Entries |
Document | Title | Date |
20080228655 | Secure Payment Method and System on Network and Route Server - A payment system on network provides a platform based on the existing various transaction modes so that the current transaction modes can be operated on the secure payment platform which the present invention provides. The current transaction modes has the following kinds: a free process mode of the acquirer institution, a direct authentication mode of the card issuing institution, a secure input mode of the bank union and the other patent mode which the bank applies. The secure payment system can solve the technology disadvantage that the existing transaction flow is disorder and the resource is waste. The method of the present invention not only can be realized and its security is high, but also can achieve the less consumed time and the high transaction success using the existing private network. If the present invention has not received the transaction process result within the preset time, the acquirer subsystem puts forward a request for inquiring and notifies the inquired result of the merchant, thereby the difficulty of the following clear is reduced. | 09-18-2008 |
20080249951 | SECURITY SYSTEMS AND METHODS FOR DIGITAL PAYMENTS - The present invention provides security mechanisms for digital payments, such as a digitally originated check (DOC). The security mechanisms prevent fraud, tampering, counterfeiting, and the like of a digital payment. In an exemplary embodiment, the present invention utilizes an electronic payment system (EPS) to provide DOCs which can be utilized as Check 21 items, and which include the security mechanisms described herein to provide superior security over existing paper check-based mechanisms. | 10-09-2008 |
20080255995 | POINT OF DELIVERY/SALE SIGNATURE CAPTURE SYSTEM AND PROCESS - A device, system and method for the collection and management of point of delivery/sale information. A device is described that combines transaction data and a captured signature into the same file or data packet for storage in a database. Additionally, a system and method are described for using the device to record point of sale/delivery data, associate the recorded point of sale/delivery data with relevant transaction data, save the point of sale/delivery data and the transaction data into the same file, and store the image file in a database for later retrieval. | 10-16-2008 |
20080270312 | TAXONOMY EXTENSION GENERATION AND MANAGEMENT - Systems and methods of establishing a standardized financial data model may include financial document management system. The financial document management system may receive a credential from a user and may authenticate the user based on the credential to permit access to the system. The financial document management system may further receive a financial taxonomy extension corresponding to a financial reporting item from the first user and a financial taxonomy decision regarding the received financial taxonomy extension from a taxonomy standardization system. After receiving the decision, the financial document management system may determine whether the financial taxonomy extension may be approved and/or rejected based on the received financial taxonomy decision. If approved, the financial document management system may add the received financial taxonomy extension to a financial data model. | 10-30-2008 |
20080294563 | Multipurpose Electronic Payment Method and System - The invention relates to multipurpose electronic payment method and system. The inventive method consists in transmitting (A) from a multimedia terminal (TM) a payment order (MP) issued from at least one multimedia application hosted in the (TM) to a local proxy for payment (PP), in discriminating (B) said payment order in (PP) upon a specific local processing criterion respectively remote, in carrying out (C) a local payment upon the retained local payment specific criterion, if not in transmitting (D) the payment order to a remote system (SD) for carrying out a remote payment. Said invention is usable for proximity payment transitions, external payment or for electronically carrying out a telepayment. | 11-27-2008 |
20080306876 | VERIFYING DYNAMIC TRANSACTION SECURITY CODE IN PAYMENT CARD SYSTEM - A method includes receiving an authorization request for a purchase transaction. The method further includes determining (a) whether the purchase transaction is eligible for security code checking based on whether an account number included in the authorization request is in an eligible account number range, and (b) whether a transaction security code included in the authorization request is valid. The method also includes relaying the authorization request to an issuer financial institution with an indication as to whether the transaction security code is valid. Alternatively, the method may include declining the transaction when the security code is found to be invalid, and sending an advice message to the issuer regarding the declined transaction. In this alternative, the authorization request is relayed to the issuer only if the security code is found to be valid. | 12-11-2008 |
20080306877 | Secure Internet E-Commerce - A secure Internet based website electronically facilitating Internet entry of an account-owner to a pre-registered account on the secure Internet based website; escorting the owner to a merchant Internet site and therewith transmitting to the merchant site a one-time password, wherein said one-time password is thereafter identifiable by the secure Internet based website; receiving an invoice from the merchant Internet site wherein said invoice includes the one-time password; validating the one-time password; and presenting the invoice to the account owner. Now, if the secure Internet site receives an invoice approval from the owner, then the secure Internet site electronically providing the merchant Internet site with payment and delivery details necessary to complete a commercial agreement between the owner and the merchant wherein said agreement corresponds to specification, terms, and conditions associated with the invoice. | 12-11-2008 |
20080319915 | BIOMETRIC IDENTIFICATION DEVICE AND METHODS FOR SECURE TRANSACTIONS - The invention is directed towards methods, systems and apparatuses, see FIG. | 12-25-2008 |
20090018964 | METHODS, SYSTEMS, AND COMPUTER PROGRAM PRODUCTS FOR PERFORMING A TRANSACTION IN WHICH A CERTIFIER PROVIDES IDENTIFICATION INFORMATION FOR AUTHENTICATING A CUSTOMER AT THE POINT OF SALE - An electronic device performs a transaction by providing purchaser information for communication to a certification facility, receiving identification information associated with the purchaser from the certification facility, and completing the transaction responsive to authentication of the user of the electronic device as being the purchaser based on the received identification information. | 01-15-2009 |
20090037340 | Digital certification method and apparatus - A document is recorded with authenticity certification information by receiving an indication that a client is prepared to indicate acceptance and/or receipt of a proposed set of documentary content elements. A visual display of the documentary content elements is presented. An actuatable acknowledgment mechanism and a field for receipt of account information is presented. The actuation of said actuatable acknowledgment mechanism is detected and the account information is transmitted to an account provider. Asymmetric key pairs from one or more items associated with the account are generated. A digital certificate derived from one or more items associated with the account is generated. | 02-05-2009 |
20090076967 | COMPLETELY ANONYMOUS PURCHASING OF GOODS ON A COMPUTER NETWORK - The present invention discloses a system for the anonymous purchase of goods. A Customer requests to purchase some physical goods, the Vendor determines the cost of the goods, and asks the Customer to select a Carrier. The Vendor requests a Customer Token and redirects the Customer's browser to the Carrier, with the Customer Token, a Vendor Token and a description of the package. The Carrier validates the Vendor's Token and uses the Customer's token to request information about the Customer, including shipping instructions. The Carrier assigns a shipping identifier and shipping cost and redirects the Customer's browser back to the Vendor along with the identifier and shipping cost. The Vendor adjusts the cost to include shipping, packages the goods, and labels the packages with the shipping identifier. The Carrier picks up the packages, prints a complete label using the Customer information associated with the shipping identifier and delivers the goods. | 03-19-2009 |
20090089215 | System And Method For Consumer Protection - A method for combating website spoofing can be used in connection with a website for a financial institution accessible by a plurality of users. Registration information is stored for a user having a financial account with the financial institution, including user login information and customization information for a website associated with the financial institution. A marker is issued, to be stored on a computer used by the user to access the website. At some point, a request is received from the user to display a webpage of the website on the computer, and the user is recognized based on the marker. A webpage is then provided to the computer, having an interface with an attribute customized according to the customization information. The user login information is entered via the website. Upon receiving the user login information, the user is provided access to the financial account. | 04-02-2009 |
