CA2403234A1 - Cooperative use of identification numbers for consumer transactions - Google Patents

Cooperative use of identification numbers for consumer transactions Download PDF

Info

Publication number
CA2403234A1
CA2403234A1 CA002403234A CA2403234A CA2403234A1 CA 2403234 A1 CA2403234 A1 CA 2403234A1 CA 002403234 A CA002403234 A CA 002403234A CA 2403234 A CA2403234 A CA 2403234A CA 2403234 A1 CA2403234 A1 CA 2403234A1
Authority
CA
Canada
Prior art keywords
computer
code
service
product
user
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
CA002403234A
Other languages
French (fr)
Inventor
Richard Stewart Livingston Maguire
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Catalina Marketing International Inc
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Publication of CA2403234A1 publication Critical patent/CA2403234A1/en
Abandoned legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/02Marketing; Price estimation or determination; Fundraising
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/08Payment architectures
    • G06Q20/20Point-of-sale [POS] network systems
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/22Payment schemes or models
    • G06Q20/28Pre-payment schemes, e.g. "pay before"
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/30Payment architectures, schemes or protocols characterised by the use of specific devices or networks
    • G06Q20/34Payment architectures, schemes or protocols characterised by the use of specific devices or networks using cards, e.g. integrated circuit [IC] cards or magnetic cards
    • G06Q20/342Cards defining paid or billed services or quantities
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07FCOIN-FREED OR LIKE APPARATUS
    • G07F17/00Coin-freed apparatus for hiring articles; Coin-freed facilities or services
    • G07F17/42Coin-freed apparatus for hiring articles; Coin-freed facilities or services for ticket printing or like apparatus, e.g. apparatus for dispensing of printed paper tickets or payment cards
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07FCOIN-FREED OR LIKE APPARATUS
    • G07F7/00Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus
    • G07F7/02Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by keys or other credit registering devices
    • G07F7/025Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by keys or other credit registering devices by means, e.g. cards, providing billing information at the time of purchase, e.g. identification of seller or purchaser, quantity of goods delivered or to be delivered
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07GREGISTERING THE RECEIPT OF CASH, VALUABLES, OR TOKENS
    • G07G1/00Cash registers
    • G07G1/12Cash registers electronically operated
    • G07G1/14Systems including one or more distant stations co-operating with a central processing unit
    • G07G1/145PLU-management

Abstract

The invention provides a computer implemented system and method for assuring security and validity of pseudo randomly numbered authorization codes, typically printed on certificates or stored in machine readable memory on user's cards, including a first algorithmic means on a first computer for generating an authorization code in response to a request, and a second algorithmic means on a second computer for determining if a code provided by a user is an authorization code that would be generated by said first algorithmic means. The transmission of the second algorithmic means to the second computer obviates the requirement to transmit actual generated codes from the computer providing the authorization code to the computer determining if the code presented by a user is an authorized code.

