US20100057616A1 - System and Method of Recurring Payment Transactions - Google Patents
System and Method of Recurring Payment Transactions Download PDFInfo
- Publication number
- US20100057616A1 US20100057616A1 US12/547,783 US54778309A US2010057616A1 US 20100057616 A1 US20100057616 A1 US 20100057616A1 US 54778309 A US54778309 A US 54778309A US 2010057616 A1 US2010057616 A1 US 2010057616A1
- Authority
- US
- United States
- Prior art keywords
- payment
- communication device
- information
- payor
- communication
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Abandoned
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/40—Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/08—Payment architectures
- G06Q20/12—Payment architectures specially adapted for electronic shopping systems
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/08—Payment architectures
- G06Q20/14—Payment architectures specially adapted for billing systems
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/08—Payment architectures
- G06Q20/16—Payments settled via telecommunication systems
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/22—Payment schemes or models
- G06Q20/26—Debit schemes, e.g. "pay now"
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/30—Payment architectures, schemes or protocols characterised by the use of specific devices or networks
- G06Q20/32—Payment architectures, schemes or protocols characterised by the use of specific devices or networks using wireless devices
- G06Q20/322—Aspects of commerce using mobile devices [M-devices]
- G06Q20/3224—Transactions dependent on location of M-devices
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/30—Payment architectures, schemes or protocols characterised by the use of specific devices or networks
- G06Q20/32—Payment architectures, schemes or protocols characterised by the use of specific devices or networks using wireless devices
- G06Q20/325—Payment architectures, schemes or protocols characterised by the use of specific devices or networks using wireless devices using wireless networks
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/382—Payment protocols; Details thereof insuring higher security of transaction
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/40—Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
- G06Q20/401—Transaction verification
- G06Q20/4012—Verifying personal identification numbers [PIN]
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/40—Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
- G06Q20/401—Transaction verification
- G06Q20/4014—Identity check for transactions
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/42—Confirmation, e.g. check or permission by the legal debtor of payment
- G06Q20/425—Confirmation, e.g. check or permission by the legal debtor of payment using two different networks, one for transaction and one for security confirmation
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07F—COIN-FREED OR LIKE APPARATUS
- G07F7/00—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus
- G07F7/08—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means
- G07F7/10—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means together with a coded signal, e.g. in the form of personal identification information, like personal identification number [PIN] or biometric data
- G07F7/1025—Identification of user by a PIN code
Definitions
- the invention relates to processing recurring payment transactions using an Interactive Voice Response system combined with a Hardware Security Module to prompt for, retrieve, and encrypt a Personal Identification Number for secure payment transactions.
- Electronic payment systems generally include methods to reduce security risks for individuals and entities conducting automatic payments from a checking or savings account and/or other financial transactions including paying with payment cards over the Internet and in traditional brick-and-mortar establishments.
- retailers and recurring billers who maintain personal details, bank account information and other payment information, are vulnerable to hacking or other security breaches which cause the unlawful distribution of identify and financial information to the detriment of consumers, retailers and financial institutions causing financial harm to these entities and undermining trust in the payment system.
- Existing systems have employed various security measures such as signature verification for brick-and-mortar stores, PIN pads for the entry of debit cards PIN in brick-and-mortar stores and security codes printed on credit card for online transactions.
- Signature verification relies on the retailer or other recipient to verify the cardholder's signature while an identity thief having possession of the credit card may circumvent the security code measures.
- PIN Personal Identification Number
- PIN-based authentication may require input of the PIN by the cardholder, typically via a PIN pad in brick-and-mortar location. An identity thief having possession of a card or card number authenticated using a PIN is thereby prevented from using the card without knowledge of the PIN.
- PIN-based authentication systems are widely deployed for debit payment transactions.
- credit cards may include a smart chip that stores PIN information for use with PIN-based authentication through a point-of-sale terminal or PIN pad in retail locations.
- PIN-based authentication systems provide enhanced security as compared to signature or other existing authentication systems
- PIN-based authentication systems have disadvantages. For instance, use of a PIN pad for input requires retailers, including brick-and-mortar retailers, to purchase such hardware.
- online electronic retailers may not take advantage of PIN-based authentication because of the security risk associated with malware or spyware on the consumer's personal computer that may capture the PIN and/or the risk of transmitting a PIN over the Internet.
- purchases made over the phone may not be desirable because a cardholder may not wish disclose a PIN to an operator, for example.
- recurring payment transactions present security risks because bank account information and personal details entered online may be captured by spyware/malware and these details stored on biller computers may not be secured and could be compromised. For example, giving a biller account information so that the biller may charge or otherwise regularly process payments may be risky.
- Another problem is that a payor often forgets about their recurring bills or doesn't proactively confirm amounts to be billed and can experience overdraft charges from their bank or refused payments, or otherwise loses control of recurring payment transactions.
- various systems and methods may address these and other drawbacks of existing systems.
- various systems and methods may facilitate secure payment transactions by receiving first identification information such as, for example, a payment card (e.g., credit card or debit card) number, for a payment transaction over the Internet, identifying a payor based on the first identification information, and calling the payor via an automated Interactive Voice Response (IVR) system to prompt for and receive second identification information such as, for example, a personal identification number (PIN) for the payment card.
- IVR Interactive Voice Response
- the first identification information may be entered by the payor in one communication channel and the second identification information may be prompted for and received on another communication channel. In this manner, even when the security of the first identification information is compromised, the payment transaction remains secure because the PIN, for example, is not communicated with the first identification information.
- various systems and methods may facilitate recurring payment transactions by retrieving account information of a payor that includes, among other things, a payment date and contact information of the payor and by calling the payor using the IVR on or before the payment date to gather approval information (such as, for example, a secret password) from the payor.
- approval information such as, for example, a secret password
- the payor may be reminded of and approve the recurring payment transaction over the telephone, for example.
- a secret code or word may be preselected by the payor, and the IVR may speak this secret code or word. In this manner the payor may verify that the IVR call has been made by an authorized biller or otherwise trusted source.
- system 100 may securely facilitate authentication of payment card transactions with PIN authentication without using a point-of-sale (POS) PIN pad and avoiding the security risks associated with transmitting the PIN online.
- POS point-of-sale
- Etailers, recurring billers and others may advantageously implement the system and method described herein using existing hardware (such as, for example, a user's computer and/or telephone) to authenticate payment card purchases without requiring use of POS PIN pads, payment card readers in personal computers, prompting for PIN entry in the computer, and other disadvantages of existing online and retail solutions.
- FIG. 1 is a block diagram illustrating an example of a system for processing payment transactions and recurring payments according to various implementations of the invention.
- FIG. 2 is a diagram illustrating an example flow of data in an example system for processing a payment transaction according to various implementations of the invention.
- FIG. 3 is a data flow diagram illustrating an example flow of data of a fraud analysis module according to various implementations of the invention.
- FIG. 4 is a data flow diagram illustrating an example flow of data of an adaptive payment server initiating authorization and/or settlement of a payment transaction according to various implementations of the invention.
- FIG. 5 is a flow diagram illustrating an example of a process of processing a payment transaction according to various implementations of the invention.
- FIG. 6 is a flow diagram illustrating an example of a process of initiating a communication with a communication device when processing a payment transaction according to various implementations of the invention.
- FIG. 7 is a flow diagram illustrating an example of a process of a recurring payment transaction according to various implementations of the invention.
- FIG. 8 is a flow diagram illustrating an example process of determining whether a payment transaction is a signature debit or a PIN debit transaction according to various implementations of the invention.
- various systems and methods may facilitate secure PIN-based payment transactions over the Internet by receiving payment card numbers from a payor over a first communication channel, such as, for example, over the Internet, and collecting PIN input from the payor via another communication channel by, for example, calling the payor for PIN input using an automated Interactive Voice Response (IVR) system.
- IVR Interactive Voice Response
- various systems and methods may facilitate recurring payment transactions by initiating a communication on a communication channel to the payor (such as, for example, by calling the payor) on or before a payment date and prompting for input of authorization information by the payor.
- the payor may be reminded of and approve the recurring payment transaction using a the communication channel, such as, for example, a telephone communication channel.
- FIG. 1 is a block diagram illustrating an example of a system 100 for processing payment transactions and recurring payments according to various implementations of the invention.
- System 100 may include, for example, a communication device 102 , a communication device 104 , a network 110 , a network 112 , an adaptive payment server 120 , a database 140 , an IVR 150 , and a hardware security module (HSM) 160 .
- HSM hardware security module
- adaptive payment server 120 may receive the first identification information communicated from communication device 102 via network 110 on a first communication channel.
- the first identification information may include, among other things, a credit card number, a debit card number, a name of the cardholder (such as a name of a payor), a telephone number of the cardholder, a mailing address of the cardholder, and/or other information related to the payment transaction.
- the first identification information may identify a payment account.
- the payment account may include an online payment account, a credit and/or debit account, and/or other payment account capable of being used for a payment transaction.
- the payment account may be associated with a payment card, which may include, among other things, a credit card, a debit card, an electronic payment card, and/or other device that may be used to facilitate a payment transaction.
- the payment card may include a magnetic strip, a smart chip, and/or other tangible media configured to store the first identification information and/or other information.
- the payment transaction may include, for instance, an online purchase, a finds transfer, and/or other transaction that transfers money and/or credit from a financial account.
- adaptive payment server 120 may identify communication device 104 .
- the first identification information may include a telephone number of communication device 104 , thereby identifying communication device 104 .
- adaptive payment server 120 may query database 140 to identify communication device 104 based on the first identification information.
- Adaptive payment server 120 may use or otherwise interface with IVR 150 in order to initiate a communication with communication device 104 .
- IVR 150 may initiate a communication to communication device 104 via network 112 on a second communication channel discrete from the first communication channel. Once the communication is established, IVR 150 may prompt for and receive the second identification information from communication device 104 .
- system 100 may facilitate secure communication of the payment transaction.
- IVR 150 may use or otherwise be interfaced with HSM 160 to encrypt the second identification information.
- system 100 may initiate authentication and/or processing of the payment transaction. By receiving the first identification information and the second identification information on first and second communication channels that are discrete from one another, system 100 may facilitate secure payment transactions.
- examples of communication device 102 may include any one or more of, for instance, a personal computer, portable computer, personal digital assistant (PDA), workstation, web-enabled mobile telephone, WAP device, web-to-voice device, or other device.
- communication device 102 may include a data (or Internet) function configured to communicate data via network 110 .
- a payor or other entity may use communication device 102 to communicate the first identification information.
- the payor is a person or other entity that is a payment cardholder, a user using the system to make a payment transaction (and/or recurring payment transaction) to a payee, and/or other person or entitity using the system to process a payment transaction.
- a user or other entity may use communication device 102 to input the first identification information.
- communication device 102 may store in a memory (not shown) the first identification information or otherwise facilitate retrieval of the first identification information, such as by storing web-enabled cookies that identify the payor.
- communication device 102 may communicate a first communication on the first communication channel (not shown) via network 110 in order to communicate the first identification information.
- the first communication channel may include a data channel on which data, such as the first identification information, is communicated to and from communication device 102 via network 110 .
- “Discrete” communication channels are distinct from one another such that should the security of one channel be compromised, the other channel may remain secure. In other words, the channels may be considered to be independent from one another.
- an Internet channel may be discrete from a telephone (i.e., voice) channel and a telephone channel may be discrete from a Short Message Service (SMS) channel.
- SMS Short Message Service
- one telephone channel may be discrete from another telephone channel and one Internet channel may be discrete from another Internet channel.
- the first communication channel may include one or more Internet hypertext transfer protocol sessions (and/or other suitable data transfer protocol) that are discrete from the second communication channel.
- Internet hypertext transfer protocol sessions and/or other suitable data transfer protocol
- transfer protocols and/or other communication techniques may be used.
- communication device 102 may be communicably coupled to adaptive payment server 120 via network 110 such that adaptive payment server 120 may receive the first identification information from communication device 102 on the first communication channel.
- Network 110 may include any one or more of, for instance, the Internet, an intranet, a PAN (Personal Area Network), a LAN (Local Area Network), a WAN (Wide Area Network), a SAN (Storage Area Network), a MAN (Metropolitan Area Network), or other network.
- adaptive payment server 120 may receive the first identification information, initiate a communication to collect the second identification information, initiate authentication and/or processing of the payment transaction using the first identification information and the second identification information, initiate recurring payment transactions, and/or perform other functions to facilitate secure payment transactions.
- adaptive payment server 120 may include, among other things, an adaptive webserver 122 , a transaction identification module 124 , a fraud analysis module 126 , a recurring payment module 128 , a processor 130 and/or other suitable modules.
- Processor 130 may be configured to perform one or more functions provided by adaptive payment server 120 .
- adaptive webserver 122 may receive the first identification information from communication device 102 via network 110 .
- the system may use existing online retail services (such as, for example, payment card number input forms) or otherwise provide online retail services in order to receive the first identification information.
- adaptive webserver 122 may cause communication of a confirmation page that indicates receipt of the first identification information to communication device 102 .
- the confirmation page may include an indication that a second communication on the second communication channel to communication device 104 should be expected by a user of communication device 102 .
- the confirmation page may indicate that IVR 150 will be calling the payor for PIN entry. In this manner, the payor may be notified to expect a call that will prompt for PIN input, for example.
- transaction identification module 124 may generate a transaction identifier for the payment transaction.
- the transaction identifier may be one or more words, characters, numbers, and/or other identifier that may identify the payment transaction.
- the transaction identifier may be written, typed, and/or spoken. In this manner, the transaction identifier may be used to identify the payment transaction to the payor and/or other entity.
- payment server 120 may communicate the transaction identifier to communication device 102 , thereby allowing the payor or other entity using communication device 102 to identify the payment transaction in future communications.
- the confirmation page described above may include the transaction identifier.
- the transaction identifier may be stored using database 140 for later retrieval by adaptive server 120 and/or IVR 150 .
- database 140 may include, among other things, a temporary database 142 for temporarily storing transient data (i.e., data that is not stored long-term and/or data that is deleted after being used), and/or an account database 144 , which may include information related to a payment account, such as, for example, credit card numbers, debit card numbers, payee contact information, payment dates, payor information, an identity of communication device 104 used by the payor, and/or other information.
- a temporary database 142 for temporarily storing transient data (i.e., data that is not stored long-term and/or data that is deleted after being used)
- account database 144 which may include information related to a payment account, such as, for example, credit card numbers, debit card numbers, payee contact information, payment dates, payor information, an identity of communication device 104 used by the payor, and/or other information.
- examples of database 140 , temporary database 142 , and account database 144 include, for instance, a relational database, a filesystem, and/or other device or data representation configured for data storage.
- adaptive payment server 120 may identify communication device 104 based on the received first identification information.
- the first identification information may include a telephone number input by the payor.
- adaptive payment server 120 may identify communication device 104 by performing a lookup of database 140 .
- adaptive payment server 120 may receive a payment card number and query database 140 to determine a telephone number of the payor who owns a payment card account identified by the received payment card number.
- the lookup may be a structured query language (SQL) query, lightweight directory access protocol (LDAP) query, and/or any other known methods of querying database 140 .
- SQL structured query language
- LDAP lightweight directory access protocol
- system 100 may be configured to initiate a communication to communication device 104 using the first identification information.
- adaptive payment server 120 may initiate a second communication to communication device 104 on the second communication channel in order to prompt for and receive the second identification information.
- adaptive payment server 120 may initiate a telephone call to communication device 104 .
- communication device 104 may include a telephone (voice) function capable of receiving and/or sending telephone calls.
- Communication device 104 may include, for example, a PDA, smartphone, cellular telephone, cordless telephone, landline telephone, voice over IP (VOIP) telephone, any other device that includes a telephone function, and/or other device capable of receiving the second communication.
- VOIP voice over IP
- adaptive payment server 120 may initiate the telephone call via IVR 150 .
- IVR 150 may include existing IVRs configured to initiate a telephone call a communication device that includes a telephone function (such as, for example, communication device 104 ), communicate information to a call recipient, interactively prompt the call recipient for input, receive the input (by touch-tone input, voice input, and/or other input mechanism), process the input, and/or perform other interactive voice functions.
- IVR 150 may initiate the second communication to communication device 104 on the second communication channel via network 112 .
- Network 112 may be a Public Switch Telephone Network (PSTN), VOIP network, and/or other network or combination of networks that is configured for telephonic (voice) communication.
- PSTN Public Switch Telephone Network
- VOIP Virtual IP
- voice telephonic
- IVR 150 may greet the call recipient with a greeting that identifies the nature of the telephone call.
- the greeting may allow the call recipient to verify the trustworthiness of the call.
