US20040083184A1 - Anonymous card transactions - Google Patents
Anonymous card transactions Download PDFInfo
- Publication number
- US20040083184A1 US20040083184A1 US10/248,345 US24834503A US2004083184A1 US 20040083184 A1 US20040083184 A1 US 20040083184A1 US 24834503 A US24834503 A US 24834503A US 2004083184 A1 US2004083184 A1 US 2004083184A1
- Authority
- US
- United States
- Prior art keywords
- account
- alias
- credit card
- credit
- database
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Abandoned
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/385—Payment protocols; Details thereof using an alias or single-use codes
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
- G06Q10/08—Logistics, e.g. warehousing, loading or distribution; Inventory or stock management
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/02—Payment architectures, schemes or protocols involving a neutral party, e.g. certification authority, notary or trusted third party [TTP]
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/04—Payment circuits
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/08—Payment architectures
- G06Q20/12—Payment architectures specially adapted for electronic shopping systems
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/22—Payment schemes or models
- G06Q20/24—Credit schemes, i.e. "pay after"
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/30—Payment architectures, schemes or protocols characterised by the use of specific devices or networks
- G06Q20/34—Payment architectures, schemes or protocols characterised by the use of specific devices or networks using cards, e.g. integrated circuit [IC] cards or magnetic cards
- G06Q20/342—Cards defining paid or billed services or quantities
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/383—Anonymous user system
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/40—Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
- G06Q20/403—Solvency checks
- G06Q20/4037—Remote solvency checks
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q30/00—Commerce
- G06Q30/06—Buying, selling or leasing transactions
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07F—COIN-FREED OR LIKE APPARATUS
- G07F7/00—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus
- G07F7/02—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by keys or other credit registering devices
- G07F7/025—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by keys or other credit registering devices by means, e.g. cards, providing billing information at the time of purchase, e.g. identification of seller or purchaser, quantity of goods delivered or to be delivered
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07F—COIN-FREED OR LIKE APPARATUS
- G07F7/00—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus
- G07F7/08—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means
Definitions
- the field of the invention relates to systems and methods for facilitating, providing, and/or enabling anonymous transactions.
- the field of the invention relates to anonymous authentication of customer profile information to an authorized requester, including authentication of customer profile information related to children, and to consumer privacy protection when ordering merchandise by mail by not having to reveal consumer personal information to the merchant and/or shipper.
- an issuer bank's computer system can store the merchant's name, the product purchased, and the amount of the transaction.
- the issuer bank or credit card company can use the collected information to determine the spending habits of their credit cardholders and then either use that information in its own business or make it available to others.
- the individual merchants receive information from the issuer bank about the credit cardholder. This information can be used to provide targeted marketing directed to the credit cardholder, or to provide others with information about the consumer's buying habits.
- an issuer bank may choose to sell its customer list, with indicia that identifies all credit cardholders that have purchased sporting equipment, to retail sporting good companies. These companies may then inundate a credit cardholder with mail or other forms of advertisements.
- the issuer bank may sell its list of customers that have purchased certain goods (for example, furs or steaks) to activist groups that oppose the purchase of such items. These groups may then use the customer list to expose the credit cardholder to all sorts of harassment and perhaps physical injury.
- consumer information also may be gathered when shipping information is provided to a merchant or other third party. It is therefore also desirable to protect the identify of consumers when ordering merchandise over the telephone or the Internet, or by any other means, when such merchandise is to be shipped to the residence or business of the consumer.
- the consumer generally has no choice but to give a proper mailing address to the merchant in order to receive the shipped goods.
- One solution to this problem is to use post office boxes. However, this solution is often expensive, inconvenient and/or requires the use of the consumer's real name.
- the present invention comprises systems and methods for protecting consumer information by providing for, facilitating, and/or enabling anonymous transactions.
- a service provider or merchant representing an information requester is able to authenticate customer related information and/or records which reside in a secure, offline database without the true identity of a customer being revealed.
- the present invention provides an automated, inexpensive system and method for the confirmed request, processing and confirmed transfer of anonymous customer or subscriber related authentication among service providers and/or information requesters.
- These systems and methods preferably utilize a software and hardware system to facilitate centralized offline customer identity and business information authentication, while maintaining the anonymity of the customer. This advantageously allows a service provider or information requester to easily and inexpensively authenticate customer related business information without the true identity of the customer being revealed to the service provider.
- a benefit of these systems and methods is that the actual transaction is not associated with the true identity or demographics of the customer.
- Another benefit of these systems and methods is that a highly efficient system and method is provided for requesting, processing, and anonymously authenticating customer or subscriber related identification and business information between the service provider or information requester and the secure, central database repository.
- this comprises an information hub which includes an interactive server and a database.
- the database contains a lookup table which blinds the database from the server.
- the coded or addressed anonymous customer identification confirmation or authentication system of the present invention employs an offline central consumer information database or repository, in communication with service providers or information requesters.
- These systems and methods also provide for the processing and authentication of requested, specifically identified customer profiles, without identifying the true identity of the customer, and without revealing any business or transaction information to the service provider or information requester. In a preferred embodiment, the authenticity of the information requester is verified prior to responding.
- one feature of these systems and methods is that there is a blinding or “bunkering” of any attempt by unauthorized information requesters to cross check against a known transaction to match the alias of the customer or subscriber with the true identity of the customer or subscriber.
- a service provider or information requester having a system authorization code can electronically request, process and confirm the validity of an anonymous customer's information and/or records. This can be done, for example, from a secure data repository by means of a hardware/software system.
- the hardware/software system is comprised of an offline database and a central server comprising an information processing hub.
- the information processing hub communicates with each service provider or information requester via a communication link.
- a feature of these systems and methods is that a confirmed authentication of uniquely identified and stored information between an authorized requester and the database repository is triggered by the use of a unique, assigned alias identifier.
- the requested subscriber or customer records and/or business information are uniquely identified by means of an alias identification of the customer, which can be alphanumeric, digital, analog or the like.
- the system can authenticate the existence of the customer alias as relating to the true identity of an individual subscriber.
- authenticated coded triggers are used to release a predetermined portion of the data including, for example, the true identity of the subscriber, to an information requester having authorization for that clearance.
- the information is encrypted.
- an alphanumeric code is used to identify files within the uniquely addressed customer information profiles.
- the system of the present invention confirms requests for authentication to maintain the integrity of the system and the anonymity of the subscriber or customer.
- the authentication is protected by encryption and a digital signature of the information requester or by use of an authentication code such as a PIN or the like.
- personal or business records and/or information related to a particular subscriber maintained within the offline database can include at least part of at least one subscriber's profile.
- subscriber profiles consist of the subscriber's physical address, social security number, credit limits, email address, and the like.
- a single centralized offline database or repository is provided in communication with a central processing server.
- the central processing server acts as a “gatekeeper” to maintain the secrecy of the customer's true identity.
- a plurality of servers communicate with the service providers and in turn with a central server in a multi tiered system.
- a computer implemented method for providing authentication to an authorized information requester.
- the information requester may b provided with authentication of the existence of coded, uniquely identified personal business type records and/or information relating to a particular anonymous subscriber or customer.
- the records or information are contained in a “blinded” offline database that communicates with each authorized information requester by means of a central processing server.
- the method may be accomplished by the subscriber information requester initially generating an authorized formatted request for authentication of the uniquely identified records and/or information related to a particular anonymous subscriber or customer using an alias that retains the anonymity of the subscriber or customer.
- the method also includes transmitting the request to a confirming central processing server with access to an offline database via the communication link. Additionally, the method includes receiving the formatted request, authenticating the authorization of the information requester and confirming receipt of the formatted request by the central system database. The method also includes processing the request of the subscriber or information requester by blinded communication with the database, generating a formatted response in the database authenticating the alias or denying the alias, transmitting the response, and formatting a server response to the service provider or information requester via the communication link.
- the formatted response to the subscriber or information requester can comprise a denial of the request, an authentication or an authenticated informational compliance. Additionally, the informational compliance can be full or partial.
- the requester is logged into the central server. For example, if the information requester is not authorized to address the offline database, the identification of the customer or subscriber is blocked and the information requester is denied further communication. In this example, such a formatted response is a denial of authentication.
- a medium which contains a unique identification that is either anonymous or an alias with respect to the true identity of the subscriber and/or customer.
- the medium can be in the form of a standard plastic card with a magnetic strip containing the encoded information or alias information, or it can be in the form of a smart card that has an encoded chip.
- the medium can be a credit card issued by, for example, American Express, VISA or MasterCard.
- a personal identification number can be used such that the user of the medium would be required to enter a PIN on a keypad or the like, to authenticate the anonymous code.
- PIN personal identification number
- the service provider authenticates the transaction by means of an electronic connection such as telephone wires or the Internet to one or more centrally based processing servers in communication with the offline database as previously described.
- a credit or debit card that makes limited purchasing power available to children is provided (herein referred to as a “Kid Card”).
- the transactions performed with the Kid Card are anonymous.
- a child that purchases an item over the Internet, for example, can use the Kid Card to pay for the item.
- an alias set of information is used. This alias set of information is compared to an offline secure database that compares the alias information to the true identity data and authenticates the transaction.
- the true identity of the purchaser is thus never compromised and therefore never available to the processing company for inclusion on a demographic list or the like.
- the products available for purchase with the Kid Card are subject to parental control and children are guided by a hosting entity through an Internet shopping experience by presentation of selected Web pages.
- Other systems and methods of the present invention are specifically directed to protecting the identity of a credit cardholder, whereby the cardholder can enter into credit card transactions in complete anonymity. Since the cardholder's identity is protected, the cardholder has the freedom to purchase any goods or services without worrying about receiving unwanted mailings or being personally harassed.
- these systems and methods allow the establishment of two credit cards with a line of credit that is split across two accounts, i.e., a primary account and an alias account.
- the primary account is a conventional credit card account constructed in a credit card processing system using the factual information provided by an applicant for a credit card.
- the primary account is the account used for reporting and investigating the applicant's credit worthiness and establishing credit.
- the alias account is constructed using security information submitted by the credit card applicant, and information from an associated primary account.
- the alias account is constructed in a secure database and is identified with an alias name and address.
- the secure database is preferably maintained in a secure facility or vault operated by an independent third party, for example a privacy foundation that is not beholden to credit card companies or to merchants.
- the vault maintains the identity of the alias account holders; the identities are not disclosed to others except under certain limited conditions.
- the vault then transfers the alias account information to the credit card processing system, and the credit card processing system creates a corresponding alias account.
- the credit card associated with the primary account is used and processed like any other credit card.
- the credit line for the primary account is established as some portion of the credit line approved during the application process. A remaining portion is assigned to the alias account.
- the credit card associated with the alias account is also used like any other credit card, but a number of the credit card processing functions are handled in a different manner from other credit card accounts.
- the credit card transactions associated with the alias account are processed on the credit card processing system with the alias information (i.e., alias name and address). Therefore, the anonymity of the cardholder is maintained.
- alias information i.e., alias name and address
- alias information i.e., alias name and address
- a means for consumers to order merchandise via telephone, the Internet, or any other means, to be shipped to their business or residence, without having to reveal their true address to the shipper and/or merchant.
- This is accomplished by relabeling the packages with the true address of the consumer sometime after the packages are shipped by the merchant.
- This is preferably, but not necessarily, accomplished in conjunction with anyone of the anonymous transaction systems and methods set forth above using one of at least two techniques.
- the first technique involves shipping the packages to a temporary location where the true address is relabeled on behalf of the consumer using information from the offline database.
- the second technique involves having the shipping company relabel the packages while in transit by communicating through a secure network connection to the offline database.
- the offline database returns the true address to the shipper.
- this process is automated and is implemented using wireless technology while the package is in transit.
- other systems and methods of the present invention include a private facility for mailings of packages and items, wherein these packages and items are shipped to a temporary location where the true address is relabeled on behalf of the consumer.
- the relabeling is preferably, but not necessarily, accomplished in conjunction with anyone of the anonymous transaction systems and methods set forth above using one of at least two techniques using information from the offline database.
- the private facility administers the database, registers the customers, and assigns the mail codes to the registered customers before this anonymous mailing and relabeling service is started.
- the shipping company preregisters with the private facility that administers the database and receives access to a secure network connection with the offline database.
- the shipping company in possession of a package labeled with a mailing code sends a valid authorization request, including the mailing code, to the offline database through the secure network connection.
- the private facility verifies the authorization request and returns the true address of the customer to the shipping company, thus enabling the shipping company to deliver the package directly to the customer.
- this process is automated and is implemented using wireless technology while the package is in transit.
- the present invention provides a means for a person or entity to receive mail or parcels from a sender (e.g., a merchant) anonymously.
- a sender e.g., a merchant
- the sending may, but need not be, in connection with a commercial transaction (e.g., a sale or purchase) or involve the shipping of ordered goods as described above.
- a commercial transaction e.g., a sale or purchase
- the item can be shipped to their business or residence, without having to reveal their true address to the shipper and/or merchant.
- the mail or parcel is shipped to a mailing code and relabeled with the true address of the consumer sometime after shipment by the sender.
- this is preferably accomplished in combination with the anonymous transaction systems and methods set forth above.
- the mailing code assigned can include limited non identifying information.
- the code may be formatted similarly to a zip code, in that the code or a portion of the code corresponds to a geographic area or political subdivision.
- the code may correspond to a postal zip code area or group of zip code areas, a city, a county, a state, or other suitable area.
- the readdressing may be physical or electronic, or a combination of the two.
- the readdressing may be by affixing or otherwise physically associating, a legible address with or without name, by affixing or otherwise physically associating a machine readable form of the address, e.g., a bar coded or magnetic strip address, by affixing or otherwise physically associating a translatable, machine readable address (e.g., that is translated within a special or general purpose computer), by affixing or otherwise physically associating an access identifier enabling electronic access to sufficient identifying information (preferably on screen or other display) for delivery to the customer or other intended recipient, or by using the mailing code to allow (preferably with additional authorization code) remote electronic access to specific delivery information, preferably during the course of a delivery run.
- delivery information may be displayed on a computer in a delivery truck or on a handheld computer.
- Remote access may be by any suitable means, e.g., by telephone (preferably mobile telephone) and/or via satellite communications link, which may involve internet transmission.
- FIG. 1 is an example of a schematic view of an information flow model that can be used in accordance with one embodiment of the present invention.
- FIG. 2 is an example of a schematic view of an information flow model that can be used with one embodiment of the present invention having a central processing server and an offline database.
- FIG. 3 is a block diagram illustrating an exemplary account setup in the alias account system of the present invention.
- FIG. 4 is a block diagram illustrating a typical credit card transaction using the credit cards of the present invention.
- FIG. 5 is a block diagram illustrating an upgrade of an existing account to an alias and primary account, in accordance with the present invention.
- FIG. 6 is a general block diagram illustrating an embodiment of the alias account management process of the present invention.
- FIG. 7 is a timing diagram illustrating an example of an issuer's credit exposure when a credit limit increase is processed using the account management process of FIG. 6.
- FIG. 8 is a block diagram illustrating a process for performing non mon updates, such as name and address changes, in the alias account system of the present invention.
- FIG. 9 is a block diagram illustrating the account closing process in the alias account system of the present invention.
- FIG. 10 is a block diagram illustrating an overview of the statement printing process of an embodiment of the present invention.
- FIG. 11 is a general block diagram illustrating an embodiment of the alias statement process.
- FIG. 12 is a block diagram illustrating the databases employed in the vault and their associated relationships.
- FIG. 13 is a table setting forth fields contained in a Matching Database in a preferred embodiment of the present invention.
- FIG. 14 is a table setting forth fields contained in a Temporary Database in a preferred embodiment of the present invention.
- FIG. 15 is a table setting forth fields contained in an Account Block Database in a preferred embodiment of the present invention.
- FIG. 16 is a table setting forth fields contained in an Issuer Database in a preferred embodiment of the present invention.
- FIG. 17 is a table setting forth fields contained in a Mail Redirection Database in a preferred embodiment of the present invention.
- FIG. 18 is a flow diagram illustrating an overview of the host and vault process flow in an embodiment of the present invention.
- FIG. 19 is a flow diagram illustrating the account acquisition process of an embodiment of the present invention.
- FIG. 20 is a flow diagram illustrating the account maintenance process in an embodiment of the present invention.
- FIG. 21 is a flow diagram illustrating the collections process in an embodiment of the present invention.
- FIG. 22 is a flow diagram illustrating the mail redirection process in an embodiment of the present invention.
- FIG. 23 is a schematic diagram that depicts one embodiment of the disguised mailing feature in accordance with one embodiment of the present invention.
- FIG. 24 is a flowchart depicting methods that can be used to implement the disguised mailing feature in accordance with an embodiment of the present invention.
- FIG. 25 is a flowchart depicting methods that can be used to implement the disguised mailing feature in accordance with an embodiment of the present invention.
- FIG. 26 illustrates information flow during package delivery using the private anonymous mailing service of the present invention.
- FIG. 27 is a flowchart of the customer registration process used in the private anonymous mailing service of the present invention.
- FIG. 28 is a flowchart of the merchandise shipment process in accordance with the private anonymous mailing service of the present invention.
- a “Subscriber” is an entity who subscribes to a transaction based service and whose data is in the offline database.
- a “Service Provider or Information Requester” is an entity with which the particular Subscriber is consummating a transaction.
- Service Providers could be, for example, local retailers, banks, travel agencies and the like.
- Subscriber ID is an alias system identifier that can be used as an alias or a code to uniquely identify a particular Subscriber and corresponding records.
- Subscriber Profile or “Service Profile” means customer related business information and/or records such as a particular Subscriber's financial information, or address.
- Subscriber Related Business Information Request is a request from a Service Provider for authentication of all or part of a particular Subscriber Profile or Service Profile.
- the Profile preferably contains readable system code allowing the system to verify that the requester is part of the system.
- a “Subscriber Related Business Information Request Response” is a response to a Subscriber Related Business Information Request.
- the Response could be a listing of all or part of a particular Service Profile, an authentication of a Subscriber's identity, or a denial of such information.
- the Response is encrypted.
- a Subscriber Related Business Information Request Response can also include a “Transaction Authorization” or “Confirmation Request” such as used in the credit card industry.
- an information hub housing a central server receives a request for authentication from a service provider or information requester.
- the central server verifies that the service provider or information requester is authorized to obtain authentication for the transaction or the requested information from the database.
- the central server queries database for authentication of the anonymous customer.
- the database contains, for example, a lookup table that links the anonymous identification of the medium card holder, for example, a credit card holder, to the true identity of the card holder.
- the lookup table functions a barrier between the system traffic and the stored identity information. Continuing with the example, if the information requested matches the search in the lookup table, a verification response is generated by the central server to authenticate the transaction.
- FIG. 1 there is shown a schematic of a preferred embodiment of the alias method and system 20 of the instant invention.
- This preferred embodiment comprises a number of Service Providers or Information Requesters 21 , each communicating with a system server/database 22 by means of a preexisting communication link 23 , such as the public telephone system.
- a Subscriber Profile data and/or authentication is relayed to a requesting Service Provider 21 through the system server/database 22 , in computer accessible code, via the communications link 23 .
- the information flow is virtually instantaneous, and the response information puts the necessary information in the hands of the Service Provider or Information Requester 21 .
- This information is preferably delivered in a usable form, expediting the transaction.
- the system server/database 22 represents a centralized information hub having a preexisting communication link 23 for the purposes of receiving, authenticating and transmitting information to Service Providers 21 .
- the central information hub comprises more than one physical element.
- a multi tiered server system (not shown) may be practical in some applications.
- a public communications system is not necessary to link the system server database 22 to the Service Providers 21 .
- the communications link 23 may alternatively be a private leased line, a local area network, cable TV network, or the Internet.
- the system server/database 22 comprises a server and an offline database as more fully described below in relation to FIG. 2.
- FIG. 2 there is shown an example of a preferred information flow of the alias method and system 20 .
- the transfer of a Subscriber's authentication or Subscriber Profile information between the Service Provider or Information Requester and the offline centralized database is shown.
- the system server is accessible to all Service Providers 21 .
- the Service Providers 21 can access the System Server 22 by merely addressing the alias customer information profile by means of the Service Provider's identification through the communication link.
- the system 20 comprises an authorized Service Provider 24 , a System Server 26 , an offline database 28 , and an interconnecting communications link 30 .
- the communications link 30 connects the Service Provider and database 28 with the server 26 . Preferably, all communication takes place over communications link 30 .
- the process boxes or units in FIG. 2 represent execution steps for creating, transferring and confirming information between Service Provider 24 , server 26 , and offline database 28 , all of which is described now in greater detail.
- FIG. 2 Data Flow: Generation of Request for Subscriber Authentication or Information
- Service Provider or Information Requester 24 by means of unit process 33 , generates a Subscriber Related Business Information Request 32 .
- the request is generated in a specified format and includes an informational header.
- This header includes, for example, the Subscriber's alias, PIN or other anonymous inquiry keys and information. Additionally, the header may include address information and a formatted message portion comprised of, for example, the date, time, and amount of the transaction.
- the data used to generate the Subscriber Related Business Information Request 32 can be provided in more than one way.
- a first example of a method for creating the Subscriber Related Business Information Request 32 is by using an application Graphical User Interface, preferably written in Java.
- the Graphical User Interface provides the user with input fields for all elements of the Subscriber Related Business Information Request 32 , including input fields for the Service Provider 24 . Additionally, the Graphical User Interface can perform input validations, convert the input data into a binary stream using Java serialization, and store the document. For example, the document can be stored in binary object form in the Service Provider or Information Requester's 24 relational database AA second example of a method for creating the Subscriber Related Business Information Request 32 is through the use of the Client Integration Subsystem. In a preferred embodiment, the Client Integration Subsystem is a configurable set of services and infrastructure.
- Subscriber Related Business Information Request 32 can be written, for example, in the C++ and Java programming languages, which allow an organization to “plug in” their existing systems to automatically generate a Subscriber Related Business Information Request 32 in accordance with the present invention.
- This is the coded information in a credit card transaction that authorizes a merchant's request and identifies the return path I
- the resulting document is stored in the Service Provider or Information Requester's 24 relational database coupled with additional document information.
- additional document information could include date and time stamps, document state information, creating user identification, and the like.
- this information could be linked to a particular Subscriber Related Business Information Request 32 and simultaneously stored along with the Subscriber Related Business Information Request 32 .
- the date and time stamps are used to determine whether the request is sent and received within the industry allotted time period. This, for example, would prevent hacking through the use of different requester locations attempting to obtain client Subscriber Related Business Information in the offline database 28 .
- the user identification information is preferably used by the System Server 26 and the offline database 28 to help verify the validity of the Subscriber Related Business Information Request 32 . This can be done, for example, by determining that the Subscriber Related Business Information Request 32 was sent by an authorized Service Provider or information Requester 24 I In this example, when the Subscriber Related Business Information Request 32 is completed by entering the necessary data, it is marked as ready to be sent.
- the Subscriber Related Business Information Request 32 is not completed, for example, due to missing data, it is marked for review and stored until the Subscriber Related Business Information Request 32 data is entered into the Subscriber Related Business Information Request 32 .
- this prevents overriding the system by not having a complete request. This is important, for example, when service information provider or information requesters 24 are given security codes allowing access to differing information and/or levels of information.
- FIG. 2 Data Flow: Send Subscriber Business Information Request from Service Provider or Information Requester to the System Server
- the Subscriber Related Business Information Request 32 is prepared to be sent to the System Server 26 by means of unit process 34 via communications link 30 .
- An example of the aspects of unit process 34 include application of the digital signature, data encryption, alias and attaching the routing information.
- the Subscriber Related Business Information Request 32 carrying the alias identifier is encrypted by an encrypting service.
- the encrypting service utilizes Pretty Good Privacy encryption with the System Server's 26 public key.
- an online service can be used or alternatively, the software can be downloaded from www.MIT.edu for inclusion in process 34 .
- the document is digitally signed using the Service Provider's 24 private key.
- this private key has been previously configured by the system administrator.
- the Subscriber Related Business Information Request 32 is sent to the server 26 using communication link 30 .
- Various systems can be used to connect the Service Provider or Information Requester 24 to the System Server 26 .
- the message can be sent either via X400 protocol or using a virtual private network protocol.
- the choice is based on the configuration implemented by the generating entity's system administrator, based on system requirements for response times and cost of implementation.
- the data is sent over an existing communication system such as the Internet or a Virtual Private Network.
- a lookup of the System Server 26 destination address in the Service Provider or Information Requester's 24 database is performed.
- the process 34 appends the appropriate routing information for the transmission type used by the generating entity system.
- a fully qualified Internet address is an example of appropriate routing information.
- FIG. 2 Data Flow: Receipt of Subscriber Related Business Information Request by System Server
- the Subscriber Related Business Information Request 32 is received by Server 26 from Service Provider or Information Requester 24 . This is accomplished by means of unit process 36 via communications link 30 .
- the system is activated by data being received.
- unit process 36 includes steps for receiving the message, authenticating the signature on the message and responding to the sender if the signature is valid. For example, upon receipt of a Subscriber Related Business Information Request 32 , the server 26 first logs the receipt and then authenticates the digital signature. Within process 36 an interim file representation of the document is created, after extracting the document from the transport mechanism and stripping off header information. The file is then stored in a system defined, file system directory.
- the document digital signature is verified using the Pretty Good Privacy signature authentication service based on the sender's public key, which is retrieved via the previously configured information in the Pretty Good Privacy security database.
- the Subscriber Related Business Information Request 32 is decrypted using the Pretty Good Privacy decryption software and stored.
- a verification of receipt message 38 (shown in dotted lines) is sent back to Service Provider or Information Requester 24 via the communication link 30 .
- the Service Provider or Information Requester 24 verifies the sender as the System Server 26 .
- the validity of the Subscriber Related Business Information Request 32 is based on several criteria.
- the Request 32 is not honored.
- the invalid Request 32 is first returned to the Service Provider or Information Requester 24 via the Communications Link 30 . Then, a message is sent noting the receipt of an invalid Subscriber Related Business Information Request 32 . Furthermore, receipt of the invalid Subscriber Related Business Information Request 32 is logged by the System Server 26 .
- the address of the invalid Service Provider or Information Requester 24 thereafter is blocked from the system 20 and the information pertaining to the unauthorized Service Provider or Requester 24 is maintained in the system 20 for future reference.
- FIG. 2 Data Flow: Processing of the Subscriber Business Information Request for Subscriber by System Server
- Valid Subscriber Related Business Information Requests 32 received by the Server 26 , are processed in accordance with unit process 41 .
- the processing includes decrypting the message and preparing the message for forwarding to the offline database 28 .
- a message header is appended to the message and a document timer is activated to track the time until the System Server 26 receives a request response from the offline database 28 .
- the System Server 26 preferably records receipt of the Subscriber Related Business Information Request 32 into the System Server's 26 relational database.
- the Subscriber Related Business Information Request 32 is marked as received by the System Server 26 .
- the Server 26 can also be configured to execute certain user defined operations which are triggered during this processing depending upon the nature of the Subscriber Related Business Information Request 32 as further described below. For example, if the request is a credit card transaction, certain information may be forwarded to the issuing bank after database manipulation as further described below.
- the document file is read in by the Server's 26 document handler, decrypted, and the document is then stored in the Server 26 .
- a document handler rules engine is used to process the document in accordance with unit process 41 .
- a rules agenda is created based on the contents of the document.
- the rules engine matches patterns in the rules conditions with the document and executes actions associated with the conditions. Examples of actions include updating database tables, modifying/transforming the document header information, and adding additional/alternative document routing instructions.
- a timer is activated by storing a new record with Subscriber Related Business Information Request 32 information in the timer table.
- FIG. 2 Data Flow: Send the Subscriber Business Request for Subscriber Profile from the System Server to the Database
- Subscriber Related Business Information Requests 32 are forwarded to offline database 28 by means of unit process 43 via communication link 30 .
- An example embodiment of unit process 43 includes the steps of encrypting the message, digitally signing the message, and sending the message to the offline database 28 .
- the functions required to prepare a document for forwarding are based on the type of Service Provider 24 from which the Subscriber Related Business information Request 32 is received.
- Offline database 28 has authority and access to the data required to respond to the Subscriber Related Business Information Requests 32 , i.e., create a Subscriber Related Business Information Request Response.
- FIG. 2 Data Flow: Receipt of the Subscriber Business Information Request for Subscriber Information from System Server by Offline Database
- the offline database 28 receives, logs, and authenticates the Subscriber Related Business Information Request 32 .
- the offline database 28 receives the message, the signature on the message is authenticated and a response is sent to the System Server 26 if the signature is valid. In this manner only the Server 26 can access the offline database 28 .
- unit process 44 creates an interim file representation of the document after extracting the document from the transport mechanism and stripping off header information.
- the priority code is interpreted so that the appropriate information from the lookup table can be retrieved.
- the Subscriber Related Business information Request 32 is stored and the appropriate customer related information is coupled with the document header.
- the file is stored in a system defined file system directory.
- the digital signature is verified using the Pretty Good Privacy signature authentication service based on the sender's public key, which is retrieved via previously configured information in the Pretty Good Privacy security database. If the signature is authentic, the document is decrypted using the Pretty Good Privacy decryption software based on the Server's 26 private key data. Once the document is decrypted, the header information is separated from the Subscriber Related Business Information Request 32 and the Subscriber Related Business Information Request document 32 is stored. A message 38 (shown in phantom) acknowledging the receipt of the Subscriber Related Business Information Request 32 is then sent by the offline database 28 to the Server 26 via communications link 30 . Preferably, Erroneous Subscriber Related Business Information Request 32 receipts are logged and the Server 26 is notified via message 38 . In this manner only requests from Server 26 are accepted for processing.
- FIG. 2 Data Flow: Processing of the Subscriber Business information Request for Subscriber Information and Generation of Response by Offline Database
- the Subscriber Related Business Information Request 32 is processed as set out above in unit process 44 by offline database 28 , it is processed in accordance with unit process 46 .
- An example of the method steps within unit process 46 includes: the Subscriber Related Business Information Request 32 is decrypted, the document is stored into the offline database 28 and the Subscriber Related Business Information Request Response 47 is created.
- the offline database 28 formats the data into a document message and the offline database 28 appends reader information such as routing and document type to the message.
- the subscriber Related Business Information Request 32 is stored in the offline database 28 .
- the Offline Database 28 responds.
- the Offline Database 28 sends a Subscriber Related Business Information Request Response 47 back to the Service Provider or Information Requester 24 through the System Server 26 via communications link 30 .
- the Subscriber Related Business Information Request Response 47 is generated in accordance with unit process 46 .
- the Subscriber Related Business Information Request Response 47 is prepared using an application Graphical User Interface preferably written in Java.
- the Graphical User Interface preferably provides the user with input fields for all elements of the Subscriber Related Business Information Request Response 47 , including input fields for the Service Provider or Information Requester 24 .
- the Graphical User Interface performs input validations, converts the input data into a binary stream using Java serialization, and stores the document in binary object forth into the offline database's 28 relational database.
- the document is stored into the offline database's 28 relational database.
- the document may be stored with additional document information such as date and time stamps, document state information, creating user identification and the like which are linked to a particular Subscriber Related Business Information Request Response 47 .
- the document state information is used by the system to determine whether the Subscriber Related Business Information Request Response 47 is ready to be transferred to the System Server 26 .
- the user identification information is used by the System Server 26 to help verify the validity of the Subscriber Related Business Information Request Response 47 by determining that the Subscriber Related Business Information Request Response 47 was sent by offline database 28 or an entity having access to the subscriber information and authority to disseminate authentication or information.
- the Subscriber Related Business Information Request Response 47 is completed by entering the necessary data, it is marked as ready to be sent.
- the Subscriber Related Business Information Request Response 47 is not completed due to missing data, it is marked for review and stored until the Subscriber Related Business Information Request Response 47 data is entered into the Subscriber Related Business Information Request Response 47 . If appropriate, a message is sent to the Server 26 requesting additional information be placed in the database 28 to fill the request.
- FIG. 2 Data Flow: Send the Response to the Request for Subscriber Information to System Server from Offline Database
- Subscriber Related Business Information Requests Response 47 After Subscriber Related Business Information Requests Response 47 , has been processed, it is forwarded to System Server 26 by means of unit process 48 via communication link 30 .
- Subscriber Related Business Information Requests Response 47 is encrypted, digitally signed, and sent to the Server 26 .
- the Subscriber Related Business Information Request Response 47 is preferably stored in the relational database coupled with additional information such as date and time stamps, and user identification.
- FIG. 2 Data Flow: Receipt of the Response to the Subscriber Information Request by System Server from Offline Database
- the Subscriber Related Business Information Request Response 47 is by the System Server 26 , it is handled in accordance with unit process 50 .
- the System Server 26 receives the Subscriber Related Business Information Requests Response 47 , the signature on the Subscriber Related Business Information Requests Response 47 is authenticated, and a response 38 is sent to the offline database 28 if the signature is valid.
- the Subscriber Related Business Information Request Response 47 is acknowledged by message 38 to the offline database 28 via link 30 and its receipt is logged.
- the Subscriber Related Business Information Request Response 47 then is processed by Server 26 .
- An example of this processing includes authentication of the Subscriber Related Business Information Request Response 47 and validation of the intended Service Provider 24 address. Additionally, the receipt event is logged.
- the document is decrypted as above described and checked against existing Subscriber Related Business Request 32 for a match.
- Subscriber Related Business Information Request Response 47 match errors and destination errors are logged and notifications sent back to the offline database 28 .
- the respective unit process 50 creates an interim file representation of the document after extracting the document from the transport mechanism and stripping off header information.
- the file is stored in a system defined file system directory, which preferably is a persistent storage mechanism.
- FIG. 2 Data Flow: Processing the Response to the Subscriber Information Request by System Server
- Subscriber Related Business Information Request Response 47 response is received by Server 26 , it is processed as shown by unit process 52 .
- processing includes storing the document, logging its receipt and managing the timers associated with the original request. For example, within unit process 52 , an ID is matched against the initial request sent, the message is stored into the System Server 26 database, the document timer is deactivated, the Subscriber Related Business Information Requests Response 47 is prepared for forwarding to the requesting Service Provider 24 and a message header for sending Subscriber Related Business Information Requests Response 47 to the requesting Service Provider 24 is appended.
- the Subscriber Related Business Information Request Response 47 receipt is logged and the document state is set to “complete.” Such a setting indicates that the Subscriber Related Business Information Request Response 47 is ready, for example, to be encrypted, signed, and forwarded to the Service Provider or Information Requester 24 , as represented by unit process 54 .
- the document file is read in by the Server's 26 document handler process and the document is then stored in the Server 26 .
- the Document Handler Rules Engine is then activated to process the document. For example, a rules agenda is created based on the contents of the document. The rules engine matches patterns in the rules conditions with the document and executes actions associated with the conditions.
- the rules match the Subscriber Related Business Information Request Response 47 by document identifier information with the Subscriber Related Business Information Request 32 .
- the system timer that was created when the document was originally received by the server 24 is deleted from the server timer table. Subsequently, in this example, the destination for the Subscriber Related Business Information Request Response 47 is validated and any erroneous Subscriber Related Business Information Request Responses 47 are logged.
- the Document Handler process modifies the Subscriber Related Business Information Request Response 47 header information for document transmission status and stores the information to the database.
- FIG. 2 Data Flow: Send Response to Subscriber Information Request from System Server to Service Provider
- the Subscriber Related Business Information Requests Response 47 is sent to the Service Provider 24 using the communication link 30 in accordance with unit process 54 .
- the Subscriber Related Business Information Requests Response 47 is encrypted, digitally signed, and then sent to the Service Provider 24 .
- the system appends the appropriate routing information for the transmission type used by the Service Provider 24 .
- acknowledgment of receipt is received via 38 and logged.
- match and destination error notifications are received and logged, corrections are made and the response resent if necessary.
- FIG. 2 Data Flow: Receipt of the Response to the Subscriber Information Request by Service Provider
- the Service Provider or Information Requester 24 Upon receipt of the Subscriber Related Business Information Request Response 47 , the Service Provider or Information Requester 24 authenticates the System Server 26 as the sender and logs the receipt of the Subscriber Related Business Information Request Response 47 in accordance with unit process 56 . For example, within unit process 56 , Subscriber Related Business Information Request Response 47 is received, the digital signature is authenticated, and a response 38 is sent to the System Server 26 if the signature is valid. Additionally, the Subscriber Related Business Information Request Response 47 is matched against the Subscriber Related Business Information Request 32 . Preferably, the Subscriber Related Business Information Request Response 47 is processed in a manner similar to unit process 52 in accordance with unit process 58 .
- FIG. 2 Data Flow: Service Provider Processing of the Response to the Subscriber Information Request
- the Service Provider or Information Requester 24 processes the Subscriber Related Business Information Request Response 47 in unit process 58 .
- Subscriber Related Business Information Request Response 47 is decrypted and matched to the Subscriber Related Business Information Requests 32 stored in the requesting Service Provider's 24 database.
- the document status is set to complete or rejected depending on the response data sent in the Subscriber Related Business Information Requests Response 47 by the offline 28 .
- the completion of this step is the termination of the process.
- a log entry is made into the system server database recording information about the document reception process.
- the document state is set to complete by the document processor of Server 26 by updating the document header in the database.
- a trigger is fired to perform a system defined service upon document completion.
- Triggers for example, can perform actions such as sending a user defined message to a socket, storing data in another database, performing communications and the like. In this manner transaction data can preferably be sent to, for example, an issuing bank.
- FIG. 2 Architecture of Systems Server and Offline Database
- the systems server and offline database architecture preferably consists of six subsystems: process control subsystem, communication subsystem, document processing subsystem, security subsystem, user interface subsystem, and a data handling and storage subsystem.
- the process control subsystem preferably includes a system that invokes and controls the other custom and commercial software that make up the system server. This subsystem, for example, is able to automatically restart erroneously terminated processes and logs such terminations for later analysis.
- users are able to configure the process control subsystem to take additional actions when a process terminates.
- the communication subsystem preferably comprises of an X400 agent and/or virtual private network communication agent.
- this subsystem uses either agent to send documents out of the system server to external recipients, and relies on a fully qualified Internet address for routing.
- the communication subsystem's message receiving functions include determining how to route a message to its recipient, and accepting and transferring mail from and to intermediate agents. Additionally, address interpretation and transformation into a compatible format is handled by the communication subsystem.
- the communication subsystem also implements special actions indicated by the message header such as verifying delivery. For example, when message delivery cannot be done, the communication subsystem queues messages, or reroutes documents with erroneous addresses, as required.
- the communication subsystem determines the recipient's preexisting public communication system host, then initiates a transfer protocol session with the host. Preferably, an unsuccessfully transferred message is queued for later delivery.
- the Communication subsystem receives and processes all incoming document transfer protocol sessions from client systems. For example, outbound documents are packaged and sent to the communication agent for processing. Additionally, the communication subsystem automatically processes received messages by first authenticating, then decrypting, and then sending the message to the document processing subsystem.
