Patent application number | Description | Published |
20080201212 | SMART SIGN MOBILE TRANSIT FARE PAYMENT - A system and method for facilitating the payment and collection of transit system fares using a mobile device utilizes a smart sign including near field communication (NFC) devices that communicate with a contactless element embedded within a mobile wireless device. Each NFC device is associated with a different transit location. The NFC devices may be included on the same smart sign located at one transit location or on different smart signs located at different transit locations. Alternatively, one NFC device may be included on a smart sign at a departure location and another NFC device may be activated when or after the user enters the transit system to provide proof of fare purchase. The mobile device is positioned proximate the NFC devices to activate the NFC devices and access fare and/or schedule information or purchase a fare. | 08-21-2008 |
20080203151 | VERIFICATION OF A PORTABLE CONSUMER DEVICE IN AN OFFLINE ENVIRONMENT - A portable consumer device includes a base, and a computer readable medium on the base. The computer readable medium comprises code for an issuer verification value and a supplemental verification value. The issuer verification value is used by an issuer to verify that the portable consumer device is authentic in an on-line transaction and the supplemental verification value is used to verify that the portable consumer device is authentic in an off-line transaction. | 08-28-2008 |
20080203152 | AUTHENTICATION OF A DATA CARD USING A TRANSIT VERIFICATION VALUE - Transaction processing involves receiving data from an access transaction application of a portable consumer device, wherein the received data comprises data from an access transaction data string that includes a transit verification value wherein, with the exception of the transit verification value, the access transaction data string is substantially similar to a retail data string comprising retail data, wherein the access application data string is adapted for use with an access transaction processing system and the retail data string is adapted for use with a retail processing system. The transaction processing involves processing access transaction application data for selective authorization of the transaction. | 08-28-2008 |
20080203170 | FRAUD PREVENTION FOR TRANSIT FARE COLLECTION - Processing an access transaction involves receiving application data from a portable consumer device at an agency reader for use in connection with a transaction, the application data having a predetermined data field configuration for processing the transaction by an issuer of the portable consumer device, and accessing at least one data file of the portable consumer device at the agency reader, wherein the configuration of the data file is determined by the issuer and stores agency data associated with use of the portable consumer device for the transaction. | 08-28-2008 |
20080208681 | PAYMENT USING A MOBILE DEVICE - A mobile device is provided with payment data to enable the mobile device to complete a purchase transaction at a collection terminal. The mobile device requests and receives a payment data value over a wireless network to configure the mobile device as an electronic wallet such that a subsequent purchase transaction may be completed using the payment data value stored on the mobile device. A transit fare may be paid using the mobile device in communication with a back end server that collects transit information and calculates the transit fare. The mobile device may also access payment data, transit fare products and account information from the back end server via a wireless network. | 08-28-2008 |
20080303632 | Shielding of portable consumer device - A portable consumer device is disclosed. An electromagnetic shield is provided in the portable consumer device that is capable of preventing communication between the portable consumer device and an interrogation device. The shield is movable between a distal position in which communication with the interrogation device is enabled and a proximate position in which the shield prevents the transmitting antenna from communicating with the interrogation device. | 12-11-2008 |
20080319889 | RESTRICTING ACCESS TO COMPROMISED ACCOUNT INFORMATION - A notification service protects different user accounts from being exposed to fraudulent activity when one of the accounts is compromised. The notification service instructs an issuer of the compromised account to automatically close, freeze or place the other associated accounts on a watch list to prevent potential exposure to the other accounts due to a security breach associated with the compromised account. The card holder may receive notification of the compromised account from the notification service or the issuer via a mobile device. The mobile device may directly contact other issuers with one request to restrict access to any accounts associated with the compromised account. In the event that the compromised account is loaded on the mobile device, the account is cancelled and a new account is loaded to the mobile device. | 12-25-2008 |
20090083191 | TRACK DATA ENCRYPTION - A method for conducting a secure transaction using a secondary PAN is disclosed. The method includes providing a secondary PAN associated with a primary PAN, where the secondary PAN has at least one end portion that is the same as the primary PAN, but has a middle portion that is different than the primary PAN. | 03-26-2009 |
20090088229 | APPARATUS AND METHOD TO ELECTROMAGNETICALLY SHIELD PORTABLE CONSUMER DEVICES - An apparatus and method is provided to shield contactless portable electronic consumer devices such as radio frequency identification devices (RFID), tokens, mini-cards, key fobs, cellular phones, smartcards, etc. from wireless interrogation. In one embodiment, a contactless portable consumer device which includes a first antenna is shielded from unauthorized wireless interrogation with a radio frequency (RF) shield. The RF shield includes electrically conductive, non-ferromagnetic material and is configured to prevent unauthorized data transfer between a second antenna external to the portable consumer device and the first antenna. | 04-02-2009 |
20090089213 | TRACK DATA ENCRYPTION - A portable consumer device using a secondary PAN is disclosed. The portable consumer device includes a secondary PAN associated with a primary PAN, where the secondary PAN has at least one end portion that is the same as the primary PAN, but has a middle portion of that is different than the primary PAN. | 04-02-2009 |
20090112721 | VALUE-ADDED SERVICES ENGINE - Systems and methods for conducting a transaction using a Value-Added Services Engine. The method initiates sending transaction information with a product identifier identifying a product associated with a transaction conducted between a merchant and a consumer to the Value-Added Services Engine. The Value-Added Services Engine is programmed to determine a benefit associated with the product. The benefit is determined after communicating with a supplier of the product. The method also receives an indication of the benefit. | 04-30-2009 |
20090112757 | MOBILE DEVICE INCLUDING COMPUTER READABLE MEDIUM SUITABLE FOR TAX PROCESSING AND CURRENCY CONVERSION - Systems and methods of converting transactions to a new currency and tax processing based on the location of the mobile communication device. The systems and methods send transaction information including a transaction amount associated with a transaction conducted between a merchant and a consumer at an access device, to a server computer. The server computer determines a location of a mobile communication device operated by the consumer and converts an transaction amount to a currency based on a conversion rate based on the location of the mobile communication device or determines a tax amount based on the transaction amount and based on the location of the mobile communication device. The method also receives the converted transaction amount or the tax amount. | 04-30-2009 |
20090112766 | DEVICE INCLUDING MULTIPLE PAYMENT APPLICATIONS - Embodiments of the invention are directed to a method, a system, a device and a computer-readable media for selecting one or more payment application at the point-of-sale and using the select one or more payment applications to conduct a transaction. One embodiment is directed to a method for automatically selecting one or more payment applications to use in a transaction so that the selected payment applications give the consumer an optimized benefit or benefits. | 04-30-2009 |
20090112767 | ESCROW SYSTEM AND METHOD - A system and method for conducting purchasing transactions using escrow. A central processing entity secures the terms to a purchasing transaction on behalf of the various parties to the transaction. Once the terms of the purchasing transaction are agreed upon, the central processing entity holds any funds used in the transaction in escrow until confirmation is received that a supplier's contractual obligations have been fulfilled. | 04-30-2009 |
20090112768 | PAYMENT TRANSACTION USING MOBILE PHONE AS RELAY - Systems and methods of conducting a payment transaction using a mobile phone as a relay. The systems and methods receive transaction information associated with a transaction at a mobile communication device from a merchant. They send the transaction information with the mobile communication device to an issuer associated with the mobile communication device. The issuer thereafter sends an authorization response message to the merchant. | 04-30-2009 |
20090119170 | PORTABLE CONSUMER DEVICE INCLUDING DATA BEARING MEDIUM INCLUDING RISK BASED BENEFITS - A system and method for distributing coupons to consumers at the point-of-sale, where the benefit offered in the coupon can be determined according to a risk analysis. The coupon can then be applied to a transaction taking place at the point-of-sale or stored for future use. | 05-07-2009 |
20090119213 | ON-LINE AUTHORIZATION IN ACCESS ENVIRONMENT - A method is disclosed. The method includes interacting with a gate access device that is capable of preventing access to a location, where the gate access device subsequently sends an authorization request message to an issuer for approval, the authorization request message including a request to charge a predetermined amount of money to pay for access to a location, and entering the location if the gate access device receives an authorization response message indicating that the charge is authorized. | 05-07-2009 |
20090121016 | On-Line Authorization In Access Environment - A method for allowing on-line authorization in an access environment. The method includes receiving a request for access to a location at a gate access device from a user. After receiving the request for access to the location, an authorization request message is generated. The authorization request message includes an authorization to charge a predetermined amount of money. The authorization request message is then sent to an issuer for approval. An authorization response message is then received. The authorization response message indicates whether or not the charge is authorized or not authorized. If the authorization response message indicates that the authorization response message is authorized, then the user is allowed to access the location. | 05-14-2009 |
20090134218 | Multifunction removable cover for portable payment device - Methods and devices for conducting financial transactions are provided. Aspects and embodiments include multifunction removable covers for portable payment devices; multifunction removable covers configured as password token type portable payment devices; and multifunction removable covers configured as radio frequency shields to prevent unintended data transmission. | 05-28-2009 |
20090146814 | APPARATUS AND METHOD TO ELECTROMAGNETICALLY SHIELD PORTABLE CONSUMER DEVICES - An apparatus and method is provided to shield contactless portable electronic consumer devices such as radio frequency identification devices (RFID), tokens, mini-cards, key fobs, cellular phones, smartcards, etc. from wireless interrogation. In one embodiment, a contactless portable consumer device which includes a first antenna is shielded from unauthorized wireless interrogation with a radio frequency (RF) shield. The RF shield includes electrically conductive, non-ferromagnetic material and is configured to prevent unauthorized data transfer between a second antenna external to the portable consumer device and the first antenna. | 06-11-2009 |
20090171682 | Contactless prepaid Product For Transit Fare Collection - Transaction processing in an offline environment for a prepaid product comprising a portable consumer device includes responding to presentation of the prepaid product at a reader for offline processing by initiating operation of the prepaid product, receiving data from the prepaid product at the reader that indicates the prepaid product is associated with a prepaid account balance, determining that the prepaid product is in a negative balance condition, and taking preventive action in response to the negative balance condition such that future acceptance of the prepaid product at a reader is prevented. | 07-02-2009 |
20090171849 | TRACK DATA ENCRYPTION - A method for using a secondary PAN is disclosed. The method includes providing a secondary PAN associated with a primary PAN, where the secondary PAN has at least one end portion that is the same as the primary PAN, but has a middle portion of that is different than the primary PAN. | 07-02-2009 |
20090184163 | BANK ISSUED CONTACTLESS PAYMENT CARD USED IN TRANSIT FARE COLLECTION - An architecture for a contactless smart card or payment device, where the smart card is intended for use in both commerce transaction payment and transit fare payment (or other venue access) environments. The payment device may function as both an electronic wallet for commerce transactions and as a transit system card, for access to and fare payment of transit services. Implementation of both functions may be achieved by use of a dynamic memory management system that permits data for both the payment and transit applications to be stored on the card, with the transit data and storage locations isolated from those used to store data intended for use in paying for commerce transactions. The transit application specific data may include access control data (keys, passwords, identification data) or data required for fare calculations (rates, historical data on system use), for example. | 07-23-2009 |
20090187492 | LOCATION BASED AUTHENTICATION - A portable consumer device that is used to conduct a transaction at a merchant is authenticated. Information provided to a server computer includes locations of a merchant and a mobile communication device possessed by a consumer. If the location of the mobile communication device corresponds to the location of the merchant, the portable consumer device that is used to conduct the transaction is authenticated. | 07-23-2009 |
20090202081 | KEY DELIVERY SYSTEM AND METHOD - A method for delivering a key is disclosed. The method includes encrypting a first key using a second uniquely derived key to form an encrypted first key, and providing the encrypted first key to a transaction device. The transaction device contains the second uniquely derived key. | 08-13-2009 |
20090239512 | MOBILE PHONE CONTAINING CONTACTLESS PAYMENT CARD USED IN TRANSIT FARE COLLECTION - An apparatus such as a mobile phone includes a contactless smart card or payment device, where the smart card is intended for use in both commerce transaction payment and transit fare payment (or other venue access) environments. The payment device may function as both an electronic wallet for commerce transactions and as a transit system card, for access to and fare payment of transit services. Implementation of both functions may be achieved by use of a dynamic memory management system that permits data for both the payment and transit applications to be stored on the card, with the transit data and storage locations isolated from those used to store data intended for use in paying for commerce transactions. The transit application specific data may include access control data (keys, passwords, identification data) or data required for fare calculations (rates, historical data on system use), for example. | 09-24-2009 |
