Búsqueda Imágenes Maps Play YouTube Noticias Gmail Drive Más »
Iniciar sesión
Usuarios de lectores de pantalla: deben hacer clic en este enlace para utilizar el modo de accesibilidad. Este modo tiene las mismas funciones esenciales pero funciona mejor con el lector.

Patentes

  1. Búsqueda avanzada de patentes
Número de publicaciónUS20080040276 A1
Tipo de publicaciónSolicitud
Número de solicitudUS 11/764,343
Fecha de publicación14 Feb 2008
Fecha de presentación18 Jun 2007
Fecha de prioridad19 Jun 2006
También publicado comoCA2655015A1, CA2655311A1, CA2655423A1, CA2655465A1, CA2655465C, CA2655748A1, CA2656058A1, EP2039038A2, EP2039038A4, EP2039052A2, EP2039052A4, EP2041663A2, EP2041663A4, EP2041714A2, EP2041714A4, EP2047621A2, EP2047621A4, US7810165, US7818264, US7819322, US8135647, US8375441, US8489506, US8494968, US8843417, US8972303, US20070294182, US20080005037, US20080034221, US20080040271, US20080065553, US20080103982, US20090083191, US20090089213, US20090171849, US20110004526, US20110004553, US20110066516, US20120158591, US20130275310, WO2007149762A2, WO2007149762A3, WO2007149775A2, WO2007149775A3, WO2007149785A2, WO2007149785A3, WO2007149787A2, WO2007149787A3, WO2008016752A2, WO2008016752A3, WO2008027642A2, WO2008027642A3
Número de publicación11764343, 764343, US 2008/0040276 A1, US 2008/040276 A1, US 20080040276 A1, US 20080040276A1, US 2008040276 A1, US 2008040276A1, US-A1-20080040276, US-A1-2008040276, US2008/0040276A1, US2008/040276A1, US20080040276 A1, US20080040276A1, US2008040276 A1, US2008040276A1
InventoresAyman Hammad, Patrick Faith, Mark Carlson
Cesionario originalAyman Hammad, Patrick Faith, Mark Carlson
Exportar citaBiBTeX, EndNote, RefMan
Enlaces externos: USPTO, Cesión de USPTO, Espacenet
Transaction Authentication Using Network
US 20080040276 A1
Resumen
Systems and method for improved consumer and portable consumer device authentication are disclosed. Such systems and methods may include using dynamic verification values, challenge questions, and consumer notification as ways to prevent fraudulent transactions from being conducted.
Imágenes(13)
Previous page
Next page
Reclamaciones(29)
1. A method comprising:
performing an authentication process for a consumer, wherein the consumer uses a portable consumer device to conduct a transaction;
performing an authentication process for the portable consumer device, wherein performing the authentication process for the portable consumer device comprises verifying a fingerprint or a dynamic verification value associated with the portable consumer device; and
performing a risk analysis after authenticating the consumer and authenticating the portable consumer device are performed, wherein the risk analysis determines whether or not the transaction is to be authorized.
2. The method of claim 1 further comprising notifying the consumer that the transaction is occurring.
3. The method of claim 1 wherein the fingerprint is a magnetic stripe fingerprint.
4. The method of claim 1 wherein the portable consumer device is a phone.
5. The method of claim 1 wherein the authentication process for the consumer comprises sending a challenge message to the consumer.
6. A system comprising:
means for performing an authentication process for a consumer, wherein the consumer uses a portable consumer device to conduct a transaction;
means for performing an authentication process for the portable consumer device, wherein performing the authentication process for the portable consumer device comprises verifying a fingerprint or a dynamic verification value associated with the portable consumer device; and
means for performing a risk analysis after authenticating the consumer and authenticating the portable consumer device is performed, wherein the risk analysis determines whether or not the transaction is to be authorized.
7. A computer readable medium comprising:
code for performing an authentication process for a consumer, wherein the consumer uses a portable consumer device to conduct a transaction;
code for performing an authentication process for the portable consumer device, wherein performing the authentication process for the portable consumer device comprises verifying a fingerprint or a dynamic verification value associated with the portable consumer device; and
code for performing a risk analysis after authenticating the consumer and authenticating the portable consumer device are performed, wherein the risk analysis determines whether or not the transaction is to be authorized.
8. The computer readable medium of claim 7 wherein the portable consumer device is a phone.
9. A server comprising the computer readable medium of claim 8.
10. A system comprising the server of claim 9.
11. A method comprising:
authenticating a portable consumer device using dynamic data generated by the portable consumer device or an access device in communication with the portable consumer device; and
authenticating the consumer comprising sending a challenge message to the consumer, and receiving a challenge response from the consumer.
12. The method of claim 11 wherein the challenge message is a challenge question.
13. The method of claim 11 wherein the portable consumer device is a card.
14. The method of claim 11 wherein challenge message is sent by a non-merchant entity.
15. A computer readable medium comprising:
code for authenticating a portable consumer device using dynamic data generated by the portable consumer device or an access device in communication with the portable consumer device; and
code for authenticating the consumer comprising sending a challenge message to the consumer, and receiving a challenge response from the consumer.
16. A server computer comprising the computer readable medium of claim 15.
17. A payment processing system comprising the server computer of claim 16.
18. A method comprising:
receiving an authorization request message associated with a transaction conducted using a portable consumer device, wherein the portable consumer device comprises a portable consumer device fingerprint, and wherein the authorization request message comprises an altered portable consumer device fingerprint and an algorithm identifier;
selecting an algorithm from among a plurality of algorithms using the algorithm identifier;
determining the portable consumer device fingerprint using the selected algorithm and the altered portable consumer device fingerprint;
determining if the portable consumer device fingerprint matches a stored portable consumer device fingerprint;
sending a challenge message to a consumer associated with the portable consumer device; and
sending an authorization response message to the consumer, wherein the authorization response message indicates whether or not the transaction is approved.
19. The authentication method of claim 18 further comprising receiving dynamic data, and evaluating the dynamic data to authenticate the portable consumer device.
20. The method of claim 18 wherein the challenge message is a challenge question.
21. A computer readable medium comprising:
code for receiving an authorization request message associated with a transaction conducted using a portable consumer device, wherein the portable consumer device comprises a portable consumer device fingerprint, and wherein the authorization request message comprises an altered portable consumer device fingerprint and an algorithm identifier;
code for selecting an algorithm from among a plurality of algorithms using the algorithm identifier;
code for determining the portable consumer device fingerprint using selected algorithm and the altered portable consumer device fingerprint;
code for determining if the portable consumer device fingerprint matches a stored portable consumer device fingerprint;
code for sending a challenge message to a consumer associated with the portable consumer device; and
sending an authorization response message to the consumer, wherein the authorization response message indicates whether or not the transaction is approved.
22. A server computer comprising the computer readable medium of claim 21.
23. A method comprising:
authenticating a batteryless portable consumer device, wherein the portable consumer device comprises a batteryless portable consumer comprising an antenna;
authenticating the consumer; and
sending a notification message to the consumer that a transaction is being conducted.
24. The method of claim 23 wherein authenticating the consumer comprises sending a challenge to the consumer.
25. The method of claim 23 wherein sending the notification message comprises sending the notification message to the consumer's phone.
26. The method of claim 23 wherein the batteryless portable consumer device is capable of generating a verification value.
27. A computer readable medium comprising:
code for authenticating a batteryless portable consumer device, wherein the portable consumer device comprises a batteryless portable consumer comprising an antenna;
code for authenticating the consumer; and
code for sending a notification message to the consumer that a transaction is being conducted.
28. A server computer comprising the computer readable medium of claim 27.
29. A system comprising the server computer; and an access device coupled to the server computer.
Descripción
    CROSS-REFERENCES TO RELATED APPLICATIONS
  • [0001]
    This application is a non-provisional patent application of and claims the benefit of the filing dates of U.S. Provisional Patent Application No. 60/815,059, filed on Jun. 19, 2006, U.S. Provisional Patent Application No. 60/815,430 filed on Jun. 20, 2006, and U.S. Provisional Patent Application No. 60/884,089 filed on Jan. 9, 2007. All of these applications are herein incorporated by reference in their entirety for all purposes.
  • BACKGROUND
  • [0002]
    There are a number of ways to ensure that payment transactions are securely conducted. For example, there are a number of different ways to authenticate a consumer to ensure that the authentic consumer is the one conducting the payment transaction. There are also a number of different ways to authenticate a portable consumer device that is being used by the consumer.
  • [0003]
    Although different ways of authenticating payment transactions exist, improved authentication mechanisms are desirable to further reduce the risk of fraudulent transactions.
  • [0004]
    Embodiments of the invention address these and other problems individually and collectively.
  • SUMMARY
  • [0005]
    Systems and methods for improved consumer and portable consumer device authentication are disclosed. Embodiments of the invention include ways to authenticate a portable consumer device such as a payment card, authenticate a consumer using the portable consumer device, perform back end processing, and provide consumer notification of purchase transactions.
  • [0006]
    One embodiment of the invention is directed to a method comprising: performing an authentication process for a consumer, wherein the consumer uses a portable consumer device to conduct a transaction; performing an authentication process for the portable consumer device, wherein performing the authentication process for the portable consumer device comprises verifying a fingerprint or a dynamic verification value associated with the portable consumer device; and performing a risk analysis after authenticating the consumer and authenticating the portable consumer device are performed, wherein the risk analysis determines whether or not the transaction is to be authorized.
  • [0007]
    One embodiment of the invention is directed to a method comprising: authenticating a portable consumer device using dynamic data generated by the portable consumer device or an access device in communication with the portable consumer device; and authenticating the consumer comprising sending a challenge message to the consumer, and receiving a challenge response from the consumer.
  • [0008]
    Another embodiment of the invention is directed to a method comprising: receiving an authorization request message associated with a transaction conducted using a portable consumer device, wherein the portable consumer device comprises a portable consumer device fingerprint, and wherein the authorization request message comprises an altered portable consumer device fingerprint and an algorithm identifier; selecting an algorithm from among a plurality of algorithms using the algorithm identifier; determining the portable consumer device fingerprint using the selected algorithm and the altered portable consumer device fingerprint; determining if the portable consumer device fingerprint matches a stored portable consumer device fingerprint; sending a challenge message to a consumer associated with the portable consumer device; and sending an authorization response message to the consumer, wherein the authorization response message indicates whether or not the transaction is approved.
  • [0009]
    Another embodiment of the invention is directed to a method comprising: authenticating a batteryless portable consumer device, wherein the portable consumer device comprises a batteryless portable consumer comprising an antenna; authenticating the consumer; and sending a notification message to the consumer that a transaction is being conducted.
  • [0010]
    Other embodiments of the invention are directed to specific combinations of other authentication aspects, which are provided below in the Detailed Description.
  • BRIEF DESCRIPTION OF THE DRAWINGS
  • [0011]
    FIG. 1 shows a block diagram of a system according to an embodiment of the invention.
  • [0012]
    FIG. 2 shows a block diagram of aspects of a payment transaction authentication system according to an embodiment of the invention.
  • [0013]
    FIGS. 3(a)-3(c) show schematic views of batteryless cards according to embodiments of the invention.
  • [0014]
    FIG. 4 shows a portable security device.
  • [0015]
    FIG. 5 shows a representation of data fields associated with a portable consumer device such as a credit card.
  • [0016]
    FIG. 6 shows parts of a primary account number (PAN).
  • [0017]
    FIG. 7 shows a block diagram of a system comprising a challenge question engine.
  • [0018]
    FIGS. 8-9 show flowcharts illustrating methods comprising using a challenge message to authenticate a consumer.
  • [0019]
    FIG. 10(a) shows a block diagram of a system that can use an algorithm ID.
  • [0020]
    FIG. 10(b) shows a block diagram showing modules that may be present in a server computer in the system in FIG. 10(a).
  • [0021]
    FIGS. 11-12 show flowcharts illustrating methods according to embodiments of the invention.
  • DETAILED DESCRIPTION
  • [0022]
    I. Exemplary Systems and Payment Transactions
  • [0023]
    Embodiments of the invention can be used to authenticate conventional purchase transactions as well as other types of transactions (e.g., money transfer transactions). Specific authentication systems and methods may involve the authentication of the consumer (e.g., a purchaser), portable consumer device (e.g., a credit card), and/or access device (e.g., a POS terminal) to ensure that the transaction is authentic.
  • [0024]
    In a typical purchase transaction, a consumer uses a portable consumer device (e.g., a credit card) to purchase goods or services from a merchant.
  • [0025]
    FIG. 1 shows a system 20 that can be used in an embodiment of the invention. The system 20 includes a merchant 22 and an acquirer 24 associated with the merchant 22. In a typical payment transaction, a consumer 30 may purchase goods or services at the merchant 22 using a portable consumer device 32. The acquirer 24 can communicate with an issuer 28 via a payment processing network 26.
  • [0026]
    The consumer 30 may be an individual, or an organization such as a business that is capable of purchasing goods or services.
  • [0027]
    The portable consumer device 32 may be in any suitable form. For example, suitable portable consumer devices can be hand-held and compact so that they can fit into a consumer's wallet and/or pocket (e.g., pocket-sized). They may include smart cards, ordinary credit or debit cards (with a magnetic strip and without a microprocessor), keychain devices (such as the Speedpass™ commercially available from Exxon-Mobil Corp.), etc. Other examples of portable consumer devices include cellular phones, personal digital assistants (PDAs), pagers, payment cards, security cards, access cards, smart media, transponders, and the like. The portable consumer devices can also be debit devices (e.g., a debit card), credit devices (e.g., a credit card), or stored value devices (e.g., a stored value card).
  • [0028]
    The payment processing network 26 may include data processing subsystems, networks, and operations used to support and deliver authorization services, exception file services, and clearing and settlement services. An exemplary payment processing network may include VisaNet™. Payment processing networks such as VisaNet™ are able to process credit card transactions, debit card transactions, and other types of commercial transactions. VisaNet™, in particular, includes a VIP system (Visa Integrated Payments system) which processes authorization requests and a Base II system which performs clearing and settlement services.
  • [0029]
    The payment processing network 26 may include a server computer. A server computer is typically a powerful computer or cluster of computers. For example, the server computer can be a large mainframe, a minicomputer cluster, or a group of servers functioning as a unit. In one example, the server computer may be a database server coupled to a Web server. The payment processing network 26 may use any suitable wired or wireless network, including the Internet.
  • [0030]
    The merchant 22 may also have, or may receive communications from, an access device 34 that can interact with the portable consumer device 32. The access devices according to embodiments of the invention can be in any suitable form. Examples of access devices include point of sale (POS) devices, cellular phones, PDAs, personal computers (PCs), tablet PCs, handheld specialized readers, set-top boxes, electronic cash registers (ECRs), automated teller machines (ATMs), virtual cash registers (VCRs), kiosks, security systems, access systems, and the like.
  • [0031]
    If the access device 34 is a point of sale terminal, any suitable point of sale terminal may be used including card readers. The card readers may include any suitable contact or contactless mode of operation. For example, exemplary card readers can include RF (radio frequency) antennas, magnetic stripe readers, etc. to interact with the portable consumer devices 32.
  • [0032]
    In a typical purchase transaction, the consumer 30 purchases a good or service at the merchant 22 using a portable consumer device 32 such as a credit card. The consumer's portable consumer device 32 can interact with an access device 34 such as a POS (point of sale) terminal at the merchant 22. For example, the consumer 30 may take a credit card and may swipe it through an appropriate slot in the POS terminal. Alternatively, the POS terminal may be a contactless reader, and the portable consumer device 32 may be a contactless device such as a contactless card.
  • [0033]
    An authorization request message is then forwarded to the acquirer 24. After receiving the authorization request message, the authorization request message is then sent to the payment processing network 26. The payment processing network 26 then forwards the authorization request message to the issuer 28 of the portable consumer device 32.
  • [0034]
    After the issuer 28 receives the authorization request message, the issuer 28 sends an authorization response message back to the payment processing network 26 (step 56) to indicate whether or not the current transaction is authorized (or not authorized). The payment processing network 26 then forwards the authorization response message back to the acquirer 24. The acquirer 24 then sends the response message back to the merchant 22.
  • [0035]
    After the merchant 22 receives the authorization response message, the access device 34 at the merchant 22 may then provide the authorization response message for the consumer 30. The response message may be displayed by the access device 24, or may be printed out on a receipt.
  • [0036]
    At the end of the day, a normal clearing and settlement process can be conducted by the payment processing network 26. A clearing process is a process of exchanging financial details between and acquirer and an issuer to facilitate posting to a consumer's account and reconciliation of the consumer's settlement position. Clearing and settlement can occur simultaneously.