Description

COOPERATIVE USE OF IDENTIFICATION NUMBERS FOR CONSUMER
TRANSACTIONS
BACKGROUND OF THE INVENTION
FIELD OF THE INVENTION
This invention relates generally to systems for issuing consumer entitlements in a retail store.
More specifically, the invention relates to systems for issuing promotions or certificates of the type that requires a unique personal identification number (PIN) to be conveyed to a customer receiving the item.
to DISCUSSION OF THE BACKGROUND
PINs are printed or encoded on valuable certificates awarded to customers and subject to authorization for various products and services. Each certificate must be resistant to fraud and must be secure from duplication. Having random but valid unique numbers requires the 15 creation and storage of the numbers in databases or on preprinted certificates. The administration of such databases or certificates become expensive and is subject to fraud.
The art relating to PIN generation is discussed in detail in United States Patent 5,892,827.
A marketing technique that has enjoyed increasing popularity is the awarding, at the point-of 2o sale, of a free product or service as an incentive to purchase other products or services.
Typical marketing programs offer 5 or I O minutes of long distance service as incentives to purchasing the sponsoring company's product, as potential prizes for participating in a marketing contest, or as premiums offered under a retailer's frequent shopper loyalty program, or simply as a product for purchase. With respect to marketing long distance telephone 25 service, there are generally two methods employed. One method entails the registration of the consumer and the issuance of a telephone "credit card" for which an account is established and is later credited with certain dollar amounts of telephone service based on the consumer's actions or purchases. Another method is to issue telephone "debit cards" to each consumer meeting the requirements of the particular marketing program. These debit cards are generally 3o pre-authorized in 5 or 10 minute denominations. The issuance of a debit card does not establish an account, but rather is authorized for the specified amount of telephone service and then becomes useless after the telephone time is exhausted. With both methods, the consumer is usually required to dial a toll-free number and provide a personal identification number (PIN) in order to activate the free service. This PIN must be randomly generated prior to the issuance of the telephone credit/debit card so that verification of valid usage can be established prior to granting the free service.
With each of the processes described above, there is a requirement that a physical card (similar to a consumer credit card) be issued to the consumer. The manufacture and delivery to of these cards represents a significant expense and therefore can be cost prohibitive in many circumstances. In addition, there are security concerns inherent in the manufacture and delivery of the cards since someone other than the intended user could easily convert them for their own use (especially in the case of the debit card since the PIN is generally pre-printed on the card itself). Another limitation of the current methods of marketing telephone cards is the 15 fact that the account and/or a PIN must be generated prior to the issuance of a card. This can result in a time lag from the time the consumer complies with the offer and the time at which the telephone service is available (especially with respect to the credit card method). This limitation can also cause shortages or excess inventories of cards based on consumer demand (especially with respect to the debit card method).
Regardless of whether a certificate or award is presented to a consumer as an incentive to purchase selected products or simply in response to a request to purchase the service that the certificate provides, the difficulties described above have inhibited safe and efficient distribution of such certificates. The following paragraphs discuss the problems that apply specifically to the distribution of prepaid service certificates, such as prepaid long-distance calling cards.
Problems first arise at the manufacturing stage. Cards are typically preprinted with the value in dollars or the time in minutes, in preset amounts, even though the consumer may prefer to 3o have a different value or time. Moreover, preprinted cards have the further limitation that they contain fixed important information, such as an "800" toll-free number for accessing the service. Access numbers may become overloaded and cause inconvenient delays for the user and new access numbers may have to be added to meet demand, but there is no convenient way to update this information on a pre-printed card. Similarly, each preprinted card has a PIN (personal identification number) that must be used to activate the card, i.e., turn it on for use. The preprinting of PINS on the card exposes the value of the card to anonymous and usually untraceable theft. Once the card is printed, its value can be stolen without physically taking the card itself. The theft can take place anywhere from the printing source to the retail outlet. It will be apparent that sending these "live" cards through a supply and distribution to process is fraught with security risks. The special handling adds to the cost and difficulty of marketing and selling remote value cards. Unsuspecting consumers may purchase cards that are either depleted or being used by others purchased illegally. The merchandising and sales of tamper resistant cards adds to the cost and effort for everyone. Live cards with protected PINS must be treated as a near-cash item through the distribution and retailing process. As a delivery of cards is made to a store, if it is not kept under lock and key or in the cash drawer it may be easily stolen, lost or misplaced. The cards themselves are very small and easily concealed by unscrupulous employees or shoppers. Therefore, suppliers and retailers of these cards are exposed to a very large financial risk in handling the cards. If the value is taken illegally from a card, it is not possible for the retailer to accept the return or bill back the supplier.
One solution is to distribute "dead" cards instead of "live" ones. A dead card is one that has a PIN that must be activated by the retailer before distribution to the consumer. Activating preset PI~'s is very expensive, time consuming and error prone. Distributing dead cards with PINs that require activation is, therefore, inconvenient and is still prone to theft and misuse because some card suppliers preprint and assign the PNs in a uniform, predictable or unprotected manner. Dishonest persons may dial the access number and enter PINS until they successfully access the service, or may look for a pattern in multiple PINs, and then resell the PIN and access numbers to different users. Another potential problem is that some PIN