20090266881 | DEVICE INCLUDING FORM FACTOR INDICATOR - A consumer device is disclosed. The device comprises a body, and a memory comprising a computer readable medium disposed on or within the body. The computer readable medium comprises a form factor indicator element coupled to the body. The form factor indicator element indicates the form factor for the consumer device. | 10-29-2009 |
20090271211 | DEVICE INCLUDING USER EXCLUSIVE DATA TAG - A consumer device is disclosed. The device comprises a body, and a memory comprising a computer readable medium disposed on or within the body. The computer readable medium comprises user exclusive data tag, which can be placed in a user exclusive data tag. | 10-29-2009 |
20090271262 | AUTHORIZATION SYSTEM WITH SPLIT MESSAGING - A computer readable medium is disclosed. It includes computer readable program code embodied therein, said computer readable program code adapted to be executed to implement a method, the method including receiving a first authorization request message from a merchant and at a server computer, analyzing the first authorization request message using the server computer, sending a second authorization request message to a first service provider, sending a third authorization request message to a second service provider, receiving a first response message from the first service provider, receiving a second response message from the second service provider, and sending a third authorization response message to the merchant. | 10-29-2009 |
20090271315 | PORTABLE DEVICE INCLUDING ALTERABLE INDICATOR - A consumer device is disclosed. It includes a body, and a memory element coupled to the body, the memory storing a first account identifier associated with a first account, a second account identifier associated with a second account, and an alterable flag linking the first account and the second account. | 10-29-2009 |
20090313134 | RECOVERY OF TRANSACTION INFORMATION - Online transaction processing over a communication network involves receiving a transaction input comprising an authorization request message for a transaction conducted over a communication network between a consumer and a merchant using a portable consumer device having a memory, wherein the authorization request message contains data comprising a transaction total amount for the transaction and additional information not stored in the memory of the portable consumer device and related to the transaction. Issuer authorization processing is performed in response to the authorization request message data, and a decision output is produced in response to the transaction input and the issuer authorization processing. Thus, a decision output is produced in an efficient manner using additional information for the issuer authorization processing, and the additional information reduces the likelihood of declining a transaction that should otherwise be authorized. | 12-17-2009 |
20090314840 | Real-time card credit limit on card plastic - A system, method and credit card configured to display a current card balance on the credit card. The credit card receives a balance request from a button on the card. After retrieving the current card balance encoded on the credit card, the card displays the current card balance. Remote terminals may be configured to support the real-time display of a balance on a credit card by writing the current balance to the card after a payment transaction has occurred. | 12-24-2009 |
20090319287 | AUTHENTICATION SEGMENTATION - Methods and systems of authentication segmentation to selectively apply authentication tools to target high risk segments of transactions and entities. The methods and systems identify a plurality of fraud reduction tools and determine segmentation metrics associated with the plurality of fraud reduction tools. One or more segments are determined based on the segmentation metrics using fraud data and the best candidates of the one or more segments is identified. One or more fraud reduction tools is selected that target the best candidates. | 12-24-2009 |
20090319430 | MOBILE PHONE INCLUDING DYNAMIC VERIFICATION VALUE - A method for forming a dynamic verification value. The method includes altering a first data string to form a second data string, and forming a first dynamic verification value using at least a portion of the second data string. The first dynamic verification value is used to authenticate a phone in a first transaction. The second data string is used to form a third data string. A second dynamic verification value is formed using at least a portion of the third data string. The second dynamic verification value is used to authenticate the phone in a second transaction. | 12-24-2009 |
20090319784 | DYNAMIC VERIFICATION VALUE SYSTEM AND METHOD - A method for forming a dynamic verification value. The method includes altering a first data string to form a second data string, and forming a first dynamic verification value using at least a portion of the second data string. The first dynamic verification value is used to authenticate a portable consumer device in a first transaction. The second data string is used to form a third data string. A second dynamic verification value is formed using at least a portion of the third data string. The second dynamic verification value is used to authenticate the portable consumer device in a second transaction. | 12-24-2009 |
20100027786 | DYNAMIC ENCRYPTION AUTHENTICATION - A method is disclosed. The method includes generating a uniquely derived data string using personalized information and a first encryption algorithm, generating at least one uniquely derived key using the uniquely derived data string, and creating a dynamic verification value using a second encryption algorithm using the at least one uniquely derived key, wherein the first encryption algorithm is different than the second encryption algorithm. | 02-04-2010 |
20100108755 | Beverage Holder Having a Chip Unit for Performing Payment Transactions - A beverage holder apparatus includes a chip unit attached to a beverage holder and adapted to communicate with a chip unit reader to perform a payment transaction to purchase the beverage. The chip unit stores an account identifier associated with a financial account, and transmits the stored account identifier to the chip unit reader to perform the payment transaction. | 05-06-2010 |
20100117792 | DEVICE INCLUDING AUTHENTICATION GLYPH - A device used in an authentication process. The device includes a processor, a display coupled to the processor, and a computer readable medium coupled to the processor. The computer readable medium includes (i) code for displaying a first authentication image including a plurality of image elements including a set of image elements, where the image elements in the set of image elements are located at a first set of positions on a display screen, (ii) code for receiving a first glyph having a first configuration corresponding to the set of image elements from a user while the first authentication image is displayed, (iii) code for displaying a second authentication image including the plurality of image elements including the set of image elements, where the image elements in the set of image elements are located at a second set of positions on the display screen, where the second set of positions is different than the first set of positions, and (iv) code for receiving a second glyph having a second configuration corresponding to the set of image elements from a user while the first authentication image is displayed | 05-13-2010 |
20100120396 | DEVICE INCLUDING AUTHENTICATION GLYPH - A phone used in an authentication process. The phone includes a processor, a display coupled to the processor, and a computer readable medium coupled to the processor. The computer readable medium includes (i) code for displaying a first authentication image including a plurality of image elements including a set of image elements, where the image elements in the set of image elements are located at a first set of positions on a display screen, (ii) code for receiving a first glyph having a first configuration corresponding to the set of image elements from a user while the first authentication image is displayed, (iii) code for displaying a second authentication image including the plurality of image elements including the set of image elements, where the image elements in the set of image elements are located at a second set of positions on the display screen, where the second set of positions is different than the first set of positions, and (iv) code for receiving a second glyph having a second configuration corresponding to the set of image elements from a user while the first authentication image is displayed | 05-13-2010 |
20100127065 | Authenticating a document with a magnetic stripe - Methods, systems, and apparatus for efficiently authenticating a document (e.g. a credit card) having a magnetic stripe are provided. The magnetic field at different points of the magnetic stripe are measured, e.g., by a checkout scanner to create a magnetic signature. Digital samples of the measurements may be transformed into coefficients of continuous basis functions, e.g., a Fourier transform. These coefficients are then compared to reference values (e.g. corresponding coefficients) to produce a measure of the authenticity of the document. The number of coefficients used can advantageously be smaller than the number of digital samples without compromising accuracy, thus using less bandwidth between a scanner and an authentication entity. | 05-27-2010 |
20100127071 | VERIFYING CARDHOLDER IDENTITY USING SIGNATURE OF THE CARD - Methods, systems, and apparatus for verifying the identity of a cardholder are provided. A digital representation of a magnetic characteristic of a magnetic stripe of the card is stored on a portable electronic device of the cardholder. During a transaction, the digital signature is then transmitted so that it can be compared with a reference signature. The identity may be verified, and a response sent to a party requesting the verification, e.g., during a transaction between the requesting party and the verified party. | 05-27-2010 |
20100127072 | AUTHENTICATION OF DOCUMENTS HAVING MAGNETIC STRIPE - Methods, systems, and apparatus for efficiently authenticating a document (e.g. a credit card) having a magnetic stripe are provided. The magnetic field at different points of the magnetic stripe are measured, e.g., by a checkout scanner to create a magnetic signature. Digital samples of the measurements may be transformed into coefficients of continuous basis functions, e.g., a Fourier transform. These coefficients are then compared to reference values (e.g. corresponding coefficients) to produce a measure of the authenticity of the document. The number of coefficients used can advantageously be smaller than the number of digital samples without compromising accuracy, thus using less bandwidth between a scanner and an authentication entity. | 05-27-2010 |
20100127079 | UPDATING OF REFERENCE MAGNETIC SIGNATURE FOR AUTHENTICATING A DOCUMENT WITH A MAGNETIC STRIPE - Methods, systems, and apparatus for accurately authenticating a document (e.g. a credit card) having a magnetic stripe are provided. The magnetic field at different points of the magnetic stripe are measured, e.g., by a checkout scanner to create a magnetic signature. Digital samples of the measurements may be used to create a representation of the magnetic signature. The representation can then be compared to reference values to produce a measure of the authenticity of the document. The reference values are updated over time to reflect changes in the magnetic stripe of the authentic document, as may occur due to physical deterioration. For example, reference values may be optimized based on recent measurements of the authenticated document to provide a more accurate determination of authenticity for future measurements. | 05-27-2010 |
20100138338 | INTELLIGENT ALERT SYSTEM AND METHOD - A system and method for generating an intelligent alert message is disclosed. A user enrolls in the messaging service. Information that the user provides during the enrollment process are sent into a database. the user performs a transaction using a portable consumer device. Transaction data are sent to a computer apparatus. The computer apparatus accesses the database containing alert customization data. An intelligent alert message is generated based on the transaction data and the alert customization data. The intelligent alert message is sent to a user device. For example, after a user uses a portable consumer device to buy gas at a fuel dispenser in a gas purchase transaction, an alert message that is received by a user's phone may be “This is a gas purchase transaction. The amount may vary.” In this example, the amount of the purchase is not known until after the user buys gas. | 06-03-2010 |
20100176196 | COMPACT PROTOCOL AND SOLUTION FOR SUBSTANTIALLY OFFLINE MESSAGING BETWEEN PORTABLE CONSUMER DEVICE AND BASE DEVICE - A method for providing messaging between a portable device and base device is provided. The method included communicating one or more message codes maintained in the portable device to the base device. The base device then composes a message for a user of the portable device using a dictionary of message codes. The message codes have corresponding message values, which are used to generate the message for the one or more message codes. The generated message is then provided to the user. | 07-15-2010 |
20100205077 | RESTRICTING ACCESS TO COMPROMISED ACCOUNT INFORMATION - A notification service protects different user accounts from being exposed to fraudulent activity when one of the accounts is compromised. The notification service instructs an issuer of the compromised account to automatically close, freeze or place the other associated accounts on a watch list to prevent potential exposure to the other accounts due to a security breach associated with the compromised account. The card holder may receive notification of the compromised account from the notification service or the issuer via a mobile device. The mobile device may directly contact other issuers with one request to restrict access to any accounts associated with the compromised account. In the event that the compromised account is loaded on the mobile device, the account is cancelled and a new account is loaded to the mobile device. | 08-12-2010 |
20100252623 | METHOD AND SYSTEM FOR GENERATING A DYNAMIC VERIFICATION VALUE - A method is disclosed. The method includes generating a verification value in response to a transaction involving a portable consumer device, where the verification value is generated using a first dynamic data element and a second dynamic data element. The verification value is sent to a service provider associated with the portable consumer device so that the service provider can verify the transaction. | 10-07-2010 |
20100268557 | ENROLLMENT SERVER - Systems, methods and apparatus for processing enrollment requests are provided. Enrollment requests may be sent from a user to an enrollment server. The enrollment server may verify the information in the enrollment request with entities that may contain authoritative data reflecting the validity of the information in the enrollment request. The authenticity of devices involved in the enrollment request may also be verified. In addition, the user's transaction history can be reviewed to determine if the enrollment fits the user's transaction history profile. Based on the verified information and a level of risk associated with the enrollment, the enrollment server may allow or deny the enrollment request. | 10-21-2010 |
20100272114 | ALERTS LIFE CYCLE - Server computers and methods for updating or changing user alert message settings when changes are made to one or more user accounts are disclosed. The change in the user accounts can include transfers of a user account or user account identifier from one user account issuer to another user account issuer. The change in user accounts can be initiated by a user or issuer associated with the user account. When changes are made to the user accounts or changes are made to the user alert message settings, the server computer can confirm the changes with the user or issuer associated with the user accounts that are changed. | 10-28-2010 |