- the communication subsystem places a time stamp on each message that when compared with the message status indicates when a message has not been successfully delivered. Unsuccessfully sent messages are preferably resent a predetermined number of times according to preset communications subsystem parameters.
- the document processing subsystem preferably processes all messages received into the System Server 26 .
- this subsystem can be responsible for message parsing, message storage, Subscriber Related Business Information Request processing, Subscriber Related Business Information Request Response processing, message routing and message timers.
- messages are processed in the order in which they are received and deleted after successful processing.
- a message is logged into the activity log upon reception and then parsed.
- the message parser divides the message into two parts: header and message data.
- Message type information contained in the header determines which type of action the system server should take with the message data.
- the message data is stored.
- the message data is stored according to message type and the message header is logged.
- a Subscriber Related Business Information Request is stored in a Subscriber Related Business Information Request table; and a Subscriber Related Business Information Request Response is stored in a Subscriber Related Business Information Request Response table.
- table entries are crossed referenced, and transmission verification messages and the status of the corresponding message are logged.
- the Subscriber Related Business Information Request 32 is processed. For example, the first step in processing a Subscriber Related Business Information Request 32 is to log the event. Then the name of the service provider 24 is extracted and the service provider's address is obtained from a lookup table. The Subscriber Related Business Information Request 32 is then sent to the offline database 28 . Preferably, the Subscriber Related Business Information Request 32 is marked as sent when a return receipt is received.
- Subscriber Related Business Information Requests 32 can be in any of four states based on responses from the offline database 28 : pending, sending, inactive, or completed.
- the Subscriber Related Business Information Request Response 47 is processed after it is received from the service provider. For example, when a Subscriber Related Business information Request Response 47 is received by the document processing subsystem, the corresponding Subscriber Related Business Information Request identification number is located and the Subscriber Related Business Information Request status is checked. The Subscriber Related Business Information Request Response 47 is marked as invalid if the Subscriber Related Business Information Request 47 is not pending.
- document status is updated when the Subscriber Related Business Information Request Response 47 is processed, forwarded to the requesting Service Provider or Information Requester 24 and stored into the system.
- a message's time in the document processing system is tracked by a timer.
- default events are set to occur at preset times.
- such default events include setting a message's status to a certain value if no response has been received or to send the message again if no return receipt is received.
- the security subsystem primarily preferably secures four areas: system data and file access, the relational database, the system administrative user interfaces and data and messages.
- system data and file access to the offline database 28 is protected by a user identification string that allows access to only the owner.
- access to the relational database is controlled through a data owner's user identification string and password, and no access privileges are granted to any other user.
- the system administration user interfaces and data are protected by another set of user identification numbers and passwords.
- users cannot gain access to the system administration user interfaces and data through other databases.
- messages are secured by encryption and a digital signature.
- commercial security software does the encrypting and decrypting, message authentication, and digital signature verification.
- Public Keys can be manually transferred between system/client administrators via email or disk/tape.
- key transfers are authenticated by verifying the digital signature of the sent document.
- all messages preferably receive a digital signature based on the private key of the sending system. For example, upon receipt, the digital signature of a message is automatically verified. Messages that fail digital signature verification are not processed, but rather are stored and the failure noted in the automated activity log.
- the sender is not notified when a message fails verification. This, for example, prevents attacks from hostile systems.
- the user interface subsystem preferably allows a system administrator to add or delete service providers, add or update message routing information and monitor system activity.
- the interface is accessed through Java software applets which can be executed within a web browser, such as Netscape Navigator or as a stand alone application.
- the offline database system data preferably is stored in a commercial relational database.
- the offline database system uses a database access and storage facility implemented using embedded structured query language in the user application processes and Java Database Connectivity.
- the Unix file system can be used to store system data.
- alternative embodiments of the system in accordance with the instant invention can provide some or all of the information contained in the database to a particular Service Provider or Information Requester depending upon the degree of anonymity, the position of the Service Provider or Information Requester, and the access codes/alias identifiers of the system.
- no information is allowed to any Service Provider or Information Requester and in that aspect the system has the capability of providing authentication or authorization code for a particular transaction completely devoid of any subscriber information.
- particular embodiments will allow grocery cards and club cards such as frequent flyer and the like (which are primarily involved in gathering demographic information with regard to purchasers) to be “blinded” by the use of the instant invention.
- aliases or codes such as personal identification numbers, and the like can be used in association with the medium to reduce risk of unauthorized use of the medium.
- security codes may be issued to the Subscriber such that one or more of the security codes must be used depending on the magnitude of the transaction.
- plastic cards are an easy medium in which to embed alias identification
- alternative embodiments may employ other mediums such as electronic transfer medium, smart cards, chips and the like.
- any medium can be used in accordance with this invention. For example, codes on keypads and even fingerprints would be acceptable identification to trigger the system.
- FIG. 3 illustrates an exemplary account setup in an alias account payment transaction system 100 .
- the alias account system 100 comprises a three part credit card application 102 , an issuer application processor 12 , a primary credit card 40 and an alias credit card 42 , an alias application processor 116 , a host processing system 118 , a part 3 applicant record 105 , a vault system 114 , and a vault receiving element or gateway 126 .
- the vault system 114 includes a server 122 , a vault process application 124 , and a matching database 120 .
- the three part credit card application 102 comprises a part 1 credit card application 104 for setting up the primary account, a part 2 security application or stub 106 for setting up the alias account, and a part 3 applicant's record 105 that is retained by the applicant.
- the card applicant's real identity and factual information used to establish credit are provided on the part 1 credit card application 104 .
- the card applicant's alias identity for example, an alias name and alias address, are provided on the part 2 security stub 106 .
- the only information in common between the part 1 credit card application 104 and the part 2 security stub 106 is a document tracking number (DTN) 108 and 110 .
- DTN document tracking number
- the DTN is the same multi digit number on both part 1 and part 2 .
- a multi part encryption methodology e.g. public key/private key
- an encryption/decryption algorithm establish a unique number for associating the primary account and the alias account under appropriate predetermined circumstances.
- the alias account system 100 functions in the following manner.
- the part 1 credit card application 104 of credit card application 102 is transmitted to the issuer application processor 112 for processing. If the part 1 credit card application is approved, the primary credit card 40 is issued and a primary account is booked on host processing system (HPS) 118 .
- the primary account is a credit card account that functions like any other credit card account.
- the part 2 security stub 106 is transmitted to the alias application processor 116 , independently of the part 1 credit card application. At the alias application processor 116 , the part 2 security stub 106 is processed and the resulting information is transmitted to vault receiving 126 . Vault receiving 126 transfers the information received from alias application processor 116 to the vault 114 .
- the vault 114 is preferably a secure facility operated by an independent third party that is not beholden or obligated to credit card companies or merchants, for example a privacy foundation, where the identity of an alias account holder is maintained and not disclosed to others except under certain limited conditions.
- the vault may charge a fee for using its facilities, and may contract with credit card companies to provide its vault services, as described herein.
- secure data may be provided by a secured computer system within an issuer's facility or by a separate secure database with an issuer's computer system for supporting the alias accounts.
- Cardholder privacy is effected in this alternative approach by password protecting the secure data, by restricting the access of customer service representatives to the secure data, and/or by providing separate personnel to handle the issuer's alias account database.
- a vault process application 124 on server 122 receives information from vault receiving 126 and from the primary account booked on HPS 118 . This information is input to a matching database 120 and is used to book an alias account in vault 114 . The alias account information is then transferred to HPS 118 to set up a corresponding alias account and issue an alias credit card 42 . The alias account booked on HPS 118 is identified with an alias name and address.
- the key points in protecting the anonymity of the account holder are the facts that the part 1 credit application 104 goes to a different location than the part 2 security stub 106 , and that the only information in common between the two parts of credit card application 102 are the DTNs 108 and 110 .
- a new account is set up using the three part credit application 102 ; information required from credit card applicants is provided on appropriate paper or computer based form.
- the part 1 credit card application 104 of application 102 is a standard credit application, while the separable part 2 security stub 106 is used to setup the alias account.
- a part 3 applicant's record 105 is also provided as an applicant's copy of the three part credit card application 102 .
- the part 1 credit card application 104 captures the normal information the issuer requires to make its credit decision and setup the primary account.
- the part I credit card application also provides a document tracking number (DTN) 108 for creating an association with a second DTN 110 on the part 2 security stub 106 .
- the DTN 108 is stored in a master file 130 when the application is processed so that it can be passed to the vault 114 after the account is booked.
- the issuer processes the part 1 credit card application 104 as any other application. Credit bureau reports are requested and the account is scored to determine credit eligibility and establish an amount of available credit. If the part 1 credit card application 104 is not approved, the normal letters are sent as with any other credit application. If the application is approved, the primary account is booked on the host processing system (HPS) 118 and a primary credit card 40 is issued to the applicant. Under association regulations the address of the booked account is reported to the Issuers Clearing House (ICS) and the credit bureaus.
- HPS host processing system
- ICS Issuers Clearing House
- HPS 118 There are at least two methods of booking the approved primary accounts on the host processing system. If the credit card issuer uses HPS 118 to process the credit card application, the account is booked automatically on HPS 118 . However, if a credit card issuer chooses to use an outside vendor to process the application, HPS 118 will receive an account tape and the accounts are booked as part of the nightly cycle. The nightly cycle also produces a daily report file. This report file shows all accounts that were booked on the system during that day. From this report file, the new primary accounts are captured and transferred to vault 114 .
- HPS 118 may capture the primary accounts, for example, using a flag in the master file that denotes a primary account or using a portfolio segregation method, where the primary accounts are identified by the system and principal number (sys/prin number) in a method that will be familiar to those skilled in the art.
- the part 2 security stub 106 is transmitted to the alias application processor 116 .
- a data entry operator using alias application processor 116 captures the security information contained on the part 2 security stub 106 .
- the security information may include the document tracking number (DTN) 110 , a password 107 , other security information, etc.
- the alias application processor 116 captures the security information and transfers it to vault receiving 126 .
- Vault receiving 126 does not have to be physically located in the vault 114 . It is simply a location where the security information is received and transferred to vault 114 .
- the security information from the part 2 security stub 106 is used to assign the password 107 to the alias account.
- the password 107 is used for identification (ID) verification on the alias account.
- the password 107 may be placed in the mother's maiden name field of the alias account.
- the part 2 security stub 106 contains a second DTN 110 that is associated with the DTN 108 on the part 1 credit application 104 . Since the part 1 credit card application 104 and the part 2 security stub 106 have an associated document tracking number (DTN) 108 and 110 , the DTNs are used to construct a relationship between the primary account and the alias account. Because they are used for this purpose, the document tracking numbers are preferably unique to an issuer.
- the security information is also input to vault process application 124 on server 122 .
- the vault process application 124 constructs a matching database 120 using two data sources.
- the first source is the security stub 106 .
- the security stub 106 contains the password 107 and the DTN 110 .
- the second source is HPS 118 .
- HPS 118 transfers certain primary account information to the vault 114 for purposes of maintaining the alias account.
- vault process application 124 receives the security information and updates the matching database 120 . If, when the security information is received and processed and it is determined that the DTN 110 is already in the matching database 120 , the vault process application 124 determines if the alias account information has already been posted by vault 114 . If it has not, then, HPS 118 received the part 1 credit card application 104 before the security information arrived at vault 114 . In this case, HPS 118 has already approved and booked the associated primary account and transferred its information to vault 114 . To proceed with alias account establishment in this case, an alias account record is created and added to a new account file and is sent to HPS 118 for posting. This process creates the alias account on HPS 118 .
- the vault process application 124 determines that the alias account information is already posted and reports an error, because the security stub information is a duplicate record.
- the security stub 106 is received and processed and it is determined that DTN 110 is not already in the database, the primary account information has not been transmitted from HPS 118 to vault 114 .
- the security stub information is maintained on file until it can be matched with a new primary account or for a predetermined holding time. For example, after 6 months the record may be removed from the file.
- the vault process application 124 is taking information from the daily cycle in HPS 118 and using it to create an input file for the next day's cycle. This means that, if an account is approved before a day's cycle ends, the new account is built in HPS 118 and the information for the vault 114 is extracted from the files created that night, during the processing of the daily report file. The extracted information is transmitted to vault 114 . This input to the vault is processed and a request for a new alias account file will be transferred back to HPS 118 for the next night's processing of the daily report file. As a result of this process, the new alias account is booked in HPS 118 .
- alias accounts are not reported to the credit bureaus or the Issuers Clearing House (ICS).
- the alias account is not reported to the credit bureaus because the primary account was already reported.
- the alias account is not reported to ICS because the address on the account is meaningless.
- the credit available to the credit cardholder is split or allocated between the primary account and the alias account on a predetermined basis, with the total credit available to the credit cardholder not exceeding the sum of the primary account and the alias account.
- HPS 118 all alias accounts will be assigned a fictitious name to populate the fields within the alias account and facilitate identification and recognition of alias accounts within the HPS system.
- the account name may be assigned a made up name such as “Pat G. Alias”.
- the remaining account information for the alias account is generated in the vault 114 .
- Vault 114 generates a mailing address for the account that consists of an apartment number that is unique and a city, state and zip code that is special for the account, again to facilitate identification and recognition of alias accounts within the HPS system.
- the zip code is used in the mailing process to identify a document with an alias name and address. The mailing process for alias accounts will be discussed later in detail.
- the booked alias accounts are reported on the daily report file in the manner known to those skilled in the art.
- a file of these accounts is created and sent to the vault 114 so that a report can be created for the issuer and the privacy foundation.
- the vault 114 will provide daily reports showing the primary accounts that are booked but have no matching part 2 security stub 106 and primary accounts that have successfully set up an alias account.
- the vault will also generate a weekly report to inform the issuer of the number of alias accounts issued and the number of account numbers available for assignment.
- FIG. 4 illustrates a typical credit card transaction using the credit cards of the present invention.
- Credit card 40 is associated with the primary account and credit card 42 is associated with the alias account.
- the primary and alias credit cards 40 and 42 are used like any other credit card.
- the cardholder presents either the credit card 40 or 42 to a merchant at a point of sale 204 or 206 (which can be in person, on line, via telephone, etc.).
- the merchant at the point sale submits the credit card account number for authorization to an acquirer.
- the acquirer is an entity that enters into an agreement with a merchant for authorization and settlement of its credit card transactions.
- the acquirer may be a bank, a credit card company (for example, VISA, AMERICAN EXPRESS, MASTERCARD, etc.), or some other entity.
- the Host Processing System (HPS) 118 which may be operated by an acquirer or by another entity, receives the authorization request from the merchant and provides authorization of the credit card transaction. Assuming that the credit card transaction from either the primary credit card 40 or the alias credit card 42 is approved, the transaction is treated in a similar fashion to other credit card transactions, with the exception of the statement printing process. The statement printing process for the alias account is different from the printing process of the primary account and other credit card accounts. The primary account statement 218 associated with credit card 40 is printed in print facility 216 , using the name and address associated with the primary account in HPS 118 .
- alias accounts are tagged in HPS 118 for purposes of identifying alias accounts and distinguishing them from other accounts.
- the alias accounts are tagged, for example, by setting a flag, identifying special fields, or assigning a system and principal number (sys/prin. number) to the alias accounts. In accordance with the present invention, however, the alias accounts are not associated with any primary account at the HPS.
- the tagged records 212 are then transferred to vault 114 for processing. In vault 114 , the fictitious name and address on the alias account is replaced with the cardholder's real name and address. The real name and address is retrieved from matching database 120 .
- the corrected records 214 are transferred to print facility 216 , where an alias account statement 220 is printed.
- the alias account statement printing process will be discussed in greater detail below.
- an existing cardholder can upgrade or modify their credit card account to add an alias account.
- An upgrade or preapproved application 300 is used to sign up an existing cardholder for an alias account.
- the upgrade or preapproved application 300 comprises two parts.
- Part 1302 is an upgrade credit card application and part 2 304 is a security stub.
- the two parts of application 300 need not be associated by using the DTN information. Instead, the two parts of the application may be associated by using the credit card account number 306 on the cardholder's existing credit card 301 .
- the credit card account number 306 is affixed to both parts of the application.
- a password 303 selected by the cardholder is provided on the part 2 security stub for security purposes.
- the part 1 upgrade credit application 302 is transmitted to issuer application processor 112 .
- the issuer or its agent will handle the processing of the part 1 upgrade credit application 302 .
- the part 2 security stub 304 is transmitted to vault receiving 126 for processing.
- Vault receiving 126 captures the password 303 and the current credit card account number 306 on part 2 security stub 304 .
- This information is transferred to the server 122 to populate the table for matching database 120 .
- the part 2 security stub 304 information is stored on server 122 for a predetermined period of time or until the corresponding account information is received from HPS 118 and an alias account is built.
- the issuer initiates an account transfer.
- the existing account is transferred to a primary account and a new upgrade credit card 308 is issued as the card for the alias account.
- the existing account may be transferred, for example, by flagging the existing account as a primary account in the master file or using a portfolio segregation method and switching the existing account to a system and principal number (sys/prin. number) assigned to primary accounts.
- the credit limit on the new primary account is also set to a value that can be distributed between the primary account and the alias account that will be created. The credit limit distribution process will be discussed in detail in the account management section.
- HPS 118 captures the account transfers on a report file and checks the report file for existing accounts that have been identified as primary accounts. This report is used to transfer the primary accounts to the vault 114 .
- vault 114 receives the new primary account information and matches the credit card account number 306 on the part 2 security stub 304 with the credit card account number 306 on the primary account, it will create a new alias account. All other processes for creating the alias account are the same as those described in new account setup.
- Account management functions generally do not involve monetary values or relate to specific financial transactions, and are often called non monetary or “non mon” transactions.
- a non mon transaction is a transaction that affects account information, but does not affect the monetary information for an account.
- name, address, and credit limit changes to an account are non mon transaction, and such changes are generally called updates.
- non mon updates to the primary account are processed on HPS 118 .
- the primary account controls the credit line on both the primary and the alias accounts because all credit decisions are based on the primary account.
- HPS 118 establishes a primary account
- a credit limit is set for the primary account. This credit limit is passed to the vault 114 as part of the alias account setup process.
- the vault 114 creates the alias account it will take the credit limit passed and divides it based on a percentage allocation or distribution ratio established by the issuer.
- a non mon transaction is created to set the primary account's credit limit to its proper value.
- the alias account's credit limit is set to the remaining amount.
- there is information stored with the primary account recording the change to the credit limit, and the fact that the vault 114 issued the change. This information is important because a customer service representative (CSR) making a change to the credit limit can recognize that there is an alias account associated with the primary account.
- CSR customer service representative
- the allocation of available credit between the primary account and the alias account is within the discretion of the issuer and, if desired, selection by the cardholder.
- An issuer may require a predetermined allocation, for example 50%, of the available credit between the two, or may allow some discretion on the part of the cardholder.
- the issuer may allocate 0% or 100% or any number in between of the available credit to the primary account, with the remainder to the alias account.
- a CSR may retrieve the information stored with the primary account to help determine the combined credit exposure and make the decision to issue a non mon setting a new credit limit.
- the vault 114 will capture the non mon when it is reported on a daily report file and will recalculate bout credit limits and issue a non mon for each account. It will be understood that in current systems this process may require a number of cycles to complete so there is additional exposure to the issuer from the time that the non mon is issued until the vault 114 issues the non mons for both accounts and they are processed by HPS 118 . This process applies to both increases and decreases of the credit limit.
- vault 114 will not immediately recalculate the credit limit associated the alias accounts on file. The accounts will remain at the old ratio until a non mon is issued for the account. This is to prevent the possibility of putting accounts over that were not over the limit before the change. Online changes of the alias account's credit limit is preferably not allowed.
- FIG. 6 is a general block diagram illustrating an embodiment of the alias account management process.
- the alias account management process starts at block 400 with a request from a cardholder for a credit line increase. This is usually made through a phone call to the issuer.
- the issuer receives the request at block 402 and requests a credit bureau report of the cardholder. Based on the credit bureau report, at block the issuer rescores the customer's credit and determines the customer's eligibility for a credit line increase.
- the issuer at block 406 will perform an online non mon transaction to HPS 118 to post the change of the primary account credit limit.
- the non mon transaction is logged in an online non mons file 408 .
- the online non mons file 408 is then transferred to the posting program 410 .
- the nightly posting program 410 also receives the current host master file 412 . Once both files are received, the posting program 410 posts the online non mons in file 408 to the current master file 412 and generates a new host master file 414 .
- the posting program 410 also generates a number of report files. These report files are input to a report splitter program 416 that will split off a non mon report 418 .
- the non mon report 418 contains the primary and alias account information associated with the posted transactions that do not effect the account's monetary value.
- the non mon report file 418 is used as input to alias split program 422 and to generate a daily report 420 .
- the alias split program 422 separates the alias and primary account transactions and generates a non mon report file 424 that only includes the alias account transactions. This non mon report file 424 is then transferred to vault 114 .
- the non mon report 424 is input to the non mon generator process 426 .
- the non mon generator process 426 retrieves the issuer's percentage allocation or distribution ratio from the matching database 120 and applies it to the new credit line limit received in non mon report file 424 .
- the non mon generator process 426 takes the new credit line limit and apportions it based on the percentage assigned to the primary and alias account.
- the non mon generator 426 outputs a non mon file 428 to HPS 118 .
- the non mon file 428 is input to the posting program 410 in the next day's cycle.
- the posting program 410 will post the modified credit limits to the primary and alias accounts.
- FIG. 7 is an example of an issuer's credit exposure when a credit limit increase is processed using the account management process of FIG. 6.
- column 1 502 when the cardholder makes a request for the issuer to increase the primary account credit limit from $10,000 to $15,000, the issuer's total exposure is $10,000 prior to the credit limit increase.
- the $10,000 exposure is divided according to the issuer's percentage allocation, which in this example is 50%. Therefore, the issuer's exposure is $5,000 for the alias account and $5,000 for the primary account.
- FIG. 8 illustrates a process for performing non mon updates such as name and address changes.
- Daily non mon file 600 contains the records of the non mon updates to the primary accounts.
- the daily non file file 600 also includes tables of the sys/prin. number and non mon values associated with a non mon update. The sys/prin. number and non mon values within the tables are easily modified.
- the daily non mon file 600 is stored and processed outside of the HPS's critical path.
- HPS 118 uses an extraction program 602 to read the daily non mon file 600 and create a vault transaction file 604 that is later transferred to vault 114 .
- the extraction program 602 selects the records that are added to the transaction file 604 using the record's sys/prin. number and non mon values.
- vault transaction file 604 is transmitted to vault 114 .
- the vault update process application 606 on the vault's server 122 , takes the name and address changes from the vault transaction file 604 and posts them to the matching database 120 . This ensures that the mailing labels have the correct mailing information.
- a non mon update file 608 is created and transferred to HPS 118 for the next day's processing cycle.
- An application program on HPS 118 provides a report and input to vault 114 of all changes made to the HPS database and processing counts.
- the application program selects the report entries in a manner similar to the alias account extraction program 602 . This report will provide an audit trail of all transactions passed to vault 114 .
- HPS 118 is preferably configured to prevent a customer service representative (CSR) from making online changes to an alias account's name, address, social security number, and home and work phone number fields. These online changes to the alias account are blocked because those fields provide a means of compromising the cardholder's identity. To ensure that a cardholder's identity is not compromised and a CSR does not accidentally change these fields, the modification of these fields is assigned to vault 114 .
- CSR customer service representative
- FIG. 9 illustrates the account closing process.
- account closings and personal identification numbers (PINS) associated with ATM transactions are also considered non mon changes.
- the account closing process starts at step 700 .
- HPS 118 transfers the non mon collection transactions file to the vault processing step 702 .
- the non mon collection transaction file contains the primary and alias accounts that are going into collections.
- the vault 114 receives the non mon collection transactions file and proceeds to step 704 .
- the vault 114 processes the collection transactions file and combines the two accounts.
- the accounts are combined, because the cardholder is charged an annual fee, for the alias account that is charged on the primary account, and the issuer is paying for two accounts on HPS 118 .
- the combined account is then transferred, at step 706 , to a non alias sys/prin. number on HPS 118 .
- Once the accounts are combined, all activity on the alias account is visible on HPS 118 . In the preferred embodiment, regardless of whether the alias or primary account is closed, the account closing process remains the same.
- Vault 114 also handles the non mon for setting account PINS. If the issuer wishes to allow ATM use of the alias account, the form for selection of a PIN is inserted with a mailing to the cardholder. The mailing process will be described in detail below.
- HPS 118 uses a standard credit card authorization system.
- the issuer must establish a method for authenticating the cardholder of an alias account. In an embodiment of the invention, this is accomplished by using the alias “password” that was entered during account setup.
- the issuer should also have some special procedures to handle referrals and hot calls. Since none of the information on the alias account is real, a phone number is set in the phone number field that will allow the issuer to communicate with the vault and request contact with the cardholder.
- a cardholder In reporting a lost or stolen credit card or to confirm fraud, a cardholder must make a call to report each account. This allows the cardholder to maintain his or her anonymity. A first call is made to report the primary account as themselves and a second call is made to report the alias account with the alias name. For example, the caller may use the name “Pat G. Alias.” If the issuer suspects fraudulent use of the alias account, the issuer must contact vault 114 . Vault 114 will in turn contact the alias account holder.
- HPS 118 handles both accounts in the same manner.
- the account status flag is changed and an instruction is executed to transfer activity to a new account.
- HPS 118 also issues a new plastic credit card.
- the instruction generated by HPS 118 is captured from a report file and used to update the matching database 120 in vault 114 .
- Vault 114 monitors the account status flag to generate the appropriate actions.
- Vault 114 also maintains state images of the accounts to monitor multi step processes, and determines when a process is complete. Vault 114 provides account reports on completed operations.
- the vault will receive notification to combine the two accounts for reporting and/or collection purposes.
- the customer account disclosures provided to the customer on account setup to advise of account policies and procedures, inform the cardholders that if the alias or primary account becomes delinquent the alias account will be closed and combined with the primary account.
- the primary account will be transferred to a non alias sys/prin. number because it is no longer an alias account.
- the resulting new account is, then, placed into collections.
- the HPS 118 In order to bill customers for credit card transactions, the HPS 118 produces on line alias account statements from archives and CD ROM's. All statements produced on line will contain the alias account address information. Statements printed for the alias accounts proceed through the HPS statement processing until they are ready for printing. Monthly statements for the alias accounts are treated as if the issuer or some other vendor is going to print them.
- FIG. 10 is an overview of the statement printing process 800
- FIG. 11 illustrates a specific implementation of an alias statement process 900
- a statement formatting process or program module 801 at the HPS 118 produces an alias statement print file 802 of the alias account statement addresses.
- the alias statement print file 802 is transmitted to vault 114 for processing.
- Vault 114 is not responsible for mail redirection.
- vault 114 supports mail redirection. It will be recalled that to support mail redirection, vault 114 maintains the matching database 120 . In the vault 114 , the matching database 120 is queried based on the apartment number of the alias address to located the real name and address of the account holder.
- the matching database 120 includes the alias apartment number (key), the real name, and the real address. If the apartment number on the alias account statement is successfully located in the matching database 120 , the real name and address that will be used for mailing the statement will be retrieved and used to construct a corrected alias statement print file 806 .
- the corrected alias statement 5 print file 806 is then transmitted to a print facility 808 outside the vault 114 that prints the monthly alias account statement 220 with the name and address provided by the cardholder to which the alias statement is to be mailed.
- Print facility 808 is any facility that can receive an electronic print file and print the monthly alias account statement 220 .
- the vault 114 In addition to the above mailing requirements, it is also necessary for the vault 114 to replace the alias name and address on the payment coupon with the real name and address for the alias account statement. This will help limit compromising the identity of the cardholder.
- the security stub 106 (FIG. 1) is provided with an option for an alternate address for mailing the alias account statements.
- HPS 118 flags the alias accounts that have an alternate address and transfers them to the alias statement print file 802 .
- the alias statement print file 802 is then transmitted to vault 114 for processing.
- the vault 114 receives the alias statement print file 802 , recognizes the flagged alias accounts, and does not replace the alias address with the real address associated with the primary account, but assigns the alternate address received with the security stub information.
- a copy of the matching database 120 is made available to the print facility 808 or a secured site on the Internet that makes the database available to mail distributors that need the information for relabeling.
- a mail or parcel distributor working in association with the alias account system described herein may be operative to receive purchases made using an alias card, relabel the packages containing the purchases with the primary account address, and reship the packages to the primary account address.
- a mail or parcel distributor may effect the same package relabeling to the alternate address instead of the primary account address.
- alias address should preferably contain indicia (e.g. a data key) that enables the mail distributor to determine the proper real shipping address for each received piece of mail or parcel.
- indicia e.g. a data key
- the “XXXXX” can be a special key unique to a particular alias account cardholder.
- the mail or parcel distributor uses the apartment number key to look up the appropriate relabeling address in the matching database, and prints a new label for reshipping the mail or parcel.
- the address displayed in the envelope of a received piece of mail or on the label of a received parcel must be sufficient to signal special processing, as well as locate the correct name and address.
- the alias address is preferably not a post office box, since some merchants will not ship to such an address.
- the alias address may contain a special zip code.
- the zip code provides a means for mail distributors to determine that the piece of mail needs to be relabeled as part of their normal address scanning process.
- the zip code may also identify the facility that is assigned to handle the relabeling process.
- the alias account holder can direct merchants to ship merchandise purchased with the alias card to the print facility 808 or the mail or parcel distributor for relabeling. This provides the alias cardholder with additional privacy.
- the alias cardholder is able to keep his or her anonymity, since there is no need to provide the merchant with a mailing address where the cardholder can be reached.
- HPS 118 other customer communications (letters, alias credit card, and PIN mailings) are mailed using the master file address that is associated with the alias account.
- vault 114 maintains a matching database 120 that is used to create mailing labels.
- the matching database 120 uses the apartment number of the alias address or the alias account number as the key to retrieving the real name and address.
- the real information is used to produce a new mailing label to place over the alias address.
- the issuer may want to tam off most letters to avoid the additional postage and handling costs.
- FIG. 11 illustrates the preferred embodiment of the alias statement process 900 .
- a valid transactions file 901 a current host cardholder file 902 , and a product control file 903 are input to a posting program 410 (FIG. 6).
- the posting program 410 outputs a new host cardholder master file 904 and transfers the statement records 905 to a statement formatting program 801 .
- the alias account statements are separated into an alias statement print file 802 and transferred to vault 114 . All other accounts are output to a nightly statement file 908 that is transmitted to a print facility 808 which includes host output services 916 and statement printer 918 . At output services, the statements are produced on statement printer 918 .
- the alias statement print file 802 is input to the statement name/address overlay process 912 .
- the statement name/address overlay process 912 uses the matching database 120 to retrieve the real names and addresses associated with the alias accounts. Once the real names and addresses are retrieved, the overlay process 912 replaces the names and addresses on the alias accounts in the alias statement file 802 , with the real name and addresses and transfers them to a corrected alias statement print file 806 .
- the corrected alias statement print file 806 is then transferred back to HPS 118 as an input to the print facility 808 .
- the alias statements are produced on statement printer 918 .
- Primary account payments are handled in the same manner as any other credit payment.
- the primary account may use any options of payment the issuer wishes to make available. Unlike the primary account, however, there are some special considerations for handling the alias accounts.
- the issuer should preferably select a remittance processor.
- the remittance processor should preferably not use automatic payment options with alias accounts.
- the automatic payment options provide a means for the remittance processor to automatically charge a cardholder's checking account for the required payment. However, this requires that the cardholder's checking account number be stored on the HPS master file. Using this information, the alias and primary accounts can be matched and anonymity compromised.
- the payment coupon for the alias account will have the cardholder's real name and address that will match their personal check.
- the payment coupon will also have the alias account number.
- the remittance processor does not have access to HPS 118 , and additional information about the cardholder.
- the auto payment option and check payment processing provide a small risk that the cardholder's identity may be compromised at the remittance processor.
- FIG. 12 illustrates the databases 900 employed in the vault 114 and their associated relationships.
- the vault databases comprise a matching database 120 (FIG. 1), a temporary database 1002 , an account block database 1004 , an issuer database 1006 , and a mail redirection database 1008 .
- the matching database 120 contains the alias and primary account information for matching the name and address of the alias account on HPS 118 with the real name and address of the cardholder.
- the matching database 120 contains a number of fields for managing the alias account.
- FIG. 12 lists the fields contained in the matching database 120 , and Table 1 of FIG. 13 provides a summary of some attributes associated with each of the listed fields for databases constructed in accordance with the invention.
- the first row of Table 1 summarizes the field “IsNew.”
- the columns of row one include the following: column one identifies the field name; column two identifies the data type associated with the “IsNew” field; and column three gives a description of the function of the field within the matching database.
- the temporary database 1002 contains the alias and primary account information for creating the alias account in vault 114 .
- FIG. 12 lists the fields used to create the alias account, and Table 2 of FIG. 14 provides a summary of some attributes associated with each of the listed fields. For example, the first row of Table 2 summarizes the field “PrimaryAccountNumber.” The columns of row one include the following: column one identifies the field name; column two identifies the data type associated with the “PrimaryAccountNumber” field; and column three gives a description of the function of the field within the Temporary database.
- the account block database 1004 contains the issuer's account number information. This information is used to assign the issuer's account numbers to the alias accounts.
- FIG. 12 lists the fields use to define the issuer's alias account numbers, and Table 3 of FIG. 15 provides a summary of some attributes associated with each of the listed fields. For example, the first row of Table 3 summarizes the field “IssuerCode.” The columns of row one include the following: column one identifies the field name; column two identifies the data type associated with the “IssuerCode” field; and column three gives a description of the function of the field within the Issuer database.
- the issuer database 1006 contains the issuer profile within vault 114 .
- the issuer profile includes the issuer's system code, the date the issuer become active on the system, and the credit limit information associated with the issuer's accounts.
- FIG. 12 lists the fields use to define the profile, and Table 4 of FIG. 16 provides a summary of some attributes associated with each of the listed fields. For example, the first row of Table 4 summarizes the field named “IssuerCode.” The columns of row one include the following: column one identifies the field name; column two identifies the data type associated with the “IssuerCode” field; and column three gives a description of the function of the field within the Issuer database.
- the mail redirection database 1008 contains the alias and primary account for replacing the name and address on the alias account with the cardholder's real name and address. This is the address to which the cardholder's correspondences will be mailed.
- FIG. 12 lists the fields used to retrieve the cardholder's real name and address and Table 5 of FIG. 17 provides a summary of some attributes associated with each of the listed fields. For example, the first row of Table 5 summarizes the field “AliasBoxNumber.” The columns of row one include the following: column one identifies the field name; column two identifies the data type associated with the “AliasBoxNumber” field; and column three gives a description of the function of the field within the Mail Redirection database.
- FIG. 18 is a flow diagram illustrating an overview of the host and vault process flow 1100 .
- the issuer inputs part I credit card application 104 to the issuer application processor 112 .
- the issuer transfers the part 1 application data file 1118 to HPS 118 .
- the part I application data file 1118 provides HPS 118 with a document tracking number (DTN) 108 and the necessary information to setup a primary account.
- DTN document tracking number
- the part 2 security stub 106 is input to the issuer's alias application processor 116 to set up an alias account.
- the alias application processor 116 transfers the part 2 application data file 1102 to vault receiving 126 .
- the part 2 application data file 102 is used to assign a password 107 and a DTN 110 that matches the DIN 108 on the part 1 credit card application 104 .
- Alias application processor 116 also transfers the issuer account blocks data 1104 and issuer distribution ratio 1106 to vault receiving 126 .
- Vault receiving 126 transfers the above information to vault 114 via alias account information 110 , account block details 1112 , credit line ratio details 1114 , and alias account modification/termination details file 1116 .
- Vault 114 stores the part 2 application data file 1102 in temporary database 1006 .
- Vault 114 uses the issuer account block data 1104 to assign the alias account number, and the issuer distribution ratio 1106 to split the credit limit assigned to the primary account with the alias account.
- Vault 114 also adds a record to the matching database 120 .
- Matching database 120 stores information such as the primary and alias account numbers.
- the alias account information is stored in vault 114 , it issues a non mon transaction via non mons file 1124 to HPS 118 to requests the part 1 application data file 1118 .
- This information is transferred from HPS 118 to the vault 114 via the primary account acquisition and updating file 1130 .
- vault 114 Once vault 114 receives the primary account information, it queries the temporary database 1006 for the associated alias account.
- the temporary database 1006 is queried using the document tracking numbers (DTN) 108 and 110 .
- the alias account found and the primary account are associated in matching database 1002 .
- Vault 114 also transfers a non coon transaction via non mon file 1124 to HPS 118 .
- the non mon is transferred with the alias account acquisition and updating file 1128 to request the creation of the alias account on HPS 118 .
- two accounts exist on HPS 118 .
- the primary account with the cardholder's real name and address and an alias account with an alias name and address.
- HPS 118 transfers various files to vault 114 .
- HPS 118 transfers a primary accounts acquisition and updating file 1130 , a non mons transaction updating file 1132 , alias account update file 1134 , collections account number file 1136 , and an alias document file 1138 .
- the primary accounts acquisition and updating file 1130 is used to update primary account information.
- the primary account acquisition and updating file 1130 may contain an update for the cardholder's name, address, or account credit limit.
- the non mons transaction file 1132 contains the non monetary instructions to direct vault 114 to execute various functions.
- the non mons transaction file may include instructions to flag the alias account for collections, to update the alias account details, or update the alias account credit line.
- the alias account update file 134 provides vault 114 with information to update the alias account.
- the alias account update file 1134 may contain the information to change the credit limit on the alias account.
- the collections account number file 1136 contains the alias and primary account numbers that are going into collections on HPS 118 .
- the alias document file 1138 transfers documents with an alias address and name to the vault 114 to have the alias name and address replaced with the cardholder's real name and address.
- vault 114 manipulates the primary and alias account information stored in the vault databases. This information is fed back to HPS 118 via alias account acquisition and updating file 1128 , account collections file 1126 , non mon transaction file 1124 , and redirected mail file 1122 .
- the alias account acquisition file and updating file 1128 provides HPS 118 with the credit limit information for the alias and primary account.
- the account collections file 1126 provides HPS 118 with the information to combine the primary and alias accounts before sending them to collections.
- the non mon transaction file 1124 serves a similar function as the non mon transaction updating file 1132 .
- the redirected mail file 1122 provides HPS 118 with documents that have had the alias names and addresses replaced with the cardholder's real name and address.
- the cardholder may enter a request via the issuer application processor 112 .
- the issuer application processor 112 transfers alias account termination/modification request 1108 to vault receiving 126 .
- Vault receiving 126 transfers the request to the vault 114 via alias account modification/termination details file 1116 .
- the request is processed and the appropriate outputs are sent to HPS 118 .
- FIG. 19 illustrates the account acquisition process 1200 .
- Account acquisition begins at data entry step 1202 .