20090119221 | System and Method for Cryptographically Authenticated Display Prompt Control for Multifunctional Payment Terminals - This disclosure provides various embodiments of systems and methods for secure communications. In one aspect, the system for secure communications in a retail environment comprises a first display for presenting content to a customer, a first secure payment module comprising a first data entry device and a first secure processor, and a first controller. In some instances, the first controller is communicably coupled to the first display and the first secure payment module. Additionally, the first controller may be adapted to authenticate the first secure payment module, establish a secure communications link between the first controller and the first secure payment module, receive a first source of content, provide a portion of the content to the first display, and selectively enable or disable the first data entry device. | 05-07-2009 |
20090119222 | E-Bazaar featuring personal information security - Utilization of the E-Metro Community and Personal Information Agents assure an effective and comprehensive agent-rule based command and control of informational assets in a networked computer environment. The concerns of informational privacy and informational self-determination are addressed squarely by the invention affording persons and entities a trusted means to author, secure, search, process, and exchange personal and/or confidential information in a networked computer environment. The formation of trusted electronic communities wherein members command and control their digital persona, exchanging or brokering for value the trusted utility of their informational assets is made possible by the invention. The present invention provides for the trusted utilization of personal data in electronic markets, providing both communities and individuals aggregate and individual rule-based control of the processing of their personal data. | 05-07-2009 |
20090132425 | METHODS AND SYSTEMS FOR FINANCIAL TRANSACTION CARD SECURITY - A financial transaction card having a front side and a back side is provided and further includes a magnetic strip configured to retain data associated with a financial transaction card account, where the account is associated with the card, and a character grid printed on one of the front side and the back side. A method for securing transactions that are not made in person utilizing a financial transaction card are also provided. | 05-21-2009 |
20090157558 | INFORMATION HOME ELECTRIC APPLIANCE - By performing initial user registration via an SSL-compliant browser in an information home electric appliance | 06-18-2009 |
20090171852 | Method and System for Providing Secure Processing of Electronic Transactions - Disclosed is a method and system for providing secure processing of electronic transactions for customers. Each customer maintains at least one payment account for use in the electronic transactions. The method includes processing a first electronic transaction. The first electronic transaction is processed using a payment account of the at least one payment account. Further, the method includes generating a transaction code for the first electronic transaction that is capable of identifying the payment account used for processing the first electronic transaction. Furthermore, the method includes processing a second electronic transaction for the customer using the transaction code on selection of the payment account. A transaction code is generated for each electronic transaction subsequent to the first electronic transaction. Further, each transaction code is used to process an electronic transaction processed subsequent to the generation of the each transaction code on selection of the payment account by the customer. | 07-02-2009 |
20090240627 | PAYMENT PROCESSING SYSTEM TRUSTED AGENT IDENTIFICATION - Compliance with data security requirements is determined for an agent that processes transactions for merchants. An authorization request received from the agent for a transaction on an account that includes a bank identification number (BIN) licensed to an acquirer and an agent unique account result (AUAR) for the agent. The AUAR is valid when a primary account number (PAN) corresponding to the account and an agent identifier can be derived from the AUAR. The AUAR is invalid when the PAN lacks such correspondence or when the agent identifier lacks uniqueness among other agent identifiers. The acquirer receives the identify of the agent and the BIN when the AUAR is invalid, when the agent isn't registered to use the BIN, and when the agent identifier is invalid. When the agent is not registered to use the BIN, the acquirer will be informed. | 09-24-2009 |
20090248583 | DEVICE, SYSTEM, AND METHOD FOR SECURE ONLINE TRANSACTIONS - A device, system, and method for providing an Internet webpage using a primary operating system for conducting an online transaction and for providing an interface associated with the Internet webpage using a secondary operating system. The data entered by a user into the interface may be inaccessible to the primary operating system. The secondary operating system may verify the data entered by the user, for example, by comparing the entered data with secret data. The secret data may correspond to an account. The secret data may be stored in a hardware location of a computing device. When the data entered by the user is verified, a request may be transmitted to a server associated with the account. In response to the transmitting, a transaction specific code may be received for completing the online transaction. Other embodiments are described and claimed. | 10-01-2009 |
20090259593 | ELECTRONIC COMMERCE METHOD, ELECTRONIC COMMERCE SYSTEM, CERTIFICATE TERMINAL, AND PRINCIPAL CERTIFICATION METHOD BY AGENT - In order to prevent without fail the abuse of certificate information which are exchanged on a network, an orderer inputs the certificate information to a certificate terminal when placing an order for a commodity, the certificate terminal encrypts the certificate information to send it to an order receiver and holds the certificate information and a decryption key. A deliveryman, at the time of commodity delivery, inputs the encrypted certificate information to the certificate terminal, and the orderer inputs data of terminal certification to the certificate terminal. The certificate terminal, when it certifies by the data that the orderer is the valid owner of the certificate terminal, decrypts the encrypted certificate information input by the deliveryman, by the decryption key in the certificate terminal, verifies decrypted certificate information with the certificate information in the certificate terminal, and the deliveryman hands over the commodity to the orderer when the certificate information match. | 10-15-2009 |
20090299905 | Web enabled color management service system and method - The present application discloses a system and method of critical web-based service architecture at a high level for color management systems in which services can be rendered remotely at very low cost to the end user using a cloud computing based computer network architecture. Service supported include Remote RIPPing, remote profiling, remote IQ analysis for diagnosing color problems, Remote System Problem Action Requests (SPAR) evaluation and patch distribution, remote copy match solutions; multi-machine matching; remote Half-tone downloads; other remote file processing; and image or photo indexing and retrieval. | 12-03-2009 |
20090319435 | SECURE TRANSACTION PERSONAL COMPUTER - A personal computer is provided comprising a network communication interface configured to communicate with the Internet. The computer further includes a memory device configured to store information and computer-executable program code. The computer further includes a processor operatively coupled to the network communication interface and the memory device. The processor and the computer-executable program code are both configured to provide enhanced security features for safeguarding financial transactions conducted over the Internet and for safeguarding non-public information stored in the memory from being retrieved over the Internet by an unauthorized entity. The computer further includes indicia attached to the computer. The indicia is visible to a potential user of the computer and is configured to portray to the potential user of the computer that the computer is specifically designed and built to provide increased security for financial transactions handled over the Internet. | 12-24-2009 |