  • [0037]
    II. Transaction Authentication
  • [0038]
    Referring to FIG. 2, which shows a conceptual block diagram 100, the authentication of a purchase transaction like the one described above can have various aspects. Such aspects include portable consumer device authentication 100(a), consumer authentication 100(b), back end processing including real time risk analysis 100(c), and consumer notification of the purchase transaction 100(d).
  • [0039]
    Portable consumer device authentication relates to the authentication of the portable consumer device. That is, in a portable consumer device authentication process, a determination is made as to whether the portable consumer device that is being used in the purchase transaction is the authentic portable consumer device or a counterfeit portable consumer device. Specific exemplary techniques for improving the authentication of a portable consumer device include:
      • Dynamic CVV on portable consumer devices such as magnetic stripe cards
      • Card security features (existing and new)
      • Contactless chips (limited use)
      • Magnetic stripe identification
      • Card Verification Values (CVV and CVV2)
      • Contact EMV chips
  • [0046]
    Consumer authentication relates to a determination as to whether or not the person conducting the transaction is in fact the owner or authorized user of the portable consumer device. Conventional consumer authentication processes are conducted by the merchants. For example, merchants may ask to see a credit card holder's driver's license, before conducting a business transaction with the credit card holder. Other ways to authenticate the consumer would be desirable, since consumer authentication at the merchant does not occur in every instance. Specific examples of possible ways to improve the consumer authentication process include at least the following:
      • Knowledge-based challenge-responses
      • Hardware tokens (multiple solution options)
      • OTPs (one time password, limited use)
      • AVSs (not as a stand alone solution)
      • Signatures
      • Software tokens
      • PINs (online/offline)
      • User IDs/Passcodes
      • Two-channel authentication processes (e.g., via phone)
      • Biometrics
  • [0057]
    Back end processing relates to processing that may occur at the issuer or payment processing network, or other non-merchant location. As will be explained in detail below, various processes may be performed at the “back end” of the payment transaction to help ensure that any transactions being conducted are authentic. Back end processing may also prevent transactions that should not be authorized, and can allow transactions that should be authorized.
  • [0058]
    Lastly, consumer notification is another aspect of transaction authentication. In some cases, a consumer may be notified that a purchase transaction is occurring or has occurred. If the consumer is notified (e.g., via cell phone) that a transaction is occurring using his portable consumer device, and the consumer is in fact not conducting the transaction, then appropriate steps may be taken to prevent the transaction from occurring. Specific examples of consumer notification processes include:
      • Purchase notification via SMS
      • Purchase notification via e-mail
      • Purchase notification by phone
  • [0062]
    Specific details regarding some of the above-described aspects are provided below. The specific details of the specific aspects may be combined in any suitable manner without departing from the spirit and scope of embodiments of the invention. For example, portable consumer device authentication, consumer authentication, back end processing, and consumer transaction notification may all be combined in some embodiments of the invention. However, other embodiments of the invention may be directed to specific embodiments relating to each individual aspects, or specific combinations these individual aspects.
  • [0063]
    III. Portable Consumer Device Authentication
  • [0064]
    Improvements can be made with respect to various portable consumer device authentication processes. Examples of such improvements are provided below.
  • [0065]
    A. Dynamic Card Verification Values (dCVVs)
  • [0066]
    To help ensure that the portable consumer device being used in a payment transaction is in fact the authentic portable consumer device, “dynamic” data may be provided from the portable consumer device. Dynamic data is data that may change over time, and is therefore more secure than static data (e.g., a name). For example, a portable consumer device authentication process may include “dynamic” verification data such as a dynamic CVV (or dynamic card verification value).
  • [0067]
    In comparison, “static” data may be data that does not change over time. For example, today, credit cards have card verification values (CVV values) printed on the back of the cards. These values can be used to verify that the portable consumer device being used is authentic. For example, when conducting a purchase transaction over the telephone or the Internet using a credit card, a merchant may ask for the CVV value on the back of the credit card. The CVV value may be matched to the credit card number to ensure that the caller in fact possesses the authentic portable consumer device. One problem with current CVVs is that they are static. They can be stolen and used.
  • [0068]
    Dynamic CVV (“dCVV”) is described in U.S. patent application Ser. No. 10/642,878, which is herein incorporated by reference in its entirety for all purposes. U.S. patent application Ser. No. 10/642,878 describes the generation of a verification value using information including a PAN (primary account number), an expiration date, a service code, and an automatic transaction counter. This verification value is transmitted from a merchant to a service provider (e.g., a payment processing organization or an issuer) where it is decoded and evaluated for possible approval. The automatic transaction counter keeps track of the number of times that a portable consumer device is used, and if there is a mismatch between a counter value that is received at the issuer and the counter at the issuer, then this may indicate possible data skimming or fraudulent use.
  • [0069]
    The dCVV or other dynamic data may be transmitted using any suitable secure data transmission process and may use DES (dynamic encryption standard), as well as ECC (elliptical curve cryptography), or AEC (advanced encryption cryptography). Any symmetric or asymmetric cryptographic elements may be used.
  • [0070]
    Other security enhancements of the dCVV process may include the use of a longer DES number and a longer counter.
  • [0071]
    B. dCVVs Created with Specific Input Data
  • [0072]
    It would be desirable to improve upon prior dCVV processes by generating different dynamic verification values using different data or different types of variable information. For example, more transaction and/or user specific data could be dynamically changed to verify that the portable consumer device is the correct one. This would be more secure than using just a simple counter. For example, specific information could include the following: terminal ID, time of day, telephone number, SIM card number, transaction amount, account number, service code (two digits), expiration date, current date, random numbers from the terminal, etc. The specific information preferably includes at least one dynamic data element such as a counter, time of day, purchase amount, etc. In other embodiments, the specific information used to create the dynamic verification value includes dynamic, consumer specific or transaction specific information such as the time of day when the transaction is taking place, the purchase amount, prior transaction data, etc. Any, some, or all of these may be used to create a verification value or other specific pieces of information could be dynamically altered to create a new dCVV. The new dCVV could then be processed in a manner that is similar to, or different than, the general process scheme described in U.S. patent application Ser. No. 10/642,878. In one specific example, data regarding a prior transaction (e.g., a prior purchase amount, the time of a prior purchase, etc.) may be a dynamic data element, which may be used to authenticate a portable consumer device for future transactions. Further details regarding such dCVV methods can be found in U.S. patent application Ser. No. ______, entitled Verification Value System and Method, filed on the same day as the present application (Attorney Docket No. 16222U-031900US).
  • [0073]
    C. Reducing the Number of Rejected dCVV Transactions
  • [0074]
    The above described dCVV processes are useful. However, there may be a number of instances where the dynamic data (e.g., a counter value) transmitted from a portable consumer device and received at a service provider's server does not match the corresponding dynamic data (another corresponding counter value) that are generated at the issuer's server. For example, sometimes, a merchant might not forward transaction data to the issuer in a timely manner. If this occurs, it is possible that future transactions conducted by the consumer could be inadvertently rejected. For instance, if the portable consumer device used by the consumer has a counter in it to count the number of transactions conducted, and if the counter in the issuer's server does not keep a corresponding transaction count, because of the delayed receipt of transaction data from one or more merchants, some of the consumer's transactions may be inadvertently rejected. It is desirable to approve as many transactions as possible while disapproving transactions that may have been skimmed.
  • [0075]
    The solution to this problem may include widening the range of the transaction counter (or widening the tolerance of some other variable data such as the time, date, etc.) so that there is some margin for potential error. For example, a consumer's portable consumer device may have a counter in it that currently has a transaction total equal to 100. When the consumer conducts a transaction at a POS terminal, an authorization message may be sent from the POS terminal to the issuer's or payment processing network's server. The authorization message may indicate that this is transaction number 100 for consumer A. The issuer's server may then check a corresponding counter range. If the received transaction counter falls within the corresponding counter range determined by the issuer, then the transaction is approved. For example, the corresponding counter range may be between 98 and 102. Since the consumer's counter is 100 and falls between 98 and 102, the transaction is approved. Thus, if the issuer's server has a counter that has a value that is slightly different than the counter on the consumer's portable consumer device, the transaction will not be inadvertently rejected. If actual data skimming is occurring or if a consumer's payment account number is being used without authorization, the counter at the issuer's server would likely differ significantly from the actual counter on the consumer's portable consumer device.
  • [0076]
    These embodiments of the invention can help decrease the number of false transaction denials. As an alternative or additional authentication measure, the issuer may provide a challenge question (e.g., what is your birthday) to the consumer if the issuer's server finds that the transaction counter received from the POS terminal and the transaction counter at the issuer's server do not match, or if the counter is not within a predetermined counter range determined by the issuer's server computer. If the consumer answers the challenge question correctly, then the transaction is approved. If the question is not answered correctly, then it is not approved. Additional details about possible challenge messages and challenge questions that can be used in such embodiments are provided below.
  • [0077]
    In yet other embodiments, the decision as to whether or not to perform further authentication processing (e.g., sending a challenge question to a consumer) or not perform further authentication processing if the counter (or other dynamic data element) falls within the predetermined range can be based on other factors. For example, if the counter or other dynamic data element falls within a predetermined range, further authentication processing may only take place if the transaction being analyzed is greater than a predetermined dollar limit (e.g., over $1000) or the transaction being analyzed is being conducted from a location or merchant that may indicate a higher tendency to originate fraudulent transactions. Thus, embodiments of the invention may include other variables that may be considered when determining whether or not to perform additional authentication processing.
  • [0078]
    Further details regarding embodiments that use ranges in conjunction with dynamic data elements used with verification values are in U.S. patent application Ser. No. ______, entitled Verification Error Reduction System, filed on the same day as the present application (Attorney Docket No. 16222U-031800US) which is herein incorporated by reference in its entirety for all purposes.
  • [0079]
    D. Portable Consumer Devices that can Produce dCVVs
  • [0080]
    A number of different portable consumer devices may be produced, which are capable of providing variable transaction data such as counters. An example of this kind of portable consumer device includes a magnetic-stripe card that can rewrite the data provided on its magnetic stripe. A re-writing device such as a magnetic write head may be used to rewrite the data on a magnetic stripe. A patent that discusses this type of card is U.S. Pat. No. 7,044,394, which is herein incorporated by reference in its entirety for all purposes. A battery is within the card and can supply power for the re-writing device.
  • [0081]
    The use of batteries in payment cards is not particularly desirable in some cases. For example, batteries need to be replaced and disposed of in an environmentally friendly manner. Also, if a battery-powered card does not have sufficient power at a given moment, a particular transaction conducted with that card may not take place as intended. In addition, if a consumer has multiple battery-powered cards in his wallet, this can raise potential security issues when traveling on airlines. Thus, batteryless cards are preferred.
  • [0082]
    In some embodiments, the portable consumer devices are batteryless cards (or other batteryless form factors) which contain may contain chip which may comprise a counter. These batteryless cards are powered by some external power source, instead of an internal battery. Examples of external power sources include access devices such as POS terminals and transaction calculators. In embodiments of the invention, each time a batteryless card is powered by an external power source such as a POS terminal, a counter value (or other variable data) may be produced by the batteryless card. A number of specific embodiments are shown in FIGS. 3(a)-3(c).
  • [0083]
    FIG. 3(a) shows a magnetic stripe card 202 including a plastic body 202(a). A magnetic stripe 202(e) is on the plastic body 202(a). The plastic body 202(a) may include an embossed region, which may have information such as cardholder name, card number, and expiration date (not shown). A processor (e.g., a microprocessor) 202(b) is on the plastic body 202(a), and a read-write device 202(d) and an antenna 202(c) are coupled to the processor 202(b). In this example, the antenna 202(c) is a coil of wire which can receive power from a contactless card reader (not shown).
  • [0084]
    During use, the antenna 202(c) may allow the magnetic stripe card 202 to communicate with an external contactless reader (not shown) so that an account number and optionally counter information (or other variable data) may be obtained from magnetic stripe 202(e) via the processor 202(b) and the read-write device 202(d). At the same time, the antenna 202(c) may also be used to power the processor 202(b) and the read-write device 202(d) temporarily so that the read-write device 202(d) can also change dynamic data (e.g., a counter) on the magnetic stripe 202(e). Thus, as illustrated by this example, embodiments of the invention can include the use of a batteryless magnetic-stripe card that can provide dynamic data that can be used in a portable consumer device authentication transaction.
  • [0085]
    Although the example in FIG. 3(a) includes a read-write device 202(d) for a magnetic stripe 202(e), in other embodiments, the read-write device may be embodied by logic which may read and/or write data to a volatile or semi-volatile solid-state memory device such as a flash memory chip or the like.
  • [0086]
    Another card embodiment 204 of the invention is shown in FIG. 3(b). In FIGS. 3(a) and 3(b), like numerals designate like elements. However, in FIG. 3(b), a conductive contact region 202(f) is shown and the conductive contact is coupled to the processor 202(b) instead of an antenna. In this example, the contact region 202(f) may include multiple electrical contacts so that it may interface with and electrically contact a corresponding contact region in a card reader (not shown). When the card 204 is used, power can be supplied to the processor 202(b) via the conductive contact 204(f), and the read-write device 202(d) can function as described above.
  • [0087]
    FIG. 3(c) shows another magnetic stripe card 206 according to an embodiment of the invention. It includes a portable consumer device reader interface region such as a interface region 202(g), which may take the form of the above-described antenna 202(c) or electrically conductive contact 202(f). Power can be supplied to the processor 202(b) and the read-write device 202(d) via the interface region 202(g) as described above.
  • [0088]
    However, in this embodiment, a semi-static display 202(h) is coupled to the processor 202(b). Each time the processor 202(b) is powered by a card reader during a purchase transaction, the processor 202(b) can cause the display 202(h) to display a verification value such as a dynamic card verification value (dCVV). The dCVV may be viewed by a consumer and used in a mail order, telephone, or Internet purchase transaction to help verify that the consumer has an authentic card. In this example, the same or different dCVV value (or other dynamic data) may be electronically transmitted to the card reader and subsequently transmitted in an authorization request message to the issuer for further verification.
  • [0089]
    FIG. 4 shows a security device 300 which can be used to power cards of the type shown in FIGS. 3(a)-3(c). The security device 300 may have a data input region 300(b) (e.g., keys) on a housing 300(a). The housing 300(a) may define a slot 300(d) which can receive a batteryless card like those described above. A display 300(c) is also present on the housing 300(a).
  • [0090]
    The security device 300 may contain a microprocessor, batteries, and a memory comprising computer code for producing a one-time transaction code or number for a consumer purchase transaction. The logic for producing the one-time transaction code may also reside on another server or computer (e.g., an issuer's server) so that the issuer, merchant, or other party, can verify that the person holding the card is in fact the authorized cardholder. In this example, the security device 300 may be characterized as a hard security token and may be used to help authenticate the consumer.
  • [0091]
    During use, a consumer may insert a batteryless magnetic stripe card (as described above) into the slot 300(d). A one time transaction code may then be displayed on the screen 300(c). When the card is inserted into the security device 300, power from the power source in the security device 300 powers a processor and read-write device in the card so that dynamic data (e.g., a counter) on the card can change. Thus, the security device 300 can produce a one time transaction number for a transaction, and also temporarily supply power to a batteryless card so that a counter (or other dynamic element) can change in the card. A system using both the security device 300 and a batteryless card that can have dynamic data can advantageously authenticate both the consumer as well as the portable consumer device.
  • [0092]
    Further details regarding embodiments that use batteryless portable consumer devices are in U.S. patent application Ser. No. ______, entitled Batteryless Portable Consumer Device, filed on the same day as the present application (Attorney Docket No. 16222U-031700US), which is herein incorporated by reference in its entirety for all purposes.
  • [0093]
    E. Masked Primary Account Numbers (PANs)
  • [0094]
    Another way to authenticate a portable consumer device is to use a masked PAN or primary account number. In this example, a partial portion of a transmitted PAN is masked and/or dynamically changed. The PAN includes an identification number portion such as a BIN number or bank identification number. Other examples of identification number portions include a merchant location, financial institution location, or even an IP address. The last four digits of the PAN and the BIN number will remain the same, while other numbers in the PAN change. These dynamically changing numbers are typically masked on a payment card receipt that is received by a consumer so that the consumer does not see anything unusual.
  • [0095]
    FIG. 5 shows a schematic diagram of data fields for data that is transmitted from a merchant to an issuer in a purchase transaction. The data fields include PAN, expiration date, service code, PIN CVV, and discretionary data fields.
  • [0096]
    An exemplary PAN 380 that might reside in memory (e.g., a magnetic stripe) in a portable consumer device is shown in FIG. 6. In this example, the first six digits (i.e., a first end portion) “123456” 380(a) of the PAN 380 would correspond to the BIN number. The next 6 digits 380(b) may be changed or different from the real PAN's 6 digits and are represented by “XXXXXX” in this example. The last four digits 380(c) (i.e., a last end portion) are “9999” in this example, and would remain the same. By keeping the BIN the same and the last four digits the same, the transaction will look like a real one to the merchant and the consumer. In a preferred embodiment, the middle six digits are dynamically changed using a counter or the like. This makes it more difficult for any unauthorized person to determine the real PAN.