- the issuer application processor 112 and alias application processor 116 execute data entry step 1202 .
- the part 1 application data file 1118 is transmitted to the host processing system (HPS) 118 .
- HPS 118 at decision block 1204 determines whether an account already exists. If an account already exists, the process proceeds to step 1212 , where HPS 118 puts the DTN in the master file and flags it as a primary account. Once the existing account has been converted to a primary account, the credit line of the existing account is altered at step 1214 . Then, the process proceeds from step 1214 to step 1208 .
- the primary account is dumped into a file. From step 1208 , the file is transferred to step 1210 .
- the file, identified as the primary account acquisition and updating file is transferred to vault 114 for processing.
- HPS 118 determines that an account does not exist, the process proceeds to step 1206 .
- a new account is created in HPS 118 .
- the new primary account is created following the normal process flow of HPS 118 .
- the primary account is transferred to step 1208 .
- the primary account is dumped into a file.
- the process proceeds from step 1208 to step 1210 , where the file, identified as the primary account acquisition and updating file, is transferred to vault 114 for processing.
- alias application processor 116 completes data entry 1202 , the part 2 application data file 1102 is transmitted to vault receiving 126 .
- Vault receiving 126 receives the part 2 application data file 1102 and at step 1216 generates an alias account number. From step 1216 , the process proceeds to step 1218 , where vault receiving 126 also uses the part 2 application data file 1102 to generate an alias file 1220 .
- the alias file is transferred from step 1218 to step 1220 .
- the alias file is transferred to vault 114 for processing.
- step 1222 vault 114 receives the data from the alias file and puts it in a temporary database 1002 . From step 1222 , the process proceeds to decision block 1226 . At decision block 1226 , vault 114 determines if part 1 of the application if available. If part 1 of the application is not available, the proceeds to step 1230 . At step 1230 , vault 114 transmits a non mon to request the part I application details. If part 1 of the application is available, the process proceeds to decision block 1228 . At decision block 1228 , vault 114 determines whether part 2 of the application is available. If decision block 1228 determines that part 2 is not available, vault 114 remains at step 1228 until part 2 of the application becomes available.
- step 1234 the vault 114 will match the DTN on the alias account with the primary account number, stored in two files, and add relevant entries to the matching database 120 (FIG. I) and mail redirection database 1008 (FIG. 12).
- step 1240 vault 114 generates an alias account file.
- the alias account file is transferred from step 1240 to step 1242 .
- step 1242 the alias account file, identified as the alias account acquisition and updating file, is transferred to step 1244 .
- step 1214 the alias account acquisition and updating file is input to the next day's cycle on HPS 118 .
- FIG. 20 illustrates the account maintenance process 1300 .
- Account maintenance process 1300 is used to change and maintain the primary and alias account information.
- a request is made at step 1302 and transferred to the host processing system (HPS) 118 .
- HPS host processing system
- the request is then transferred to step 1304 .
- HPS 118 will update, in the normal process flow, the associated account information in the host area.
- the process proceeds to step 1306 .
- HPS 118 will select, in its nightly cycle, the accounts associated with the alias account system. Once those accounts are selected, the process proceeds to step 1308 .
- the changes are put into a file.
- the file is transferred to step 1310 .
- the file identified as the account update file, is transferred to vault 114 .
- vault 114 determines if any alias account update information has been received from the host. If there is no update information received from the host, the process proceeds to step 1302 and waits for the next request. If at step 1312 vault 114 determines that HPS 118 has transferred update information, the process proceeds to step 1314 . At step 1314 , vault 114 reads the account update file and makes the corresponding changes in the mail redirection database 1008 (FIG. 12).
- step 1314 the process proceeds to decision block 1318 .
- vault 114 determines if there have been alias account updates from a system operator. If a system operator has made changes to alias accounts, the process proceeds to step 1320 .
- vault 114 creates a non mon to update the alias details in the host (for a further discussion of non mon transactions refer to FIGS. 6, 8, and 9 ). At this point, the process returns to step 1302 and waits for a new request (change of name, address and/or credit limit).
- step 1322 vault 114 will determine if there has been a request for a primary account credit line update. If at decision block 1322 , vault 114 determines that there is no request for a primary account credit line update, then the process proceeds to step 1326 and ends. However, if at decision block 1322 , vault 114 determines that there is a request for a primary account credit line update, then the process proceeds to step 1324 . At step 1334 , vault 114 creates a non mon to update the alias account's credit line on the host. At this point, the process returns to step 1302 and waits for a new request (change of name, address and/or credit limit).
- FIG. 21 illustrates a collections process 1400 .
- the collections process 1400 identifies the alias and/or primary accounts that are delinquent and going into collections on HPS 118 , combines them in vault 114 , and sends them to collections.
- the collections process 1400 begins at step 1402 , where HPS 118 selects the accounts for collection.
- the process then proceeds to step 1404 , where HPS 118 places the selected accounts in a special queue.
- the selected accounts are transferred to step 1406 .
- HPS 118 transfers the account numbers of the selected accounts into a file.
- the process proceeds to step 1407 .
- the file, identified as a collections account number file is transferred to the vault 114 .
- step 1420 If decision block 1412 determines that the account sent for collection was not a primary account, the process proceeds to step 1420 . Similarly, from step 1416 , the alias and primary account numbers are also transferred to step 1420 . At step 1420 , the alias and primary account numbers are also used to create non mons for combining the two accounts and terminating the alias account. From step 1420 , the non mons are transferred to step 1424 . At step 1424 , the file containing non mons is transferred back to HPS 118 . At step 1426 , the HPS 118 receives the file containing the non mons transferred in step 1424 . Next, the process proceeds to step 1428 .
- HPS 118 updates the master file and sends an account transfer confirmation 1428 back to vault 114 .
- vault 114 receives the confirmation 1428 at step 1410 , vault 114 , sets the deactivation flag in the matching database 120 for the primary and alias accounts.
- FIG. 22 is a flow chart illustrating a mail redirection process 1500 .
- the mail redirection process 1500 is used to replace the alias name and address with the cardholder's real name and address on documents sent to the cardholder.
- Mail redirection process 1500 begins at step 1502 , where HPS 118 will generate a mailing document.
- step 1504 the host processing system (HPS) 118 will select the alias account documents and put them in a file.
- the process proceeds to step 1503 .
- the file, identified as an alias document file is transferred to vault 114 .
- Vault 114 receives the file transferred from step 1503 .
- the vault 114 uses the box number on the alias address and the primary account number, determine the real name and address from the mail redirection and matching databases 1008 and 120 . Then, the process proceeds to step 1512 .
- the vault 114 replaces the alias name and address with the real name and address on the document and placed them into a file.
- the file identified as a redirected mail file, is transferred in step 1513 to HPS 118 .
- the file transferred in step 1513 is received by HPS 118 in step 1514 .
- HPS 118 receives the corrected mail and sends it to the printing system.
- Kid Card embodiment represents a presently preferred embodiment of the invention and, as such, is merely a representative of the subject matter that is broadly contemplated by the present invention. It is further to be understood that the scope of the present invention fully encompasses embodiments other than the Kid Card and that the scope of the present invention is not limited by the following example embodiment.
- the Kid Card is a credit or debit card that makes limited purchasing power available to children.
- the transactions performed with the Kid Card are anonymous, and the products available for purchase with the Card are subject to parental control.
- children are guided through the shopping experience by the Web pages supplied by the hosting entity.
- the transactions performed with the Kid Card are anonymous.
- a child that purchases an item over the Internet uses the Card to pay for the item.
- an alias set of information is used as described above. This alias set of information is compared to an offline secure database in the bunker that compares the alias information to the true identity data and authenticates the transaction.
- the true identity of the purchaser is thus never compromised and therefore never available to the processing company for inclusion on a demographic list.
- parents can put restrictions on the types of items that the Kid Card may purchase.
- the authenticating database might be configured to allow the purchase of only Type 1 and Type 2 items.
- the parental control can take the form of restrictions on the products that are available for purchase.
- a group of parents who have created a Web page can offer the Kid Card.
- the group controlling the content of the Web page additionally controls product availability by selecting the items that are available for purchase by children.
- Yet another example of parental control is based on a password scheme. In this embodiment, the service provider requires a password from the child before allowing the child to enter the shopping area.
- the parents Based on that password and input the service provider has received from the parents, the products available to the child for purchase are filtered. Thus, the parents have control over what items are made available to their children by creating a shopping profile. Such a profile could be generated, for example, as part of the application process for the Kid Card.
- the Internet Service Provider acts as the guide to the children's shopping experience.
- the ISP could be America On Line (“AOL”) or any other provider.
- the entity providing the Kid Card service could be a web page and not an ISP at all.
- AOL will be used as both the ISP and the entity providing the Kid Card service.
- AOL is the ISP.
- AOL hosts a special “kids only” shopping area. The kids only shopping area may be accessible only with an additional password. The additional password could be assigned, for example, as part of the application process for the Kid Card. Because the kids only shopping area is within AOL, AOL is able to create the flow of the pages available to the children as they shop. Therefore, in this example, AOL guides the shopping children through the online store, displaying whatever advertisements and marketing materials deemed appropriate by AOL.
- the Kid Card can be a credit card with a predetermined limit.
- the Kid Card can be a debit card with an available balance that has been paid in advance.
- the application process for the debit Kid Card might require that a certain amount of money be prepaid on the debit Kid Card to cover any future purchases made with the card.
- the debit Kid Card no longer allows the purchase of goods. Additional funds must be paid to replenish the purchasing power of the Kid Card and allow the child to purchase additional goods.
- the Kid Card can purchase items up to a certain monetary limit. For example, if the credit limit was $200.00 then purchases equaling that amount can be made before payment is required. Additionally in this example, bills must be sent out by the company providing the Kid Card shopping service.
- a feature of one embodiment is the availability of prepaid gift cards. These cards operate on the same principle as a debit card or a prepaid phone card. For example, a parent could purchase a Kid Card for $200.00 and give it as a gift to a child. The child is then able to purchase $200.00 worth of goods with the Kid Card. The difference in this example embodiment is that when the funds are exhausted on the gift Kid Card, the level of funds cannot be replenished.
- the present invention provides a means for a consumer to order merchandise without revealing their true address to the merchant and/or shipper.
- FIG. 23 is a schematic diagram that depicts one embodiment of the disguised mailing feature in accordance with one embodiment of the present invention.
- a cardholder 200 having an alias account makes a purchase from a merchant 202 .
- the purchase can be over the telephone, over the Internet or any other computer network, or via any other means available.
- the merchant uses the alias address associated with the alias account, as described above, to ship the package.
- this alias address is a warehouse or the like, referred to herein as the disguised mailing center (DMC).
- DMC disguised mailing center
- a bin number associated with the Alias account is used to store the package in a specific location within the DMC.
- the Alias box number shown in the Mail Redirection data table 182 can be used for this purpose.
- the Alias box number is then used to generate a subscriber information request to the offline database to retrieve the true mailing address of the consumer. Once this address is obtained, the package is relabeled with the true address and sent to the consumer 208 . Preferably, this takes place within twenty-four hours to avoid any further delays to the consumer.
- the consumer is provided with a mailing label that sends the package directly back to the merchant 202 .
- the return address printed on the return label will be that of the DMC 204 .
- the relabeling process takes place by the shipper in transit.
- the shipper can contact a server 22 , which contacts the offline database with a request for address information. The shipper can then relabel the package with the true address while the package is in transit, and thereby eliminate any extra delays.
- FIG. 24 is a flow chart that depicts a process that can be used to relabel packages in accordance with one embodiment of the present invention as described above.
- the consumer orders a product using an anonymous transaction system in accordance with the present invention as described above. Accordingly, the user typically, uses an credit or debit card associated with an Alias account to purchase the merchandise.
- the merchant mails the package (or directs a shipper to mail the package), to the Alias address.
- the Alias address is a warehouse or a location referred to as a disguised mailing center (DMC).
- DMC disguised mailing center
- the bin number for set of characters is input into a relabeling system.
- the bin number is a unique set of characters which is used to correlate an anonymous name/address (i.e. pseudonym) with a real name/address.
- the bin is read into the system by scanning in a bar code or the like that comprises the bin.
- this information can be keyed by hand into the system.
- this action generates a request to a server that in turn contacts the bunker for the true address of the consumer.
- the package is relabeled with the true address, as indicated by step 258 .
- the package is shipped to the consumer in accordance with consumer preferences (i.e. overnight, no signature necessary, etc.).
- a second example of a method that can be used to relabel packages is depicted by the process flowchart in FIG. 25.
- the consumer orders a product from a merchant using an anonymous transaction system as described above.
- package is shipped using the Alias address associated with the account.
- the shipper issues a request to the bunker for the true address of the consumer. This is accomplished in a manner as described above, typically through a server 23 . Again, the Alias address or bin number in this example, is used to identify the consumer.
- the shipper receives the true address of the consumer and relabels the package with that address, as shown by step 272 .
- the package is shipped to the consumer in accordance with consumer preferences (i.e. overnight, no signature necessary, etc.).
- the anonymous mailing is accomplished by mailing the merchandise to post office box, which is rented by the credit card processing company, on behalf of the cardholder.
- the address associated with the cardholder alias name is the post office box assigned to the cardholder.
- the post office box is as close geographically, to the actual address of the cardholder.
- the cardholder picks up the merchandise from the post office box in person.
- PMS Private Mail Administration Service
- PMMC Private Mail Mapping Center
- the PMAC is accessible to customers via the Internet, telephone, and mail, although any one contact method is sufficient. Full service is preferably available through each method of customer contact.
- the PMAC obtains customer name, billing information, mail delivery address, and possibly other information. Once these data are collected and processed, the PMAC assigns a unique Private Mail Code to a customer. The code is generated by automated Private Mail Code generation process, which assigns a unique character string to be used as the Private Mail code. Next, PMAC maps the code to the customer delivery address on record. More than one code may be generated for one customer.
- any subscription data e.g., name or address
- the authentication process may use a personal identification number (PIN), password, digital certificate, written signature, or other means of positive identification.
- PIN personal identification number
- Customer service is preferably available for PMAC activities, so that account changes and customer issues may be resolved quickly after a customer's registration or other relevant transaction is processed by the PMAC, the delivery address and associated Private Mailing code is added to the PMMC and stored in its database ( 313 ). If PMAC and PMMC are physically separate from each other, a secure communication link ( 314 ) should be established between them for information transfer. All updates to the PMMC database are preferable made in real or quasi real time. A “live” data backup in another physical location (not pictured) is preferably maintained, so that the data is redundantly stored and service need not be interrupted if PMMC fail or PMAC fail.
- PMMC's main function is to provide shippers with the delivery address information associated with the Private Mail code. It includes a secure interface to allow the shippers to look up the delivery address associated with a Private Mail code. Additionally, the PMMC might handle administration functions associated with the shippers, such as access control to the PMMC, usage, and billing or payment of any transaction fees or service charges.
- the PMMC is preferably a high availability service designed for continuous 2417 operations. This will be achieved through the use of redundant equipment, multiple physical data center locations, robust disaster recovery methods, and other means designed to prevent service interruptions.
- PMMC's database is highly secure, accessible only to authorized users. At a minimum, it maintains the following data: Private Mail code, physical delivery address, authorized users, and audit trail with date/time/user associated with each access.
- the Private Mail Service is activated. Following activation, the customer has a brand new address (the Private Mailing code) assigned.
- FIG. 28 shows a flowchart of a typical transaction, which, of course, need not be a purchase, but instead may be any interaction that results in a mailing or shipping.
- the customer provides the Private Mail code to a merchant to enable the merchant to ship mail or parcels to the customer.
- the customer orders from the merchant in the usual way, but supplies only the Private Mail code as the “ship to” address.
- the merchant then fills the order and labels it for shipment using only the Private Mail code.
- the parcel is picked up by the shipper.
- the shipper a Private Mail partner, accesses the PMMC to map the Private Mail code on the parcel to the customer's physical delivery address. Once the mapping is completed, the shipper relabels the parcel, either physically or electronically, with the delivery address and completes the delivery using conventional means.
Landscapes
- Business, Economics & Management (AREA)
- Engineering & Computer Science (AREA)
- Accounting & Taxation (AREA)
- General Physics & Mathematics (AREA)
- Physics & Mathematics (AREA)
- Strategic Management (AREA)
- General Business, Economics & Management (AREA)
- Theoretical Computer Science (AREA)
- Finance (AREA)
- Economics (AREA)
- Computer Security & Cryptography (AREA)
- Marketing (AREA)
- Development Economics (AREA)
- Microelectronics & Electronic Packaging (AREA)
- Entrepreneurship & Innovation (AREA)
- Human Resources & Organizations (AREA)
- Computer Networks & Wireless Communication (AREA)
- Operations Research (AREA)
- Quality & Reliability (AREA)
- Tourism & Hospitality (AREA)
- Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
Abstract
Description
- The present application is: (1) a continuation-in-part of Peter Barton U.S. patent application Ser. No. 09/326,298 filed Jun. 4,1999, pending, which is a continuation of Peter Barton U.S. patent application Ser. No. 09/294,270 filed Apr. 19, 1999, now abandoned; (2) a continuation-in-part of Peter Barton U.S. patent application Ser. No. 10/259,190 filed Sep. 27, 2002, pending, which is a continuation of Peter Barton U.S. patent application Ser. No. 09/474,110 filed Dec. 29, 1999, now abandoned, which claims priority to Peter Barton U.S. provisional patent application serial No. 60/165,546 filed Nov. 15, 1999, now abandoned; (3) a continuation-in-part of Peter Barton U.S. patent application Ser. No. 09/474,378 filed Dec. 29, 1999, pending, which claims priority to Peter Barton U.S. provisional patent application serial No. 60/165,547 filed Nov. 15, 1999, now abandoned; (4) a continuation-in-part of Peter Barton U.S. patent application Ser. No. 09/471,744 filed Dec. 23, 1999, pending; (5) a continuation-in-part of Peter Barton U.S. patent application Ser. No. 10/284,056 filed Oct. 30, 2002, pending, which is a continuation of Peter Barton U.S. patent application Ser. No. 09/614,302 filed Jul. 12, 2000, now abandoned, which is a continuation-in-part of Peter Barton U.S. patent application Ser. No. 09/471,744 filed Dec. 23, 1 999, pending; and (6) a continuation-in-part of Henry Tsuei, Stephen Wells, and Lynn Holm Blagg U.S. patent application Ser. No. 10/______ filed Dec. 27, 2002, titled “Systems and Methods for Anonymous Payment Transactions,” pending, which is a continuation of Henry Tsuei et al. U.S. patent application Ser. No. 09/476,175 filed Dec. 30, 1999, now abandoned, which claims priority to Henry Tsuei et al. U.S. provisional patent application serial No. 60/1 64,169 filed Nov. 9, 1999, now abandoned. Priority is claimed in the present application to each of these applications, and each is hereby expressly incorporated by reference herein.
- 1. Field of the Invention
- The field of the invention relates to systems and methods for facilitating, providing, and/or enabling anonymous transactions. In particular, the field of the invention relates to anonymous authentication of customer profile information to an authorized requester, including authentication of customer profile information related to children, and to consumer privacy protection when ordering merchandise by mail by not having to reveal consumer personal information to the merchant and/or shipper.
- 2. DESCRIPTION OF RELATED ART
- Consumer privacy is becoming a focus of major public interest, especially as computing capacity increases and data handling and storage become easier and less expensive, and information databases are assembled to host a myriad of transactional information. This information, which may be gathered from a number of sources, is stored, categorized and sold. A prime information target is the retail transaction.
- For example, for each credit card transaction, an issuer bank's computer system can store the merchant's name, the product purchased, and the amount of the transaction. The issuer bank or credit card company can use the collected information to determine the spending habits of their credit cardholders and then either use that information in its own business or make it available to others. In addition to the information stored in the issuer bank's computer system, as a consequence of a credit card transaction, the individual merchants receive information from the issuer bank about the credit cardholder. This information can be used to provide targeted marketing directed to the credit cardholder, or to provide others with information about the consumer's buying habits.
- Membership cards, club cards and credit cards which link a transaction to an individual's database, reveal the purchase, the time of day of the purchase and the retail outlet. This information is then tied to a demographic which is sold to the direct marketing industry. In many cases these databases actually invade a person's privacy and are almost transparent to the unwitting consumer.
- The consequences associated with the availability of an individual's spending information range from the merely annoying to the serious. At a minimum, an individual may receive more targeted junk mail than may be desired. More seriously, the same information that is used to target the individual for junk mail can also be used to target the individual for private or governmental harassment. For example, an issuer bank may choose to sell its customer list, with indicia that identifies all credit cardholders that have purchased sporting equipment, to retail sporting good companies. These companies may then inundate a credit cardholder with mail or other forms of advertisements. In a more serious situation, the issuer bank may sell its list of customers that have purchased certain goods (for example, furs or steaks) to activist groups that oppose the purchase of such items. These groups may then use the customer list to expose the credit cardholder to all sorts of harassment and perhaps physical injury.
- One way an individual can avoid this problem is to pay for everything with bearer notes such as cash, since nothing on a bank note indicates who its owner is or was. This same property, however, makes cash fungible for both the owner and the thief. It is both easy to lose and easy to negotiate. For these reasons, few people desire to carry a large amount of cash. One way of solving this difficulty is to use electronic cash, as described in David Chaum, “Security without Identification: Transaction Systems to make Big Brother Obsolete,” Communications of the ACM, vol. 28, no. 10, pp. 1030-144, October, 1985. When electronic cash is used in an automated transaction, a purchase cannot be associated with a customer. The scheme, however, may be insecure against fraud; see Steven H. Low, et al., “Collusion in a Multi-Communications Protocol for Anonymous Credit Cards” submitted to IEEE/A
CM 50, Transactions on Networking. In addition, since the electronic cash is given to a customer, a means is needed to prevent the individual from duplicating and spending it over and over again. - Apart from the opportunity to gather consumer information that arises from the use of a credit card or the like, consumer information also may be gathered when shipping information is provided to a merchant or other third party. It is therefore also desirable to protect the identify of consumers when ordering merchandise over the telephone or the Internet, or by any other means, when such merchandise is to be shipped to the residence or business of the consumer. Currently, the consumer generally has no choice but to give a proper mailing address to the merchant in order to receive the shipped goods. One solution to this problem is to use post office boxes. However, this solution is often expensive, inconvenient and/or requires the use of the consumer's real name.
- Accordingly, a need exists for systems and methods for performing transactions that have the convenience and safety of card transactions, such as credit card transactions, and the anonymity of cash transactions. A need further exists for systems and methods for protecting the identity of consumers” names and addresses when a transactions include shipping or mailing to consumers. On or more of these needs are met by one or more embodiments of the present invention.
- The present invention comprises systems and methods for protecting consumer information by providing for, facilitating, and/or enabling anonymous transactions.
- In systems and methods, a service provider or merchant representing an information requester is able to authenticate customer related information and/or records which reside in a secure, offline database without the true identity of a customer being revealed. In these systems and methods, the present invention provides an automated, inexpensive system and method for the confirmed request, processing and confirmed transfer of anonymous customer or subscriber related authentication among service providers and/or information requesters. These systems and methods preferably utilize a software and hardware system to facilitate centralized offline customer identity and business information authentication, while maintaining the anonymity of the customer. This advantageously allows a service provider or information requester to easily and inexpensively authenticate customer related business information without the true identity of the customer being revealed to the service provider. Thus, a benefit of these systems and methods is that the actual transaction is not associated with the true identity or demographics of the customer.
- Another benefit of these systems and methods is that a highly efficient system and method is provided for requesting, processing, and anonymously authenticating customer or subscriber related identification and business information between the service provider or information requester and the secure, central database repository. In one aspect of these systems and methods, this comprises an information hub which includes an interactive server and a database. For example, in one embodiment, the database contains a lookup table which blinds the database from the server. Preferably, the coded or addressed anonymous customer identification confirmation or authentication system of the present invention employs an offline central consumer information database or repository, in communication with service providers or information requesters.
- These systems and methods also provide for the processing and authentication of requested, specifically identified customer profiles, without identifying the true identity of the customer, and without revealing any business or transaction information to the service provider or information requester. In a preferred embodiment, the authenticity of the information requester is verified prior to responding. Thus, one feature of these systems and methods is that there is a blinding or “bunkering” of any attempt by unauthorized information requesters to cross check against a known transaction to match the alias of the customer or subscriber with the true identity of the customer or subscriber.
- Another advantage of these systems and methods is that a service provider or information requester having a system authorization code can electronically request, process and confirm the validity of an anonymous customer's information and/or records. This can be done, for example, from a secure data repository by means of a hardware/software system. Preferably, the hardware/software system is comprised of an offline database and a central server comprising an information processing hub. In this example embodiment, the information processing hub communicates with each service provider or information requester via a communication link.
- A feature of these systems and methods is that a confirmed authentication of uniquely identified and stored information between an authorized requester and the database repository is triggered by the use of a unique, assigned alias identifier. For example, the requested subscriber or customer records and/or business information are uniquely identified by means of an alias identification of the customer, which can be alphanumeric, digital, analog or the like. In one embodiment the system can authenticate the existence of the customer alias as relating to the true identity of an individual subscriber.
- In another embodiment, authenticated coded triggers are used to release a predetermined portion of the data including, for example, the true identity of the subscriber, to an information requester having authorization for that clearance. In accordance with this embodiment, preferably the information is encrypted. In one aspect, an alphanumeric code is used to identify files within the uniquely addressed customer information profiles. In a preferred embodiment, the system of the present invention confirms requests for authentication to maintain the integrity of the system and the anonymity of the subscriber or customer. In another embodiment the authentication is protected by encryption and a digital signature of the information requester or by use of an authentication code such as a PIN or the like.
- In a preferred embodiment, personal or business records and/or information related to a particular subscriber maintained within the offline database can include at least part of at least one subscriber's profile. In one aspect subscriber profiles consist of the subscriber's physical address, social security number, credit limits, email address, and the like.
- In accordance with another preferred embodiment, a single centralized offline database or repository is provided in communication with a central processing server. For example, the central processing server acts as a “gatekeeper” to maintain the secrecy of the customer's true identity. In another embodiment, a plurality of servers communicate with the service providers and in turn with a central server in a multi tiered system.
- In another aspect of these systems and methods, a computer implemented method is disclosed for providing authentication to an authorized information requester. For example, the information requester may b provided with authentication of the existence of coded, uniquely identified personal business type records and/or information relating to a particular anonymous subscriber or customer. In a preferred embodiment, the records or information are contained in a “blinded” offline database that communicates with each authorized information requester by means of a central processing server. The method, for example, may be accomplished by the subscriber information requester initially generating an authorized formatted request for authentication of the uniquely identified records and/or information related to a particular anonymous subscriber or customer using an alias that retains the anonymity of the subscriber or customer. The method also includes transmitting the request to a confirming central processing server with access to an offline database via the communication link. Additionally, the method includes receiving the formatted request, authenticating the authorization of the information requester and confirming receipt of the formatted request by the central system database. The method also includes processing the request of the subscriber or information requester by blinded communication with the database, generating a formatted response in the database authenticating the alias or denying the alias, transmitting the response, and formatting a server response to the service provider or information requester via the communication link. In one example embodiment, the formatted response to the subscriber or information requester can comprise a denial of the request, an authentication or an authenticated informational compliance. Additionally, the informational compliance can be full or partial. In a preferred embodiment, the requester is logged into the central server. For example, if the information requester is not authorized to address the offline database, the identification of the customer or subscriber is blocked and the information requester is denied further communication. In this example, such a formatted response is a denial of authentication.
- In accordance with preferred embodiments of these systems and methods, a medium is provided which contains a unique identification that is either anonymous or an alias with respect to the true identity of the subscriber and/or customer. For example, the medium can be in the form of a standard plastic card with a magnetic strip containing the encoded information or alias information, or it can be in the form of a smart card that has an encoded chip. Thus, for example, the medium can be a credit card issued by, for example, American Express, VISA or MasterCard. Alternatively, in addition to the card, there may be an alias I.D., such as a picture I.D., that authenticates the anonymous code for the user. In an example embodiment, a personal identification number (“PIN”) can be used such that the user of the medium would be required to enter a PIN on a keypad or the like, to authenticate the anonymous code. A benefit in these examples is that the user of the medium remains totally anonymous to the service provider or requester. Also in these embodiments, the service provider authenticates the transaction by means of an electronic connection such as telephone wires or the Internet to one or more centrally based processing servers in communication with the offline database as previously described.
- In accordance with other systems and methods of the present invention, a credit or debit card that makes limited purchasing power available to children is provided (herein referred to as a “Kid Card”). Preferably, the transactions performed with the Kid Card are anonymous. A child that purchases an item over the Internet, for example, can use the Kid Card to pay for the item. When real time approval is sought by the entity processing the transaction, rather than using true identity data to authenticate the transaction, an alias set of information is used. This alias set of information is compared to an offline secure database that compares the alias information to the true identity data and authenticates the transaction. In this example, the true identity of the purchaser is thus never compromised and therefore never available to the processing company for inclusion on a demographic list or the like. In features of these systems and methods, the products available for purchase with the Kid Card are subject to parental control and children are guided by a hosting entity through an Internet shopping experience by presentation of selected Web pages.
- Other systems and methods of the present invention are specifically directed to protecting the identity of a credit cardholder, whereby the cardholder can enter into credit card transactions in complete anonymity. Since the cardholder's identity is protected, the cardholder has the freedom to purchase any goods or services without worrying about receiving unwanted mailings or being personally harassed. Briefly described, these systems and methods allow the establishment of two credit cards with a line of credit that is split across two accounts, i.e., a primary account and an alias account. The primary account is a conventional credit card account constructed in a credit card processing system using the factual information provided by an applicant for a credit card. The primary account is the account used for reporting and investigating the applicant's credit worthiness and establishing credit. The alias account is constructed using security information submitted by the credit card applicant, and information from an associated primary account. The alias account is constructed in a secure database and is identified with an alias name and address. The secure database is preferably maintained in a secure facility or vault operated by an independent third party, for example a privacy foundation that is not beholden to credit card companies or to merchants. The vault maintains the identity of the alias account holders; the identities are not disclosed to others except under certain limited conditions. Once primary account is constructed in the credit card processing system, the primary account information is then transferred to the vault. The vault matches the transferred primary account information with the associated security information submitted by the applicant. As a result of matching the primary account and security information, an alias account is constructed in the vault. The vault then transfers the alias account information to the credit card processing system, and the credit card processing system creates a corresponding alias account. The credit card associated with the primary account is used and processed like any other credit card. The credit line for the primary account is established as some portion of the credit line approved during the application process. A remaining portion is assigned to the alias account.
- The credit card associated with the alias account is also used like any other credit card, but a number of the credit card processing functions are handled in a different manner from other credit card accounts. The credit card transactions associated with the alias account are processed on the credit card processing system with the alias information (i.e., alias name and address). Therefore, the anonymity of the cardholder is maintained. When the real identity of the cardholder is required to support a credit card processing function, for example issuing the credit cardholder a statement for billing purposes, a mailing address is retrieved from the associated alias account in the vault and associated with the statement for the alias account. For example, the alias account statement is transferred to the secured database or facility to have the real identity of the cardholder determined before the statement is mailed.
- In yet further systems and methods of the present invention a means is provided for consumers to order merchandise via telephone, the Internet, or any other means, to be shipped to their business or residence, without having to reveal their true address to the shipper and/or merchant. This is accomplished by relabeling the packages with the true address of the consumer sometime after the packages are shipped by the merchant. This is preferably, but not necessarily, accomplished in conjunction with anyone of the anonymous transaction systems and methods set forth above using one of at least two techniques. The first technique involves shipping the packages to a temporary location where the true address is relabeled on behalf of the consumer using information from the offline database. The second technique involves having the shipping company relabel the packages while in transit by communicating through a secure network connection to the offline database. In response to a valid authorization request, the offline database returns the true address to the shipper. Preferably, this process is automated and is implemented using wireless technology while the package is in transit.
- Finally, other systems and methods of the present invention include a private facility for mailings of packages and items, wherein these packages and items are shipped to a temporary location where the true address is relabeled on behalf of the consumer. In these systems and methods. The relabeling is preferably, but not necessarily, accomplished in conjunction with anyone of the anonymous transaction systems and methods set forth above using one of at least two techniques using information from the offline database. Preferably the private facility administers the database, registers the customers, and assigns the mail codes to the registered customers before this anonymous mailing and relabeling service is started. Alternatively, the shipping company preregisters with the private facility that administers the database and receives access to a secure network connection with the offline database. The shipping company in possession of a package labeled with a mailing code sends a valid authorization request, including the mailing code, to the offline database through the secure network connection. The private facility verifies the authorization request and returns the true address of the customer to the shipping company, thus enabling the shipping company to deliver the package directly to the customer. Preferably, this process is automated and is implemented using wireless technology while the package is in transit.
- In a related aspect of these systems and methods, the present invention provides a means for a person or entity to receive mail or parcels from a sender (e.g., a merchant) anonymously. For example, the contact with the sender can be via telephone, the Internet, or any other means. The sending may, but need not be, in connection with a commercial transaction (e.g., a sale or purchase) or involve the shipping of ordered goods as described above. Thus, the item can be shipped to their business or residence, without having to reveal their true address to the shipper and/or merchant. The mail or parcel is shipped to a mailing code and relabeled with the true address of the consumer sometime after shipment by the sender. In cases where the item is sent as part of a commercial transaction, this is preferably accomplished in combination with the anonymous transaction systems and methods set forth above.
- In embodiments of the systems and methods involving anonymous or disguised mailing or shipping, the mailing code assigned can include limited non identifying information. For example, the code may be formatted similarly to a zip code, in that the code or a portion of the code corresponds to a geographic area or political subdivision. Thus, for example, the code may correspond to a postal zip code area or group of zip code areas, a city, a county, a state, or other suitable area. Also, the readdressing may be physical or electronic, or a combination of the two. Thus, for example, the readdressing may be by affixing or otherwise physically associating, a legible address with or without name, by affixing or otherwise physically associating a machine readable form of the address, e.g., a bar coded or magnetic strip address, by affixing or otherwise physically associating a translatable, machine readable address (e.g., that is translated within a special or general purpose computer), by affixing or otherwise physically associating an access identifier enabling electronic access to sufficient identifying information (preferably on screen or other display) for delivery to the customer or other intended recipient, or by using the mailing code to allow (preferably with additional authorization code) remote electronic access to specific delivery information, preferably during the course of a delivery run. For example, delivery information may be displayed on a computer in a delivery truck or on a handheld computer. Remote access may be by any suitable means, e.g., by telephone (preferably mobile telephone) and/or via satellite communications link, which may involve internet transmission.
- These and other features, and advantages of the present invention may be more clearly understood and appreciated from a review of the following detailed description and by reference to the appended drawings and claims.
- FIG. 1 is an example of a schematic view of an information flow model that can be used in accordance with one embodiment of the present invention.
- FIG. 2 is an example of a schematic view of an information flow model that can be used with one embodiment of the present invention having a central processing server and an offline database.
- FIG. 3 is a block diagram illustrating an exemplary account setup in the alias account system of the present invention.
- FIG. 4 is a block diagram illustrating a typical credit card transaction using the credit cards of the present invention.
- FIG. 5 is a block diagram illustrating an upgrade of an existing account to an alias and primary account, in accordance with the present invention.
- FIG. 6 is a general block diagram illustrating an embodiment of the alias account management process of the present invention.
- FIG. 7 is a timing diagram illustrating an example of an issuer's credit exposure when a credit limit increase is processed using the account management process of FIG. 6.
- FIG. 8 is a block diagram illustrating a process for performing non mon updates, such as name and address changes, in the alias account system of the present invention.
- FIG. 9 is a block diagram illustrating the account closing process in the alias account system of the present invention.
- FIG. 10 is a block diagram illustrating an overview of the statement printing process of an embodiment of the present invention.
- FIG. 11 is a general block diagram illustrating an embodiment of the alias statement process.
- FIG. 12 is a block diagram illustrating the databases employed in the vault and their associated relationships.
- FIG. 13 is a table setting forth fields contained in a Matching Database in a preferred embodiment of the present invention.
- FIG. 14 is a table setting forth fields contained in a Temporary Database in a preferred embodiment of the present invention.
- FIG. 15 is a table setting forth fields contained in an Account Block Database in a preferred embodiment of the present invention.
- FIG. 16 is a table setting forth fields contained in an Issuer Database in a preferred embodiment of the present invention.
- FIG. 17 is a table setting forth fields contained in a Mail Redirection Database in a preferred embodiment of the present invention.
- FIG. 18 is a flow diagram illustrating an overview of the host and vault process flow in an embodiment of the present invention.
- FIG. 19 is a flow diagram illustrating the account acquisition process of an embodiment of the present invention.
- FIG. 20 is a flow diagram illustrating the account maintenance process in an embodiment of the present invention.
- FIG. 21 is a flow diagram illustrating the collections process in an embodiment of the present invention.
- FIG. 22 is a flow diagram illustrating the mail redirection process in an embodiment of the present invention.
- FIG. 23 is a schematic diagram that depicts one embodiment of the disguised mailing feature in accordance with one embodiment of the present invention.
- FIG. 24 is a flowchart depicting methods that can be used to implement the disguised mailing feature in accordance with an embodiment of the present invention.
- FIG. 25 is a flowchart depicting methods that can be used to implement the disguised mailing feature in accordance with an embodiment of the present invention.
- FIG. 26 illustrates information flow during package delivery using the private anonymous mailing service of the present invention.
- FIG. 27 is a flowchart of the customer registration process used in the private anonymous mailing service of the present invention.
- FIG. 28 is a flowchart of the merchandise shipment process in accordance with the private anonymous mailing service of the present invention.
- After reading the following description, it-will become apparent to one of ordinary skill in the art how to implement the invention in alternative embodiments and alternative applications. Moreover, other examples for blinding interaction and transaction will readily come to mind, once the inventive aspect of the instant invention is understood. Although the instant system can be used to blind customer profiles from a service provider for a number of applications, credit card transactions will be used as a specific example for ease of understanding. As such, this detailed description of a preferred and alternative embodiments should not be construed to limit the scope or breadth of the present invention, which be used, for example, with telephone cards, frequent flyer club cards, grocery store cards and the like.
- For purposes of this Section I, a “Subscriber” is an entity who subscribes to a transaction based service and whose data is in the offline database.
- A “Service Provider or Information Requester” is an entity with which the particular Subscriber is consummating a transaction. Service Providers could be, for example, local retailers, banks, travel agencies and the like.
- “Subscriber ID” is an alias system identifier that can be used as an alias or a code to uniquely identify a particular Subscriber and corresponding records.
- “Subscriber Profile” or “Service Profile” means customer related business information and/or records such as a particular Subscriber's financial information, or address.
- “Subscriber Related Business Information Request” is a request from a Service Provider for authentication of all or part of a particular Subscriber Profile or Service Profile. The Profile preferably contains readable system code allowing the system to verify that the requester is part of the system.
