electronic device of chosen donee, so as for donee to perform verification and shopping in specific store via electronic device. Besides, a secure donation method having mechanisms of requirement matching and postpaid is also provided.01-26-2012
20100262546PAYMENT SERVICE AUTHENTICATION FOR A TRANSACTION USING A GENERATED DYNAMIC VERIFICATION VALUE - Methods and systems for dynamically generating a verification value for a transaction and for utilizing such value to verify the authenticity of the payment service application. The dynamically created verification value may be generated on a payment device, such as an integrated circuit credit card or smart card, embedded into the payment data, and transmitted to a point of sale terminal. Alternatively, payment data is sent by a payment device to a point of sale terminal, which generates a verification value and embeds it into the payment data. The embedded verification value is used by a service provider to verify the authenticity of the transaction. The methods and systems may be used in a contactless (wireless) environment or a non-wireless environment.10-14-2010
20120158595OPERATOR EXTERNAL SERVICE PROVISIONING AND CHARGING - Presented is a system and methods for allowing a user, through their end user device, to online purchase a service from a service provider and provide online payment for the service from the operator network associated with the end user device. The service provider and the operator network can authenticate each other through encrypted data appended to HTTP communications associated with interacting on the internet.06-21-2012
20120317037Methods for Providing Secure Transactions - Methods in which an encrypted transaction validation code is received which positively identifies a first transaction for a first entity, the first entity having a first entity identifier, and the first transaction is electronically verified as being valid by use of the first entity identifier and the validation code. The first entity identifier can be transferred as an account number and the validation code transferred to the money source in a non-account data field. A money source can validate the validation code by duplicating the encryption process used to create the validation code and by then comparing the result to the validation code received. The validation code can be, at least in part, encrypted, and a money source can validate the validation code by duplicating a validation code encryption process and by then comparing the result to the validation code received.12-13-2012
20120317036PAYMENT CARD PROCESSING SYSTEM WITH STRUCTURE PRESERVING ENCRYPTION - A customer may provide a merchant with primary account number information in connection with a purchase transaction. The merchant may send an associated authorization request to a payment card processor. A tokenization server at the payment card processor may generate a token corresponding to the primary account number. To secure the token, the token may be encrypted at the payment card processor using a cryptographic key shared with the merchant. A structure preserving encryption algorithm may be used in encrypting the token. A processor identifier may be embedded in the encrypted version of the token during the structure preserving encryption operation. The merchant can use the shared key to decrypt the token and extract the processor identifier. A settlement request may be directed to the processor from the merchant to settle the transaction using the processor identifier.12-13-2012
20120166344SECURE WIRELESS PAYMENT SYSTEM AND METHOD THEREOF - A secure wireless payment system and method thereof allow a consumer to acquire transaction information generated by a payment requesting unit of a seller with a handheld payment responding unit. The payment responding unit has a storage unit embedded with payment authentication data. After the consumer confirms that the transaction information is correct, a payment request is generated and transmitted to a banking unit releasing the payment authentication data through a secure wireless voice channel so that the banking unit can directly approve to pay. Accordingly, consumers need not present credit cards for sellers to charge and fully eliminate the risk of credit card piracy. Additionally, the payment responding unit of the present invention can be automatically connected with the banking unit releasing the payment authentication data for payment of a transaction.06-28-2012
20100205098E-MAIL LAUNCHED WEB TRANSACTION - A method includes receiving, at a processor, an e-mail including a description of an offer and a selectable indicia configured to indicate acceptance of the offer in response to actuation of the selectable indicia. A browser is launched on a display coupled to the processor in response to actuation of the selectable indicia. An indication of acceptance of the offer to a transaction server in response to actuation of the selectable indicia is transmitted.08-12-2010
20090327143Method and apparatus to send cash to any person in the world - A method to send a monetary value corresponding to the value of a US dollar bill feed to a device operated by the person that want to send a cash to a friend or relative. In one embodiment of the invention, the person that wants to send monetary value to another person just places a phone call on the device described on this invention and during the conversation feeds one bill to the device which could be returned back if in few seconds there is no verification that a corresponding monetary value has been received by the other person, similarly additional bills could be fed to the device. To gain trust, the device could show the pictures of the recipient, sound bites and other information such as name, address, and account balance to mention some examples.12-31-2009
20090319433ELECTRONIC CURRENCY, ELECTRONIC WALLET THEREFOR AND ELECTRONIC PAYMENT SYSTEMS EMPLOYING THEM - Electronic currency consists of data in a form suitable to be stored in a user's data storage medium, comprising information on the data value, identification of each specific set of data or data point, and authentication information suitable to verify that said data has been generated by a specific Currency Issuing Authority (CIA). A method and a system for effecting currency transactions between two users over the Internet or other communication network are also described.12-24-2009