20100005029 | Risk management workstation - A system, method, and computer-readable storage medium configured to import fraud prevention rules from an issuer and implement them in real-time at a payment processor. Usually, a card issuing bank either approves or declines financial transaction; however, in embodiments of the present invention, the issuing bank creates fraud prevention rules, and the payment processor implements the created rules. A payment processor apparatus comprises a network interface, and a verification engine. The verification engine includes a transaction driver, and a real time decisioning processor. The network interface is configured to receive a fraud prevention rule from a payment card issuing bank, and to receive a proposed financial transaction from an acquiring bank. The transaction driver receives the fraud prevention rule. The real time decisioning processor compares the proposed financial transaction from the acquirer and the fraud prevention rule to determine whether the proposed financial transaction should be declined. | 01-07-2010 |
20100017336 | ACCOUNT DETERMINATION USING GOVERNMENT-ISSUED IDENTIFICATION DEVICE - A system may include reading of information from a government-issued identification device and determination of a commercial account number based on the information. A payment may be processed using the commercial account number. In some aspects, the information identifies a holder of the government-issued identification device and the commercial account number is a temporary account number associated with the holder. Determination of the commercial account number may include determination of a plurality of commercial account numbers based on the information, and determination of the commercial account number from the plurality of commercial account numbers. | 01-21-2010 |
20100030698 | SYSTEM AND METHOD FOR VERIFYING A USER'S IDENTITY IN ELECTRONIC TRANSACTIONS - In an electronic transaction, the invention provides a process and system for blocking a user's account until a verifier verifies the identity of the user. The process comprises pre-enrolling the user and the user's personal communication device. Optionally, one or more of the user's accounts are enrolled. | 02-04-2010 |
20100036774 | Method for User Registration with a Proxy for Further Work with One of the Server Units - The invention relates to digital data processing to be used in commercial application. A method for user registration with a proxy for further work with one of the server units comprises an establishing a protected link by a proxy between a user registration control bank server (UR) via the bank's processing center with respective remote banking or financial user card serving terminals (UCST), link of the bank's issued card database server (BICD) with the bank's processing center, and between the user registration control bank server (UR) and at least one of the server units, herein the user get at least one set of code symbols after registration, which is also sent to at least one of the server units for further user identification in it in case of his requesting said server unit, the user is registered and given at least one set of code symbols at a respective remote banking or financial user card serving terminals (UCST) in which the card's details are entered for further verification at the bank's issued card database server (BICD), and the user registration control bank server (UR) immediately transmits the user registration details to the respective server unit. Alternatively registration with the use of the BICD server of a respective bank card issuer is performed. | 02-11-2010 |
20100057624 | CAR WALLET APPLICATION - Embodiments of the disclosure generally relate to systems and methods for processing electronic payments for retail services and goods delivered by a retail establishment. In embodiments, a mobile wallet application is installed in the automobile. The automobile wallet application can receive and/or send transaction and payment information over a near field communication system to a retailer and on to an authorizing authority. The authorizing authority receives the payment and transaction information, authorizes or declines the payment of the transaction, and forwards the authorization or declination to the automobile wallet application. If authorized, the retailer provides the retail good or service. | 03-04-2010 |
20100063932 | Forming Credentials - Techniques are disclosed for issuing inoperative credentials, and making the inoperative credential operative at a subsequent point in time. For example, an inoperative credential is made valid when a triggering event occurs qualifying or entitling the inoperative credential holder to the operative credential. Using methods and apparatus of the invention enables issuing inoperative credentials, as well as any operative credential, at the time that an electronic identity card is issued. Operative and inoperative credentials are issued only once. Therefore, electronic identity cards do not need to be reissued at a later time to add, remove or change credentials, thus eliminating costs associated with electronic identity card reissue. An embodiment of the invention is a method of forming a credential. The method comprises the step of forming, at a first point in time, an inoperative credential. The inoperative credential is adapted to become operative, at a second point in time, to form an operative credential. The second point in time occurs after the first point in time. | 03-11-2010 |
20100100486 | USER TERMINAL AND WIRELESS ITEM-BASED CREDIT CARD AUTHORIZATION SERVERS, SYSTEMS, METHODS AND COMPUTER PROGRAM PRODUCTS - Credit card transaction authorization is performed using ad-hoc, short-range wireless links to obtain item identification information from items that include ad-hoc short range wireless link transmitters and that are carried by a user who is associated with a prospective credit card transaction. Authorization information for the prospective credit card transaction is generated based on the item identification information that was obtained. Location information for a wireless terminal that is associated with the user and/or Internet Protocol (IP) address information for a transaction terminal that is associated with the transaction may also be used. Related systems, devices and computer program products are also described. | 04-22-2010 |
20100145861 | PAYMENT TRANSACTION PROCESSING FOR MOBILE COMPUTING DEVICES - A server computer system comprises a memory and a processing circuit. The memory is configured to store supplier identifiers for a plurality of product suppliers. The processing circuit is configured to receive a request to make a payment from a mobile computing device via a wireless communication, to select a supplier identifier from the memory based on the request, to generate a message comprising the supplier identifier, transaction amount, and a user identifier identifying a user of the mobile computing device, and to transmit the transaction message to a server associated with an entity which processes a transaction based on the transaction message. | 06-10-2010 |
20100235286 | METHOD AND SYSTEM FOR GENERATING TOKENS IN A TRANSACTION HANDLING SYSTEM - A method and system for generating tokens in a transaction handling system comprising creating at least one token on at least one server in the transaction handling system, the at least one token having a user-defined value and a plurality of data fields, each of the data fields representing data stored on the at least one server, acquiring the at least one token from the at least one server over a first communication network, and transmitting from a sending device the acquired at least one token to at least one receiving device over a second communication network. | 09-16-2010 |
20100250443 | METHOD AND APPARATUS FOR PROVIDING ONLINE PAYMENTS - An approach is provided for making and handling online payments. An indication that information identifying a bill is available is received. A user credential associated with the bill is retrieved. A request for the bill is generated, wherein the bill includes the user credential and the information. A bill authorization message is then generated. | 09-30-2010 |
20100299267 | DEVICE INCLUDING ENCRYPTED DATA FOR EXPIRATION DATE AND VERIFICATION VALUE CREATION - In order to make it more difficult to obtain numbers that can be used to conduct fraudulent transactions, a portion of a real account number is encrypted. The encrypted portion of the account number is used to generate a new account number, a new expiration date, and a new verification value. This information can be determined using processor that may reside in a point of sale terminal, a smart card, or a computer operated by a user. The new account number, the new expiration date, and the new verification value can be used in a payment transaction. A server computer in a central payment processing network may determine that the new account information is not the real account information, and may subsequently generate a modified authorization request message using the real account information and may send it to an issuer for approval. The transmission of data is more secure, since real account information is not sent from the merchant to the payment processing network. | 11-25-2010 |
20100306113 | SMARTCARD INTERNET AUTHORIZATION SYSTEM - A system and method are disclosed for conducting electronic commerce such as a virtual purchase transaction with an on-line merchant. A user is provided with an intelligent token, such as a smart card containing a digital certificate. The intelligent token suitably authenticates with a wallet server on a network that conducts all or portions of the transaction on behalf of the user with out requiring changes to the merchant's server. The wallet server interacts with a security server of a selected financial service to provide authentication of the transaction. Upon authentication, the digital wallet pre-fills forms which are transmitted to the merchant who contacts the security server for validation of the forms and upon validation, completes the transaction with the user. | 12-02-2010 |