- A “Subscriber Related Business Information Request Response” is a response to a Subscriber Related Business Information Request. For example, the Response could be a listing of all or part of a particular Service Profile, an authentication of a Subscriber's identity, or a denial of such information. In a preferred embodiment, the Response is encrypted. A Subscriber Related Business Information Request Response can also include a “Transaction Authorization” or “Confirmation Request” such as used in the credit card industry.
- Briefly described, and in accordance with a preferred embodiment in operation, an information hub housing a central server receives a request for authentication from a service provider or information requester. In this example embodiment, the central server verifies that the service provider or information requester is authorized to obtain authentication for the transaction or the requested information from the database. Upon verification of the validity of the request, the central server queries database for authentication of the anonymous customer. The database contains, for example, a lookup table that links the anonymous identification of the medium card holder, for example, a credit card holder, to the true identity of the card holder. In this example embodiment, the lookup table functions a barrier between the system traffic and the stored identity information. Continuing with the example, if the information requested matches the search in the lookup table, a verification response is generated by the central server to authenticate the transaction.
- Turning now to FIG. 1, there is shown a schematic of a preferred embodiment of the alias method and
system 20 of the instant invention. This preferred embodiment comprises a number of Service Providers orInformation Requesters 21, each communicating with a system server/database 22 by means of apreexisting communication link 23, such as the public telephone system. A Subscriber Profile data and/or authentication is relayed to a requestingService Provider 21 through the system server/database 22, in computer accessible code, via the communications link 23. The information flow is virtually instantaneous, and the response information puts the necessary information in the hands of the Service Provider orInformation Requester 21. This information is preferably delivered in a usable form, expediting the transaction. The system server/database 22, for example, represents a centralized information hub having apreexisting communication link 23 for the purposes of receiving, authenticating and transmitting information toService Providers 21. In an alternative embodiment, the central information hub comprises more than one physical element. For example, a multi tiered server system (not shown) may be practical in some applications. Furthermore, a public communications system is not necessary to link thesystem server database 22 to theService Providers 21. The communications link 23 may alternatively be a private leased line, a local area network, cable TV network, or the Internet. In this preferred embodiment, the system server/database 22 comprises a server and an offline database as more fully described below in relation to FIG. 2. - Turning to FIG. 2, there is shown an example of a preferred information flow of the alias method and
system 20. In FIG. 2, the transfer of a Subscriber's authentication or Subscriber Profile information between the Service Provider or Information Requester and the offline centralized database is shown. Preferably, the system server is accessible to allService Providers 21. For example, theService Providers 21 can access theSystem Server 22 by merely addressing the alias customer information profile by means of the Service Provider's identification through the communication link. - As further shown in FIG. 2, the
system 20 comprises an authorizedService Provider 24, aSystem Server 26, anoffline database 28, and an interconnecting communications link 30. The communications link 30 connects the Service Provider anddatabase 28 with theserver 26. Preferably, all communication takes place over communications link 30. The process boxes or units in FIG. 2 represent execution steps for creating, transferring and confirming information betweenService Provider 24,server 26, andoffline database 28, all of which is described now in greater detail. - First, Service Provider or
Information Requester 24, by means ofunit process 33, generates a Subscriber Related Business Information Request 32. The request is generated in a specified format and includes an informational header. This header includes, for example, the Subscriber's alias, PIN or other anonymous inquiry keys and information. Additionally, the header may include address information and a formatted message portion comprised of, for example, the date, time, and amount of the transaction. The data used to generate the Subscriber Related Business Information Request 32 can be provided in more than one way. A first example of a method for creating the Subscriber Related Business Information Request 32 is by using an application Graphical User Interface, preferably written in Java. In one embodiment, the Graphical User Interface provides the user with input fields for all elements of the Subscriber Related Business Information Request 32, including input fields for theService Provider 24. Additionally, the Graphical User Interface can perform input validations, convert the input data into a binary stream using Java serialization, and store the document. For example, the document can be stored in binary object form in the Service Provider or Information Requester's 24 relational database AA second example of a method for creating the Subscriber Related Business Information Request 32 is through the use of the Client Integration Subsystem. In a preferred embodiment, the Client Integration Subsystem is a configurable set of services and infrastructure. These services can be written, for example, in the C++ and Java programming languages, which allow an organization to “plug in” their existing systems to automatically generate a Subscriber Related Business Information Request 32 in accordance with the present invention. This, for example, is the coded information in a credit card transaction that authorizes a merchant's request and identifies the return path I In either example embodiment, the resulting document is stored in the Service Provider or Information Requester's 24 relational database coupled with additional document information. Such information could include date and time stamps, document state information, creating user identification, and the like. Furthermore, this information could be linked to a particular Subscriber Related Business Information Request 32 and simultaneously stored along with the Subscriber Related Business Information Request 32. Preferably, the date and time stamps are used to determine whether the request is sent and received within the industry allotted time period. This, for example, would prevent hacking through the use of different requester locations attempting to obtain client Subscriber Related Business Information in theoffline database 28. Additionally, the user identification information is preferably used by theSystem Server 26 and theoffline database 28 to help verify the validity of the Subscriber Related Business Information Request 32. This can be done, for example, by determining that the Subscriber Related Business Information Request 32 was sent by an authorized Service Provider or information Requester 24 I In this example, when the Subscriber Related Business Information Request 32 is completed by entering the necessary data, it is marked as ready to be sent. Conversely, if the Subscriber Related Business Information Request 32 is not completed, for example, due to missing data, it is marked for review and stored until the Subscriber Related Business Information Request 32 data is entered into the Subscriber Related Business Information Request 32. Preferably, this prevents overriding the system by not having a complete request. This is important, for example, when service information provider orinformation requesters 24 are given security codes allowing access to differing information and/or levels of information. - In a preferred embodiment, once created, the Subscriber Related Business Information Request32 is prepared to be sent to the
System Server 26 by means of unit process 34 via communications link 30. An example of the aspects of unit process 34 include application of the digital signature, data encryption, alias and attaching the routing information. For example, the Subscriber Related Business Information Request 32 carrying the alias identifier is encrypted by an encrypting service. In one example embodiment, the encrypting service utilizes Pretty Good Privacy encryption with the System Server's 26 public key. In one embodiment, an online service can be used or alternatively, the software can be downloaded from www.MIT.edu for inclusion in process 34. Continuing the example, the document is digitally signed using the Service Provider's 24 private key. Preferably, this private key has been previously configured by the system administrator. The Subscriber Related Business Information Request 32 is sent to theserver 26 usingcommunication link 30. Various systems can be used to connect the Service Provider orInformation Requester 24 to theSystem Server 26. For example, the message can be sent either via X400 protocol or using a virtual private network protocol. Preferably, the choice is based on the configuration implemented by the generating entity's system administrator, based on system requirements for response times and cost of implementation. Preferably, the data is sent over an existing communication system such as the Internet or a Virtual Private Network. A lookup of theSystem Server 26 destination address in the Service Provider or Information Requester's 24 database is performed. Preferably, the process 34 appends the appropriate routing information for the transmission type used by the generating entity system. A fully qualified Internet address is an example of appropriate routing information. - The Subscriber Related Business Information Request32 is received by
Server 26 from Service Provider orInformation Requester 24. This is accomplished by means ofunit process 36 via communications link 30. In one embodiment, the system is activated by data being received. Preferably,unit process 36 includes steps for receiving the message, authenticating the signature on the message and responding to the sender if the signature is valid. For example, upon receipt of a Subscriber Related Business Information Request 32, theserver 26 first logs the receipt and then authenticates the digital signature. Withinprocess 36 an interim file representation of the document is created, after extracting the document from the transport mechanism and stripping off header information. The file is then stored in a system defined, file system directory. Subsequently, the document digital signature is verified using the Pretty Good Privacy signature authentication service based on the sender's public key, which is retrieved via the previously configured information in the Pretty Good Privacy security database. Continuing the example, if the signature is authentic, the Subscriber Related Business Information Request 32 is decrypted using the Pretty Good Privacy decryption software and stored. Preferably, a verification of receipt message 38 (shown in dotted lines) is sent back to Service Provider orInformation Requester 24 via thecommunication link 30. In a preferred embodiment, the Service Provider orInformation Requester 24 verifies the sender as theSystem Server 26. In an example embodiment, the validity of the Subscriber Related Business Information Request 32 is based on several criteria. Preferably, if the Subscriber Related Business Information Request 32 is not authentic, the Request 32 is not honored. For example, in one embodiment, the invalid Request 32 is first returned to the Service Provider orInformation Requester 24 via theCommunications Link 30. Then, a message is sent noting the receipt of an invalid Subscriber Related Business Information Request 32. Furthermore, receipt of the invalid Subscriber Related Business Information Request 32 is logged by theSystem Server 26. Preferably, the address of the invalid Service Provider orInformation Requester 24 thereafter is blocked from thesystem 20 and the information pertaining to the unauthorized Service Provider orRequester 24 is maintained in thesystem 20 for future reference. - Valid Subscriber Related Business Information Requests32, received by the
Server 26, are processed in accordance withunit process 41. For example, the processing includes decrypting the message and preparing the message for forwarding to theoffline database 28. Preferably, a message header is appended to the message and a document timer is activated to track the time until theSystem Server 26 receives a request response from theoffline database 28. To process the Subscriber Related Business Information Request 32 in accordance withunit process 41, theSystem Server 26 preferably records receipt of the Subscriber Related Business Information Request 32 into the System Server's 26 relational database. In this same embodiment, the Subscriber Related Business Information Request 32 is marked as received by theSystem Server 26. Furthermore, theServer 26 can also be configured to execute certain user defined operations which are triggered during this processing depending upon the nature of the Subscriber Related Business Information Request 32 as further described below. For example, if the request is a credit card transaction, certain information may be forwarded to the issuing bank after database manipulation as further described below. In one embodiment, the document file is read in by the Server's 26 document handler, decrypted, and the document is then stored in theServer 26. For example, a document handler rules engine is used to process the document in accordance withunit process 41. Based on a user defined rules set, preferably stored in an ASCII text file, a rules agenda is created based on the contents of the document. In this example, the rules engine matches patterns in the rules conditions with the document and executes actions associated with the conditions. Examples of actions include updating database tables, modifying/transforming the document header information, and adding additional/alternative document routing instructions. Preferably, a timer is activated by storing a new record with Subscriber Related Business Information Request 32 information in the timer table. - Subscriber Related Business Information Requests32, thus processed, are forwarded to
offline database 28 by means ofunit process 43 viacommunication link 30. An example embodiment ofunit process 43 includes the steps of encrypting the message, digitally signing the message, and sending the message to theoffline database 28. Preferably, the functions required to prepare a document for forwarding are based on the type ofService Provider 24 from which the Subscriber Related Business information Request 32 is received.Offline database 28 has authority and access to the data required to respond to the Subscriber Related Business Information Requests 32, i.e., create a Subscriber Related Business Information Request Response. - The
offline database 28 receives, logs, and authenticates the Subscriber Related Business Information Request 32. For example, in unit process 44, theoffline database 28 receives the message, the signature on the message is authenticated and a response is sent to theSystem Server 26 if the signature is valid. In this manner only theServer 26 can access theoffline database 28. Specifically, unit process 44 creates an interim file representation of the document after extracting the document from the transport mechanism and stripping off header information. Here, the priority code is interpreted so that the appropriate information from the lookup table can be retrieved. Continuing the example, the Subscriber Related Business information Request 32 is stored and the appropriate customer related information is coupled with the document header. Preferably, the file is stored in a system defined file system directory. Subsequently, the digital signature is verified using the Pretty Good Privacy signature authentication service based on the sender's public key, which is retrieved via previously configured information in the Pretty Good Privacy security database. If the signature is authentic, the document is decrypted using the Pretty Good Privacy decryption software based on the Server's 26 private key data. Once the document is decrypted, the header information is separated from the Subscriber Related Business Information Request 32 and the Subscriber Related Business Information Request document 32 is stored. A message 38 (shown in phantom) acknowledging the receipt of the Subscriber Related Business Information Request 32 is then sent by theoffline database 28 to theServer 26 via communications link 30. Preferably, Erroneous Subscriber Related Business Information Request 32 receipts are logged and theServer 26 is notified viamessage 38. In this manner only requests fromServer 26 are accepted for processing. - Once the Subscriber Related Business Information Request32 is processed as set out above in unit process 44 by
offline database 28, it is processed in accordance with unit process 46. An example of the method steps within unit process 46 includes: the Subscriber Related Business Information Request 32 is decrypted, the document is stored into theoffline database 28 and the Subscriber Related Business Information Request Response 47 is created. For example, theoffline database 28 formats the data into a document message and theoffline database 28 appends reader information such as routing and document type to the message. Additionally, the subscriber Related Business Information Request 32 is stored in theoffline database 28. When the Subscriber Related Business information Request 32 has been processed, theOffline Database 28 responds. For example, theOffline Database 28 sends a Subscriber Related Business Information Request Response 47 back to the Service Provider orInformation Requester 24 through theSystem Server 26 via communications link 30. Preferably, the Subscriber Related Business Information Request Response 47 is generated in accordance with unit process 46. In one example, the Subscriber Related Business Information Request Response 47 is prepared using an application Graphical User Interface preferably written in Java. The Graphical User Interface preferably provides the user with input fields for all elements of the Subscriber Related Business Information Request Response 47, including input fields for the Service Provider orInformation Requester 24. Preferably, the Graphical User Interface performs input validations, converts the input data into a binary stream using Java serialization, and stores the document in binary object forth into the offline database's 28 relational database. The document is stored into the offline database's 28 relational database. The document may be stored with additional document information such as date and time stamps, document state information, creating user identification and the like which are linked to a particular Subscriber Related Business Information Request Response 47. Preferably, the document state information is used by the system to determine whether the Subscriber Related Business Information Request Response 47 is ready to be transferred to theSystem Server 26. Additionally, the user identification information is used by theSystem Server 26 to help verify the validity of the Subscriber Related Business Information Request Response 47 by determining that the Subscriber Related Business Information Request Response 47 was sent byoffline database 28 or an entity having access to the subscriber information and authority to disseminate authentication or information. When the Subscriber Related Business Information Request Response 47 is completed by entering the necessary data, it is marked as ready to be sent. Conversely, if the Subscriber Related Business Information Request Response 47 is not completed due to missing data, it is marked for review and stored until the Subscriber Related Business Information Request Response 47 data is entered into the Subscriber Related Business Information Request Response 47. If appropriate, a message is sent to theServer 26 requesting additional information be placed in thedatabase 28 to fill the request. - After Subscriber Related Business Information Requests Response47, has been processed, it is forwarded to
System Server 26 by means ofunit process 48 viacommunication link 30. For example, withinunit process 48, Subscriber Related Business Information Requests Response 47 is encrypted, digitally signed, and sent to theServer 26. After processing, the Subscriber Related Business Information Request Response 47 is preferably stored in the relational database coupled with additional information such as date and time stamps, and user identification. - After the Subscriber Related Business Information Request Response47 is by the
System Server 26, it is handled in accordance withunit process 50. Withinunit process 50, theSystem Server 26 receives the Subscriber Related Business Information Requests Response 47, the signature on the Subscriber Related Business Information Requests Response 47 is authenticated, and aresponse 38 is sent to theoffline database 28 if the signature is valid. Preferably, the Subscriber Related Business Information Request Response 47 is acknowledged bymessage 38 to theoffline database 28 vialink 30 and its receipt is logged. The Subscriber Related Business Information Request Response 47 then is processed byServer 26. An example of this processing includes authentication of the Subscriber Related Business Information Request Response 47 and validation of the intendedService Provider 24 address. Additionally, the receipt event is logged. Preferably, the document is decrypted as above described and checked against existing Subscriber Related Business Request 32 for a match. For example, Subscriber Related Business Information Request Response 47 match errors and destination errors are logged and notifications sent back to theoffline database 28. Furthermore, therespective unit process 50 creates an interim file representation of the document after extracting the document from the transport mechanism and stripping off header information. In this same example, the file is stored in a system defined file system directory, which preferably is a persistent storage mechanism. - After the Subscriber Related Business Information Request Response47 response is received by
Server 26, it is processed as shown byunit process 52. Such processing, for example, includes storing the document, logging its receipt and managing the timers associated with the original request. For example, withinunit process 52, an ID is matched against the initial request sent, the message is stored into theSystem Server 26 database, the document timer is deactivated, the Subscriber Related Business Information Requests Response 47 is prepared for forwarding to the requestingService Provider 24 and a message header for sending Subscriber Related Business Information Requests Response 47 to the requestingService Provider 24 is appended. Preferably, the Subscriber Related Business Information Request Response 47 receipt is logged and the document state is set to “complete.” Such a setting indicates that the Subscriber Related Business Information Request Response 47 is ready, for example, to be encrypted, signed, and forwarded to the Service Provider orInformation Requester 24, as represented by unit process 54. In the preferred embodiment, the document file is read in by the Server's 26 document handler process and the document is then stored in theServer 26. The Document Handler Rules Engine is then activated to process the document. For example, a rules agenda is created based on the contents of the document. The rules engine matches patterns in the rules conditions with the document and executes actions associated with the conditions. The rules match the Subscriber Related Business Information Request Response 47 by document identifier information with the Subscriber Related Business Information Request 32. Preferably, the system timer that was created when the document was originally received by theserver 24 is deleted from the server timer table. Subsequently, in this example, the destination for the Subscriber Related Business Information Request Response 47 is validated and any erroneous Subscriber Related Business Information Request Responses 47 are logged. Preferably, the Document Handler process modifies the Subscriber Related Business Information Request Response 47 header information for document transmission status and stores the information to the database. - The Subscriber Related Business Information Requests Response47 is sent to the
Service Provider 24 using thecommunication link 30 in accordance with unit process 54. For example, within unit process 54, the Subscriber Related Business Information Requests Response 47 is encrypted, digitally signed, and then sent to theService Provider 24. Additionally, the system appends the appropriate routing information for the transmission type used by theService Provider 24. Furthermore, acknowledgment of receipt is received via 38 and logged. Preferably, match and destination error notifications are received and logged, corrections are made and the response resent if necessary. - Upon receipt of the Subscriber Related Business Information Request Response47, the Service Provider or
Information Requester 24 authenticates theSystem Server 26 as the sender and logs the receipt of the Subscriber Related Business Information Request Response 47 in accordance withunit process 56. For example, withinunit process 56, Subscriber Related Business Information Request Response 47 is received, the digital signature is authenticated, and aresponse 38 is sent to theSystem Server 26 if the signature is valid. Additionally, the Subscriber Related Business Information Request Response 47 is matched against the Subscriber Related Business Information Request 32. Preferably, the Subscriber Related Business Information Request Response 47 is processed in a manner similar tounit process 52 in accordance with unit process 58. - The Service Provider or
Information Requester 24 processes the Subscriber Related Business Information Request Response 47 in unit process 58. For example, within unit process 58 Subscriber Related Business Information Request Response 47 is decrypted and matched to the Subscriber Related Business Information Requests 32 stored in the requesting Service Provider's 24 database. Furthermore, the document status is set to complete or rejected depending on the response data sent in the Subscriber Related Business Information Requests Response 47 by the offline 28. Preferably, the completion of this step is the termination of the process. In a preferred embodiment, a log entry is made into the system server database recording information about the document reception process. For example, the document state is set to complete by the document processor ofServer 26 by updating the document header in the database. Preferably, a trigger is fired to perform a system defined service upon document completion. Triggers, for example, can perform actions such as sending a user defined message to a socket, storing data in another database, performing communications and the like. In this manner transaction data can preferably be sent to, for example, an issuing bank. - In the embodiment of FIG. 2, the systems server and offline database architecture preferably consists of six subsystems: process control subsystem, communication subsystem, document processing subsystem, security subsystem, user interface subsystem, and a data handling and storage subsystem. The process control subsystem preferably includes a system that invokes and controls the other custom and commercial software that make up the system server. This subsystem, for example, is able to automatically restart erroneously terminated processes and logs such terminations for later analysis. Preferably, users are able to configure the process control subsystem to take additional actions when a process terminates.
- The communication subsystem preferably comprises of an X400 agent and/or virtual private network communication agent. Preferably, this subsystem uses either agent to send documents out of the system server to external recipients, and relies on a fully qualified Internet address for routing. For example, the communication subsystem's message receiving functions include determining how to route a message to its recipient, and accepting and transferring mail from and to intermediate agents. Additionally, address interpretation and transformation into a compatible format is handled by the communication subsystem. The communication subsystem also implements special actions indicated by the message header such as verifying delivery. For example, when message delivery cannot be done, the communication subsystem queues messages, or reroutes documents with erroneous addresses, as required. To send messages to a recipient, the communication subsystem determines the recipient's preexisting public communication system host, then initiates a transfer protocol session with the host. Preferably, an unsuccessfully transferred message is queued for later delivery. In an embodiment where the
System Server 26 functions as a routing hub for the system, the communication subsystem receives and processes all incoming document transfer protocol sessions from client systems. For example, outbound documents are packaged and sent to the communication agent for processing. Additionally, the communication subsystem automatically processes received messages by first authenticating, then decrypting, and then sending the message to the document processing subsystem. In one embodiment, the communication subsystem places a time stamp on each message that when compared with the message status indicates when a message has not been successfully delivered. Unsuccessfully sent messages are preferably resent a predetermined number of times according to preset communications subsystem parameters. - The document processing subsystem preferably processes all messages received into the
System Server 26. For example, this subsystem can be responsible for message parsing, message storage, Subscriber Related Business Information Request processing, Subscriber Related Business Information Request Response processing, message routing and message timers. Preferably, messages are processed in the order in which they are received and deleted after successful processing. In a preferred embodiment, a message is logged into the activity log upon reception and then parsed. For example, the message parser divides the message into two parts: header and message data. Message type information contained in the header determines which type of action the system server should take with the message data. After parsing, the message data is stored. Preferably, the message data is stored according to message type and the message header is logged. For example, a Subscriber Related Business Information Request is stored in a Subscriber Related Business Information Request table; and a Subscriber Related Business Information Request Response is stored in a Subscriber Related Business Information Request Response table. In an alternative embodiment, table entries are crossed referenced, and transmission verification messages and the status of the corresponding message are logged. In an example embodiment, after the message is stored, the Subscriber Related Business Information Request 32 is processed. For example, the first step in processing a Subscriber Related Business Information Request 32 is to log the event. Then the name of theservice provider 24 is extracted and the service provider's address is obtained from a lookup table. The Subscriber Related Business Information Request 32 is then sent to theoffline database 28. Preferably, the Subscriber Related Business Information Request 32 is marked as sent when a return receipt is received. In preferred embodiments, Subscriber Related Business Information Requests 32 can be in any of four states based on responses from the offline database 28: pending, sending, inactive, or completed. In a preferred embodiment, after the Subscriber Related Business Information Request 47 is processed and sent to the service provider, the Subscriber Related Business Information Request Response 47 is processed after it is received from the service provider. For example, when a Subscriber Related Business information Request Response 47 is received by the document processing subsystem, the corresponding Subscriber Related Business Information Request identification number is located and the Subscriber Related Business Information Request status is checked. The Subscriber Related Business Information Request Response 47 is marked as invalid if the Subscriber Related Business Information Request 47 is not pending. Preferably, document status is updated when the Subscriber Related Business Information Request Response 47 is processed, forwarded to the requesting Service Provider orInformation Requester 24 and stored into the system. In a preferred embodiment, a message's time in the document processing system is tracked by a timer. In one example, default events are set to occur at preset times. Preferably, such default events include setting a message's status to a certain value if no response has been received or to send the message again if no return receipt is received. - The security subsystem primarily preferably secures four areas: system data and file access, the relational database, the system administrative user interfaces and data and messages. For example, system data and file access to the
offline database 28 is protected by a user identification string that allows access to only the owner. Preferably, access to the relational database is controlled through a data owner's user identification string and password, and no access privileges are granted to any other user. Additionally in this example, the system administration user interfaces and data are protected by another set of user identification numbers and passwords. Preferably, users cannot gain access to the system administration user interfaces and data through other databases. In one embodiment, messages are secured by encryption and a digital signature. For example, commercial security software does the encrypting and decrypting, message authentication, and digital signature verification. Software specifically designed to secure document transmissions using Public Key Cryptography is preferred. In alternative embodiments, Public Keys can be manually transferred between system/client administrators via email or disk/tape. Preferably, key transfers are authenticated by verifying the digital signature of the sent document. Furthermore, all messages preferably receive a digital signature based on the private key of the sending system. For example, upon receipt, the digital signature of a message is automatically verified. Messages that fail digital signature verification are not processed, but rather are stored and the failure noted in the automated activity log. Preferably, the sender is not notified when a message fails verification. This, for example, prevents attacks from hostile systems. - The user interface subsystem preferably allows a system administrator to add or delete service providers, add or update message routing information and monitor system activity. Preferably, the interface is accessed through Java software applets which can be executed within a web browser, such as Netscape Navigator or as a stand alone application. With regard to the data handling and storage subsystem, the offline database system data preferably is stored in a commercial relational database. For example, the offline database system uses a database access and storage facility implemented using embedded structured query language in the user application processes and Java Database Connectivity. In an alternative embodiment, the Unix file system can be used to store system data.
- With regard to the systems and methods in accordance with FIGS. 1 and 2, it will be realized by the skilled artisan that many transactional applications lend themselves to the anonymity provided by the instant invention. Accordingly, in one aspect, particular service providers or Information Requesters have security codes and/or priority codes which allow them access to some, if not all, of the information contained in the offline database. This, for example, would be the situation with an issuing bank with a particular credit card that has been issued to a Subscriber in the anonymous system and various pieces of information with regard to, for example, financial status of the Subscriber are required in accordance with the Agreement between the Subscriber and the bank. Preferably, this information flow is handled by the server as set forth above after authentication of the total transaction. It will be further realized that alternative embodiments of the system in accordance with the instant invention can provide some or all of the information contained in the database to a particular Service Provider or Information Requester depending upon the degree of anonymity, the position of the Service Provider or Information Requester, and the access codes/alias identifiers of the system. Thus, in accordance with one aspect of the invention, no information is allowed to any Service Provider or Information Requester and in that aspect the system has the capability of providing authentication or authorization code for a particular transaction completely devoid of any subscriber information. Further, it will be realized that particular embodiments will allow grocery cards and club cards such as frequent flyer and the like (which are primarily involved in gathering demographic information with regard to purchasers) to be “blinded” by the use of the instant invention. It will also be realized that, for example, a number or series of aliases or codes such as personal identification numbers, and the like can be used in association with the medium to reduce risk of unauthorized use of the medium. In accordance with a preferred embodiment, security codes may be issued to the Subscriber such that one or more of the security codes must be used depending on the magnitude of the transaction. Further, it will be realized that although plastic cards are an easy medium in which to embed alias identification, alternative embodiments may employ other mediums such as electronic transfer medium, smart cards, chips and the like. Thus, as long as the medium can maintain and contain at least one set of alias identifiers that can be recognized by the system, any medium can be used in accordance with this invention. For example, codes on keypads and even fingerprints would be acceptable identification to trigger the system.
- For purposes of preferred systems and methods specifically directed to protecting the identity of a credit cardholder, whereby the cardholder can enter into credit card transactions in complete anonymity, the detailed description of preferred embodiments that now follows is represented in terms of processes and symbolic representations of operations carried out by a credit card processing system. In the corresponding drawings, in which like numerals represent like elements throughout the several figures, features of these systems and methods are described in further detail.
- FIG. 3 illustrates an exemplary account setup in an alias account
payment transaction system 100. Thealias account system 100 comprises a three partcredit card application 102, an issuer application processor 12, aprimary credit card 40 and analias credit card 42, analias application processor 116, ahost processing system 118, apart 3applicant record 105, avault system 114, and a vault receiving element orgateway 126. Thevault system 114 includes aserver 122, avault process application 124, and amatching database 120. - The three part
credit card application 102 comprises apart 1credit card application 104 for setting up the primary account, apart 2 security application orstub 106 for setting up the alias account, and apart 3 applicant'srecord 105 that is retained by the applicant. The card applicant's real identity and factual information used to establish credit are provided on thepart 1credit card application 104. The card applicant's alias identity, for example, an alias name and alias address, are provided on thepart 2security stub 106. The only information in common between thepart 1credit card application 104 and thepart 2security stub 106 is a document tracking number (DTN) 108 and 110. In the preferred embodiment the DTN is the same multi digit number on bothpart 1 andpart 2. Alternatively, a multi part encryption methodology (e.g. public key/private key) can be employed to provide two different DTNs on theparts - Generally, the
alias account system 100 functions in the following manner. Thepart 1credit card application 104 ofcredit card application 102 is transmitted to theissuer application processor 112 for processing. If thepart 1 credit card application is approved, theprimary credit card 40 is issued and a primary account is booked on host processing system (HPS) 118. The primary account is a credit card account that functions like any other credit card account. - The
part 2security stub 106 is transmitted to thealias application processor 116, independently of thepart 1 credit card application. At thealias application processor 116, thepart 2security stub 106 is processed and the resulting information is transmitted to vault receiving 126. Vault receiving 126 transfers the information received fromalias application processor 116 to thevault 114. - In accordance with a preferred aspect of the invention, the
vault 114 is preferably a secure facility operated by an independent third party that is not beholden or obligated to credit card companies or merchants, for example a privacy foundation, where the identity of an alias account holder is maintained and not disclosed to others except under certain limited conditions. The vault may charge a fee for using its facilities, and may contract with credit card companies to provide its vault services, as described herein. - Although the preferred embodiment involves use of an independent secure facility as the vault, it will be appreciated that some degree of cardholder privacy can be realized by maintaining the alias account features described herein with a secure database within the data processing facilities of an issuer or other party. According to this alternative aspect of the invention, secure data may be provided by a secured computer system within an issuer's facility or by a separate secure database with an issuer's computer system for supporting the alias accounts. Cardholder privacy is effected in this alternative approach by password protecting the secure data, by restricting the access of customer service representatives to the secure data, and/or by providing separate personnel to handle the issuer's alias account database.
- In
vault 114, avault process application 124 onserver 122 receives information from vault receiving 126 and from the primary account booked onHPS 118. This information is input to amatching database 120 and is used to book an alias account invault 114. The alias account information is then transferred toHPS 118 to set up a corresponding alias account and issue analias credit card 42. The alias account booked onHPS 118 is identified with an alias name and address. - In the
alias account system 100, the key points in protecting the anonymity of the account holder are the facts that thepart 1credit application 104 goes to a different location than thepart 2security stub 106, and that the only information in common between the two parts ofcredit card application 102 are theDTNs - In FIG. 3, a new account is set up using the three
part credit application 102; information required from credit card applicants is provided on appropriate paper or computer based form. Thepart 1credit card application 104 ofapplication 102 is a standard credit application, while theseparable part 2security stub 106 is used to setup the alias account. Apart 3 applicant'srecord 105 is also provided as an applicant's copy of the three partcredit card application 102. - The
part 1credit card application 104 captures the normal information the issuer requires to make its credit decision and setup the primary account. The part I credit card application also provides a document tracking number (DTN) 108 for creating an association with asecond DTN 110 on thepart 2security stub 106. TheDTN 108 is stored in amaster file 130 when the application is processed so that it can be passed to thevault 114 after the account is booked. - The issuer processes the
part 1credit card application 104 as any other application. Credit bureau reports are requested and the account is scored to determine credit eligibility and establish an amount of available credit. If thepart 1credit card application 104 is not approved, the normal letters are sent as with any other credit application. If the application is approved, the primary account is booked on the host processing system (HPS) 118 and aprimary credit card 40 is issued to the applicant. Under association regulations the address of the booked account is reported to the Issuers Clearing House (ICS) and the credit bureaus. - There are at least two methods of booking the approved primary accounts on the host processing system. If the credit card issuer uses
HPS 118 to process the credit card application, the account is booked automatically onHPS 118. However, if a credit card issuer chooses to use an outside vendor to process the application,HPS 118 will receive an account tape and the accounts are booked as part of the nightly cycle. The nightly cycle also produces a daily report file. This report file shows all accounts that were booked on the system during that day. From this report file, the new primary accounts are captured and transferred to vault 114.HPS 118 may capture the primary accounts, for example, using a flag in the master file that denotes a primary account or using a portfolio segregation method, where the primary accounts are identified by the system and principal number (sys/prin number) in a method that will be familiar to those skilled in the art. - Unlike the
part 1credit card application 104, thepart 2security stub 106 is transmitted to thealias application processor 116. A data entry operator usingalias application processor 116 captures the security information contained on thepart 2security stub 106. The security information, for example, may include the document tracking number (DTN) 110, a password 107, other security information, etc. Thealias application processor 116 captures the security information and transfers it to vault receiving 126. Vault receiving 126 does not have to be physically located in thevault 114. It is simply a location where the security information is received and transferred to vault 114. - In
vault 114, the security information from thepart 2security stub 106 is used to assign the password 107 to the alias account. The password 107 is used for identification (ID) verification on the alias account. The password 107 may be placed in the mother's maiden name field of the alias account. Thepart 2security stub 106 contains asecond DTN 110 that is associated with theDTN 108 on thepart 1credit application 104. Since thepart 1credit card application 104 and thepart 2security stub 106 have an associated document tracking number (DTN) 108 and 110, the DTNs are used to construct a relationship between the primary account and the alias account. Because they are used for this purpose, the document tracking numbers are preferably unique to an issuer. - In addition to providing the password107 to the alias account, the security information is also input to vault
process application 124 onserver 122. Thevault process application 124 constructs amatching database 120 using two data sources. The first source is thesecurity stub 106. Thesecurity stub 106 contains the password 107 and theDTN 110. The second source isHPS 118.HPS 118 transfers certain primary account information to thevault 114 for purposes of maintaining the alias account. - As new security information is transferred from vault receiving126 to the
vault 114,vault process application 124 receives the security information and updates thematching database 120. If, when the security information is received and processed and it is determined that theDTN 110 is already in thematching database 120, thevault process application 124 determines if the alias account information has already been posted byvault 114. If it has not, then,HPS 118 received thepart 1credit card application 104 before the security information arrived atvault 114. In this case,HPS 118 has already approved and booked the associated primary account and transferred its information to vault 114. To proceed with alias account establishment in this case, an alias account record is created and added to a new account file and is sent toHPS 118 for posting. This process creates the alias account onHPS 118. - If, when the
security stub 106 is received and processed and it is determined thatDTN 110 is already in matchingdatabase 120, thevault process application 124 determines that the alias account information is already posted and reports an error, because the security stub information is a duplicate record. - If, when the
security stub 106 is received and processed and it is determined thatDTN 110 is not already in the database, the primary account information has not been transmitted fromHPS 118 to vault 114. In this case, the security stub information is maintained on file until it can be matched with a new primary account or for a predetermined holding time. For example, after 6 months the record may be removed from the file. - In the above process, the
vault process application 124 is taking information from the daily cycle inHPS 118 and using it to create an input file for the next day's cycle. This means that, if an account is approved before a day's cycle ends, the new account is built inHPS 118 and the information for thevault 114 is extracted from the files created that night, during the processing of the daily report file. The extracted information is transmitted to vault 114. This input to the vault is processed and a request for a new alias account file will be transferred back toHPS 118 for the next night's processing of the daily report file. As a result of this process, the new alias account is booked inHPS 118. - Once an alias account is booked on
HPS 118, the alias accounts are not reported to the credit bureaus or the Issuers Clearing House (ICS). The alias account is not reported to the credit bureaus because the primary account was already reported. The alias account is not reported to ICS because the address on the account is meaningless. Furthermore, the credit available to the credit cardholder is split or allocated between the primary account and the alias account on a predetermined basis, with the total credit available to the credit cardholder not exceeding the sum of the primary account and the alias account. - In
HPS 118, all alias accounts will be assigned a fictitious name to populate the fields within the alias account and facilitate identification and recognition of alias accounts within the HPS system. For example, the account name may be assigned a made up name such as “Pat G. Alias”. The remaining account information for the alias account is generated in thevault 114.Vault 114 generates a mailing address for the account that consists of an apartment number that is unique and a city, state and zip code that is special for the account, again to facilitate identification and recognition of alias accounts within the HPS system. The zip code is used in the mailing process to identify a document with an alias name and address. The mailing process for alias accounts will be discussed later in detail. - The booked alias accounts are reported on the daily report file in the manner known to those skilled in the art. A file of these accounts is created and sent to the
vault 114 so that a report can be created for the issuer and the privacy foundation. Thevault 114 will provide daily reports showing the primary accounts that are booked but have nomatching part 2security stub 106 and primary accounts that have successfully set up an alias account. The vault will also generate a weekly report to inform the issuer of the number of alias accounts issued and the number of account numbers available for assignment. - FIG. 4 illustrates a typical credit card transaction using the credit cards of the present invention.
Credit card 40 is associated with the primary account andcredit card 42 is associated with the alias account. The primary andalias credit cards credit card sale 204 or 206 (which can be in person, on line, via telephone, etc.). The merchant at the point sale submits the credit card account number for authorization to an acquirer. The acquirer is an entity that enters into an agreement with a merchant for authorization and settlement of its credit card transactions. The acquirer may be a bank, a credit card company (for example, VISA, AMERICAN EXPRESS, MASTERCARD, etc.), or some other entity. - In FIG. 4, the Host Processing System (HPS)118, which may be operated by an acquirer or by another entity, receives the authorization request from the merchant and provides authorization of the credit card transaction. Assuming that the credit card transaction from either the
primary credit card 40 or thealias credit card 42 is approved, the transaction is treated in a similar fashion to other credit card transactions, with the exception of the statement printing process. The statement printing process for the alias account is different from the printing process of the primary account and other credit card accounts. Theprimary account statement 218 associated withcredit card 40 is printed inprint facility 216, using the name and address associated with the primary account inHPS 118. - In contrast to the statement printing process for primary accounts, alias accounts are tagged in
HPS 118 for purposes of identifying alias accounts and distinguishing them from other accounts. The alias accounts are tagged, for example, by setting a flag, identifying special fields, or assigning a system and principal number (sys/prin. number) to the alias accounts. In accordance with the present invention, however, the alias accounts are not associated with any primary account at the HPS. The taggedrecords 212 are then transferred to vault 114 for processing. Invault 114, the fictitious name and address on the alias account is replaced with the cardholder's real name and address. The real name and address is retrieved from matchingdatabase 120. The correctedrecords 214 are transferred toprint facility 216, where analias account statement 220 is printed. The alias account statement printing process will be discussed in greater detail below. - Referring now to FIG. 5, an existing cardholder can upgrade or modify their credit card account to add an alias account. An upgrade or
preapproved application 300 is used to sign up an existing cardholder for an alias account. The upgrade orpreapproved application 300 comprises two parts.Part 1302 is an upgrade credit card application andpart 2 304 is a security stub. According to this aspect of the invention, unlike new account setup, the two parts ofapplication 300 need not be associated by using the DTN information. Instead, the two parts of the application may be associated by using the creditcard account number 306 on the cardholder's existingcredit card 301. The creditcard account number 306 is affixed to both parts of the application. Apassword 303 selected by the cardholder is provided on thepart 2 security stub for security purposes. - As illustrated in FIG. 5, the
part 1upgrade credit application 302 is transmitted toissuer application processor 112. The issuer or its agent will handle the processing of thepart 1upgrade credit application 302. Similarly, thepart 2 security stub 304 is transmitted to vault receiving 126 for processing. Vault receiving 126 captures thepassword 303 and the current creditcard account number 306 onpart 2 security stub 304. This information is transferred to theserver 122 to populate the table for matchingdatabase 120. Thepart 2 security stub 304 information is stored onserver 122 for a predetermined period of time or until the corresponding account information is received fromHPS 118 and an alias account is built. - When the upgrade
credit card application 302 is approved, the issuer initiates an account transfer. The existing account is transferred to a primary account and a newupgrade credit card 308 is issued as the card for the alias account. The existing account may be transferred, for example, by flagging the existing account as a primary account in the master file or using a portfolio segregation method and switching the existing account to a system and principal number (sys/prin. number) assigned to primary accounts. The credit limit on the new primary account is also set to a value that can be distributed between the primary account and the alias account that will be created. The credit limit distribution process will be discussed in detail in the account management section. -
HPS 118 captures the account transfers on a report file and checks the report file for existing accounts that have been identified as primary accounts. This report is used to transfer the primary accounts to thevault 114. Whenvault 114 receives the new primary account information and matches the creditcard account number 306 on thepart 2 security stub 304 with the creditcard account number 306 on the primary account, it will create a new alias account. All other processes for creating the alias account are the same as those described in new account setup. - Refer now to FIG. 6 for a discussion of the account management functions. In particular, the following discussion relates to the manner in which the credit limit assigned to a particular cardholder is increased (or decreased) and the changed credit limit is allocated between the primary account and the alias account.