20120239580VIRTUAL ACCOUNT BASED NEW DIGITAL CASH PROTOCOLS - Virtual account based digital cash protocols employ two pairs of private and public keys. Each public key is certified separately and the protocols do not use any blind signature schemes. As a result, the virtual account based digital cash protocols provide strong protection of the user privacy by using two certified public keys instead of a blind signature. One pair of certified keys consists of one master user private key and one master user public key. A second pair of certified keys consists of one pseudonym user private key and one pseudonym user public key. The use of a master key pair and a pseudonym key pair circumvents the need for blind signatures. As a result, the proposed protocols do not require blind signatures and do not add additional overhead and security requirements necessitated by conventional blind signature schemes. The protocols use public key protocols, digital signatures and symmetric key protocols, which may be readily implemented in standard information security based systems based on cryptographic constructs. In addition, the protocols may be deployed in mobile, off-line, and on-line settings.09-20-2012
20120265690METHODS AND APPARATUS FOR CONDUCTING ELECTRONIC TRANSACTIONS - A system and method for conducting electronic commerce are disclosed. In various embodiments, the electronic transaction is a purchase transaction. A user is provided with an intelligent token, such as a smartcard containing a digital certificate. The intelligent token suitably authenticates with a server on a network that conducts all or portions of the transaction on behalf of the user. In various embodiments a wallet server interacts with a security server to provide enhanced reliability and confidence in the transaction. In various embodiments, the wallet server includes a toolbar. In various embodiments, the digital wallet pre-fills forms. Forms may be pre-filled using an auto-remember component.10-18-2012
20110047082Remote Electronic Payment System - The invention concerns a remote electronic payment system comprising an authentication device (02-24-2011
20110047081SECURE REPORTS FOR ELECTRONIC PAYMENT SYSTEMS - A system, device, and method for generating and transmitting secure reports or documents in a retail environment or payment system comprising both secure and unsecure portions, where users of the unsecure portions may require access to sensitive information stored by the secure portions for various purposes, such as reporting, accounting, or reconciliation.02-24-2011
20110161235SYSTEM AND METHOD FOR SECURING RF TRANSACTIONS USING A RADIO FREQUENCY IDENTIFICATION DEVICE INCLUDING A RANDOM NUMBER GENERATOR - A system and method for securing a Radio Frequency (RF) transaction using a RF identification device (RFID) transaction device is provided. The method includes a RFID transaction device including a random number generator for generating a random number. The random number may be used by an account issuer to verify the validity of a RFID transaction device or RFID reader communicating on the RF transactions network. The authorizing agent may receive the random number and compare the random number to a device validating code.06-30-2011
20120089521METHOD AND APPARATUS FOR BILLING PURCHASES FROM A MOBILE PHONE APPLICATION - A method and apparatus is provided for mobile communication device application user to purchase content or functionality for the application while in the midst of using it and without interrupting his user experience. In an embodiment, the user's mobile carrier subscriber account is billed directly for the purchase. The method includes receiving a request for the purchase from the communication device application, where the request includes information about the amount of the purchase. Further, the method includes sending a confirmation request to the communication device. On receiving the confirmation, authenticating the communication device at the public mobile operator network of the communication device. Finally, the method includes providing access to the purchased content or functionality on or in conjunction with the communication device.04-12-2012
20110276496SECURE PROTOCOL FOR TRANSACTIONS - A secure protocol for transactions, such as electronic commerce transactions, is described that provides improved security through exploiting an independent (where this independence is logical and/or physical) communication path (e.g., between a customer and a back-end financial institution), ensuring that key financial information remains within the back-end financial institutions themselves. Hence, this protocol directly reduces cyber-crime risks through improvements to transaction security. In addition, various implementations of the secure protocol provide non-repudiation for one or more of the entities involved in the transaction.11-10-2011
20120330846DYNAMIC ELECTRONIC MONEY - The invention concerns a method of making an electronic payment by an electronic payment device comprising: transmitting from said electronic payment device (12-27-2012
20100198733Enabling Payment Using Paperless Image Of A Check - Payment or financial transactions are facilitated between two parties by utilizing mobile devices. A payor's mobile device may be adapted to generate an electronic/paperless version or image of a check. The payor may make the paperless image of a check out to a particular payee so that it can be cashed from the payor's checking account. The electronically-generated check may be in the form of an image than can be transmitted by the payor's mobile device to the recipient's mobile device. The payee then submits the received check, electronically or in paper form, to a financial institution for redemption.08-05-2010
20130013516SOCIAL NETWORK FINANCIAL PORTAL - A financial portal is provided which allows the transfer of funds between “friends” within a social network application.01-10-2013
20130018800Secure Authorization of a Financial Transaction - Embodiments herein include a method implemented by a client device used by a consumer to securely conduct a financial transaction. The method includes generating a unique message digest by applying a cryptographic hash function to payment information uniquely associated with the consumer. The method also entails encrypting the unique message digest using a public key of a public-private key pair uniquely issued to the consumer, to obtain an encrypted digest. Finally, the method includes encrypting the encrypted digest and an index value using a symmetric key, to generate a card number to be sent to an authorization server for authorization of the financial transaction. This index value maps at the authorization server to the private key of the public-private key pair and to the payment information.01-17-2013