20110264587 | SECURING PAYMENT DATA - The claimed subject matter relates to an architecture or arrangement that can limit access to sensitive information by means of encryption. In particular, data obtained from a payment instrument at, e.g., a Point-Of-Sale (POS) location can be encrypted at an early stage such that a POS (or another) application does not have access to the data in an unencrypted form and/or does not have access to a means for decrypting the data. For example, a Public Key Infrastructure (PKI) arrangement can be employed such that a back-end payment processor can define encryption algorithms, associate itself with a public key, and maintain a private key for decryption. The public key can be delivered to the POS location and employed for data encryption, and, moreover, the PKI can be regulated by the more trusted parties. | 10-27-2011 |
20110289005 | METHOD AND APPARATUS FOR EXECUTING CRYPTOGRAPHICALLY-ENABLED LETTERS OF CREDIT - A method and apparatus for executing electronic transactions using cryptographically-enabled accounts stores cryptographically-enabled account information and instructions, receives a cryptographically-encoded permission certificate, and processes the received permission certificate to execute the transactions. | 11-24-2011 |
20120089522 | Service Management System and Method - The delivery of services is managed by a system that includes a portable device and a management apparatus which receives and decrypts a first identifier generated and encrypted by the portable device. One of the devices also digitally signs a second identifier, which is validated at the other device. | 04-12-2012 |
20120150750 | SYSTEM AND METHOD FOR INITIATING TRANSACTIONS ON A MOBILE DEVICE - Systems and methods are provided for providing a more seamless purchasing experience using a mobile device. The mobile device acquires data, such a barcode image, an image of an object or text, or audio data. A non-limiting example of a barcode is a Quick Response (QR) barcode. The acquired data is then used to obtain a network address of a payment website or webpage, which allows a user to make a purchase for a given product or service. The mobile device then launches the payment website or webpage. A user can enter into the mobile device, through the payment website or webpage, a supplemental ID used for authenticating the transaction. | 06-14-2012 |
20130031008 | AUTHENTICATING ELECTRONIC FINANCIAL TRANSACTIONS - To improve security and simplify financial transactions in electronic communications environments, a cryptographic Private Key is securely stored in a storage device of a user. A Public Key Certificate corresponding to the Private Key is also created and can be stored in an online repository for merchant access. The Public Key Certificate identifies a payment card of the user, and is signed by or on behalf of a financial institution issuing the payment card. When initiating a payment card transaction with a merchant, a data item is signed using the Private Key. The signed data item and the Public Key Certificate are conveyed to the merchant, which enables the merchant to authenticate the transaction without needing to communicate with the user's financial institution, and while avoiding the inconvenience and privacy issues associated with obtaining other card details and user details. | 01-31-2013 |
20130080334 | PAYMENT SYSTEM FOR HANDHELD DEVICE AND METHOD - A payment method includes: inputting identity information and a password through a handheld device, comparing the identity information and the password through a host server to determine whether the customer is an authorized user, encrypting the identity information to generate authentication information, generating a barcode which includes the authentication information and a deadline for use, acquiring the barcode on the handheld device, decoding the barcode by a barcode reading unit of a point of sale device, inputting a price the customer wants to pay, decrypting the authentication information to obtain the identity information, comparing the identity information decrypted to determine whether the identity information is correct, and transmitting a success notification to the point of sale device for indicating that the payment is completed. | 03-28-2013 |
20130110729 | System, Device and Method for Secure Handling of Key Credential Information Within Network Servers | 05-02-2013 |
20130144794 | SYSTEM AND METHOD FOR MULTI-USE IDENTIFICATION DEVICE - A multi-function identification device (ID) provides identifying information for the person to whom the ID was issued, as well as providing machine readable indicia for conducting a transaction. The ID may be a card issued by a government agency such as a driver's license or identification card. The transactions may be conducted with one or more accounts or value amounts identified using the machine readable indicia. Credit, debit and pre-paid accounts can be accessed for transactions using the machine readable indicia. Value amounts can be read and modified using this enhanced card that implements the machine readable indicia. The user can select the functionality to be added to the ID, which can optionally be used in conjunction with the identifying information to help verify identification. The machine readable indicia can be integrated in a new ID, or applied to an issued ID using an appliqué. | 06-06-2013 |
20130173477 | Storing and forwarding credentials securely from one RFID device to another - Storing and forwarding credentials securely from one RFID device to another includes a system and method of securely storing credentials onto a tamperproof module with a Poken-like Device, and using that device in connection with a Padloc, iPhone or Smartphone in a known paired relationship to securely provide a user credentials for resources the Padloc, iPhone or Smartphone applications are attempting to access. | 07-04-2013 |
20130185214 | System and Method For Secure Offline Payment Transactions Using A Portable Computing Device - Disclosed is a system and method that provides a merchant associated with a point of sale (“POS”) system and a consumer associated with a portable computing device (“PCD”) to complete a purchase transaction without transmitting or presenting confidential payment credentials. In an exemplary embodiment, sound is used to transmit data between the POS and the PCD. A payment request is rendered on the PCD. The consumer reviews and authorizes via a unique cryptographic signature. The merchant approves via addition of its unique cryptographic signature. A remote service in communication with the POS verifies the signatures via previously registered public keys. The transaction is then settled to a consumer account. Confirmation is returned to the POS and PCD. Advantageously, the transaction is commenced and completed without the PCD being online. Further, the consumer payment credentials are not stored on the PCD or transmitted from the PCD to the merchant POS system. | 07-18-2013 |
20130246282 | TRANSACTIONAL SECURITY OVER A NETWORK - A system and method facilitating purchase transactions over a computer network, including the purchase of electronically storable items. The embodiments herein encrypt “customer identifier string” in an encryption stream and cause the encryption stream to be transferred from the customer to a merchant in the purchase transaction. A verification entity receives the encryption stream which is sent by the merchant for identity verification and payment authorization. Then, the verification entity verifies the identifiers contained in the encryption stream and transfers an identity verification and payment authorization from the verification entity to the merchant. | 09-19-2013 |
20130346320 | REGULATION COMPLIANT DATA INTEGRATION FOR FINANCIAL INSTITUTIONS - A method to access financial data. The method includes redirecting, by a computer processor and based on an input of a user, the user to a website of a financial institution (FI), wherein the user submits a request via the website to access the financial data, obtaining, in response to the user submitting the request, a token identifying the request, identifying, by the computer processor, a financial data structure in a remote repository based on the token, wherein the FI stores a financial data record in the financial data structure in response to the request, and retrieving, without user intervention, the financial data record from the financial data structure, wherein the financial data record is used by a financial management application to prepare a financial management report for the user. | 12-26-2013 |
20140025585 | DISTRIBUTING AUTHORIZED TOKENS TO CONDUCT MOBILE TRANSACTIONS - Token rules that facilitate determining whether to generate a token for use in a mobile transaction are stored in a memory. The memory also stores token criteria associated with a user. A processor, communicatively coupled to the memory, accesses the token rules and determines whether to generate the token by applying at least a portion of the token rules to the token criteria associated with the user. The token is generated upon a determination to generate the authorized token, and the token is generated before the mobile transaction begins. An interface, communicatively coupled to the processor, communicates the token to a mobile device associated with the user. | 01-23-2014 |