  • [0097]
    In one embodiment, the middle portion of the PAN that resides in the memory of the portable consumer device may be different than the middle portion of the real PAN. The PAN that resides in memory may be referred to as a secondary PAN while the real PAN may be referred to as a primary PAN. An appropriate algorithm or look-up table (e.g., stored at the issuer or in an access device such as a POS device) may be used to link the primary and secondary PANs. For example, the middle six digits of the PAN number might be 666666 in a primary PAN (e.g., 1234566666669999), but the middle six digits might be 222222 in the secondary PAN (e.g., 1234562222229999) which is stored in the memory in a consumer's portable consumer device. In one embodiment, the secondary PAN may be received at a POS terminal and the POS terminal may convert the secondary PAN to the primary PAN and the primary PAN may be transmitted from the POS terminal to the issuer for processing and/or authorization. In another embodiment, the secondary PAN may be transmitted to the issuer and the issuer may convert the secondary PAN to the primary PAN, and may thereafter process and/or authorize the transaction.
  • [0098]
    In this embodiment, the issuer may receive both the primary PAN and the secondary PAN to verify that the portable consumer device being used is authentic. If an unauthorized person tries to use the primary PAN, then that unauthorized person will not know the secondary PAN and cannot fraudulently conduct a purchase transaction without knowing the secondary PAN. Alternatively, if an unauthorized person electronically intercepts or “skims” the secondary PAN, then the unauthorized person will not be able to conduct the purchase transaction without knowing the primary PAN.
  • [0099]
    In another embodiment, the middle portion of the PAN may be changed dynamically. For example, an appropriate algorithm or counter may be used to dynamically change the middle portion of the PAN each time the portable consumer device is used. This way, even if the PAN is electronically intercepted by an unauthorized person, and knows the primary PAN, the secondary PAN will be dynamically changing. Even if the unauthorized person knows the primary PAN and intercepts the secondary PAN once, the intercepted secondary PAN would be useless, since it is a dynamically changing secondary PAN. In this case, the unauthorized person would need to know the algorithm used to dynamically change the PAN in addition to the primary PAN and the secondary PAN. Thus, this embodiment is particularly useful for conducting secure transactions.
  • [0100]
    Further details regarding embodiments that use masked primary account numbers are in U.S. patent application Ser. No. 11/761,821, entitled Track Data Encryption, filed on Jun. 12, 2007, which is herein incorporated by reference in its entirety for all purposes.
  • [0101]
    VI. Consumer authentication
  • [0102]
    As noted above, a number of consumer authentication processes can be used in embodiments of the invention. Specific examples of possible ways to improve the authentication of a consumer include:
      • Knowledge-based challenge-responses
      • Hardware tokens (multiple solution options)
      • OTP (one time password, limited use)
      • AVS (not as a stand alone solution)
      • Signatures
      • Software token
      • PINs (online/offline)
      • User IDs/Passcodes
      • Two-channel authentication via phone
      • Biometrics
  • [0113]
    As illustrated above, a variety of mechanisms may be used to authenticate the consumer and the mechanisms may use no user input (e.g., an auto-software security token), limited user input (e.g., the user presses a button), or full user input (e.g., biometrics).
  • [0114]
    In addition, various “security tokens” may be used to help authenticate the user. A security token is an article or piece of information that can be used to verify real information or data. For example, a PIN may be a security token and may be used to verify the identity of the consumer when the consumer makes a purchase. In another example, a challenge question and corresponding answer may be considered a security token that helps to authenticate the consumer. This latter example is an example of a token having a “bi-directional channel” whereby information flows to the consumer and the consumer sends information back to another party such as an issuer so that the consumer can authenticate himself.
  • [0115]
    A. Knowledge Based Challenges
  • [0116]
    In embodiments of the invention, a merchant, a payment processing organization, an issuer, or any other suitable entity may pose challenge questions to the consumer to authenticate the consumer. The challenge questions may be static where the same questions are asked for each purchase transaction or dynamic where different questions may be asked over time.
  • [0117]
    The questions asked may also have static or dynamic (semi-dynamic or fully dynamic) answers. For example, the question “What is your birthday?” requires a static answer, since the answer does not change. The question “What is your zip-code?” requires a semi-dynamic answer, since it could change or can change infrequently. Lastly, the question “What did you purchase yesterday at 4 pm?” would require a dynamic answer since the answer changes frequently. Thus, in preferred embodiments, the challenge questions would preferably be based on “real time” information that the issuer would most likely possess. For example, the consumer might be asked a more specific question such as “Did you eat out at a Mexican restaurant last night?” By providing more specific knowledge based consumer challenges, the authentication of the consumer is ensured.
  • [0118]
    In one embodiment, the method includes conducting a transaction such as a purchase transaction using a portable consumer device. The portable consumer device may be a credit card or the like. The purchase transaction may take place at a merchant that has an access device such as a point of sale terminal.
  • [0119]
    The consumer may use the portable consumer device to interact with an access device such as a point of sale terminal and initiate the process. The point of sale terminal may initiate and then generate an authorization request message, which may thereafter be sent to a payment processing network, and then subsequently to the issuer of the portable consumer device. When the authorization request message is received, by either the payment processing network or the issuer, it is analyzed. A challenge message, which can be dynamic or semi-dynamic in nature, is then generated, and is sent to the consumer. The challenge message could be sent back to the access device, or to the consumer's portable consumer device (e.g., if the portable consumer device is a mobile phone).
  • [0120]
    The consumer then provides a response to the challenge message. The challenge response message is received from the consumer. The challenge response message is then verified and if it is verified, the authorization response message is analyzed to determine if the transaction is authorized (e.g., there are sufficient funds in the consumer's account or there is sufficient credit in the consumer's account). If the transaction is authorized, the issuer and also the payment processing network send an authorization response message to the consumer. The authorization response message indicates whether or not the transaction is authorized.
  • [0121]
    In the specific embodiments described above and below, challenge questions are described in detail, but embodiments of the invention are not limited thereto. Embodiments of the invention can generally relate to the use of challenge messages, which may include challenge questions. In some embodiments, as will be described in further detail below, challenge messages may or may not be read by a consumer, and may challenge the authenticity of the consumer in direct or indirect ways. Examples of challenge questions include questions relating to the consumer's portable consumer device (e.g., what is the CVV or card verification value on your card?), the consumer's location (e.g., what is your zip code?), the consumer's mobile or regular phone (e.g., what is your mobile phone number?), the consumer's personal information (e.g., what is your mother's maiden name?), etc. Examples of challenge messages that are not questions that are specifically answered by the consumer include messages which automatically query a phone as to its location or phone number, and cause the retrieval of such information. Another example of a challenge message may be a message which supplies a code (or other authentication token) to a phone, and the use of that code at an access device authenticates the consumer.
  • [0122]
    B. Systems Using Challenge Messages
  • [0123]
    FIG. 7 shows an exemplary system 420 according to an embodiment of the invention. Other systems according to other embodiments of the invention may include more or less components than are shown in FIG. 7.
  • [0124]
    The system 420 shown in FIG. 7 includes a merchant 422 and an acquirer 424 associated with the merchant 422. In a typical payment transaction, a consumer 430 may purchase goods or services at the merchant 422 using a portable consumer device 432. The acquirer 424 can communicate with an issuer 428 via a payment processing network 426.
  • [0125]
    The consumer 430 may be an individual, or an organization such as a business that is capable of purchasing goods or services. In other embodiments, the consumer 430 may simply be a person who wants to conduct some other type of transaction such as a money transfer transaction. The consumer 430 may optionally operate a wireless phone 435.
  • [0126]
    The portable consumer device 432 may be in any suitable form. Suitable portable consumer devices are described above in FIG. 1 (e.g., portable consumer device 32).
  • [0127]
    The payment processing network 426 may be similar to or different than the payment processing network 26 in FIG. 1. As shown in FIG. 7, the payment processing network 426 may comprise a server 426(a), which may comprise a challenge question engine 426(a)-1. The server 426(a) may also be in communication with a transaction history database 426(b) and a challenge question database 426(c). As will be explained in further detail below, the challenge question engine 426(a)-1 may simply extract challenge questions from the challenge question database 426(c). Alternatively or additionally, the challenge question engine 426(a)-1 may generate challenge questions using information in the transaction history database 426(b).
  • [0128]
    As will be explained in further detail below, the challenge questions may be static or dynamic in nature. For example, the challenge question engine 426(a)-1 may receive an authorization request message, and the authorization request message may include the consumer's account number, as well as the purchase amount. It may then look up the consumer's account number, and any consumer information associated with the consumer's account number. It may thereafter retrieve suitable questions from the challenge question database 426(c) or may generate suitable challenge questions on its own. For instance, in some cases, the challenge question engine 426(a)-1 may retrieve the question “What is your mobile phone number?” from the challenge question database 426(c) after receiving an authorization request message. Alternatively, the challenge question engine 426(a)-1 may generate a dynamic question such as “Did you use this credit card at McDonald's last night?” The information pertaining to the particular restaurant that the consumer 420 was at the preceding day could be retrieved from the transaction history database 426(b).
  • [0129]
    The challenge question database 426(c) may be populated with questions of any suitable type. The questions may relate to a past location (e.g., the consumer's current home, the city that the consumer recently visited) or current location (e.g., the current location of the store that the consumer is currently at), the type or name of the merchant that the consumer is presently visiting or has visited in the past, the consumer's family or personal data (e.g., name, phone number, social security number, etc.), etc. The questions in the challenge question database 426(c) may be generated by the challenge question engine 426(a)-1 and subsequently stored in the challenge question database 426(c).
  • [0130]
    Alternatively, or additionally, the challenge questions may be generated from an external source and then subsequently stored in the challenge question database 426(c). For example, the consumer 430 may use a browser on a personal computer or the like to supply specific challenge questions to the server 426(a) via a communication medium (not shown) such as the Internet.
  • [0131]
    In some embodiments, a consumer may determine the kinds and/or quantity of challenge questions to ask himself or herself. For example, the consumer may specify that the consumer wants to be asked three challenge questions if the consumer visits a jewelry store, but only one question if the consumer visits a fast food restaurant. The types of questions posed by the consumer may be based on the merchant type, frequency of purchasing, etc. Some concepts relating to user-defined authorization parameters are described in U.S. patent application Ser. No. 10/093,002, filed on Mar. 5, 2002, which is herein incorporated by reference in its entirety for all purposes.
  • [0132]
    In preferred embodiments, the challenge questions are derived from past transaction data in the transaction history database 426(b). The consumer 430 may conduct many transactions with the payment processing network 26 (and/or the issuer 428) over time. This consumer transaction information may be stored in the transaction history database 426(b) over time, and challenge questions may be generated using the transaction information. The past transaction information provides a good basis for authenticating the consumer 430, since the consumer 430 will know about what transactions that the consumer 430 has conducted in the past. For example, the consumer 430 may have used his credit card to pay for a hotel room in New York the previous day, and on the next day may be asked a question such as “Did you stay at a hotel in New York yesterday?” In another example, the consumer 430 may have purchased an item that is more than $2000 the day before, and on the next day may be asked “Did you make a purchase for more than $2000 yesterday?” The questions/answers that are presented to the consumer 430 may be free form in nature and/or may include pre-formatted answers such as multiple choice or true-false answers from which the consumer may select.
  • [0133]
    The merchant 422 may also have, or may receive communications from, an access device 434 that can interact with the portable consumer device 432. Suitable types of access devices are described above (e.g., access device 34 in FIG. 1).
  • [0134]
    If the access device 434 is a point of sale terminal, any suitable point of sale terminal may be used including card readers. The card readers may include any suitable contact or contactless mode of operation. For example, exemplary card readers can include RF (radio frequency) antennas, magnetic stripe readers, etc. to interact with the portable consumer devices 432.
  • [0135]
    The issuer 428 may be a bank or other organization that may have an account associated with the consumer 430. The issuer 426 may operate a server 428(a) which may have a challenge question engine 428(a)-1. A transaction history database 426(b) and a challenge question database 428(c) may be in communication with the server 428(a). The issuer server 428(a), challenge question engine 428(a)-1, transaction history database 426(b), and challenge question database 428(c) may operate in the same way or a different way than the payment processing network server 428(a), challenge question engine 428(a)-1, transaction history database 428(b), and challenge question database 428(c). The above-descriptions as to elements 426(a), 426(a)-1, 426(b), and 426(c) may apply to elements 428(a), 428(a)-1, 428(b), and 428(c).
  • [0136]
    Embodiments of the invention are not limited to the above-described embodiments. For example, although separate functional blocks are shown for an issuer, payment processing network, and acquirer, some entities perform all or any suitable combination of these functions and may be included in embodiments of invention. Additional components may also be included in embodiments of the invention.
  • [0137]
    C. Methods Using Challenge Messages
  • [0138]
    Methods according to embodiments of the invention can be described with reference to FIGS. 7 and 8. In a typical purchase transaction, the consumer 430 purchases a good or service at the merchant 422 using a portable consumer device 432 such as a credit card. The consumer's portable consumer device 432 can interact with an access device 434 such as a POS (point of sale) terminal at the merchant 422 (step 502). For example, the consumer 430 may take a credit card and may swipe it through an appropriate slot in the POS terminal. Alternatively, the POS terminal may be a contactless reader, and the portable consumer device 432 may be a contactless device such as a contactless card.
  • [0139]
    A first authorization request message is then forwarded to the acquirer 424. After the acquirer 424 receives the first authorization request message, the first authorization request message is then sent to the payment processing network 426 (step 504). The first authorization request message is then received at the payment processing network server 426(a) and the payment processing network server 426(a) then determines if a challenge is needed.
  • [0140]
    Various criteria may be used to determine if a challenge is needed. For example, the payment processing network server 426(a) may determine that the particular transaction is a high value transaction (e.g., greater than $1000) and that a challenge is therefore appropriate. In another example, the payment processing network server 426(a) may determine that there is something suspicious about the present transaction and may thereafter determine that a challenge is appropriate. For example, the payment processing network server 426(a) may determine that the portable consumer device 432 is currently being used at a location which is different from the consumer's home state, and the consumer's recent purchase history suggests that the consumer is not traveling.
  • [0141]
    Once it has been determined that a challenge is appropriate for the present transaction, the challenge question engine 426(a)-1 may then fetch (local or remote) a challenge question (step 508). In some embodiments, the challenge question engine 426(a)-1 may retrieve the question from the challenge question database 426(c).
  • [0142]
    At this point, rather than sending the first authorization request message to the issuer 426, the payment processing network 426 sends a first authorization response message back to the access device 434 via the merchant 422 and the acquirer 424 (step 510). The first authorization response message may contain data representing the challenge request that was previously obtained by the challenge question engine 426(a)-1. The first authorization response message may be characterized as an initial decline, since it does not indicate approval of the transaction.
  • [0143]
    Once the challenge question is received at the access device 434, the consumer 430 supplies the challenge response to the access device 434. The challenge response may be supplied to the access device 434 in any suitable manner (e.g., through a keypad, contactless reader, etc.). Once the access device 434 receives the challenge response, the access device 434 then forwards the challenge response to the payment processing network server 426(a) via the merchant 422 and the acquirer 424, and it is received by them (step 512). The challenge response message may be part of a second authorization request message.
  • [0144]
    The payment processing network server 426(a) then validates the challenge response message (step 514). If the challenge response message is not validated, then the payment processing network server 426(a) may send a response message back to the access device 434 indicating that that transaction is not approved. Alternatively or additionally, the payment processing network server 426(a) may send another challenge question to the access device 434. On other hand, if the challenge is validated, the payment processing network server 426(a) may send the second authorization request message to the issuer 428 (step 516) along with an indication that the consumer 430 has satisfied any challenges posed by the payment processing network 426.
  • [0145]
    After the issuer 428 receives the second authorization request, the issuer 428, using the issuer server 428(a), determines if the transaction is authorized or is not authorized (step 518). The transaction may not be authorized because the consumer 430 has insufficient funds or credit. If the consumer 430 does have sufficient funds or credit, the issuer 428 may then send a second authorization response message indicating that the transaction is authorized back to the access device 434 via the payment processing network 426, the acquirer 424, and the merchant 422 (step 522).
  • [0146]
    At the end of the day, a normal clearing and settlement process can be conducted by the payment processing network 426. A clearing process is a process of exchanging financial details between and acquirer and an issuer to facilitate posting to a consumer's account and reconciliation of the consumer's settlement position. Clearing and settlement can occur simultaneously.