- Account management functions generally do not involve monetary values or relate to specific financial transactions, and are often called non monetary or “non mon” transactions. Generally, a non mon transaction is a transaction that affects account information, but does not affect the monetary information for an account. For example, name, address, and credit limit changes to an account are non mon transaction, and such changes are generally called updates. In the
alias account system 100, non mon updates to the primary account are processed onHPS 118. - The primary account controls the credit line on both the primary and the alias accounts because all credit decisions are based on the primary account. When
HPS 118 establishes a primary account, a credit limit is set for the primary account. This credit limit is passed to thevault 114 as part of the alias account setup process. When thevault 114 creates the alias account it will take the credit limit passed and divides it based on a percentage allocation or distribution ratio established by the issuer. A non mon transaction is created to set the primary account's credit limit to its proper value. The alias account's credit limit is set to the remaining amount. In addition, there is information stored with the primary account recording the change to the credit limit, and the fact that thevault 114 issued the change. This information is important because a customer service representative (CSR) making a change to the credit limit can recognize that there is an alias account associated with the primary account. - It will be appreciated that the allocation of available credit between the primary account and the alias account is within the discretion of the issuer and, if desired, selection by the cardholder. An issuer may require a predetermined allocation, for example 50%, of the available credit between the two, or may allow some discretion on the part of the cardholder. The issuer may allocate 0% or 100% or any number in between of the available credit to the primary account, with the remainder to the alias account.
- A CSR may retrieve the information stored with the primary account to help determine the combined credit exposure and make the decision to issue a non mon setting a new credit limit. The
vault 114 will capture the non mon when it is reported on a daily report file and will recalculate bout credit limits and issue a non mon for each account. It will be understood that in current systems this process may require a number of cycles to complete so there is additional exposure to the issuer from the time that the non mon is issued until thevault 114 issues the non mons for both accounts and they are processed byHPS 118. This process applies to both increases and decreases of the credit limit. - It is important to note that if the issuer changes the distribution ratio of the credit limit,
vault 114 will not immediately recalculate the credit limit associated the alias accounts on file. The accounts will remain at the old ratio until a non mon is issued for the account. This is to prevent the possibility of putting accounts over that were not over the limit before the change. Online changes of the alias account's credit limit is preferably not allowed. - FIG. 6 is a general block diagram illustrating an embodiment of the alias account management process. The alias account management process starts at
block 400 with a request from a cardholder for a credit line increase. This is usually made through a phone call to the issuer. The issuer receives the request atblock 402 and requests a credit bureau report of the cardholder. Based on the credit bureau report, at block the issuer rescores the customer's credit and determines the customer's eligibility for a credit line increase. - If the credit increase is approved, the issuer at
block 406 will perform an online non mon transaction toHPS 118 to post the change of the primary account credit limit. The non mon transaction is logged in an online non mons file 408. The online non mons file 408 is then transferred to theposting program 410. Thenightly posting program 410 also receives the current host master file 412. Once both files are received, theposting program 410 posts the online non mons in file 408 to the current master file 412 and generates a newhost master file 414. Theposting program 410 also generates a number of report files. These report files are input to a report splitter program 416 that will split off anon mon report 418. Thenon mon report 418 contains the primary and alias account information associated with the posted transactions that do not effect the account's monetary value. The non mon report file 418 is used as input toalias split program 422 and to generate a daily report 420. The alias splitprogram 422 separates the alias and primary account transactions and generates a non mon report file 424 that only includes the alias account transactions. This non mon report file 424 is then transferred to vault 114. - In
vault 114, thenon mon report 424 is input to the non mon generator process 426. The non mon generator process 426 retrieves the issuer's percentage allocation or distribution ratio from thematching database 120 and applies it to the new credit line limit received in nonmon report file 424. In applying the issuer percentage allocation, the non mon generator process 426 takes the new credit line limit and apportions it based on the percentage assigned to the primary and alias account. To set the apportioned credit limits inHPS 118, the non mon generator 426 outputs a non mon file 428 toHPS 118. The non mon file 428 is input to theposting program 410 in the next day's cycle. Theposting program 410 will post the modified credit limits to the primary and alias accounts. - FIG. 7 is an example of an issuer's credit exposure when a credit limit increase is processed using the account management process of FIG. 6. In
column 1 502, when the cardholder makes a request for the issuer to increase the primary account credit limit from $10,000 to $15,000, the issuer's total exposure is $10,000 prior to the credit limit increase. The $10,000 exposure is divided according to the issuer's percentage allocation, which in this example is 50%. Therefore, the issuer's exposure is $5,000 for the alias account and $5,000 for the primary account. - In
column 2 504, when the issuer enters the online non mon 506 for $15,000 toHPS 118, the change of the primary account credit limit is posted and the issuer's total exposure is increased to $20,000 ($15,000 for the primary account and $5,000 for the alias account). Incolumn 3 508, during the fast day's batch cycle (cycle 1 510), the issuer's exposure remains at $20,000. - In
column 4 512, afterHPS 118 completes thecycle 1 510, the credit limit increase is transferred to vault 114 for processing. During the processing, the issuer's credit exposure remains at $20,000 ($15,000 for the primary account and $5,000 for the alias account). Once the processing is complete, incolumn 5 514, the modified alias and primary credit limits are transferred back toHPS 118 for input to the second day's batch cycle (cycle 2 516). At this point, the issuer's credit exposure is $15,000 ($7,500 for the alias account and $7,500 for the primary account). - FIG. 8 illustrates a process for performing non mon updates such as name and address changes. Daily non mon file600 contains the records of the non mon updates to the primary accounts. The daily
non file file 600 also includes tables of the sys/prin. number and non mon values associated with a non mon update. The sys/prin. number and non mon values within the tables are easily modified. - The daily
non mon file 600 is stored and processed outside of the HPS's critical path.HPS 118 uses an extraction program 602 to read the dailynon mon file 600 and create a vault transaction file 604 that is later transferred to vault 114. The extraction program 602 selects the records that are added to the transaction file 604 using the record's sys/prin. number and non mon values. - On a daily basis, vault transaction file604 is transmitted to vault 114. The vault
update process application 606, on the vault'sserver 122, takes the name and address changes from the vault transaction file 604 and posts them to thematching database 120. This ensures that the mailing labels have the correct mailing information. For changes that need to be propagated from the alias account invault 114 to the associated primary account onHPS 118, a nonmon update file 608 is created and transferred toHPS 118 for the next day's processing cycle. - An application program on
HPS 118 provides a report and input to vault 114 of all changes made to the HPS database and processing counts. The application program selects the report entries in a manner similar to the alias account extraction program 602. This report will provide an audit trail of all transactions passed to vault 114. - As a safety precaution,
HPS 118 is preferably configured to prevent a customer service representative (CSR) from making online changes to an alias account's name, address, social security number, and home and work phone number fields. These online changes to the alias account are blocked because those fields provide a means of compromising the cardholder's identity. To ensure that a cardholder's identity is not compromised and a CSR does not accidentally change these fields, the modification of these fields is assigned to vault 114. - Even though the issuer is prevented from making online name and address changes to the alias accounts, the issuer is able to make these modifications using tape transactions. However, this procedure should preferably be avoided to ensure that the cardholder's identity is not compromised.
- It is always possible that the cardholder may want to close the alias or primary account. FIG. 9 illustrates the account closing process. In addition to name and address changes, account closings and personal identification numbers (PINS) associated with ATM transactions are also considered non mon changes. The account closing process starts at step700. At step 700,
HPS 118 transfers the non mon collection transactions file to thevault processing step 702. The non mon collection transaction file contains the primary and alias accounts that are going into collections. Instep 702, thevault 114 receives the non mon collection transactions file and proceeds to step 704. Atstep 704, thevault 114 processes the collection transactions file and combines the two accounts. The accounts are combined, because the cardholder is charged an annual fee, for the alias account that is charged on the primary account, and the issuer is paying for two accounts onHPS 118. The combined account is then transferred, atstep 706, to a non alias sys/prin. number onHPS 118. Once the accounts are combined, all activity on the alias account is visible onHPS 118. In the preferred embodiment, regardless of whether the alias or primary account is closed, the account closing process remains the same. -
Vault 114 also handles the non mon for setting account PINS. If the issuer wishes to allow ATM use of the alias account, the form for selection of a PIN is inserted with a mailing to the cardholder. The mailing process will be described in detail below. - In the preferred embodiment,
HPS 118 uses a standard credit card authorization system. However, the issuer must establish a method for authenticating the cardholder of an alias account. In an embodiment of the invention, this is accomplished by using the alias “password” that was entered during account setup. The issuer should also have some special procedures to handle referrals and hot calls. Since none of the information on the alias account is real, a phone number is set in the phone number field that will allow the issuer to communicate with the vault and request contact with the cardholder. - In reporting a lost or stolen credit card or to confirm fraud, a cardholder must make a call to report each account. This allows the cardholder to maintain his or her anonymity. A first call is made to report the primary account as themselves and a second call is made to report the alias account with the alias name. For example, the caller may use the name “Pat G. Alias.” If the issuer suspects fraudulent use of the alias account, the issuer must contact
vault 114.Vault 114 will in turn contact the alias account holder. - Once a credit card is confirmed as lost or stolen or fraudulently used,
HPS 118 handles both accounts in the same manner. The account status flag is changed and an instruction is executed to transfer activity to a new account.HPS 118 also issues a new plastic credit card. The instruction generated byHPS 118 is captured from a report file and used to update thematching database 120 invault 114.Vault 114 monitors the account status flag to generate the appropriate actions.Vault 114 also maintains state images of the accounts to monitor multi step processes, and determines when a process is complete.Vault 114 provides account reports on completed operations. - Unlike the procedure described above, when an alias account or primary account becomes delinquent, the vault will receive notification to combine the two accounts for reporting and/or collection purposes. The customer account disclosures, provided to the customer on account setup to advise of account policies and procedures, inform the cardholders that if the alias or primary account becomes delinquent the alias account will be closed and combined with the primary account. The primary account will be transferred to a non alias sys/prin. number because it is no longer an alias account. The resulting new account is, then, placed into collections.
- In order to bill customers for credit card transactions, the
HPS 118 produces on line alias account statements from archives and CD ROM's. All statements produced on line will contain the alias account address information. Statements printed for the alias accounts proceed through the HPS statement processing until they are ready for printing. Monthly statements for the alias accounts are treated as if the issuer or some other vendor is going to print them. - FIG. 10 is an overview of the
statement printing process 800, while FIG. 11 illustrates a specific implementation of analias statement process 900. In FIG. 10, a statement formatting process orprogram module 801 at theHPS 118 produces an aliasstatement print file 802 of the alias account statement addresses. The aliasstatement print file 802 is transmitted to vault 114 for processing.Vault 114 is not responsible for mail redirection. However, in accordance with theinvention vault 114 supports mail redirection. It will be recalled that to support mail redirection,vault 114 maintains thematching database 120. In thevault 114, thematching database 120 is queried based on the apartment number of the alias address to located the real name and address of the account holder. - The
matching database 120 includes the alias apartment number (key), the real name, and the real address. If the apartment number on the alias account statement is successfully located in thematching database 120, the real name and address that will be used for mailing the statement will be retrieved and used to construct a corrected aliasstatement print file 806. The correctedalias statement 5print file 806 is then transmitted to aprint facility 808 outside thevault 114 that prints the monthlyalias account statement 220 with the name and address provided by the cardholder to which the alias statement is to be mailed.Print facility 808 is any facility that can receive an electronic print file and print the monthlyalias account statement 220. - In addition to the above mailing requirements, it is also necessary for the
vault 114 to replace the alias name and address on the payment coupon with the real name and address for the alias account statement. This will help limit compromising the identity of the cardholder. - In another embodiment of the invention, the security stub106 (FIG. 1) is provided with an option for an alternate address for mailing the alias account statements. In this case,
HPS 118 flags the alias accounts that have an alternate address and transfers them to the aliasstatement print file 802. The aliasstatement print file 802 is then transmitted to vault 114 for processing. Thevault 114 receives the aliasstatement print file 802, recognizes the flagged alias accounts, and does not replace the alias address with the real address associated with the primary account, but assigns the alternate address received with the security stub information. - In a further embodiment of the invention, a copy of the
matching database 120 is made available to theprint facility 808 or a secured site on the Internet that makes the database available to mail distributors that need the information for relabeling. For example, a mail or parcel distributor working in association with the alias account system described herein may be operative to receive purchases made using an alias card, relabel the packages containing the purchases with the primary account address, and reship the packages to the primary account address. As another example, a mail or parcel distributor may effect the same package relabeling to the alternate address instead of the primary account address. - In a system utilizing a mail or parcel distributor, items of mail or parcels addressed to the alias address are received by a predetermined mail distributor that has been established for mail and parcel relabeling and reshipping. It will be appreciated that the alias address should preferably contain indicia (e.g. a data key) that enables the mail distributor to determine the proper real shipping address for each received piece of mail or parcel. For example, all mail or parcels shipped to “Apartment XXXXX, River Street, Des Moines, Iowa”, might indicate a mail distributor's facility in Des Moines, Iowa. The “XXXXX” can be a special key unique to a particular alias account cardholder. Upon receipt of a piece of mail or parcel with a certain apartment number, the mail or parcel distributor uses the apartment number key to look up the appropriate relabeling address in the matching database, and prints a new label for reshipping the mail or parcel.
- It will be appreciated that the address displayed in the envelope of a received piece of mail or on the label of a received parcel must be sufficient to signal special processing, as well as locate the correct name and address. The alias address, however, is preferably not a post office box, since some merchants will not ship to such an address.
- As a signal to mail distributors that a mailed item requires special processing, the alias address may contain a special zip code. The zip code provides a means for mail distributors to determine that the piece of mail needs to be relabeled as part of their normal address scanning process. The zip code may also identify the facility that is assigned to handle the relabeling process.
- With this embodiment of the present invention, the alias account holder can direct merchants to ship merchandise purchased with the alias card to the
print facility 808 or the mail or parcel distributor for relabeling. This provides the alias cardholder with additional privacy. The alias cardholder is able to keep his or her anonymity, since there is no need to provide the merchant with a mailing address where the cardholder can be reached. - In
HPS 118, other customer communications (letters, alias credit card, and PIN mailings) are mailed using the master file address that is associated with the alias account. As described above,vault 114 maintains amatching database 120 that is used to create mailing labels. Thematching database 120 uses the apartment number of the alias address or the alias account number as the key to retrieving the real name and address. The real information is used to produce a new mailing label to place over the alias address. However, since this is an expensive process, the issuer may want to tam off most letters to avoid the additional postage and handling costs. - FIG. 11 illustrates the preferred embodiment of the
alias statement process 900. To start the alias statement process, a valid transactions file 901, a currenthost cardholder file 902, and aproduct control file 903 are input to a posting program 410 (FIG. 6). Theposting program 410 outputs a new hostcardholder master file 904 and transfers the statement records 905 to astatement formatting program 801. In thestatement formatting program 801, the alias account statements are separated into an aliasstatement print file 802 and transferred to vault 114. All other accounts are output to a nightly statement file 908 that is transmitted to aprint facility 808 which includeshost output services 916 andstatement printer 918. At output services, the statements are produced onstatement printer 918. - In
vault 114, the aliasstatement print file 802 is input to the statement name/address overlay process 912. The statement name/address overlay process 912 uses thematching database 120 to retrieve the real names and addresses associated with the alias accounts. Once the real names and addresses are retrieved, theoverlay process 912 replaces the names and addresses on the alias accounts in thealias statement file 802, with the real name and addresses and transfers them to a corrected aliasstatement print file 806. The corrected aliasstatement print file 806 is then transferred back toHPS 118 as an input to theprint facility 808. Atoutput services 916, the alias statements are produced onstatement printer 918. - Primary account payments are handled in the same manner as any other credit payment. The primary account may use any options of payment the issuer wishes to make available. Unlike the primary account, however, there are some special considerations for handling the alias accounts. To handle the alias accounts, the issuer should preferably select a remittance processor. The remittance processor should preferably not use automatic payment options with alias accounts. The automatic payment options provide a means for the remittance processor to automatically charge a cardholder's checking account for the required payment. However, this requires that the cardholder's checking account number be stored on the HPS master file. Using this information, the alias and primary accounts can be matched and anonymity compromised.
- In processing check payments for the alias account, the payment coupon for the alias account will have the cardholder's real name and address that will match their personal check. The payment coupon will also have the alias account number. However, the remittance processor does not have access to
HPS 118, and additional information about the cardholder. Thus, the auto payment option and check payment processing provide a small risk that the cardholder's identity may be compromised at the remittance processor. - FIG. 12 illustrates the
databases 900 employed in thevault 114 and their associated relationships. The vault databases comprise a matching database 120 (FIG. 1), atemporary database 1002, an account block database 1004, anissuer database 1006, and amail redirection database 1008. Thematching database 120 contains the alias and primary account information for matching the name and address of the alias account onHPS 118 with the real name and address of the cardholder. Thematching database 120 contains a number of fields for managing the alias account. FIG. 12 lists the fields contained in thematching database 120, and Table 1 of FIG. 13 provides a summary of some attributes associated with each of the listed fields for databases constructed in accordance with the invention. For example, the first row of Table 1 summarizes the field “IsNew.” The columns of row one include the following: column one identifies the field name; column two identifies the data type associated with the “IsNew” field; and column three gives a description of the function of the field within the matching database. - The
temporary database 1002 contains the alias and primary account information for creating the alias account invault 114. FIG. 12 lists the fields used to create the alias account, and Table 2 of FIG. 14 provides a summary of some attributes associated with each of the listed fields. For example, the first row of Table 2 summarizes the field “PrimaryAccountNumber.” The columns of row one include the following: column one identifies the field name; column two identifies the data type associated with the “PrimaryAccountNumber” field; and column three gives a description of the function of the field within the Temporary database. - The account block database1004 contains the issuer's account number information. This information is used to assign the issuer's account numbers to the alias accounts. FIG. 12 lists the fields use to define the issuer's alias account numbers, and Table 3 of FIG. 15 provides a summary of some attributes associated with each of the listed fields. For example, the first row of Table 3 summarizes the field “IssuerCode.” The columns of row one include the following: column one identifies the field name; column two identifies the data type associated with the “IssuerCode” field; and column three gives a description of the function of the field within the Issuer database.
- The
issuer database 1006 contains the issuer profile withinvault 114. The issuer profile includes the issuer's system code, the date the issuer become active on the system, and the credit limit information associated with the issuer's accounts. FIG. 12 lists the fields use to define the profile, and Table 4 of FIG. 16 provides a summary of some attributes associated with each of the listed fields. For example, the first row of Table 4 summarizes the field named “IssuerCode.” The columns of row one include the following: column one identifies the field name; column two identifies the data type associated with the “IssuerCode” field; and column three gives a description of the function of the field within the Issuer database. - The
mail redirection database 1008 contains the alias and primary account for replacing the name and address on the alias account with the cardholder's real name and address. This is the address to which the cardholder's correspondences will be mailed. FIG. 12 lists the fields used to retrieve the cardholder's real name and address and Table 5 of FIG. 17 provides a summary of some attributes associated with each of the listed fields. For example, the first row of Table 5 summarizes the field “AliasBoxNumber.” The columns of row one include the following: column one identifies the field name; column two identifies the data type associated with the “AliasBoxNumber” field; and column three gives a description of the function of the field within the Mail Redirection database. - FIG. 18 is a flow diagram illustrating an overview of the host and
vault process flow 1100. To initiate the primary account setup process, the issuer inputs part Icredit card application 104 to theissuer application processor 112. After the issuer processes thepart 1credit card application 104, the issuer transfers thepart 1 application data file 1118 toHPS 118. The part I application data file 1118 providesHPS 118 with a document tracking number (DTN) 108 and the necessary information to setup a primary account. - The
part 2security stub 106 is input to the issuer'salias application processor 116 to set up an alias account. After thepart 2security stub 106 is processed, thealias application processor 116 transfers thepart 2 application data file 1102 to vault receiving 126. Thepart 2 application data file 102 is used to assign a password 107 and aDTN 110 that matches theDIN 108 on thepart 1credit card application 104.Alias application processor 116 also transfers the issuer account blocksdata 1104 and issuer distribution ratio 1106 to vault receiving 126. Vault receiving 126, in turn, transfers the above information to vault 114 viaalias account information 110, account block details 1112, credit line ratio details 1114, and alias account modification/termination details file 1116.Vault 114 stores thepart 2 application data file 1102 intemporary database 1006.Vault 114 uses the issueraccount block data 1104 to assign the alias account number, and the issuer distribution ratio 1106 to split the credit limit assigned to the primary account with the alias account.Vault 114 also adds a record to thematching database 120.Matching database 120 stores information such as the primary and alias account numbers. Once the alias account information is stored invault 114, it issues a non mon transaction vianon mons file 1124 toHPS 118 to requests thepart 1application data file 1118. This information is transferred fromHPS 118 to thevault 114 via the primary account acquisition and updating file 1130. - Once
vault 114 receives the primary account information, it queries thetemporary database 1006 for the associated alias account. Thetemporary database 1006 is queried using the document tracking numbers (DTN) 108 and 110. The alias account found and the primary account are associated inmatching database 1002.Vault 114 also transfers a non coon transaction vianon mon file 1124 toHPS 118. The non mon is transferred with the alias account acquisition and updating file 1128 to request the creation of the alias account onHPS 118. As a result of this process, two accounts exist onHPS 118. The primary account with the cardholder's real name and address and an alias account with an alias name and address. - To maintain the two
accounts HPS 118 transfers various files to vault 114.HPS 118 transfers a primary accounts acquisition and updating file 1130, a non mons transaction updating file 1132, alias account update file 1134, collections account number file 1136, and an alias document file 1138. The primary accounts acquisition and updating file 1130 is used to update primary account information. For example, the primary account acquisition and updating file 1130 may contain an update for the cardholder's name, address, or account credit limit. The non mons transaction file 1132 contains the non monetary instructions todirect vault 114 to execute various functions. For example, the non mons transaction file may include instructions to flag the alias account for collections, to update the alias account details, or update the alias account credit line. - The alias account update file134 provides
vault 114 with information to update the alias account. For example, the alias account update file 1134 may contain the information to change the credit limit on the alias account. The collections account number file 1136 contains the alias and primary account numbers that are going into collections onHPS 118. The alias document file 1138 transfers documents with an alias address and name to thevault 114 to have the alias name and address replaced with the cardholder's real name and address. - In response to the files and instructions transferred from
HPS 118,vault 114 manipulates the primary and alias account information stored in the vault databases. This information is fed back toHPS 118 via alias account acquisition and updating file 1128, account collections file 1126, nonmon transaction file 1124, and redirected mail file 1122. The alias account acquisition file and updating file 1128 providesHPS 118 with the credit limit information for the alias and primary account. The account collections file 1126 providesHPS 118 with the information to combine the primary and alias accounts before sending them to collections. The nonmon transaction file 1124 serves a similar function as the non mon transaction updating file 1132. The redirected mail file 1122 providesHPS 118 with documents that have had the alias names and addresses replaced with the cardholder's real name and address. - If at any time the cardholder decides to modify or terminate the alias account, the card holder may enter a request via the
issuer application processor 112. Theissuer application processor 112 transfers alias account termination/modification request 1108 to vault receiving 126. Vault receiving 126 transfers the request to thevault 114 via alias account modification/termination details file 1116. Invault 114, the request is processed and the appropriate outputs are sent toHPS 118. - FIG. 19 illustrates the
account acquisition process 1200. Account acquisition begins atdata entry step 1202. Theissuer application processor 112 andalias application processor 116 executedata entry step 1202. Onceissuer application processor 112 completesdata entry step 1202, thepart 1 application data file 1118 is transmitted to the host processing system (HPS) 118.HPS 118 atdecision block 1204 determines whether an account already exists. If an account already exists, the process proceeds to step 1212, whereHPS 118 puts the DTN in the master file and flags it as a primary account. Once the existing account has been converted to a primary account, the credit line of the existing account is altered atstep 1214. Then, the process proceeds fromstep 1214 to step 1208. At step 1208, the primary account is dumped into a file. From step 1208, the file is transferred to step 1210. At step 1210, the file, identified as the primary account acquisition and updating file, is transferred to vault 114 for processing. - If at
decision block 1204HPS 118 determines that an account does not exist, the process proceeds to step 1206. Atstep 1206, a new account is created inHPS 118. The new primary account is created following the normal process flow ofHPS 118. Fromstep 1206, the primary account is transferred to step 1208. At step 1208, the primary account is dumped into a file. Next, the process proceeds from step 1208 to step 1210, where the file, identified as the primary account acquisition and updating file, is transferred to vault 114 for processing. - Once
alias application processor 116 completesdata entry 1202, thepart 2 application data file 1102 is transmitted to vault receiving 126. Vault receiving 126 receives thepart 2application data file 1102 and atstep 1216 generates an alias account number. Fromstep 1216, the process proceeds to step 1218, where vault receiving 126 also uses thepart 2 application data file 1102 to generate analias file 1220. The alias file is transferred fromstep 1218 to step 1220. Atstep 1220, the alias file is transferred to vault 114 for processing. - Next, at
step 1222,vault 114 receives the data from the alias file and puts it in atemporary database 1002. Fromstep 1222, the process proceeds to decision block 1226. At decision block 1226,vault 114 determines ifpart 1 of the application if available. Ifpart 1 of the application is not available, the proceeds to step 1230. At step 1230, vault 114 transmits a non mon to request the part I application details. Ifpart 1 of the application is available, the process proceeds todecision block 1228. Atdecision block 1228,vault 114 determines whetherpart 2 of the application is available. Ifdecision block 1228 determines thatpart 2 is not available,vault 114 remains atstep 1228 untilpart 2 of the application becomes available. However, if atdecision block 1228vault 114 determines thatpart 2 of the application is available, the process proceeds to step 1234. Atstep 1234, thevault 114 will match the DTN on the alias account with the primary account number, stored in two files, and add relevant entries to the matching database 120 (FIG. I) and mail redirection database 1008 (FIG. 12). - Once the
vault 114 has matched the primary and alias account atstep 1234, the process proceeds to step 1240. Atstep 1240,vault 114 generates an alias account file. Next, the alias account file is transferred fromstep 1240 to step 1242. Atstep 1242, the alias account file, identified as the alias account acquisition and updating file, is transferred to step 1244. Atstep 1214, the alias account acquisition and updating file is input to the next day's cycle onHPS 118. - FIG. 20 illustrates the
account maintenance process 1300.Account maintenance process 1300 is used to change and maintain the primary and alias account information. To initiate a change of name, address or credit line on an account, a request is made atstep 1302 and transferred to the host processing system (HPS) 118. The request is then transferred to step 1304. Atstep 1304,HPS 118 will update, in the normal process flow, the associated account information in the host area. Fromstep 1304, the process proceeds to step 1306. Atstep 1306,HPS 118 will select, in its nightly cycle, the accounts associated with the alias account system. Once those accounts are selected, the process proceeds to step 1308. At step 1308, the changes are put into a file. From step 1308, the file is transferred to step 1310. At step 1310, the file, identified as the account update file, is transferred to vault 114. - At
decision block 1312,vault 114 determines if any alias account update information has been received from the host. If there is no update information received from the host, the process proceeds to step 1302 and waits for the next request. If atstep 1312vault 114 determines thatHPS 118 has transferred update information, the process proceeds to step 1314. Atstep 1314, vault 114 reads the account update file and makes the corresponding changes in the mail redirection database 1008 (FIG. 12). - Once
step 1314 is complete, the process proceeds todecision block 1318. Atdecision block 1318,vault 114 determines if there have been alias account updates from a system operator. If a system operator has made changes to alias accounts, the process proceeds to step 1320. At step 1320,vault 114 creates a non mon to update the alias details in the host (for a further discussion of non mon transactions refer to FIGS. 6, 8, and 9). At this point, the process returns to step 1302 and waits for a new request (change of name, address and/or credit limit). - If at
decision block 1318, thevault 114 determines that an operator has made no changes to an alias account, the process proceeds to decision block 1322. At decision block 1322,vault 114 will determine if there has been a request for a primary account credit line update. If at decision block 1322,vault 114 determines that there is no request for a primary account credit line update, then the process proceeds to step 1326 and ends. However, if at decision block 1322,vault 114 determines that there is a request for a primary account credit line update, then the process proceeds to step 1324. At step 1334,vault 114 creates a non mon to update the alias account's credit line on the host. At this point, the process returns to step 1302 and waits for a new request (change of name, address and/or credit limit). - FIG. 21 illustrates a
collections process 1400. Thecollections process 1400 identifies the alias and/or primary accounts that are delinquent and going into collections onHPS 118, combines them invault 114, and sends them to collections. Thecollections process 1400 begins atstep 1402, whereHPS 118 selects the accounts for collection. The process then proceeds to step 1404, whereHPS 118 places the selected accounts in a special queue. Fromstep 1404, the selected accounts are transferred to step 1406. Atstep 1406,HPS 118 transfers the account numbers of the selected accounts into a file. Fromstep 1406, the process proceeds to step 1407. Atstep 1407, the file, identified as a collections account number file, is transferred to thevault 114. - At
step 1408, thevault 114 receives the account numbers transferred fromstep 1407. Fromstep 1408, the account numbers are transferred todecision block 1412. Atdecision block 1412, thevault 114 determines whether the account sent for collection is a primary account. If the account sent for collection is determined to be a primary account, the process proceeds fromdecision block 1412 to step 1414. Instep 1414,vault 114 will retrieve the alias account number from thematching database 120. Next, the process proceeds fromstep 1414 to step 1416, where the alias and primary account numbers are put into a file. From step 1416, the alias and primary account numbers are transferred to step 1421. At step 1421, the file, identified as the account collections file, is transferred to step 1422. Atstep 1422,HPS 118 receives the file containing the alias/primary account numbers and puts them into a working queue. - If
decision block 1412 determines that the account sent for collection was not a primary account, the process proceeds to step 1420. Similarly, from step 1416, the alias and primary account numbers are also transferred to step 1420. At step 1420, the alias and primary account numbers are also used to create non mons for combining the two accounts and terminating the alias account. From step 1420, the non mons are transferred to step 1424. Atstep 1424, the file containing non mons is transferred back toHPS 118. Atstep 1426, theHPS 118 receives the file containing the non mons transferred instep 1424. Next, the process proceeds to step 1428. Atstep 1428,HPS 118 updates the master file and sends anaccount transfer confirmation 1428 back tovault 114. When thevault 114 receives theconfirmation 1428 at step 1410,vault 114, sets the deactivation flag in thematching database 120 for the primary and alias accounts. - FIG. 22 is a flow chart illustrating a
mail redirection process 1500. Themail redirection process 1500 is used to replace the alias name and address with the cardholder's real name and address on documents sent to the cardholder.Mail redirection process 1500 begins atstep 1502, whereHPS 118 will generate a mailing document. Next, the process proceeds to step 1504, where the host processing system (HPS) 118 will select the alias account documents and put them in a file. Fromstep 1504, the process proceeds to step 1503. Atstep 1503, the file, identified as an alias document file, is transferred to vault 114. -
Vault 114, atstep 1506, receives the file transferred fromstep 1503. Atstep 1506, thevault 114, using the box number on the alias address and the primary account number, determine the real name and address from the mail redirection andmatching databases step 1512, thevault 114 replaces the alias name and address with the real name and address on the document and placed them into a file. Fromstep 1512, the file, identified as a redirected mail file, is transferred instep 1513 toHPS 118. The file transferred instep 1513 is received byHPS 118 instep 1514. Instep 1514,HPS 118 receives the corrected mail and sends it to the printing system. - In view of the foregoing, it will be apparent that anonymous payment transactions are provided, enabled, and/or facilitated with regard to the account holders so as to avoid undesirable compromises of privacy and anonymity on the part of consumers in their financial transactions.
- The following is a description that depicts one example embodiment of the present invention. While this particular Kid Card embodiment is fully capable of attaining the above described features and benefits of the present invention, it is to be understood that the Kid Card embodiment represents a presently preferred embodiment of the invention and, as such, is merely a representative of the subject matter that is broadly contemplated by the present invention. It is further to be understood that the scope of the present invention fully encompasses embodiments other than the Kid Card and that the scope of the present invention is not limited by the following example embodiment.
- In a preferred embodiment, the Kid Card is a credit or debit card that makes limited purchasing power available to children. Preferably, the transactions performed with the Kid Card are anonymous, and the products available for purchase with the Card are subject to parental control. In one embodiment, children are guided through the shopping experience by the Web pages supplied by the hosting entity.
- In a preferred embodiment, the transactions performed with the Kid Card are anonymous. For example, a child that purchases an item over the Internet uses the Card to pay for the item. When real time approval is sought by the entity processing the transaction, rather than using true identity data to authenticate the transaction, an alias set of information is used as described above. This alias set of information is compared to an offline secure database in the bunker that compares the alias information to the true identity data and authenticates the transaction. In this example, the true identity of the purchaser is thus never compromised and therefore never available to the processing company for inclusion on a demographic list.
- In one embodiment, parents can put restrictions on the types of items that the Kid Card may purchase. For example, the authenticating database might be configured to allow the purchase of only Type1 and Type2 items. Thus, if a child attempted to purchase a Type3 item such as adult content material or a Tommy Gun, the transaction would be denied. Alternatively, the parental control can take the form of restrictions on the products that are available for purchase. For example, a group of parents who have created a Web page can offer the Kid Card. In this example embodiment, the group controlling the content of the Web page additionally controls product availability by selecting the items that are available for purchase by children. Yet another example of parental control is based on a password scheme. In this embodiment, the service provider requires a password from the child before allowing the child to enter the shopping area. Based on that password and input the service provider has received from the parents, the products available to the child for purchase are filtered. Thus, the parents have control over what items are made available to their children by creating a shopping profile. Such a profile could be generated, for example, as part of the application process for the Kid Card.
- In a preferred embodiment, the Internet Service Provider (“ISP”) acts as the guide to the children's shopping experience. For example, the ISP could be America On Line (“AOL”) or any other provider. Alternatively, the entity providing the Kid Card service could be a web page and not an ISP at all. However, for simplicity in the example, AOL will be used as both the ISP and the entity providing the Kid Card service. In this example, AOL is the ISP. Additionally, AOL hosts a special “kids only” shopping area. The kids only shopping area may be accessible only with an additional password. The additional password could be assigned, for example, as part of the application process for the Kid Card. Because the kids only shopping area is within AOL, AOL is able to create the flow of the pages available to the children as they shop. Therefore, in this example, AOL guides the shopping children through the online store, displaying whatever advertisements and marketing materials deemed appropriate by AOL.
- In one embodiment, the Kid Card can be a credit card with a predetermined limit. Alternatively, the Kid Card can be a debit card with an available balance that has been paid in advance. For example, the application process for the debit Kid Card might require that a certain amount of money be prepaid on the debit Kid Card to cover any future purchases made with the card. In this example, when the funds are used up, the debit Kid Card no longer allows the purchase of goods. Additional funds must be paid to replenish the purchasing power of the Kid Card and allow the child to purchase additional goods. Alternatively, in the credit card embodiment, the Kid Card can purchase items up to a certain monetary limit. For example, if the credit limit was $200.00 then purchases equaling that amount can be made before payment is required. Additionally in this example, bills must be sent out by the company providing the Kid Card shopping service.
- A feature of one embodiment is the availability of prepaid gift cards. These cards operate on the same principle as a debit card or a prepaid phone card. For example, a parent could purchase a Kid Card for $200.00 and give it as a gift to a child. The child is then able to purchase $200.00 worth of goods with the Kid Card. The difference in this example embodiment is that when the funds are exhausted on the gift Kid Card, the level of funds cannot be replenished.
- While various embodiments of the present invention have been described above, it should be understood that they have been presented by way of example only, and not limitation. Thus, the breadth and scope of the present invention should not be limited by any of the above described exemplary embodiments, but should be defined only in accordance with the following claims and their equivalents.
- As stated, it is often desirable to protect the identity of consumers when ordering merchandise over the telephone, Internet or by any other means, when said merchandise is to be shipped to the residence or business of the consumer. The present invention provides a means for a consumer to order merchandise without revealing their true address to the merchant and/or shipper.