20140074726 | ELECTRONIC PAYMENT METHOD, SYSTEM, AND DEVICE - Disclosed are an electronic payment method, system and device wherein, in a process for executing an electronic payment, a user's login information is verified in order to determine whether or not the user is a customer having excellent connection frequency, and then the buyer's payment means information and/or preferred payment means information is provided on the basis of the result of the determination, and thus the buyer is able to execute the payment in a more convenient manner. | 03-13-2014 |
20140172723 | POWER LINE COMMUNICATION OVER DISCONNECTED SERVICE LINES - A network communication device, such as an electricity meter, is configured to communicate with devices on a circuit internal to a site via power line communication (PLC), even when electricity service to the site is disconnected. The network communication device is configured to monitor one or more circuits internal to the site and to receive power line communications from the device(s) coupled to the circuit internal to the site when the site is disconnected from electricity service. A PLC module of the network communication device may include a switch-based or capacitor-based monitor that maintains a PLC coupler electrically connected with the circuit internal to the site even when electricity service to the site is disconnected. | 06-19-2014 |
20140172724 | CONDUCTING TRANSACTIONS WITH ELECTRONIC CREDENTIALS - A novel system and methodology for conducting financial and other transactions using a wireless device. Credentials may be selectively issued by issuers such as credit card companies, banks, and merchants to consumers permitting the specific consumer to conduct a transaction according to the authorization given as reflected by the credential or set of credentials. The preferred mechanism for controlling and distributing credentials according to the present invention is through one or more publicly accessible networks such as the Internet wherein the system design and operating characteristics are in conformance with the standards and other specific requirements of the chosen network or set of networks. Credentials are ultimately supplied to a handheld device such as a mobile telephone via a wireless network. The user holding the credential may then use the handheld device to conduct the authorized transaction or set of transactions via, for example, a short range wireless link with a point-of-sale terminal. | 06-19-2014 |
20140214689 | SYSTEMS AND METHODS TO FACILITATE PAYMENT OF SHIPPED GOODS - One method herein includes forwarding an invoice for a purchase agreement made between a seller and a buyer. The method includes receiving a service selection indicating that the invoice is to be paid using an escrow system. The service selection includes a token for verification of a buyer's signatory. The method receives funding confirmation that the buyer has deposited funds into an escrow account. Based on funding confirmation, notification to ship the goods is sent. The method receives shipping confirmation confirming that the goods have been shipped. Upon receipt of the goods, a receiver is authenticated as the authorized signatory using the verification system. This authentication is based on the stored token matching a provided token. Based on verification of the receiver, the goods are released and the deposited funds from the escrow account are deposited into the seller's account. | 07-31-2014 |
20140258136 | METHOD FOR IMPROVING SECURITY OF ONLINE TRANSACTIONS - The present invention provides a system, including a method and apparatus, for verifying, with a very high degree of certainty, the identity of an individual who desires to execute an online transaction for the purchase of goods or services. System function embodies a number of interconnected basic features. The first involves enabling a personal computerized device to be identified via user input data. The second involves the creation of a central, third-party identification database containing authentication information and having an authentication protocol. The third involves the provision of an individualized electronic certificate, which ties the identification of an individual computer or device user to the third-party identification database. The fourth involves the incorporation of the individualized electronic certificate in a particular individual computer or computerized device, which enables the establishment of the authentication protocol between the computerized device and the third-party website. | 09-11-2014 |
20140279566 | SECURE MOBILE PAYMENT USING MEDIA BINDING - A method for mobile payment includes generating, by a financial institution, a unique credential based on user access information and media binding information that is cryptographically bound to media using a unique media identification. The financial institution stores the credential and media binding information in the form of authentication code in a memory used by an electronic device. The stored credential and media binding information is accessed using the user access information for a payment transaction. A digital certificate is generated using the credential and media binding information. The digital certificate is presented to the financial institution for the payment transaction. The memory is authenticated and binding of the credential to the memory is verified prior to completing the payment transaction. | 09-18-2014 |
20140304173 | Methods and Systems for Keyless Vehicle Dispatch - A system for providing a driver, having a driver communication device, access to a vehicle using an electronic key, the system comprising a fleet control center, comprising an asset application and a database, configured to, allow creation of a reservation for the vehicle for the driver and store the reservation in the database, create a keyless asset tag to allow the driver to access the vehicle, communicate the keyless asset tag to the driver computing device, and a vehicle computing device, proximate to the vehicle, and configured to, obtain the keyless asset tag from the driver computing device, determine if the keyless asset tag is valid for the vehicle, and cause a vehicle door to be unlocked to provide the lessee access to the vehicle. | 10-09-2014 |
20140358796 | Methods and Apparatus for Performing Local Transactions - A method of performing a transaction using first and second computing devices is described. A local data connection is established between the first computing device and the second computing device. An amount to transfer is identified at either the first computing device or the second computing device. A first account is identified at the first computing device and a second account at the second computing device. Credentials are provided at the first computing device to authorize the transaction, and encrypted and authenticated transaction data is sent to a payer account provider for value transfer between the first account provider and a second account provider. Confirmation of the completed transaction is then provided to the first computing device and the second computing device. Suitable computer program products and computing devices are provided. This method is particularly effective for providing local person to person value transfers in real time. | 12-04-2014 |
20140358797 | SYSTEM AND METHOD FOR PRESENTATION OF MULTIPLE NFC CREDENTIALS DURING A SINGLE NFC TRANSACTION - A system for presentation of multiple NFC credentials via an NFC baseband in a portable communication device during a single NFC transaction. The system comprises a secure element having a directory of available NFC credentials stored therein, wherein the ordering of the available NFC credentials usually indicates the priority. The system further comprises a pre-determined multiple-credential start Application ID (AID) wherein the directory includes a plurality of NFC credentials after the pre-determined multiple-credential start AID. A method for presenting multiple NFC credentials during a single NFC transaction is also disclosed. | 12-04-2014 |
20140365376 | SYSTEM AND METHOD FOR TWO-CLICK VALIDATION - A method to enable transactions comprising transmitting, by a vendor server, a request message to the e-commerce system for a token. Receiving a token in response to the request message. Generating an offer message including a mailto hyperlink, wherein the offer message is an email message including a mailto hyperlink is configured to generate an email reply message include the token. Transmitting the offer message to an email address associated with the customer. Receiving a response message from the e-commerce system, the response message including transaction details that confirm the token was validated by the e-commerce system. Transmitting a payment processing request message to a payment processor, wherein the payment processing request is based on the transaction details. Receiving a notification from the payment processor, that payment processing has been completed. Transmitting an email message to the email address of the customer, that payment has been processed. | 12-11-2014 |