  • [0147]
    A number of alternative embodiments are also possible. For example, the issuer 428 could generate challenge questions and send them to the consumer 430 instead of or in addition to the payment processing network 426. The challenge question engine 428(a)-1, the transaction history database 428(b), and the challenge question database 426(c) operated by the issuer 428 may be used in the same or different way as the above-described challenge question engine 426(a)-1, the transaction history database 426(b), and the challenge question database 426(c) operated by the payment processing network 426.
  • [0148]
    In the above-described embodiments, there are two authorization request messages that are sent to the payment processing network 426 (and/or the issuer 428). This is desirable, since existing payment processing systems have “timers” that are set at various points between the access device 434 and the issuer 428 during a payment authorization process. The timers time how long various events should take place during the payment authorization process. The timers may be set and embodied as computer code at the acquirer 424, the payment processing network 426, and the issuer 428. For example, the timers at the acquirer 424, payment processing network 426, and issuer 428 may be respectively set to 3 seconds, 6 seconds, and 10 seconds. If an authorization request message is not received within these respective times, then some event may be triggered. For instance, an error message may be sent back to the access device 434 requesting that the merchant 422 resubmit the authorization request message, if an authorization request message is not received at the issuer 428 within 10 seconds. If a challenge request is created during the authorization process and before the authorization request message reaches the issuer 428, the issuer's timer may trigger an event indicating that an error has occurred. Creating challenge requests and responses during a single authorization process could potentially conflict with pre-existing timers in a payment system.
  • [0149]
    By using at least two authorization request messages in two separate authorization processes, the above-described timers are advantageously not affected. The timers need not be changed to send challenge questions to the consumer 430. This allows embodiments of the invention to be used with an existing payments infrastructure and widespread changes are not needed in embodiments of the invention. In comparison, if the retrieval of a challenge question during a payment authorization process occurs using a single authorization request message, this may delay the authorization request message and may necessitate changes in timers present in a payment processing system.
  • [0150]
    The at least two authorization request messages may have information such as BINs (bank identification numbers), transaction amounts, account numbers, service codes, etc. They may also contain the same transaction amount for the transaction being conducted, and/or different transaction amounts. For example, the first authorization request message may have the actual transaction amount, and the second authorization request message may have a zero dollar amount or other identifier to indicate that that prior authentication request with a transaction amount has already been submitted. A transaction code may be used to link the first and second authorization requests in some embodiments.
  • [0151]
    The method described with respect to FIG. 8 can be characterized as a “closed channel” process since the access device 434 receives a challenge question and provides a response to the challenge question. However, other embodiments of the invention may use open channel solutions whereby a challenge question may be sent to a device other than the access device which sent the first authorization response message.
  • [0152]
    Examples of open channel methods according to embodiments of the invention can be described with reference to FIGS. 7 and 9. In a typical purchase transaction, the consumer 430 purchases a good or service at the merchant 422 using a portable consumer device 432 such as a credit card. The consumer's portable consumer device 432 can interact with an access device 434 such as a POS (point of sale) terminal at the merchant 422 (step 602). For example, the consumer 30 may take a credit card and may swipe it through an appropriate slot in the POS terminal. Alternatively, the POS terminal may be a contactless reader, and the portable consumer device 432 may be a contactless device such as a contactless card.
  • [0153]
    A first authorization request message is then forwarded to the acquirer 424. After receiving the first authorization request message, the first authorization request message is then sent to the payment processing network 426 (step 604). The first authorization request message is received at the payment processing network server 26(a) and the payment processing network server 426(a) then determines if a challenge is needed.
  • [0154]
    Various criteria may be used to determine if a challenge is needed. For example, the payment processing network server 426(a) may determine that the particular transaction is a high value transaction (e.g., greater than $1000) and that a challenge is therefore appropriate. In another example, the payment processing network server 426(a) may determine that there is something suspicious about the present transaction and may thereafter determine that a challenge is appropriate.
  • [0155]
    Once it has been determined that a challenge is appropriate for the present transaction, the challenge question engine 426(a)-1 may then fetch (local or remote) a challenge question (step 608). In some embodiments, the challenge question engine 426(a)-1 may retrieve the question from the challenge question database 426(c).
  • [0156]
    Rather than sending the first authorization request message to the issuer 426, and rather than sending a first authorization response message back to the access device 434, the payment processing network 426 sends a first authorization response message back to the consumer's mobile phone 435 (step 610) or other type of access device. The first authorization response message may be sent back to the consumer's mobile phone 435. This can be done directly or through some intermediate entity. The first authorization response message may contain data representing the challenge request that we previously obtained by the challenge question engine 426(a)-1. The first authorization response message may be characterized as an initial decline, since it does not indicate approval of the transaction.
  • [0157]
    Once the challenge question is received at the mobile phone 435, the consumer 430 supplies the challenge response to the access device 434 (step 612) The access device 434 then forwards the challenge response to the payment processing network server 426(a) via the merchant 422 and the acquirer 424, and it is received by them (step 614). The challenge response message may be part of a second authorization response message.
  • [0158]
    Note that although challenge questions that the consumer actively answers are described in detail, other types of challenge requests may be sent to the mobile phone 435. For example, in some cases, the challenge requests may not require an answer that is actively provided by the consumer 430. Passive answers to challenge requests may be provided. For example, in some embodiments, the challenge request supplied to the mobile phone 435 may be a query regarding the physical location of the mobile phone 435. The mobile phone 435 may have a GPS device or other location device and this information (or a cryptogram, etc.) may be transmitted to the payment processing network 426, and the payment processing network 426 may authenticate the consumer 434 using this location information.
  • [0159]
    Once the payment processing network server 426(a) receives the challenge response message, the payment processing network server 426(a) then validates the challenge response message (step 616). If the challenge response message is not validated, then the payment processing network server 426(a) may send a response message back to the access device 434 indicating that that transaction is not approved. Alternatively or additionally, the payment processing network server 426(a) may send another challenge message to the access device 434 and/or the mobile phone 435. On other hand, if the challenge is validated, the payment processing network server 426(a) may then send the second authorization request message to the issuer 428 (step 618) along with an indication that the consumer 430 has satisfied any challenges posed by the payment processing network 426.
  • [0160]
    After the issuer 428 receives the second authorization request, the issuer 428 using the issuer server 428(a) determines if the transaction is authorized or is not authorized (step 620). The transaction may not be authorized because the consumer 430 has insufficient funds or credit. If the consumer 430 does have sufficient funds or credit, the issuer 428 may then send a second authorization response message indicating that the transaction is authorized back to the access device 434 via the payment processing network 426, the acquirer 424, and the merchant 422 (step 622).
  • [0161]
    At the end of the day, a normal clearing and settlement process can be conducted by the payment processing network 426. A clearing process is a process of exchanging financial details between and acquirer and an issuer to facilitate posting to a consumer's account and reconciliation of the consumer's settlement position. Clearing and settlement can occur simultaneously.
  • [0162]
    A number of alternative embodiments are also possible. For example, the issuer 428 could generate challenge questions and send them to the mobile phone 435 instead of or in addition to the payment processing network 426. The challenge question engine 428(b)-1, the transaction history database 428(b), and the challenge question database 426(c) operated by the issuer 428 may be used in the same or different way as the above-described challenge question engine 426(a)-1, the transaction history database 426(b), and the challenge question database 426(c) operated by the payment processing network 426.
  • [0163]
    In another embodiment, instead of sending a challenge question to the payment processing network server 426(a) may send an electronic coupon to the consumer's mobile phone 435. The payment processing network 426 may determine that a challenge is appropriate and may send the electronic coupon to the phone 435. Upon receipt of this electronic coupon, the consumer may then be prompted to use the coupon at the access device 434. If the consumer 430 uses the coupon at the access device 434, then access device 434 forwards the coupon to the payment processing network 426, and receipt of the coupon by the payment processing network 426 indicates that the consumer 430 is authenticated. It is presumed that the consumer 430 is authentic since a non-authentic consumer would not be in possession of the consumer's phone 435.
  • [0164]
    Further details regarding embodiments that use challenges are described in U.S. patent application Ser. No. 11/763,240, entitled Consumer Authentication System and Method, filed on Jun. 14, 2007 (Attorney Docket No. 16222U-031600US) which is herein incorporated by reference in its entirety for all purposes.
  • [0165]
    VII. Other Transaction Authentication Techniques
  • [0166]
    A. Methods Using Algorithm Identifiers
  • [0167]
    In embodiments of the invention, a payment processing organization or other entity may support different security technologies offered by different companies. The different security technologies may use portable consumer device fingerprints. For example, two magnetic stripes on two payment cards can store identical consumer data (e.g., account number information), but the magnetic structures of the two magnetic stripes may be different. A specific magnetic structure may be an example of a fingerprint or “DNA” that is associated with a payment card. If a thief copied the consumer data stored on a magnetic stripe to an unauthorized credit card, the magnetic stripe of the unauthorized credit card would have a different magnetic structure or fingerprint than the authorized credit card. A back end server computer receiving the authorization request message in response to the unauthorized card's use would determine that the unauthorized credit card is not real, because the fingerprint is not present in the authorization request message. Two companies that offer this type of technology are Magtek™ and Semtek™. Each company uses its own proprietary algorithm in a point of sale terminal to alter (e.g., encrypt) its own fingerprint before it is sent to an issuer or other entity in a subsequent authentication process.
  • [0168]
    In embodiments of the invention, a portable consumer device fingerprint may include any suitable identification mechanism that allows one to identify the portable consumer device, independent of static consumer data such as an account number or expiration date associated with the portable consumer device. Typically, unlike consumer data, portable consumer device fingerprint data is not known to the consumer. For instance, in some embodiments, the fingerprint data may relate to characteristics of the materials from which the portable consumer devices are made. For example, as noted above, a portable consumer device fingerprint can be embedded within the particular microscopic structure of the magnetic particles in the magnetic stripe in a payment card. In some cases, no two magnetic stripes will have same portable consumer device fingerprint.
  • [0169]
    Portable consumer device fingerprints can take other forms. For example, another card verification technology comes from a company called QSecure™. The technology offered by QSecure™ uses a dynamic CVV (card verification value) that can be generated by a chip in a payment card (the chip may be under a magnetic stripe and can write the dynamic CVV or a number related to the dynamic CVV to the magnetic stripe). In this case, the dynamic CVV may act as a portable consumer device fingerprint identifying the particular portable consumer device. The dynamic CVV may be sent to a point of sale device during a payment transaction. A specific algorithm in the point of sale device may alter (e.g., encrypt) the dynamic CVV before it is sent to the issuer of the payment card for authorization. The issuer, payment processing organization, or other entity, may receive the altered dynamic CVV and may restore it to its original form. The dynamic CVV can then be checked by the back end server computer to see if it corresponds to an independently derived dynamic CVV, thereby authenticating the portable consumer device. In this example, the dynamic CVV value could also be considered a portable consumer device fingerprint, even though it is dynamic in nature.
  • [0170]
    Embodiments of the invention allow for many different types of portable consumer device fingerprinting systems to be used together in a single payment processing system. In embodiments of the invention, a different identifier or ID is assigned to each type of algorithm in each type of POS terminal. For example, a back end entity such as an issuer or a payment processing organization might use algorithm identifiers like those in Table 1 below.
    TABLE 1
    Algorithm Identifier Description of Algorithm
    01 Company A magnetic stripe fingerprint
    encryption algorithm
    02 Company B magnetic stripe fingerprint
    encryption algorithm
    03 Company C dynamic CVV encryption
    algorithm

    As shown in Table 1, the algorithm ID may take any suitable form. For example, the algorithm IDs may simply be one, two, or three digit numbers.
  • [0171]
    When the POS terminal sends an authorization request message to an issuer, the authorization request message may contain the particular algorithm ID associated with the POS terminal and an altered portable consumer device fingerprint. When the authorization request message is received by a back end server computer, it can determine which algorithm was used to encrypt the portable consumer device fingerprint. The back end server computer may then decrypt the encrypted portable consumer device fingerprint and may determine if the portable consumer device fingerprint corresponds to the portable consumer device fingerprint that is stored in a back end database. The portable consumer device fingerprint may have been previously stored in the back end database along with corresponding consumer data (e.g., an account number) as part of the process of issuing the portable consumer device to the consumer who will use it.
  • [0172]
    Using such algorithm identifiers, embodiments of the invention can effectively integrate different technologies into a single payment processing system. For example, a consumer can swipe a payment card through a POS (point of sale) terminal to pay $5.00 for office supplies. The POS terminal may contain an encryption algorithm produced by Company A. The encryption algorithm may encrypt a fingerprint that is embedded in the magnetic structure of the magnetic stripe of the payment card. The POS terminal may then send an authorization request message to a back end server computer. The authorization request message may contain information including the purchase amount, consumer data such as the consumer's account number, the encrypted fingerprint, and an algorithm identifier that is specifically associated with the encryption algorithm produced by company A. The back end server computer can receive the authorization request message from a POS (point of sale) terminal. It can then determine which algorithm was used to encrypt the fingerprint, and can subsequently decrypt the fingerprint. Once the fingerprint is determined, the back end server computer can determine if the received fingerprint corresponds to the stored fingerprint. If it does, then the payment card is authenticated.
  • [0173]
    Other details regarding methods and systems that utilize algorithm identifiers are provided below.
  • [0174]
    B. Confidence Assessment Methods
  • [0175]
    In some embodiments, the back end processor, or back end server computer, can also determine whether a transaction meets a desired confidence threshold of likely validity before it determines that a portable consumer device is authenticated. If the confidence threshold is not met, additional authentication processes can be performed. Such additional authentication processes may include the sending of one or more challenge questions and/or notification messages to the consumer.
  • [0176]
    Illustratively, a back end server computer may receive an authorization request message from a POS terminal after a consumer tries to pay for office supplies using a payment card. The back end server computer may determine that one of the three card verification technologies in Table I above is present, and that there have not been any recent suspicious transactions associated the payment card. The back end server computer may thereafter determine that the transaction is valid (i.e., a confidence threshold has been met) and can proceed if the transaction is otherwise authorized by the issuer of the payment card. Conversely, if an old (legacy) card and reader are used to conduct the transaction, none of the three card protection technologies in Table 1 (above) is used, and there has been recent suspicious activity associated with the payment card, then the server computer may determine that a confidence threshold has not been met, and additional authentication processes can be initiated by the server computer. For example, a dynamic challenge (query) can be sent to the consumer before approval, and/or the consumer can be notified that a transaction is occurring.
  • [0177]
    Transaction confidence determinations can also take into account whether one algorithm could be more reliable than the other. The back end server computer can evaluate the algorithm that was used at the front end (e.g., at the POS terminal) and can determine whether or not the transaction should proceed. For example, the back end server computer may determine that the algorithm from company A may have 90% reliability and the algorithm from Company B may have 50% reliability.
  • [0178]
    There are a number of reasons why different algorithms may have different levels of reliability. For example, depending on the sensitivity of the terminal, depending on the way that the card is swiped, and depending on the aging of the card, some algorithms may be able to handle data more precisely. In this example, if the server computer receives an authorization request message indicating that the algorithm from Company B is present and there has been recent suspicious activity associated with the payment card, then additional authentication processing may be initiated. On the other hand, if the server computer receives an authorization request message indicating that the algorithm from Company A is present and there has been recent suspicious activity, then the back end server computer may not initiate additional authentication processing.
  • [0179]
    Illustratively, McDonalds may have a relationship with Company A and Taco Bell may have a relationship with Company B. They have may use different algorithms at their point of sale devices. Each one delivers two sets of data using two different algorithms. When they come back to a payment processing organization such as Visa, it may identify data as originating from a Company A algorithm, and/or from Company B algorithm. Weight can be put on the algorithms so that a confidence level can be determined. Additional authentication processing may then take place if a confidence level (or threshold) is not satisfied.
  • [0180]
    C. Exemplary Systems Using Algorithm Identifiers and Confidence Assessment
  • [0181]
    FIG. 10(a) shows a system 720 that can be used in an embodiment of the invention. The system 720 includes a plurality of merchants 722(a), 722(b), 722(c) and a plurality of acquirers 724(a), 724(b), 724(c) associated with the merchants 722(a), 722(b), 722(c). In typical payment transactions, consumers 730(a), 730(b), 730(c) may purchase goods or services at the merchants 722(a), 722(b), 722(c) using their portable consumer devices 732(a), 732(b), 732(c). The consumers 730(a), 730(b), 730(c) may individuals, or organizations such as businesses. The acquirers 724(a), 724(b), 724(c) can communicate with the issuers 728(a), 728(b), 728(c) via a payment processing network 726. The issuers 728(a), 728(b), 728(c) may respectively issue portable consumer devices 730(a), 730(b), 730(c) to the consumers 730(a), 730(b), 730(c).