20100274572 | ALERT ARCHITECTURE - Systems, architecture of the systems, and methods for generating alert message are disclosed. A user enrolls in an alert messaging service. Information that the user provides during an enrollment process are sent into a database. the user performs a transaction using a portable consumer device. Transaction data are sent to a computer apparatus. The computer apparatus accesses the database containing alert customization data. An alert message is generated based on the transaction data and the alert customization data. The alert message is sent to a user device. The systems, resources and processes responsible for performing the transaction and providing the alert messages are separated so that the transaction processing and alert generation are performed in parallel by systems in communication with each other. Utilizing such method prevents the transaction processing system from being overloaded with additional processes, while maintains a desired level of efficiency, security and reliability of the payment processing system. | 10-28-2010 |
20100274653 | NOTIFICATION SOCIAL NETWORKING - A method. The method includes a) sending a first transaction notification message comprising an original payee identifier to a user. The original payee identifier may be part of original transaction information associated with a first transaction. At some point, the user sees this transaction information and wants to correct one or more items in the transaction information. For example, the user may not recognize that the original payee identifier is wrong or is otherwise unrecognizable. The user may then contact a central server (e.g., via a Web site) and may provide updated transaction information such as an updated merchant identifier to the central server computer. This updated transaction information may be stored so that subsequent transactions can be accurately conducted and reported to the user, and other uses. | 10-28-2010 |
20100274679 | FRAUD LOCATION DETERMINATION - A system and method is described for alerting authorities or taking other corrective authoritative action to a possibly fraudulent credit card transaction. A cardholder is notified that a transaction has just taken place and is given an opportunity to indicate that he or she did not authorize the transaction. If so indicated, and depending on how recent the transaction was (e.g. 15 seconds ago) then an alert is automatically sent to the merchant, store security, or local police. In addition, a store camera can be automatically activated to zoom in and record the perpetrator of the fraudulent transaction. | 10-28-2010 |
20100274688 | SYSTEM AND METHOD INCLUDING INDIRECT APPROVAL - A server computer is disclosed. It comprises a processor and a computer readable medium coupled to the processor. The computer readable medium comprises code executable by the processor for implementing a method comprising: a) receiving an authorization request message, wherein the authorization request message requests authorization to proceed with a transaction conducted between a first party and a second party using a portable device; b) analyzing the authorization request message by a server computer to determine if the portable device is enrolled in a transaction alert program; c) if the portable device is enrolled in the transaction alert program, sending a transaction alert request message to a third party requesting approval to proceed with the transaction; d) receiving a transaction alert response message from the third party; e) sending the authorization request message to an issuer associated with the portable device; f) receiving an authorization response message from the issuer; and g) sending the authorization response message to the second party. | 10-28-2010 |
20100274689 | ALERT PRIORITIZATION LOGIC - A first embodiment of the present invention relates to systems and methods for determining a priority for a set of alert triggers and performing additional processing based on the determined priority. In some embodiments, additional processing may include generating and sending of alert messages. In other embodiments, additional processing may further include determining that the generating and sending of alert messages are to be delayed until a later time. In yet other embodiments, additional processing may include determining that no alert message is to be generated and sent. A second embodiment of the present invention relates to systems and methods for dynamically selecting a delivery channel and generating an alert message for the selected delivery channel. In some embodiments, the alert message may be formatted based on the selected delivery channel. According to one embodiment, the alert message may be generated based on a compact protocol format. When the alert message is received by a mobile device, the mobile device may use the alert message to generate a second alert message. | 10-28-2010 |
20100274691 | MULTI ALERTS BASED SYSTEM - Systems and methods for defining, observing and detecting triggering user account events that initiate a user account alert message to be sent to one or more users are disclosed. Location and merchant, transaction result, device and, usage history/trend types of user account alerts and trigger criteria can be defined or selected by users, issuers were notification alert engines. Alternatively, user account alerts and trigger criteria can be defined by analyzing previously observed user account events, such as credit card transactions, to determine user profiles and user account usage trends, i.e. credit card spending patterns, as baselines for comparing newly observed user account events. If information associated with the newly observed user account events match any of the trigger criteria or are inconsistent with the determined user profile or user account usage trends, then user account alerts can be sent to one or more users. | 10-28-2010 |
20100274692 | VERIFICATION OF PORTABLE CONSUMER DEVICES - Embodiments of the invention are directed to methods, systems, and computer program products pertaining to obtaining, providing, and using dynamic card verification values for portable consumer devices, such as credit cards and debit cards. An exemplary method comprises receiving, at a server, a request for a device verification value for a portable consumer device associated with a user; obtaining, at the server, a datum indicative of a device verification value for a portable consumer device; and sending, from the server, the datum to at least one of a phone number or network address of a personal communication device associated with the user. | 10-28-2010 |
20100274720 | FRAUD AND REPUTATION PROTECTION USING ADVANCED AUTHORIZATION AND RULES ENGINE - Systems and methods are presented for analyzing a credit card or other financial transaction and, based on whether a score for the transaction meets or exceeds a user-selected threshold, sending a transaction notification message to a consumer's electronic device such as a cell phone. | 10-28-2010 |
20100274721 | VERIFICATION OF PORTABLE CONSUMER DEVICES - Embodiments of the invention are directed to methods, systems, and computer program products pertaining to obtaining, providing, and using dynamic card verification values for portable consumer devices, such as credit cards and debit cards. An exemplary method comprises receiving, at a server, a request for a device verification value for a portable consumer device associated with a user; obtaining, at the server, a datum indicative of a device verification value for a portable consumer device; and sending, from the server, the datum to at least one of a phone number or network address of a personal communication device associated with the user. | 10-28-2010 |
20100274866 | MULTIPLE CHANNEL OPTIMIZATION FOR TRANSACTION MESSAGES - A first embodiment of the present invention relates to systems and methods for determining a priority for a set of alert triggers and performing additional processing based on the determined priority. In some embodiments, additional processing may include generating and sending of alert messages. In other embodiments, additional processing may further include determining that the generating and sending of alert messages are to be delayed until a later time. In yet other embodiments, additional processing may include determining that no alert message is to be generated and sent. A second embodiment of the present invention relates to systems and methods for dynamically selecting a delivery channel and generating an alert message for the selected delivery channel. In some embodiments, the alert message may be formatted based on the selected delivery channel. According to one embodiment, the alert message may be generated based on a compact protocol format. When the alert message is received by a mobile device, the mobile device may use the alert message to generate a second alert message. | 10-28-2010 |
20100280927 | PRE-AUTHORIZATION OF A TRANSACTION USING PREDICTIVE MODELING - Systems, apparatus, and methods are provided for efficiently authorizing a transaction initiated by a consumer. An authorization can be generated before the consumer actually initiates the transaction. For example, a future transaction can be predicted, and an authorization can be generated for the predicted transaction. In this manner, the authorization can be ready and quickly used when the consumer does initiate the transaction. Previous transactions made by the consumer can be used to predict when the future transaction is likely. In various examples, the authorization can be sent to a specific merchant or to the consumer for use when the consumer initiates the predicted transaction, or saved by an authorization server for use in response to an authorization request from the merchant. | 11-04-2010 |
20100287250 | Merchant Alert Based System and Method Including Customer Presence Notification - Embodiments of the present invention disclosed herein include systems and methods for sending merchant alert messages. The merchant can specify criteria indicating the types of customers for which he desires to receive alerts. Merchant alert messages can be sent based on characteristics of a customer, including the customer's proximity to the merchant. The merchant can use the alert message to provide better service to the customer or prevent the customer from engaging in transactions, depending on the contents of the merchant alert message. | 11-11-2010 |
20100293189 | Verification of Portable Consumer Devices - Embodiments of the invention are directed to methods, systems, and computer program products pertaining to obtaining, providing, and using dynamic card verification values for portable consumer devices, such as credit cards and debit cards. An exemplary method comprises receiving, at a server, a request for a device verification value for a portable consumer device associated with a user; obtaining, at the server, a datum indicative of a device verification value for a portable consumer device; and sending, from the server, the datum to at least one of a phone number or network address of a personal communication device associated with the user. | 11-18-2010 |
20100293381 | VERIFICATION OF PORTABLE CONSUMER DEVICES - Apparatuses, methods, and systems pertaining to the verification of portable consumer devices are disclosed. In one implementation, a verification token is coupled to a computer by a USB connection so as to use the computer's networking facilities. The verification token reads identification information from a user's portable consumer device (e.g., credit card) and sends the information to a validation entry over a communications network using the computer's networking facilities. The validation entity applies one or more validation tests to the information that it receives from the verification token. If a selected number of tests are passed, the validation entity sends a device verification value to the verification token, and optionally to a payment processing network. The verification token may enter the device verification value into a CVV field of a web page appearing on the computer's display, or may display the value to the user using the computer's display. | 11-18-2010 |
20100293382 | VERIFICATION OF PORTABLE CONSUMER DEVICES - Apparatuses, methods, and systems pertaining to the verification of portable consumer devices are disclosed. In one implementation, a verification token is coupled to a computer by a USB connection so as to use the computer's networking facilities. The verification token reads identification information from a user's portable consumer device (e.g., credit card) and sends the information to a validation entry over a communications network using the computer's networking facilities. The validation entity applies one or more validation tests to the information that it receives from the verification token. If a selected number of tests are passed, the validation entity sends a device verification value to the verification token, and optionally to a payment processing network. The verification token may enter the device verification value into a CVV field of a web page appearing on the computer's display, or may display the value to the user using the computer's display. | 11-18-2010 |
20100299208 | MERCHANT COMPETITION ALERT - Embodiments of the present invention are directed to a system and method for determining the products involved in a transaction, and transmitting messages containing product specific data. Systems may be implemented to product identifiers during payment processing. The messages may be sent including product identifiers, and further information regarding the products associated with the product identifiers. | 11-25-2010 |
20100299249 | SKU LEVEL CONTROL AND ALERTS - Embodiments of the present invention are directed to a system and method for determining the products involved in a transaction conducted with a subsidiary user of a payment account, and transmitting messages containing product specific information. Systems may be implemented to transmit product identifiers during payment processing. The product specific information may be included in alert messages sent to an account holder. | 11-25-2010 |
20100327054 | SECURE COMMUNICATION OF PAYMENT INFORMATION TO MERCHANTS USING A VERIFICATION TOKEN - Disclosed are apparatuses, systems, and methods pertaining to the secure communication of payment information from portable consumer devices, such as credit cards, to online merchants using verification tokens. | 12-30-2010 |
20110004526 | PORTABLE CONSUMER DEVICE VERIFICATION SYSTEM - A method for verifying a portable consumer device. The method includes receiving an authorization request message associated with a transaction conducted using a portable consumer device. The portable consumer device includes a portable consumer device fingerprint. The authorization request message includes an altered portable consumer device fingerprint and an algorithm identifier. The method also includes selecting an algorithm from among a plurality of algorithms using the algorithm identifier, determining the portable consumer device fingerprint using selected algorithm and the altered portable consumer device fingerprint, determining if the portable consumer device fingerprint matches a stored portable consumer device fingerprint, and sending an authorization response message after determining if the portable consumer device fingerprint matches the stored portable consumer device fingerprint. | 01-06-2011 |
20110004553 | TRACK DATA ENCRYPTION - A method for using a secondary PAN is disclosed. The method includes providing a secondary PAN associated with a primary PAN, where the secondary PAN has at least one end portion that is the same as the primary PAN, but has a middle portion of that is different than the primary PAN. | 01-06-2011 |