20140372323 | SYSTEM AND METHOD FOR CONVERSION BETWEEN INTERNET AND NON-INTERNET BASED TRANSACTIONS - A method is provided for completing an authenticated commercial transaction over an internet protocol (IP) network ( | 12-18-2014 |
20140379585 | ELECTRONIC SIGNATURE SYSTEM FOR AN ELECTRONIC DOCUMENT USING A PAYMENT CARD - A system for the advanced electronic signature of an electronic document by a user, wherein a signature certificate is held by a third-party Authority, provided to sign said electronic document, the electronic document comprising an authentication field adapted to contain a set of signature data (blob), the method comprising an authentication step of the user at said Authority, by means of a third-party authentication circuit such as a bank circuit and/or a mobile phone channel, an acquisition step of a unique identifier ID associated to the user by said third-party authentication circuit, and an input step of said unique identifier (ID) in said set of signature data by said Authority. | 12-25-2014 |
20150012444 | MOBILE PEER-TO-PEER AUTHENTICATED TRANSFERS - A peer-to-peer transaction security method includes authentication and identification steps for pushing an encrypted colorgram from a transaction server to a first personal trusted device. Such provides a visual key for user authentication. Persona descriptors may be included for user identification. A decryption of the colorgram is displayed on the first personal trusted device to be optically captured by a second personal trusted device. The image captured from the second personal trusted device is encrypted and uploaded to the transaction server. In some cases, the persona descriptors alone are used to build a composite rendering for identification of the first user by the second user. The second user clicks and returns an acceptance if they recognize the composite drawing as a reasonable persona of the first user. | 01-08-2015 |
20150019444 | Augmented Smart Tag Security Apparatuses, Methods and Systems - The AUGMENTED SMART TAG SECURITY APPARATUSES, METHODS AND SYSTEMS (“ASTS”) transform video and other media inputs of POS terminals and markers associated with tags and codes via ASTS components into ways to validate the POS security and instructions/restrictions regulating access to and action on the data stored in the tags and codes. In one implementation, the ASTS receives from a user's device identifying markers of smart tag enabled point of sale devices. Upon receiving the markers, in some implementations, the ASTS mayverify the security of the received smart tags and markers, and retrieve from the markers instructions and restrictions directed at the smart tag based transactions. In some implementations, the ASTS may provide authorization to the user device to proceed with the transaction according to the instructions and restrictions based on the security of the smart tags and the markers. | 01-15-2015 |
20150032636 | Dissociative Payment Transaction And Receipt System And Methods Of Using Same - A system for authorizing and facilitating payment transactions utilizing a payment device, a merchant terminal, and a payment server. The payment server generates unique, single-use payment credentials and provides the payment credentials to the payment device, which transfers the payment credentials to the merchant terminal. The merchant terminal submits the payment credentials and transaction request to the payment server, which facilitates the transfer of funds between the consumer and the merchant upon validation of the payment credentials. In an alternate use of the system, the payment device requests to open a running bill of charges with the merchant terminal. The payment device or the merchant terminal requests the payment server to close out the bill and finalize the charges. The payment server facilitates the transfer of funds between the consumer and the merchant. The payment server provides automated and manual accounting functions to both the consumer and merchant. | 01-29-2015 |
20150052066 | RECONCILING ELECTRONIC TRANSACTIONS - An apparatus, system and method for establishing a transaction between first and second parties including a first signing step in which a transaction message including a request and a transaction identifier is cryptographically signed by the first party to form a first cryptographically signed message. The first signed message is transmitted from the first party to the second party. The second party then cryptographically signs the first message to form a second cryptographically signed message. The second message is also transmitted from one or more of a plurality of parties having the second message to a trusted third party. The trusted third party is able to verify that the second message was cryptographically signed by the second party and can also verify that the first message in the second message was cryptographically signed by the first party. | 02-19-2015 |
20150073999 | METHOD AND SYSTEM FOR CONDUCTING A PAYMENT TRANSACTION AND CORRESPONDING DEVICES - A method includes generating a token at a server device and transmitting the token from the server device to a payer device, the token corresponding to a payment account; receiving the token at the payer device and transmitting the token from the payer device to a payee device via a short-range wireless communication protocol; receiving the token at the payee device and transmitting the token with transaction data from the payee device to the server device, the transaction data corresponding to the payment transaction; and receiving the token with the transaction data at the server device and conducting the payment transaction at the server device using the transaction data and the payment account corresponding to the token. | 03-12-2015 |
20150100499 | METHOD, APPARATUS, AND SYSTEM FOR PERFORMING WIRELESS TRANSACTIONS WITH NEAR-FIELD COMMUNICATION (NFC) SET UP - An apparatus, system and methodology for establishing a wireless communications link using a wireless device are provided. A computing device includes a wallet application for completing transactions based on wireless data communications between the computing device and at least one external electronic device. The computing device includes a short-range radio frequency (RF) transceiver to communicate with an external RF transceiver. A near-field communication (NFC) module includes a NFC antenna, and the NFC module is configured to transmit wireless setup information between the NFC antenna and a NFC reader in communication with the external electronic device based on the NFC antenna of the computing device being within a RF range of the NFC antenna of the NFC reader. A processor establishes a wireless communications link between the short-range RF transceiver and the external RF transceiver to initiate transactions between the computing device and the at least one external electronic device. | 04-09-2015 |
20150142672 | METHOD AND APPARATUS FOR CONDUCTING OFFLINE COMMERCE TRANSACTIONS - Methods and apparatus for conducting offline commerce transactions that use a barcode as the user ID as an alternative means for personal identification is described. The user ID represented in the bar code format referred to as the User ID Barcode is generated from a number that uniquely identifies the user. Such numbers as a cell phone number or a credit card number or other number that uniquely identifies user may be used to generate the User ID Barcode. The unique personal identifier, the User ID Barcode is expanded to include the Country Code of the country in which the issuing company is domiciled. | 05-21-2015 |
20150142673 | METHODS AND SYSTEMS FOR TOKEN REQUEST MANAGEMENT - Embodiments of the present invention are directed to methods and systems for providing a payment token issuance system using account issuer-defined payment token request rules generated and stored by a token issuer computer. The token issuer computer allows an account issuer to define payment token request rules, and the token issuer computer can automatically apply the payment token request rules to a payment token request without requiring additional decisioning by the account issuer. | 05-21-2015 |
20150317626 | SECURE PROXIMITY EXCHANGE OF PAYMENT INFORMATION BETWEEN MOBILE WALLET AND POINT-OF-SALE - A method for processing payment is disclosed. The method includes obtaining, by a point-of-sale (POS) device from a certification authority, a certificate data item that identifies the POS device for completing a purchase by a consumer, generating a payment request containing the certificate data item, broadcasting the payment request via a wireless signal within a pre-determined range of the POS device for receiving by a mobile device of the consumer, where the mobile device stores payment credential of the consumer, receiving, by the POS device, an encrypted payment credential from the mobile device, where the encrypted payment credential is generated by the mobile device encrypting the payment credential based on the certificate data item, and decrypting the encrypted payment credential based on the certificate data item to retrieve the payment credential for processing the payment. | 11-05-2015 |
