Patent application number | Description | Published |
20100180326 | SECURE REMOTE AUTHENTICATION THROUGH AN UNTRUSTED NETWORK - A method for securely authenticating a user of a consumer device at an access device comprising the following steps. First, a dynamic data element and a first set of transactional information is sent to the consumer device from the access device. Next, the consumer device creates an authentication code as a function of at least the dynamic data element, a subset of the first set of transactional information, and a password. The authentication code, along with other data, is then sent from the consumer device back to the access device. The access device then uses the authentication code to send an authentication request message to the service provider of the user. The service provider then attempts to authenticate the user by recreating the authentication code and comparing the recreated authentication code with the authentication code received from the access device. | 07-15-2010 |
20100180327 | SECURE REMOTE AUTHENTICATION THROUGH AN UNTRUSTED NETWORK - A method for securely authenticating a user of a portable consumer device at an access device comprising the following steps. First, a dynamic data element and a first set of transactional information is sent to the portable consumer device from the access device. Next, the portable consumer device creates an authentication code as a function of at least the dynamic data element, a subset of the first set of transactional information, and a password. The authentication code, along with other data, is then sent from the portable consumer device back to the access device. The access device then uses the authentication code to send an authentication request message to the service provider of the user. The service provider then attempts to authenticate the user by recreating the authentication code and comparing the recreated authentication code with the authentication code received from the access device. | 07-15-2010 |
20110125624 | METHOD AND SYSTEM FOR CROSS-ISSUER REGISTRATION OF TRANSACTION CARDS - Disclosed herein is a method of providing one or more transaction card services to a holder of a transaction card, the method comprising receiving a registration code from the holder, wherein the registration code is associated with the issuer of the transaction card and with the transaction card, determining the issuer of the transaction card based on at least a portion of the registration code, transmitting the registration code to the issuer of the transaction card, receiving account information from the issuer, wherein the account information is associated with the registration code and with the transaction card, displaying at least a portion of the account information to the holder, receiving a verification value corresponding to the account information from the holder, and if the verification value is valid, permitting the holder to select one or more services in which to enroll. | 05-26-2011 |
20130232073 | Authentication Using Biometric Technology Through a Consumer Device - Embodiments of the invention provide strong user authentication on a trusted consumer device without requiring the user to go through a formal registration process with the issuer or payment processing network. Certain embodiments allow the use of any biometric technology (e.g., fingerprint scan, iris scan, voice recognition, etc.) supported by their consumer device (e.g., smart phone, tablet computer) to authenticate the user. Additionally, the consumer device provides unforgeable evidence of the biometric match in the form of a biometric digital artifact to provide proof to a payment processing network that the match occurred. The payment processing network maintains a history of these authenticated transactions and biometric digital artifacts and as more and more non-fraudulent authenticated transactions occur over time, a higher level of trust (i.e., lower risk) is associated with the consumer device, biometric registration process, and the user. | 09-05-2013 |
20130290136 | AUTHENTICATION USING BIOMETRIC TECHNOLOGY THROUGH A CONSUMER DEVICE - Embodiments of the invention provide strong user authentication on a consumer device without requiring the user to go through a formal registration process with the issuer or processing network. Certain embodiments allow the use of any biometric technology (e.g., fingerprint scan, iris scan, voice recognition, etc.) supported by their consumer device (e.g., smart phone, tablet computer, personal computer) to authenticate the user. Additionally, the consumer device provides unforgeable evidence of the biometric match in the form of a biometric digital artifact to provide proof to a processing network that the match occurred. The processing network maintains a history of these authenticated transactions and biometric digital artifacts and as more and more non-fraudulent authenticated transactions occur over time, a higher level of trust (i.e., lower risk) is associated with the consumer device, biometric registration process, and the user. | 10-31-2013 |
20140114857 | TRANSACTION INITIATION DETERMINATION SYSTEM UTILIZING TRANSACTION DATA ELEMENTS - Embodiments of the invention directed to systems and methods that allow for determining a transaction initiation mode used to conduct a transaction and applying a specific set of rules associated with the transaction initiation mode to the transaction. A transaction authorization request message is received at a server computer. The transaction authorization message is for a transaction between a consumer and a merchant and includes a plurality of data elements. The server computer determines a transaction initiation mode, from among at least three different transaction initiation modes, used to conduct the transaction based at least in part on the data elements. The server computer applies a specific set of rules associated with the transaction initiation mode to the transaction. | 04-24-2014 |
20140222678 | SYSTEM AND METHOD FOR AUTHENTICATION USING SPEAKER VERIFICATION TECHNIQUES AND FRAUD MODEL - Embodiments of the invention provide for speaker verification on a communication device without requiring a user to go through a formal registration process with the issuer or network. Certain embodiments allow the use of a captured voice sample attempting to reproduce a word string having a random element to authenticate the user. Authentication of the user is based on both a match score indicating how closely the captured voice samples match to previously stored voice samples of the user and a pass or fail response indicating whether the voice sample is an accurate reproduction of the word string. The processing network maintains a history of the authenticated transactions and voice samples. | 08-07-2014 |
20140372128 | SPEECH TRANSACTION PROCESSING - Embodiments of the invention are directed to systems and methods for speech transaction processing. A location of a device associated with a user may be determined. A reference to a voice model associated with the user stored within a database may be retrieved, based at least in part on the location. A voice segment may be received from the user. Using the reference, the voice segment may be compared to the voice model stored within the database. A determination may be made whether the user is authenticated for the transaction based on the comparing step. | 12-18-2014 |
20150032625 | SYSTEMS AND METHODS FOR COMMUNICATING RISK USING TOKEN ASSURANCE DATA - Systems and methods for communicating risk using token assurance data are provided. A network token system provides a platform that can be leveraged by external entities (e.g., third party wallets, e-commerce merchants, payment enablers/payment service providers, etc.) or internal payment processing network systems that have the need to use the tokens to facilitate payment transactions. An authorization request message can include a token assurance level code that is indicative of a token assurance level associated with a generated token. External or internal entities may use the token assurance level to evaluate risk associated with a payment transaction that uses the token. | 01-29-2015 |