20110016054 | SIGNATURE BASED NEGATIVE LIST FOR OFF LINE PAYMENT DEVICE VALIDATION - At each of a plurality of transit readers of a transit system, for each of a plurality of riders, where each rider seeks to conduct an access transaction with the transit system for access into the transit facility by using a payment device issued by an issuer in a payment system, data is read from the payment device. The data includes an encryption code that uniquely corresponds to the payment device and was created by the issuer using one or more encryption keys and a predetermined algorithm. A check will be performed, remotely and/or locally, of one or more lists of other encryption codes to determine if the encryption code is on the list. On the basis of whether the encryption code is on the list, the rider is permitted access to the facility of the transit system. The payment device need not be changed for the rider's fare. Decryption of the encryption code read from the payment device is not required to complete the access transaction. | 01-20-2011 |
20110022483 | APPARATUS INCLUDING DATA BEARING MEDIUM FOR REDUCING FRAUD IN PAYMENT TRANSACTIONS USING A BLACK LIST - A system, apparatus, and method for reducing fraud in electronic payment transactions. The apparatus includes a processor that executes instructions to implement a process to identify consumer or merchant devices that have been used in fraudulent transactions and prevent the authorization of future transactions that are initiated using those devices. By collecting device data as part of authorization messages and processing that data, devices that are used in fraudulent transactions with different merchants or involving different accounts may be identified and prevented from being the source of future transactions. This prevents future losses and reinforces the integrity of the transaction system. | 01-27-2011 |
20110022517 | APPARATUS INCLUDING DATA BEARING MEDIUM FOR AUTHORIZING A PAYMENT TRANSACTION USING SEASONED DATA - A system, apparatus, and method for expediting the authorization of an electronic payment transaction. Authorization of a transaction at a node of an authorization network is the result of inferring the trustworthiness of a customer to the transaction using data obtained from a different node of the authorization network. The authorization process is expedited by relying on the previous authentication decision of another node, where the previous decision may have been made based on a different payment device or different user inputs. The invention uses a decision made by a first node in the authorization network as a proxy for the authorization decision at a different node, thereby transferring the trustworthiness of a consumer, consumer's device, payment device, or other aspect of the transaction from the first node to the second. | 01-27-2011 |
20110022518 | APPARATUS INCLUDING DATA BEARING MEDIUM FOR SEASONING A DEVICE USING DATA OBTAINED FROM MULTIPLE TRANSACTION ENVIRONMENTS - An apparatus includes a processor and a set of instructions stored in a memory, where when executed by the processor, the instructions implement a method or process of determining if a consumer device should be accepted as valid based on correlating a location of the device with a location of a different transaction involving the same account. This enables an authorization decision for a transaction to be made at an earlier stage of the overall authorization process, or with less data processing or computational resources than might otherwise be required. | 01-27-2011 |
20110035317 | SEEDLESS ANTI PHISHING AUTHENTICATION USING TRANSACTION HISTORY - Systems and methods for providing authentication verification for a correspondence and other messages are disclosed. A link, such as a uniform resource locator (URL) link, is placed in a correspondence and sent to a user. When the user follows the link, a list of personal transaction data from the user's credit card or other financial account is presented. Because the personal transaction data is substantially private to user and his or her financial institution and card servicing company and not known to the public, the recipient can be assured that the message truly came from the financial institution or the card servicing company and not from a phisher. | 02-10-2011 |
20110055013 | SECURE ALERT SYSTEM AND METHOD - A method for receiving transaction data for a transaction, accessing a database comprising alert preference data, and generating a secure alert message using the transaction data and alert preference data using a notification server coupled to the database. The secure alert message comprises a dynamic identifier personal to the consumer. The method also includes sending the secure alert message to a consumer device. | 03-03-2011 |
20110055058 | CONTACT ALERT SYSTEM AND METHOD - Embodiments of the present invention are directed to a system and method for receiving transaction data for a transaction, accessing a database comprising alert preference data, generating a contact alert message using the transaction data and alert preference data using a notification server coupled to the database wherein the contact alert message comprises contact information of a first person who conducted the transaction, and sending the contact alert message to a notification device of a second person. | 03-03-2011 |
20110055076 | RESPONSE TO ALERT MESSAGE - One embodiment of the invention is directed to a system comprising a server computer, a database coupled to the server, and a notification device in operative communication with the server. The server comprises a processor and a computer readable medium coupled to the processor. The computer readable medium comprises computer readable program code embodied therein. The computer readable program code is adapted to be executed by the processor to receive a request to modify delivery instructions for alerts associated with a consumer, and modify delivery instructions for alerts associated with the consumer. | 03-03-2011 |
20110066505 | Secure Alert System and Method - A method for receiving transaction data for a transaction, accessing a database comprising alert preference data, and generating a secure alert message using the transaction data and alert preference data using a notification server coupled to the database. The secure alert message comprises a dynamic identifier personal to the consumer. The method also includes sending the secure alert message to a consumer device. | 03-17-2011 |
20110066516 | Portable Consumer Device Configured to Generate Dynamic Authentication Data - Embodiments of the invention provide a portable consumer device configured to store dynamic authentication data in memory. The portable consumer device also includes an interface for transmitting data to and receiving power from an external device. The dynamic authentication data is read from the memory by a read-write device located on the portable consumer device. The authentication data is updated and the updated data may be written into memory using the read-write device. In some embodiments, an authentication value read from the memory may be used to generate another authentication value based on an algorithm. The portable consumer device is further configured to transmit authentication data to an external device. The process of reading, updating, generating, transmitting, and rewriting the authentication data may occur each time external power is provided to the portable consumer device via the interface. The power for operating the components of the portable consumer device may be drawn exclusively from the power received from the external device (i.e., the external power). In some embodiments, a portion of the external power may be temporarily stored on an energy storage means of the portable consumer device. | 03-17-2011 |
20110098023 | System and Method for Enabling a Mobile Communication Device to Operate as a Financial Presentation Device - A provisioning system for enabling a mobile communication device to operate as a financial presentation device (FPD) which is presentable to providers of goods or service is provided. The provisioning system relies on a transaction processing system that normally routes authorization requests from merchants to issuers of FPDs for purposes of authorizing FPD transactions. The transaction processing system already stores security keys of all issuers in order to validate transaction data being sent from the merchants. The provisioning system monitors authorization requests being routed through the transaction processing system and retrieves an authorization request of a financial transaction that was initiated with a particular FPD. The provisioning system then transmits the FPD data contained in the retrieved authorization request and the security key stored in the transaction processing system to a secure memory element of the mobile communication device so as to enable the mobile communication device to operate as a FPD. | 04-28-2011 |
20110106659 | Encryption Switch Processing - A method for delivering non-financial electronic data through a secure communications channel between a payment processing network and an access device is disclosed. One embodiment of the invention is directed to a method comprising receiving, at a payment processing network, a request to establish a secure communications channel between a consumer device and the payment processing network. Upon establishing a secure communications channel with the consumer device, the payment processor network receives non-financial electronic content from a merchant at the payment processing network where the non-financial electronic content is selected at the merchant by a user associated with the consumer device. The non-financial electronic content is sent to the consumer device from the payment processing network via the secure communications channel between the consumer device and the payment processing network. | 05-05-2011 |
20110108623 | VERIFICATION OF PORTABLE CONSUMER DEVICES - Apparatuses, methods, and systems pertaining to the verification of portable consumer devices are disclosed. In one implementation, a verification token is coupled to a computer by a USB connection so as to use the computer's networking facilities. The verification token reads identification information from a user's portable consumer device (e.g., credit card) and sends the information to a validation entry over a communications network using the computer's networking facilities. The validation entity applies one or more validation tests to the information that it receives from the verification token. If a selected number of tests are passed, the validation entity sends a device verification value to the verification token, and optionally to a payment processing network. The verification token may enter the device verification value into a CVV field of a web page appearing on the computer's display, or may display the value to the user using the computer's display. | 05-12-2011 |
20110119155 | VERIFICATION OF PORTABLE CONSUMER DEVICES FOR 3-D SECURE SERVICES - Apparatuses, methods, and systems pertaining to the verification of portable consumer devices for 3-D Secure Systems are disclosed. In one implementation, a verification token is coupled to a computer by a USB connection so as to use the computer's networking facilities. The verification token reads identification information from a user's portable consumer device (e.g., credit card) and sends the information to a validation entry over a communications network using the computer's networking facilities. The validation entity applies one or more validation tests to the information that it receives from the verification token. If a selected number of tests are passed, the validation entity sends a 3-D Secure datum to the verification token. The verification token may enter the 3-D Secure datum into a hidden field of a Purchase Authentication Page appearing on the computer's display. | 05-19-2011 |
20110145082 | MERCHANT ALERTS INCORPORATING RECEIPT DATA - One embodiment of the invention is directed to a system comprising a server and a consumer device in operative communication with the server. The server comprises a processor and a computer readable medium coupled to the processor. The computer readable medium comprises computer readable program code embodied therein. The computer readable program code is adapted to be executed by the processor to receive an authorization request message for a transaction conducted by a consumer with a merchant, send the authorization request message to an issuer, modify an authorization response message to include receipt preference data, and send the authorization response message comprising the receipt data to the merchant, wherein the merchant generates a receipt for the consumer according to the receipt preference data. | 06-16-2011 |
20110145148 | MERCHANT ALERTS INCORPORATING RECEIPT DATA - One embodiment of the invention is directed to a method comprising receiving an authorization request message for a transaction conducted by a consumer with a merchant, sending the authorization request message to an issuer, receiving an authorization response message, modifying the authorization response message using a server computer to include receipt preference data, wherein the receipt preference data is derived from receipt preferences of the consumer or the merchant, and sending the authorization response message comprising the receipt preference data to the merchant, wherein the merchant generates a receipt for the consumer according to the receipt preference data. | 06-16-2011 |
20110145917 | METHOD AND SYSTEM FOR FACILITATING MEMORY AND APPLICATION MANAGEMENT ON A SECURED TOKEN - A system for facilitating memory and application management on a smartcard the system includes a client having a number of applications and a smartcard having specification logic allowing file structures and security and access conditions to be defined using a set of common commands. Each application has a corresponding group of data on the smartcard. An applet instance is created for each application and corresponding group of application data. At the time of instantiation, the specification logic allows an application to specify the file structure and/or to specify security and access conditions for its group of data. An application can utilize passcode and credential management so that a single passcode is used to access the smartcard regardless of whether the application utilizes the common commands to specify a file structure. | 06-16-2011 |
20110159850 | AUTHENTICATION AND HUMAN RECOGNITION TRANSACTION USING A MOBILE DEVICE WITH AN ACCELEROMETER - Methods, devices, and systems are presented for screen locking or delaying the screen locking of mobile devices, such as smart phones, based on whether the gait of the current user match that of its true, authorized owner. A user's gait can be measured using accelerometers embedded in the device. Other movements, such as where a user normally goes to work, can be measured using GPS or other positional location data and used to lock or delay locking of the screen. | 06-30-2011 |
20110159857 | INPUT DEVICE WITH AN ACCELEROMETER - Methods, devices, and systems are described for bumping a mobile device, such as a smart phone, against a fixed poster board display at a store to initiate a download of coupons, advertisements, or other benefits to the mobile device. Products can be rated by a user's up/down bump or other bump patterns. Using accelerometer-based inertial measurements, multiple users can control multiple mouse cursors on a large display with their mobile devices in order to select information to be downloaded to their mobile devices. | 06-30-2011 |
20110161136 | CUSTOMER MAPPING USING MOBILE DEVICE WITH AN ACCELEROMETER - Methods, devices, and systems are presented for detecting where shoppers in a store stop, turn, and look from accelerometers in their own smart phones or other mobile devices. These movement events can be correlated with merchandise on their receipts as well as the movement events and merchandise on the receipts of other users so that a map of the store's wares can be generated. The map can be used to inform manufacturers where their merchandise is stocked in the store or to advertise to shoppers as they browse the store. | 06-30-2011 |