3o sequences are purposely short, for the convenience of the user. This creates a dangerous situation, since a computer dialer can more easily pick and decipher short PINS that are not encoded.
Another proposed solution to the security problem is to use scratch-off coatings and removable tape covers over the PINs. This has a limited effect because the "live" and valuable cards can still be stolen and used anonymously by dishonest persons, anywhere through the supply chain.
Systems have been proposed in which prepaid cards are sold without a PIN. The PIN is to activated or attached to the card after is a call is made to a central computer that issues PINs.
In some systems of this type PINS may be downloaded in a batch, and then held until a card is purchased, at which time a PIN is attached to the preprinted portion of the card. The principal limitation of this method is that a call must be made to a central computer to issue a PIN. This slows the down the transaction and, in a retail environment, slows down the cashier while the 15 computer is dialed and the PIN is issued. Further, a dishonest or inattentive cashier could sell or give away the value of the PINS.
Some prepaid telephone cards are sold or vended in enclosed plastic containers placed in a store display rack. The cashier selling such cards typically scans a bar code on the display 2o itself, and a PIN is obtained by placing a call to the service provider.
This bar-coded activation method fails to prevent fraud or misuse by others as the bar codes can be duplicated and used on more than one card. A thief could steal one or more cards and purchase one to obtain the valid batch code, thus activating the stolen cards as well.
25 It will be appreciated from the foregoing that prior art techniques for distributing certificates or cards redeemable for a valuable service all have practical difficulties that render the certificates or cards both inconvenient to the consumer and vulnerable to fraud or theft. There is a need for a new approach for distributing such certificates or cards in a convenient manner without compromising the security of the valuable services that are obtained by use of the cards. The present invention satisfies this need, as briefly described in the following summary of the invention.
While the invention will be described mainly in connection with the awarding of free long distance telephone service, it is to be understood that the principles of the invention are also applicable to providing any award, at the point-of sale, where the subsequent verification of the award can be accomplished without the need for a pre-established list of valid authorization codes.
to SUMMARY OF THE INVENTION
The invention provides a computer implemented system and method for assuring security and validity of pseudo randomly numbered authorization codes, typically printed on certificates or stored in machine readable memory on user's cards, including a first algorithmic means on a first computer for generating an authorization code in response to a request, and a second algorithmic means on a second computer for determining if a code provided by a user is an authorization code that would be generated by said first algorithmic means. The transmission of the second algorithmic means to the second computer obviates the requirement to transmit actual generated codes from the computer providing the authorization code to the computer determining if the code presented by a 2o user is an authorized code.
The algorithm transmitted from the first computer, such as a retail store computer that functions to monitor transactions at point of sale (POS) terminals and kiosks of a store, to the second computer may either be the same algorithm used by the first computer, or the 2s transmitted algorithm may be modified so that it functions by receiving a user's code and determining if the user's code is a code that could have been generated by the algorithm used in the first store. That is, the computer code defining the algorithm transmitted to the second computer may not have the ability to print or display codes, thereby preventing a user of the second computer from fraudulently obtaining and validating authorization 3o codes. Instead the computer code defining the algorithm transmitted to the second computer may only have the ability to determine whether a code input to the second computer is valid in the sense that the code input into it is one that could be generated by the algorithm running on the first computer.
s Preferably, the authorization code contains a date indicating a date on which it was generated. Preferably, the product or service is a telecommunications services credit. The product or service may be a discount on another product or service. Typically, but not necessarily, product or service is a product or service that is not provided by the retail store at which the user receives the authorization code. The authorization code may include to digits associated with the store at which the authorization code was generated. Preferably the authorization code generation algorithm generates a code only once.
Briefly, and in general terms, the method of the invention comprises the steps of detecting the occurrence of an event that has been preselected to trigger the generation of an authorization 15 code for distribution to a customer of a retail store; generating a certificate or card storing in human or machine readable form the authorization code, the authorization codes generated in a seemingly random sequence by a pseudo random code generating algorithm to avoid deciphering of the algorithm; receiving at a second computer from a user a code; using an algorithm to determine if the received code from the user is one that would be generated by 2o the algorithm, and if so, determining to provide the associated product or service associated with the code to the user. If a determination is made to provide the associated product or service to the user, the product or service provider provides the product or service to the user.
BRIEF DESCRIPTION OF THE DRAWINGS
25 A more complete appreciation of the invention and many of the attendant advantages thereof will be readily obtained as the same becomes better understood by reference to the following detailed description when considered in connection with the accompanying drawings, wherein:
Figure I is a schematic of an embodiment of a novel computer system of the invention;