- the greeting may include, for example, an identification of IVR 150 , the transaction identifier, and/or other verification information to the call recipient.
- the verification information may include, among other things, any combination of one or more of predefined words, letters, characters, numbers, verbal utterance by the payor, and/or other predefined verification information that allows the call recipient to verify the trustworthiness of the call.
- IVR 150 may prompt for and receive the second identification information from communication device 104 via the second communication channel.
- the second identification information may include, among other things, a predefined secret.
- the predefined secret may include, for example, a password, PIN, and/or other secret.
- the call recipient may have made an online purchase using communication device 102 by entering first identification information (e.g., a payment card number) into an Etailer's website.
- first identification information e.g., a payment card number
- adaptive webserver 122 may communicate the transaction identifier with the confirmation page.
- the payment transaction and/or trustworthiness of the call may be identified by the call recipient.
- IVR 150 may encrypt the second identification information using HSM 160 .
- the second identification information may be a 4-digit PIN, whereupon an indication that 4-digits have been entered, HSM 160 may encrypt the 4-digit PIN.
- IVR 150 may transiently store the received second identification information and/or the encrypted second identification information in transient database 142 .
- the second identification information and/or the encrypted second identification information is removed from transient database 142 when no longer needed in order to maintain security of the second identification information.
- HSM 160 may apply Triple Data Encryption Algorithm (commonly, “Triple DES”) to encrypt the second identification information.
- Triple DES Triple Data Encryption Algorithm
- other encryption algorithms may be utilized.
- IVR 150 may record the second communication.
- the recorded second communication may be stored for archival in a database such as, for example, database 140 .
- adaptive payment server 120 may initiate authentication and/or payment of the payment transaction.
- the initiation may include, among other things, authorizing and/or settling the payment transaction with various financial networks, sending the first and the second identification information to a remote server for further payment processing, and/or taking other actions to initiate authentication and/or payment of the payment transaction.
- system 100 may facilitate authentication of payment card transactions with PIN input, for example, without using a POS PIN pad while avoiding the security risks associated with transmitting PINs online.
- Etailers and others may advantageously implement system 100 using existing hardware (such as, for example, a user's computer and/or telephone) without using POS PIN pads for implementing online PIN-based payment transactions.
- processing the payment transaction may include multi-factor authentication originating from different data sources.
- a payment card number and a PIN for payment authentication may represent a two-factor authentication scheme.
- the data source for payment card number may be the payment card itself while the data source of the PIN may be the cardholder (e.g., the payor/call recipient in the preceding examples).
- Table 1 is a list of example authentication factors, their respective data sources, and their respective capture mechanisms (where user intervention is not required to capture the factor listed in the Factor column when the corresponding Capture Mechanism column value is “Automatic”).
- adaptive payment server 120 may use one or more authentication factors, or any combination thereof, to authenticate the payment transaction or otherwise confirm an identity of a user's identity.
- Authentication factors may be authenticated by comparing observed (e.g., input) information to expected (e.g., predefined) information. “Observed” information indicates that the information related to a factor was manually entered or automatically captured during processing of the payment transaction. “Expected” information indicates that the information related to a factor has been predefined or can be determined for comparison to observed information such that a non-match may indicate a fraudulent or otherwise suspect payment transaction.
- both the first identification information and the second identification information may each include one or more of these and/or other authentication factors.
- adaptive payment server 120 may use the authentication factors in addition to processing a payment transaction using discrete communication channels, thereby providing enhanced security when processing a payment transaction.
- the authentication factors may include a payment card number.
- the authenticity of the payment card number may be verified.
- a payor may enter the payment card number using an Etailer's website when making a purchase.
- Adaptive payment server 120 may verify the authenticity of the payment card number.
- the authentication factors may include a mailing address of the cardholder.
- the authenticity of the mailing address may be verified.
- a person without knowledge of the mailing address may be prevented from making a payment transaction.
- the authentication factors may include an Internet Protocol (IP) address of a computing device such as, for example, communication device 102 .
- IP Internet Protocol
- adaptive payment server 120 may compare the observed IP address that was captured to an expected IP address of a cardholder.
- the IP address comparison may be a literal comparison, a geographic comparison, and/or other suitable IP address comparison.
- the literal comparison may directly compare observed and expected IP addresses.
- the geographic comparison may identify geographic regions identified by an IP address. In this manner, the payment transaction may be suspect if originating from a computing device in Europe when the cardholder resides in the U.S.
- the authentication factors may include a telephone number.
- the telephone number may identify communication device 104 .
- the telephone number may be input in a website of an Etailer when attempting an online purchase.
- the telephone number may be used to provide further authentication by performing a telephone number comparison.
- the telephone number comparison may be a literal comparison, a geographic comparison, and/or other suitable telephone number comparison.
- the literal comparison may directly compare observed and expected telephone numbers.
- the geographic comparison may identify geographic regions identified by the telephone number (such as, for example, by country code, area code, and/or Global System for Mobile communications (GSM) information from the telephone). In this manner, the payment transaction may be suspect if an observed telephone number originates from Europe when the cardholder resides in the U.S.
- GSM Global System for Mobile communications
- the authentication factors may include a payment card PIN (or other predefined secret information).
- PIN-based authentication may provide robust security.
- the PIN may be a reliable method of user identification and/or payment authentication.
- the authentication factors may include GPS location information.
- adaptive payment server 120 may use GPS location information from communication device 102 and/or from communication device 104 .
- the GPS location information may be used to compare observed GPS location information to expected GPS location information. In this manner, a payment transaction originating from a geographic region outside an expected geographic region may be deemed fraudulent or otherwise suspect.
- the authentication factors may include voice authentication.
- Voice authentication may include verification of an input voice utterance with a recording of a voice utterance by the cardholder.
- the recording may be stored in a database (such as, for example, database 140 ).
- Adaptive payment server 120 may receive an input utterance by a user attempting a payment transaction.
- IVR 150 may prompt a call recipient, for example, for the input voice utterance. In this manner, known methods of sound comparison may be used to further authenticate the payment transaction or otherwise identify the cardholder.
- the authentication factors may include a transaction identifier.
- the transaction identifier may be generated upon receipt of a request for a payment transaction (such as, for example, when a user attempts to make an online purchase using communication device 102 ).
- the transaction identifier may be used by adaptive server 120 in order to provide to a user an ability to identify a particular payment transaction.
- adaptive payment server 120 may communicate the transaction identifier to communication device 102 .
- adaptive payment server 120 may then communicate the transaction identifier to the user via communication device 104 , thereby allowing a user of communication device 102 and communication device 104 to verify the trustworthiness of the communication to communication device 104 .
- adaptive payment server 120 may facilitate secure payment transaction processing with two or more authentication factors from two or more independent data sources, thereby further enhancing security as compared to less than two factors of identification and/or authentication. Any combination of factors may be used. Whichever particular combination is used, adaptive payment server 120 may observe information related to each factor and compare the observed information to expected information.
- adaptive payment server 120 may receive a first authentication factor (such as, for example, a payment card number) for a payment transaction over the Internet, receive second authentication factor (such as, for example, a telephone number), identify a payor based on the first authentication factor with supplemental identification from the telephone number, and call the payor via IVR 150 using the telephone number.
- Adaptive payment server 120 may communicate a third authentication factor (such as, for example, a transaction identifier that is communicated to communication device 102 during the payment or checkout process). If the transaction identifier is accepted by the payor, IVR 150 may prompt for and receive a fourth authentication factor (such as, for example, a PIN for the payment card).
- the second authentication factor may be used to aid in the confirmation of a person's identity and/or used to confirm a location (by country code, area code or GSM in the phone) which may be used to detect fraud and protect consumers.
- the third authentication factor may be a transaction identifier such as, for example, an order number, reference number and/or other transaction identifier that may be viewed via communication device 102 by the payor.
- the transaction identifier may be spoken by IVR 150 to the payor (or otherwise be communicated to communication device 104 ) so that the payor can confirm that the call is not a random or suspect call, but rather is from a trusted source.
- the first authentication factor may be entered by the payor in one communication channel and the second authentication factor may be expressed through the same communication channel to tie the transaction to the call by IVR 150 and the payor.
- the second authentication factor while communicated over the same communication channel, may be used to identify the payor and initiate the second channel, such as, for example, a telephone call.
- IVR 150 calls the payor
- IVR 150 may speak (or otherwise communicate) the third information so the payor can tie the phone call to the Internet transaction.
- the payor may input the fourth identification information (such as, for example, the PIN) using communication device 104 .
- multiple authentication factors may be used to secure the payment transaction: the payment card number, computer/IP address details, the phone number and confirmation of validity by a telephone call, and the payment card PIN—deployed across two communication channels and input devices such as a personal computer connected to the Internet and a mobile phone across a direct dialed telephone line.
- the payment transaction remains secure because the second identification information (such as, for example, the PIN) is not communicated with the first identification information.
- a five-factor authentication using card number, mailing address, IP address, telephone number, and card PIN may be used.
- observed values of each of the input card number, mailing address, IP address, telephone number, and card PIN are compared to their respective expected values in order to authenticate the payment transaction.
- an identity thief who uses a computing device that does have an IP address that matches the expected IP address associated with an authentic payment transaction may be prevented from executing the payment transaction (such as an online purchase that the identity thief is attempting to procure).
- adaptive payment server 120 may provide additional security when processing a payment transaction as compared to existing payment systems.
- adaptive payment server 120 may perform fraud analysis of the payment transaction.
- fraud analysis module 126 may receive fraud analysis information to perform fraud analysis.
- the fraud analysis information may include, among other things, the authentication factors (which may include, for instance, the first identification information and the second identification information) and/or other information to perform fraud analysis.
- the fraud analysis may include scoring the transaction to determine a likelihood of fraudulent activity based on the fraud analysis information.
- fraud analysis module 126 discussed in further detail in FIG. 3 , may generate a fraud score that identifies the likelihood of fraudulent activity.
- adaptive payment server 120 may facilitate a secure recurring payment transaction.
- the payor may have set up one or more recurring payments to be made using one or more payment methods, such as, for example, payment by payment card.
- adaptive payment server 120 may retrieve account information for a payor, identify communication device 104 of the payor, initiate a communication to communication device 104 in order to prompt for and receive approval information, and determine whether to initiate the recurring payment. In this manner, adaptive payment server 120 may remind the payor of an upcoming recurring payment transaction to be made as well as provide a secure approval process for the recurring payment transaction by the payor.
- recurring payment module 128 may retrieve account information of the payor from account database 144 .
- the account information may include, among other things, a payment date, a payment amount, an identification of communication device 104 used by the payor, an account identifier, the verification information, payee information (including, for example, name of the payee, telephone number of the payee, account receivables numbers, etc.), approval information, and/or other suitable information related to the account.
- the approval information may be predefined by the payor in order to approve recurring payments as described below.
- the approval information may include, for example, a predefined secret such as a PIN, and/or other information that may be input by the payor to approve a recurring payment.
- the approval information may be stored along with the account information unless the approval information is a PIN or other predefined secret that should not be stored in long-term storage for security reasons.
- recurring payment module 128 may identify communication device 104 using the account information. On or before the payment date, recurring payment module 128 may initiate a communication to communication device 104 .
- the greeting described above with regard to IVR 150 may be presented to the payor through communication device 104 .
- the greeting may communicate that a recurring payment is to be made.
- At least a portion of the account information may be communicated to communication device 104 , which may allow the payor to identify the recurring payment transaction.
- an account identifier, payment amount, and/or payment date may be communicated to communication device 104 .
- the verification information described above may be communicated to communication device 104 .
- the verification information may include the verbal utterance described above. In this manner, the payor receiving the communication via communication device 104 may verify the trustworthiness of the communication.
- recurring payment module 128 may receive the approval information. Using the received approval information, recurring payment module 128 may determine whether to initiate payment of the recurring payment transaction.
- the approval information may include a PIN that is input by the payor such that the determination may include PIN authentication.
- the received approval information may include information that is stored in account database 144 , whereupon the determination may include a comparison of the received approval information and the stored approval information such that a match may cause initiation of payment of the recurring payment transaction.
- recurring payment module 128 may initiate payment of the recurring payment transaction based on the determination. As previously noted in the preceding examples, the determination may include whether the PIN was authenticated or whether a match between the received approval information and the stored approval information was found. If, based on the determination, the recurring payment transaction is not approved the recurring payment transaction may not be initiated. According to various implementations of the invention, recurring payment module 128 may notify the payor, the payee, and/or other interested party whether payment of the recurring payment transaction has been initiated. The notification, which may include a receipt of the payment transaction, may be made via electronic mail, telephone call using IVR 150 , and/or other method of communication.
- communication device 104 may include a telephone function and may be identified by a telephone number.
- recurring payment module 128 may use IVR 150 and HSM 160 , as previously described with regard to processing a payment transaction, in order to prompt for and retrieve the approval information for approval of the recurring payment transaction.
- recurring payment module 128 may provide a “hot transfer” function.
- the hot transfer function may allow the payor to interrupt and transfer the communication to the payee.
- recurring payment module 128 may allow the payor to interrupt the telephone call and transfer the call to the payee.
- adaptive server 120 allows the payor to choose to handle the recurring payment transaction with the payee.
- adaptive payment server 120 may interface recurring payment module 128 with adaptive webserver 122 , which may integrate with online entities (such as entities that make and/or receive payments related to the recurring payment transaction).
- online entities such as entities that make and/or receive payments related to the recurring payment transaction.
- the payor may enroll in the recurring payment transaction using webservices provided by system 100 , the payor's banking systems, the payee's banking systems, and/or other financial systems.
- system 100 may be configured to operate using a single communication device (not shown).
- the single communication device may include both a data function and a telephone function such as, for example, an Internet-capable telephone.
- the single communication device may transmit first identification information over the Internet using its Internet function and be called by IVR 150 to communicate second identification information using its telephone function.
- communication device 102 and communication device 104 may be the same device or may be different devices.
- communication devices 102 and 104 in examples described herein are respectively described as including Internet and telephone functions, according to various implementations of the invention, communication devices 102 and 104 may include other combinations of communication functions.
- SMS messaging functions may be used to communicate the first identification information and/or the second identification information.
- adaptive payment server 120 may initiate the second communication via SMS message to communication device 104 in order to prompt for and receive the second identification information.
- a payor may input the first identification information via a telephone (such as when making a purchase via telephone) and also be called on the same or different telephone to input the second identification information.
- the payor may use a payment card at a brick-and-mortar establishment (such as, for example, by sliding the payment card through an existing card reader), whereupon adaptive payment server 120 may initiate a communication for input of the second identification information (such as, for example, by calling the payor for PIN input).
- a brick-and-mortar establishment such as, for example, by sliding the payment card through an existing card reader
- adaptive payment server 120 may initiate a communication for input of the second identification information (such as, for example, by calling the payor for PIN input).
- adaptive webserver 122 may be a standalone webserver providing webservices for adaptive payment server 120 . Furthermore, according to various implementations of the invention, adaptive webserver 122 may receive the first identification information from a webservice (not shown) of an Etailer or other entity. In this manner, adaptive webserver 122 may provide an interface to various Etailers and others that receive first identification information from communication device 102 when processing, for example, a payment transaction. According to various implementations of the invention, adaptive webserver 122 may include servlets, proxy servers, and/or other functions that run locally at or are otherwise communicably coupled to a webservice of an Etailer or other entity in order to receive the first identification information.
- FIG. 2 is a data flow diagram illustrating an example flow of data in system 100 for processing a payment transaction according to various implementations of the invention.
- adaptive payment server 120 is shown being protected by one or more firewalls 202 .
- the data flow shown in FIG. 2 and other data flow diagrams described herein are non-limiting examples. As would be appreciated by those having skill in the art, other configurations and flows of data may be used.
- a payor may visit a website of an Etailer (not shown) and select an item to purchase using communication device 102 .
- the Etailer may present a checkout page, on which the payor inputs a payment card number.
- the payment card number may be communicated to adaptive payment server 120 .
- Adaptive payment server 120 may generate a transaction identifier and communicate to communication device 102 a confirmation page that includes the transaction identifier, which may be stored using database 140 .
- the confirmation page may indicate to the payor that a telephone call should be expected for PIN input.
- the adaptive payment server 120 may identify the payor's communication device 104 using the first identification information.
- the first identification information may include a telephone number of communication device 104 .
- adaptive payment server 120 may identify communication device 104 by matching the received payment card number to database 140 , which may include the payor's telephone number.
- Adaptive payment server 120 may use IVR 150 to initiate a call out (i.e., an automated interactive telephone call) to the payor's communication device 104 using the identified telephone number.