20110173684 | ANYTIME VALIDATION FOR VERIFICATION TOKENS - Systems and method for producing, validating, and registering authentic verification tokens are disclosed. Such systems and methods include generating verification token specific key pairs. The key pairs can be signed by a verification token manufacturer master key or public key certificate for an additional level of authenticity. Related methods and systems for authenticating and registering authorized verification token manufacturers are also disclosed. Once a verification token manufacturer is authenticated, it can be assigned a manufacturer-specific key pair or certificate and in some cases, a predetermined set of serial numbers to assign to the verification tokens it produces. Each serial number can be used to generate a verification token specific key pair specific to the associated verification token. One component of the verification token key pair can be stored to the verification token. Optionally, the component of the verification token key pair stored to the verification token can be signed by the manufacturer specific master key or certificate and stored a verification token public certificate. | 07-14-2011 |
20110187505 | Access Using a Mobile Device with an Accelerometer - Embodiments of the present invention are directed to systems, apparatuses and methods for using a mobile device with an accelerometer to gain access into a secured or restricted area. A first device and a second device interact by making physical contact with each other thereby generating interaction data that is representative of the physical interaction between the first and second device. The first and second device may be mobile phones. The second device may be a point of sale terminal, access point device, or any other stationary (i.e., in a fixed position) device positioned at a line, door, gate, or entrance. A server computer determines, based on interaction data, that the first device and the second device made physical contact. After determining that the first device and the second device made contact, communications may be initiated between the devices. Communications may relate an access transaction comprising an exchange of information, such as credentials, between a prospective entrant (operating the first device) and a gatekeeper (operating the second device) to verify that the prospective entrant is permitted or is not permitted access to a particular area that is secured or restricted by the gatekeeper. Other embodiments are direct to confirmation transactions. Access transaction and confirmation transactions may be combined with a financial transaction using a payment processing network. | 08-04-2011 |
20110189981 | Transaction Using A Mobile Device With An Accelerometer - Embodiments of the invention may use a first accelerometer to measure first acceleration data of a first device. Other interaction data, including time data and geographic location data, generated by the first device may also be recorded. First acceleration data is compared by a remote server computer to second acceleration data generated by a second accelerometer in a second device. If the first and second accelerometer data are substantially equal, it can be determined that the devices have interacted and communications can be initiated. After communications are initiated, a financial transaction is conducted. Accelerometer data may be stored and/or used as part of the authentication process in a payment processing network. Other embodiments of the invention use the accelerometer to generate movement security data to make financial transaction more secure. Accelerometer data is used for authentication, security, encryption, session keys, non-repudiation, or fraud protection. | 08-04-2011 |
20110191237 | Information Access Device and Data Transfer - Embodiments of the present invention are directed to systems, apparatuses and methods for using a first device with an accelerometer to transfer data by making contact with a second device with an accelerometer, thereby generating interaction data that is representative of the physical contact between the mobile device and the second device. The first device may be a mobile phone. The second device may be a mobile phone or a stationary kiosk or terminal. A first device with an accelerometer physically contacts the second device. Each of the first and second devices generate interaction data (e.g., accelerometer, location, time data, etc.) representative of the physical interaction between the first and second device. A server computer determines, based on interaction data, that the first device and the second device physically contact each other. After determining that the mobile device and the second device made contact, communications may be initiated between the devices. Communications may include customer-provided information (e.g., shopping lists) and merchant-provided information (e.g., items in stock or on sale from the consumer's shopping list). In some embodiments, at least two independent interactions between three devices transfer data from a first computing device to a second computing device, after each of the first and second computing devices independently interacts with a mobile device. | 08-04-2011 |
20110218880 | SYSTEMS AND METHODS USING MOBILE DEVICE IN PAYMENT TRANSACTION - Systems and methods for performing a payment transaction are disclosed. In the embodiments of the invention, a mobile device is used by a user to receive an identifier associated with a piece of merchandise or a service from a merchant. The user then initiates a payment transaction with a remote payment server computer hosted by a third party processor. Upon completion of the payment transaction, the remote payment server computer notifies the user and the merchant that a payment has been made. The merchant then provide the merchandise or the service to the user. In the embodiments of the invention, a payment transaction is performed without exposing or disclosing financial account information of the user to the merchant. | 09-08-2011 |
20110225075 | Field 55 Data Relationships - A data mining device, method, and apparatus configured to associate customer exclusive data from a payment card or device after a financial transaction. A financial transaction processing system comprises a report distribution management system, a data relationship manager, and a customer exclusive data association database. The report distribution management system receives financial transaction data. The data relationship manager determines an issuer associated with the financial transaction data, queries a subscription database for subscription data associated with the issuer and a core database for the issuer processing parameters. The processing parameters are applied to the financial transaction data and the subscription data. A customer exclusive data association database is updated with the financial transaction data once the processing parameters are applied. | 09-15-2011 |
20110225089 | SYSTEM AND METHOD INCLUDING SECURITY PARAMETERS USED FOR GENERATION OF VERIFICATION VALUE - Systems and methods for generating a dynamic verification value for electronic payment transactions are disclosed. The dynamic verification value is generated via a function-based algorithm that accepts a plurality of security values as input. By selecting a set of security values from the plurality of the available security values, the level of complexity and security of the dynamic verification value can be adjusted and a unique security characteristic for the dynamic verification value is obtained. Also, the issuers of portable consumer devices are able to regenerate the dynamic verification value by inputting an issuer secret phrase into the same type of function-based algorithm that was used originally to generate the dynamic verification value. | 09-15-2011 |
20110225090 | SYSTEM AND METHOD INCLUDING CUSTOMIZED LINKAGE RULES IN PAYMENT TRANSACTIONS - Systems and methods for generating a dynamic verification value for electronic payment transactions are disclosed. A user of a portable consumer device enrolls the account identifier associated with the portable consumer device and specifies one or more customized linkage rules that identify one or more user communication devices and user identifiers that should be used to submit an authentication request message to an entity that generates a dynamic verification value. A server computer that receives an authentication request message determines whether the authentication request message complies with the specified customized linkage rules and generates a dynamic verification value. | 09-15-2011 |
20110225094 | SYSTEM AND METHOD INCLUDING DYNAMIC VERIFICATION VALUE - System and methods for generating a dynamic verification value for electronic payment transactions are disclosed. An account identifier and an account attribute associated with an account of a user are received at a server computer. A dynamic account attribute is created and concatenated with the account identifier. The concatenated account identifier and the dynamic account attribute are then used to generate a dynamic verification value. The dynamic verification value and the dynamic account attribute are then sent to a user communication device and used for authentication in a payment transaction. | 09-15-2011 |
20110270757 | SYSTEM AND METHOD FOR SECURELY VALIDATING TRANSACTIONS - Systems and methods for validating and processing payment transactions are disclosed. In the embodiments of the invention a first authorization request message and a first verification value are received at a server computer. The verification value is validated and a second authorization request message with a second verification value is generated. The first verification value may be a dynamic value and the second verification value may be static value. The second verification value is associated with portable device used to perform a transaction and it is what the issuer computers of the portable device expect to receive as part of an authorization request message in a payment transaction. | 11-03-2011 |
20110276487 | SYSTEM AND METHOD INCLUDING CHIP-BASED DEVICE PROCESSING FOR TRANSACTION - Present embodiments are directed to a server computer. The server computer establishes a first channel of communication to receive payment device data in a first format (e.g., chip type) and establishes a second channel to receive the payment device data in a second format (e.g., legacy type). The server computer receives an authorization request message in the second format from a merchant and generates a new authorization request message in the first format. The server computer then forwards the new authorization request to the issuer for approval. | 11-10-2011 |
20110313873 | Form Factor Identification - A payment device, method, and apparatus configured to determine the form factor of the payment device used in a financial transaction, without requiring a different primary account number for each payment device form factor. | 12-22-2011 |
20120012650 | COMPACT PROTOCOL AND SOLUTION FOR SUBSTANTIALLY OFFLINE MESSAGING BETWEEN PORTABLE CONSUMER DEVICE AND BASE DEVICE - A method for providing messaging between a portable device and base device is provided. The method included communicating one or more message codes maintained in the portable device to the base device. The base device then composes a message for a user of the portable device using a dictionary of message codes. The message codes have corresponding message values, which are used to generate the message for the one or more message codes. The generated message is then provided to the user. | 01-19-2012 |
20120016756 | Method and System for Providing a Distributed Adaptive Rules Based Dynamic Pricing System - A system for providing distributed control to process transactions is disclosed. The system includes a service provider system having associated therewith a number of rules and a number of meta-rules, a point of service device having associated therewith a number of rules and a number of meta-rules, and a portable device having associated therewith a number of rules and a number of meta-rules. The portable device uses its associated rules to determine an outcome for a transaction. If the portable device is unable to determine the outcome for the transaction, the portable device uses its associated meta-rules to either determine whether one or more of its associated rules can be altered locally in order to determine the outcome or request the point of service device to help determine the outcome using the rules and meta-rules associated with the point of service device. If the point of service device is unable to determine the outcome using its associated rules, the point of service device uses its associated meta-rules to either determine whether one or more of its associated rules can be altered locally in order to determine the outcome or request the service provider system to help determine the outcome using the rules and meta-rules associated with the service provider system. | 01-19-2012 |
20120018506 | VERIFICATION OF PORTABLE CONSUMER DEVICE FOR 3-D SECURE SERVICES - Apparatuses, methods, and systems pertaining to the verification of portable consumer devices for 3-D Secure Systems are disclosed. In one implementation, a verification token is coupled to a computer by a USB connection so as to use the computer's networking facilities. The verification token reads identification information from a user's portable consumer device (e.g., credit card) and sends the information to a validation entry over a communications network using the computer's networking facilities. The validation entity applies one or more validation tests to the information that it receives from the verification token. If a selected number of tests are passed, the validation entity sends a 3-D Secure datum to the verification token. The verification token may enter the 3-D Secure datum into a hidden field of a Purchase Authentication Page appearing on the computer's display. | 01-26-2012 |
20120018511 | INTEGRATION OF VERIFICATION TOKENS WITH PORTABLE COMPUTING DEVICES - Apparatuses, methods, and systems pertaining to the verification of portable consumer devices are disclosed. In one implementation, a verification token is communicatively coupled to a computer by a USB connection so as to use the computer's networking facilities. The verification token reads identification information from a user's portable consumer device (e.g., credit card) and sends the information to a validation entry over a communications network using the computer's networking facilities. The validation entity applies one or more validation tests to the information that it receives from the verification token. If a selected number of tests are passed, the validation entity sends a device verification value to the verification token, and optionally to a payment processing network. The verification token may enter the device verification value into a CVV field of a web page appearing on the computer's display, or may display the value to the user using the computer's display. | 01-26-2012 |
20120023567 | TOKEN VALIDATION FOR ADVANCED AUTHORIZATION - A server computer for implementing advanced authorization using token validation is provided. The server computer comprises a processor and a computer readable medium coupled to the processor comprising code executable by the processor for implementing a method. The method comprises receiving verification information that is based on a verification token associated with a client computer. The method further comprises receiving transaction information associated with a first transaction and receiving account information associated with a payment account used in the first transaction. A risk score associated with the first transaction is generated based on at least the verification information, the transaction information, and the account information. | 01-26-2012 |