Figure 2 is a flow chart of the process of a consumer receiving an authorization code for the system of Figure 1; and Figure 3 is a flowchart of the process of validating the authorization code for the system of Figure I.
DESCRIPTION OF THE PREFERRED EMBODIMENTS
In the drawings, like reference numerals designate identical or corresponding parts throughout the several views, and Figure 1 shows a first computer 1 connected to a POS
l0 terminal 2 and a kiosk 3 of a store 6. The POS terminal 2 includes means to enter transaction data and provide price information for transacting a sale with a customer. POS
terminals are well known in the art. The POS terminal 2 may include a machine means to identify products codes and a user identification, such as a bar code scanner (for scanning product identification bar codes on product items and user identification bar codes on user identification cards), a magnetic stripe reader for scanning magnetic media containing a user's identification number (such as a bank or credit card), a MICR coder reader for reading MICR codes on checks to obtain check authorization and to obtain a user identification. The POS
terminal also includes a means to write an authorization code in either human readable form or machine readable form.
The store 6 may also include a kiosk 3. For the purposes of this invention, a kiosk is a terminal of a computer system including a means for the customer to enter a payment (such as cash or a credit card) or a unique identification associated with the customer and a means for writing an authorization code in either human readable form or machine readable form.
2~
The POS terminal 2 and the kiosk 3 of the store 6 are each connected via a communication line with the first computer 1. The communication line may pass through network connections or other intermediaries. For example, there may be a store controller computer interposed in the communication line between the first computer 1 and the POS
terminal 2 and kiosk 3. However, it is to be understood that the first computer may be a store controller computer.
The first computer 1 is connected via a communication line to a second computer 4. There may be intermediary devices interposed along the communication line connecting the first computer 1 and the second computer 4 so long as the first computer 1 can communicate with the second computer 4.
The second computer 4 is in communication with a user device 5. The user device 5 may be a to wire line telephone, a wire less telephone, or another computer. The user device 5 may be any device that enables a user to transmit data si;nals conveying an authorization code to the second computer 4.
In figure 2, in step 10, the consumer takes action which results in a request signal transmitted from the POS terminal 2 or the kiosk 3 to the first computer 1 prompting generation of an authorization code. The action by the consumer may be the purchase of an item at the POS
terminal or the kiosk entitling the user to an authorization code for a product, service, or discount on a product or service, it may be an explicit request by the consumer to purchase an authorization code entitling the user to receive the product or the service, it may be based 2o upon the customer's prior shopping history as recorded in a database associated with the first computer 1, or it may instead be based a promotional campaign in which each consumer at either the POS terminal 2 or the kiosk 3 are provided an authorization code.
In step 11, the first computer 1 generates an authorization code. In step 12, the first computer 1 transmits the generated code to the POS terminal or kiosk. In step 13, the POS terminal or kiosk records the authorization code in a recordable medium. In the preferred embodiment the medium is paper and the code is in human readable digits, such as letters and numbers, and the printed paper includes a telephone number to call to obtain the authorized product or service.
In figure 3, in step 14, the second computer system 4 receives the code entered into the user 3o device 5. In step 21, the second computer system 4 executes an algorithm that determines if s the code it received is one that could have been generated by the authorization code algorithm.
In the preferred embodiment, the product or service associated with the authorization code is prepaid telecommunication time. In the preferred embodiment, if the second computer system 4 determines that the code it received from the user device S is one that could have been generated by the authorization code algorithm, it dueries the user device 5 for a telephone number to which to credit prepaid telecommunications time, receives a telephone number from the user device 5, and credits the account for that telephone number.
to Optionally, the second computer system 4 may also provide a dial around telephone number to the user device 5 and instruct the consumer to dial the dial around number as a precondition for using the credit obtained from the authorization code.
Preferably, the second computer system stores authorization numbers received from a user device and does not reauthorize any of those numbers.