20150324773 | SETTLEMENT SYSTEM, USER TERMINAL DEVICE, SALES SERVER, SETTLEMENT SERVER AND RECORDING MEDIUM - An example system includes: a sales server for performing sales processing pertaining to sales of a commodity; a settlement server for performing settlement processing pertaining to a commodity sold by the sales server in the sales processing; and a user terminal device having a communication unit configured to communicate with the sales server and with the settlement server via a network and an operation acceptance unit configured to accept operation pertaining to purchase of the commodity. The user terminal device has: a settlement request relay unit configured to receive a settlement request pertaining to a commodity, for which operation pertaining to purchase has been accepted by the operation acceptance unit, from the sales server and transmit the received settlement request to the settlement server; and a settlement information relay unit configured to receive settlement information pertaining to the result of the settlement processing from the settlement server and transmit the received settlement information to the sales server. | 11-12-2015 |
20150332263 | METHOD FOR PROCESSING ISSUANCE OF MOBILE CREDIT CARD - Disclosed is a method for processing the issuance of a mobile credit card, which is capable of shortening the time taken to issue a mobile credit card and in which card information transmitted from a card company server to a financial chip is processed by a one-time transmission. Thus the frequency of stoppages in the issuance of a credit card, which are caused by disconnections or interferences in a wireless communication, is reduced and stability of issuing a credit card is improved. | 11-19-2015 |
20150339659 | System And Method For Payment Credential-Based Mobile Commerce - In an embodiment, an apparatus comprises a security processor to perform a secure reader function to emulate an external near field communication (NFC) reader device, to obtain payment credential information of a user, a storage to store secure credential information of the user, and a NFC controller coupled to the security processor and the storage, responsive to initiation of the secure reader function, to disable a NFC contactless interface and to cause the payment credential information to be communicated to a remote system while the first contactless interface is disabled. Other embodiments are described and claimed. | 11-26-2015 |
20150348017 | METHOD FOR INTEGRATING CRYPTOCURRENCY TRANSFER ON A SOCIAL NETWORK INTERFACE - A method for transferring crypto currency between users of a social network is disclosed. The method enables users of an internet capable machine, who encounter each other on a social network or other internet based communication platform to securely deposit, withdraw, send, receive or transfer definable amounts cryptocurrency between each other using an interface which integrates features of the social network using valid cryptocurrency wallets. The interactive component for initiating the cryptocurrency transfer can appear within any content seen by, interacted with and/or created by a user including both private and public interfaces. The method may be used to transact between any number of parties any number of transactions. The method includes means for authorizing, encrypting and/or confirming aspects of the cryptocurrency transaction and protecting the interest of all involved parties; as well as the issuance of cryptocurrency transaction fees over a social network or internet based communication platform. | 12-03-2015 |
20150348024 | SYSTEMS AND METHODS FOR PROVISIONING TRANSACTION DATA TO MOBILE COMMUNICATIONS DEVICES - The system comprises approving a credit application during a single http session, transmitting an encoded secure token to a web-client participating in the http session, receiving from the mobile communications device the secure token, and transmitting the transaction account data to the mobile communications device, in response to the receiving the secure token. The system may further comprise the mobile communications device decoding the secure token. | 12-03-2015 |
20150356523 | DECENTRALIZED IDENTITY VERIFICATION SYSTEMS AND METHODS - The present invention involves systems and methods that allow participants in cryptocurrency networks to exchange cryptocurrency for traditional currency legally and safely without requiring the use of a traditional exchange or online brokerage as a fiduciary. The invention accomplishes this through the use of a decentralized identity verification protocol that allows a service provider to verify the identity of a participant and then publish an identity signature on the participant's cryptocurrency address or addresses. The invention enables full compliance with Country specific customer identification program and anti-money laundering requirements, and maintains the ability to independently satisfy requests for information or data retention requirements if requested by legally authorized parties, but does not require that the participant store the private keys or access controls to their cryptocurrency on an exchange or brokerage service. | 12-10-2015 |
20150356564 | SMART PHONES OR INTERNET PADS SUPPORTING MOBILE PAYMENT THAT INCLUDES SECURITY BASED, AT LEAST PARTLY, ON FINGERPRINT AUTHENTICATION, DATA ENCRYPTION, AND SHORT PHYSICAL DISTANCE WIRELESS COMMUNICATION - A mobile information apparatus for making mobile payments associated with a credit card, via a near distance radio frequency wireless communication unit, is herein disclosed and enabled. The mobile information apparatus is at least a smart phone or an Internet-Pad. At least part of the payment information is stored in the mobile information apparatus with an encryption technique. To make a payment, the user is instructed to move the mobile information apparatus to within a limited local physical distance from a wireless output controller; the user authorizes the payment by providing fingerprint authentication; and subsequent to the fingerprint authentication, the mobile information apparatus releases the payment information that includes encrypted data associated with a transaction, over a short range radio frequency communication link, to the wireless output controller for payment and transaction processing. | 12-10-2015 |
20150356565 | MOBILE INFORMATION APPARATUS SUPPORTING MOBILE PAYMENT THAT INCLUDES SECURITY BASED, AT LEAST PARTLY, ON USER PUSHBUTTON, USER BIOMETRICS, DATA ENCRYPTION, AND SHORT PHYSICAL DISTANCE WIRELESS COMMUNICATION - A mobile information apparatus for making mobile payments associated with a credit card, via a near distance radio frequency wireless communication unit, is herein disclosed and enabled. At least part of the payment information is stored in the mobile information apparatus with an encryption technique. To make a payment, the user approximates the mobile information apparatus to within a limited local physical distance of a wireless output controller, and the biometrics of the user is obtained by the mobile information apparatus as a security measure. The user authorizes the payment by using a push button on the mobile information apparatus, and subsequent to the having received the biometric authentication and user push button, the mobile information apparatus releases the payment information that includes encrypted data associated with a transaction over a short range radio frequency communication link to the wireless output controller for payment and transaction processing. | 12-10-2015 |
20150372811 | EFFICIENT METHODS FOR AUTHENTICATED COMMUNICATION - Embodiments of the invention relate to efficient methods for authenticated communication. In one embodiment, a first computing device can generate an ephemeral key pair comprising an ephemeral public key and an ephemeral private key. The first computing device can generate a first shared secret using the ephemeral private key and a static second device public key. The first computing device can encrypt request data using the first shared secret to obtain encrypted request data. The first computing device can send a request message including the encrypted request data and the ephemeral public key to a server computer. Upon receiving a response message from the server computer, the first computing device can determine a second shared secret using the ephemeral private key and the blinded static second device public key. The first computing device can then decrypt the encrypted response data from the response message to obtain response data. | 12-24-2015 |
20160012399 | SECURE TWO-STAGE TRANSACTIONS | 01-14-2016 |
20160012414 | HANDS-FREE TRANSACTIONS | 01-14-2016 |
20160019542 | Method For Providing Secure E-Commerce Transactions - Method for providing e-Commerce secure transactions through a computer network comprising the steps of generating an encrypted digital object certificate for an object; generating an encrypted digital seller certificate for a seller of said object; assigning an active or a suspended or a revoked status to said object certificate according to first predetermined criteria; assigning an active or a suspended or a revoked status to said seller certificate according to second predetermined criteria. The method further comprises the steps of generating an encrypted digital sale certificate by means of aggregating elements comprising said object certificate and said seller certificate; assigning by said online sales certified actors authority a revoked status to said sale certificate if the status of said seller certificate and of said object certificate are not both active and an active status otherwise; publishing said sale certificate and/or its status in said online shop. Thanks to the invention, sale certificates in a plurality of online shops can be simultaneously revoked if a seller certificate or an object certificate is revoked | 01-21-2016 |