20120030047 | PAYMENT TOKENIZATION APPARATUSES, METHODS AND SYSTEMS - The PAYMENT TOKENIZATION APPARATUSES, METHODS AND SYSTEMS (“PT”) transform payment token-based purchase orders via PT components into multi-issuer purchase payment funds transfers. In one embodiment, the PT obtains a token arbitration request including unique source-neutral universally-resolvable payment token information from a merchant for processing a purchase order from a user. The PT queries a token database for issuer information on an issuer using the payment token information, and obtains the issuer information. The PT also determines that the user should be queried for payment options based on the issuer information, generates a payment options request, and provides the payment options request to a mobile device of the user. Upon obtaining a response to the payment options request from the mobile device of the user, the PT generates a purchase authorization request based on the payment options and pre-defined settings for issuers to be contacted for processing the purchase order, and provides the generated purchase authorization request to the issuer. | 02-02-2012 |
20120031969 | INTEGRATION OF VERIFICATION TOKENS WITH MOBILE COMMUNICATION DEVICES - Apparatuses, methods, and systems pertaining to the verification of portable consumer devices are disclosed. In one implementation, a verification token is communicatively coupled to a computer by a USB connection so as to use the computer's networking facilities. The verification token reads identification information from a user's portable consumer device (e.g., credit card) and sends the information to a validation entry over a communications network using the computer's networking facilities. The validation entity applies one or more validation tests to the information that it receives from the verification token. If a selected number of tests are passed, the validation entity sends a device verification value to the verification token, and optionally to a payment processing network. The verification token may enter the device verification value into a CVV field of a web page appearing on the computer's display, or may display the value to the user using the computer's display. | 02-09-2012 |
20120047003 | VIRAL OFFERS - Embodiments can relate to systems and methods involving viral offers. In one embodiment, a viral offer is sent to a communication device associated with a first user enrolled with a viral offer program operated by a viral offer server computer. After the viral offer is sent, an authorization request message for a transaction conducted by a second user is received. After receiving the authorization request message, a viral offer record associated with the viral offer is accessed. The viral offer record includes a velocity limit, and if the velocity limit has not been met, the velocity limit is updated. | 02-23-2012 |
20120084164 | ACCUMULATION ALERTS - Systems and methods for defining, observing and detecting transactions that initiate an alert message to be sent to one or more users are disclosed. Aggregate threshold, number of transactions and proximity to reward types of alert messages and alert criteria can be defined or selected by users, merchants, and issuers. Alert messages can be sent based on aggregating transaction data from an observed transaction with information from historical transactions, such as credit card transactions. If the aggregated transaction data associated with the transactions match any of the alert criteria, then alert messages can be sent to one or more users. An alert message may include information from the alert trigger as well as the aggregated transaction data. | 04-05-2012 |
20120109818 | Third Party Integrated Security System - A third party payment system is provided which allows a user to conduct transactions through payment accounts stored on the third party payment system. The user can enroll in the third party payment system and create an account with registered payment accounts. The user can access the payment accounts via a mobile device and load the payment data associated with a payment account to the mobile device. The user can then utilize the mobile device to provide payment during a transaction. | 05-03-2012 |
20120116976 | VERIFICATION OF PORTABLE CONSUMER DEVICE FOR 3-D SECURE SERVICES - Apparatuses, methods, and systems pertaining to the verification of portable consumer devices for 3-D Secure Systems are disclosed. In one implementation, a verification token is coupled to a computer by a USB connection so as to use the computer's networking facilities. The verification token reads identification information from a user's portable consumer device (e.g., credit card) and sends the information to a validation entry over a communications network using the computer's networking facilities. The validation entity applies one or more validation tests to the information that it receives from the verification token. If a selected number of tests are passed, the validation entity sends a 3-D Secure datum to the verification token. The verification token may enter the 3-D Secure datum into a hidden field of a Purchase Authentication Page appearing on the computer's display. | 05-10-2012 |
20120136735 | METHOD AND SYSTEM FOR GENERATING A DYNAMIC VERIFICATION VALUE - A method is disclosed. The method includes generating a verification value in response to a transaction involving a portable consumer device, where the verification value is generated using a first dynamic data element and a second dynamic data element. The verification value is sent to a service provider associated with the portable consumer device so that the service provider can verify the transaction. | 05-31-2012 |
20120136796 | Device Enrollment System and Method - Embodiments related to systems and methods comprising receiving payment data at an access device; receiving an identifier for a mobile device at the access device; and generating and sending an authorization request message to a payment processing network, wherein the payment processing network generates a verification token, which is then sent to the mobile device whereby the mobile device is thereafter used to conduct payment transactions. | 05-31-2012 |
20120143768 | Device Enrollment System and Method - Embodiments related to systems and methods comprising receiving payment data at an access device; receiving an identifier for a phone at the access device; and generating and sending an authorization request message to a payment processing network, wherein the payment processing network generates a verification token, which is then sent to the phone whereby the phone is thereafter used to conduct payment transactions. | 06-07-2012 |
20120158467 | SMART SIGN MOBILE TRANSIT FARE PAYMENT - A system and method for facilitating the payment and collection of transit system fares using a mobile device utilizes a smart sign including near field communication (NFC) devices that communicate with a contactless element embedded within a mobile wireless device. Each NFC device is associated with a different transit location. The NFC devices may be included on the same smart sign located at one transit location or on different smart signs located at different transit locations. Alternatively, one NFC device may be included on a smart sign at a departure location and another NFC device may be activated when or after the user enters the transit system to provide proof of fare purchase. The mobile device is positioned proximate the NFC devices to activate the NFC devices and access fare and/or schedule information or purchase a fare. | 06-21-2012 |
20120158591 | CONSUMER AUTHENTICATION SYSTEM AND METHOD - A method for authenticating a consumer. The method includes receiving an authorization request message associated with a consumer conducting a transaction with a portable consumer device. A challenge message is sent to the consumer, where the challenge message is dynamic or semi-dynamic. A challenge response message is received from the consumer, and an authorization response message is sent to the consumer. The authorization response message indicates whether or not the transaction is authorized. | 06-21-2012 |
20120166341 | DEVICE INCLUDING AUTHENTICATION GLYPH - A method is disclosed. It includes displaying, by a device, an authentication image including a plurality of image elements comprising a set of image elements, wherein the image elements in the set of image elements are located at a set of positions on a display screen. The method also comprises receiving, at the device, a glyph having a configuration corresponding to the set of image elements from a user while the authentication image is displayed. The method further comprises determining if the glyph is authentic, and initiating a payment transaction after receiving the glyph. | 06-28-2012 |
20120209749 | SNAP MOBILE PAYMENT APPARATUSES, METHODS AND SYSTEMS - The SNAP MOBILE PAYMENT APPARATUSES, METHODS AND SYSTEMS (“SNAP”) transform real-time-generated merchant-product Quick Response codes via SNAP components into virtual wallet card-based transaction purchase notifications. In one embodiment, the SNAP obtains a snapshot of a QR code presented on a display screen of a point-of-sale device from a mobile device. The SNAP decodes the QR code to obtain product information included in a checkout request of the user, and merchant information for processing a user purchase transaction with a merchant providing the QR code. The SNAP accesses a user virtual wallet to obtain user account information to process the user purchase transaction with the merchant. Using the product information, merchant information and user account information, the SNAP generates a card authorization request, and which the SNAP provides to a payment network for transaction processing. Also, the SNAP obtains a purchase receipt confirming processing of the user purchase transaction. | 08-16-2012 |
20120221421 | SECURE ANONYMOUS TRANSACTION APPARATUSES, METHODS AND SYSTEMS - The SECURE ANONYMOUS TRANSACTION APPARATUSES, METHODS AND SYSTEMS (“SAT”) transform hardware-verified user authentication requests via SAT components into secure transaction notifications. In one implementation, the SAT obtains a secure anonymous transaction user authentication request. The SAT verifies the authenticity of a user, using the secure anonymous transaction user authentication request. The SAT obtains an authenticated purchase order, in response to which it generates a one-time anonymous card account. Using the one-time card account, the SAT generates an anonymized purchase order for a merchant, and provides the anonymized purchase order. On obtaining a purchase notification for the anonymized purchase order, the SAT provides a real-time notification for a user of the purchase notification. Also, on obtaining notification of a shipment related to the anonymized purchase order to an anonymized address, the SAT generates an order to re-route the shipment from the anonymized address to an actual shipment address of the user. | 08-30-2012 |
20120226582 | Integration of Payment Capability into Secure Elements of Computers - Methods, secure elements, validation entities, and computer program products for effecting secure communication of payment information to merchants for Internet-based purchases. Payment information for a user's real payment information is installed in a secure element of a computer, the payment information may comprise a pseudo PAN number for the portable consumer device provided by a validation entity. The secure element is shielded from the computer's operating system to thwart hacker attacks. The user accesses the secure element to make a purchase. In response, the secure element contacts the validation entity with the pseudo account number, and in response obtains dynamic payment information that the secure element can used to effect the payment. The dynamic payment information comprises an account number that is different from the pseudo PAN, and which has at least one difference which respect to the user's real payment information. | 09-06-2012 |
20120259782 | MULTIPLE TOKENIZATION FOR AUTHENTICATION - Embodiments of the present invention are directed generally to systems, methods, and apparatuses for authenticating a cardholder using multiple tokenization authentication. Embodiments of the invention are directed at a method. The method includes receiving at a first entity a first token from a consumer and determining a second token associated with the first token. Once the second token is determined, the second token is sent to a server computer at a second entity. The server computer then determines an account identifier associated with the second token and processes a transaction using the account identifier. | 10-11-2012 |
20120259784 | FRAUD AND REPUTATION PROTECTION USING ADVANCED AUTHORIZATION AND RULES ENGINE - Systems and methods are presented for analyzing a credit card or other financial transaction and, based on whether a score for the transaction meets or exceeds a user-selected threshold, sending a transaction notification message to a consumer's electronic device such as a cell phone. | 10-11-2012 |
20120271691 | SYSTEMS AND METHODS TO PROVIDE OFFER COMMUNICATIONS TO USERS VIA SOCIAL NETWORKING SITES - Systems and methods to integrate offer processing in a social networking environment. A computing apparatus includes: a data warehouse configured to store data associating a social networking account of a user with a financial payment account of the user; a portal configured to provide an offer to the user of the social networking account and to store data associating the offer with the financial payment account; a transaction handler configured to monitor transactions in the financial payment account of the user and detect a transaction that satisfies a set of requirements of the offer, when an authorization request for the transaction is being processed by the transaction handler; a message broker configured to generate a message in response to the transaction being detected; and a media controller coupled with the message broker to communicate the message to a social networking site. | 10-25-2012 |
20120271712 | IN-PERSON ONE-TAP PURCHASING APPARATUSES, METHODS AND SYSTEMS - Methods, systems, and devices are disclosed for transforming product code snapshots into real-time, offer-driven electronic purchase transaction notifications that minimize fraud. In one embodiment, a smart phone scans a product identifier from a product package, a server accesses a products database for product purchase offers associated with the product identifier, a user authorizes a credit card from his or her wallet to charge, and then product purchase offers or other credit card offers (for loyalty points or otherwise) are provided to the user mobile device. After a user has purchased an item while in the aisle of the store, the user's smart phone displays a barcoded electronic receipt that can be scanned by the exit so that the consumer can walk out with the produce. In some embodiments, a video chat is requested by a customer service representative and a transaction risk score is lowered based on acceptance of the video chat. | 10-25-2012 |
20120284187 | SYSTEM AND METHOD FOR PROCESSING PAYMENT TRANSACTIONS - A system and associated data processing flow for processing payment transactions that are conducted using a payment account or portable consumer device. The portable consumer device may be in any suitable form, including cards, key fobs, devices containing a contactless element, smart cards (having contacts or without contacts), etc. The invention separates the authentication of the payment account or payment device from the transaction authorization process, enabling different entities to be responsible for each of those functions. | 11-08-2012 |
20120310832 | PAYMENT TRANSACTION USING MOBILE PHONE AS RELAY - Systems and methods of conducting a payment transaction using a mobile phone as a relay. The systems and methods receive transaction information associated with a transaction at a mobile communication device from a merchant. They send the transaction information with the mobile communication device to an issuer associated with the mobile communication device. The issuer thereafter sends an authorization response message to the merchant. | 12-06-2012 |