- FIG. 23 is a schematic diagram that depicts one embodiment of the disguised mailing feature in accordance with one embodiment of the present invention. As shown a
cardholder 200 having an alias account, as described above, makes a purchase from amerchant 202. The purchase can be over the telephone, over the Internet or any other computer network, or via any other means available. The merchant uses the alias address associated with the alias account, as described above, to ship the package. In one embodiment, this alias address is a warehouse or the like, referred to herein as the disguised mailing center (DMC). Typically, a bin number associated with the Alias account is used to store the package in a specific location within the DMC. For example the Alias box number shown in the Mail Redirection data table 182, above, can be used for this purpose. The Alias box number is then used to generate a subscriber information request to the offline database to retrieve the true mailing address of the consumer. Once this address is obtained, the package is relabeled with the true address and sent to theconsumer 208. Preferably, this takes place within twenty-four hours to avoid any further delays to the consumer. In case of returns, the consumer is provided with a mailing label that sends the package directly back to themerchant 202. Preferably, the return address printed on the return label will be that of theDMC 204. Alternatively, in a preferred embodiment, the relabeling process takes place by the shipper in transit. For example, the shipper can contact aserver 22, which contacts the offline database with a request for address information. The shipper can then relabel the package with the true address while the package is in transit, and thereby eliminate any extra delays. - FIG. 24 is a flow chart that depicts a process that can be used to relabel packages in accordance with one embodiment of the present invention as described above. First, as shown by
step 250, the consumer orders a product using an anonymous transaction system in accordance with the present invention as described above. Accordingly, the user typically, uses an credit or debit card associated with an Alias account to purchase the merchandise. Next as indicated bystep 252, the merchant mails the package (or directs a shipper to mail the package), to the Alias address. In one embodiment, the Alias address is a warehouse or a location referred to as a disguised mailing center (DMC). Next, as indicated by step 255, the bin number for set of characters) is input into a relabeling system. In one example embodiment, the bin number is a unique set of characters which is used to correlate an anonymous name/address (i.e. pseudonym) with a real name/address. The bin is read into the system by scanning in a bar code or the like that comprises the bin. Alternatively, this information can be keyed by hand into the system. In any case, this action generates a request to a server that in turn contacts the bunker for the true address of the consumer. Once this information is retrieved, the package is relabeled with the true address, as indicated bystep 258. Finally, as indicated bystep 260, the package is shipped to the consumer in accordance with consumer preferences (i.e. overnight, no signature necessary, etc.). - A second example of a method that can be used to relabel packages is depicted by the process flowchart in FIG. 25. As indicated by
step 264, the consumer orders a product from a merchant using an anonymous transaction system as described above. As described above, package is shipped using the Alias address associated with the account. Next, as indicated bystep 268, the shipper issues a request to the bunker for the true address of the consumer. This is accomplished in a manner as described above, typically through aserver 23. Again, the Alias address or bin number in this example, is used to identify the consumer. Next, as indicated bystep 270, the shipper receives the true address of the consumer and relabels the package with that address, as shown bystep 272. Finally, as indicated bystep 274, the package is shipped to the consumer in accordance with consumer preferences (i.e. overnight, no signature necessary, etc.). - In a third embodiment, the anonymous mailing is accomplished by mailing the merchandise to post office box, which is rented by the credit card processing company, on behalf of the cardholder. The address associated with the cardholder alias name is the post office box assigned to the cardholder. In one embodiment, the post office box is as close geographically, to the actual address of the cardholder. In this example embodiment, the cardholder picks up the merchandise from the post office box in person.
- Privacy concerns also arise in connection with shipments and mail delivery unrelated to a purchase. For example, a person may wish to enter sweepstakes and order catalogs and samples without revealing own identity. Although these “transactions” do not involve payments, personal information is obtained by the provider of the information or service (also a “merchant” hereinafter). Thus, the shipment methods and systems described above are also useful for private anonymous mail delivery service. Moreover, in our increasingly mobile society, mail and packages are often lost when a person moves to a new address. Although change of address forms may be filed with the United States Postal Service, they stay in effect for only a limited period of time; public entities are also notoriously unreliable. Private mail delivery service nicely solves these problems as well, by providing a relatively more stable mailing “address” coupled with reliance on a for profit, competitive entity having a self interest in customer service.
- One embodiment of such generic private mail service is depicted in FIG. 26. Initially, the consumer (301) registers with the private mail service (“PMS” 310), which can be conceptually divided into Private Mail Administration Service (“PMAS” 311) and Private Mail Mapping Center (“PMMC” 312). PMAC is responsible for customer registration and subscription, billing, assignment of Private Mail codes, and customer service functions such as changes to delivery address, modifying account data, canceling subscriptions, as well as various other account maintenance functions.
- The PMAC is accessible to customers via the Internet, telephone, and mail, although any one contact method is sufficient. Full service is preferably available through each method of customer contact.
- During the registration process, see FIG. 27, the PMAC obtains customer name, billing information, mail delivery address, and possibly other information. Once these data are collected and processed, the PMAC assigns a unique Private Mail Code to a customer. The code is generated by automated Private Mail Code generation process, which assigns a unique character string to be used as the Private Mail code. Next, PMAC maps the code to the customer delivery address on record. More than one code may be generated for one customer.
- In order to modify any subscription data, e.g., name or address, the customer will need to authenticate his identity. The authentication process may use a personal identification number (PIN), password, digital certificate, written signature, or other means of positive identification. Customer service is preferably available for PMAC activities, so that account changes and customer issues may be resolved quickly after a customer's registration or other relevant transaction is processed by the PMAC, the delivery address and associated Private Mailing code is added to the PMMC and stored in its database (313). If PMAC and PMMC are physically separate from each other, a secure communication link (314) should be established between them for information transfer. All updates to the PMMC database are preferable made in real or quasi real time. A “live” data backup in another physical location (not pictured) is preferably maintained, so that the data is redundantly stored and service need not be interrupted if PMMC fail or PMAC fail.
- Generally, consumers will not be able to update the PMMC database directly, but will have to identify themselves and follow the registration and information updating protocol established by the PMAC, as previously described. The specific update functions that consumers will be able to perform include, but are not limited to creation of a new Private Mail code, deletion of an unwanted Private Mail code, and changes to the delivery address associated with a Private Mail code.
- PMMC's main function is to provide shippers with the delivery address information associated with the Private Mail code. It includes a secure interface to allow the shippers to look up the delivery address associated with a Private Mail code. Additionally, the PMMC might handle administration functions associated with the shippers, such as access control to the PMMC, usage, and billing or payment of any transaction fees or service charges.
- The PMMC is preferably a high availability service designed for continuous2417 operations. This will be achieved through the use of redundant equipment, multiple physical data center locations, robust disaster recovery methods, and other means designed to prevent service interruptions. PMMC's database is highly secure, accessible only to authorized users. At a minimum, it maintains the following data: Private Mail code, physical delivery address, authorized users, and audit trail with date/time/user associated with each access.
- Shippers' access to the PMMC database is restricted to lookup operations that map a Private Mail code to a delivery address, and to access to certain administrative functions of the PMAC that are used for troubleshooting, problem resolution, and account maintenance.
- After a customer's registration is completed, the Private Mail Service is activated. Following activation, the customer has a brand new address (the Private Mailing code) assigned.
- FIG. 28 shows a flowchart of a typical transaction, which, of course, need not be a purchase, but instead may be any interaction that results in a mailing or shipping. The customer provides the Private Mail code to a merchant to enable the merchant to ship mail or parcels to the customer. Using the example of an online purchase, the customer orders from the merchant in the usual way, but supplies only the Private Mail code as the “ship to” address. The merchant then fills the order and labels it for shipment using only the Private Mail code. The parcel is picked up by the shipper. The shipper, a Private Mail partner, accesses the PMMC to map the Private Mail code on the parcel to the customer's physical delivery address. Once the mapping is completed, the shipper relabels the parcel, either physically or electronically, with the delivery address and completes the delivery using conventional means.
- While various embodiments of the present invention have been described above, it should be understood that they have been presented by way of example only, and not limitation.
Claims (52)
Priority Applications (5)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US10/248,345 US20040083184A1 (en) | 1999-04-19 | 2003-01-10 | Anonymous card transactions |
US10/710,740 US7213748B2 (en) | 1999-04-19 | 2004-07-30 | Anonymous mailing and shipping transactions |
US10/710,742 US20040260653A1 (en) | 1999-04-19 | 2004-07-30 | Anonymous transactions |
US10/710,741 US7264152B2 (en) | 1999-04-19 | 2004-07-30 | Anonymous transaction authentication |
US11/839,472 US20080052244A1 (en) | 1999-04-19 | 2007-08-15 | Anonymous transaction authentication |
Applications Claiming Priority (14)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US29427099A | 1999-04-19 | 1999-04-19 | |
US32629899A | 1999-06-04 | 1999-06-04 | |
US16416999P | 1999-11-09 | 1999-11-09 | |
US16554799P | 1999-11-15 | 1999-11-15 | |
US16554699P | 1999-11-15 | 1999-11-15 | |
US47174499A | 1999-12-23 | 1999-12-23 | |
US47411099A | 1999-12-29 | 1999-12-29 | |
US47437899A | 1999-12-29 | 1999-12-29 | |
US47617599A | 1999-12-30 | 1999-12-30 | |
US61430200A | 2000-07-12 | 2000-07-12 | |
US25919002A | 2002-09-27 | 2002-09-27 | |
US28405602A | 2002-10-30 | 2002-10-30 | |
US33114202A | 2002-12-27 | 2002-12-27 | |
US10/248,345 US20040083184A1 (en) | 1999-04-19 | 2003-01-10 | Anonymous card transactions |
Related Parent Applications (6)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US32629899A Continuation-In-Part | 1999-04-19 | 1999-06-04 | |
US47174499A Continuation-In-Part | 1999-04-19 | 1999-12-23 | |
US47437899A Continuation-In-Part | 1999-04-19 | 1999-12-29 | |
US25919002A Continuation-In-Part | 1999-04-19 | 2002-09-27 | |
US28405602A Continuation-In-Part | 1999-04-19 | 2002-10-30 | |
US33114202A Continuation-In-Part | 1999-04-19 | 2002-12-27 |
Related Child Applications (3)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US10/710,741 Continuation US7264152B2 (en) | 1999-04-19 | 2004-07-30 | Anonymous transaction authentication |
US10/710,742 Continuation-In-Part US20040260653A1 (en) | 1999-04-19 | 2004-07-30 | Anonymous transactions |
US10/710,740 Continuation US7213748B2 (en) | 1999-04-19 | 2004-07-30 | Anonymous mailing and shipping transactions |
Publications (1)
Publication Number | Publication Date |
---|---|
US20040083184A1 true US20040083184A1 (en) | 2004-04-29 |
Family
ID=32111236
Family Applications (4)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US10/248,345 Abandoned US20040083184A1 (en) | 1999-04-19 | 2003-01-10 | Anonymous card transactions |
US10/710,740 Expired - Lifetime US7213748B2 (en) | 1999-04-19 | 2004-07-30 | Anonymous mailing and shipping transactions |
US10/710,741 Expired - Lifetime US7264152B2 (en) | 1999-04-19 | 2004-07-30 | Anonymous transaction authentication |
US11/839,472 Abandoned US20080052244A1 (en) | 1999-04-19 | 2007-08-15 | Anonymous transaction authentication |
Family Applications After (3)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US10/710,740 Expired - Lifetime US7213748B2 (en) | 1999-04-19 | 2004-07-30 | Anonymous mailing and shipping transactions |
US10/710,741 Expired - Lifetime US7264152B2 (en) | 1999-04-19 | 2004-07-30 | Anonymous transaction authentication |
US11/839,472 Abandoned US20080052244A1 (en) | 1999-04-19 | 2007-08-15 | Anonymous transaction authentication |
Country Status (1)
Country | Link |
---|---|
US (4) | US20040083184A1 (en) |
Cited By (119)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20010044785A1 (en) * | 2000-01-05 | 2001-11-22 | Stolfo Salvatore J. | Method and system for private shipping to anonymous users of a computer network |
US20020111919A1 (en) * | 2000-04-24 | 2002-08-15 | Visa International Service Association | Online payer authentication service |
US20020184623A1 (en) * | 2001-05-30 | 2002-12-05 | Hodge Gregory A. | Methods and apparatus for interactive television |
US20030204445A1 (en) * | 2002-04-26 | 2003-10-30 | Vishik Claire S. | System and method for supporting anonymous transactions |
US20030204470A1 (en) * | 2000-05-10 | 2003-10-30 | Jeff Manchester | Method, apparatus, and code for issuing a dual credit card |
US20040059688A1 (en) * | 2002-09-10 | 2004-03-25 | Visa International Service Association | Data authentication and provisioning method and system |
US20040138989A1 (en) * | 2002-07-16 | 2004-07-15 | O'malley Anne | Method and apparatus for enrolling with multiple transaction enviroments |
US20040158532A1 (en) * | 2000-03-07 | 2004-08-12 | Lydia Breck | System for facilitating a transaction |
US20040230534A1 (en) * | 2003-05-12 | 2004-11-18 | Digital Matrix Systems, Inc. | Encrypted credit application processing system and method |
US20050027655A1 (en) * | 2003-07-15 | 2005-02-03 | American Express Travel Related Services Company, Inc. | System and method for activating or changing the status of an account associated with a prepaid card |
US20050033619A1 (en) * | 2001-07-10 | 2005-02-10 | American Express Travel Related Services Company, Inc. | Method and system for tracking user performance |
US20050033686A1 (en) * | 2001-07-10 | 2005-02-10 | American Express Travel Related Services Company, Inc. | System and method for securing sensitive information during completion of a transaction |
US20050038718A1 (en) * | 2001-07-10 | 2005-02-17 | American Express Travel Related Services Company, Inc. | Method and system for facilitating a shopping experience |
US20050038741A1 (en) * | 2001-07-10 | 2005-02-17 | American Express Travel Related Services Company, Inc. | Method and system for a travel-related multi-function fob |
US20050071687A1 (en) * | 2003-09-30 | 2005-03-31 | Novell, Inc. | Techniques for securing electronic identities |
US20050125686A1 (en) * | 2003-12-05 | 2005-06-09 | Brandt William M. | Method and system for preventing identity theft in electronic communications |
US20050125342A1 (en) * | 2003-10-01 | 2005-06-09 | Steven Schiff | System and method for interactive electronic fund raising and electronic transaction processing |
US20050171898A1 (en) * | 2001-07-10 | 2005-08-04 | American Express Travel Related Services Company, Inc. | Systems and methods for managing multiple accounts on a rf transaction device using secondary identification indicia |
US20050228679A1 (en) * | 2004-04-07 | 2005-10-13 | Alana King | Automated account statement generation process |
US20060036547A1 (en) * | 2004-08-10 | 2006-02-16 | Hiroshi Yasuhara | Authentication system, card and authentication method |
US20060083214A1 (en) * | 2004-10-14 | 2006-04-20 | Grim Clifton E Iii | Information vault, data format conversion services system and method |
US20060089909A1 (en) * | 2004-10-21 | 2006-04-27 | First National Technologies Inc. | Cardless transaction system |
US20060169768A1 (en) * | 1998-05-29 | 2006-08-03 | E-Micro Corporation | System for associating identification and personal data for multiple magnetic stripe cards or other sources to facilitate a transaction and related methods |
US20070078763A1 (en) * | 2005-09-30 | 2007-04-05 | Babi Rene P | Method and system for transferring funds between two phone callers |
US20070106611A1 (en) * | 2005-11-09 | 2007-05-10 | Larsen Christian P | Method and system for preventing identity theft and providing credit independent completion of transactions |
US20070124212A1 (en) * | 2005-11-29 | 2007-05-31 | Target Brands, Inc. | E-mail based gift delivery |
US20070228161A1 (en) * | 2004-05-17 | 2007-10-04 | American Express Travel Related Services Company, Inc. | Limited use pin system and method |
US20080010203A1 (en) * | 2004-09-13 | 2008-01-10 | Grant David S | Purchasing Alert Methods And Apparatus |
US20080016003A1 (en) * | 1999-06-18 | 2008-01-17 | Echarge Corporation | Method and apparatus for ordering goods, services, and content over an internetwork using a virtual payment account |
WO2008017715A1 (en) * | 2006-08-10 | 2008-02-14 | Cards Off Sa | Method and system for executing electronic commerce transactions |
US20080059374A1 (en) * | 1998-05-29 | 2008-03-06 | E-Micro Corporation | Wallet Consolidator and Related Methods of Processing a Transaction Using a Wallet Consolidator |
US20080296369A1 (en) * | 2007-05-29 | 2008-12-04 | Shaun Bodington | System and method for managing enhancement features assigned to financial presentation devices |
US20090037471A1 (en) * | 2005-09-28 | 2009-02-05 | One Smart Star Limited | Communicating with business customers |
US20090059936A1 (en) * | 2005-04-25 | 2009-03-05 | Dirk Van De Poel | Process for manging resource address requests and associated gateway device |
WO2008004217A3 (en) * | 2006-07-02 | 2009-04-30 | One Smart Star Ltd | Compact contact details coordination unit and method |
US20090132424A1 (en) * | 2007-11-20 | 2009-05-21 | Propay Usa, Inc. | Secure payment capture processes |
US20090158030A1 (en) * | 2007-12-14 | 2009-06-18 | Mehran Randall Rasti | Doing business without SSN, EIN, and charge card numbers |
US20090198615A1 (en) * | 2008-02-01 | 2009-08-06 | Mazooma, Llc | Method, Device, and System for Completing On-Line Financial Transaction |
US20090240620A1 (en) * | 2008-03-24 | 2009-09-24 | Propay Usa, Inc. | Secure payment system |
US20090325542A1 (en) * | 2007-04-17 | 2009-12-31 | David Wentker | Method and system for authenticating a party to a transaction |
US20100030697A1 (en) * | 2008-08-04 | 2010-02-04 | Propay, Inc. | End-to-end secure payment processes |
US7668750B2 (en) | 2001-07-10 | 2010-02-23 | David S Bonalle | Securing RF transactions using a transactions counter |
US7690577B2 (en) | 2001-07-10 | 2010-04-06 | Blayn W Beenau | Registering a biometric for radio frequency transactions |
US7707120B2 (en) | 2002-04-17 | 2010-04-27 | Visa International Service Association | Mobile account authentication service |
US7705732B2 (en) | 2001-07-10 | 2010-04-27 | Fred Bishop | Authenticating an RF transaction using a transaction counter |
US7716467B1 (en) * | 2005-12-02 | 2010-05-11 | Sprint Communications Company L.P. | Encryption gateway service |
US7725427B2 (en) | 2001-05-25 | 2010-05-25 | Fred Bishop | Recurrent billing maintenance with radio frequency payment devices |
US7729359B1 (en) | 2006-03-15 | 2010-06-01 | Manu Kumar | Methods and systems for providing address transparency |
US20100174737A1 (en) * | 2008-02-12 | 2010-07-08 | Chazon Stein | System and Method for Communications |
US7762457B2 (en) | 2001-07-10 | 2010-07-27 | American Express Travel Related Services Company, Inc. | System and method for dynamic fob synchronization and personalization |
US7793845B2 (en) | 2004-07-01 | 2010-09-14 | American Express Travel Related Services Company, Inc. | Smartcard transaction system and method |
US7805378B2 (en) | 2001-07-10 | 2010-09-28 | American Express Travel Related Servicex Company, Inc. | System and method for encoding information in magnetic stripe format for use in radio frequency identification transactions |
US7886157B2 (en) | 2001-07-10 | 2011-02-08 | Xatra Fund Mx, Llc | Hand geometry recognition biometrics on a fob |
US20110055077A1 (en) * | 2009-09-02 | 2011-03-03 | Susan French | Portable consumer device with funds transfer processing |
US7925535B2 (en) | 2001-07-10 | 2011-04-12 | American Express Travel Related Services Company, Inc. | System and method for securing RF transactions using a radio frequency identification device including a random number generator |
US20110119190A1 (en) * | 2009-11-18 | 2011-05-19 | Magid Joseph Mina | Anonymous transaction payment systems and methods |
US20110178926A1 (en) * | 2010-01-19 | 2011-07-21 | Mike Lindelsee | Remote Variable Authentication Processing |
US8001054B1 (en) | 2001-07-10 | 2011-08-16 | American Express Travel Related Services Company, Inc. | System and method for generating an unpredictable number using a seeded algorithm |
USRE43157E1 (en) | 2002-09-12 | 2012-02-07 | Xatra Fund Mx, Llc | System and method for reassociating an account number to another transaction account |
US8121941B2 (en) | 2000-03-07 | 2012-02-21 | American Express Travel Related Services Company, Inc. | System and method for automatic reconciliation of transaction account spend |
US20120109672A1 (en) * | 2001-01-19 | 2012-05-03 | C-Sam, Inc. | Transactional services |
US20120166334A1 (en) * | 2010-12-23 | 2012-06-28 | Debbie Kimberg | Methods and systems for identity based transactions |
US8284025B2 (en) | 2001-07-10 | 2012-10-09 | Xatra Fund Mx, Llc | Method and system for auditory recognition biometrics on a FOB |
US20120330841A1 (en) * | 2008-02-01 | 2012-12-27 | Qun Chen | Device and method for facilitating financial transactions |
US8423349B1 (en) | 2009-01-13 | 2013-04-16 | Amazon Technologies, Inc. | Filtering phrases for an identifier |
US8429041B2 (en) | 2003-05-09 | 2013-04-23 | American Express Travel Related Services Company, Inc. | Systems and methods for managing account information lifecycles |
US8566169B2 (en) | 2011-07-15 | 2013-10-22 | Bank Of America Corporation | Virtual gift card |
US20140019367A1 (en) * | 2012-07-13 | 2014-01-16 | Apple Inc. | Method to send payment data through various air interfaces without compromising user data |
US8635131B1 (en) | 2001-07-10 | 2014-01-21 | American Express Travel Related Services Company, Inc. | System and method for managing a transaction protocol |
US20140108134A1 (en) * | 2012-10-11 | 2014-04-17 | Pitney Bowes Inc. | Method and system for negotiating group offers while maintaining privacy of consumers |
US8706643B1 (en) | 2009-01-13 | 2014-04-22 | Amazon Technologies, Inc. | Generating and suggesting phrases |
US8706644B1 (en) | 2009-01-13 | 2014-04-22 | Amazon Technologies, Inc. | Mining phrases for association with a user |
US8768852B2 (en) | 2009-01-13 | 2014-07-01 | Amazon Technologies, Inc. | Determining phrases related to other phrases |
US20140188586A1 (en) * | 2013-01-02 | 2014-07-03 | Andrew Carpenter | Tokenization and third-party interaction |
US8799658B1 (en) | 2010-03-02 | 2014-08-05 | Amazon Technologies, Inc. | Sharing media items with pass phrases |
US20140265300A1 (en) * | 2013-03-13 | 2014-09-18 | Ebay Inc. | Smart anti-fraud shipping labels |
US20150026214A1 (en) * | 2013-07-19 | 2015-01-22 | New Jersey Appleseed Public Interest Law Center | System and Method for Facilitating Access to Open Public Records |
US20150058146A1 (en) * | 2013-08-23 | 2015-02-26 | Ajit Gaddam | Dynamic Account Selection |
USRE45416E1 (en) | 2001-07-10 | 2015-03-17 | Xatra Fund Mx, Llc | Processing an RF transaction using a routing number |
US9024719B1 (en) | 2001-07-10 | 2015-05-05 | Xatra Fund Mx, Llc | RF transaction system and method for storing user personal data |
US9031880B2 (en) | 2001-07-10 | 2015-05-12 | Iii Holdings 1, Llc | Systems and methods for non-traditional payment using biometric data |
US20150206107A1 (en) * | 2008-02-01 | 2015-07-23 | Mazooma Technical Services, Inc. | Device and method for facilitating financial transactions |
US20150254661A1 (en) * | 2006-10-25 | 2015-09-10 | Payfont Limited | Secure authentication and payment system |
US9152963B2 (en) | 2012-10-08 | 2015-10-06 | Bank Of America Corporation | Gift card transaction processing |
US9298700B1 (en) | 2009-07-28 | 2016-03-29 | Amazon Technologies, Inc. | Determining similar phrases |
US20160173457A1 (en) * | 2009-07-16 | 2016-06-16 | Oracle International Corporation | Techniques for securing supply chain electronic transactions |
US9454752B2 (en) | 2001-07-10 | 2016-09-27 | Chartoleaux Kg Limited Liability Company | Reload protocol at a transaction processing entity |
US9454758B2 (en) | 2005-10-06 | 2016-09-27 | Mastercard Mobile Transactions Solutions, Inc. | Configuring a plurality of security isolated wallet containers on a single mobile device |
US9471926B2 (en) | 2010-04-23 | 2016-10-18 | Visa U.S.A. Inc. | Systems and methods to provide offers to travelers |
US9569770B1 (en) | 2009-01-13 | 2017-02-14 | Amazon Technologies, Inc. | Generating constructed phrases |
US9600808B1 (en) | 2011-06-24 | 2017-03-21 | Epic One Texas, Llc | Secure payment card, method and system |
US9760905B2 (en) | 2010-08-02 | 2017-09-12 | Visa International Service Association | Systems and methods to optimize media presentations using a camera |
US20170331820A1 (en) * | 2014-11-14 | 2017-11-16 | Orange | Method for connecting a mobile terminal with a server of a service provider via an operator platform |
US9886691B2 (en) | 2005-10-06 | 2018-02-06 | Mastercard Mobile Transactions Solutions, Inc. | Deploying an issuer-specific widget to a secure wallet container on a client device |
WO2018044647A1 (en) * | 2016-09-01 | 2018-03-08 | Pujari Jaswant | System and method for securely processing payment transactions |
US9947020B2 (en) | 2009-10-19 | 2018-04-17 | Visa U.S.A. Inc. | Systems and methods to provide intelligent analytics to cardholders and merchants |
US9947007B2 (en) | 2013-01-27 | 2018-04-17 | Barry Greenbaum | Payment information technologies |
US10007712B1 (en) | 2009-08-20 | 2018-06-26 | Amazon Technologies, Inc. | Enforcing user-specified rules |
US10223707B2 (en) | 2011-08-19 | 2019-03-05 | Visa International Service Association | Systems and methods to communicate offer options via messaging in real time with processing of payment transaction |
US10313480B2 (en) | 2017-06-22 | 2019-06-04 | Bank Of America Corporation | Data transmission between networked resources |
US10360627B2 (en) | 2012-12-13 | 2019-07-23 | Visa International Service Association | Systems and methods to provide account features via web based user interfaces |
US10425396B2 (en) * | 2002-04-26 | 2019-09-24 | International Business Machines Corporation | Efficient browser-based identity management providing personal control and anonymity |
US10432685B2 (en) * | 2016-05-31 | 2019-10-01 | Brightcove, Inc. | Limiting key request rates for streaming media |
US10510055B2 (en) | 2007-10-31 | 2019-12-17 | Mastercard Mobile Transactions Solutions, Inc. | Ensuring secure access by a service provider to one of a plurality of mobile electronic wallets |
US10511692B2 (en) | 2017-06-22 | 2019-12-17 | Bank Of America Corporation | Data transmission to a networked resource based on contextual information |
US10524165B2 (en) | 2017-06-22 | 2019-12-31 | Bank Of America Corporation | Dynamic utilization of alternative resources based on token association |
US10580072B2 (en) * | 2000-09-11 | 2020-03-03 | Capital One Services, Llc | System and method for providing a credit card with multiple credit lines |
US10740731B2 (en) | 2013-01-02 | 2020-08-11 | Visa International Service Association | Third party settlement |
US10748148B2 (en) | 2015-06-05 | 2020-08-18 | Jaswant Pujari | System and method for securely processing payment transactions |
WO2021041746A1 (en) * | 2019-08-27 | 2021-03-04 | Mshift, Inc. | Stable digital token processing and encryption on blockchain |
US10963960B1 (en) * | 2018-08-30 | 2021-03-30 | Wells Fargo Bank, N.A. | Computer system for automatic credit allocation of a shared line of credit |
WO2021158723A1 (en) * | 2020-02-04 | 2021-08-12 | Syncsoft, Llc | Technologies for secure physical address alias maintenance and usage |
US11093623B2 (en) | 2011-12-09 | 2021-08-17 | Sertainty Corporation | System and methods for using cipher objects to protect data |
US11288664B2 (en) * | 2015-01-07 | 2022-03-29 | Advanced New Technologies Co., Ltd. | Method and apparatus for processing transactions |
US11386409B2 (en) | 2016-03-04 | 2022-07-12 | Sertintyone Corporation | Systems and methods for media codecs and containers |
US20220230168A1 (en) * | 2015-12-28 | 2022-07-21 | Wells Fargo Bank, N.A. | Systems and methods for transaction privacy shield |
US11423400B1 (en) * | 1999-06-18 | 2022-08-23 | Stripe, Inc. | Method and apparatus for ordering goods, services and content over an internetwork using a virtual payment account |
US11475435B2 (en) * | 2018-09-19 | 2022-10-18 | Jpmorgan Chase Bank, N.A. | Method and system for generating digital wallet accounts |
US12072989B2 (en) | 2011-12-09 | 2024-08-27 | Sertainty Corporation | System and methods for using cipher objects to protect data |
Families Citing this family (201)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP4426722B2 (en) * | 1998-05-19 | 2010-03-03 | ケルシウス,エルエルシー | Towel mat with frame member and removably attached membrane |
JP2001303934A (en) * | 1998-06-23 | 2001-10-31 | Toyota Motor Corp | Exhaust gas purification device for internal combustion engine |
KR100751622B1 (en) * | 1999-11-26 | 2007-08-22 | 네테카 인코포레이티드 | Network address server, domain name resolution method, and computer-readable recording medium |
US6805288B2 (en) * | 2000-05-15 | 2004-10-19 | Larry Routhenstein | Method for generating customer secure card numbers subject to use restrictions by an electronic card |
WO2002084531A2 (en) * | 2001-04-10 | 2002-10-24 | Univ Carnegie Mellon | Systems and methods for deidentifying entries in a data source |
US7240035B1 (en) * | 2001-05-31 | 2007-07-03 | Hall Aluminum Llc | Method and apparatus for masking private mailing address information by manipulating delivery transactions |
US7543738B1 (en) * | 2001-07-10 | 2009-06-09 | American Express Travel Related Services Company, Inc. | System and method for secure transactions manageable by a transaction account provider |
FR2828362B1 (en) * | 2001-08-02 | 2003-12-05 | Gabriel Gross | COMMUNICATION METHOD FOR A CONTROLLED EXCHANGE OF DATA BETWEEN A CLIENT TERMINAL AND A NETWORK OF HOST SITES AND PROTECTION SERVER ASSEMBLY FOR THE IMPLEMENTATION OF THIS METHOD |
US7103576B2 (en) * | 2001-09-21 | 2006-09-05 | First Usa Bank, Na | System for providing cardless payment |
US20030130912A1 (en) * | 2002-01-04 | 2003-07-10 | Davis Tommy Lee | Equipment management system |
AU2003212867A1 (en) * | 2002-01-30 | 2003-09-02 | Mastercard International Incorporated | System and method for conducting secure payment transaction |
US7890393B2 (en) | 2002-02-07 | 2011-02-15 | Ebay, Inc. | Method and system for completing a transaction between a customer and a merchant |
US9710852B1 (en) | 2002-05-30 | 2017-07-18 | Consumerinfo.Com, Inc. | Credit report timeline user interface |
US9400589B1 (en) | 2002-05-30 | 2016-07-26 | Consumerinfo.Com, Inc. | Circular rotational interface for display of consumer credit information |
US8447630B2 (en) * | 2004-02-26 | 2013-05-21 | Payment Pathways, Inc. | Systems and methods for managing permissions for information ownership in the cloud |
US7451113B1 (en) * | 2003-03-21 | 2008-11-11 | Mighty Net, Inc. | Card management system and method |
US7574447B2 (en) * | 2003-04-08 | 2009-08-11 | United Parcel Service Of America, Inc. | Inbound package tracking systems and methods |
WO2005084187A2 (en) * | 2004-02-23 | 2005-09-15 | I4 Licensing Llc | Verification and authorization of a consumer transaction |
EP1637955A1 (en) * | 2004-09-15 | 2006-03-22 | Ubs Ag | Generation of anonymized data sets for testing and developping applications |
US7979706B1 (en) * | 2004-09-29 | 2011-07-12 | Rockwell Automation Technologies, Inc. | Systems and methods for queuing an action in industrial automation systems |
US8086546B2 (en) | 2004-12-17 | 2011-12-27 | Amazon Technologies, Inc. | Method and system for anticipatory package shipping |
WO2006076311A2 (en) * | 2005-01-11 | 2006-07-20 | United States Postal Service | Methods ans systems for processing suspicious delivery fee payment indicia |
AU2005325726B2 (en) | 2005-01-25 | 2011-10-27 | I4 Commerce Inc. | Computer-implemented method and system for dynamic consumer rating in a transaction |
WO2006083694A2 (en) * | 2005-01-28 | 2006-08-10 | United Parcel Service Of America, Inc. | Registration and maintenance of address data for each service point in a territory |
US20060212304A1 (en) * | 2005-03-21 | 2006-09-21 | Matthias Krause | Automated item forwarding system and method |
US8756099B2 (en) * | 2005-04-11 | 2014-06-17 | Bill Me Later, Inc. | Consumer processing system and method |
US7527195B2 (en) | 2005-04-11 | 2009-05-05 | Bill Me Later, Inc. | Method and system for risk management in a transaction |
US20060229974A1 (en) * | 2005-04-11 | 2006-10-12 | I4 Licensing Llc | Method of extending credit to at least one consumer and method of processing a transaction between a consumer and a merchant |
US20050259658A1 (en) * | 2005-08-06 | 2005-11-24 | Logan James D | Mail, package and message delivery using virtual addressing |
US7689007B2 (en) | 2005-09-16 | 2010-03-30 | Privacy Card, Llc | Methods and systems for protection of identity |
US9582802B2 (en) * | 2005-10-07 | 2017-02-28 | Kemesa, Inc. | Identity theft and fraud protection system and method |
US8396747B2 (en) * | 2005-10-07 | 2013-03-12 | Kemesa Inc. | Identity theft and fraud protection system and method |
US8719106B2 (en) * | 2005-10-07 | 2014-05-06 | Kemesa Inc. | Identity theft and fraud protection system and method |
US8108321B2 (en) | 2006-01-12 | 2012-01-31 | Urbissimo, Inc. | System and method for shipping and delivering parcels to a virtual address |
US7870614B1 (en) | 2006-01-27 | 2011-01-11 | Aspect Loss Prevention, LLC | Sensitive data aliasing |
US20080022414A1 (en) | 2006-03-31 | 2008-01-24 | Robert Cahn | System and method of providing unique personal identifiers for use in the anonymous and secure exchange of data |
US8234379B2 (en) * | 2006-09-14 | 2012-07-31 | Afilias Limited | System and method for facilitating distribution of limited resources |
US8170900B2 (en) * | 2006-10-24 | 2012-05-01 | Afilias Limited | Supply chain discovery services |
GB2446199A (en) | 2006-12-01 | 2008-08-06 | David Irvine | Secure, decentralised and anonymous peer-to-peer network |
GB2446169A (en) * | 2006-12-01 | 2008-08-06 | David Irvine | Granular accessibility to data in a distributed and/or corporate network |
US8554669B2 (en) | 2007-01-09 | 2013-10-08 | Bill Me Later, Inc. | Method and system for offering a credit product by a credit issuer to a consumer at a point-of sale |
US8745486B2 (en) * | 2007-01-25 | 2014-06-03 | Microsoft Corporation | Streamable interactive rendering-independent page layout |
US8433648B2 (en) * | 2007-02-26 | 2013-04-30 | Bill Me Later, Inc. | Method and system for engaging in a transaction between a consumer and a merchant |
ZA200905538B (en) | 2007-02-27 | 2010-10-27 | Emigrant Bank | A method and system of facilitating a purchase between a buyer and a seller |
US8285656B1 (en) | 2007-03-30 | 2012-10-09 | Consumerinfo.Com, Inc. | Systems and methods for data verification |
US20080288298A1 (en) * | 2007-04-12 | 2008-11-20 | Dattatreya Eswarahalli S | Method and system for providing low-cost life insurance |
US20080272188A1 (en) * | 2007-05-02 | 2008-11-06 | I4 Commerce Inc. | Distributed system for commerce |
TWI390450B (en) * | 2007-05-08 | 2013-03-21 | Secure card with stored biometric data and method for using the secure card | |