20110246373PAYMENT MANAGEMENT ON MOBILE DEVICES - Embodiments of techniques and systems for asynchronous offline bill review and payment are described. A bill payment management module, operated on a manageability engine on a mobile device, communicates with an online bill payment service. The bill payment management module may receive information about bill payments, including bills which are due, and presents selective information to a bill payment client application. A bill payer can then access the information on the mobile device through the bill payment client application and review or change the payment amounts. The review and the modifications may be performed when the mobile device is offline and the modifications may be stored until a later time when the mobile device can connect to a network. Once a network is available, the bill payment management module may send payment instructions to the online bill payment service. Other embodiments may be described and claimed.10-06-2011
20110246372SYSTEM AND METHOD FOR POINT-TO-POINT ENCRYPTION WITH ADJUNCT TERMINAL - A system for point-to-point encryption is provided. A card reader system reads unencrypted card data stored on a magnetic stripe of a card and encrypts the card data, the card reader system being contained in a first housing. A point of sale device coupled to the card reader system and contained in a second housing separate from the first housing has a user interface for obtaining a transaction amount. A transaction request system transmits the transaction amount and the encrypted card data to an authorization gateway, wherein the unencrypted card data is prevented from being processed by the point of sale device.10-06-2011
20090024533Payment systems and methods - In one embodiment the present invention includes a payment system for a commercial transaction. The payment system includes an account server that a consumer accesses using the consumer's mobile telephone number. The account server updates the consumer's account and the merchant's account according to the transaction. The account server sends a confirmation directly to the consumer's mobile telephone.01-22-2009
20130124425System and Method for In-Band Transaction Verification - Various embodiments of a system and method for in-band transaction verification are described. The system and method for in-band transaction verification may include a transaction verification component. The transaction verification component may be configured to provide a transaction confirmation request that includes one or more machine readable resistant security media objects to indicate one or more transaction details for a transaction as well as a confirmation code for confirming the transaction. The transaction verification component may also be configured to receive a response to the confirmation request, such as a response from the user that submitted the transaction request. If the response includes a response code that is the same as the confirmation code, the transaction verification component may complete the transaction. If the response includes a response code that is different than the confirmation code, the transaction verification component may abort the transaction.05-16-2013
20080201267Remote product ordering using mobile phones - Systems and methods for placing and fulfilling orders for products that include visual content using a mobile telephone. An image processing operator provides a unique authenticator in return for a monetary payment. A user of the system provides a message that includes a digital image with an order indicator, a delivery address and the unique authenticator. The image processing operator extracts the message components and checks the validity of the authenticator. If the authenticator is valid, the image processor generates the desired image that includes at least a portion of the digital image and a portion of another digital image to produce a completed product. The completed combined image can be provided as any of a digital image, a printed image, and an image rendered on a physical object. The completed product is sent to the user or to a third party as the user directs.08-21-2008
20110225093Depository-Based Security Trading System - A system for protecting individuals (including institutions) involved in securities transactions has been created that utilizes an “independent” depository as an intermediary between a security owner and a brokerage firm. The inclusion of a depository is considered to protect the security owner from untoward actions on the part of the brokerage firm. The depository is used to “hold” the securities behalf of the owner. The security owners and brokerage firms must be registered with the depository and maintain accounts with the depository. All transactions involving the securities are still performed by the broker, but the requests are transmitted from the security owner to the depository, and the depository then relays messages regarding the transactions to the broker. Thus, the securities are only in the possession of the broker on a transaction-by-transaction basis.09-15-2011
20130151419Merchant Verification of In-person Electronic Transactions - Validation data, such as an image selected by a merchant, is rendered on a mobile device of a customer to provide the merchant confirmation that payment for an item submitted through the mobile device of the customer was in fact received by the merchant. The merchant may establish an account on a network-accessible computing device (e.g., in the “cloud”) that includes the validation data. The customer authorizes payment to the merchant from the mobile device using the network connectivity of the mobile device. When the payment is received by the merchant, the network-accessible computing device sends the validation data to the customer's mobile device. The merchant may be confident that he or she has in fact received an electronic payment from the customer when the validation data is presented on the mobile device. Techniques to prevent reuse and copying of the validation data are also discussed.06-13-2013
20120023026MOBILE WALLET AND DIGITAL PAYMENT - The claimed subject matter provides a system and/or a method that facilitates securing a wireless digital transaction. A terminal component can receive a portion of data related to a payment for at least one of a good or a service. A mobile device can include at least one mobile payment card (m-card), wherein the m-card is created by establishing a link to an account associated with a form of currency. The mobile device can employ public-key cryptography (PKC) to securely and wirelessly transmit a payment to the terminal component utilizing the m-card and linked account.01-26-2012

Patent applications in class Transaction verification