  • [0182]
    For purposes of illustration, access device A 732(a) may be produced by Company A, which may be associated with an algorithm with an algorithm identifier “01”. Access device B 732(b) may be produced by Company B and may be associated with an algorithm with an algorithm identifier “02”. Access device C 732(c) may be associated with Company D and may have no algorithm associated with it.
  • [0183]
    The portable consumer devices 732(a), 732(b), 732(c) may be in any suitable form. For example, suitable portable consumer devices 732(a), 732(b), 732(c) can be hand-held and compact so that they can fit into a consumer's wallet and/or pocket (e.g., pocket-sized). Suitable portable consumer devices are described above (e.g., portable consumer device 32 in FIG. 1).
  • [0184]
    The merchants 722(a), 722(b), 722(c) may also have, or may receive communications from, respective access devices 734(a), 734(b), 734(c) that can interact with the portable consumer devices 732(a), 732(b), 732(c). Suitable types of access devices are described above (e.g., access device 34 in FIG. 1).
  • [0185]
    If the access device is a point of sale terminal, any suitable point of sale terminal may be used including card readers. The card readers may include any suitable contact or contactless mode of operation. For example, exemplary card readers can include RF (radio frequency) antennas, magnetic stripe readers, etc. to interact with the portable consumer devices 732(a), 732(b), 732(c).
  • [0186]
    The payment processing network 726 may include any of the characteristics described above (e.g., with respect to payment processing network 26 in FIG. 1). It may include a server computer 726(a).
  • [0187]
    The server computer 726(a) may comprise any suitable number of software modules and they may be of any suitable type. As shown in FIG. 10(b), the server computer 726(a) may comprise an algorithm identification module 726(a)-1 and a confidence assessment module 726(a)-2. It may also comprise a decryption module 726(a)-3, as well as a data formatter module 726(a)-4.
  • [0188]
    The algorithm identification module 726(a)-1, in conjunction with the decryption module 726(a)-3, may review a received authorization request message including an algorithm ID and an altered portable consumer device fingerprint. From the received algorithm ID, it may then determine which algorithm was used to alter (e.g., encrypt) the portable consumer device fingerprint. A lookup table or the like may be used to identify correspondence between the algorithm ID, the algorithm(s) used to alter a portable consumer device fingerprint or restore an altered portable consumer device fingerprint, and consumer data (e.g., an account number). (In some cases, the algorithm may be a key in an encryption process.) The server computer 726(a) may then be used to determine (e.g., by unencrypting) the portable consumer device fingerprint from the altered portable consumer device fingerprint in an authorization request message. Once the portable consumer device fingerprint is determined, this information may be analyzed to determine if it corresponds to a stored fingerprint linked to consumer data (e.g., account number) associated with the portable consumer device.
  • [0189]
    The confidence assessment module 726(a)-2 may generate a confidence assessment from various pieces of information. Such information may include the type of portable consumer device used (e.g., a phone may be more secure than a payment card), the type of algorithm used to encrypt the portable consumer device fingerprint (e.g., some encryption algorithms are more secure than others), etc. Using the confidence module 726(a)-2, the server computer 726(a) may subsequently determine if additional authentication processes need to take place. Such additional authentication processes may comprise challenge questions and/or consumer notification that a transaction is occurring.
  • [0190]
    The confidence assessment module 726(a)-2 can “score” a transaction based on a number of transaction variables. If this score exceeds a predetermined threshold, then the transaction can be considered valid and additional authentication processing need not take place. Conversely, if the score does not exceed a predetermined threshold, then the transaction may be characterized as suspicious and additional authentication processes may be initiated.
  • [0191]
    The data formatter module 726(a)-4 may be used to format data so that it can be used by the confidence assessment module 726(a)-2. In some cases, data that is from different POS terminals from different companies may be decrypted by the decryption module 726(a)-3 and may be in different formats. The data formatter can format any data so that it can be used by the confidence assessment module 726(a)-2.
  • [0192]
    Embodiments of the invention are not limited to the above-described embodiments. For example, although separate functional blocks are shown for an issuer, payment processing network, and acquirer, some entities perform all of these functions and may be included in embodiments of invention.
  • [0193]
    D. Exemplary Methods for Using Fingerprints and Identifiers
  • [0194]
    Various methods according to embodiments of the invention may be described with reference to FIGS. 10-12. FIGS. 11-12 include flowcharts.
  • [0195]
    Some or all of the steps shown in FIG. 11 may be included in embodiments of the invention. For example, some embodiments of the invention may use algorithm identifiers to determine if a portable consumer device fingerprint in an authorization request message matches a portable consumer device fingerprint stored in a back end database, and may not perform transaction confidence processing before determining if the transaction is authorized. In other embodiments, a transaction confidence process may be performed without using portable consumer device fingerprints to authenticate portable consumer devices. In preferred embodiments, however, algorithm identifiers, portable consumer device fingerprints, and transaction confidence processing are used to authenticate the portable consumer devices and transactions as a whole.
  • [0196]
    Also, while the flowcharts shown in FIGS. 11 and 12 shows specific steps being performed in a specific order, embodiments of the invention can include methods which include such steps in a different order. This also applies to other flowcharts or processes described in this application.
  • [0197]
    Referring to FIGS. 10(a) and 11, a consumer A 730(a) may use a portable consumer device A 732(a) to interact with an access device A 734(a) at a merchant A 732(a) (step 802). For example, the portable consumer device 732(a) may be a credit card, the access device A 734(a) may be a point of sale terminal, and the merchant A 732(a) may be a gas station. Consumer A 730(a) may want to purchase gas from merchant A 722(a) using the portable consumer device A 732(a).
  • [0198]
    After the portable consumer device A 732(a) interfaces with the access device A 734(a) at merchant A 722(a), the access device A 734(a) reads consumer data and portable consumer device fingerprint data such as magnetic stripe fingerprint data from the portable consumer device A 732(a) (step 804). The consumer data may include information of which the consumer is typical aware. Examples of consumer data include a consumer's account number, expiration date, and service code. As noted above, portable consumer device fingerprint data are data that are not typically known to the consumer, but are used to authenticate the portable consumer device. In this example, the portable consumer device fingerprint data may be magnetic stripe fingerprint data. The magnetic stripe fingerprint data may also comprise data that are embedded into the magnetic structure of the magnetic stripe and are only readable using an access device that is manufactured by a particular company.
  • [0199]
    Once the access device A 734(a) obtains the consumer data from the portable consumer device A 734(a), an authorization request message including an algorithm identifier is created (step 806). The authorization request message may also include consumer data (e.g., an account number), data relating to the amount of the purchase, and portable consumer device fingerprint data. The access device A 734(a) may alter (e.g., encrypt) the received fingerprint data using an algorithm A that is stored in a memory in access device A 734(a), before it is incorporated into the authorization request message. In some embodiments, the portable consumer device fingerprint and the algorithm identifier may be stored in a supplementary data field called Field 55.
  • [0200]
    Different types and sizes of fingerprints may originate from different portable consumer devices offered by different manufacturers. These different fingerprints may be inserted into a data field of standard size so that transmission through the payment processing system is uniform regardless of the particular fingerprint being transmitted. For example, in some cases, it is desirable to pad the data field with characters such as zeros to fill up the data field. For example, a data field may have a size of 64 bytes. The fingerprint from one type of portable consumer device may be 54 bytes while the fingerprint from another type of portable consumer device may be 56 bytes. Additional padding characters may be present in the 64 byte field along with a two character algorithm identifier. The padding characters may be placed in the field in a predetermined manner.
  • [0201]
    In embodiments of the invention, the previously described algorithm identifier may not only identify the algorithm used to encrypt a portable consumer device fingerprint; the identified algorithm can also be used to restore the fingerprint to its original form so that it can be evaluated. For example, the algorithm identifier may be used to identify the algorithm that may be used to remove any padding characters to restore the received, but altered fingerprint to its original form so that it can be evaluated.
  • [0202]
    The authorization request message is then sent from access device 734(a) to the payment processing network 726 via the acquirer A 724(a) associated with the merchant A 722(a) (step 808). In other embodiments, the access device 734(a) could send the authorization request message to the payment processing network directly, instead of through the acquirer A 724(a).
  • [0203]
    After the authorization request message is received by the payment processing network 726, the server computer 726(a) in the payment processing network 726 analyzes the authorization request message and then selects an algorithm using an algorithm ID that is in the authorization request message (step 810). The selected algorithm ID and the selected algorithm may be selected from the algorithm database 726(c). The algorithm database 726(c) may contain a plurality of algorithm IDs and a plurality of algorithms which may be associated with various access devices (e.g., access device A 732(a) and access device B 734(b)).
  • [0204]
    After the algorithm is identified, the portable consumer device fingerprint is determined by the server computer 726(a) in the payment processing network 726 (step 812). The selected algorithm is then used to restore (e.g., decrypt) the altered portable consumer device fingerprint present in the authorization request message.
  • [0205]
    Then, the server computer 726(a) determines if the determined portable consumer device fingerprint corresponds to a previously stored fingerprint in a database (step 814). The server computer 726(a) can first obtain consumer data such as the consumer's account number from the authorization request message and/or may obtain additional consumer data from the consumer database 726(b) after analyzing the authorization request message. Once the consumer data are determined, the server computer 726(a) can obtain the portable consumer device fingerprint from the consumer database 726(b). The server computer 726(a) then determines if the portable consumer device fingerprint in the authorization request message and the portable consumer device fingerprint in the consumer database 726(b) match.
  • [0206]
    If the portable consumer device fingerprint obtained from the consumer database 726(b) does not correspond to the previously restored portable consumer device fingerprint obtained from the authorization request message, then additional authentication processes may be performed and/or an authorization response message may be sent back to the consumer A 722(a) indicating that the transaction is denied (step 822). Additional authentication processing may include sending a transaction notification message to the consumer A 722(a) (e.g., to the consumer's cell phone or the consumer's computer) notifying the consumer that a transaction is taking place. The notification message may request that the consumer A 722(a) confirm that the transaction is authentic. Alternatively or additionally, other types of challenges, such as challenge questions, may be sent to consumer A 722(a). Challenges such as challenge questions are described in further detail in U.S. patent application Ser. No. 11/763,240, entitled “Consumer Authentication System and Method” filed on Jun. 14, 2007 (Attorney Docket No. 16222U-031600US), which is herein incorporated by reference in its entirety for all purposes.
  • [0207]
    In some embodiments, if a fingerprint obtained from the authorization request message and the fingerprint in the consumer database 726(b) match, the server computer 726(a) may also optionally determine if a transaction confidence threshold is satisfied (step 815). If the confidence threshold is not satisfied, then additional authorization processing may be performed (step 823). If, however, the confidence threshold is satisfied, then an authorization request message may then be forwarded onto issuer A 428(a) (step 816).
  • [0208]
    The transaction confidence threshold may take any number of transaction characteristics to score the transaction as being authentic or potentially suspicious. Such transaction characteristics may relate to the access device (e.g., whether the access device uses new or old technology, whether the access device uses a secure encryption algorithm to encrypt data, etc.), portable consumer device (e.g., whether the portable consumer device is a phone, a magnetic stripe card with old technology, a magnetic stripe card with new technology, etc.), etc.
  • [0209]
    As noted above, in a payment processing system, there can be many different combinations of access devices and portable consumer devices interacting together at any given time. These different combinations of access devices and potable consumer devices may initiate transactions that may have different levels of potential authenticity. For example, referring to FIG. 10(a), access device A 734(a) may use an encryption algorithm from company A to encrypt data in an authorization request message, access device B 734(b) may use an encryption algorithm from company B, and access device C 734(c) may not use any encryption technology. Encryption algorithm A may be considered a more reliable encryption algorithm than encryption algorithm B. Consequently, authorization request messages from access device A 734(a) may have a higher level of potential authenticity than authorization request messages from access device B 734(b) or access device C 734(c). Additional authentication processing may be performed when transactions are performed by access devices B and C 734(b), 734(c) rather than the access device A 734(a). In another example, if portable consumer devices A, B, and C 732(a), 732(b), 732(c) are all highly secure portable consumer devices, then only authorization request messages coming from access device C 734(c) may be require additional authentication processing, since only the access device C 734(c) does not contain an encryption algorithm. As illustrated by this example, the threshold for determining whether or not additional authorization processing needs to be performed can be varied and can be set according to predetermined rules.
  • [0210]
    After the authorization request message is received by issuer A 728(a), issuer A may then determine if the transaction is authorized. If the transaction is not authorized (e.g., due to insufficient funds or credit in consumer A's account), then additional authorization processing may be performed and/or an authorization response message indicating that the transaction is declined may be sent to consumer A 730(a) (step 824).
  • [0211]
    If the transaction is approved by issuer A 728(a), then an authorization response message may be sent back to consumer A 730(a) via the payment processing network 726, acquirer A 724(a), merchant A 722(a), and access device A 734(a) (step 820).
  • [0212]
    At the end of the day, a normal clearing and settlement process can be conducted by the payment processing network 726. A clearing process is a process of exchanging financial details between an acquirer and an issuer to facilitate posting to a consumer's account and reconciliation of the consumer's settlement position. Clearing and settlement can occur simultaneously.
  • [0213]
    Further details regarding embodiments that use the methods and systems that are described above can be found in U.S. patent application Ser. No. ______, entitled Portable Consumer Device Verification System and Method, filed on the same day as the present application (Attorney Docket No. 16222U-031400US) which is herein incorporated by reference in its entirety for all purposes.
  • [0214]
    It should be understood that the present invention as described above can be implemented in the form of control logic using computer software in a modular or integrated manner. Based on the disclosure and teachings provided herein, a person of ordinary skill in the art will know and appreciate other ways and/or methods to implement the present invention using hardware and a combination of hardware and software
  • [0215]
    Any of the software components or functions described in this application, may be implemented as software code to be executed by a processor using any suitable computer language such as, for example, Java, C++ or Perl using, for example, conventional or object-oriented techniques. The software code may be stored as a series of instructions, or commands on a computer readable medium, such as a random access memory (RAM), a read only memory (ROM), a magnetic medium such as a hard-drive or a floppy disk, or an optical medium such as a CD-ROM. Any such computer readable medium may reside on or within a single computational apparatus, and may be present on or within different computational apparatuses within a system or network.
  • [0216]
    The above description is illustrative and is not restrictive. Many variations of the invention will become apparent to those skilled in the art upon review of the disclosure. The scope of the invention should, therefore, be determined not with reference to the above description, but instead should be determined with reference to the pending claims along with their full scope or equivalents.
  • [0217]
    One or more features from any embodiment may be combined with one or more features of any other embodiment without departing from the scope of the invention.
  • [0218]
    A recitation of “a”, “an” or “the” is intended to mean “one or more” unless specifically indicated to the contrary.