- IVR 150 may identify itself and/or the transaction by communicating a greeting, which may include the transaction identifier. IVR 150 may prompt for the payor's PIN number. Upon receipt of the PIN number from the payor using communication device 104 , IVR 150 may use HSM 160 to encrypt the PIN and may transiently store, using database 140 , the encrypted PIN until no longer needed (such as when the payment transaction is complete and/or sent for collection).
- adaptive payment server 120 may initiate authorization and/or settlement of the payment transaction.
- adaptive payment server 120 may communicate a sale receipt to the payor.
- the sale receipt may be communicated by electronic mail, for example.
- using discrete communication channels may protect the second identification information even if security of the first identification information is compromised.
- the payment card number is input over the Internet while the PIN is input using a telephone line, a hacker, spyware, malware, or other security risk compromising the payment card number does not have access to the PIN, thereby reducing security risks associated with online purchases using PIN-based authentication.
- FIG. 3 is a data flow diagram illustrating an example flow of data of fraud analysis module 126 according to various implementations of the invention.
- fraud analysis module 126 may receive information from one or more data sources and perform fraud analysis on the received information.
- the received information may include, for example, credit card information from various webservices (such as Etailer webservices and/or adaptive webserver 122 ), PIN information from IVR 150 and/or HSM 160 , reverse Domain Service Name (DNS) Lookup data, reverse Telephone Lookup data, and/or other information (such as authentication factors listed in Table 1).
- fraud analysis module 126 may perform reverse DNS lookup to physically determine a location of a customer's computer (such as, for example, communication device 102 ) on the Internet.
- fraud analysis module 126 may use reverse Telephone Lookup data, which may originate from a webservice (such as a third party webservice not shown), to determine a location of a telephone. For example, fraud analysis module 126 may determine fraudulent or otherwise suspicious activity for a payment transaction originating from Europe or China using a payment card that is issued in the U.S. Through fraud analysis module 126 , for example, system 100 may generate a fraud score that indicates a level of likelihood that the payment transaction is fraudulent or otherwise suspect.
- a webservice such as a third party webservice not shown
- the fraud score of a payment transaction may be parameter driven and may utilize rule based applications.
- the fraud score may be a numeric, text, and/or other value that indicates a range of likelihood that a payment transaction is fraudulent.
- the fraud score may range from 1 to 100, where 100 indicates a highly trusted payment transaction (i.e., low probability of fraud). This example is non-limiting and other configurations, ranges, and values are contemplated.
- the transaction when different elements of authentication correspond to one other, the transaction may be determined to be a non-fraudulent transaction (and therefore result in a relatively higher fraud score in the previous example range).
- fraud analysis module 126 may determine one or more bins. For example, a negative bin and a positive bin of the customer base may be determined such that non-fraudulent experiences with a card number may be binned to the positive bin. On the other hand, if a payment card is determined to be lost or stolen, based on other data present in a fraud database (such as a database not shown in database 140 ), the payment card and/or payment account associated with the payment card may be binned in the negative bin.
- a fraud database such as a database not shown in database 140
- other information such as, for example, periodic usage, dollar limits, and/or other transaction information may be used to enhance the security of the overall payment system.
- neural network such as analytics applied to the fraud database over time may be used to detect stolen or lost payment card numbers or otherwise proactively identify fraudulent or suspect payment transactions.
- fraud analysis module 126 may cause adaptive payment server 120 to attempt to validate other authentication data before allowing the transaction to go forward.
- adaptive payment server 120 may prompt for one or more additional authentication factors (such as, for example, authentication factors listed in Table 1 above) for further processing.
- fraud analysis module 126 may prepare authorization and/or settlement messages.
- FIG. 4 is a data flow diagram illustrating an example flow of data of adaptive payment server 120 initiating authorization and/or settlement of a payment transaction according to various implementation so the invention.
- the data flow illustrated by FIG. 4 shows examples of processing a payment transaction using various payment cards, such as, for example, a credit card with PIN authentication, a credit or debit card with smart chip and PIN authentication, and a debit card with PIN authentication.
- adaptive payment server 120 may initiate authorization and settlement with respective financial networks and/or entities according to the payment card being authenticated.
- a payment transaction authenticating the credit card with PIN authentication and/or the credit card or debit card with smart chip and PIN authentication may be authorized and settled with VISA, MASTERCARD, AMERICAN EXPRESS, other card services, and/or financial services entities.
- a payment transaction authenticating the debit card with PIN authentication may be authorized and settled with various debit networks such as, for example, NYCE, PULSE, STAR, INTERLINK, and others.
- adaptive payment server 120 may be communicably coupled to a variety of financial networks, financial institutions, and/or other entities that authorize and settle payment transactions using payment cards. In this manner, adaptive payment server 120 may provide processing of payment transactions using a robust array of payment cards and the respective financial institutions that issue, authorize, and settle payments originating from use of the payment cards.
- FIG. 5 is a flow diagram illustrating an example process 500 of processing a payment transaction according to various implementations of the invention.
- the various processing operations depicted in the flow diagram of FIG. 5 are described in greater detail herein.
- the described operations for a flow diagram may be accomplished using some or all of the system components described in detail above and, in some implementations, various operations may be performed in different sequences. In some implementations, additional operations may be performed along with some or all of the operations shown in the depicted flow diagrams. In yet other implementations, one or more operations may be performed simultaneously. Accordingly, the operations as illustrated (and described in greater detail below) are examples by nature and, as such, should not be viewed as limiting.
- first identification information may be received from a first communication device (such as, for example, communication device 102 ) on a first communication channel in relation to a payment transaction.
- the first communication channel may be on a data network such as, for example, the Internet, and/or any other network or combinations of networks capable of communicating the first identification information.
- the first identification information may include, among other things, a payment card number, and/or other identification information related to the payment transaction. For example, a payor may have visited a website of an Etailer and may have selected an item to purchase using the first communication device. The Etailer or other entity may present a checkout page, on which the payor inputs the first identification information, including, for instance, a payment card number.
- a second communication device (such as, for example, communication device 104 ) may be identified.
- the second communication device may include, for example a telephone function that is configured to send and/or receive a second communication on a second communication channel that is discrete from the first communication channel.
- the identification may be made because the first identification information may include a telephone number of the second communication device.
- the identification may be made by querying a database (such as database 140 ) using the received payment card number to identify the payor's telephone number.
- the second communication may be initiated to the second communication device on the second communication channel, which is discrete from the first communication channel.
- second identification information may be received based on the initiated second communication.
- the second identification information may include, for example, a predefined secret, which may include a PIN.
- the second identification information may be encrypted and/or transiently stored using a database (such as, for example, transient database 142 ).
- the second identification information may be a 4-digit PIN, whereupon an indication that 4 -digits have been entered, HSM 160 may encrypt the 4-digit PIN.
- Triple Data Encryption Algorithm (commonly, “Triple DES”) may be applied to encrypt the second identification information.
- Triple DES may be applied to encrypt the second identification information.
- Other encryption algorithms may be applied.
- the second identification information and/or the encrypted second identification information may be removed from transient database 142 in order to maintain security of the second identification information.
- authorization and/or settlement of the payment transaction may be initiated.
- FIG. 6 is a flow diagram illustrating an example process 506 of initiating a communication with communication device 104 when processing a payment transaction according to various implementations of the invention.
- an IVR such as, for instance, IVR 150
- a call out i.e., an automated interactive telephone call
- process 506 may prompt a call recipient (such as, for example, the payor) to input the second identification information.
- the call recipient may be prompted to enter a debit PIN.
- the call recipient may be informed of the nature of the call.
- the transaction identifier described above may be communicated to the call recipient.
- the transaction identifier may be included in a confirmation page communicated to communication device 102 .
- a user of communication device 102 receiving the call on communication device 104 may verify the trustworthiness of the call.
- FIG. 7 is a flow diagram illustrating an example process 700 of a recurring payment transaction according to various implementations of the invention.
- account information of a payor of the recurring payment transaction may be retrieved from a database (such as, for example, account database 144 ).
- the account information may include, among other things, a payment date, a payment amount, an identification of a communication device (such as, for example, communication device 104 ) used by the payor, an account identifier, the verification information described above, payee information (including, for example, name of the payee, telephone number of the payee, account receivables numbers, etc.), approval information, and/or other suitable information related to the account.
- the approval information may be predefined by the payor in order to approve recurring payments as described below.
- the approval information may include, for example, a predefined secret such as a PIN, and/or other information that may be input by the payor to approve a recurring payment.
- a predefined secret such as a PIN
- the approval information may be stored along with the account information unless the approval information is a PIN or other predefined secret that should not be stored in long-term storage for security reasons.
- a communication to the communication device may be initiated on or before the payment date.
- the communication device may include a telephone (voice) function and the communication may be a voice communication made by an automated IVR (such as, for instance, IVR 150 ).
- a greeting may be presented to the payor that identifies that a recurring payment is to be made.
- At least a portion of the account information may be communicated to the communication device, which may allow the payor to identify recurring payment transaction. For example, an account identifier, payment amount, and/or payment date may be communicated to the communication device.
- the verification information may be communicated to the communication device. According to various implementations of the invention, the verification information may include the verbal utterance described above. In this manner, the payor receiving the communication via communication device may verify the trustworthiness of the communication. According to various implementations of the invention, operation 706 may include prompting the payor for the approval information.
- approval information may be received.
- the payor may input the approval information in order to approve initiation of the recurring payment transaction.
- the approval information may be a PIN that is input by the payor.
- whether to initiate payment of the recurring payment transaction may be determined using the approval information.
- the determination may include PIN authentication.
- the received approval information may include information that is stored in a database (such as, for example, account database 144 ), whereupon the determination may include a comparison of the received approval information from the payor and the stored approval information from the database such that a match may cause initiation of payment of the recurring payment transaction.
- payment of the recurring payment transaction may be initiated based on the determination. For instance, in the preceding examples, the determination may include whether the PIN was authenticated or whether a match between the received approval information and the stored approval information was found. If, based on the determination, the recurring payment transaction is not approved the recurring payment transaction may not be initiated.
- a notification describing whether payment of the recurring payment transaction has been initiated may be communicated to the payor, the payee, and/or other interested party.
- the notification which may include a receipt of the payment transaction, may be made via electronic mail, telephone call, and/or other method of communication.
- FIG. 8 is a flow diagram illustrating an example process 800 of a determining whether a payment transaction is a signature debit or a PIN debit transaction according to various implementations of the invention.
- first identification information may be received.
- a debit PIN lookup may be performed in order to determine whether the first identification information is related to a payment card that is PIN-enabled.
- a signature debit transaction may be initiated.
- a PIN debit transaction may be initiated, according to various implementations of the invention described herein. In this manner, process 800 may determine whether to initiate a signature debit transaction or whether to initiate a debit PIN using, for example, systems and methods described herein.
- Implementations of the invention may be made in hardware, firmware, software, or any suitable combination thereof. Implementations of the invention may also be implemented as instructions stored on a machine-readable medium, which may be read and executed by one or more processors.
- a tangible machine-readable medium may include any mechanism for storing or transmitting information in a form readable by a machine (e.g., a computing device).
- a tangible machine-readable storage medium may include read only memory, random access memory, magnetic disk storage media, optical storage media, flash memory devices, and other tangible storage media.
- Intangible machine-readable transmission media may include intangible forms of propagated signals, such as carrier waves, infrared signals, digital signals, and other intangible transmission media.
- firmware, software, routines, or instructions may be described in the above disclosure in terms of specific exemplary implementations of the invention, and performing certain actions. However, it will be apparent that such descriptions are merely for convenience and that such actions in fact result from computing devices, processors, controllers, or other devices executing the firmware, software, routines, or instructions.
- Implementations of the invention may be described as including a particular feature, structure, or characteristic, but every aspect or implementation may not necessarily include the particular feature, structure, or characteristic. Further, when a particular feature, structure, or characteristic is described in connection with an aspect or implementation, it will be understood that such feature, structure, or characteristic may be included in connection with other implementations, whether or not explicitly described. Thus, various changes and modifications may be made to the provided description without departing from the scope or spirit of the invention. As such, the specification and drawings should be regarded as exemplary only, and the scope of the invention to be determined solely by the appended claims.
Landscapes
- Business, Economics & Management (AREA)
- Accounting & Taxation (AREA)
- Engineering & Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Strategic Management (AREA)
- General Business, Economics & Management (AREA)
- Theoretical Computer Science (AREA)
- Finance (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Development Economics (AREA)
- Economics (AREA)
- Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
Abstract
Description
- This application claims priority to U.S. Provisional Patent Application Ser. No. 61/091,895 entitled “Enable PIN Debit Transactions at Internet Based Online Merchants by Using a Combination of IVR and Hardware Security Module,” filed on Aug. 26, 2008 and U.S. Provisional Patent Application Ser. No. 61/186,564 entitled “Payment Authentication Services,” filed on Jun. 12, 2009 and is related to co-pending U.S. patent application Ser. No. ______ entitled “System and Method of Secure Payment Transactions,” filed concurrently herewith, all of which are hereby incorporated by reference herein in their entireties.
- The invention relates to processing recurring payment transactions using an Interactive Voice Response system combined with a Hardware Security Module to prompt for, retrieve, and encrypt a Personal Identification Number for secure payment transactions.
- Electronic payment systems generally include methods to reduce security risks for individuals and entities conducting automatic payments from a checking or savings account and/or other financial transactions including paying with payment cards over the Internet and in traditional brick-and-mortar establishments. However, retailers and recurring billers, according to various implementations of the invention, who maintain personal details, bank account information and other payment information, are vulnerable to hacking or other security breaches which cause the unlawful distribution of identify and financial information to the detriment of consumers, retailers and financial institutions causing financial harm to these entities and undermining trust in the payment system. Existing systems have employed various security measures such as signature verification for brick-and-mortar stores, PIN pads for the entry of debit cards PIN in brick-and-mortar stores and security codes printed on credit card for online transactions. However, these systems are not applicable for Internet purchases or recurring bill payments by payment card and fail to adequately secure payment transactions. Signature verification relies on the retailer or other recipient to verify the cardholder's signature while an identity thief having possession of the credit card may circumvent the security code measures.
- One effective approach to secure payment transactions is use of a predefined secret such as a Personal Identification Number (PIN). Such PIN-based authentication may require input of the PIN by the cardholder, typically via a PIN pad in brick-and-mortar location. An identity thief having possession of a card or card number authenticated using a PIN is thereby prevented from using the card without knowledge of the PIN.
- In the United States, PIN-based authentication systems are widely deployed for debit payment transactions. Abroad, such as in Europe, credit cards may include a smart chip that stores PIN information for use with PIN-based authentication through a point-of-sale terminal or PIN pad in retail locations.
- However, even though existing PIN-based authentication systems provides enhanced security as compared to signature or other existing authentication systems, PIN-based authentication systems have disadvantages. For instance, use of a PIN pad for input requires retailers, including brick-and-mortar retailers, to purchase such hardware. Furthermore, online electronic retailers (Etailers) may not take advantage of PIN-based authentication because of the security risk associated with malware or spyware on the consumer's personal computer that may capture the PIN and/or the risk of transmitting a PIN over the Internet. Moreover, purchases made over the phone may not be desirable because a cardholder may not wish disclose a PIN to an operator, for example.
- Furthermore, recurring payment transactions present security risks because bank account information and personal details entered online may be captured by spyware/malware and these details stored on biller computers may not be secured and could be compromised. For example, giving a biller account information so that the biller may charge or otherwise regularly process payments may be risky. Another problem is that a payor often forgets about their recurring bills or doesn't proactively confirm amounts to be billed and can experience overdraft charges from their bank or refused payments, or otherwise loses control of recurring payment transactions.
- Existing systems suffer from these and other problems.
- According to various implementations of the invention, various systems and methods may address these and other drawbacks of existing systems. According to various implementations of the invention, various systems and methods may facilitate secure payment transactions by receiving first identification information such as, for example, a payment card (e.g., credit card or debit card) number, for a payment transaction over the Internet, identifying a payor based on the first identification information, and calling the payor via an automated Interactive Voice Response (IVR) system to prompt for and receive second identification information such as, for example, a personal identification number (PIN) for the payment card. In other words, the first identification information may be entered by the payor in one communication channel and the second identification information may be prompted for and received on another communication channel. In this manner, even when the security of the first identification information is compromised, the payment transaction remains secure because the PIN, for example, is not communicated with the first identification information.