20130006847 | Mixed Mode Transaction Protocol - As opposed to using one type of technology from the beginning of a transaction to the end of a transaction at the point of sale, embodiments of the present invention are related to useful techniques for conducting mixed mode transactions. A mixed mode transaction combines at least two modes of communication used in transaction processing. A transaction may start by initiating the transaction using a first communication mode between a first device and a second device. The first device may be a consumer's mobile device, and the device may be a merchant access device or point of sale terminal. To continue the transaction, a second mode of communication may be initiated. The first and second communications modes may be a physical interaction-based mode, a contact or contactless chip mode, a Bluetooth mode, a WiFi mode, an infrared (IR) mode, or any other suitable communication mode. | 01-03-2013 |
20130036003 | INPUT DEVICE WITH AN ACCELEROMETER - Methods, devices, and systems are described for bumping a mobile device, such as a smart phone, against a fixed poster board display at a store to initiate a download of coupons, advertisements, or other benefits to the mobile device. Products can be rated by a user's up/down bump or other bump patterns. Using accelerometer-based inertial measurements, multiple users can control multiple mouse cursors on a large display with their mobile devices in order to select information to be downloaded to their mobile devices. The multiple users can bump the display in order to select their items simultaneously. | 02-07-2013 |
20130037610 | Real Time Balance On Card Plastic - A system, method and credit card configured to display a current card balance on the credit card. The credit card receives a balance request from a button on the card. After retrieving the current card balance encoded on the credit card, the card displays the current card balance. Remote terminals may be configured to support the real-time display of a balance on a credit card by writing the current balance to the card after a payment transaction has occurred. | 02-14-2013 |
20130041766 | Method and System for Providing a Distributed Adaptive Rules Based Dynamic Pricing System - A system for providing distributed control to process transactions is disclosed, including a service provider system, a point of service device, and a portable device. The service provider system, point of service (POS) device, and portable device each have a plurality of rules and a number of meta-rules. The portable device is used with the POS device to conduct a transaction. If the portable device is unable to determine the outcome for the transaction, the portable device determines whether its rules may be altered locally to determine the outcome, or request the POS device to help determine the outcome. If the POS device is unable to determine the outcome, the POS device determines whether its rules can be altered locally in order to determine the outcome, or request the service provider system to help determine the outcome using the rules and meta-rules associated with the service provider system. | 02-14-2013 |
20130054454 | Wallet Service Enrollment Platform Apparatuses, Methods and Systems - The WALLET SERVICE ENROLLMENT PLATFORM APPARATUSES, METHODS AND SYSTEMS (“WSEP”) facilitates the enrollment of payment accounts in a consumer's virtual wallet. The consumer may be logged into their payment account issuer's web site and designate one or more payment accounts for enrollment in a virtual wallet. The issuer may then share account, billing and/or other relevant information with the virtual wallet provider to facilitate the enrollment of the designated payment accounts in the virtual wallet. The WSEP may also be configured to facilitate the creation and funding of pre-paid accounts in a consumer's virtual wallet. | 02-28-2013 |
20130066781 | ENCRYPTION SWITCH PROCESSING - A method for delivering non-financial electronic data through a secure communications channel between a payment processing network and an access device is disclosed. One embodiment of the invention is directed to a method comprising receiving, at a payment processing network, a request to establish a secure communications channel between a consumer device and the payment processing network. Upon establishing a secure communications channel with the consumer device, the payment processor network receives non-financial electronic content from a merchant at the payment processing network where the non-financial electronic content is selected at the merchant by a user associated with the consumer device. The non-financial electronic content is sent to the consumer device from the payment processing network via the secure communications channel between the consumer device and the payment processing network. | 03-14-2013 |
20130138565 | VERIFICATION OF A PORTABLE CONSUMER DEVICE IN AN OFFLINE ENVIRONMENT - A portable consumer device includes a base, and a computer readable medium on the base. The computer readable medium comprises code for an issuer verification value and a supplemental verification value. The issuer verification value is used by an issuer to verify that the portable consumer device is authentic in an on-line transaction and the supplemental verification value is used to verify that the portable consumer device is authentic in an off-line transaction. | 05-30-2013 |
20130144785 | SOCIAL NETWORK PAYMENT AUTHENTICATION APPARATUSES, METHODS AND SYSTEMS - The SOCIAL NETWORK PAYMENT AUTHENTICATION APPARATUSES, METHODS AND SYSTEMS (“SNPA”) transform social networking user login inputs via SNPA components into notifications of authenticated purchase transactions. In one embodiment, the SNPA obtains an authentication request for a purchase transaction. The SNPA extracts card account data related to the authentication request, and provides the card account data related to the authentication request to a social networking server. The SNPA also provides an indication for a user to authenticate via logging into a social networking service associated with the social networking server. The SNPA obtains an indication from the social networking server that the user is authenticated. In response to obtaining the indication that the user is authenticated, the SNPA initiates completion of the purchase transaction. | 06-06-2013 |
20130159081 | BIDIRECTIONAL BANDWIDTH REDUCING NOTIFICATIONS AND TARGETED INCENTIVE PLATFORM APPARATUSES, METHODS AND SYSTEMS - The BIDIRECTIONAL BANDWIDTH REDUCING NOTIFICATIONS AND TARGETED INCENTIVE PLATFORM APPARATUSES, METHODS AND SYSTEMS (“Ad-Track”) transform consumer activity data via Ad-Track components into ad revenue sharing payment transactions. In one implementation, a method of improving network data transmission efficiency and reducing network bandwidth usage is disclosed, comprising: instantiating a remote tracking component on a user device; receiving a consumer trigger event with regard to a product via the remote tracking component; determining a related merchant based on the trigger event, the merchant providing the product; and providing an advertisement component advertising the merchant via the remote tracking component to the consumer. | 06-20-2013 |
20130159154 | WALLET SERVICE ENROLLMENT PLATFORM APPARATUSES, METHODS AND SYSTEMS - The WALLET SERVICE ENROLLMENT PLATFORM APPARATUSES, METHODS AND SYSTEMS (“WSEP”) facilitates the enrollment of payment accounts in a consumer's virtual wallet. The consumer may be logged into their payment account issuer's web site and designate one or more payment accounts for enrollment in a virtual wallet. The issuer may then share account, billing and/or other relevant information with the virtual wallet provider to facilitate the enrollment of the designated payment accounts in the virtual wallet. The WSEP may also be configured to facilitate the creation and funding of pre-paid accounts in a consumer's virtual wallet. | 06-20-2013 |
20130159446 | Supplemental Alert System and Method - Embodiments of the invention provide an “also notify” feature that allows a user to set up rules to notify a recipient that a transaction was conducted by the user. When a user conducts a transaction using an account associated with a server computer in an alert system, the server computer generates an alert message if a rule is triggered. The alert message is transmitted to the user informing of the transaction. The server computer also notifies a recipient on a platform specified in the triggered rule by the user, using a supplemental alert message. | 06-20-2013 |
20130166332 | MOBILE WALLET STORE AND SERVICE INJECTION PLATFORM APPARATUSES, METHODS AND SYSTEMS - The MOBILE WALLET STORE AND SERVICE INJECTION PLATFORM APPARATUSES, METHODS AND SYSTEMS (“SEWI”) transform user goal, trigger, trigger monitoring and paperless electronic ticket entry inputs via SEWI components into triggered monitoring updates, purchase transaction triggers, and goal resolution outputs. In one implementation, the SEWI obtains a consumer item interest indication including a context of the consumer's interest focus. The SEWI ascertains a consumer activity intent assessment from consumer atmospheric activity indicia, wherein the consumer atmospheric activity indicia include a geographic location and the obtained consumer item interest indication. The SEWI determines a dynamic injection virtual wallet component to service the consumer item interest indication, wherein the dynamic injection virtual wallet component may include any of: an augmented reality heads up display overlaying wish list or virtual wallet purchase cart items; a concierge request; and merchant offerings. The SEWI provides the determined dynamic injection virtual wallet component to a consumer's virtual wallet for instantiation. | 06-27-2013 |
20130179248 | METHOD AND SYSTEM FOR MANAGING REWARD REVERSAL AFTER POSTING - A system for managing reward reversal is provided. The system includes a device that is capable of adjusting the accumulation and redemption levels of rewards after a purchase or return transaction. | 07-11-2013 |
20130191283 | Authentication of a Data Card Using a Transit Verification Value - Transaction processing involves receiving data from an access transaction application of a portable consumer device, wherein the received data comprises data from an access transaction data string that includes a transit verification value wherein, with the exception of the transit verification value, the access transaction data string is substantially similar to a retail data string comprising retail data, wherein the access application data string is adapted for use with an access transaction processing system and the retail data string is adapted for use with a retail processing system. The transaction processing involves processing access transaction application data for selective authorization of the transaction. | 07-25-2013 |
20130198046 | MOBILE DATA MAPPING SYSTEM AND METHOD - Embodiments of the invention are related to systems and methods for analyzing transaction data for mobile merchant transactions, and generating a message based on the analysis. Transaction data for one or more transactions conducted at one or more mobile merchants is electronically received, the transaction data including a location for each of the one or more transactions. The transaction data is analyzed by a server computer which generates a message based on the analysis, the message being transmitted to a client device. | 08-01-2013 |
20130218721 | TRANSACTION VISUAL CAPTURING APPARATUSES, METHODS AND SYSTEMS - The TRANSACTION VISUAL CAPTURING APPARATUSES, METHODS AND SYSTEMS (“TVC”) transform mobile device location coordinate information transmissions, real-time reality visual capturing, and mixed gesture capturing via TVC components into real-time behavior-sensitive product purchase related information, shopping purchase transaction notifications, and electronic receipts. In one implementation, the TVC obtains user check-in information from a user mobile device upon user entry into a store. The TVC extracts a user identifier based on the user check-in information, and accesses a database for a user profile. The TVC determines a user prior behavior pattern from the accessed user profile, and obtains user real-time in-store behavior data from the user mobile device. Using these, the TVC generates and provides a recommendation to the user mobile device. The TVC adds a product for purchase by the user to a cart based on the provided recommendation. Upon obtaining an indication that the user desires to purchase the product added to the cart, the TVC initiates a purchase transaction for the product added to the cart, and provides an electronic receipt to the user mobile device. | 08-22-2013 |
20130218760 | FINANCIAL TRANSACTION TOKEN WITH ONBOARD POWER SOURCE - There is provided a card or token for use in financial transactions. The financial transaction token or card has an onboard energy storage device that enables onboard electronics to operate when the card is not in the proximity of a merchant Point-Of-Service (POS) terminal. In one implementation, the onboard energy storage device includes a capacitor such as a thin-film capacitor that stores sufficient energy to power onboard electronics without the need for an onboard battery. The card may be incorporated within various conventional apparatus such as a see-through and/or protective substrate, an item of clothing, an item of jewelry, a cell phone, a Personal Digital Assistant (PDA), a credit card, an identification card, a money holder, a wallet, a personal organizer, a keychain payment tag, and like personality. | 08-22-2013 |
20130218765 | GRADUATED SECURITY SEASONING APPARATUSES, METHODS AND SYSTEMS - The GRADUATED SECURITY SEASONING APPARATUSES, METHODS AND SYSTEMS (“GSS”) transform user virtual wallet activity and historical fraud reports via GSS components into transaction authorization triggers generated pursuant to graduated, transaction risk-appropriate, escalated security protocols. In one implementation, the GSS obtains a current transaction request, the request utilizing a user virtual wallet account for payment. The GSS identifies a transaction risk type associated with the request, and calculates a transaction risk level associated with the transaction risk type. Based on the transaction risk level, the GSS selects a security protocol for processing the current transaction request; and provide a security data request in accordance with the selected security protocol. The GSS also generates an offer, for an entity involved in processing the current transaction request, of a financial incentive in exchange for assuming the transaction risk level associated with the transaction risk type; and provides the offer for the entity. | 08-22-2013 |
20130226684 | MERCHANT CONFIGURATION THROUGH PAYMENT NETWORK - Embodiments of the invention are related to systems and methods for applying a discount to an electronic transaction based on control data stored in a portable merchant device. An access device interacts with a portable merchant device associated with a merchant, the portable merchant device storing control data. A processor in the access device generates a message including the control data, and electronically transmits the message to a server computer. The control data causes the server computer to reconfigure for a transaction conducted by the merchant. | 08-29-2013 |
20130226802 | VERIFICATION VALUE SYSTEM AND METHOD - A method is disclosed. The method includes generating a verification value in response to a transaction involving a portable consumer device, where the verification value is generated using a first dynamic data element and a second dynamic data element. The verification value is sent to a service provider associated with the portable consumer device so that the service provider can verify the transaction. | 08-29-2013 |
20130238499 | SECURITY SYSTEM INCORPORATING MOBILE DEVICE - In some embodiments, a first server computer may be provided. The first server computer may comprise a processor and a computer readable medium coupled to the processor. The computer readable medium may include code executable by the processor for implementing a method. The method may include the step of electronically receiving an authorization request message that includes a first device verification value from a merchant for a first transaction, where the first device verification value may have been received by the merchant from a mobile device based on an interaction between the mobile device and an access device. In some embodiments, the mobile device may have received the first verification value based on a first request. The method may further include the step of determining by a data processor if the first device verification value corresponds to a stored device verification value. | 09-12-2013 |