Citas de patentes
Patente citada Fecha de presentación Fecha de publicación Solicitante Título
US575815 *29 Jun 189626 Ene 1897 Bicycle
US576207 *29 Jun 18962 Feb 1897 Wagon brake
US578158 *6 Jul 18962 Mar 1897 Weighing-machine
US4186871 *1 Mar 19785 Feb 1980International Business Machines CorporationTransaction execution system with secure encryption key storage and communications
US4317957 *10 Mar 19802 Mar 1982Marvin SendrowSystem for authenticating users and devices in on-line transaction networks
US5177342 *9 Nov 19905 Ene 1993Visa International Service AssociationTransaction approval system
US5384449 *28 Abr 199224 Ene 1995Visa International Service AssociationAuthorization matching system
US5500513 *11 May 199419 Mar 1996Visa InternationalAutomated purchasing control system
US5615110 *22 Ago 199425 Mar 1997Wong; Kam-FuSecurity system for non-cash transactions
US5708422 *31 May 199513 Ene 1998At&TTransaction authorization and alert system
US5721781 *13 Sep 199524 Feb 1998Microsoft CorporationAuthentication system and method for smart card transactions
US5872834 *16 Sep 199616 Feb 1999Dew Engineering And Development LimitedTelephone with biometric sensing device
US5878337 *12 Jun 19972 Mar 1999Joao; Raymond AnthonyTransaction security apparatus and method
US5883810 *24 Sep 199716 Mar 1999Microsoft CorporationElectronic online commerce card with transactionproxy number for online transactions
US5988500 *6 Ago 199623 Nov 1999Aveka, Inc.Antiforgery security system
US6012144 *1 Oct 19974 Ene 2000Pickett; Thomas E.Transaction security method and apparatus
US6016476 *16 Ene 199818 Ene 2000International Business Machines CorporationPortable information and transaction processing system and method utilizing biometric authorization and digital certificate security
US6029154 *28 Jul 199722 Feb 2000Internet Commerce Services CorporationMethod and system for detecting fraud in a credit card transaction over the internet
US6053406 *7 Ago 199725 Abr 2000Aveka, Inc.Antiforgery security system
US6182894 *28 Oct 19986 Feb 2001American Express Travel Related Services Company, Inc.Systems and methods for authorizing a transaction card
US6184651 *20 Mar 20006 Feb 2001Motorola, Inc.Contactless battery charger with wireless control link
US6254002 *27 Jul 19993 Jul 2001Mark A. LitmanAntiforgery security system
US6339766 *2 Dic 199815 Ene 2002TransactionsecureElectronic payment system employing limited-use account number
US6345101 *7 Oct 19985 Feb 2002Jayant ShuklaCryptographic method and apparatus for data communication and storage
US6505046 *19 Nov 19987 Ene 2003Nortel Networks LimitedMethod and apparatus for distributing location-based messages in a wireless communication network
US6523745 *5 Ago 199725 Feb 2003Enix CorporationElectronic transaction system including a fingerprint identification encoding
US6529725 *9 Oct 19984 Mar 2003Raymond Anthony JoaoTransaction security apparatus and method
US6535855 *31 Mar 199818 Mar 2003The Chase Manhattan BankPush banking system and method
US6684250 *3 Abr 200127 Ene 2004Quova, Inc.Method and apparatus for estimating a geographic location of a networked entity
US6714918 *18 Nov 200230 Mar 2004Access Business Group International LlcSystem and method for detecting fraudulent transactions
US6837425 *13 Sep 20024 Ene 2005Visa U.S.A. Inc.Compact protocol and solution for substantially offline messaging between portable consumer device and based device
US6839840 *4 Nov 19994 Ene 2005GemplusAuthenticating method between a smart card and a terminal
US6839845 *6 Feb 20014 Ene 2005Startek Engineering IncorporatedControl system for image input device, especially fingerprint image input device
US6850916 *2 Mar 19991 Feb 2005Esignx CorporationPortable electronic charge and authorization devices and methods therefor
US6857073 *16 Oct 200215 Feb 2005Equifax Inc.System and method for authentication of network users
US6983882 *31 Mar 200310 Ene 2006Kepler, Ltd.Personal biometric authentication and authorization device
US7003495 *28 Sep 200021 Feb 2006Chameleon Network Inc.Portable electronic authorization system and method
US7003497 *31 Dic 200121 Feb 2006International Business Machines CorporationSystem and method for confirming electronic transactions
US7160189 *11 Dic 20029 Ene 2007Walker Jay SSystems and methods for determining an outcome of a game on a gaming device based on a factor other than a random number
US7328850 *7 Abr 200512 Feb 2008Codecard, Inc.Financial and similar identification cards and methods relating thereto
US7330871 *5 Jun 200112 Feb 2008Telecheck Services, Inc.Online machine data collection and archiving process
US7377433 *17 Dic 200427 May 2008Washington University In St. LouisMethod and apparatus for authenticating a magnetic fingerprint signal using compressive amplification
US7451917 *9 Ene 200318 Nov 2008Hand Held Products, Inc.Transaction terminal comprising imaging module
US7482925 *24 Jun 200527 Ene 2009Visa U.S.A.Apparatus and method to electromagnetically shield portable consumer devices
US7493487 *15 Oct 200417 Feb 2009Microsoft CorporationPortable computing environment
US7653597 *12 Jul 200026 Ene 2010David StevanovskiPayment administration system
US7665657 *10 Dic 200423 Feb 2010Inghoo HuhBank transaction method linking accounts via common accounts
US7885899 *8 Feb 20008 Feb 2011Ipass Inc.System and method for secure network purchasing
US8087582 *10 May 20103 Ene 2012Ayman HammadMethod and system for generating a dynamic verification value
US20020002681 *15 Jul 19983 Ene 2002Fuji Xerox Co.,Ltd.Verification data generating apparatus, data verification apparatus and storage medium for storing verification data generating program
US20020007320 *15 Mar 200117 Ene 2002Mastercard International IncorporatedMethod and system for secure payments over a computer network
US20020007352 *16 Mar 200117 Ene 2002International Business Machines CorporationMethod for validating an electronic payment by a credit/debit card
US20020013711 *12 Abr 200131 Ene 2002Arun AhujaMethod and system for notifying customers of transaction opportunities
US20020026396 *29 Dic 200028 Feb 2002Dent Warren T.System and method facilitating personal electronic financial transactions
US20020026478 *14 Mar 200128 Feb 2002Rodgers Edward B.Method and apparatus for forming linked multi-user groups of shared software applications
US20020032661 *7 May 200114 Mar 2002Marko SchubaMethod for the authorization of transactions
US20020035548 *11 Abr 200121 Mar 2002Hogan Edward J.Method and system for conducting secure payments over a computer network
US20020035622 *5 Jun 200121 Mar 2002Barber Timothy P.Online machine data collection and archiving process
US20020038287 *15 Jun 200128 Mar 2002Jean-Marc VillaretEMV card-based identification, authentication, and access control for remote access
US20020066014 *29 Nov 200030 May 2002Motorola, Inc.Message digest hardware accelerator
US20030001005 *4 Sep 20022 Ene 2003Mastercard International IncorporatedSystem and method for using a prepaid card
US20030028481 *4 Jun 20026 Feb 2003Orbis Patents, Ltd.Credit card system and method
US20030033228 *29 Nov 200113 Feb 2003Rowan Bosworth-DaviesCountermeasures for irregularities in financial transactions
US20030050896 *12 Sep 200113 Mar 2003Shawn WiederinSystems and methods for monetary transactions between wired and wireless devices
US20030061110 *24 Sep 200127 Mar 2003International Business Machines CorporationLocation based services virtual bookmarking
US20030061168 *21 Sep 200127 Mar 2003Larry RouthensteinMethod for generating customer secure card numbers
US20030105710 *4 Sep 20025 Jun 2003Ellen BarbaraMethod and system for on-line payments
US20030109300 *11 Dic 200212 Jun 2003Walker Jay S.Systems and methods for determining an outcome of a game on a gaming device based on a factor other than a random number
US20040003285 *28 Jun 20021 Ene 2004Robert WhelanSystem and method for detecting unauthorized wireless access points
US20040014423 *14 May 200322 Ene 2004Martin CroomeFunctionality and policies based on wireless device dynamic associations
US20040015435 *20 Dic 200122 Ene 2004Solomon Stuart J.Business transaction management
US20040019564 *26 Jul 200229 Ene 2004Scott GoldthwaiteSystem and method for payment transaction authentication
US20040019970 *31 Jul 20035 Feb 2004Jo-Ann LandryCrib safety sheet / blanket
US20040024638 *31 Jul 20025 Feb 2004Restis William R.Computerized credit information system coupon coding
US20040031856 *14 Jul 200319 Feb 2004Alon AtsmonPhysical presence digital authentication system
US20040034604 *10 Ene 200319 Feb 2004Klebanoff Victor FranklinMethod and system for assisting in the identification of merchants at which payment accounts have been compromised
US20040039694 *24 Jul 200326 Feb 2004American Express Travel Related Services Company, Inc.System and method for facilitating a subsidiary card account with controlled spending capability
US20040059688 *10 Sep 200325 Mar 2004Visa International Service AssociationData authentication and provisioning method and system
US20050029349 *14 Sep 200410 Feb 2005Mcgregor Christopher M.Bio-metric smart card, bio-metric smart card reader, and method of use
US20050043997 *18 Ago 200324 Feb 2005Sahota Jagdeep SinghMethod and system for generating a dynamic verification value
US20050060233 *10 Mar 200417 Mar 2005American Express Travel Related Services Company, Inc.System and method for securing rf transactions using a radio frequency identification device including a transactions counter
US20050060730 *10 Sep 200417 Mar 2005Matsushita Electric Industrial Co., Ltd.Optical disk device
US20050065876 *12 May 200324 Mar 2005Pulkit KumarAirbank, pay to anyone from the mobile phone
US20050071226 *30 Sep 200331 Mar 2005Visa U.S.A. Inc.Method and system for managing dynamic terms and conditions and user interaction
US20050071227 *30 Sep 200331 Mar 2005Visa U.S.A.Method and system for managing concurrent sku-based rewards program
US20050167495 *17 Dic 20044 Ago 2005Morley Robert E.Jr.Method and apparatus for authenticating a magnetic fingerprint signal using a filter capable of isolating a remanent noise related signal component
US20050218229 *17 Dic 20046 Oct 2005Morley Robert E JrMethod and apparatus for authenticating a magnetic fingerprint signal using compressive amplification
US20060010072 *2 Mar 200412 Ene 2006Ori EisenMethod and system for identifying users and detecting fraud by use of the Internet
US20060018523 *22 Jul 200526 Ene 2006Sanyo Electric Co., Ltd.Enrollment apparatus and enrollment method, and authentication apparatus and authentication method
US20070017970 *20 Jul 200625 Ene 2007Visa U.S.A., Inc.Compact protocol and solution for substantially offline messaging between portable consumer device and base device
US20070021126 *15 Feb 200625 Ene 2007Sanjiv NandaMethod and apparatus for maintaining a fingerprint for a wireless network
US20070034679 *19 Oct 200615 Feb 2007Visa U.S.A., Inc.Compact protocol and solution for substantially offline messaging between portable consumer device and base device
US20070034700 *27 Abr 200615 Feb 2007Mark PoidomaniElectronic cards and methods for making same
US20070067833 *19 Sep 200622 Mar 2007Colnot Vincent CMethods and Apparatus for Enabling Secure Network-Based Transactions
US20070087813 *1 Dic 200619 Abr 2007Walker Jay SMethods and apparatus for determining an outcome for a gaming device based on a factor other than a random number
US20070136211 *30 Dic 200614 Jun 2007Brown Kerry DFinancial transactions with dynamic card verification values
US20070174082 *12 Dic 200626 Jul 2007Sapphire Mobile Systems, Inc.Payment authorization using location data
US20080004121 *12 Jun 20073 Ene 2008Cyberview Technology, Inc.Universal game download system for legacy gaming machines
US20080005037 *14 Jun 20073 Ene 2008Ayman HammadConsumer authentication system and method
US20080029593 *18 Jun 20077 Feb 2008Ayman HammadMethod and System for Generating a Dynamic Verification Value
US20080034221 *18 Jun 20077 Feb 2008Ayman HammadPortable consumer device configured to generate dynamic authentication data
US20080040271 *18 Jun 200714 Feb 2008Ayman HammadPortable Consumer Device Verification System
US20080179401 *25 Ene 200831 Jul 2008Hart Annmarie DCard reader for use with web based transactions
US20080235138 *23 Mar 200525 Sep 2008Kaoru YokotaPoint Calculating Device and Point Assigning System
US20090037213 *9 Oct 20085 Feb 2009Ori EisenMethod and system for identifying users and detecting fraud by use of the internet
US20090048975 *22 Oct 200819 Feb 2009Fraud Control System.ComMethod Of Billing A Purchase Made Over A Computer Network
US20090049529 *22 Oct 200819 Feb 2009Fraud Control System.ComMethod Of Billing A Purchase Made Over A Computer Network
US20090055315 *22 Oct 200826 Feb 2009Fraud Control System.ComMethod Of Billing A Purchase Made Over A Computer Network
US20090055892 *14 Ago 200826 Feb 2009Feitian Technologies Co., Ltd.Authentication method and key device
US20090055893 *19 Ago 200826 Feb 2009Thomas ManessisMethod and system for implementing a dynamic verification value
US20100024029 *30 Sep 200928 Ene 2010Sony Computer Entertainment Inc.Battery And Authentication Requesting Device
US20100036749 *28 Oct 200911 Feb 2010Kount Inc.Online Machine Data Collection and Archiving Process
US20110004526 *15 Sep 20106 Ene 2011Ayman HammadPortable consumer device verification system
US20110004553 *16 Sep 20106 Ene 2011Ayman HammadTrack data encryption
Citada por
Patente citante Fecha de presentación Fecha de publicación Solicitante Título
US7673799 *25 Ene 20089 Mar 2010Magtek, Inc.Card reader for use with web based transactions
US774016818 Jun 200722 Jun 2010Visa U.S.A. Inc.Method and system for generating a dynamic verification value
US776137418 Ago 200320 Jul 2010Visa International Service AssociationMethod and system for generating a dynamic verification value
US778468719 Dic 200831 Ago 2010Dynamics Inc.Payment cards and devices with displays, chips, RFIDS, magnetic emulators, magnetic decoders, and other components
US7810165 *18 Jun 20075 Oct 2010Visa U.S.A. Inc.Portable consumer device configured to generate dynamic authentication data
US781826412 Jun 200719 Oct 2010Visa U.S.A. Inc.Track data encryption
US781932218 Jun 200726 Oct 2010Visa U.S.A. Inc.Portable consumer device verification system
US782822030 Oct 20079 Nov 2010Dynamics Inc.Dynamic credit card with magnetic stripe and embedded encoder and methods for using the same to provide a copy-proof credit card
US793119529 Oct 200726 Abr 2011Dynamics Inc.Dynamic credit card with magnetic stripe and embedded encoder and methods for using the same to provide a copy-proof credit card
US795470529 Oct 20077 Jun 2011Dynamics Inc.Dynamic credit card with magnetic stripe and embedded encoder and methods for using the same to provide a copy-proof credit card
US7958052 *24 Oct 20087 Jun 2011Mastercard International IncorporatedMethods and systems for cardholder initiated transactions
US801157719 Dic 20086 Sep 2011Dynamics Inc.Payment cards and devices with gift card, global integration, and magnetic stripe reader communication functionality
US802077519 Dic 200820 Sep 2011Dynamics Inc.Payment cards and devices with enhanced magnetic emulators
US8032460 *19 Jul 20014 Oct 2011Daita Frontier Fund, LlcAuthentication managing apparatus, and shop communication terminal
US806619122 Feb 201029 Nov 2011Dynamics Inc.Cards and assemblies with user interfaces
US807487719 Dic 200813 Dic 2011Dynamics Inc.Systems and methods for programmable payment cards and devices with loyalty-based payment applications
US8086534 *26 Abr 201127 Dic 2011Mastercard International IncorporatedMethods and systems for cardholder initiated transactions
US808758210 May 20103 Ene 2012Ayman HammadMethod and system for generating a dynamic verification value
US812194220 Jun 200821 Feb 2012Visa U.S.A. Inc.Systems and methods for secure and transparent cardless transactions
US812195620 Jun 200821 Feb 2012Visa U.S.A. Inc.Cardless challenge systems and methods
US813564714 Jun 200713 Mar 2012Visa U.S.A. Inc.Consumer authentication system and method
US817214822 Feb 20108 May 2012Dynamics Inc.Cards and assemblies with user interfaces
US8214293 *6 Dic 20113 Jul 2012Mastercard International IncorporatedMethods and system for cardholder initiated transactions
US821949024 Oct 200810 Jul 2012Visa U.S.A., Inc.Payment transaction using mobile phone as relay
US822600123 Jun 201024 Jul 2012Fiteq, Inc.Method for broadcasting a magnetic stripe data packet from an electronic smart card
US82310636 May 201131 Jul 2012Privasys Inc.Electronic card and methods for making same
US828200722 Feb 20109 Oct 2012Dynamics Inc.Laminated cards with manual input interfaces