WO2008146667A1 (en) * | 2007-05-24 | 2008-12-04 | Nec Corporation | Anonymous authenticating system and anonymous authenticating method |
US8893241B2 (en) | 2007-06-01 | 2014-11-18 | Albright Associates | Systems and methods for universal enhanced log-in, identity document verification and dedicated survey participation |
US8056118B2 (en) | 2007-06-01 | 2011-11-08 | Piliouras Teresa C | Systems and methods for universal enhanced log-in, identity document verification, and dedicated survey participation |
US8959584B2 (en) | 2007-06-01 | 2015-02-17 | Albright Associates | Systems and methods for universal enhanced log-in, identity document verification and dedicated survey participation |
US9398022B2 (en) | 2007-06-01 | 2016-07-19 | Teresa C. Piliouras | Systems and methods for universal enhanced log-in, identity document verification, and dedicated survey participation |
EP2206285B1 (en) * | 2007-10-26 | 2012-03-21 | Research In Motion Limited | Anonymous navigation method, apparatus and system |
US8412639B2 (en) * | 2007-11-01 | 2013-04-02 | American Expres Travel Related Services Company, Inc. | System and method for facilitating a secured financial transaction using an alternate shipping address |
US8127986B1 (en) * | 2007-12-14 | 2012-03-06 | Consumerinfo.Com, Inc. | Card registry systems and methods |
US9990674B1 (en) | 2007-12-14 | 2018-06-05 | Consumerinfo.Com, Inc. | Card registry systems and methods |
JP2011514997A (en) * | 2008-03-10 | 2011-05-12 | アフィリアス・リミテッド | Setting an alternate email address |
WO2009111869A1 (en) * | 2008-03-10 | 2009-09-17 | Afilias Limited | Platform independent idn e-mail storage translation |
US8321338B2 (en) * | 2008-03-21 | 2012-11-27 | First Data Corporation | Electronic network access device |
US20090248654A1 (en) * | 2008-03-26 | 2009-10-01 | Pitney Bowes Inc. | System and method for processing mail using sender and recipient networked mail processing systems |
US9715709B2 (en) | 2008-05-09 | 2017-07-25 | Visa International Services Association | Communication device including multi-part alias identifier |
US8719164B2 (en) | 2008-06-19 | 2014-05-06 | Bill Me Later, Inc. | Method and system for engaging in a transaction between a business entity and a merchant |
US8312033B1 (en) | 2008-06-26 | 2012-11-13 | Experian Marketing Solutions, Inc. | Systems and methods for providing an integrated identifier |
US9256904B1 (en) | 2008-08-14 | 2016-02-09 | Experian Information Solutions, Inc. | Multi-bureau credit file freeze and unfreeze |
US20100088753A1 (en) * | 2008-10-03 | 2010-04-08 | Microsoft Corporation | Identity and authentication system using aliases |
JP5081786B2 (en) * | 2008-10-20 | 2012-11-28 | 株式会社日立製作所 | Information providing method and system |
US8060424B2 (en) | 2008-11-05 | 2011-11-15 | Consumerinfo.Com, Inc. | On-line method and system for monitoring and reporting unused available credit |
US8249630B1 (en) * | 2009-03-25 | 2012-08-21 | Sprint Communications Company L.P. | Messaging session enhancement with user data |
WO2010132492A2 (en) | 2009-05-11 | 2010-11-18 | Experian Marketing Solutions, Inc. | Systems and methods for providing anonymized user profile data |
US10546332B2 (en) | 2010-09-21 | 2020-01-28 | Visa International Service Association | Systems and methods to program operations for interaction with users |
US9443253B2 (en) | 2009-07-27 | 2016-09-13 | Visa International Service Association | Systems and methods to provide and adjust offers |
US9841282B2 (en) | 2009-07-27 | 2017-12-12 | Visa U.S.A. Inc. | Successive offer communications with an offer recipient |
US8266031B2 (en) | 2009-07-29 | 2012-09-11 | Visa U.S.A. | Systems and methods to provide benefits of account features to account holders |
US20110035278A1 (en) | 2009-08-04 | 2011-02-10 | Visa U.S.A. Inc. | Systems and Methods for Closing the Loop between Online Activities and Offline Purchases |
US20110035280A1 (en) | 2009-08-04 | 2011-02-10 | Visa U.S.A. Inc. | Systems and Methods for Targeted Advertisement Delivery |
US9342835B2 (en) | 2009-10-09 | 2016-05-17 | Visa U.S.A | Systems and methods to deliver targeted advertisements to audience |
US9031860B2 (en) | 2009-10-09 | 2015-05-12 | Visa U.S.A. Inc. | Systems and methods to aggregate demand |
US8595058B2 (en) | 2009-10-15 | 2013-11-26 | Visa U.S.A. | Systems and methods to match identifiers |
US8676639B2 (en) | 2009-10-29 | 2014-03-18 | Visa International Service Association | System and method for promotion processing and authorization |
US8461961B2 (en) * | 2009-11-04 | 2013-06-11 | Ming-Yuan Wu | Tamper-proof secure card with stored biometric data and method for using the secure card |
US8626705B2 (en) | 2009-11-05 | 2014-01-07 | Visa International Service Association | Transaction aggregator for closed processing |
US20110125565A1 (en) | 2009-11-24 | 2011-05-26 | Visa U.S.A. Inc. | Systems and Methods for Multi-Channel Offer Redemption |
US20110169602A1 (en) * | 2010-01-08 | 2011-07-14 | Gaffney Gene F | System and method for monitoring products in a distribution chain |
US8819148B2 (en) * | 2010-03-10 | 2014-08-26 | Afilias Limited | Alternate E-mail delivery |
US8639567B2 (en) | 2010-03-19 | 2014-01-28 | Visa U.S.A. Inc. | Systems and methods to identify differences in spending patterns |
US8738418B2 (en) | 2010-03-19 | 2014-05-27 | Visa U.S.A. Inc. | Systems and methods to enhance search data with transaction based data |
US9697520B2 (en) | 2010-03-22 | 2017-07-04 | Visa U.S.A. Inc. | Merchant configured advertised incentives funded through statement credits |
US9652802B1 (en) | 2010-03-24 | 2017-05-16 | Consumerinfo.Com, Inc. | Indirect monitoring and reporting of a user's credit data |
US8488785B2 (en) | 2010-04-08 | 2013-07-16 | Oceansblue Systems, Llc | Secure storage and retrieval of confidential information |
US8359274B2 (en) | 2010-06-04 | 2013-01-22 | Visa International Service Association | Systems and methods to provide messages in real-time with transaction processing |
US8781896B2 (en) | 2010-06-29 | 2014-07-15 | Visa International Service Association | Systems and methods to optimize media presentations |
US8931058B2 (en) | 2010-07-01 | 2015-01-06 | Experian Information Solutions, Inc. | Systems and methods for permission arbitrated transaction services |
US8744956B1 (en) | 2010-07-01 | 2014-06-03 | Experian Information Solutions, Inc. | Systems and methods for permission arbitrated transaction services |
US9972021B2 (en) | 2010-08-06 | 2018-05-15 | Visa International Service Association | Systems and methods to rank and select triggers for real-time offers |
US9679299B2 (en) | 2010-09-03 | 2017-06-13 | Visa International Service Association | Systems and methods to provide real-time offers via a cooperative database |
US9477967B2 (en) | 2010-09-21 | 2016-10-25 | Visa International Service Association | Systems and methods to process an offer campaign based on ineligibility |
US10055745B2 (en) | 2010-09-21 | 2018-08-21 | Visa International Service Association | Systems and methods to modify interaction rules during run time |
US8930262B1 (en) | 2010-11-02 | 2015-01-06 | Experian Technology Ltd. | Systems and methods of assisted strategy design |
US9558502B2 (en) | 2010-11-04 | 2017-01-31 | Visa International Service Association | Systems and methods to reward user interactions |
US8484186B1 (en) | 2010-11-12 | 2013-07-09 | Consumerinfo.Com, Inc. | Personalized people finder |
US9147042B1 (en) | 2010-11-22 | 2015-09-29 | Experian Information Solutions, Inc. | Systems and methods for data verification |
US10007915B2 (en) | 2011-01-24 | 2018-06-26 | Visa International Service Association | Systems and methods to facilitate loyalty reward transactions |
US9773212B2 (en) * | 2011-02-28 | 2017-09-26 | Visa International Service Association | Secure anonymous transaction apparatuses, methods and systems |
US10438299B2 (en) | 2011-03-15 | 2019-10-08 | Visa International Service Association | Systems and methods to combine transaction terminal location data and social networking check-in |
KR101352530B1 (en) * | 2011-04-20 | 2014-02-07 | 주식회사 이노디스 | System for delivering present item using social network information and Method thereof |
US9558519B1 (en) | 2011-04-29 | 2017-01-31 | Consumerinfo.Com, Inc. | Exposing reporting cycle information |
US8869244B1 (en) | 2011-05-03 | 2014-10-21 | Symantec Corporation | Techniques for providing role-based access control using dynamic shared accounts |
US9607336B1 (en) | 2011-06-16 | 2017-03-28 | Consumerinfo.Com, Inc. | Providing credit inquiry alerts |
US9483606B1 (en) | 2011-07-08 | 2016-11-01 | Consumerinfo.Com, Inc. | Lifescore |
US8892459B2 (en) * | 2011-07-25 | 2014-11-18 | BrandVerity Inc. | Affiliate investigation system and method |
US20130103563A1 (en) * | 2011-08-05 | 2013-04-25 | William Francis Walsh | Anonymous Price and Progressive Display Execution System |
US11308566B2 (en) * | 2011-08-05 | 2022-04-19 | William F. Walsh | Anonymous price and progressive display execution apparatus, system and method |
US8260677B1 (en) * | 2011-08-12 | 2012-09-04 | Totalekidz LLC | System and method for pre-approving, regulating, and executing secure transactions |
US9106691B1 (en) | 2011-09-16 | 2015-08-11 | Consumerinfo.Com, Inc. | Systems and methods of identity protection and management |
US9466075B2 (en) | 2011-09-20 | 2016-10-11 | Visa International Service Association | Systems and methods to process referrals in offer campaigns |
US10380617B2 (en) | 2011-09-29 | 2019-08-13 | Visa International Service Association | Systems and methods to provide a user interface to control an offer campaign |
US8738516B1 (en) | 2011-10-13 | 2014-05-27 | Consumerinfo.Com, Inc. | Debt services candidate locator |
US11030562B1 (en) | 2011-10-31 | 2021-06-08 | Consumerinfo.Com, Inc. | Pre-data breach monitoring |
US10290018B2 (en) | 2011-11-09 | 2019-05-14 | Visa International Service Association | Systems and methods to communicate with users via social networking sites |
US10223710B2 (en) | 2013-01-04 | 2019-03-05 | Visa International Service Association | Wearable intelligent vision device apparatuses, methods and systems |
US10497022B2 (en) | 2012-01-20 | 2019-12-03 | Visa International Service Association | Systems and methods to present and process offers |
US8463645B1 (en) | 2012-02-17 | 2013-06-11 | Joingo, Llc | Anonymous rewards club program |
KR20130098007A (en) * | 2012-02-27 | 2013-09-04 | 전용덕 | System for management certification syntagmatically using anonymity code and method for the same, a quasi public syntagmatically certification center |
US10672018B2 (en) | 2012-03-07 | 2020-06-02 | Visa International Service Association | Systems and methods to process offers via mobile devices |
AU2012375226A1 (en) * | 2012-03-30 | 2014-07-24 | Ebay Inc. | Third party token system for anonymous shipping |
US20130282470A1 (en) * | 2012-04-24 | 2013-10-24 | Leaf Holdings, Inc. | System and method for providing real-time loyalty discounts and paperless receipts |
WO2013166501A1 (en) * | 2012-05-04 | 2013-11-07 | Visa International Service Association | System and method for local data conversion |
US9853959B1 (en) | 2012-05-07 | 2017-12-26 | Consumerinfo.Com, Inc. | Storage and maintenance of personal data |
US9246999B2 (en) * | 2012-05-18 | 2016-01-26 | Andrew Milburn | Directed wi-fi network in a venue integrating communications of a central concert controller with portable interactive devices |
US9015178B2 (en) | 2012-09-14 | 2015-04-21 | Ca, Inc. | Management of package delivery |
US9654541B1 (en) | 2012-11-12 | 2017-05-16 | Consumerinfo.Com, Inc. | Aggregating user web browsing data |
US8856894B1 (en) | 2012-11-28 | 2014-10-07 | Consumerinfo.Com, Inc. | Always on authentication |
US9916621B1 (en) | 2012-11-30 | 2018-03-13 | Consumerinfo.Com, Inc. | Presentation of credit score factors |
US10255598B1 (en) | 2012-12-06 | 2019-04-09 | Consumerinfo.Com, Inc. | Credit card account data extraction |
US9697263B1 (en) | 2013-03-04 | 2017-07-04 | Experian Information Solutions, Inc. | Consumer data request fulfillment system |
US9406085B1 (en) | 2013-03-14 | 2016-08-02 | Consumerinfo.Com, Inc. | System and methods for credit dispute processing, resolution, and reporting |
US9870589B1 (en) | 2013-03-14 | 2018-01-16 | Consumerinfo.Com, Inc. | Credit utilization tracking and reporting |
US10102570B1 (en) | 2013-03-14 | 2018-10-16 | Consumerinfo.Com, Inc. | Account vulnerability alerts |
US10664936B2 (en) | 2013-03-15 | 2020-05-26 | Csidentity Corporation | Authentication systems and methods for on-demand products |
US9633322B1 (en) | 2013-03-15 | 2017-04-25 | Consumerinfo.Com, Inc. | Adjustment of knowledge-based authentication |
US9818122B1 (en) | 2013-03-15 | 2017-11-14 | Psi Systems, Inc. | System and method for secure sharing of postal services |
US10685398B1 (en) | 2013-04-23 | 2020-06-16 | Consumerinfo.Com, Inc. | Presenting credit score information |
US9721147B1 (en) | 2013-05-23 | 2017-08-01 | Consumerinfo.Com, Inc. | Digital identity |
US20140372334A1 (en) * | 2013-06-13 | 2014-12-18 | Anonymous Shipping, LLC | System and method for anonymous mailing or shipping services |
US9443268B1 (en) | 2013-08-16 | 2016-09-13 | Consumerinfo.Com, Inc. | Bill payment and reporting |
US10489754B2 (en) | 2013-11-11 | 2019-11-26 | Visa International Service Association | Systems and methods to facilitate the redemption of offer benefits in a form of third party statement credits |
US10325314B1 (en) | 2013-11-15 | 2019-06-18 | Consumerinfo.Com, Inc. | Payment reporting systems |
US10102536B1 (en) | 2013-11-15 | 2018-10-16 | Experian Information Solutions, Inc. | Micro-geographic aggregation system |
US9477737B1 (en) | 2013-11-20 | 2016-10-25 | Consumerinfo.Com, Inc. | Systems and user interfaces for dynamic access of multiple remote databases and synchronization of data based on user rules |
US9529851B1 (en) | 2013-12-02 | 2016-12-27 | Experian Information Solutions, Inc. | Server architecture for electronic data quality processing |
US10262362B1 (en) | 2014-02-14 | 2019-04-16 | Experian Information Solutions, Inc. | Automatic generation of code for attributes |
USD760256S1 (en) | 2014-03-25 | 2016-06-28 | Consumerinfo.Com, Inc. | Display screen or portion thereof with graphical user interface |
USD759690S1 (en) | 2014-03-25 | 2016-06-21 | Consumerinfo.Com, Inc. | Display screen or portion thereof with graphical user interface |
USD759689S1 (en) | 2014-03-25 | 2016-06-21 | Consumerinfo.Com, Inc. | Display screen or portion thereof with graphical user interface |
US10419379B2 (en) | 2014-04-07 | 2019-09-17 | Visa International Service Association | Systems and methods to program a computing system to process related events via workflows configured using a graphical user interface |
US9892457B1 (en) | 2014-04-16 | 2018-02-13 | Consumerinfo.Com, Inc. | Providing credit data in search results |
US10373240B1 (en) | 2014-04-25 | 2019-08-06 | Csidentity Corporation | Systems, methods and computer-program products for eligibility verification |
US10354268B2 (en) | 2014-05-15 | 2019-07-16 | Visa International Service Association | Systems and methods to organize and consolidate data for improved data storage and processing |
US10650398B2 (en) | 2014-06-16 | 2020-05-12 | Visa International Service Association | Communication systems and methods to transmit data among a plurality of computing systems in processing benefit redemption |
US20150371183A1 (en) * | 2014-06-20 | 2015-12-24 | United Parcel Service Of America, Inc. | Systems and methods for confidential shipping |
US10438226B2 (en) | 2014-07-23 | 2019-10-08 | Visa International Service Association | Systems and methods of using a communication network to coordinate processing among a plurality of separate computing systems |
JP6363903B2 (en) * | 2014-07-31 | 2018-07-25 | 株式会社キーエンス | Optical information reader |
US9317847B2 (en) | 2014-09-23 | 2016-04-19 | Sony Corporation | E-card transaction authorization based on geographic location |
US9355424B2 (en) | 2014-09-23 | 2016-05-31 | Sony Corporation | Analyzing hack attempts of E-cards |
US9378502B2 (en) | 2014-09-23 | 2016-06-28 | Sony Corporation | Using biometrics to recover password in customer mobile device |
US9953323B2 (en) | 2014-09-23 | 2018-04-24 | Sony Corporation | Limiting e-card transactions based on lack of proximity to associated CE device |
US9202212B1 (en) | 2014-09-23 | 2015-12-01 | Sony Corporation | Using mobile device to monitor for electronic bank card communication |
US9292875B1 (en) | 2014-09-23 | 2016-03-22 | Sony Corporation | Using CE device record of E-card transactions to reconcile bank record |
US9558488B2 (en) | 2014-09-23 | 2017-01-31 | Sony Corporation | Customer's CE device interrogating customer's e-card for transaction information |
US9367845B2 (en) | 2014-09-23 | 2016-06-14 | Sony Corporation | Messaging customer mobile device when electronic bank card used |
US9646307B2 (en) | 2014-09-23 | 2017-05-09 | Sony Corporation | Receiving fingerprints through touch screen of CE device |
US10262316B2 (en) | 2014-09-23 | 2019-04-16 | Sony Corporation | Automatic notification of transaction by bank card to customer device |
US10115141B1 (en) | 2014-09-24 | 2018-10-30 | Amazon Technologies, Inc. | Secure proxy service |
US11210669B2 (en) | 2014-10-24 | 2021-12-28 | Visa International Service Association | Systems and methods to set up an operation at a computer system connected with a plurality of computer systems via a computer network using a round trip communication of an identifier of the operation |
US10373168B2 (en) * | 2015-01-12 | 2019-08-06 | Mastercard International Incorporated | Method and system for retry processing of controlled payment transactions |
GB2534913B (en) * | 2015-02-05 | 2021-08-11 | Fujitsu Ltd | System, method, and program for storing and controlling access to data representing personal behaviour |
US9691085B2 (en) | 2015-04-30 | 2017-06-27 | Visa International Service Association | Systems and methods of natural language processing and statistical analysis to identify matching categories |
US9894075B2 (en) * | 2015-08-12 | 2018-02-13 | International Business Machines Corporation | Service to provide notification of mailing address changes |
US20170116621A1 (en) * | 2015-10-27 | 2017-04-27 | Mastercard International Incorporated | Method and system for predicting service provider performance based on industry data |
US10757154B1 (en) | 2015-11-24 | 2020-08-25 | Experian Information Solutions, Inc. | Real-time event-based notification system |
US10187366B2 (en) | 2016-04-28 | 2019-01-22 | Visa International Service Association | Systems and methods of user authentication for data services |
US11126971B1 (en) * | 2016-12-12 | 2021-09-21 | Jpmorgan Chase Bank, N.A. | Systems and methods for privacy-preserving enablement of connections within organizations |
WO2018144612A1 (en) | 2017-01-31 | 2018-08-09 | Experian Information Solutions, Inc. | Massive scale heterogeneous data ingestion and user resolution |
US10735183B1 (en) | 2017-06-30 | 2020-08-04 | Experian Information Solutions, Inc. | Symmetric encryption for private smart contracts among multiple parties in a private peer-to-peer network |
US10885223B2 (en) * | 2017-12-08 | 2021-01-05 | NortonLifeLock, Inc. | Systems and methods for anonymizing user accounts |
US20190287314A1 (en) * | 2018-03-16 | 2019-09-19 | Renan Robert Rojo | Concealed mailing information system and method for using alternative information for providing a shipping address for mailing with an option of running encrypted information |
US10911234B2 (en) | 2018-06-22 | 2021-02-02 | Experian Information Solutions, Inc. | System and method for a token gateway environment |
US10972275B1 (en) | 2018-07-17 | 2021-04-06 | Imageware Systems, Inc. | Zero-knowledge, anonymous verification and management using immutable databases such as blockchain |
US20200074100A1 (en) | 2018-09-05 | 2020-03-05 | Consumerinfo.Com, Inc. | Estimating changes to user risk indicators based on modeling of similarly categorized users |
US10963434B1 (en) | 2018-09-07 | 2021-03-30 | Experian Information Solutions, Inc. | Data architecture for supporting multiple search models |
US11025659B2 (en) * | 2018-10-23 | 2021-06-01 | Forcepoint, LLC | Security system using pseudonyms to anonymously identify entities and corresponding security risk related behaviors |
US11315179B1 (en) | 2018-11-16 | 2022-04-26 | Consumerinfo.Com, Inc. | Methods and apparatuses for customized card recommendations |
WO2020146667A1 (en) | 2019-01-11 | 2020-07-16 | Experian Information Solutions, Inc. | Systems and methods for secure data aggregation and computation |
US11238656B1 (en) | 2019-02-22 | 2022-02-01 | Consumerinfo.Com, Inc. | System and method for an augmented reality experience via an artificial intelligence bot |
US11748687B2 (en) | 2019-03-28 | 2023-09-05 | Ebay Inc. | Dynamically generating visualization data based on shipping events |
US11941065B1 (en) | 2019-09-13 | 2024-03-26 | Experian Information Solutions, Inc. | Single identifier platform for storing entity data |
US11631078B2 (en) | 2020-04-13 | 2023-04-18 | Capital One Services, Llc | System and method for obfuscating transaction information |
US11880377B1 (en) | 2021-03-26 | 2024-01-23 | Experian Information Solutions, Inc. | Systems and methods for entity resolution |
US12062004B2 (en) * | 2021-09-27 | 2024-08-13 | 7-Eleven, Inc. | Autonomous delivery mechanism data integration in an application platform |
US12124549B2 (en) | 2021-12-31 | 2024-10-22 | Amod Ashok Dange | System and method for granting role-based access to a digital artifact |
Citations (20)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5420926A (en) * | 1994-01-05 | 1995-05-30 | At&T Corp. | Anonymous credit card transactions |
US5649118A (en) * | 1993-08-27 | 1997-07-15 | Lucent Technologies Inc. | Smart card with multiple charge accounts and product item tables designating the account to debit |
US6263121B1 (en) * | 1998-09-16 | 2001-07-17 | Canon Kabushiki Kaisha | Archival and retrieval of similar documents |
US20010011250A1 (en) * | 1997-11-12 | 2001-08-02 | Cris T. Paltenghe | Distributed network based electronic wallet |
US20020023023A1 (en) * | 2000-07-28 | 2002-02-21 | Borecki Dennis C. | Methods and systems for network based electronic purchasing and shipping system |
US20030120608A1 (en) * | 2001-12-21 | 2003-06-26 | Jorge Pereyra | Secure method for purchasing and payment over a communication network and method for delivering goods anonymously |
US20030130857A1 (en) * | 2002-01-04 | 2003-07-10 | Masanobu Matsuo | Systems, methods and computer program products for utilizing an information exchange framework |
US20030233409A1 (en) * | 2002-05-30 | 2003-12-18 | International Business Machines Corporation | Electronic mail distribution network implementation for safeguarding sender's address book covering addressee aliases with minimum interference with normal electronic mail transmission |
US6675153B1 (en) * | 1999-07-06 | 2004-01-06 | Zix Corporation | Transaction authorization system |
US20040083190A1 (en) * | 2000-01-21 | 2004-04-29 | Sanders Michael R. | Method and apparatus for delivering mail items to non-postal route locations |
US20040158532A1 (en) * | 2000-03-07 | 2004-08-12 | Lydia Breck | System for facilitating a transaction |
US20040181670A1 (en) * | 2003-03-10 | 2004-09-16 | Carl Thune | System and method for disguising data |
US20040193489A1 (en) * | 2000-08-14 | 2004-09-30 | Eric Boyd | Offline-online incentive points system and method |
US20040215588A1 (en) * | 2003-04-08 | 2004-10-28 | United Parcel Service Of America, Inc. | Inbound package tracking systems and methods |
US20040260653A1 (en) * | 1999-04-19 | 2004-12-23 | First Data Corporation | Anonymous transactions |
US20050074112A1 (en) * | 2003-10-01 | 2005-04-07 | Timmins Timothy A. | Technique for sharing information through an information assistance service |
US20050097225A1 (en) * | 2003-11-03 | 2005-05-05 | Glatt Darin C. | Technique for configuring data synchronization |
US20050147221A1 (en) * | 2003-12-30 | 2005-07-07 | Aoki Norihiro E. | Method and apparatus for managing subscription-type messages |
US7318049B2 (en) * | 2000-11-17 | 2008-01-08 | Gregory Fx Iannacci | System and method for an automated benefit recognition, acquisition, value exchange, and transaction settlement system using multivariable linear and nonlinear modeling |
US7340423B1 (en) * | 1998-04-24 | 2008-03-04 | First Data Corporation | Method for defining a relationship between an account and a group |
Family Cites Families (26)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5794207A (en) * | 1996-09-04 | 1998-08-11 | Walker Asset Management Limited Partnership | Method and apparatus for a cryptographically assisted commercial network system designed to facilitate buyer-driven conditional purchase offers |
EP0861461B2 (en) * | 1995-02-13 | 2012-03-07 | Intertrust Technologies Corp | Systems and methods for secure transaction management and electronic rights protection |
SE506506C2 (en) * | 1995-04-11 | 1997-12-22 | Au System | Electronic transaction terminal, telecommunication system including an electronic transaction terminal, smart card as electronic transaction terminal and method of transferring electronic credits |
US5703344A (en) * | 1995-06-30 | 1997-12-30 | Visa International Service Association | Electronic funds confirmation at point of transaction |
US5815665A (en) * | 1996-04-03 | 1998-09-29 | Microsoft Corporation | System and method for providing trusted brokering services over a distributed network |
US5884272A (en) * | 1996-09-06 | 1999-03-16 | Walker Asset Management Limited Partnership | Method and system for establishing and maintaining user-controlled anonymous communications |
US5913203A (en) * | 1996-10-03 | 1999-06-15 | Jaesent Inc. | System and method for pseudo cash transactions |
US6343120B1 (en) * | 1996-10-08 | 2002-01-29 | At&T Wireless Services, Inc. | Method and apparatus for providing a caller ID alias |
US5953710A (en) * | 1996-10-09 | 1999-09-14 | Fleming; Stephen S. | Children's credit or debit card system |
US6167426A (en) * | 1996-11-15 | 2000-12-26 | Wireless Internet, Inc. | Contact alerts for unconnected users |
US5950179A (en) * | 1996-12-03 | 1999-09-07 | Providian Financial Corporation | Method and system for issuing a secured credit card |
US5961593A (en) * | 1997-01-22 | 1999-10-05 | Lucent Technologies, Inc. | System and method for providing anonymous personalized browsing by a proxy system in a network |
US5995624A (en) * | 1997-03-10 | 1999-11-30 | The Pacid Group | Bilateral authentication and information encryption token system and method |
US6591291B1 (en) * | 1997-08-28 | 2003-07-08 | Lucent Technologies Inc. | System and method for providing anonymous remailing and filtering of electronic mail |
US6161129A (en) * | 1997-09-30 | 2000-12-12 | At&T Corp. | Unlisted address messaging system |
US5970475A (en) * | 1997-10-10 | 1999-10-19 | Intelisys Electronic Commerce, Llc | Electronic procurement system and method for trading partners |
US6052784A (en) * | 1997-10-14 | 2000-04-18 | Intel Corporation | Network discovery system and method |
US6085231A (en) * | 1998-01-05 | 2000-07-04 | At&T Corp | Method and system for delivering a voice message via an alias e-mail address |
US6006200A (en) * | 1998-05-22 | 1999-12-21 | International Business Machines Corporation | Method of providing an identifier for transactions |
US6067529A (en) * | 1998-08-12 | 2000-05-23 | Ericsson Inc. | System and method for sending a short message containing purchase information to a destination terminal |
US20020095298A1 (en) * | 1999-04-19 | 2002-07-18 | Frogmagic, Inc. | Blind Gift Method and System |
US6227447B1 (en) * | 1999-05-10 | 2001-05-08 | First Usa Bank, Na | Cardless payment system |
US6393412B1 (en) * | 1999-09-23 | 2002-05-21 | Peter Deep | Method for allowing users to purchase professional services in a private chat room through a service brokerage via the internet |
US6592044B1 (en) * | 2000-05-15 | 2003-07-15 | Jacob Y. Wong | Anonymous electronic card for generating personal coupons useful in commercial and security transactions |
US20020013739A1 (en) * | 2000-07-28 | 2002-01-31 | O'donnell Stephen Christopher | Apparatus and method for providing anonymous shipping services |
US20040193685A1 (en) * | 2003-03-31 | 2004-09-30 | Sony Corporation/Sony Electronics, Inc. | Method and apparatus for managing and sharing personal identities in a peer-to-peer environment |
-
2003
- 2003-01-10 US US10/248,345 patent/US20040083184A1/en not_active Abandoned
-
2004
- 2004-07-30 US US10/710,740 patent/US7213748B2/en not_active Expired - Lifetime
- 2004-07-30 US US10/710,741 patent/US7264152B2/en not_active Expired - Lifetime
-
2007
- 2007-08-15 US US11/839,472 patent/US20080052244A1/en not_active Abandoned
Patent Citations (20)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5649118A (en) * | 1993-08-27 | 1997-07-15 | Lucent Technologies Inc. | Smart card with multiple charge accounts and product item tables designating the account to debit |
US5420926A (en) * | 1994-01-05 | 1995-05-30 | At&T Corp. | Anonymous credit card transactions |
US20010011250A1 (en) * | 1997-11-12 | 2001-08-02 | Cris T. Paltenghe | Distributed network based electronic wallet |
US7340423B1 (en) * | 1998-04-24 | 2008-03-04 | First Data Corporation | Method for defining a relationship between an account and a group |
US6263121B1 (en) * | 1998-09-16 | 2001-07-17 | Canon Kabushiki Kaisha | Archival and retrieval of similar documents |
US20040260653A1 (en) * | 1999-04-19 | 2004-12-23 | First Data Corporation | Anonymous transactions |
US6675153B1 (en) * | 1999-07-06 | 2004-01-06 | Zix Corporation | Transaction authorization system |
US20040083190A1 (en) * | 2000-01-21 | 2004-04-29 | Sanders Michael R. | Method and apparatus for delivering mail items to non-postal route locations |
US20040158532A1 (en) * | 2000-03-07 | 2004-08-12 | Lydia Breck | System for facilitating a transaction |
US20020023023A1 (en) * | 2000-07-28 | 2002-02-21 | Borecki Dennis C. | Methods and systems for network based electronic purchasing and shipping system |
US20040193489A1 (en) * | 2000-08-14 | 2004-09-30 | Eric Boyd | Offline-online incentive points system and method |
US7318049B2 (en) * | 2000-11-17 | 2008-01-08 | Gregory Fx Iannacci | System and method for an automated benefit recognition, acquisition, value exchange, and transaction settlement system using multivariable linear and nonlinear modeling |
US20030120608A1 (en) * | 2001-12-21 | 2003-06-26 | Jorge Pereyra | Secure method for purchasing and payment over a communication network and method for delivering goods anonymously |
US20030130857A1 (en) * | 2002-01-04 | 2003-07-10 | Masanobu Matsuo | Systems, methods and computer program products for utilizing an information exchange framework |
US20030233409A1 (en) * | 2002-05-30 | 2003-12-18 | International Business Machines Corporation | Electronic mail distribution network implementation for safeguarding sender's address book covering addressee aliases with minimum interference with normal electronic mail transmission |
US20040181670A1 (en) * | 2003-03-10 | 2004-09-16 | Carl Thune | System and method for disguising data |
US20040215588A1 (en) * | 2003-04-08 | 2004-10-28 | United Parcel Service Of America, Inc. | Inbound package tracking systems and methods |
US20050074112A1 (en) * | 2003-10-01 | 2005-04-07 | Timmins Timothy A. | Technique for sharing information through an information assistance service |
US20050097225A1 (en) * | 2003-11-03 | 2005-05-05 | Glatt Darin C. | Technique for configuring data synchronization |
US20050147221A1 (en) * | 2003-12-30 | 2005-07-07 | Aoki Norihiro E. | Method and apparatus for managing subscription-type messages |
Cited By (225)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20080059374A1 (en) * | 1998-05-29 | 2008-03-06 | E-Micro Corporation | Wallet Consolidator and Related Methods of Processing a Transaction Using a Wallet Consolidator |
US8225995B1 (en) | 1998-05-29 | 2012-07-24 | Frank Joseph Gangi | Retail point-of-transaction system, program products, and related methods to provide a customized set of identification data to facilitate a transaction using electronic coupons |
US7708198B2 (en) | 1998-05-29 | 2010-05-04 | E-Micro Corporation | Wallet consolidator to facilitate a transaction |
US8261978B2 (en) | 1998-05-29 | 2012-09-11 | E-Micro Corporation | Wallet consolidator to facilitate a transaction |
US7712658B2 (en) | 1998-05-29 | 2010-05-11 | E-Micro Corporation | Wallet consolidator and related methods of processing a transaction using a wallet consolidator |
US7828208B2 (en) | 1998-05-29 | 2010-11-09 | E-Micro Corporation | Retail point-of-transaction system, program products, and related methods to provide a customized set of identification data to facilitate a transaction using electronic coupons |
US20060169768A1 (en) * | 1998-05-29 | 2006-08-03 | E-Micro Corporation | System for associating identification and personal data for multiple magnetic stripe cards or other sources to facilitate a transaction and related methods |
US20080065535A1 (en) * | 1998-05-29 | 2008-03-13 | E-Micro Corporation | Wallet Consolidator and Related Methods of Processing a Transaction Using a Wallet Consolidator |
US20110137801A1 (en) * | 1999-06-18 | 2011-06-09 | Echarge Corporation | Method and apparatus for ordering goods, services and content over an internetwork using a virtual payment account |
US11551211B1 (en) * | 1999-06-18 | 2023-01-10 | Stripe, Inc. | Method and apparatus for ordering goods, services and content over an internetwork using a virtual payment account |
US9864990B2 (en) * | 1999-06-18 | 2018-01-09 | Cria Inc. | Method and apparatus for ordering goods, services and content over an internetwork using a virtual payment account |
US11423400B1 (en) * | 1999-06-18 | 2022-08-23 | Stripe, Inc. | Method and apparatus for ordering goods, services and content over an internetwork using a virtual payment account |
US9864989B2 (en) * | 1999-06-18 | 2018-01-09 | Cria Inc. | Method and apparatus for ordering goods, services, and content over an internetwork using a virtual payment account |
US20080016003A1 (en) * | 1999-06-18 | 2008-01-17 | Echarge Corporation | Method and apparatus for ordering goods, services, and content over an internetwork using a virtual payment account |
US20010044785A1 (en) * | 2000-01-05 | 2001-11-22 | Stolfo Salvatore J. | Method and system for private shipping to anonymous users of a computer network |
US20040210449A1 (en) * | 2000-03-07 | 2004-10-21 | American Express Travel Related Services Company, Inc. | System for facilitating a transaction |
US8121941B2 (en) | 2000-03-07 | 2012-02-21 | American Express Travel Related Services Company, Inc. | System and method for automatic reconciliation of transaction account spend |
US7835960B2 (en) * | 2000-03-07 | 2010-11-16 | American Express Travel Related Services Company, Inc. | System for facilitating a transaction |
US20040158532A1 (en) * | 2000-03-07 | 2004-08-12 | Lydia Breck | System for facilitating a transaction |
US10572875B2 (en) | 2000-04-24 | 2020-02-25 | Visa International Service Association | Online account authentication service |
US20080301056A1 (en) * | 2000-04-24 | 2008-12-04 | Weller Kevin D | Online payer authentication service |
US20020111919A1 (en) * | 2000-04-24 | 2002-08-15 | Visa International Service Association | Online payer authentication service |
US7991701B2 (en) | 2000-04-24 | 2011-08-02 | Visa International Service Association | Online payer authentication service |
US9864993B2 (en) | 2000-04-24 | 2018-01-09 | Visa International Service Association | Account authentication service with chip card |
US7827115B2 (en) | 2000-04-24 | 2010-11-02 | Visa International Service Association | Online payer authentication service |
US20030212642A1 (en) * | 2000-04-24 | 2003-11-13 | Visa International Service Association | Online payer authentication service |
US20100057619A1 (en) * | 2000-04-24 | 2010-03-04 | Visa International Service Association | Account authentication service with chip card |
US8271395B2 (en) | 2000-04-24 | 2012-09-18 | Visa International Service Association | Online account authentication service |
US20100332393A1 (en) * | 2000-04-24 | 2010-12-30 | Visa International Service Association | Online payer authentication service |
US20040117300A1 (en) * | 2000-05-10 | 2004-06-17 | Peter Jones | Payment card processing system and methods |
US7774274B2 (en) * | 2000-05-10 | 2010-08-10 | General Electric Capital Corporation | Payment card processing system and methods |
US20030204470A1 (en) * | 2000-05-10 | 2003-10-30 | Jeff Manchester | Method, apparatus, and code for issuing a dual credit card |
US10580072B2 (en) * | 2000-09-11 | 2020-03-03 | Capital One Services, Llc | System and method for providing a credit card with multiple credit lines |
US9177315B2 (en) | 2001-01-19 | 2015-11-03 | Mastercard Mobile Transactions Solutions, Inc. | Establishing direct, secure transaction channels between a device and a plurality of service providers |
US9471914B2 (en) | 2001-01-19 | 2016-10-18 | Mastercard Mobile Transactions Solutions, Inc. | Facilitating a secure transaction over a direct secure transaction channel |
US9870559B2 (en) | 2001-01-19 | 2018-01-16 | Mastercard Mobile Transactions Solutions, Inc. | Establishing direct, secure transaction channels between a device and a plurality of service providers via personalized tokens |
US20120109672A1 (en) * | 2001-01-19 | 2012-05-03 | C-Sam, Inc. | Transactional services |
US9811820B2 (en) | 2001-01-19 | 2017-11-07 | Mastercard Mobile Transactions Solutions, Inc. | Data consolidation expert system for facilitating user control over information use |
US9697512B2 (en) | 2001-01-19 | 2017-07-04 | Mastercard Mobile Transactions Solutions, Inc. | Facilitating a secure transaction over a direct secure transaction portal |