- According to various implementations of the invention, various systems and methods may facilitate recurring payment transactions by retrieving account information of a payor that includes, among other things, a payment date and contact information of the payor and by calling the payor using the IVR on or before the payment date to gather approval information (such as, for example, a secret password) from the payor. In this manner, the payor may be reminded of and approve the recurring payment transaction over the telephone, for example. Likewise, in the recurring bill payment example, a secret code or word may be preselected by the payor, and the IVR may speak this secret code or word. In this manner the payor may verify that the IVR call has been made by an authorized biller or otherwise trusted source.
- By leveraging a combination of novel processes and critical information, across an automated IVR system and Hardware Security Module (HSM) to prompt for, receive, and encrypt the second identification information,
system 100 may securely facilitate authentication of payment card transactions with PIN authentication without using a point-of-sale (POS) PIN pad and avoiding the security risks associated with transmitting the PIN online. Thus, Etailers, recurring billers and others may advantageously implement the system and method described herein using existing hardware (such as, for example, a user's computer and/or telephone) to authenticate payment card purchases without requiring use of POS PIN pads, payment card readers in personal computers, prompting for PIN entry in the computer, and other disadvantages of existing online and retail solutions. - Other objects and advantages of the invention will be apparent to those skilled in the art based on the following drawings and detailed description.
-
FIG. 1 is a block diagram illustrating an example of a system for processing payment transactions and recurring payments according to various implementations of the invention. -
FIG. 2 is a diagram illustrating an example flow of data in an example system for processing a payment transaction according to various implementations of the invention. -
FIG. 3 is a data flow diagram illustrating an example flow of data of a fraud analysis module according to various implementations of the invention. -
FIG. 4 is a data flow diagram illustrating an example flow of data of an adaptive payment server initiating authorization and/or settlement of a payment transaction according to various implementations of the invention. -
FIG. 5 is a flow diagram illustrating an example of a process of processing a payment transaction according to various implementations of the invention. -
FIG. 6 is a flow diagram illustrating an example of a process of initiating a communication with a communication device when processing a payment transaction according to various implementations of the invention. -
FIG. 7 is a flow diagram illustrating an example of a process of a recurring payment transaction according to various implementations of the invention. -
FIG. 8 is a flow diagram illustrating an example process of determining whether a payment transaction is a signature debit or a PIN debit transaction according to various implementations of the invention. - According to various implementations of the invention, various systems and methods may facilitate secure PIN-based payment transactions over the Internet by receiving payment card numbers from a payor over a first communication channel, such as, for example, over the Internet, and collecting PIN input from the payor via another communication channel by, for example, calling the payor for PIN input using an automated Interactive Voice Response (IVR) system. In this manner, even if the Internet communication channel, for example, is compromised, the PIN input may remain secure over another communication channel.
- According to various implementations of the invention, various systems and methods may facilitate recurring payment transactions by initiating a communication on a communication channel to the payor (such as, for example, by calling the payor) on or before a payment date and prompting for input of authorization information by the payor. In this manner, the payor may be reminded of and approve the recurring payment transaction using a the communication channel, such as, for example, a telephone communication channel.
-
FIG. 1 is a block diagram illustrating an example of asystem 100 for processing payment transactions and recurring payments according to various implementations of the invention.System 100 may include, for example, acommunication device 102, acommunication device 104, anetwork 110, anetwork 112, anadaptive payment server 120, adatabase 140, an IVR 150, and a hardware security module (HSM) 160. - According to various implementations of the invention,
adaptive payment server 120 may receive the first identification information communicated fromcommunication device 102 vianetwork 110 on a first communication channel. The first identification information may include, among other things, a credit card number, a debit card number, a name of the cardholder (such as a name of a payor), a telephone number of the cardholder, a mailing address of the cardholder, and/or other information related to the payment transaction. - According to various implementations of the invention, the first identification information may identify a payment account. The payment account may include an online payment account, a credit and/or debit account, and/or other payment account capable of being used for a payment transaction. The payment account may be associated with a payment card, which may include, among other things, a credit card, a debit card, an electronic payment card, and/or other device that may be used to facilitate a payment transaction. According to various implementations of the invention, the payment card may include a magnetic strip, a smart chip, and/or other tangible media configured to store the first identification information and/or other information.
- According to various implementations of the invention, the payment transaction may include, for instance, an online purchase, a finds transfer, and/or other transaction that transfers money and/or credit from a financial account. Using the first identification information,
adaptive payment server 120 may identifycommunication device 104. For example, in some implementations, the first identification information may include a telephone number ofcommunication device 104, thereby identifyingcommunication device 104. According to various implementations of the invention,adaptive payment server 120 may querydatabase 140 to identifycommunication device 104 based on the first identification information. -
Adaptive payment server 120 may use or otherwise interface with IVR 150 in order to initiate a communication withcommunication device 104.IVR 150 may initiate a communication tocommunication device 104 vianetwork 112 on a second communication channel discrete from the first communication channel. Once the communication is established,IVR 150 may prompt for and receive the second identification information fromcommunication device 104. Thus, by using discrete communication channels to receive the first identification information and the second identification information,system 100 may facilitate secure communication of the payment transaction. - According to various implementations of the invention, upon receipt of the second identification information,
IVR 150 may use or otherwise be interfaced withHSM 160 to encrypt the second identification information. Upon receipt of the first identification information and the second identification information,system 100 may initiate authentication and/or processing of the payment transaction. By receiving the first identification information and the second identification information on first and second communication channels that are discrete from one another,system 100 may facilitate secure payment transactions. - According to various implementations of the invention, examples of
communication device 102 may include any one or more of, for instance, a personal computer, portable computer, personal digital assistant (PDA), workstation, web-enabled mobile telephone, WAP device, web-to-voice device, or other device. In other words,communication device 102 may include a data (or Internet) function configured to communicate data vianetwork 110. In this manner, a payor or other entity may usecommunication device 102 to communicate the first identification information. The payor is a person or other entity that is a payment cardholder, a user using the system to make a payment transaction (and/or recurring payment transaction) to a payee, and/or other person or entitity using the system to process a payment transaction. Those having skill in the art will appreciate that the invention described herein may work with various system configurations. - For example, a user or other entity may use
communication device 102 to input the first identification information. According to various implementations of the invention,communication device 102 may store in a memory (not shown) the first identification information or otherwise facilitate retrieval of the first identification information, such as by storing web-enabled cookies that identify the payor. - According to various implementations of the invention,
communication device 102 may communicate a first communication on the first communication channel (not shown) vianetwork 110 in order to communicate the first identification information. The first communication channel may include a data channel on which data, such as the first identification information, is communicated to and fromcommunication device 102 vianetwork 110. “Discrete” communication channels are distinct from one another such that should the security of one channel be compromised, the other channel may remain secure. In other words, the channels may be considered to be independent from one another. For example, an Internet channel may be discrete from a telephone (i.e., voice) channel and a telephone channel may be discrete from a Short Message Service (SMS) channel. Furthermore, one telephone channel may be discrete from another telephone channel and one Internet channel may be discrete from another Internet channel. - According to various implementations of the invention, the first communication channel may include one or more Internet hypertext transfer protocol sessions (and/or other suitable data transfer protocol) that are discrete from the second communication channel. One skilled in the art would appreciate that other transfer protocols and/or other communication techniques may be used.
- In this manner, should the security of the first communication on the first communication channel be compromised by, for example, a computer or network hacker, malware, spyware, and/or other security risks, information transmitted using the second communication channel may remain secure. Thus, even when the first identification information communicated over the first communication channel is compromised, the second identification information not communicated on the first communication channel may remain secure.
- According to various implementations of the invention,
communication device 102 may be communicably coupled toadaptive payment server 120 vianetwork 110 such thatadaptive payment server 120 may receive the first identification information fromcommunication device 102 on the first communication channel.Network 110 may include any one or more of, for instance, the Internet, an intranet, a PAN (Personal Area Network), a LAN (Local Area Network), a WAN (Wide Area Network), a SAN (Storage Area Network), a MAN (Metropolitan Area Network), or other network. - According to various implementations of the invention, through various modules,
adaptive payment server 120 may receive the first identification information, initiate a communication to collect the second identification information, initiate authentication and/or processing of the payment transaction using the first identification information and the second identification information, initiate recurring payment transactions, and/or perform other functions to facilitate secure payment transactions. For example,adaptive payment server 120 may include, among other things, anadaptive webserver 122, atransaction identification module 124, afraud analysis module 126, a recurringpayment module 128, aprocessor 130 and/or other suitable modules.Processor 130 may be configured to perform one or more functions provided byadaptive payment server 120. - According to various implementations of the invention,
adaptive webserver 122 may receive the first identification information fromcommunication device 102 vianetwork 110. In this manner, the system may use existing online retail services (such as, for example, payment card number input forms) or otherwise provide online retail services in order to receive the first identification information. Upon receiving the first identification information,adaptive webserver 122 may cause communication of a confirmation page that indicates receipt of the first identification information tocommunication device 102. Furthermore, the confirmation page may include an indication that a second communication on the second communication channel tocommunication device 104 should be expected by a user ofcommunication device 102. For example, the confirmation page may indicate thatIVR 150 will be calling the payor for PIN entry. In this manner, the payor may be notified to expect a call that will prompt for PIN input, for example. - According to various implementations of the invention,
transaction identification module 124 may generate a transaction identifier for the payment transaction. The transaction identifier may be one or more words, characters, numbers, and/or other identifier that may identify the payment transaction. Furthermore, the transaction identifier may be written, typed, and/or spoken. In this manner, the transaction identifier may be used to identify the payment transaction to the payor and/or other entity. - For example, according to an implementation of the invention, upon receiving the first identification information,
payment server 120 may communicate the transaction identifier tocommunication device 102, thereby allowing the payor or other entity usingcommunication device 102 to identify the payment transaction in future communications. According to various implementations of the invention, the confirmation page described above may include the transaction identifier. - According to various implementations of the invention, the transaction identifier may be stored using
database 140 for later retrieval byadaptive server 120 and/orIVR 150. - According to various implementations of the invention,
database 140 may include, among other things, atemporary database 142 for temporarily storing transient data (i.e., data that is not stored long-term and/or data that is deleted after being used), and/or anaccount database 144, which may include information related to a payment account, such as, for example, credit card numbers, debit card numbers, payee contact information, payment dates, payor information, an identity ofcommunication device 104 used by the payor, and/or other information. - According to various implementations of the invention, examples of
database 140,temporary database 142, andaccount database 144 include, for instance, a relational database, a filesystem, and/or other device or data representation configured for data storage. - According to various implementations of the invention,
adaptive payment server 120 may identifycommunication device 104 based on the received first identification information. For example, the first identification information may include a telephone number input by the payor. According to various implementations of the invention,adaptive payment server 120 may identifycommunication device 104 by performing a lookup ofdatabase 140. - According to various implementations of the invention,
adaptive payment server 120 may receive a payment card number andquery database 140 to determine a telephone number of the payor who owns a payment card account identified by the received payment card number. The lookup may be a structured query language (SQL) query, lightweight directory access protocol (LDAP) query, and/or any other known methods ofquerying database 140. In this manner, by storing an identifier (such as the telephone number in the preceding example) that identifiescommunication device 104 and the first communication information (such as the payment card number in the preceding example),system 100 may be configured to initiate a communication tocommunication device 104 using the first identification information. - According to various implementations of the invention,
adaptive payment server 120 may initiate a second communication tocommunication device 104 on the second communication channel in order to prompt for and receive the second identification information. For example,adaptive payment server 120 may initiate a telephone call tocommunication device 104. Thus,communication device 104 may include a telephone (voice) function capable of receiving and/or sending telephone calls.Communication device 104 may include, for example, a PDA, smartphone, cellular telephone, cordless telephone, landline telephone, voice over IP (VOIP) telephone, any other device that includes a telephone function, and/or other device capable of receiving the second communication. - According to various implementations of the invention,
adaptive payment server 120 may initiate the telephone call viaIVR 150.IVR 150 may include existing IVRs configured to initiate a telephone call a communication device that includes a telephone function (such as, for example, communication device 104), communicate information to a call recipient, interactively prompt the call recipient for input, receive the input (by touch-tone input, voice input, and/or other input mechanism), process the input, and/or perform other interactive voice functions. - According to various implementations of the invention,
IVR 150 may initiate the second communication tocommunication device 104 on the second communication channel vianetwork 112.Network 112 may be a Public Switch Telephone Network (PSTN), VOIP network, and/or other network or combination of networks that is configured for telephonic (voice) communication. - According to various implementations of the invention, upon establishing the second communication,
IVR 150 may greet the call recipient with a greeting that identifies the nature of the telephone call. The greeting may allow the call recipient to verify the trustworthiness of the call. According to various implementations of the invention, the greeting may include, for example, an identification ofIVR 150, the transaction identifier, and/or other verification information to the call recipient. The verification information may include, among other things, any combination of one or more of predefined words, letters, characters, numbers, verbal utterance by the payor, and/or other predefined verification information that allows the call recipient to verify the trustworthiness of the call. - According to various implementations of the invention,
IVR 150 may prompt for and receive the second identification information fromcommunication device 104 via the second communication channel. The second identification information may include, among other things, a predefined secret. The predefined secret may include, for example, a password, PIN, and/or other secret. - For example, the call recipient may have made an online purchase using
communication device 102 by entering first identification information (e.g., a payment card number) into an Etailer's website. As previously noted,adaptive webserver 122 may communicate the transaction identifier with the confirmation page. By communicating the transaction identifier tocommunication device 104, the payment transaction and/or trustworthiness of the call may be identified by the call recipient. - According to various implementations of the invention, substantially immediately after receiving all or a portion of the second identification information,
IVR 150 may encrypt the second identificationinformation using HSM 160. For example, the second identification information may be a 4-digit PIN, whereupon an indication that 4-digits have been entered,HSM 160 may encrypt the 4-digit PIN. According to various implementations of the invention,IVR 150 may transiently store the received second identification information and/or the encrypted second identification information intransient database 142. According to various implementations of the invention, the second identification information and/or the encrypted second identification information is removed fromtransient database 142 when no longer needed in order to maintain security of the second identification information. - According to various implementations of the invention,
HSM 160 may apply Triple Data Encryption Algorithm (commonly, “Triple DES”) to encrypt the second identification information. As would be appreciated by those having skill in the art, other encryption algorithms may be utilized. - According to various implementations of the invention,
IVR 150 may record the second communication. The recorded second communication may be stored for archival in a database such as, for example,database 140. - According to various implementations of the invention, upon receipt of the first identification information and the second identification information,
adaptive payment server 120 may initiate authentication and/or payment of the payment transaction. The initiation may include, among other things, authorizing and/or settling the payment transaction with various financial networks, sending the first and the second identification information to a remote server for further payment processing, and/or taking other actions to initiate authentication and/or payment of the payment transaction. - By leveraging a combination of
IVR 150 andHSM 160 to prompt for, receive, and encrypt the second identification information,system 100 may facilitate authentication of payment card transactions with PIN input, for example, without using a POS PIN pad while avoiding the security risks associated with transmitting PINs online. Thus, Etailers and others may advantageously implementsystem 100 using existing hardware (such as, for example, a user's computer and/or telephone) without using POS PIN pads for implementing online PIN-based payment transactions. - According to various implementations of the invention, processing the payment transaction may include multi-factor authentication originating from different data sources. For example, using a payment card number and a PIN for payment authentication may represent a two-factor authentication scheme. The data source for payment card number may be the payment card itself while the data source of the PIN may be the cardholder (e.g., the payor/call recipient in the preceding examples).
- Table 1 is a list of example authentication factors, their respective data sources, and their respective capture mechanisms (where user intervention is not required to capture the factor listed in the Factor column when the corresponding Capture Mechanism column value is “Automatic”).
-
TABLE 1 Capture Factor Data Source Mechanism Payment Card Number Payment Card Manual Mailing Address Cardholder Manual IP Address Computing Device Automatic Phone Number Phone Automatic Payment Card PIN Cardholder Manual GPS Location Phone Automatic Voice recording Cardholder Manual Transaction Identifier System Automatic - The values listed in Table 1 are non-limiting examples according to various implementations of the invention. Other factors, data sources, capture mechanisms and combinations of the foregoing are contemplated.
- According to various implementations of the invention,
adaptive payment server 120 may use one or more authentication factors, or any combination thereof, to authenticate the payment transaction or otherwise confirm an identity of a user's identity. Authentication factors may be authenticated by comparing observed (e.g., input) information to expected (e.g., predefined) information. “Observed” information indicates that the information related to a factor was manually entered or automatically captured during processing of the payment transaction. “Expected” information indicates that the information related to a factor has been predefined or can be determined for comparison to observed information such that a non-match may indicate a fraudulent or otherwise suspect payment transaction. According to various implementations of the invention, both the first identification information and the second identification information may each include one or more of these and/or other authentication factors. - According to various implementations of the invention,
adaptive payment server 120 may use the authentication factors in addition to processing a payment transaction using discrete communication channels, thereby providing enhanced security when processing a payment transaction. - According to various implementations of the invention, the authentication factors may include a payment card number. The authenticity of the payment card number may be verified. For example, a payor may enter the payment card number using an Etailer's website when making a purchase.