US828687620 Jul 201116 Oct 2012Dynamics Inc.Cards and devices with magnetic emulators and magnetic reader read-head detectors
US828688923 Abr 201216 Oct 2012Privasys, IncElectronic financial transaction cards and methods
US830287116 Abr 20126 Nov 2012Privasys, IncMethod for conducting a transaction between a magnetic stripe reader and an electronic card
US830287220 Jul 20116 Nov 2012Dynamics Inc.Advanced dynamic credit cards
US831710311 Nov 201027 Nov 2012FiTeqMethod for broadcasting a magnetic stripe data packet from an electronic smart card
US832262326 Jul 20114 Dic 2012Dynamics Inc.Systems and methods for advanced card printing
US8339998 *6 Abr 201025 Dic 2012Fih (Hong Kong) LimitedMeeting information distribution system and method
US83481722 Mar 20118 Ene 2013Dynamics Inc.Systems and methods for detection mechanisms for magnetic cards and devices
US8355988 *18 Jun 201215 Ene 2013Mastercard International IncorporatedMethods and systems for cardholder initiated transactions
US836033216 Abr 201229 Ene 2013PrivasysElectronic card
US83645941 Mar 201129 Ene 2013Visa International Service AssociationSystem and method including security parameters used for generation of verification value
US83754411 Sep 201012 Feb 2013Visa U.S.A. Inc.Portable consumer device configured to generate dynamic authentication data
US838062916 Jun 200819 Feb 2013Visa U.S.A. Inc.Seeding challenges for payment transactions
US838200019 Dic 200826 Feb 2013Dynamics Inc.Payment cards and devices with enhanced magnetic emulators
US838786630 Nov 20115 Mar 2013Visa International Service AssociationMethod and system for generating a dynamic verification value
US839354522 Jun 201012 Mar 2013Dynamics Inc.Cards deployed with inactivated products for activation
US839354625 Oct 201012 Mar 2013Dynamics Inc.Games, prizes, and entertainment for powered cards and devices
US841389219 Dic 20089 Abr 2013Dynamics Inc.Payment cards and devices with displays, chips, RFIDs, magnetic emulators, magnetic encoders, and other components
US842341521 Jun 201016 Abr 2013Visa International Service AssociationPayment service authentication for a transaction using a generated dynamic verification value
US842477320 Jul 201123 Abr 2013Dynamics Inc.Payment cards and devices with enhanced magnetic emulators
US845954820 Jul 201111 Jun 2013Dynamics Inc.Payment cards and devices with gift card, global integration, and magnetic stripe reader communication functionality
US848000216 Abr 20129 Jul 2013Mark PoidomaniConducting a transaction with an electronic card
US848543720 Jul 201116 Jul 2013Dynamics Inc.Systems and methods for programmable payment cards and devices with loyalty-based payment applications
US848544628 Mar 201216 Jul 2013Dynamics Inc.Shielded magnetic stripe for magnetic cards and devices
US848950615 Sep 201016 Jul 2013Visa U.S.A. Inc.Portable consumer device verification system
US849496818 Jun 200723 Jul 2013Visa U.S.A. Inc.Terminal data encryption
US850001916 Abr 20126 Ago 2013Mark PoidomaniElectronic cards and methods for making same
US851157417 Ago 201020 Ago 2013Dynamics Inc.Advanced loyalty applications for powered cards and devices
US8515872 *10 Ene 201220 Ago 2013Mastercard International IncorporatedMethods and apparatus for preventing fraud in payment processing transactions
US851727619 Dic 200827 Ago 2013Dynamics Inc.Cards and devices with multifunction magnetic emulators and methods for using same
US852305920 Oct 20103 Sep 2013Dynamics Inc.Advanced payment options for powered cards and devices
US85331185 Nov 200910 Sep 2013Visa International Service AssociationOnline challenge-response
US85401653 Abr 201224 Sep 2013Privasys, Inc.Laminated electronic card assembly
US8548818 *31 Ene 20081 Oct 2013First Data CorporationMethod and system for authenticating customer identities
US856189420 Oct 201122 Oct 2013Dynamics Inc.Powered cards and devices designed, programmed, and deployed from a kiosk
US856767026 Mar 201029 Oct 2013Intersections Inc.Dynamic card verification values and credit transactions
US856767923 Ene 201229 Oct 2013Dynamics Inc.Cards and devices with embedded holograms
US857350325 Sep 20125 Nov 2013Dynamics Inc.Systems and methods for detection mechanisms for magnetic cards and devices
US857920323 Nov 201112 Nov 2013Dynamics Inc.Electronic magnetic recorded media emulators in magnetic card devices
US858929120 Ene 201219 Nov 2013Visa U.S.A. Inc.System and method utilizing device information
US858930011 Jun 201219 Nov 2013Visa U.S.A. Inc.Payment transaction using mobile phone as relay
US859079622 Feb 201026 Nov 2013Dynamics Inc.Cards having dynamic magnetic stripe communication devices fabricated from multiple boards
US860229330 Sep 201110 Dic 2013Visa International Service AssociationIntegration of verification tokens with portable computing devices
US860231216 Feb 201110 Dic 2013Dynamics Inc.Systems and methods for drive circuits for dynamic magnetic stripe communications devices
US860670025 Ene 201210 Dic 2013Visa U.S.A., Inc.Systems and methods for secure and transparent cardless transactions
US860808320 Jul 201117 Dic 2013Dynamics Inc.Cards and devices with magnetic emulators with zoning control and advanced interiors
US86223095 Abr 20107 Ene 2014Dynamics Inc.Payment cards and devices with budgets, parental controls, and virtual accounts
US8627080 *25 Jul 20127 Ene 2014Mastercard International IncorporatedSystems and methods for mutual authentication using one time codes
US862802223 May 201214 Ene 2014Dynamics Inc.Systems and methods for sensor mechanisms for magnetic cards and devices
US86362058 Feb 201328 Ene 2014Visa U.S.A. Inc.Method and system for generating a dynamic verification value
US866814320 Jul 201111 Mar 2014Dynamics Inc.Payment cards and devices with gift card, global integration, and magnetic stripe reader communication functionality
US86842673 Abr 20121 Abr 2014PrivasysMethod for broadcasting a magnetic stripe data packet from an electronic smart card
US87066219 Oct 201322 Abr 2014Visa U.S.A., Inc.Secure checkout and challenge systems and methods
US870731926 Jun 200922 Abr 2014Visa International Service AssociationResource location verification by comparing and updating resource location with a location of a consumer device after a threshold of location mismatches is exceeded
US872721912 Oct 201020 May 2014Dynamics Inc.Magnetic stripe track signal having multiple communications channels
US873363820 Jul 201127 May 2014Dynamics Inc.Payment cards and devices with displays, chips, RFIDs, magnetic emulators, magentic decoders, and other components
US87449588 Nov 20133 Jun 2014Visa U. S. A. Inc.Systems and methods for secure and transparent cardless transactions
US87465791 Jul 201310 Jun 2014Dynamics Inc.Systems and methods for detection mechanisms for magnetic cards and devices
US87574838 Feb 201324 Jun 2014Dynamics Inc.Cards deployed with inactivated products for activation
US875749910 Sep 201224 Jun 2014Dynamics Inc.Laminated cards with manual input interfaces
US876227912 Ago 201324 Jun 2014Visa International Service AssociationOnline challenge-response
US87688308 Sep 20111 Jul 2014Citibank, N.A.Method and system for a multi-purpose transactional platform
US881405026 Mar 201326 Ago 2014Dynamics Inc.Advanced payment options for powered cards and devices
US882715317 Jul 20129 Sep 2014Dynamics Inc.Systems and methods for waveform generation for dynamic magnetic stripe communications devices
US882715420 Ene 20119 Sep 2014Visa International Service AssociationVerification of portable consumer devices
US88434173 Nov 200823 Sep 2014Visa U.S.A. Inc.Track data encryption
US887599929 Abr 20134 Nov 2014Dynamics Inc.Payment cards and devices with gift card, global integration, and magnetic stripe reader communication functionality
US888198920 Jul 201111 Nov 2014Dynamics Inc.Cards and devices with magnetic emulators with zoning control and advanced interiors
US888800913 Feb 201318 Nov 2014Dynamics Inc.Systems and methods for extended stripe mechanisms for magnetic cards and devices
US88939679 Sep 201025 Nov 2014Visa International Service AssociationSecure Communication of payment information to merchants using a verification token
US8924297 *24 Feb 201230 Dic 2014Visa International Service AssociationDirect connection systems and methods
US8930274 *18 Dic 20136 Ene 2015Google Inc.Securing payment transactions with rotating application transaction counters
US893170316 Mar 201013 Ene 2015Dynamics Inc.Payment cards and devices for displaying barcodes
US89351875 Mar 200813 Ene 2015Playspan, Inc.Distributed payment system and method
US894433318 Sep 20133 Feb 2015Dynamics Inc.Cards and devices with embedded holograms
US896054516 Nov 201224 Feb 2015Dynamics Inc.Data modification for magnetic cards and devices
US897230316 Sep 20103 Mar 2015Visa U.S.A. Inc.Track data encryption
US897382419 Dic 200810 Mar 2015Dynamics Inc.Cards and devices with magnetic emulators with zoning control and advanced interiors
US900436820 Jul 201114 Abr 2015Dynamics Inc.Payment cards and devices with enhanced magnetic emulators
US901063019 Dic 200821 Abr 2015Dynamics Inc.Systems and methods for programmable payment cards and devices with loyalty-based payment applications
US90106444 Nov 201321 Abr 2015Dynamics Inc.Dynamic magnetic stripe communications device with stepped magnetic material for magnetic cards and devices
US901064719 Feb 201321 Abr 2015Dynamics Inc.Multiple sensor detector systems and detection methods of magnetic cards and devices
US903321814 May 201319 May 2015Dynamics Inc.Cards, devices, systems, methods and dynamic security codes
US903888614 May 201026 May 2015Visa International Service AssociationVerification of portable consumer devices
US904388731 Dic 201226 May 2015Apple Inc.Adaptive secondary authentication criteria based on account data
US905339812 Ago 20119 Jun 2015Dynamics Inc.Passive detection mechanisms for magnetic cards and devices
US90533993 Abr 20129 Jun 2015PrivasysMethod for broadcasting a magnetic stripe data packet from an electronic smart card
US9053471 *29 Ago 20089 Jun 20154361423 Canada Inc.Apparatus and method for conducting securing financial transactions
US906419519 Feb 201323 Jun 2015Dynamics Inc.Multiple layer card circuit boards
US90642559 May 201423 Jun 2015Dynamics Inc.Cards deployed with inactivated products for activation
US906564325 Jun 200823 Jun 2015Visa U.S.A. Inc.System and method for account identifier obfuscation
US910502713 May 201111 Ago 2015Visa International Service AssociationVerification of portable consumer device for secure services
US925828630 Jul 20089 Feb 2016United Services Automobile Association (Usaa)Systems and methods for communications channel authentication
US929284321 Jul 201422 Mar 2016Dynamics Inc.Advanced payment options for powered cards and devices
US930666624 Sep 20105 Abr 2016Dynamics Inc.Programming protocols for powered cards and devices
US93178489 Ago 201319 Abr 2016Visa International Service AssociationIntegration of verification tokens with mobile communication devices
US93296192 Mar 20103 May 2016Dynamics Inc.Cards with power management
US934908910 Dic 201324 May 2016Dynamics Inc.Systems and methods for sensor mechanisms for magnetic cards and devices
US936156919 Dic 20087 Jun 2016Dynamics, Inc.Cards with serial magnetic emulators
US93729714 Nov 201321 Jun 2016Visa International Service AssociationIntegration of verification tokens with portable computing devices
US937306925 Oct 201321 Jun 2016Dynamics Inc.Systems and methods for drive circuits for dynamic magnetic stripe communications devices
US938443820 Jul 20115 Jul 2016Dynamics, Inc.Cards with serial magnetic emulators
US941850113 Sep 200716 Ago 2016First Data CorporationMethod for digital signature authentication of pin-less debit card account transactions
US94244109 Dic 201323 Ago 2016Mastercard International IncorporatedMethods and systems for leveraging transaction data to dynamically authenticate a user
US94244132 Mar 201223 Ago 2016Visa International Service AssociationIntegration of payment capability into secure elements of computers
US94432381 Dic 201413 Sep 2016Playspan, Inc.Distributed payment system and method
US9503260 *27 Ene 201422 Nov 2016Nxp B.V.Security token and service access system
US95046402 Sep 201429 Nov 2016Valeant Pharmaceuticals Luxembourg S.Á.R.L.Modified release formulations of a bupropion salt
US953013313 Abr 201527 Dic 2016Apple Inc.Adaptive secondary authentication criteria based on account data
US954781625 Jul 201217 Ene 2017Dynamics Inc.Cards and devices with multifunction magnetic emulators and methods for using same
US95828019 Oct 201428 Feb 2017Visa International Service AssociationSecure communication of payment information to merchants using a verification token
US958926827 May 20167 Mar 2017Visa International Service AssociationIntegration of payment capability into secure elements of computers
US961974120 Nov 201211 Abr 2017Dynamics Inc.Systems and methods for synchronization mechanisms for magnetic cards and devices
US963979619 Dic 20082 May 2017Dynamics Inc.Cards and devices with magnetic emulators with zoning control and advanced interiors
US96462404 Nov 20119 May 2017Dynamics Inc.Locking features for powered cards and devices
US964675017 Mar 20159 May 2017Dynamics Inc.Dynamic magnetic stripe communications device with stepped magnetic material for magnetic cards and devices
US96524368 Feb 201316 May 2017Dynamics Inc.Games, prizes, and entertainment for powered cards and devices
US96527697 Nov 201216 May 2017Carbonite, Inc.Methods, apparatus and systems for securely storing and/or accessing payment information or other sensitive information based on tokens
US96592464 Nov 201323 May 2017Dynamics Inc.Dynamic magnetic stripe communications device with beveled magnetic material for magnetic cards and devices
US968486119 Dic 200820 Jun 2017Dynamics Inc.Payment cards and devices with displays, chips, RFIDs, magnetic emulators, magnetic decoders, and other components
US969745429 Feb 20164 Jul 2017Dynamics Inc.Payment cards and devices with displays, chips, RFIDs, magnetic emulators, magnetic encoders, and other components
US970408820 Jul 201111 Jul 2017Dynamics Inc.Cards and devices with multifunction magnetic emulators and methods for using same
US97040898 Mar 201511 Jul 2017Dynamics Inc.Systems and methods for programmable payment cards and devices with loyalty-based payment applications
US97107458 Feb 201318 Jul 2017Dynamics Inc.Systems and methods for automated assembly of dynamic magnetic stripe communications devices
US971568114 May 201025 Jul 2017Visa International Service AssociationVerification of portable consumer devices
US972120120 Dic 20141 Ago 2017Dynamics Inc.Cards and devices with embedded holograms
US972125024 Oct 20081 Ago 2017Visa U.S.A. Inc.Location based authentication
US972781320 Jul 20118 Ago 2017Dynamics Inc.Credit, security, debit cards and the like with buttons
US973450022 Ago 201615 Ago 2017Mastercard International IncorporatedMethods and systems for leveraging transaction data to dynamically authenticate a user
US97346692 Abr 201315 Ago 2017Dynamics Inc.Cards, devices, systems, and methods for advanced payment game of skill and game of chance functionality
US974275621 Ene 201622 Ago 2017United Services Automobile Association (Usaa)Systems and methods for communications channel authentication
US974759826 Ago 201329 Ago 2017Iii Holdings 1, LlcDynamic security code push
US977502924 Ago 201526 Sep 2017Visa International Service AssociationEmbedding cloud-based functionalities in a communication device
US97926115 Jun 201517 Oct 2017Visa International Service AssociationSecure authentication system and method
US980529720 Jul 201131 Oct 2017Dynamics Inc.Systems and methods for programmable payment cards and devices with loyalty-based payment applications
US981812513 Jun 201114 Nov 2017Dynamics Inc.Systems and methods for information exchange mechanisms for powered cards and devices
US20020138423 *19 Jul 200126 Sep 2002Sunao TakatoriAuthentication managing apparatus, and shop communication terminal
US20080005037 *14 Jun 20073 Ene 2008Ayman HammadConsumer authentication system and method
US20080029593 *18 Jun 20077 Feb 2008Ayman HammadMethod and System for Generating a Dynamic Verification Value
US20080029607 *9 May 20067 Feb 2008Mullen Jeffrey DDynamic credit card with magnetic stripe and embedded encoder and methods for using the same to provide a copy-proof credit card
US20080034221 *18 Jun 20077 Feb 2008Ayman HammadPortable consumer device configured to generate dynamic authentication data
US20080035738 *9 May 200614 Feb 2008Mullen Jeffrey DDynamic credit card with magnetic stripe and embedded encoder and methods for using the same to provide a copy-proof credit card
US20080040271 *18 Jun 200714 Feb 2008Ayman HammadPortable Consumer Device Verification System