20160048837 | METHOD AND SYSTEM FOR VERIFYING USER IDENTITY USING CARD FEATURES - One embodiment of the present invention provides a system that facilitates identity verification based on various features of a card. During operation, a server receives a request for identity verification, where the request corresponds to an account and includes an image of a verifiable card. The server extracts a card feature from the verifiable card image for use as a verifiable card feature. In response to determining that the verifiable card feature matches a corresponding card feature of a registered card of the account, the server determines successful identity verification. | 02-18-2016 |
20160063504 | METHOD AND SYSTEM FOR IMPLEMENTING BIOMETRIC AUTHENTICATED TRANSACTIONS - Disclosed is a method and system for implementing biometric authenticated transactions for sale and purchase of various services or products. The system includes a computing device having a user interface for selecting at least one service or product required by the user, a biometric reader capable of capturing and sending biometric information of the user and a server which is adapted to communicate with the biometric reader through the at least one computing device. The server includes a biometric information database and a matching module which is adapted to receive the biometric information of the user and authorize the transaction based on result of matching of the biometric information of the user with the information stored in the database. | 03-03-2016 |
20160071091 | METHOD AND SYSTEM FOR REAL TIME CONSUMER TRANSACTION TRACKING - A method for sharing transaction data includes: storing, inside a point of sale device, a removable integrated circuit payment card, the card being configured to store payment credentials associated with a payment account and including an antenna configured to operate using electric power provided by the point of sale device; receiving, by a receiver of the integrated circuit payment card, transaction data for a payment transaction; encrypting, by a processor of the integrated circuit payment card, the received transaction data; receiving, by the receiver of the integrated circuit payment card, an indication of receipt of an authorization response associated with the payment transaction; and transmitting, by the antenna, the encrypted transaction data to a mobile communication device. | 03-10-2016 |
20160071100 | MECHANISM FOR AUTHORISING TRANSACTIONS CONDUCTED AT UNATTENDED TERMINALS - Methods and systems for processing transactions initiated at unattended terminals using user devices without visible credentials, and providing services concerning such transactions, are disclosed. A first party issues a set of pseudo credentials for a user device responsive to authorisation request data concerning a transaction initiated with a second party using the user device and provides the pseudo credentials to the second party, who maps such pseudo credentials to real credentials of the user device acquired from the user device during the transaction. The pseudo credentials are also provided to a user of the user device who submits such pseudo credentials to the second party during a subsequent enquiry concerning the transaction. To authenticate the user device, the second party requests authorisation from the first party using the pseudo credentials. | 03-10-2016 |
20160086159 | APPLICATION IDENTIFIER (AID) PRIORITIZATION OF SECURITY MODULE APPLICATIONS - Secure transactions in a mobile device can be prioritized to execute on a security module in the mobile device over execution on a remote device. An STK function in a security module of a mobile device is initialized. A communication path between the security module and a secure wireless interface (e.g., NFC) circuit of the mobile device is initialized. The STK function provides priority table information. The priority table information includes application identifiers and links to processor executable software functions associated with the application identifiers. At least one of the processor executable software functions is stored in the security module, and at least one of the processor executable software functions stored in the security module is prioritized over a corresponding processor executable software function executable outside of the security module. The priority table is loaded in the secure wireless interface circuit with the priority table information passed over the communication path. | 03-24-2016 |
20160117674 | DIRECT PERSONAL MOBILE DEVICE USER TO SERVICE PROVIDER SECURE TRANSACTION CHANNEL - Ensuring security of electronic transactions between a personal mobile device user and a service provider involves establishing trust between a user and a transaction service provider, authenticating the personal mobile device of the user, establishing a secure communication channel between the user and the service provider, and registering the user with the service provider over the secure communications channel. | 04-28-2016 |
20160125406 | TIME-VARYING SECURITY CODE FOR ENABLING AUTHORIZATIONS AND OTHER USES OF FINANCIAL ACCOUNTS - A portable device is provided that carries account data. The account data may include a security code having a value that is time-varying. The value of the security code may be programmatically varied based on at least one of an algorithm or event. Authorization and use of the account may be sought from an authorization agent using the account data provided on the portable device. | 05-05-2016 |
20160140545 | CLOUD-BASED TRANSACTIONS WITH MAGNETIC SECURE TRANSMISSION - Techniques for enhancing the security of a communication device when conducting a transaction using the communication device may include using a limited-use key (LUK) to generate a transaction cryptogram, and transmitting a token instead of a real account identifier and the transaction cryptogram to an access device to conduct the transaction. The token and the transaction cryptogram can be transmitted to a magnetic stripe reader by generating an emulated magnetic signal. The LUK may be associated with a set of one or more limited-use thresholds that limits usage of the LUK, and the transaction can be authorized based on at least whether usage of the LUK has exceeded the set of one or more limited-use thresholds. | 05-19-2016 |
20160140546 | PROCESSING ELECTRONIC TOKENS - Measures, including methods, apparatus and computer software are provided for processing electronic tokens. An authorization request is received in relation to processing of an electronic token. An identifier for a user terminal associated with the electronic token, and an account, are determined on the basis of the authorization request. In some arrangements, a location query for the user terminal is performed on the basis of the determined identifier, whereby to determine a location of the user terminal on the basis of a proximity of the user terminal to one or more base stations in a cellular telecommunications network. In some arrangements, a challenge message is sent to the user terminal, to establish a confidence that the transacting user terminal is the designated user terminal. Processing of the electronic token in relation to the account is selectively authorized on the basis of the result of the location query or challenge response. | 05-19-2016 |
20160148191 | MOBILE DEVICE PAYMENT - A method including receiving, from a mobile device, a payment method and a payment amount. The method also can include validating the payment amount. The method additionally can include generating a gift card for the payment amount. The gift card can include a gift card identifier. The method further can include sending the gift card identifier to the mobile device. The method additionally can include facilitating displaying the gift card identifier on the mobile device. The gift card can be devoid of being generated as part of a gift-card purchase transaction. Other embodiments are provided. | 05-26-2016 |
20160180314 | Methods to secure RFID transponder Data | 06-23-2016 |
20160196540 | SYSTEMS AND METHODS FOR ELECTRONIC MAIL PAYMENTS | 07-07-2016 |
20160379195 | SYSTEMS AND METHODS FOR ACTIVATION AND DEACTIVATION OF APPLIANCES - An autonomously powered system comprising a data receiving device and charge controller is provided. The receiving device receives a code comprising an amount, system serial number, and series number. The controller is in electrical communication with an appliance that provides electricity. The controller evaluates appliance usage against a threshold amount. The threshold amount defines an amount that the appliance can be in an enabled state before being disabled, either as a period of time during which the appliance is enabled, an amount of time the appliance is usable in the enabled state, or an amount of power that is used by the appliance before being disabled. Responsive to determining that appliance usage is less than the threshold, the appliance is enabled. Responsive to determining that appliance usage exceeds the threshold, the appliance is disabled. Responsive to determining that the code is valid, the threshold is adjusted responsive to the code. | 12-29-2016 |
20190147453 | SECURING PRIVATE USER INFORMATION IN MULTI-PARTY-HOSTED COMPUTING DEVICE TRANSACTIONS | 05-16-2019 |