US9400980B2 (en) | 2001-01-19 | 2016-07-26 | Mastercard Mobile Transactions Solutions, Inc. | Transferring account information or cash value between an electronic transaction device and a service provider based on establishing trust with a transaction service provider |
US10217102B2 (en) | 2001-01-19 | 2019-02-26 | Mastercard Mobile Transactions Solutions, Inc. | Issuing an account to an electronic transaction device |
US9317849B2 (en) * | 2001-01-19 | 2016-04-19 | Mastercard Mobile Transactions Solutions, Inc. | Using confidential information to prepare a request and to suggest offers without revealing confidential information |
US9330389B2 (en) | 2001-01-19 | 2016-05-03 | Mastercard Mobile Transactions Solutions, Inc. | Facilitating establishing trust for conducting direct secure electronic transactions between users and service providers via a mobile wallet |
US9330390B2 (en) | 2001-01-19 | 2016-05-03 | Mastercard Mobile Transactions Solutions, Inc. | Securing a driver license service electronic transaction via a three-dimensional electronic transaction authentication protocol |
US9330388B2 (en) | 2001-01-19 | 2016-05-03 | Mastercard Mobile Transactions Solutions, Inc. | Facilitating establishing trust for conducting direct secure electronic transactions between a user and airtime service providers |
US7725427B2 (en) | 2001-05-25 | 2010-05-25 | Fred Bishop | Recurrent billing maintenance with radio frequency payment devices |
US20020184623A1 (en) * | 2001-05-30 | 2002-12-05 | Hodge Gregory A. | Methods and apparatus for interactive television |
US7705732B2 (en) | 2001-07-10 | 2010-04-27 | Fred Bishop | Authenticating an RF transaction using a transaction counter |
US8635131B1 (en) | 2001-07-10 | 2014-01-21 | American Express Travel Related Services Company, Inc. | System and method for managing a transaction protocol |
US7996324B2 (en) * | 2001-07-10 | 2011-08-09 | American Express Travel Related Services Company, Inc. | Systems and methods for managing multiple accounts on a RF transaction device using secondary identification indicia |
US7889052B2 (en) | 2001-07-10 | 2011-02-15 | Xatra Fund Mx, Llc | Authorizing payment subsequent to RF transactions |
US7668750B2 (en) | 2001-07-10 | 2010-02-23 | David S Bonalle | Securing RF transactions using a transactions counter |
US7886157B2 (en) | 2001-07-10 | 2011-02-08 | Xatra Fund Mx, Llc | Hand geometry recognition biometrics on a fob |
US7690577B2 (en) | 2001-07-10 | 2010-04-06 | Blayn W Beenau | Registering a biometric for radio frequency transactions |
US7694876B2 (en) | 2001-07-10 | 2010-04-13 | American Express Travel Related Services Company, Inc. | Method and system for tracking user performance |
US8001054B1 (en) | 2001-07-10 | 2011-08-16 | American Express Travel Related Services Company, Inc. | System and method for generating an unpredictable number using a seeded algorithm |
US20050033619A1 (en) * | 2001-07-10 | 2005-02-10 | American Express Travel Related Services Company, Inc. | Method and system for tracking user performance |
US20050033686A1 (en) * | 2001-07-10 | 2005-02-10 | American Express Travel Related Services Company, Inc. | System and method for securing sensitive information during completion of a transaction |
US20050038718A1 (en) * | 2001-07-10 | 2005-02-17 | American Express Travel Related Services Company, Inc. | Method and system for facilitating a shopping experience |
US20050038741A1 (en) * | 2001-07-10 | 2005-02-17 | American Express Travel Related Services Company, Inc. | Method and system for a travel-related multi-function fob |
US8284025B2 (en) | 2001-07-10 | 2012-10-09 | Xatra Fund Mx, Llc | Method and system for auditory recognition biometrics on a FOB |
US9454752B2 (en) | 2001-07-10 | 2016-09-27 | Chartoleaux Kg Limited Liability Company | Reload protocol at a transaction processing entity |
US20050171898A1 (en) * | 2001-07-10 | 2005-08-04 | American Express Travel Related Services Company, Inc. | Systems and methods for managing multiple accounts on a rf transaction device using secondary identification indicia |
US9031880B2 (en) | 2001-07-10 | 2015-05-12 | Iii Holdings 1, Llc | Systems and methods for non-traditional payment using biometric data |
US9024719B1 (en) | 2001-07-10 | 2015-05-05 | Xatra Fund Mx, Llc | RF transaction system and method for storing user personal data |
US7762457B2 (en) | 2001-07-10 | 2010-07-27 | American Express Travel Related Services Company, Inc. | System and method for dynamic fob synchronization and personalization |
USRE45416E1 (en) | 2001-07-10 | 2015-03-17 | Xatra Fund Mx, Llc | Processing an RF transaction using a routing number |
US7768379B2 (en) | 2001-07-10 | 2010-08-03 | American Express Travel Related Services Company, Inc. | Method and system for a travel-related multi-function fob |
US8960535B2 (en) | 2001-07-10 | 2015-02-24 | Iii Holdings 1, Llc | Method and system for resource management and evaluation |
US7925535B2 (en) | 2001-07-10 | 2011-04-12 | American Express Travel Related Services Company, Inc. | System and method for securing RF transactions using a radio frequency identification device including a random number generator |
US8548927B2 (en) | 2001-07-10 | 2013-10-01 | Xatra Fund Mx, Llc | Biometric registration for facilitating an RF transaction |
US7805378B2 (en) | 2001-07-10 | 2010-09-28 | American Express Travel Related Servicex Company, Inc. | System and method for encoding information in magnetic stripe format for use in radio frequency identification transactions |
US9769134B2 (en) | 2002-04-17 | 2017-09-19 | Visa International Service Association | Mobile account authentication service |
US7707120B2 (en) | 2002-04-17 | 2010-04-27 | Visa International Service Association | Mobile account authentication service |
US8135621B2 (en) * | 2002-04-26 | 2012-03-13 | At&T Intellectual Property I, L.P. | System and method for supporting anonymous transactions |
US10425396B2 (en) * | 2002-04-26 | 2019-09-24 | International Business Machines Corporation | Efficient browser-based identity management providing personal control and anonymity |
US20030204445A1 (en) * | 2002-04-26 | 2003-10-30 | Vishik Claire S. | System and method for supporting anonymous transactions |
US8543423B2 (en) | 2002-07-16 | 2013-09-24 | American Express Travel Related Services Company, Inc. | Method and apparatus for enrolling with multiple transaction environments |
US20040138989A1 (en) * | 2002-07-16 | 2004-07-15 | O'malley Anne | Method and apparatus for enrolling with multiple transaction enviroments |
US20120066130A1 (en) * | 2002-09-10 | 2012-03-15 | Visa International Service Association | Data authentication and provisioning method and system |
US20120066129A1 (en) * | 2002-09-10 | 2012-03-15 | Visa International Service Association | Data authentication and provisioning method and system |
US20040059688A1 (en) * | 2002-09-10 | 2004-03-25 | Visa International Service Association | Data authentication and provisioning method and system |
US8019691B2 (en) * | 2002-09-10 | 2011-09-13 | Visa International Service Association | Profile and identity authentication service |
US10672215B2 (en) * | 2002-09-10 | 2020-06-02 | Visa International Service Association | Data authentication and provisioning method and system |
US10679453B2 (en) * | 2002-09-10 | 2020-06-09 | Visa International Service Association | Data authentication and provisioning method and system |
USRE43157E1 (en) | 2002-09-12 | 2012-02-07 | Xatra Fund Mx, Llc | System and method for reassociating an account number to another transaction account |
US8429041B2 (en) | 2003-05-09 | 2013-04-23 | American Express Travel Related Services Company, Inc. | Systems and methods for managing account information lifecycles |
US20040230534A1 (en) * | 2003-05-12 | 2004-11-18 | Digital Matrix Systems, Inc. | Encrypted credit application processing system and method |
US8595074B2 (en) * | 2003-07-15 | 2013-11-26 | American Express Travel Related Services Company, Inc. | System and method for activating or changing the status of an account associated with a prepaid card |
US20050027655A1 (en) * | 2003-07-15 | 2005-02-03 | American Express Travel Related Services Company, Inc. | System and method for activating or changing the status of an account associated with a prepaid card |
US20050071687A1 (en) * | 2003-09-30 | 2005-03-31 | Novell, Inc. | Techniques for securing electronic identities |
US7770204B2 (en) * | 2003-09-30 | 2010-08-03 | Novell, Inc. | Techniques for securing electronic identities |
US20050125342A1 (en) * | 2003-10-01 | 2005-06-09 | Steven Schiff | System and method for interactive electronic fund raising and electronic transaction processing |
US8321946B2 (en) * | 2003-12-05 | 2012-11-27 | Hewlett-Packard Development Company, L.P. | Method and system for preventing identity theft in electronic communications |
US20050125686A1 (en) * | 2003-12-05 | 2005-06-09 | Brandt William M. | Method and system for preventing identity theft in electronic communications |
US7653587B2 (en) * | 2004-04-07 | 2010-01-26 | Ameriprise Financial, Inc. | Automated account statement generation process |
US20050228679A1 (en) * | 2004-04-07 | 2005-10-13 | Alana King | Automated account statement generation process |
US20070228161A1 (en) * | 2004-05-17 | 2007-10-04 | American Express Travel Related Services Company, Inc. | Limited use pin system and method |
US7793845B2 (en) | 2004-07-01 | 2010-09-14 | American Express Travel Related Services Company, Inc. | Smartcard transaction system and method |
US8016191B2 (en) | 2004-07-01 | 2011-09-13 | American Express Travel Related Services Company, Inc. | Smartcard transaction system and method |
US20060036547A1 (en) * | 2004-08-10 | 2006-02-16 | Hiroshi Yasuhara | Authentication system, card and authentication method |
US8554676B2 (en) | 2004-09-13 | 2013-10-08 | The Toronto-Dominion Bank | Purchasing alert methods and apparatus |
US8311941B2 (en) * | 2004-09-13 | 2012-11-13 | The Toronto-Dominion Bank | Purchasing alert methods and apparatus |
US20080010203A1 (en) * | 2004-09-13 | 2008-01-10 | Grant David S | Purchasing Alert Methods And Apparatus |
US9092494B1 (en) * | 2004-10-14 | 2015-07-28 | Google Inc. | Information vault, data format conversion services system and method |
US20060083214A1 (en) * | 2004-10-14 | 2006-04-20 | Grim Clifton E Iii | Information vault, data format conversion services system and method |
US8620816B2 (en) * | 2004-10-14 | 2013-12-31 | Google Inc. | Information vault, data format conversion services system and method |
US20060089909A1 (en) * | 2004-10-21 | 2006-04-27 | First National Technologies Inc. | Cardless transaction system |
US8325739B2 (en) * | 2005-04-25 | 2012-12-04 | Thomson Licensing | Process for managing resource address requests and associated gateway device |
US20090059936A1 (en) * | 2005-04-25 | 2009-03-05 | Dirk Van De Poel | Process for manging resource address requests and associated gateway device |
US9762475B2 (en) | 2005-09-28 | 2017-09-12 | One Smart Star Limited | Communicating with business customers |
US20090037471A1 (en) * | 2005-09-28 | 2009-02-05 | One Smart Star Limited | Communicating with business customers |
US20070078763A1 (en) * | 2005-09-30 | 2007-04-05 | Babi Rene P | Method and system for transferring funds between two phone callers |
US10121139B2 (en) | 2005-10-06 | 2018-11-06 | Mastercard Mobile Transactions Solutions, Inc. | Direct user to ticketing service provider secure transaction channel |
US9626675B2 (en) | 2005-10-06 | 2017-04-18 | Mastercard Mobile Transaction Solutions, Inc. | Updating a widget that was deployed to a secure wallet container on a mobile device |
US9508073B2 (en) | 2005-10-06 | 2016-11-29 | Mastercard Mobile Transactions Solutions, Inc. | Shareable widget interface to mobile wallet functions |
US9454758B2 (en) | 2005-10-06 | 2016-09-27 | Mastercard Mobile Transactions Solutions, Inc. | Configuring a plurality of security isolated wallet containers on a single mobile device |
US9886691B2 (en) | 2005-10-06 | 2018-02-06 | Mastercard Mobile Transactions Solutions, Inc. | Deploying an issuer-specific widget to a secure wallet container on a client device |
US9990625B2 (en) | 2005-10-06 | 2018-06-05 | Mastercard Mobile Transactions Solutions, Inc. | Establishing trust for conducting direct secure electronic transactions between a user and service providers |
US10176476B2 (en) | 2005-10-06 | 2019-01-08 | Mastercard Mobile Transactions Solutions, Inc. | Secure ecosystem infrastructure enabling multiple types of electronic wallets in an ecosystem of issuers, service providers, and acquires of instruments |
US10140606B2 (en) | 2005-10-06 | 2018-11-27 | Mastercard Mobile Transactions Solutions, Inc. | Direct personal mobile device user to service provider secure transaction channel |
US10026079B2 (en) | 2005-10-06 | 2018-07-17 | Mastercard Mobile Transactions Solutions, Inc. | Selecting ecosystem features for inclusion in operational tiers of a multi-domain ecosystem platform for secure personalized transactions |
US10096025B2 (en) | 2005-10-06 | 2018-10-09 | Mastercard Mobile Transactions Solutions, Inc. | Expert engine tier for adapting transaction-specific user requirements and transaction record handling |
US10032160B2 (en) | 2005-10-06 | 2018-07-24 | Mastercard Mobile Transactions Solutions, Inc. | Isolating distinct service provider widgets within a wallet container |
US20070106611A1 (en) * | 2005-11-09 | 2007-05-10 | Larsen Christian P | Method and system for preventing identity theft and providing credit independent completion of transactions |
US7606738B2 (en) | 2005-11-29 | 2009-10-20 | Target Brands, Inc. | E-mail based gift delivery |
US20070124212A1 (en) * | 2005-11-29 | 2007-05-31 | Target Brands, Inc. | E-mail based gift delivery |
US20100010920A1 (en) * | 2005-11-29 | 2010-01-14 | Target Brands, Inc. | E-mail based gift delivery |
US8341025B2 (en) | 2005-11-29 | 2012-12-25 | Target Brands, Inc. | E-mail based gift delivery |
US7716467B1 (en) * | 2005-12-02 | 2010-05-11 | Sprint Communications Company L.P. | Encryption gateway service |
US7729359B1 (en) | 2006-03-15 | 2010-06-01 | Manu Kumar | Methods and systems for providing address transparency |
WO2008004217A3 (en) * | 2006-07-02 | 2009-04-30 | One Smart Star Ltd | Compact contact details coordination unit and method |
WO2008017715A1 (en) * | 2006-08-10 | 2008-02-14 | Cards Off Sa | Method and system for executing electronic commerce transactions |
US9530129B2 (en) * | 2006-10-25 | 2016-12-27 | Payfont Limited | Secure authentication and payment system |
US20150254661A1 (en) * | 2006-10-25 | 2015-09-10 | Payfont Limited | Secure authentication and payment system |
AU2008243004B2 (en) * | 2007-04-17 | 2013-06-27 | Visa U.S.A. Inc. | Method and system for authenticating a party to a transaction |
US8631231B2 (en) | 2007-04-17 | 2014-01-14 | Visa U.S.A. Inc. | Mobile device initiated transaction |
US20100153272A1 (en) * | 2007-04-17 | 2010-06-17 | David Wentker | Mobile device initiated transaction |
US9160741B2 (en) | 2007-04-17 | 2015-10-13 | Visa U.S.A. Inc. | Remote authentication system |
US8918637B2 (en) | 2007-04-17 | 2014-12-23 | Visa U.S.A. Inc. | Remote authentication system |
US20090325542A1 (en) * | 2007-04-17 | 2009-12-31 | David Wentker | Method and system for authenticating a party to a transaction |
US8156543B2 (en) | 2007-04-17 | 2012-04-10 | Visa U.S.A. | Method and system for authenticating a party to a transaction |
WO2008150606A2 (en) * | 2007-05-29 | 2008-12-11 | Visa U.S.A. Inc. | System and method for managing enhancement features assigned to financial presentation devices |
WO2008150606A3 (en) * | 2007-05-29 | 2010-01-21 | Visa U.S.A. Inc. | System and method for managing enhancement features assigned to financial presentation devices |
US20080296369A1 (en) * | 2007-05-29 | 2008-12-04 | Shaun Bodington | System and method for managing enhancement features assigned to financial presentation devices |
US8313021B2 (en) | 2007-05-29 | 2012-11-20 | Visa U.S.A. | System and method for managing enhancement features assigned to financial presentation devices |
US8727211B2 (en) | 2007-05-29 | 2014-05-20 | Visa U.S.A. Inc. | System and method for managing enhancement features assigned to financial presentation devices |
US10510055B2 (en) | 2007-10-31 | 2019-12-17 | Mastercard Mobile Transactions Solutions, Inc. | Ensuring secure access by a service provider to one of a plurality of mobile electronic wallets |
US8812401B2 (en) | 2007-11-20 | 2014-08-19 | Propay Usa Inc. | Secure payment capture processes |
US20090132424A1 (en) * | 2007-11-20 | 2009-05-21 | Propay Usa, Inc. | Secure payment capture processes |
US8281145B2 (en) * | 2007-12-14 | 2012-10-02 | Mehran Randall Rasti | Doing business without SSN, EIN, and charge card numbers |
US20090158030A1 (en) * | 2007-12-14 | 2009-06-18 | Mehran Randall Rasti | Doing business without SSN, EIN, and charge card numbers |
US20090198615A1 (en) * | 2008-02-01 | 2009-08-06 | Mazooma, Llc | Method, Device, and System for Completing On-Line Financial Transaction |
US8271385B2 (en) * | 2008-02-01 | 2012-09-18 | Mazooma Technical Services, Inc. | Method, device, and system for completing on-line financial transactions |
US20100223152A1 (en) * | 2008-02-01 | 2010-09-02 | Mazooma, Llc | Method, device, and system for completing on-line financial transactions |
US20120330841A1 (en) * | 2008-02-01 | 2012-12-27 | Qun Chen | Device and method for facilitating financial transactions |
US10558956B2 (en) * | 2008-02-01 | 2020-02-11 | Mazooma Technical Services, Inc. | Device and method for facilitating financial transactions |
US9015074B2 (en) * | 2008-02-01 | 2015-04-21 | Mazooma Technical Services, Inc. | Device and method for facilitating financial transactions |
US7720764B2 (en) * | 2008-02-01 | 2010-05-18 | Kenneth James Emerson | Method, device, and system for completing on-line financial transaction |
US20150206107A1 (en) * | 2008-02-01 | 2015-07-23 | Mazooma Technical Services, Inc. | Device and method for facilitating financial transactions |
US20100174737A1 (en) * | 2008-02-12 | 2010-07-08 | Chazon Stein | System and Method for Communications |
US20090240620A1 (en) * | 2008-03-24 | 2009-09-24 | Propay Usa, Inc. | Secure payment system |
US8069121B2 (en) | 2008-08-04 | 2011-11-29 | ProPay Inc. | End-to-end secure payment processes |
US20100030697A1 (en) * | 2008-08-04 | 2010-02-04 | Propay, Inc. | End-to-end secure payment processes |
US8706644B1 (en) | 2009-01-13 | 2014-04-22 | Amazon Technologies, Inc. | Mining phrases for association with a user |
US8768852B2 (en) | 2009-01-13 | 2014-07-01 | Amazon Technologies, Inc. | Determining phrases related to other phrases |
US9569770B1 (en) | 2009-01-13 | 2017-02-14 | Amazon Technologies, Inc. | Generating constructed phrases |
US8706643B1 (en) | 2009-01-13 | 2014-04-22 | Amazon Technologies, Inc. | Generating and suggesting phrases |
US8423349B1 (en) | 2009-01-13 | 2013-04-16 | Amazon Technologies, Inc. | Filtering phrases for an identifier |
US10616183B2 (en) * | 2009-07-16 | 2020-04-07 | Oracle International Corporation | Techniques for securing supply chain electronic transactions |
US20160173457A1 (en) * | 2009-07-16 | 2016-06-16 | Oracle International Corporation | Techniques for securing supply chain electronic transactions |
US9298700B1 (en) | 2009-07-28 | 2016-03-29 | Amazon Technologies, Inc. | Determining similar phrases |
US10007712B1 (en) | 2009-08-20 | 2018-06-26 | Amazon Technologies, Inc. | Enforcing user-specified rules |
US20110055077A1 (en) * | 2009-09-02 | 2011-03-03 | Susan French | Portable consumer device with funds transfer processing |
US9947020B2 (en) | 2009-10-19 | 2018-04-17 | Visa U.S.A. Inc. | Systems and methods to provide intelligent analytics to cardholders and merchants |
US10607244B2 (en) | 2009-10-19 | 2020-03-31 | Visa U.S.A. Inc. | Systems and methods to provide intelligent analytics to cardholders and merchants |
US20110119190A1 (en) * | 2009-11-18 | 2011-05-19 | Magid Joseph Mina | Anonymous transaction payment systems and methods |
US20110178926A1 (en) * | 2010-01-19 | 2011-07-21 | Mike Lindelsee | Remote Variable Authentication Processing |
US8799658B1 (en) | 2010-03-02 | 2014-08-05 | Amazon Technologies, Inc. | Sharing media items with pass phrases |
US9485286B1 (en) | 2010-03-02 | 2016-11-01 | Amazon Technologies, Inc. | Sharing media items with pass phrases |
US9471926B2 (en) | 2010-04-23 | 2016-10-18 | Visa U.S.A. Inc. | Systems and methods to provide offers to travelers |
US10089630B2 (en) | 2010-04-23 | 2018-10-02 | Visa U.S.A. Inc. | Systems and methods to provide offers to travelers |
US10430823B2 (en) | 2010-08-02 | 2019-10-01 | Visa International Service Association | Systems and methods to optimize media presentations using a camera |
US9760905B2 (en) | 2010-08-02 | 2017-09-12 | Visa International Service Association | Systems and methods to optimize media presentations using a camera |
US20120166334A1 (en) * | 2010-12-23 | 2012-06-28 | Debbie Kimberg | Methods and systems for identity based transactions |
US9600808B1 (en) | 2011-06-24 | 2017-03-21 | Epic One Texas, Llc | Secure payment card, method and system |
US8566169B2 (en) | 2011-07-15 | 2013-10-22 | Bank Of America Corporation | Virtual gift card |
US10628842B2 (en) | 2011-08-19 | 2020-04-21 | Visa International Service Association | Systems and methods to communicate offer options via messaging in real time with processing of payment transaction |
US10223707B2 (en) | 2011-08-19 | 2019-03-05 | Visa International Service Association | Systems and methods to communicate offer options via messaging in real time with processing of payment transaction |
US12072989B2 (en) | 2011-12-09 | 2024-08-27 | Sertainty Corporation | System and methods for using cipher objects to protect data |
US11093623B2 (en) | 2011-12-09 | 2021-08-17 | Sertainty Corporation | System and methods for using cipher objects to protect data |
US20140019367A1 (en) * | 2012-07-13 | 2014-01-16 | Apple Inc. | Method to send payment data through various air interfaces without compromising user data |
US9152963B2 (en) | 2012-10-08 | 2015-10-06 | Bank Of America Corporation | Gift card transaction processing |
US20140108134A1 (en) * | 2012-10-11 | 2014-04-17 | Pitney Bowes Inc. | Method and system for negotiating group offers while maintaining privacy of consumers |
US11132744B2 (en) | 2012-12-13 | 2021-09-28 | Visa International Service Association | Systems and methods to provide account features via web based user interfaces |
US11900449B2 (en) | 2012-12-13 | 2024-02-13 | Visa International Service Association | Systems and methods to provide account features via web based user interfaces |
US10360627B2 (en) | 2012-12-13 | 2019-07-23 | Visa International Service Association | Systems and methods to provide account features via web based user interfaces |
US10740731B2 (en) | 2013-01-02 | 2020-08-11 | Visa International Service Association | Third party settlement |
US9741051B2 (en) * | 2013-01-02 | 2017-08-22 | Visa International Service Association | Tokenization and third-party interaction |
US20140188586A1 (en) * | 2013-01-02 | 2014-07-03 | Andrew Carpenter | Tokenization and third-party interaction |
US9947007B2 (en) | 2013-01-27 | 2018-04-17 | Barry Greenbaum | Payment information technologies |
US20180158047A1 (en) * | 2013-01-27 | 2018-06-07 | Barry Greenbaum | Payment information technologies |
US20140265300A1 (en) * | 2013-03-13 | 2014-09-18 | Ebay Inc. | Smart anti-fraud shipping labels |
US20150026214A1 (en) * | 2013-07-19 | 2015-01-22 | New Jersey Appleseed Public Interest Law Center | System and Method for Facilitating Access to Open Public Records |
US10346822B2 (en) * | 2013-08-23 | 2019-07-09 | Visa International Service Association | Dynamic account selection |
US20150058146A1 (en) * | 2013-08-23 | 2015-02-26 | Ajit Gaddam | Dynamic Account Selection |
US11144902B2 (en) | 2013-08-23 | 2021-10-12 | Visa International Service Association | Dynamic account selection |
US20170331820A1 (en) * | 2014-11-14 | 2017-11-16 | Orange | Method for connecting a mobile terminal with a server of a service provider via an operator platform |
US10992661B2 (en) * | 2014-11-14 | 2021-04-27 | Orange | Method for connecting a mobile terminal with a server of a service provider via an operator platform |
US11288664B2 (en) * | 2015-01-07 | 2022-03-29 | Advanced New Technologies Co., Ltd. | Method and apparatus for processing transactions |
US10748148B2 (en) | 2015-06-05 | 2020-08-18 | Jaswant Pujari | System and method for securely processing payment transactions |
US20220230168A1 (en) * | 2015-12-28 | 2022-07-21 | Wells Fargo Bank, N.A. | Systems and methods for transaction privacy shield |
US11386409B2 (en) | 2016-03-04 | 2022-07-12 | Sertintyone Corporation | Systems and methods for media codecs and containers |
US10979468B2 (en) | 2016-05-31 | 2021-04-13 | Brightcove Inc. | Limiting key request rates for streaming media |
US10432685B2 (en) * | 2016-05-31 | 2019-10-01 | Brightcove, Inc. | Limiting key request rates for streaming media |
WO2018044647A1 (en) * | 2016-09-01 | 2018-03-08 | Pujari Jaswant | System and method for securely processing payment transactions |
US10986541B2 (en) | 2017-06-22 | 2021-04-20 | Bank Of America Corporation | Dynamic utilization of alternative resources based on token association |
US11190617B2 (en) | 2017-06-22 | 2021-11-30 | Bank Of America Corporation | Data transmission to a networked resource based on contextual information |
US10511692B2 (en) | 2017-06-22 | 2019-12-17 | Bank Of America Corporation | Data transmission to a networked resource based on contextual information |
US10313480B2 (en) | 2017-06-22 | 2019-06-04 | Bank Of America Corporation | Data transmission between networked resources |
US10524165B2 (en) | 2017-06-22 | 2019-12-31 | Bank Of America Corporation | Dynamic utilization of alternative resources based on token association |
US10963960B1 (en) * | 2018-08-30 | 2021-03-30 | Wells Fargo Bank, N.A. | Computer system for automatic credit allocation of a shared line of credit |
US11475435B2 (en) * | 2018-09-19 | 2022-10-18 | Jpmorgan Chase Bank, N.A. | Method and system for generating digital wallet accounts |
WO2021041746A1 (en) * | 2019-08-27 | 2021-03-04 | Mshift, Inc. | Stable digital token processing and encryption on blockchain |
WO2021158723A1 (en) * | 2020-02-04 | 2021-08-12 | Syncsoft, Llc | Technologies for secure physical address alias maintenance and usage |
Also Published As
Publication number | Publication date |
---|---|
US7213748B2 (en) | 2007-05-08 |
US20040254894A1 (en) | 2004-12-16 |
US7264152B2 (en) | 2007-09-04 |
US20040254893A1 (en) | 2004-12-16 |
US20080052244A1 (en) | 2008-02-28 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US7264152B2 (en) | Anonymous transaction authentication | |
US20040260653A1 (en) | Anonymous transactions | |
US6675153B1 (en) | Transaction authorization system | |
US20060178994A1 (en) | Method and system for private shipping to anonymous users of a computer network | |
US7483858B2 (en) | Network-based system | |
US9785942B2 (en) | Methods for performing internet processes using global positioning and other means | |
US8271381B2 (en) | Methods and systems for identity authentication | |
US7177830B2 (en) | On-line payment system | |
US7853481B1 (en) | eDropship: methods and systems for anonymous eCommerce shipment | |
US5671279A (en) | Electronic commerce using a secure courier system | |
US20070226152A1 (en) | System and method for anonymous transactions and conveyances | |
US20050027618A1 (en) | Third party privacy system | |
US20010044785A1 (en) | Method and system for private shipping to anonymous users of a computer network | |
US20010037290A1 (en) | Method and system for secured web-based escrowed transactions | |
US20040019563A1 (en) | Purchasing on the internet using verified order information and bank payment assurance | |
JP2002109409A (en) | Electronic commerce method in electronic commerce system | |
US20120290484A1 (en) | Method and System for Sending Surveys and Receipts Electronically to Customers Purchasing with Credit Cards | |
WO2003096252A1 (en) | Purchasing on the internet using verified order information and bank payment assurance | |
CA2335689A1 (en) | Third party privacy system | |
US20060143122A1 (en) | Purchasing on the internet using verified order information and bank payment assurance | |
WO2001035355A1 (en) | Systems and methods for anonymous payment transactions | |
WO2001048628A2 (en) | System and method for anonymous transactions and disguised mailings | |
US8069118B2 (en) | Mediated electronic messaging with value-added services | |
WO2000063855A9 (en) | Improved system and method for anonymous transactions | |
JP4903346B2 (en) | Improved method and system for processing secure payments across computer networks without pseudo or proxy account numbers |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AS | Assignment |
Owner name: FIRST DATA CORPORATION, COLORADO Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:BLAGG, LYNN HOLM;TSUEI, HENRY;WELLS, STEPHEN;AND OTHERS;REEL/FRAME:014419/0260;SIGNING DATES FROM 20020614 TO 20030717 |
|
AS | Assignment |
Owner name: CREDIT SUISSE, CAYMAN ISLANDS BRANCH, AS COLLATERA Free format text: SECURITY AGREEMENT;ASSIGNORS:FIRST DATA CORPORATION;CARDSERVICE INTERNATIONAL, INC.;FUNDSXPRESS, INC.;AND OTHERS;REEL/FRAME:020045/0165 Effective date: 20071019 |
|
AS | Assignment |
Owner name: WELLS FARGO BANK, NATIONAL ASSOCIATION, AS COLLATERAL AGENT, NEW YORK Free format text: SECURITY AGREEMENT;ASSIGNORS:DW HOLDINGS, INC.;FIRST DATA RESOURCES, INC. (K/N/A FIRST DATA RESOURCES, LLC);FUNDSXPRESS FINANCIAL NETWORKS, INC.;AND OTHERS;REEL/FRAME:025368/0183 Effective date: 20100820 Owner name: WELLS FARGO BANK, NATIONAL ASSOCIATION, AS COLLATE Free format text: SECURITY AGREEMENT;ASSIGNORS:DW HOLDINGS, INC.;FIRST DATA RESOURCES, INC. (K/N/A FIRST DATA RESOURCES, LLC);FUNDSXPRESS FINANCIAL NETWORKS, INC.;AND OTHERS;REEL/FRAME:025368/0183 Effective date: 20100820 |
|
AS | Assignment |
Owner name: WELLS FARGO BANK, NATIONAL ASSOCIATION, AS COLLATERAL AGENT, NEW YORK Free format text: SECURITY AGREEMENT;ASSIGNORS:DW HOLDINGS, INC.;FIRST DATA RESOURCES, LLC;FUNDSXPRESS FINANCIAL NETWORKS, INC.;AND OTHERS;REEL/FRAME:025719/0590 Effective date: 20101217 Owner name: WELLS FARGO BANK, NATIONAL ASSOCIATION, AS COLLATE Free format text: SECURITY AGREEMENT;ASSIGNORS:DW HOLDINGS, INC.;FIRST DATA RESOURCES, LLC;FUNDSXPRESS FINANCIAL NETWORKS, INC.;AND OTHERS;REEL/FRAME:025719/0590 Effective date: 20101217 |
|
STCB | Information on status: application discontinuation |
Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION |
|
AS | Assignment |
Owner name: LINKPOINT INTERNATIONAL, INC., CALIFORNIA Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:CREDIT SUISSE AG, CAYMAN ISLANDS BRANCH;REEL/FRAME:049902/0919 Effective date: 20190729 Owner name: FIRST DATA CORPORATION, COLORADO Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:CREDIT SUISSE AG, CAYMAN ISLANDS BRANCH;REEL/FRAME:049902/0919 Effective date: 20190729 Owner name: TASQ TECHNOLOGY, INC., CALIFORNIA Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:CREDIT SUISSE AG, CAYMAN ISLANDS BRANCH;REEL/FRAME:049902/0919 Effective date: 20190729 Owner name: CARDSERVICE INTERNATIONAL, INC., CALIFORNIA Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:CREDIT SUISSE AG, CAYMAN ISLANDS BRANCH;REEL/FRAME:049902/0919 Effective date: 20190729 Owner name: TELECHECK INTERNATIONAL, INC., TEXAS Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:CREDIT SUISSE AG, CAYMAN ISLANDS BRANCH;REEL/FRAME:049902/0919 Effective date: 20190729 Owner name: FUNDSXPRESS, INC., TEXAS Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:CREDIT SUISSE AG, CAYMAN ISLANDS BRANCH;REEL/FRAME:049902/0919 Effective date: 20190729 Owner name: DW HOLDINGS INC., COLORADO Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:CREDIT SUISSE AG, CAYMAN ISLANDS BRANCH;REEL/FRAME:049902/0919 Effective date: 20190729 Owner name: INTELLIGENT RESULTS, INC., COLORADO Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:CREDIT SUISSE AG, CAYMAN ISLANDS BRANCH;REEL/FRAME:049902/0919 Effective date: 20190729 Owner name: SIZE TECHNOLOGIES, INC., COLORADO Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:CREDIT SUISSE AG, CAYMAN ISLANDS BRANCH;REEL/FRAME:049902/0919 Effective date: 20190729 Owner name: TELECHECK SERVICES, INC., TEXAS Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:CREDIT SUISSE AG, CAYMAN ISLANDS BRANCH;REEL/FRAME:049902/0919 Effective date: 20190729 Owner name: FIRST DATA RESOURCES, LLC, COLORADO Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:CREDIT SUISSE AG, CAYMAN ISLANDS BRANCH;REEL/FRAME:049902/0919 Effective date: 20190729 |
|
AS | Assignment |
Owner name: TELECHECK INTERNATIONAL, INC., NEW YORK Free format text: TERMINATION AND RELEASE OF SECURITY INTEREST IN PATENT RIGHTS;ASSIGNOR:WELLS FARGO BANK, NATIONAL ASSOCIATION;REEL/FRAME:050090/0060 Effective date: 20190729 Owner name: DW HOLDINGS, INC., NEW YORK Free format text: TERMINATION AND RELEASE OF SECURITY INTEREST IN PATENT RIGHTS;ASSIGNOR:WELLS FARGO BANK, NATIONAL ASSOCIATION;REEL/FRAME:050090/0060 Effective date: 20190729 Owner name: SIZE TECHNOLOGIES, INC., NEW YORK Free format text: TERMINATION AND RELEASE OF SECURITY INTEREST IN PATENT RIGHTS;ASSIGNOR:WELLS FARGO BANK, NATIONAL ASSOCIATION;REEL/FRAME:050090/0060 Effective date: 20190729 Owner name: FUNDSXPRESS FINANCIAL NETWORKS, INC., NEW YORK Free format text: TERMINATION AND RELEASE OF SECURITY INTEREST IN PATENT RIGHTS;ASSIGNOR:WELLS FARGO BANK, NATIONAL ASSOCIATION;REEL/FRAME:050090/0060 Effective date: 20190729 Owner name: TASQ TECHNOLOGY, INC., NEW YORK Free format text: TERMINATION AND RELEASE OF SECURITY INTEREST IN PATENT RIGHTS;ASSIGNOR:WELLS FARGO BANK, NATIONAL ASSOCIATION;REEL/FRAME:050090/0060 Effective date: 20190729 Owner name: MONEY NETWORK FINANCIAL, LLC, NEW YORK Free format text: TERMINATION AND RELEASE OF SECURITY INTEREST IN PATENT RIGHTS;ASSIGNOR:WELLS FARGO BANK, NATIONAL ASSOCIATION;REEL/FRAME:050090/0060 Effective date: 20190729 Owner name: FIRST DATA RESOURCES, INC. (K/N/A FIRST DATA RESOU Free format text: TERMINATION AND RELEASE OF SECURITY INTEREST IN PATENT RIGHTS;ASSIGNOR:WELLS FARGO BANK, NATIONAL ASSOCIATION;REEL/FRAME:050090/0060 Effective date: 20190729 Owner name: LINKPOINT INTERNATIONAL, INC., NEW YORK Free format text: TERMINATION AND RELEASE OF SECURITY INTEREST IN PATENT RIGHTS;ASSIGNOR:WELLS FARGO BANK, NATIONAL ASSOCIATION;REEL/FRAME:050090/0060 Effective date: 20190729 Owner name: FIRST DATA CORPORATION, NEW YORK Free format text: TERMINATION AND RELEASE OF SECURITY INTEREST IN PATENT RIGHTS;ASSIGNOR:WELLS FARGO BANK, NATIONAL ASSOCIATION;REEL/FRAME:050090/0060 Effective date: 20190729 Owner name: INTELLIGENT RESULTS, INC. (K/N/A FIRST DATA SOLUTI Free format text: TERMINATION AND RELEASE OF SECURITY INTEREST IN PATENT RIGHTS;ASSIGNOR:WELLS FARGO BANK, NATIONAL ASSOCIATION;REEL/FRAME:050090/0060 Effective date: 20190729 Owner name: MONEY NETWORK FINANCIAL, LLC, NEW YORK Free format text: TERMINATION AND RELEASE OF SECURITY INTEREST IN PATENT RIGHTS;ASSIGNOR:WELLS FARGO BANK, NATIONAL ASSOCIATION;REEL/FRAME:050091/0474 Effective date: 20190729 Owner name: TASQ TECHNOLOGY, INC., NEW YORK Free format text: TERMINATION AND RELEASE OF SECURITY INTEREST IN PATENT RIGHTS;ASSIGNOR:WELLS FARGO BANK, NATIONAL ASSOCIATION;REEL/FRAME:050091/0474 Effective date: 20190729 Owner name: TELECHECK INTERNATIONAL, INC., NEW YORK Free format text: TERMINATION AND RELEASE OF SECURITY INTEREST IN PATENT RIGHTS;ASSIGNOR:WELLS FARGO BANK, NATIONAL ASSOCIATION;REEL/FRAME:050091/0474 Effective date: 20190729 Owner name: SIZE TECHNOLOGIES, INC., NEW YORK Free format text: TERMINATION AND RELEASE OF SECURITY INTEREST IN PATENT RIGHTS;ASSIGNOR:WELLS FARGO BANK, NATIONAL ASSOCIATION;REEL/FRAME:050091/0474 Effective date: 20190729 Owner name: LINKPOINT INTERNATIONAL, INC., NEW YORK Free format text: TERMINATION AND RELEASE OF SECURITY INTEREST IN PATENT RIGHTS;ASSIGNOR:WELLS FARGO BANK, NATIONAL ASSOCIATION;REEL/FRAME:050091/0474 Effective date: 20190729 Owner name: FIRST DATA SOLUTIONS, INC., NEW YORK Free format text: TERMINATION AND RELEASE OF SECURITY INTEREST IN PATENT RIGHTS;ASSIGNOR:WELLS FARGO BANK, NATIONAL ASSOCIATION;REEL/FRAME:050091/0474 Effective date: 20190729 Owner name: FIRST DATA RESOURCES, LLC, NEW YORK Free format text: TERMINATION AND RELEASE OF SECURITY INTEREST IN PATENT RIGHTS;ASSIGNOR:WELLS FARGO BANK, NATIONAL ASSOCIATION;REEL/FRAME:050091/0474 Effective date: 20190729 Owner name: DW HOLDINGS, INC., NEW YORK Free format text: TERMINATION AND RELEASE OF SECURITY INTEREST IN PATENT RIGHTS;ASSIGNOR:WELLS FARGO BANK, NATIONAL ASSOCIATION;REEL/FRAME:050091/0474 Effective date: 20190729 Owner name: FUNDSXPRESS FINANCIAL NETWORK, INC., NEW YORK Free format text: TERMINATION AND RELEASE OF SECURITY INTEREST IN PATENT RIGHTS;ASSIGNOR:WELLS FARGO BANK, NATIONAL ASSOCIATION;REEL/FRAME:050091/0474 Effective date: 20190729 Owner name: FIRST DATA CORPORATION, NEW YORK Free format text: TERMINATION AND RELEASE OF SECURITY INTEREST IN PATENT RIGHTS;ASSIGNOR:WELLS FARGO BANK, NATIONAL ASSOCIATION;REEL/FRAME:050091/0474 Effective date: 20190729 Owner name: FIRST DATA RESOURCES, INC. (K/N/A FIRST DATA RESOURCES, LLC), NEW YORK Free format text: TERMINATION AND RELEASE OF SECURITY INTEREST IN PATENT RIGHTS;ASSIGNOR:WELLS FARGO BANK, NATIONAL ASSOCIATION;REEL/FRAME:050090/0060 Effective date: 20190729 Owner name: INTELLIGENT RESULTS, INC. (K/N/A FIRST DATA SOLUTIONS, INC.), NEW YORK Free format text: TERMINATION AND RELEASE OF SECURITY INTEREST IN PATENT RIGHTS;ASSIGNOR:WELLS FARGO BANK, NATIONAL ASSOCIATION;REEL/FRAME:050090/0060 Effective date: 20190729 |