Adaptive payment server 120 may verify the authenticity of the payment card number. - According to various implementations of the invention, the authentication factors may include a mailing address of the cardholder. The authenticity of the mailing address may be verified. Thus, a person without knowledge of the mailing address may be prevented from making a payment transaction.
- According to various implementations of the invention, the authentication factors may include an Internet Protocol (IP) address of a computing device such as, for example,
communication device 102. By capturing the IP address of the computing device that is used to attempt a payment transaction,adaptive payment server 120 may compare the observed IP address that was captured to an expected IP address of a cardholder. The IP address comparison may be a literal comparison, a geographic comparison, and/or other suitable IP address comparison. For example, the literal comparison may directly compare observed and expected IP addresses. The geographic comparison may identify geographic regions identified by an IP address. In this manner, the payment transaction may be suspect if originating from a computing device in Europe when the cardholder resides in the U.S. - According to various implementations of the invention, the authentication factors may include a telephone number. For example, the telephone number may identify
communication device 104. According to various implementations of the invention, the telephone number may be input in a website of an Etailer when attempting an online purchase. The telephone number may be used to provide further authentication by performing a telephone number comparison. The telephone number comparison may be a literal comparison, a geographic comparison, and/or other suitable telephone number comparison. For example, the literal comparison may directly compare observed and expected telephone numbers. The geographic comparison may identify geographic regions identified by the telephone number (such as, for example, by country code, area code, and/or Global System for Mobile communications (GSM) information from the telephone). In this manner, the payment transaction may be suspect if an observed telephone number originates from Europe when the cardholder resides in the U.S. - According to various implementations of the invention, the authentication factors may include a payment card PIN (or other predefined secret information). As previously noted, PIN-based authentication may provide robust security. Thus, the PIN may be a reliable method of user identification and/or payment authentication.
- According to various implementations of the invention, the authentication factors may include GPS location information. For example,
adaptive payment server 120 may use GPS location information fromcommunication device 102 and/or fromcommunication device 104. The GPS location information may be used to compare observed GPS location information to expected GPS location information. In this manner, a payment transaction originating from a geographic region outside an expected geographic region may be deemed fraudulent or otherwise suspect. - According to various implementations of the invention, the authentication factors may include voice authentication. Voice authentication may include verification of an input voice utterance with a recording of a voice utterance by the cardholder. The recording may be stored in a database (such as, for example, database 140).
Adaptive payment server 120 may receive an input utterance by a user attempting a payment transaction. According to various implementations of the invention,IVR 150 may prompt a call recipient, for example, for the input voice utterance. In this manner, known methods of sound comparison may be used to further authenticate the payment transaction or otherwise identify the cardholder. - According to various implementations of the invention, the authentication factors may include a transaction identifier. As previously noted, the transaction identifier may be generated upon receipt of a request for a payment transaction (such as, for example, when a user attempts to make an online purchase using communication device 102). The transaction identifier may be used by
adaptive server 120 in order to provide to a user an ability to identify a particular payment transaction. For example,adaptive payment server 120 may communicate the transaction identifier tocommunication device 102. By doing so,adaptive payment server 120 may then communicate the transaction identifier to the user viacommunication device 104, thereby allowing a user ofcommunication device 102 andcommunication device 104 to verify the trustworthiness of the communication tocommunication device 104. - According to various implementations of the invention,
adaptive payment server 120 may facilitate secure payment transaction processing with two or more authentication factors from two or more independent data sources, thereby further enhancing security as compared to less than two factors of identification and/or authentication. Any combination of factors may be used. Whichever particular combination is used,adaptive payment server 120 may observe information related to each factor and compare the observed information to expected information. - According to various implementations of the invention, for example,
adaptive payment server 120 may receive a first authentication factor (such as, for example, a payment card number) for a payment transaction over the Internet, receive second authentication factor (such as, for example, a telephone number), identify a payor based on the first authentication factor with supplemental identification from the telephone number, and call the payor viaIVR 150 using the telephone number.Adaptive payment server 120 may communicate a third authentication factor (such as, for example, a transaction identifier that is communicated tocommunication device 102 during the payment or checkout process). If the transaction identifier is accepted by the payor,IVR 150 may prompt for and receive a fourth authentication factor (such as, for example, a PIN for the payment card). - The second authentication factor may be used to aid in the confirmation of a person's identity and/or used to confirm a location (by country code, area code or GSM in the phone) which may be used to detect fraud and protect consumers. The third authentication factor may be a transaction identifier such as, for example, an order number, reference number and/or other transaction identifier that may be viewed via
communication device 102 by the payor. The transaction identifier may be spoken byIVR 150 to the payor (or otherwise be communicated to communication device 104) so that the payor can confirm that the call is not a random or suspect call, but rather is from a trusted source. - In other words, according to various implementations of the invention, the first authentication factor may be entered by the payor in one communication channel and the second authentication factor may be expressed through the same communication channel to tie the transaction to the call by
IVR 150 and the payor. The second authentication factor, while communicated over the same communication channel, may be used to identify the payor and initiate the second channel, such as, for example, a telephone call. WhenIVR 150 calls the payor,IVR 150 may speak (or otherwise communicate) the third information so the payor can tie the phone call to the Internet transaction. Thereafter, the payor may input the fourth identification information (such as, for example, the PIN) usingcommunication device 104. According to this implementation, multiple authentication factors may be used to secure the payment transaction: the payment card number, computer/IP address details, the phone number and confirmation of validity by a telephone call, and the payment card PIN—deployed across two communication channels and input devices such as a personal computer connected to the Internet and a mobile phone across a direct dialed telephone line. In this manner, even when the security of the first identification information is compromised, the payment transaction remains secure because the second identification information (such as, for example, the PIN) is not communicated with the first identification information. - According to various implementations of the invention, a five-factor authentication using card number, mailing address, IP address, telephone number, and card PIN may be used. In this implementation, observed values of each of the input card number, mailing address, IP address, telephone number, and card PIN are compared to their respective expected values in order to authenticate the payment transaction. Thus, for example, in some implementations, an identity thief who uses a computing device that does have an IP address that matches the expected IP address associated with an authentic payment transaction may be prevented from executing the payment transaction (such as an online purchase that the identity thief is attempting to procure). In this manner, by using multi-factor authentication,
adaptive payment server 120 may provide additional security when processing a payment transaction as compared to existing payment systems. - According to various implementations of the invention,
adaptive payment server 120 may perform fraud analysis of the payment transaction. For example,fraud analysis module 126 may receive fraud analysis information to perform fraud analysis. The fraud analysis information may include, among other things, the authentication factors (which may include, for instance, the first identification information and the second identification information) and/or other information to perform fraud analysis. The fraud analysis may include scoring the transaction to determine a likelihood of fraudulent activity based on the fraud analysis information. In other words,fraud analysis module 126, discussed in further detail inFIG. 3 , may generate a fraud score that identifies the likelihood of fraudulent activity. - According to various implementations of the invention,
adaptive payment server 120 may facilitate a secure recurring payment transaction. For example, the payor may have set up one or more recurring payments to be made using one or more payment methods, such as, for example, payment by payment card. Through various modules,adaptive payment server 120 may retrieve account information for a payor, identifycommunication device 104 of the payor, initiate a communication tocommunication device 104 in order to prompt for and receive approval information, and determine whether to initiate the recurring payment. In this manner,adaptive payment server 120 may remind the payor of an upcoming recurring payment transaction to be made as well as provide a secure approval process for the recurring payment transaction by the payor. - For example, recurring
payment module 128 may retrieve account information of the payor fromaccount database 144. The account information may include, among other things, a payment date, a payment amount, an identification ofcommunication device 104 used by the payor, an account identifier, the verification information, payee information (including, for example, name of the payee, telephone number of the payee, account receivables numbers, etc.), approval information, and/or other suitable information related to the account. The approval information may be predefined by the payor in order to approve recurring payments as described below. The approval information may include, for example, a predefined secret such as a PIN, and/or other information that may be input by the payor to approve a recurring payment. Generally, the approval information may be stored along with the account information unless the approval information is a PIN or other predefined secret that should not be stored in long-term storage for security reasons. - According to various implementations of the invention, recurring
payment module 128 may identifycommunication device 104 using the account information. On or before the payment date, recurringpayment module 128 may initiate a communication tocommunication device 104. - According to various implementations of the invention, once the communication is established, the greeting described above with regard to
IVR 150 may be presented to the payor throughcommunication device 104. In this example, the greeting may communicate that a recurring payment is to be made. At least a portion of the account information may be communicated tocommunication device 104, which may allow the payor to identify the recurring payment transaction. For example, an account identifier, payment amount, and/or payment date may be communicated tocommunication device 104. Furthermore, according to various implementations of the invention, the verification information described above may be communicated tocommunication device 104. According to various implementations of the invention, the verification information may include the verbal utterance described above. In this manner, the payor receiving the communication viacommunication device 104 may verify the trustworthiness of the communication. - According to various implementations of the invention, recurring
payment module 128 may receive the approval information. Using the received approval information, recurringpayment module 128 may determine whether to initiate payment of the recurring payment transaction. For example, the approval information may include a PIN that is input by the payor such that the determination may include PIN authentication. According to various implementations of the invention, the received approval information may include information that is stored inaccount database 144, whereupon the determination may include a comparison of the received approval information and the stored approval information such that a match may cause initiation of payment of the recurring payment transaction. - According to various implementations of the invention, once the determination is made, recurring
payment module 128 may initiate payment of the recurring payment transaction based on the determination. As previously noted in the preceding examples, the determination may include whether the PIN was authenticated or whether a match between the received approval information and the stored approval information was found. If, based on the determination, the recurring payment transaction is not approved the recurring payment transaction may not be initiated. According to various implementations of the invention, recurringpayment module 128 may notify the payor, the payee, and/or other interested party whether payment of the recurring payment transaction has been initiated. The notification, which may include a receipt of the payment transaction, may be made via electronic mail, telephonecall using IVR 150, and/or other method of communication. - According to various implementations of the invention,
communication device 104 may include a telephone function and may be identified by a telephone number. Further, recurringpayment module 128 may useIVR 150 andHSM 160, as previously described with regard to processing a payment transaction, in order to prompt for and retrieve the approval information for approval of the recurring payment transaction. - According to various implementations of the invention, recurring
payment module 128 may provide a “hot transfer” function. The hot transfer function may allow the payor to interrupt and transfer the communication to the payee. For example, upon establishing the telephone call with the payor for the recurring payment transaction, recurringpayment module 128 may allow the payor to interrupt the telephone call and transfer the call to the payee. Thus,adaptive server 120 allows the payor to choose to handle the recurring payment transaction with the payee. - According to various implementations of the invention,
adaptive payment server 120 may interface recurringpayment module 128 withadaptive webserver 122, which may integrate with online entities (such as entities that make and/or receive payments related to the recurring payment transaction). In this manner, for example, the payor may enroll in the recurring payment transaction using webservices provided bysystem 100, the payor's banking systems, the payee's banking systems, and/or other financial systems. - Although illustrated using two
communication devices system 100 including different numbers of communication devices may be used. For example, according to various implementations of the invention,system 100 may be configured to operate using a single communication device (not shown). According to various implementations of the invention, the single communication device may include both a data function and a telephone function such as, for example, an Internet-capable telephone. In this example, the single communication device may transmit first identification information over the Internet using its Internet function and be called byIVR 150 to communicate second identification information using its telephone function. In other words, according to various implementations of the invention,communication device 102 andcommunication device 104 may be the same device or may be different devices. - Although
communication devices communication devices adaptive payment server 120 may initiate the second communication via SMS message tocommunication device 104 in order to prompt for and receive the second identification information. According to various implementations of the invention, a payor may input the first identification information via a telephone (such as when making a purchase via telephone) and also be called on the same or different telephone to input the second identification information. According to various implementations of the invention, the payor may use a payment card at a brick-and-mortar establishment (such as, for example, by sliding the payment card through an existing card reader), whereuponadaptive payment server 120 may initiate a communication for input of the second identification information (such as, for example, by calling the payor for PIN input). - Although illustrated as part of
adaptive payment server 120,adaptive webserver 122 may be a standalone webserver providing webservices foradaptive payment server 120. Furthermore, according to various implementations of the invention,adaptive webserver 122 may receive the first identification information from a webservice (not shown) of an Etailer or other entity. In this manner,adaptive webserver 122 may provide an interface to various Etailers and others that receive first identification information fromcommunication device 102 when processing, for example, a payment transaction. According to various implementations of the invention,adaptive webserver 122 may include servlets, proxy servers, and/or other functions that run locally at or are otherwise communicably coupled to a webservice of an Etailer or other entity in order to receive the first identification information. -
FIG. 2 is a data flow diagram illustrating an example flow of data insystem 100 for processing a payment transaction according to various implementations of the invention. In this example flow,adaptive payment server 120 is shown being protected by one ormore firewalls 202. The data flow shown inFIG. 2 and other data flow diagrams described herein are non-limiting examples. As would be appreciated by those having skill in the art, other configurations and flows of data may be used. - According to various implementations of the invention, in an example operation, a payor may visit a website of an Etailer (not shown) and select an item to purchase using
communication device 102. The Etailer may present a checkout page, on which the payor inputs a payment card number. The payment card number may be communicated toadaptive payment server 120.Adaptive payment server 120 may generate a transaction identifier and communicate to communication device 102 a confirmation page that includes the transaction identifier, which may be stored usingdatabase 140. The confirmation page may indicate to the payor that a telephone call should be expected for PIN input. - According to various implementations of the invention, the
adaptive payment server 120 may identify the payor'scommunication device 104 using the first identification information. For example, the first identification information may include a telephone number ofcommunication device 104. According to various implementations of the invention,adaptive payment server 120 may identifycommunication device 104 by matching the received payment card number todatabase 140, which may include the payor's telephone number.Adaptive payment server 120 may useIVR 150 to initiate a call out (i.e., an automated interactive telephone call) to the payor'scommunication device 104 using the identified telephone number. - According to various implementations of the invention,
IVR 150 may identify itself and/or the transaction by communicating a greeting, which may include the transaction identifier.IVR 150 may prompt for the payor's PIN number. Upon receipt of the PIN number from the payor usingcommunication device 104,IVR 150 may useHSM 160 to encrypt the PIN and may transiently store, usingdatabase 140, the encrypted PIN until no longer needed (such as when the payment transaction is complete and/or sent for collection). - According to various implementations of the invention,
adaptive payment server 120 may initiate authorization and/or settlement of the payment transaction. In some implementations,adaptive payment server 120 may communicate a sale receipt to the payor. The sale receipt may be communicated by electronic mail, for example. - As previously noted, using discrete communication channels may protect the second identification information even if security of the first identification information is compromised. In this example operation, because the payment card number is input over the Internet while the PIN is input using a telephone line, a hacker, spyware, malware, or other security risk compromising the payment card number does not have access to the PIN, thereby reducing security risks associated with online purchases using PIN-based authentication.
-
FIG. 3 is a data flow diagram illustrating an example flow of data offraud analysis module 126 according to various implementations of the invention. - According to various implementations of the invention illustrated in
FIG. 3 ,fraud analysis module 126 may receive information from one or more data sources and perform fraud analysis on the received information. The received information may include, for example, credit card information from various webservices (such as Etailer webservices and/or adaptive webserver 122), PIN information fromIVR 150 and/orHSM 160, reverse Domain Service Name (DNS) Lookup data, reverse Telephone Lookup data, and/or other information (such as authentication factors listed in Table 1). For example,fraud analysis module 126 may perform reverse DNS lookup to physically determine a location of a customer's computer (such as, for example, communication device 102) on the Internet. Similarly,fraud analysis module 126 may use reverse Telephone Lookup data, which may originate from a webservice (such as a third party webservice not shown), to determine a location of a telephone. For example,fraud analysis module 126 may determine fraudulent or otherwise suspicious activity for a payment transaction originating from Europe or China using a payment card that is issued in the U.S. Throughfraud analysis module 126, for example,system 100 may generate a fraud score that indicates a level of likelihood that the payment transaction is fraudulent or otherwise suspect. - According to various implementations of the invention, the fraud score of a payment transaction may be parameter driven and may utilize rule based applications. The fraud score may be a numeric, text, and/or other value that indicates a range of likelihood that a payment transaction is fraudulent. According to various implementations of the invention, the fraud score may range from 1 to 100, where 100 indicates a highly trusted payment transaction (i.e., low probability of fraud). This example is non-limiting and other configurations, ranges, and values are contemplated.