US20080054068 *29 Oct 20076 Mar 2008Mullen Jeffrey DDynamic credit card with magnetic stripe and embedded encoder and methods for using the same to provide a copy-proof credit card
US20080054079 *30 Oct 20076 Mar 2008Mullen Jeffrey DDynamic credit card with magnetic stripe and embedded encoder and methods for using the same to provide a copy-proof credit card
US20080054081 *29 Oct 20076 Mar 2008Mullen Jeffrey DDynamic credit card with magnetic stripe and embedded encoder and methods for using the same to provide a copy-proof credit card
US20080065555 *31 Oct 200713 Mar 2008Mullen Jeffrey DDynamic credit card with magnetic stripe and embedded encoder and methods for using the same to provide a copy-proof credit card
US20080103982 *18 Jun 20071 May 2008Ayman HammadTerminal Data Encryption
US20080179401 *25 Ene 200831 Jul 2008Hart Annmarie DCard reader for use with web based transactions
US20080185429 *5 Feb 20077 Ago 2008First Data CorporationAuthentication Of PIN-Less Transactions
US20080222048 *5 Mar 200811 Sep 2008Higgins Kevin LDistributed Payment System and Method
US20080222049 *13 Sep 200711 Sep 2008First Data CorporationDigital Signature Authentication
US20080302869 *30 Oct 200711 Dic 2008Mullen Jeffrey DDynamic credit card with magnetic stripe and embedded encoder and methods for using the same to provide a copy-proof credit card
US20080302876 *29 Oct 200711 Dic 2008Mullen Jeffrey DDynamic credit card with magnetic stripe and embedded encoder and methods for using the same to provide a copy-proof credit card
US20080306876 *7 Dic 200711 Dic 2008Horvath Kris MVerifying dynamic transaction security code in payment card system
US20080319869 *20 Jun 200825 Dic 2008Mark CarlsonSystems and methods for secure and transparent cardless transactions
US20080319904 *16 Jun 200825 Dic 2008Mark CarlsonSeeding challenges for payment transactions
US20090083191 *3 Nov 200826 Mar 2009Ayman HammadTrack data encryption
US20090089213 *3 Nov 20082 Abr 2009Ayman HammadTrack data encryption
US20090150295 *9 Dic 200711 Jun 2009Jeffrey Alan HatchValidation service for payment cards with preloaded dynamic card verification values
US20090159663 *19 Dic 200825 Jun 2009Dynamics Inc.Payment cards and devices operable to receive point-of-sale actions before point-of-sale and forward actions at point-of-sale
US20090159667 *19 Dic 200825 Jun 2009Dynamics, Inc.Cards with serial magnetic emulators
US20090159668 *19 Dic 200825 Jun 2009Dynamics Inc.Cards and devices with multifunction magnetic emulators and methods for using same
US20090159669 *19 Dic 200825 Jun 2009Dynamics Inc.Cards with serial magnetic emulators
US20090159672 *19 Dic 200825 Jun 2009Dynamics Inc.Cards with serial magnetic emulators
US20090159673 *19 Dic 200825 Jun 2009Dynamics Inc.Systems and methods for programmable payment cards and devices with loyalty-based payment applications
US20090159680 *19 Dic 200825 Jun 2009Dynamics Inc.Credit, security, debit cards and the like with buttons
US20090159681 *19 Dic 200825 Jun 2009Dynamics, Inc.Cards and devices with magnetic emulators and magnetic reader read-head detectors
US20090159682 *19 Dic 200825 Jun 2009Dynamics Inc.Cards and devices with multi-function magnetic emulators and methods for using same
US20090159688 *19 Dic 200825 Jun 2009Dynamics Inc.Payment cards and devices with displays, chips, rfids, magnetic emulators, magnetic decoders, and other components
US20090159689 *19 Dic 200825 Jun 2009Dynamics Inc.Payment cards and devices with gift card, global integration, and magnetic stripe reader communication functionality
US20090159690 *19 Dic 200825 Jun 2009Dynamics Inc.Payment cards and devices with gift card, global integration, and magnetic stripe reader communication functionality
US20090159698 *19 Dic 200825 Jun 2009Dymanics Inc.Payment cards and devices with gift card, global integration, and magnetic stripe reader communication functionality
US20090159700 *19 Dic 200825 Jun 2009Dynamics Inc.Systems and methods for programmable payment cards and devices with loyalty-based payment applications
US20090159703 *19 Dic 200825 Jun 2009Dynamics Inc.Credit, security, debit cards and the like with buttons
US20090159704 *19 Dic 200825 Jun 2009Dynamics Inc.Cards and devices with magnetic emulators and magnetic read-head detectors
US20090159705 *19 Dic 200825 Jun 2009Dynamics Inc.Payment cards and devices operable to receive point-of-sale actions before point-of-sale and forward actions at point-of-sale
US20090159706 *19 Dic 200825 Jun 2009Dynamics Inc.Payment cards and devices with displays, chips, rfids, magentic emulators, magentic decoders, and other components
US20090159707 *19 Dic 200825 Jun 2009Dynamics Inc.Systems and methods for programmable payment cards and devices with loyalty-based payment applications
US20090159708 *19 Dic 200825 Jun 2009Dynamics Inc.Payment cards and devices with enhanced magnetic emulators
US20090159709 *19 Dic 200825 Jun 2009Dynamics Inc.Advanced dynamic credit cards
US20090159710 *19 Dic 200825 Jun 2009Dynamics Inc.Cards and devices with magnetic emulators and magnetic reader read-head detectors
US20090159711 *19 Dic 200825 Jun 2009Dynamics Inc.Cards and devices with magnetic emulators with zoning control and advanced interiors
US20090159712 *19 Dic 200825 Jun 2009Dynamics Inc.Payment cards and devices with displays, chips, rfids, magnetic emulators, magentic decoders, and other components
US20090159713 *19 Dic 200825 Jun 2009Dynamics Inc.Payment cards and devices with enhanced magnetic emulators
US20090160617 *19 Dic 200825 Jun 2009Dynamics Inc.Credit, security, debit cards and the like with buttons
US20090171845 *24 Oct 20082 Jul 2009Jonathan Robert PowellMethods and systems for cardholder initiated transactions
US20090171849 *3 Nov 20082 Jul 2009Ayman HammadTrack data encryption
US20090198587 *31 Ene 20086 Ago 2009First Data CorporationMethod and system for authenticating customer identities
US20090294526 *26 May 20093 Dic 2009Visa U.S.A. Inc.Testing capability allowing new data tags
US20090308921 *30 Oct 200717 Dic 2009Mullen Jeffrey DDynamic credit card with magnetic stripe and embedded encoder and methods for using the same to provide a copy-proof credit card
US20090327135 *26 Jun 200931 Dic 2009Loc Duc NguyenCredit card paired with location identifiable device for point of service fraud detection
US20090328052 *26 Jun 200931 Dic 2009Loc Duc NguyenResource locator verification method and apparatus
US20100082490 *30 Sep 20081 Abr 2010Apple Inc.Systems and methods for secure wireless transactions
US20100114776 *5 Nov 20096 May 2010Kevin WellerOnline challenge-response
US20100145855 *3 Dic 200910 Jun 2010Fordyce Iii Edward WPayment account processing which conveys non purchase related data exchanges
US20100252623 *10 May 20107 Oct 2010Ayman HammadMethod and system for generating a dynamic verification value
US20100258625 *26 Mar 201014 Oct 2010Intersections Inc.Dynamic Card Verification Values and Credit Transactions
US20100262546 *21 Jun 201014 Oct 2010Jagdeep Singh SahotaPayment service authentication for a transaction using a generated dynamic verification value
US20100274720 *27 Abr 201028 Oct 2010Mark CarlsonFraud and reputation protection using advanced authorization and rules engine
US20100293382 *14 May 201018 Nov 2010Ayman HammadVerification of portable consumer devices
US20100299267 *12 May 201025 Nov 2010Patrick FaithDevice including encrypted data for expiration date and verification value creation
US20100327054 *9 Sep 201030 Dic 2010Ayman HammadSecure communication of payment information to merchants using a verification token
US20110004526 *15 Sep 20106 Ene 2011Ayman HammadPortable consumer device verification system
US20110004553 *16 Sep 20106 Ene 2011Ayman HammadTrack data encryption
US20110066516 *1 Sep 201017 Mar 2011Ayman HammadPortable Consumer Device Configured to Generate Dynamic Authentication Data
US20110099112 *29 Ago 200828 Abr 2011Mages Kenneth GApparatus and method for conducting securing financial transactions
US20110108623 *20 Ene 201112 May 2011Ayman HammadVerification of portable consumer devices
US20110145899 *10 Dic 200916 Jun 2011Verisign, Inc.Single Action Authentication via Mobile Devices
US20110153498 *7 Dic 201023 Jun 2011Oleg MakhotinPayment Channel Returning Limited Use Proxy Dynamic Value
US20110158131 *6 Abr 201030 Jun 2011Foxconn Communication Technology Corp.Meeting information distribution system and method
US20110202463 *26 Abr 201118 Ago 2011Jonathan Robert PowellMethods and systems for cardholder initiated transactions
US20110225089 *1 Mar 201115 Sep 2011Ayman HammadSystem and method including security parameters used for generation of verification value
US20110225090 *1 Mar 201115 Sep 2011Ayman HammadSystem and method including customized linkage rules in payment transactions
US20110225094 *1 Mar 201115 Sep 2011Ayman HammadSystem and method including dynamic verification value
US20120041879 *10 Ago 201016 Feb 2012Paul KimMethods and systems for payment processing between consumers and merchants
US20120072975 *21 Mar 201122 Mar 2012Certicom Corp.Circumstantial Authentication
US20120084208 *6 Dic 20115 Abr 2012Jonathan Robert PowellMethods and system for cardholder initiated transactions
US20120116977 *10 Ene 201210 May 2012Horvath Kris MMethods and apparatus for preventing fraud in payment processing transactions
US20120221466 *28 Feb 201230 Ago 2012Thomas Finley LookMethod for improved financial transactions
US20120221468 *24 Feb 201230 Ago 2012Phil KumnickDirect connection systems and methods
US20120303960 *25 Jul 201229 Nov 2012John WankmuellerSystems and Methods for Mutual Authentication Using One Time Codes
US20130085941 *30 Sep 20114 Abr 2013Apple Inc.Systems and methods for secure wireless financial transactions
US20140032293 *30 Jul 201230 Ene 2014Bank Of America CorporationSequential offer aggregation
US20140067675 *7 Dic 20126 Mar 2014American Express Travel Related Services Company, Inc.Authentication using dynamic codes
US20140114853 *22 Oct 201224 Abr 2014OoneticOnline payment system and method according to the mirror authorization server principle
US20140215218 *27 Ene 201431 Jul 2014Nxp B.V.Security token and service access system
US20140289023 *20 Mar 201425 Sep 2014Cubic CorporationLocal fare processing
US20150161375 *9 Dic 201311 Jun 2015Mastercard International IncorporatedMethods and systems for using transaction data to authenticate a user of a computing device
US20150199682 *16 Ene 201416 Jul 2015Avinash KalgiSystems and methods for merchant mobile acceptance
US20160180330 *23 Dic 201423 Jun 2016Mastercard International IncorporatedMethod and system for recovery of a lost payment card
USD6430639 Jul 20109 Ago 2011Dynamics Inc.Interactive electronic card with display
USD6512379 Jul 201027 Dic 2011Dynamics Inc.Interactive electronic card with display
USD6512389 Jul 201027 Dic 2011Dynamics Inc.Interactive electronic card with display
USD6516449 Jul 20103 Ene 2012Dynamics Inc.Interactive electronic card with display
USD6520752 Jul 201010 Ene 2012Dynamics Inc.Multiple button interactive electronic card
USD6520769 Jul 201010 Ene 2012Dynamics Inc.Multiple button interactive electronic card with display
USD6524482 Jul 201017 Ene 2012Dynamics Inc.Multiple button interactive electronic card
USD6524492 Jul 201017 Ene 2012Dynamics Inc.Multiple button interactive electronic card
USD6524509 Jul 201017 Ene 2012Dynamics Inc.Multiple button interactive electronic card
USD6528672 Jul 201024 Ene 2012Dynamics Inc.Multiple button interactive electronic card
USD6532889 Jul 201031 Ene 2012Dynamics Inc.Multiple button interactive electronic card
USD6650229 Jul 20107 Ago 2012Dynamics Inc.Multiple button interactive electronic card with light source
USD6654479 Jul 201014 Ago 2012Dynamics Inc.Multiple button interactive electronic card with light source and display
USD6662419 Jul 201028 Ago 2012Dynamics Inc.Multiple button interactive electronic card with light source
USD67032912 May 20116 Nov 2012Dynamics Inc.Interactive display card
USD67033012 May 20116 Nov 2012Dynamics Inc.Interactive card
USD67033112 May 20116 Nov 2012Dynamics Inc.Interactive display card
USD67033212 May 20116 Nov 2012Dynamics Inc.Interactive card
USD6707592 Jul 201013 Nov 2012Dynamics Inc.Multiple button interactive electronic card with light sources
USD6723892 Jul 201011 Dic 2012Dynamics Inc.Multiple button interactive electronic card with light sources
USD67360627 Ago 20121 Ene 2013Dynamics Inc.Interactive electronic card with display and buttons
USD6740132 Jul 20108 Ene 2013Dynamics Inc.Multiple button interactive electronic card with light sources
USD67525627 Ago 201229 Ene 2013Dynamics Inc.Interactive electronic card with display and button
USD67648727 Ago 201219 Feb 2013Dynamics Inc.Interactive electronic card with display and buttons
USD67690412 May 201126 Feb 2013Dynamics Inc.Interactive display card
USD6870942 Jul 201030 Jul 2013Dynamics Inc.Multiple button interactive electronic card with light sources
USD68709527 Ago 201230 Jul 2013Dynamics Inc.Interactive electronic card with buttons
USD68748727 Ago 20126 Ago 2013Dynamics Inc.Interactive electronic card with display and button
USD68748827 Ago 20126 Ago 2013Dynamics Inc.Interactive electronic card with buttons
USD68748927 Ago 20126 Ago 2013Dynamics Inc.Interactive electronic card with buttons
USD68749027 Ago 20126 Ago 2013Dynamics Inc.Interactive electronic card with display and button
USD68788727 Ago 201213 Ago 2013Dynamics Inc.Interactive electronic card with buttons
USD68874427 Ago 201227 Ago 2013Dynamics Inc.Interactive electronic card with display and button
USD69205327 Ago 201222 Oct 2013Dynamics Inc.Interactive electronic card with display and button
USD69432227 Ago 201226 Nov 2013Dynamics Inc.Interactive electronic card with display buttons
USD69563627 Ago 201217 Dic 2013Dynamics Inc.Interactive electronic card with display and buttons
USD72986927 Ago 201219 May 2015Dynamics Inc.Interactive electronic card with display and button
USD72987027 Ago 201219 May 2015Dynamics Inc.Interactive electronic card with display and button
USD72987127 Ago 201219 May 2015Dynamics Inc.Interactive electronic card with display and buttons
USD73043827 Ago 201226 May 2015Dynamics Inc.Interactive electronic card with display and button
USD73043927 Ago 201226 May 2015Dynamics Inc.Interactive electronic card with buttons
USD73737310 Sep 201325 Ago 2015Dynamics Inc.Interactive electronic card with contact connector
USD7501664 Mar 201323 Feb 2016Dynamics Inc.Interactive electronic card with display and buttons
USD7501674 Mar 201323 Feb 2016Dynamics Inc.Interactive electronic card with buttons
USD7501684 Mar 201323 Feb 2016Dynamics Inc.Interactive electronic card with display and button
USD7516394 Mar 201315 Mar 2016Dynamics Inc.Interactive electronic card with display and button
USD7516404 Mar 201315 Mar 2016Dynamics Inc.Interactive electronic card with display and button
USD7645844 Mar 201323 Ago 2016Dynamics Inc.Interactive electronic card with buttons
USD7651734 Mar 201330 Ago 2016Dynamics Inc.Interactive electronic card with display and button
USD7651744 Mar 201330 Ago 2016Dynamics Inc.Interactive electronic card with button
USD76702410 Sep 201320 Sep 2016Dynamics Inc.Interactive electronic card with contact connector
USD7772524 Mar 201324 Ene 2017Dynamics Inc.Interactive electronic card with buttons
USD7925119 Jul 201018 Jul 2017Dynamics Inc.Display with font
USD7925129 Jul 201018 Jul 2017Dynamics Inc.Display with font
USD7925139 Jul 201018 Jul 2017Dynamics Inc.Display with font
EP2401711A4 *25 Feb 201028 Dic 2016Miri Systems LlcPayment system and method
WO2009146304A1 *26 May 20093 Dic 2009Visa U.S.A. Inc.Testing capability allowing new data tags
WO2010099352A125 Feb 20102 Sep 2010Miri Systems, LlcPayment system and method
WO2013109470A1 *11 Ene 201325 Jul 2013Mastercard International IncorporatedMethod and system for online authentication using a credit/debit card processing system
Clasificaciones
Clasificación de EE.UU.705/44
Clasificación internacionalG06Q40/00
Clasificación cooperativaG06Q20/3829, G06Q2220/00, G06Q20/20, G06Q20/3674, G06Q20/3821, G06Q20/385, G06Q20/40, H04L2209/56, G06Q20/085, G06Q30/06, G06Q20/401, G06Q20/382, G06Q20/204, H04L9/3271, G06Q40/00, G06Q20/3672, G06Q20/367, G06Q20/105
Clasificación europeaH04L9/32, G06Q20/20, G06Q30/06, G06Q20/40, G06Q20/385, G06Q20/401, G06Q20/382, G06Q20/105, G06Q20/3674, G06Q20/367, G06Q20/3821, G06Q20/085, G06Q20/3829, G06Q20/204, G06Q20/3672, G06Q40/00
Eventos legales
FechaCódigoEventoDescripción
1 Nov 2007ASAssignment
Owner name: VISA U.S.A. INC., CALIFORNIA
Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:HAMMAD, AYMAN;FAITH, PATRICK;CARLSON, MARK;REEL/FRAME:020058/0467;SIGNING DATES FROM 20071018 TO 20071019