20130246220 | MOBILE LOCATION NOTIFICATIONS SYSTEM AND METHOD - Embodiments of the invention are directed to systems, apparatuses, and methods for determining the location of a mobile merchant, and performing further processing based on the determined location. Transaction data for a transaction conducted by a mobile merchant is electronically received at a server computer. The server computer determines a location of the mobile merchant based on the transaction data, and performs further processing based on the location of the mobile merchant. | 09-19-2013 |
20130246261 | Multi-Directional Wallet Connector Apparatuses, Methods and Systems - The MULTI-DIRECTIONAL WALLET CONNECTOR APPARATUSES, METHODS AND SYSTEMS (“W-CONNECTOR”) facilitates the enrollment of payment accounts in a consumer's virtual wallet. The consumer may be logged into their payment account issuer's web site and designate one or more payment accounts for enrollment in a virtual wallet. The issuer may then share account, billing and/or other relevant information with the virtual wallet provider to facilitate the enrollment of the designated payment accounts in the virtual wallet. The W-CONNECTOR may also be configured to facilitate the creation and funding of pre-paid accounts in a consumer's virtual wallet. | 09-19-2013 |
20130254112 | System and Method Including Chip-Based Device Processing For Transaction - Present embodiments are directed to a server computer. The server computer establishes a first channel of communication to receive payment device data in a first format (e.g., chip type) and establishes a second channel to receive the payment device data in a second format (e.g., legacy type). The server computer receives an authorization request message in the second format from a merchant and generates a new authorization request message in the first format. The server computer then forwards the new authorization request to the issuer for approval. | 09-26-2013 |
20130275310 | TERMINAL DATA ENCRYPTION - A method is disclosed. The method includes generating an initial key after interacting with an access device, storing the initial key at a key storage location, altering the initial key with a public key to form an altered key, and sending the altered key to a server computer along with an identifier for the access device. The altered key is changed to the initial key at the server computer and is stored with the identifier in a database in operative communication with the server computer. The initial keys that are stored at the key storage location and in the database are used to alter and restore transaction data associated with multiple financial transactions that are conducted using the access device. | 10-17-2013 |
20130282591 | Method And System Using Candidate Dynamic Data Elements - A method and computer readable medium for conducting a transaction, comprising receiving a verification value and a portion of a dynamic data element, determining candidate dynamic data elements using the portion of the dynamic data element, calculating candidate verification values using candidate dynamic data elements, and determining if the received verification value matches any of the candidate verification values, wherein the transaction is thereafter authenticated if a candidate verification value matches a candidate verification value. | 10-24-2013 |
20130339243 | OPEN SYSTEM ACCOUNT REMOTE VALIDATION FOR ACCESS - At each of a plurality of point of sale terminals (POS) of a transit system, for each of a plurality of riders, where each rider seeks access into a facility of the transit facility by using a payment device issued by an issuer in a payment system, data is read from the payment device. The data can include an identifier for an account issued by an issuer. For each such access, a communication including the account is addressed to a network address of a system remote from the payment processing system and remote from each of POS terminals. A response to the communication is received that includes information as to the validation of the access based upon the account being on a list keep by remote system. When the received information contains the validation of the access, the rider is permitted access to the facility of the transit system and the payment device is unchanged for the fare of the access to the facility of the transit system. | 12-19-2013 |
20140006284 | PRE-AUTHORIZATION OF A TRANSACTION USING PREDICTIVE MODELING | 01-02-2014 |
20140040127 | Virtual Wallet Card Selection Apparatuses, Methods and Systems - The VIRTUAL WALLET CARD SELECTION APPARATUSES, METHODS AND SYSTEMS (“VWCS”) transform virtual wallet card selections by users utilizing mobile devices via VWCS components into virtual wallet card-based transaction purchase notifications. In one implementation, the VWCS obtains a user authentication request for a purchase transaction, and extracts a universal card account number from it. Upon querying a database, the VWCS determines that the user has access to a virtual wallet and obtains virtual wallet card selection options for the user from the database. The VWCS provides the virtual wallet card selection options to a user mobile device, and obtains a user selection of an account included among the options. The VWCS initiates a purchase transaction using the user selection. Also, upon completion of authorization of the purchase transaction, the VWCS provides a purchase receipt to the user mobile device. | 02-06-2014 |
20140061302 | INTEGRATION OF VERIFICATION TOKENS WITH PORTABLE COMPUTING DEVICES - Apparatuses, methods, and systems pertaining to the verification of portable consumer devices are disclosed. In one implementation, a verification token is communicatively coupled to a computer by a USB connection so as to use the computer's networking facilities. The verification token reads identification information from a user's portable consumer device (e.g., credit card) and sends the information to a validation entry over a communications network using the computer's networking facilities. The validation entity applies one or more validation tests to the information that it receives from the verification token. If a selected number of tests are passed, the validation entity sends a device verification value to the verification token, and optionally to a payment processing network. The verification token may enter the device verification value into a CVV field of a web page appearing on the computer's display, or may display the value to the user using the computer's display. | 03-06-2014 |
20140074637 | CLOUD-BASED VIRTUAL WALLET NFC APPARATUSES, METHODS AND SYSTEMS - The CLOUD-BASED VIRTUAL WALLET NFC APPARATUSES, METHODS AND SYSTEMS (“EAE”) transform user enhanced security transaction initiation requests using EAE components into time-limited, session-specific transaction bounding tokens. In some implementations, the disclosure provides a processor-implemented method of transforming a transaction bounding token request into transaction bounded tokens and purchase authorizations. | 03-13-2014 |
20140095288 | NETWORK CENTRIC LOYALTY SYSTEM - A network centric system that enables participation by any number of entities including sponsors, issuers, merchants, portable devices, and acceptance point devices in one or more loyalty programs is provided. Any combination of entities may be specified for different loyalty programs. | 04-03-2014 |
20140110477 | INTEGRATION OF VERIFICATION TOKENS WITH MOBILE COMMUNICATION DEVICES - Apparatuses, methods, and systems pertaining to the verification of portable consumer devices are disclosed. In one implementation, a verification token is communicatively coupled to a computer by a USB connection so as to use the computer's networking facilities. The verification token reads identification information from a user's portable consumer device (e.g., credit card) and sends the information to a validation entry over a communications network using the computer's networking facilities. The validation entity applies one or more validation tests to the information that it receives from the verification token. If a selected number of tests are passed, the validation entity sends a device verification value to the verification token, and optionally to a payment processing network. The verification token may enter the device verification value into a CVV field of a web page appearing on the computer's display, or may display the value to the user using the computer's display. | 04-24-2014 |
20140183259 | Authentication of a Data Card Using a Transit Verification Value - Transaction processing involves receiving data from an access transaction application of a portable consumer device, wherein the received data comprises data from an access transaction data string that includes a transit verification value wherein, with the exception of the transit verification value, the access transaction data string is substantially similar to a retail data string comprising retail data, wherein the access application data string is adapted for use with an access transaction processing system and the retail data string is adapted for use with a retail processing system. The transaction processing involves processing access transaction application data for selective authorization of the transaction. | 07-03-2014 |
20140197234 | Snap Mobile Security Apparatuses, Methods and Systems - The SNAP MOBILE SECURITY APPARATUSES, METHODS AND SYSTEMS (hereinafter “SMS”) provide verification, access and security, via SMS components, to virtual wallet based electronic financial transactions. In one implementation, the SMS receives a request from a user's device to decode a scannable code and verify the security of the decoded code's contents. In some implementations, the SMS decodes the scannable code to obtain code contents requesting access to the wallet account. In some implementations, the SMS obtains from the user digital fingerprints of the user device and a request identifier for the request to access the wallet account. In some implementations, the SMS receives from the access requester digital signatures for the requester and the request identifier. In some implementations, the SMS confirms the digital fingerprints of the user device verify the device is authorized to access the wallet account. In some implementations, the SMS confirms the received digital signatures verify the access requester and the request are authorized to access the wallet account. In some implementations, the SMS sends wallet unlock and activity unlock keys to the device for activity access to the wallet. | 07-17-2014 |
20140214658 | MOBILE DEVICE CONTAINING CONTACTLESS PAYMENT CARD USED IN TRANSIT FARE COLLECTION - An apparatus such as a mobile phone includes a contactless smart card or payment device, where the smart card is intended for use in both commerce transaction payment and transit fare payment (or other venue access) environments. The payment device may function as both an electronic wallet for commerce transactions and as a transit system card, for access to and fare payment of transit services. Implementation of both functions may be achieved by use of a dynamic memory management system that permits data for both the payment and transit applications to be stored on the card, with the transit data and storage locations isolated from those used to store data intended for use in paying for commerce transactions. The transit application specific data may include access control data (keys, passwords, identification data) or data required for fare calculations (rates, historical data on system use), for example. | 07-31-2014 |
20140217170 | CONTACTLESS PREPAID PRODUCT FOR TRANSIT FARE COLLECTION - Transaction processing in an offline environment for a prepaid product comprising a portable consumer device includes responding to presentation of the prepaid product at a reader for offline processing by initiating operation of the prepaid product, receiving data from the prepaid product at the reader that indicates the prepaid product is associated with a prepaid account balance, determining that the prepaid product is in a negative balance condition, and taking preventive action in response to the negative balance condition such that future acceptance of the prepaid product at a reader is prevented. | 08-07-2014 |
20140263621 | MOBILE SUBSCRIBER DEVICE FOR FINANCIAL TRANSACTION TOKENS - There is provided a mobile subscriber unit for a financial transaction token. The subscriber unit interfaces with a financial token or card that is in communication with the subscriber unit. The financial token or card has an onboard energy source so that the card token may operate away from proximity to a merchant terminal (e.g.; a POS terminal). In one implementation, the onboard power storage device includes a rechargeable battery or capacitor such as a thin-film capacitor that stores sufficient energy to power the subscriber unit's onboard electronics and/or the electronics of a financial token in communication with the subscriber unit. The subscriber unit may be a component of another consumer device such as a computing device, communications device, an item of clothing, an item of jewelry, a cell phone, a PDA, an identification card, a money holder, a wallet, a purse, a briefcase, or a personal organizer. | 09-18-2014 |
20140337175 | Universal Electronic Payment Apparatuses, Methods and Systems - The UNIVERSAL ELECTRONIC PAYMENT APPARATUS, METHODS AND SYSTEMS (“UEP”) transform touchscreen inputs into a virtual wallet mobile application interface via UEP components into purchase transaction triggers and receipt notices. In one implementation the UEP provides, via a user device, a product information search request; and obtains, in response to the product information search request, information on a first product for sale by a first merchant and a second product for sale by a second merchant. The UEP generates a single purchase transaction request, using the information on the first product for sale by the first merchant and the second product for sale by the second merchant. The UEP provides, via the user device, the single purchase transaction request for payment processing. Also, the UEP obtains an electronic purchase receipt for the first product for sale by the first merchant and the second product for sale by the second merchant. | 11-13-2014 |
20150025946 | ON-LINE AUTHORIZATION IN ACCESS ENVIRONMENT - A method is disclosed. The method includes interacting with a gate access device that is capable of preventing access to a location, where the gate access device subsequently sends an authorization request message to an issuer for approval, the authorization request message including a request to charge a predetermined amount of money to pay for access to a location, and entering the location if the gate access device receives an authorization response message indicating that the charge is authorized. | 01-22-2015 |
20150026049 | Third-Party Value Added Wallet Features and interfaces Apparatuses, Methods and Systems - The THIRD-PARTY VALUE ADDED WALLET FEATURES AND INTERFACES APPARATUSES, METHODS, AND SYSTEMS (“VAW”) facilitates allowing a third party service provider to integrate with an electronic wallet to provide a value-added service to a wallet consumer. The VAW may also be configured to facilitate the creation and funding of pre-paid accounts in a consumer's virtual wallet. | 01-22-2015 |
20150039462 | E-Wallet Store Injection Search Apparatuses, Methods and Systems - The E-WALLET STORE INJECTION SEARCH APPARATUSES, METHODS AND SYSTEMS (“SIS”) transform aggregated automated shopping lists and user location data using SIS components into automated shopping item availability messages and merchant location navigation responses. In some implementations, the disclosure provides a processor-implemented method of providing an automated store injection search service. | 02-05-2015 |