- According to various implementations of the invention, when different elements of authentication correspond to one other, the transaction may be determined to be a non-fraudulent transaction (and therefore result in a relatively higher fraud score in the previous example range).
- According to various implementations of the invention,
fraud analysis module 126 may determine one or more bins. For example, a negative bin and a positive bin of the customer base may be determined such that non-fraudulent experiences with a card number may be binned to the positive bin. On the other hand, if a payment card is determined to be lost or stolen, based on other data present in a fraud database (such as a database not shown in database 140), the payment card and/or payment account associated with the payment card may be binned in the negative bin. - According to various implementations of the invention, other information such as, for example, periodic usage, dollar limits, and/or other transaction information may be used to enhance the security of the overall payment system. For example, neural network such as analytics applied to the fraud database over time may be used to detect stolen or lost payment card numbers or otherwise proactively identify fraudulent or suspect payment transactions.
- According to various implementations of the invention, when a threshold fraud score is triggered,
fraud analysis module 126 may causeadaptive payment server 120 to attempt to validate other authentication data before allowing the transaction to go forward. For example,adaptive payment server 120 may prompt for one or more additional authentication factors (such as, for example, authentication factors listed in Table 1 above) for further processing. - According to various implementations of the invention,
fraud analysis module 126 may prepare authorization and/or settlement messages. -
FIG. 4 is a data flow diagram illustrating an example flow of data ofadaptive payment server 120 initiating authorization and/or settlement of a payment transaction according to various implementation so the invention. The data flow illustrated byFIG. 4 shows examples of processing a payment transaction using various payment cards, such as, for example, a credit card with PIN authentication, a credit or debit card with smart chip and PIN authentication, and a debit card with PIN authentication. - According to various implementations of the invention,
adaptive payment server 120 may initiate authorization and settlement with respective financial networks and/or entities according to the payment card being authenticated. For instance, a payment transaction authenticating the credit card with PIN authentication and/or the credit card or debit card with smart chip and PIN authentication may be authorized and settled with VISA, MASTERCARD, AMERICAN EXPRESS, other card services, and/or financial services entities. A payment transaction authenticating the debit card with PIN authentication may be authorized and settled with various debit networks such as, for example, NYCE, PULSE, STAR, INTERLINK, and others. - Thus,
adaptive payment server 120 may be communicably coupled to a variety of financial networks, financial institutions, and/or other entities that authorize and settle payment transactions using payment cards. In this manner,adaptive payment server 120 may provide processing of payment transactions using a robust array of payment cards and the respective financial institutions that issue, authorize, and settle payments originating from use of the payment cards. -
FIG. 5 is a flow diagram illustrating anexample process 500 of processing a payment transaction according to various implementations of the invention. The various processing operations depicted in the flow diagram ofFIG. 5 (and in the other drawing figures) are described in greater detail herein. The described operations for a flow diagram may be accomplished using some or all of the system components described in detail above and, in some implementations, various operations may be performed in different sequences. In some implementations, additional operations may be performed along with some or all of the operations shown in the depicted flow diagrams. In yet other implementations, one or more operations may be performed simultaneously. Accordingly, the operations as illustrated (and described in greater detail below) are examples by nature and, as such, should not be viewed as limiting. - According to various implementations of the invention, in an
operation 502, first identification information may be received from a first communication device (such as, for example, communication device 102) on a first communication channel in relation to a payment transaction. The first communication channel may be on a data network such as, for example, the Internet, and/or any other network or combinations of networks capable of communicating the first identification information. The first identification information may include, among other things, a payment card number, and/or other identification information related to the payment transaction. For example, a payor may have visited a website of an Etailer and may have selected an item to purchase using the first communication device. The Etailer or other entity may present a checkout page, on which the payor inputs the first identification information, including, for instance, a payment card number. - In an
operation 504, a second communication device (such as, for example, communication device 104) may be identified. The second communication device may include, for example a telephone function that is configured to send and/or receive a second communication on a second communication channel that is discrete from the first communication channel. The identification may be made because the first identification information may include a telephone number of the second communication device. According to various implementations of the invention, the identification may be made by querying a database (such as database 140) using the received payment card number to identify the payor's telephone number. - In an
operation 506, the second communication may be initiated to the second communication device on the second communication channel, which is discrete from the first communication channel. - In an
operation 508, second identification information may be received based on the initiated second communication. The second identification information may include, for example, a predefined secret, which may include a PIN. According to various implementations of the invention, substantially immediately after receipt of all, or a portion, of the second identification information, the second identification information may be encrypted and/or transiently stored using a database (such as, for example, transient database 142). For example, the second identification information may be a 4-digit PIN, whereupon an indication that 4-digits have been entered,HSM 160 may encrypt the 4-digit PIN. According to various implementations of the invention, Triple Data Encryption Algorithm (commonly, “Triple DES”) may be applied to encrypt the second identification information. Other encryption algorithms may be applied. According to various implementations of the invention, the second identification information and/or the encrypted second identification information may be removed fromtransient database 142 in order to maintain security of the second identification information. - In an
operation 510, based on the received first and the received second identification information, authorization and/or settlement of the payment transaction may be initiated. -
FIG. 6 is a flow diagram illustrating anexample process 506 of initiating a communication withcommunication device 104 when processing a payment transaction according to various implementations of the invention. For example, an IVR (such as, for instance, IVR 150) may be used to initiate a call out (i.e., an automated interactive telephone call) to the second communication device using the identified telephone number. When the second communication (such as, for example, the automated interactive telephone call) has been established,process 506 may prompt a call recipient (such as, for example, the payor) to input the second identification information. For example, the call recipient may be prompted to enter a debit PIN. - According to various implementations of the invention, the call recipient may be informed of the nature of the call. For example, the transaction identifier described above may be communicated to the call recipient. As previously noted, the transaction identifier may be included in a confirmation page communicated to
communication device 102. As such, a user ofcommunication device 102 receiving the call oncommunication device 104 may verify the trustworthiness of the call. -
FIG. 7 is a flow diagram illustrating anexample process 700 of a recurring payment transaction according to various implementations of the invention. - In an
operation 702, account information of a payor of the recurring payment transaction may be retrieved from a database (such as, for example, account database 144). The account information may include, among other things, a payment date, a payment amount, an identification of a communication device (such as, for example, communication device 104) used by the payor, an account identifier, the verification information described above, payee information (including, for example, name of the payee, telephone number of the payee, account receivables numbers, etc.), approval information, and/or other suitable information related to the account. The approval information may be predefined by the payor in order to approve recurring payments as described below. The approval information may include, for example, a predefined secret such as a PIN, and/or other information that may be input by the payor to approve a recurring payment. Generally, the approval information may be stored along with the account information unless the approval information is a PIN or other predefined secret that should not be stored in long-term storage for security reasons. - In an
operation 704, a communication to the communication device may be initiated on or before the payment date. For example, the communication device may include a telephone (voice) function and the communication may be a voice communication made by an automated IVR (such as, for instance, IVR 150). - According to various implementations of the invention, once the communication is established, a greeting may be presented to the payor that identifies that a recurring payment is to be made.
- In an
operation 706, at least a portion of the account information may be communicated to the communication device, which may allow the payor to identify recurring payment transaction. For example, an account identifier, payment amount, and/or payment date may be communicated to the communication device. Furthermore, according to various implementations of the invention, the verification information may be communicated to the communication device. According to various implementations of the invention, the verification information may include the verbal utterance described above. In this manner, the payor receiving the communication via communication device may verify the trustworthiness of the communication. According to various implementations of the invention,operation 706 may include prompting the payor for the approval information. - In an
operation 708 approval information may be received. For example, the payor may input the approval information in order to approve initiation of the recurring payment transaction. According to one implementation of the invention, the approval information may be a PIN that is input by the payor. - In an
operation 710, whether to initiate payment of the recurring payment transaction may be determined using the approval information. For example, the determination may include PIN authentication. According to various implementations of the invention, the received approval information may include information that is stored in a database (such as, for example, account database 144), whereupon the determination may include a comparison of the received approval information from the payor and the stored approval information from the database such that a match may cause initiation of payment of the recurring payment transaction. - In an
operation 712, payment of the recurring payment transaction may be initiated based on the determination. For instance, in the preceding examples, the determination may include whether the PIN was authenticated or whether a match between the received approval information and the stored approval information was found. If, based on the determination, the recurring payment transaction is not approved the recurring payment transaction may not be initiated. According to various implementations of the invention, a notification describing whether payment of the recurring payment transaction has been initiated may be communicated to the payor, the payee, and/or other interested party. According to various implementations of the invention, the notification, which may include a receipt of the payment transaction, may be made via electronic mail, telephone call, and/or other method of communication. -
FIG. 8 is a flow diagram illustrating anexample process 800 of a determining whether a payment transaction is a signature debit or a PIN debit transaction according to various implementations of the invention. - In an
operation 802, first identification information may be received. In anoperation 804, a debit PIN lookup may be performed in order to determine whether the first identification information is related to a payment card that is PIN-enabled. In anoperation 806, if the payment card is not PIN-enabled, then in anoperation 808, a signature debit transaction may be initiated. On the other hand, if inoperation 806 the payment card is PIN-enabled, then in an operation 810, a PIN debit transaction may be initiated, according to various implementations of the invention described herein. In this manner,process 800 may determine whether to initiate a signature debit transaction or whether to initiate a debit PIN using, for example, systems and methods described herein. - Implementations of the invention may be made in hardware, firmware, software, or any suitable combination thereof. Implementations of the invention may also be implemented as instructions stored on a machine-readable medium, which may be read and executed by one or more processors. A tangible machine-readable medium may include any mechanism for storing or transmitting information in a form readable by a machine (e.g., a computing device). For example, a tangible machine-readable storage medium may include read only memory, random access memory, magnetic disk storage media, optical storage media, flash memory devices, and other tangible storage media. Intangible machine-readable transmission media may include intangible forms of propagated signals, such as carrier waves, infrared signals, digital signals, and other intangible transmission media. Further, firmware, software, routines, or instructions may be described in the above disclosure in terms of specific exemplary implementations of the invention, and performing certain actions. However, it will be apparent that such descriptions are merely for convenience and that such actions in fact result from computing devices, processors, controllers, or other devices executing the firmware, software, routines, or instructions.
- Implementations of the invention may be described as including a particular feature, structure, or characteristic, but every aspect or implementation may not necessarily include the particular feature, structure, or characteristic. Further, when a particular feature, structure, or characteristic is described in connection with an aspect or implementation, it will be understood that such feature, structure, or characteristic may be included in connection with other implementations, whether or not explicitly described. Thus, various changes and modifications may be made to the provided description without departing from the scope or spirit of the invention. As such, the specification and drawings should be regarded as exemplary only, and the scope of the invention to be determined solely by the appended claims.
Claims (20)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US12/547,783 US20100057616A1 (en) | 2008-08-26 | 2009-08-26 | System and Method of Recurring Payment Transactions |
Applications Claiming Priority (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US9189508P | 2008-08-26 | 2008-08-26 | |
US18656409P | 2009-06-12 | 2009-06-12 | |
US12/547,783 US20100057616A1 (en) | 2008-08-26 | 2009-08-26 | System and Method of Recurring Payment Transactions |
Publications (1)
Publication Number | Publication Date |
---|---|
US20100057616A1 true US20100057616A1 (en) | 2010-03-04 |
Family
ID=41726756
Family Applications (3)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US12/547,771 Active 2031-12-20 US9183549B2 (en) | 2008-08-26 | 2009-08-26 | System and method of secure payment transactions |
US12/547,783 Abandoned US20100057616A1 (en) | 2008-08-26 | 2009-08-26 | System and Method of Recurring Payment Transactions |
US14/929,674 Abandoned US20160171493A1 (en) | 2008-08-26 | 2015-11-02 | System and Method of Secure Payment Transactions |
Family Applications Before (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US12/547,771 Active 2031-12-20 US9183549B2 (en) | 2008-08-26 | 2009-08-26 | System and method of secure payment transactions |
Family Applications After (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US14/929,674 Abandoned US20160171493A1 (en) | 2008-08-26 | 2015-11-02 | System and Method of Secure Payment Transactions |
Country Status (8)
Country | Link |
---|---|
US (3) | US9183549B2 (en) |
EP (1) | EP2332102A4 (en) |
KR (1) | KR20110084400A (en) |
CN (1) | CN102197407A (en) |
BR (1) | BRPI0917347A2 (en) |
CA (1) | CA2734975C (en) |
MX (1) | MX2011002067A (en) |
WO (1) | WO2010027845A2 (en) |
Cited By (25)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20120171990A1 (en) * | 2011-01-04 | 2012-07-05 | Boku, Inc. | Systems and Methods to Restrict Payment Transactions |
EP2631862A1 (en) * | 2012-02-24 | 2013-08-28 | Star Finanz-Software Entwicklung und Vertriebs GmbH | Methods and devices for carrying out a transaction |
US8527368B1 (en) * | 2012-07-06 | 2013-09-03 | Fragmob, Llc | Purchase card data persistence using mobile card reader in direct sales system |
WO2014008922A1 (en) * | 2012-07-09 | 2014-01-16 | Izettle Merchant Services Ab | Method for hub and spokes pin verification for credit cards with card information stored in a magnetic stripe |
WO2014008920A1 (en) * | 2012-07-09 | 2014-01-16 | Izettle Merchant Services Ab | Method for hub and spokes pan entry and payment verification |
US8757478B2 (en) | 2012-07-09 | 2014-06-24 | Izettle Merchant Services Ab | Method for hub and spokes pan entry and payment verification |
CN103999106A (en) * | 2011-06-14 | 2014-08-20 | 自适应付款股份有限公司 | System and method of multi-factor balance inquiry and electronic funds transfer |
GB2511279A (en) * | 2012-11-05 | 2014-09-03 | Arnold Albert Wilson | Automated multi-factor identity and transaction authentication by telephone |
EP2593914A4 (en) * | 2010-07-12 | 2015-04-01 | Mastercard International Inc | Methods and systems for authenticating an identity of a payer in a financial transaction |
US20160012544A1 (en) * | 2014-05-28 | 2016-01-14 | Sridevi Ramaswamy | Insurance claim validation and anomaly detection based on modus operandi analysis |
US20160063054A1 (en) * | 2014-08-26 | 2016-03-03 | Scott Thompson | Method and system for crowd sourced contact database management |
EP2897094A4 (en) * | 2012-09-14 | 2016-05-04 | Thinkat Co Ltd | Method for phone authentication in e-business transactions and computer-readable recording medium having program for phone authentication in e-business transactions recorded thereon |
GB2532190A (en) * | 2014-10-24 | 2016-05-18 | Ibm | Methods of transaction authorization using a vocalized challenge |
US20160300224A1 (en) * | 2014-01-07 | 2016-10-13 | Tencent Technology (Shenzhen) Company Limited | Method, Server, And Storage Medium For Verifying Transactions Using A Smart Card |
WO2017114670A1 (en) * | 2015-12-30 | 2017-07-06 | Gemalto Sa | Method, server and system for authorizing a transac |
CN107743632A (en) * | 2015-05-21 | 2018-02-27 | 万事达卡国际股份有限公司 | For the method and system for integrating marketing with being handled for the publisher of the transaction based on block chain |
CN107833132A (en) * | 2017-11-06 | 2018-03-23 | 中国银行股份有限公司 | A kind of control method of financial transaction, device and server |
CN107851245A (en) * | 2015-05-21 | 2018-03-27 | 万事达卡国际股份有限公司 | For the method and system by the asset association based on block chain to legal tender account |
EP3340148A1 (en) * | 2016-12-22 | 2018-06-27 | Mastercard International Incorporated | Automated process for validating an automated billing update (abu) cycle to prevent fraud |
US20190080329A1 (en) * | 2015-04-29 | 2019-03-14 | Capital One Services, Llc | System and methods for temporary transaction processing |
WO2017165759A3 (en) * | 2016-03-25 | 2019-04-18 | Vurify Group Llc | Real time verification of transfers of funds |
US10419609B1 (en) * | 2014-11-14 | 2019-09-17 | United Services Automobile Association (“USAA”) | System and method for providing an interactive voice response system with a secondary information channel |
US20200118132A1 (en) * | 2018-10-12 | 2020-04-16 | Capital One Services, Llc | Systems and methods for continuation of recurring charges, while maintaining fraud prevention |
US11127075B1 (en) * | 2018-09-28 | 2021-09-21 | United Services Automobile Association (Usaa) | Financial autopilot |
US12141861B1 (en) | 2023-12-21 | 2024-11-12 | United Services Automobile Association (Usaa) | Financial autopilot |
Families Citing this family (76)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US9412123B2 (en) | 2003-07-01 | 2016-08-09 | The 41St Parameter, Inc. | Keystroke analysis |
US10999298B2 (en) | 2004-03-02 | 2021-05-04 | The 41St Parameter, Inc. | Method and system for identifying users and detecting fraud by use of the internet |
US11301585B2 (en) | 2005-12-16 | 2022-04-12 | The 41St Parameter, Inc. | Methods and apparatus for securely displaying digital images |
US8938671B2 (en) | 2005-12-16 | 2015-01-20 | The 41St Parameter, Inc. | Methods and apparatus for securely displaying digital images |
US8151327B2 (en) | 2006-03-31 | 2012-04-03 | The 41St Parameter, Inc. | Systems and methods for detection of session tampering and fraud prevention |
US8768778B2 (en) | 2007-06-29 | 2014-07-01 | Boku, Inc. | Effecting an electronic payment |
GB0809383D0 (en) | 2008-05-23 | 2008-07-02 | Vidicom Ltd | Customer to supplier funds transfer |
US9183549B2 (en) | 2008-08-26 | 2015-11-10 | Mts Holdings, Inc. | System and method of secure payment transactions |
US9652761B2 (en) * | 2009-01-23 | 2017-05-16 | Boku, Inc. | Systems and methods to facilitate electronic payments |
US8548426B2 (en) | 2009-02-20 | 2013-10-01 | Boku, Inc. | Systems and methods to approve electronic payments |
US9990623B2 (en) * | 2009-03-02 | 2018-06-05 | Boku, Inc. | Systems and methods to provide information |
US8700530B2 (en) * | 2009-03-10 | 2014-04-15 | Boku, Inc. | Systems and methods to process user initiated transactions |
US9112850B1 (en) | 2009-03-25 | 2015-08-18 | The 41St Parameter, Inc. | Systems and methods of sharing information through a tag-based consortium |
US8224727B2 (en) | 2009-05-27 | 2012-07-17 | Boku, Inc. | Systems and methods to process transactions based on social networking |
US20100299220A1 (en) * | 2009-05-19 | 2010-11-25 | Boku, Inc. | Systems and Methods to Confirm Transactions via Mobile Devices |
US9595028B2 (en) * | 2009-06-08 | 2017-03-14 | Boku, Inc. | Systems and methods to add funds to an account via a mobile communication device |
US9697510B2 (en) * | 2009-07-23 | 2017-07-04 | Boku, Inc. | Systems and methods to facilitate retail transactions |
US9519892B2 (en) * | 2009-08-04 | 2016-12-13 | Boku, Inc. | Systems and methods to accelerate transactions |
US8660911B2 (en) | 2009-09-23 | 2014-02-25 | Boku, Inc. | Systems and methods to facilitate online transactions |
US20110078077A1 (en) * | 2009-09-29 | 2011-03-31 | Boku, Inc. | Systems and Methods to Facilitate Online Transactions |
US8224709B2 (en) | 2009-10-01 | 2012-07-17 | Boku, Inc. | Systems and methods for pre-defined purchases on a mobile communication device |
US8412626B2 (en) | 2009-12-10 | 2013-04-02 | Boku, Inc. | Systems and methods to secure transactions via mobile devices |
US20110143710A1 (en) * | 2009-12-16 | 2011-06-16 | Boku, Inc. | Systems and methods to facilitate electronic payments |
US8566188B2 (en) | 2010-01-13 | 2013-10-22 | Boku, Inc. | Systems and methods to route messages to facilitate online transactions |
US20110185406A1 (en) * | 2010-01-26 | 2011-07-28 | Boku, Inc. | Systems and Methods to Authenticate Users |
US20110217994A1 (en) * | 2010-03-03 | 2011-09-08 | Boku, Inc. | Systems and Methods to Automate Transactions via Mobile Devices |
US8219542B2 (en) | 2010-03-25 | 2012-07-10 | Boku, Inc. | Systems and methods to provide access control via mobile phones |
US10460316B2 (en) | 2010-04-05 | 2019-10-29 | Paypal, Inc. | Two device authentication |
CA2704864A1 (en) | 2010-06-07 | 2010-08-16 | S. Bhinder Mundip | Method and system for controlling access to a monetary valued account |
US8699994B2 (en) | 2010-12-16 | 2014-04-15 | Boku, Inc. | Systems and methods to selectively authenticate via mobile communications |
US8412155B2 (en) | 2010-12-20 | 2013-04-02 | Boku, Inc. | Systems and methods to accelerate transactions based on predictions |
US8583496B2 (en) | 2010-12-29 | 2013-11-12 | Boku, Inc. | Systems and methods to process payments via account identifiers and phone numbers |
US20120221437A1 (en) * | 2011-02-24 | 2012-08-30 | Boku, Inc. | Systems and Methods to Automate Social Networking Activities |
WO2012148842A1 (en) | 2011-04-26 | 2012-11-01 | Boku, Inc. | Systems and methods to facilitate repeated purchases |
US9191217B2 (en) | 2011-04-28 | 2015-11-17 | Boku, Inc. | Systems and methods to process donations |
US9830622B1 (en) | 2011-04-28 | 2017-11-28 | Boku, Inc. | Systems and methods to process donations |
US20130036023A1 (en) * | 2011-08-04 | 2013-02-07 | 3C Interactive LLC | System And Method For Facilitating A Transaction Between An Enterprise And A Person Using A Mobile Device |
US8886558B2 (en) * | 2011-09-11 | 2014-11-11 | Dani Alyamour | Method and system for implementing mobile transaction solution based on early media dynamic content generation |
US10754913B2 (en) | 2011-11-15 | 2020-08-25 | Tapad, Inc. | System and method for analyzing user device information |
JP6356074B2 (en) | 2012-02-15 | 2018-07-11 | カーディナルコマース コーポレーション | Authentication platform for PIN debit issuers |
US9633201B1 (en) | 2012-03-01 | 2017-04-25 | The 41St Parameter, Inc. | Methods and systems for fraud containment |
US9521551B2 (en) | 2012-03-22 | 2016-12-13 | The 41St Parameter, Inc. | Methods and systems for persistent cross-application mobile device identification |
US20150073987A1 (en) | 2012-04-17 | 2015-03-12 | Zighra Inc. | Fraud detection system, method, and device |
US9619852B2 (en) | 2012-04-17 | 2017-04-11 | Zighra Inc. | Context-dependent authentication system, method and device |
US8973102B2 (en) * | 2012-06-14 | 2015-03-03 | Ebay Inc. | Systems and methods for authenticating a user and device |
CN102737452B (en) * | 2012-06-28 | 2015-05-13 | 福建联迪商用设备有限公司 | Terminal mobile machine monitoring method and system |
US20140025571A1 (en) * | 2012-07-23 | 2014-01-23 | Its, Inc. | System and method for dual message consumer authentication value-based eft transactions |
US20140032407A1 (en) * | 2012-07-24 | 2014-01-30 | Shashi Kapur | System and Method for Funds Transfer Processing |
US20140032391A1 (en) * | 2012-07-24 | 2014-01-30 | Shashi Kapur | System and Method for Real-Time Loan Processing and Loan Fund Deposits |
US11507950B2 (en) * | 2012-07-31 | 2022-11-22 | Worldpay, Llc | Systems and methods for secure normative intermediation of payments processing peripherals |
WO2014022813A1 (en) | 2012-08-02 | 2014-02-06 | The 41St Parameter, Inc. | Systems and methods for accessing records via derivative locators |
WO2014078569A1 (en) | 2012-11-14 | 2014-05-22 | The 41St Parameter, Inc. | Systems and methods of global identification |
US10043181B2 (en) * | 2013-01-15 | 2018-08-07 | Mastercard International Incorporated | Systems and methods for processing off-network transaction messages |
US20140279523A1 (en) * | 2013-03-15 | 2014-09-18 | Joe M. Lynam | System and Method for Authenticating Payment Transactions |
US9940608B2 (en) | 2013-05-16 | 2018-04-10 | Mts Holdings, Inc. | Real time EFT network-based person-to-person transactions |
CA2854150C (en) | 2013-06-10 | 2024-02-06 | The Toronto Dominion Bank | High fraud risk transaction authorization |
US10902327B1 (en) | 2013-08-30 | 2021-01-26 | The 41St Parameter, Inc. | System and method for device identification and uniqueness |
US9788203B2 (en) | 2014-08-19 | 2017-10-10 | Zighra Inc. | System and method for implicit authentication |
US10187799B2 (en) | 2014-08-19 | 2019-01-22 | Zighra Inc. | System and method for implicit authentication |
US10091312B1 (en) | 2014-10-14 | 2018-10-02 | The 41St Parameter, Inc. | Data structures for intelligently resolving deterministic and probabilistic device identifiers to device profiles and/or groups |
US20160162900A1 (en) | 2014-12-09 | 2016-06-09 | Zighra Inc. | Fraud detection system, method, and device |
US11132694B2 (en) | 2014-12-31 | 2021-09-28 | Paypal, Inc. | Authentication of mobile device for secure transaction |
US10554676B2 (en) | 2015-03-03 | 2020-02-04 | Zighra Inc. | System and method for behavioural biometric authentication using program modelling |
AU2016244847A1 (en) | 2015-04-07 | 2017-11-23 | Omnyway, Inc. | Methods and systems for using a mobile device to effect a secure electronic transaction |
US10210520B2 (en) * | 2015-07-10 | 2019-02-19 | Mastercard International Incorporated | Co-processing electronic signals for redundancy |
US11017375B2 (en) * | 2015-07-30 | 2021-05-25 | Mastercard International Incorporated | Systems and methods for using an internet of things device presence to authenticate a cardholder for a financial transaction |
US10607224B2 (en) | 2016-04-04 | 2020-03-31 | Mastercard International Incorporated | Systems and methods for secure authentication of transactions initiated at a client device |
EP3588417A1 (en) * | 2018-06-28 | 2020-01-01 | Vocalink Limited | Data processing apparatus and methods |
US11051164B2 (en) * | 2018-11-01 | 2021-06-29 | Paypal, Inc. | Systems, methods, and computer program products for providing user authentication for a voice-based communication session |
US11250159B2 (en) | 2018-11-29 | 2022-02-15 | International Business Machines Corporation | Secure data monitoring utilizing secure private set intersection |
US11494769B2 (en) | 2019-01-10 | 2022-11-08 | Mastercard International Incorporated | System, methods and computer program products for identity authentication for electronic payment transactions |
US11250414B2 (en) | 2019-08-02 | 2022-02-15 | Omnyway, Inc. | Cloud based system for engaging shoppers at or near physical stores |
US11468432B2 (en) | 2019-08-09 | 2022-10-11 | Omnyway, Inc. | Virtual-to-physical secure remote payment to a physical location |
US20210271766A1 (en) * | 2020-03-02 | 2021-09-02 | International Business Machines Corporation | Transaction information management |
CN111652609A (en) * | 2020-05-31 | 2020-09-11 | 四川亨通网智科技有限公司 | Multi-person bill settlement system |
US11960625B2 (en) * | 2021-05-06 | 2024-04-16 | Jpmorgan Chase Bank, N.A. | Systems and methods for protecting sensitive data in user online activities |
Citations (30)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5357563A (en) * | 1992-01-10 | 1994-10-18 | Microbilt Corporation | Data card terminal for receiving authorizations from remote locations |
US5920847A (en) * | 1993-11-01 | 1999-07-06 | Visa International Service Association | Electronic bill pay system |
US20020032649A1 (en) * | 2000-04-13 | 2002-03-14 | Balamurugan Selvarajan | High-security E-currency IDs for E-commerce transactions |
US20020069165A1 (en) * | 2000-12-06 | 2002-06-06 | O'neil Joseph Thomas | Efficient and secure bill payment via mobile IP terminals |
US20020073024A1 (en) * | 2000-12-07 | 2002-06-13 | Gilchrist Alexander Sandy Donald | System and methods of using wireless communication devices to conduct financial transactions |
US20020169966A1 (en) * | 2001-05-14 | 2002-11-14 | Kai Nyman | Authentication in data communication |
US20030046094A1 (en) * | 2001-08-29 | 2003-03-06 | Manmeet Singh | Method using telecommunications device to make payments via an automatic electronic funds transfer network |
US20040054632A1 (en) * | 2000-10-25 | 2004-03-18 | Cedric Remy | Secure telematics payment method |
US6751299B1 (en) * | 1999-06-01 | 2004-06-15 | America Online, Incorporated | Voice messaging system |
US20040254868A1 (en) * | 2003-06-12 | 2004-12-16 | International Business Machines Corporation | System and method for early detection and prevention of identity theft |
US20050015345A1 (en) * | 2003-07-14 | 2005-01-20 | Yao Chong Yu | One kind of fund flow authentication security trade system |
US20050256806A1 (en) * | 2004-05-12 | 2005-11-17 | Alan Tien | Method and system to facilitate securely processing a payment for an online transaction |
US7089214B2 (en) * | 1998-04-27 | 2006-08-08 | Esignx Corporation | Method for utilizing a portable electronic authorization device to approve transactions between a user and an electronic transaction system |
US20060271496A1 (en) * | 2005-01-28 | 2006-11-30 | Chandra Balasubramanian | System and method for conversion between Internet and non-Internet based transactions |
US20070107017A1 (en) * | 2005-11-04 | 2007-05-10 | Angel Albert J | Transaction Process Controller with User History, Selectable Profile Controls, Confirmation and User Control Options for Shopping with Video On Demand Cable Systems |
US20070107044A1 (en) * | 2005-10-11 | 2007-05-10 | Philip Yuen | System and method for authorization of transactions |
US20070220275A1 (en) * | 2006-02-14 | 2007-09-20 | Snapvine, Inc. | WEB AUTHORIZATION BY AUTOMATED INTERACTIVE PHONE OR VoIP SESSION |
US20070226495A1 (en) * | 2006-03-22 | 2007-09-27 | Kim Sung H | Settlement method using a mobile terminal and system thereof |
US20070265064A1 (en) * | 2002-05-30 | 2007-11-15 | Kessman Marc D | Products and processes for operations management of casino leisure and hospitality industry |
US7349884B1 (en) * | 2001-03-29 | 2008-03-25 | Gsc Enterprises, Inc. | Method and apparatus for electronic commerce services at a point of sale |
US20080086770A1 (en) * | 2006-10-06 | 2008-04-10 | Rajandra Luxman Kulkarni | Single-Party, Secure Multi-Channel Authentication for Access to a Resource |
US20080120214A1 (en) * | 2006-11-16 | 2008-05-22 | Kim Steele | Adaptive authentication options |
US20080130842A1 (en) * | 2006-11-30 | 2008-06-05 | Verizon Data Services, Inc. | Method and system for voice monitoring |
US20080133390A1 (en) * | 2006-12-05 | 2008-06-05 | Ebay Inc. | System and method for authorizing a transaction |
US20080317220A1 (en) * | 2007-06-25 | 2008-12-25 | Perkins George S | System and method for encrypting interactive voice response application information |
US20090178120A1 (en) * | 2008-01-08 | 2009-07-09 | First Data Corporation | Electronic verification service systems and methods |
US20090300745A1 (en) * | 2006-11-16 | 2009-12-03 | Steve Dispensa | Enhanced multi factor authentication |
US20100057623A1 (en) * | 2008-08-26 | 2010-03-04 | Adaptive Payments, Inc. | System and Method of Secure Payment Transactions |
US20100250955A1 (en) * | 2008-10-22 | 2010-09-30 | Paul Trevithick | Brokered information sharing system |
US20120223133A1 (en) * | 1998-04-17 | 2012-09-06 | Diebold Self-Service Systems Division Of Diebold, Incorporated | Banking System Controlled Responsive to Data Bearing Records and User Input of a Phone Received Security Code |
Family Cites Families (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2002269350A (en) * | 2001-03-14 | 2002-09-20 | Hitachi Ltd | Transaction settlement method, transaction settlement system and portable communication terminal used therefor and settlement terminal for member store |
MXPA04006680A (en) * | 2002-01-08 | 2005-03-31 | Riverborne Communications Llc | Point-of-sale activation and subsequent registration of products. |
US7784684B2 (en) * | 2002-08-08 | 2010-08-31 | Fujitsu Limited | Wireless computer wallet for physical point of sale (POS) transactions |
TW200409521A (en) | 2002-11-28 | 2004-06-01 | Lohmac Pte Ltd | Authentication and identification system and transactions using such an authentication and identification system |
EP1615183A1 (en) | 2004-07-07 | 2006-01-11 | Streamboys B.V. | Internet payment verification method and system |
US8041646B2 (en) * | 2005-06-15 | 2011-10-18 | E. E. System Corporation | Method and system for real time online debit transactions |
US8181232B2 (en) * | 2005-07-29 | 2012-05-15 | Citicorp Development Center, Inc. | Methods and systems for secure user authentication |
CA2542988A1 (en) * | 2006-04-12 | 2007-10-12 | Mount Lehman Credit Union | Method and system for real time financial transaction alert |
EP2034432A1 (en) * | 2007-09-05 | 2009-03-11 | Deutsche Post AG | Method and Device for performing Transactions |
WO2010140876A1 (en) | 2009-06-01 | 2010-12-09 | Bemobile Sdn. Bhd. | Method, system and secure server for multi-factor transaction authentication |
-
2009
- 2009-08-26 US US12/547,771 patent/US9183549B2/en active Active
- 2009-08-26 US US12/547,783 patent/US20100057616A1/en not_active Abandoned
- 2009-08-26 WO PCT/US2009/055015 patent/WO2010027845A2/en active Application Filing
- 2009-08-26 KR KR1020117006919A patent/KR20110084400A/en not_active Application Discontinuation
- 2009-08-26 EP EP09812043A patent/EP2332102A4/en not_active Ceased
- 2009-08-26 MX MX2011002067A patent/MX2011002067A/en active IP Right Grant
- 2009-08-26 CA CA2734975A patent/CA2734975C/en active Active
- 2009-08-26 CN CN2009801421293A patent/CN102197407A/en active Pending
- 2009-08-26 BR BRPI0917347A patent/BRPI0917347A2/en not_active Application Discontinuation
-
2015
- 2015-11-02 US US14/929,674 patent/US20160171493A1/en not_active Abandoned
Patent Citations (30)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5357563A (en) * | 1992-01-10 | 1994-10-18 | Microbilt Corporation | Data card terminal for receiving authorizations from remote locations |
US5920847A (en) * | 1993-11-01 | 1999-07-06 | Visa International Service Association | Electronic bill pay system |
US20120223133A1 (en) * | 1998-04-17 | 2012-09-06 | Diebold Self-Service Systems Division Of Diebold, Incorporated | Banking System Controlled Responsive to Data Bearing Records and User Input of a Phone Received Security Code |
US7089214B2 (en) * | 1998-04-27 | 2006-08-08 | Esignx Corporation | Method for utilizing a portable electronic authorization device to approve transactions between a user and an electronic transaction system |
US6751299B1 (en) * | 1999-06-01 | 2004-06-15 | America Online, Incorporated | Voice messaging system |
US20020032649A1 (en) * | 2000-04-13 | 2002-03-14 | Balamurugan Selvarajan | High-security E-currency IDs for E-commerce transactions |
US20040054632A1 (en) * | 2000-10-25 | 2004-03-18 | Cedric Remy | Secure telematics payment method |
US20020069165A1 (en) * | 2000-12-06 | 2002-06-06 | O'neil Joseph Thomas | Efficient and secure bill payment via mobile IP terminals |
US20020073024A1 (en) * | 2000-12-07 | 2002-06-13 | Gilchrist Alexander Sandy Donald | System and methods of using wireless communication devices to conduct financial transactions |
US7349884B1 (en) * | 2001-03-29 | 2008-03-25 | Gsc Enterprises, Inc. | Method and apparatus for electronic commerce services at a point of sale |
US20020169966A1 (en) * | 2001-05-14 | 2002-11-14 | Kai Nyman | Authentication in data communication |
US20030046094A1 (en) * | 2001-08-29 | 2003-03-06 | Manmeet Singh | Method using telecommunications device to make payments via an automatic electronic funds transfer network |
US20070265064A1 (en) * | 2002-05-30 | 2007-11-15 | Kessman Marc D | Products and processes for operations management of casino leisure and hospitality industry |
US20040254868A1 (en) * | 2003-06-12 | 2004-12-16 | International Business Machines Corporation | System and method for early detection and prevention of identity theft |
US20050015345A1 (en) * | 2003-07-14 | 2005-01-20 | Yao Chong Yu | One kind of fund flow authentication security trade system |
US20050256806A1 (en) * | 2004-05-12 | 2005-11-17 | Alan Tien | Method and system to facilitate securely processing a payment for an online transaction |
US20060271496A1 (en) * | 2005-01-28 | 2006-11-30 | Chandra Balasubramanian | System and method for conversion between Internet and non-Internet based transactions |
US20070107044A1 (en) * | 2005-10-11 | 2007-05-10 | Philip Yuen | System and method for authorization of transactions |
US20070107017A1 (en) * | 2005-11-04 | 2007-05-10 | Angel Albert J | Transaction Process Controller with User History, Selectable Profile Controls, Confirmation and User Control Options for Shopping with Video On Demand Cable Systems |
US20070220275A1 (en) * | 2006-02-14 | 2007-09-20 | Snapvine, Inc. | WEB AUTHORIZATION BY AUTOMATED INTERACTIVE PHONE OR VoIP SESSION |
US20070226495A1 (en) * | 2006-03-22 | 2007-09-27 | Kim Sung H | Settlement method using a mobile terminal and system thereof |
US20080086770A1 (en) * | 2006-10-06 | 2008-04-10 | Rajandra Luxman Kulkarni | Single-Party, Secure Multi-Channel Authentication for Access to a Resource |
US20080120214A1 (en) * | 2006-11-16 | 2008-05-22 | Kim Steele | Adaptive authentication options |
US20090300745A1 (en) * | 2006-11-16 | 2009-12-03 | Steve Dispensa | Enhanced multi factor authentication |
US20080130842A1 (en) * | 2006-11-30 | 2008-06-05 | Verizon Data Services, Inc. | Method and system for voice monitoring |
US20080133390A1 (en) * | 2006-12-05 | 2008-06-05 | Ebay Inc. | System and method for authorizing a transaction |
US20080317220A1 (en) * | 2007-06-25 | 2008-12-25 | Perkins George S | System and method for encrypting interactive voice response application information |
US20090178120A1 (en) * | 2008-01-08 | 2009-07-09 | First Data Corporation | Electronic verification service systems and methods |
US20100057623A1 (en) * | 2008-08-26 | 2010-03-04 | Adaptive Payments, Inc. | System and Method of Secure Payment Transactions |
US20100250955A1 (en) * | 2008-10-22 | 2010-09-30 | Paul Trevithick | Brokered information sharing system |
Cited By (41)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP2593914A4 (en) * | 2010-07-12 | 2015-04-01 | Mastercard International Inc | Methods and systems for authenticating an identity of a payer in a financial transaction |
US20120171990A1 (en) * | 2011-01-04 | 2012-07-05 | Boku, Inc. | Systems and Methods to Restrict Payment Transactions |
US20140087690A1 (en) * | 2011-01-04 | 2014-03-27 | Boku, Inc. | Systems and methods to restrict payment transactions |
US8700524B2 (en) * | 2011-01-04 | 2014-04-15 | Boku, Inc. | Systems and methods to restrict payment transactions |
CN103999106A (en) * | 2011-06-14 | 2014-08-20 | 自适应付款股份有限公司 | System and method of multi-factor balance inquiry and electronic funds transfer |
EP2721569A4 (en) * | 2011-06-14 | 2016-07-20 | Adaptive Payments Inc | System and method of multi-factor balance inquiry and electronic funds transfer |
EP2631862A1 (en) * | 2012-02-24 | 2013-08-28 | Star Finanz-Software Entwicklung und Vertriebs GmbH | Methods and devices for carrying out a transaction |
US8527368B1 (en) * | 2012-07-06 | 2013-09-03 | Fragmob, Llc | Purchase card data persistence using mobile card reader in direct sales system |
WO2014008922A1 (en) * | 2012-07-09 | 2014-01-16 | Izettle Merchant Services Ab | Method for hub and spokes pin verification for credit cards with card information stored in a magnetic stripe |
US8757478B2 (en) | 2012-07-09 | 2014-06-24 | Izettle Merchant Services Ab | Method for hub and spokes pan entry and payment verification |
WO2014008920A1 (en) * | 2012-07-09 | 2014-01-16 | Izettle Merchant Services Ab | Method for hub and spokes pan entry and payment verification |
EP2897094A4 (en) * | 2012-09-14 | 2016-05-04 | Thinkat Co Ltd | Method for phone authentication in e-business transactions and computer-readable recording medium having program for phone authentication in e-business transactions recorded thereon |
GB2511279A (en) * | 2012-11-05 | 2014-09-03 | Arnold Albert Wilson | Automated multi-factor identity and transaction authentication by telephone |
US10878413B2 (en) * | 2014-01-07 | 2020-12-29 | Tencent Technology (Shenzhen) Company Limited | Method, server, and storage medium for verifying transactions using a smart card |
US20160300224A1 (en) * | 2014-01-07 | 2016-10-13 | Tencent Technology (Shenzhen) Company Limited | Method, Server, And Storage Medium For Verifying Transactions Using A Smart Card |
US11640605B2 (en) * | 2014-01-07 | 2023-05-02 | Tencent Technology (Shenzhen) Company Limited | Method, server, and storage medium for verifying transactions using a smart card |
US20210073809A1 (en) * | 2014-01-07 | 2021-03-11 | Tencent Technology (Shenzhen) Company Limited | Method, server, and storage medium for verifying transactions using a smart card |
US20160012544A1 (en) * | 2014-05-28 | 2016-01-14 | Sridevi Ramaswamy | Insurance claim validation and anomaly detection based on modus operandi analysis |
US20160063054A1 (en) * | 2014-08-26 | 2016-03-03 | Scott Thompson | Method and system for crowd sourced contact database management |
GB2532190A (en) * | 2014-10-24 | 2016-05-18 | Ibm | Methods of transaction authorization using a vocalized challenge |
US11012564B1 (en) | 2014-11-14 | 2021-05-18 | United Services Automobile Association (“USAA”) | System and method for providing an interactive voice response system with a secondary information channel |
US11825021B1 (en) | 2014-11-14 | 2023-11-21 | United Services Automobile Association (“USAA”) | System and method for providing an interactive voice response system with a secondary information channel |
US11528359B1 (en) | 2014-11-14 | 2022-12-13 | United Services Automobile Association (“USAA”) | System and method for providing an interactive voice response system with a secondary information channel |
US10419609B1 (en) * | 2014-11-14 | 2019-09-17 | United Services Automobile Association (“USAA”) | System and method for providing an interactive voice response system with a secondary information channel |
US20240062215A1 (en) * | 2015-04-29 | 2024-02-22 | Capital One Services, Llc | Systems and methods for temporary transaction processing |
US20190080329A1 (en) * | 2015-04-29 | 2019-03-14 | Capital One Services, Llc | System and methods for temporary transaction processing |
US11348111B2 (en) * | 2015-04-29 | 2022-05-31 | Capital One Services, Llc | System and methods for temporary transaction processing |
CN107851245A (en) * | 2015-05-21 | 2018-03-27 | 万事达卡国际股份有限公司 | For the method and system by the asset association based on block chain to legal tender account |
EP3298550A1 (en) * | 2015-05-21 | 2018-03-28 | Mastercard International Incorporated | Method and system for integration of market exchange and issuer processing for blockchain-based transactions |
US10769629B2 (en) | 2015-05-21 | 2020-09-08 | Mastercard International Incorporated | Method and system for linkage of blockchain-based assets to fiat currency accounts |
CN107743632A (en) * | 2015-05-21 | 2018-02-27 | 万事达卡国际股份有限公司 | For the method and system for integrating marketing with being handled for the publisher of the transaction based on block chain |
US10740756B2 (en) | 2015-05-21 | 2020-08-11 | Mastercard International Incorporated | Method and system for integration of market exchange and issuer processing for blockchain-based transactions |
US10699268B2 (en) | 2015-12-30 | 2020-06-30 | Thales Dis France Sa | Method, server and system for authorizing a transaction |
WO2017114670A1 (en) * | 2015-12-30 | 2017-07-06 | Gemalto Sa | Method, server and system for authorizing a transac |
WO2017165759A3 (en) * | 2016-03-25 | 2019-04-18 | Vurify Group Llc | Real time verification of transfers of funds |
EP3340148A1 (en) * | 2016-12-22 | 2018-06-27 | Mastercard International Incorporated | Automated process for validating an automated billing update (abu) cycle to prevent fraud |
CN107833132A (en) * | 2017-11-06 | 2018-03-23 | 中国银行股份有限公司 | A kind of control method of financial transaction, device and server |
US11127075B1 (en) * | 2018-09-28 | 2021-09-21 | United Services Automobile Association (Usaa) | Financial autopilot |
US11861694B1 (en) | 2018-09-28 | 2024-01-02 | United Services Automobile Association (Usaa) | Financial autopilot |
US20200118132A1 (en) * | 2018-10-12 | 2020-04-16 | Capital One Services, Llc | Systems and methods for continuation of recurring charges, while maintaining fraud prevention |
US12141861B1 (en) | 2023-12-21 | 2024-11-12 | United Services Automobile Association (Usaa) | Financial autopilot |
Also Published As
Publication number | Publication date |
---|---|
KR20110084400A (en) | 2011-07-22 |
US20160171493A1 (en) | 2016-06-16 |
WO2010027845A3 (en) | 2010-04-29 |
CA2734975C (en) | 2017-06-20 |
US20100057623A1 (en) | 2010-03-04 |
WO2010027845A2 (en) | 2010-03-11 |
CA2734975A1 (en) | 2010-03-11 |
MX2011002067A (en) | 2011-06-20 |
EP2332102A2 (en) | 2011-06-15 |
BRPI0917347A2 (en) | 2015-11-17 |
CN102197407A (en) | 2011-09-21 |
EP2332102A4 (en) | 2012-07-25 |
US9183549B2 (en) | 2015-11-10 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US9183549B2 (en) | System and method of secure payment transactions | |
US11978051B2 (en) | Authenticating remote transactions using a mobile device | |
US11392939B2 (en) | Methods and systems for provisioning mobile devices with payment credentials | |
US10771251B1 (en) | Identity management service via virtual passport | |
US10043180B2 (en) | System and method for secure transactions at a mobile device | |
US10346814B2 (en) | System and method for executing financial transactions | |
US9818092B2 (en) | System and method for executing financial transactions | |
US8285648B2 (en) | System and method for verifying a user's identity in electronic transactions | |
AU2020200743B2 (en) | Real time EFT network-based person-to-person transactions | |
US9092778B2 (en) | Bank account protection method utilizing a variable assigning request string generator and receiver algorithm | |
US20110173122A1 (en) | Systems and methods of bank security in online commerce | |
US11782896B2 (en) | Method and system for creating rapid searchable altered data in a database | |
US20210406909A1 (en) | Authorizing transactions using negative pin messages | |
US20150237028A1 (en) | Operating system monitoring and protection method utilizing a variable request string generator and receiver algorithm | |
Jawale et al. | Towards trusted mobile payment services: a security analysis on Apple Pay |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AS | Assignment |
Owner name: ADAPTIVE PAYMENTS, INC.,FLORIDA Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:KAPUR, SHASHI;PALMER, GARY;REEL/FRAME:023149/0346 Effective date: 20090825 |
|
AS | Assignment |
Owner name: ITS, INC., IOWA Free format text: SECURITY AGREEMENT;ASSIGNOR:ADAPTIVE PAYMENTS, INC.;REEL/FRAME:031448/0230 Effective date: 20131003 |
|
AS | Assignment |
Owner name: ADAPTIVE PAYMENTS, INC., FLORIDA Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:KAPUR, SHASHI, MR;PALMER, GARY, MR;REEL/FRAME:034965/0961 Effective date: 20090825 |
|
AS | Assignment |
Owner name: ADAPTIVE PAYMENTS, INC., FLORIDA Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:ITS, INC.;REEL/FRAME:035145/0356 Effective date: 20150218 |
|
AS | Assignment |
Owner name: MTS HOLDINGS, INC., NEW YORK Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:ADAPTIVE PAYMENTS, INC.;REEL/FRAME:035565/0862 Effective date: 20150218 |
|
STCV | Information on status: appeal procedure |
Free format text: ON APPEAL -- AWAITING DECISION BY THE BOARD OF APPEALS |
|
STCV | Information on status: appeal procedure |
Free format text: BOARD OF APPEALS DECISION RENDERED |
|
STCB | Information on status: application discontinuation |
Free format text: ABANDONED -- AFTER EXAMINER'S ANSWER OR BOARD OF APPEALS DECISION |