Claims (24)

1. A method for crediting a service or product, comprising the steps of:
transmitting code defining an algorithm from a first computer to a second computer, said algorithm for generating authorization codes;

receiving at the first computer a signal from a terminal in a retail store indicating an entitlement to credit for a product or service;

using said algorithm in said first computer to generate an authorization code for said entitlement in response to receiving said signal;

generating a certificate containing said authorization code at said terminal;

receiving a user's code from a user at said second computer; and using said algorithm in said second computer to determine if said user's code is an authorization code in order to determine whether to provide said product or service to said user.
2. The method of claim 1 wherein said authorization code contains a date on which said signal was received at said first computer.
3. The method of claim 1 or 2 wherein said product or service is a telecommunications services credit.
4. The method of claim 1 or 2 wherein said product or service is a discount on another product or service.
5. The method of claim 1 wherein said product or service is not provided by said retail store.
6. A method for crediting a service or product, comprising the steps of:

transmitting code defining a second algorithm to a second computer, said algorithm for determining if a user's code is an authorization code generated by a first algorithm;

receiving at a first computer a signal from a terminal in a retail store indicating an entitlement to credit for a product or service;

using code defining said first algorithm in said first computer to generate an authorization code for said entitlement in response to receiving said signal;

generating a certificate containing said authorization code at said terminal;

receiving a user's code from a user at said second computer;

using said second algorithm in said second computer to determine if said user's code is authorization code generated by said first algorithm in order to determine whether to provide said product or service to said user; and wherein said authorization code contains a date on which said signal was received at said first computer.
7. The method of claim 6 wherein said authorization code contains a date on which said signal was received at said first computer.
8. The method according to claim 6 wherein said product or service is a telecommunications services credit.
9. The method of claim 6 wherein said product or service is a discount on another product or service.
10. The method of claim 6 wherein said product or service is not provided by said retail store.
11. A system for crediting a service or product, comprising:

means for transmitting code defining an algorithm from a first computer to a second computer, said algorithm far generating authorization codes;

means for receiving at the first computer a signal from a terminal in a retail stare indicating an entitlement to credit for a product or service;

means for using said algorithm in said first computer to generate an authorization code for said entitlement in response to receiving said signal;

means for generating a certificate containing said authorization code at said terminal;

means far receiving a user's code from a user at said second computer; and means for using said algorithm in said second computer to determine if said user's code is an authorization code in order to determine whether to provide said product or service to said user.
12. The system of claim 11 wherein said authorization code contains a date on which said signal was received at said first computer.
13. The system of claim 11 wherein said product or service is a telecommunications services credit.
14. The system of claim 11 wherein said product or service is a discount on another product or service.
15. The system of claim 11 wherein said product or service is not provided by said retail store.
16. A system for crediting a service or product, comprising the steps of:

means for transmitting code defining a second algorithm to a second computer, said algorithm for determining if a user's code is an authorization code generated by a first algorithm;

means for receiving at a first computer a signal from a terminal in a retail store indicating an entitlement to credit for a product or service;

means for using code defining said first algorithm in said first computer to generate to an authorization code for said entitlement in response to receiving said signal;

means for generating a certificate containing said authorization code at said terminal;

means for receiving a user's code from a user at said second computer; and means for using said second algorithm in said second computer to determine if said user's code is an authorization code generated by said first algorithm in order to determine whether to provide said product or service to said user; and wherein said authorization code contains a date on which said signal was received at said first computer.
17. The system of claim 16 wherein said authorization code contains a date on which said signal was received at said first computer.
18. The system according to claim 16 wherein said product or service is a telecommunications services credit.
19. The system of claim 16 wherein said product or service is a discount on another product or service.
20. The system of claim 16 wherein said product or service is not provided by said retail store.
21. A computer program product for instructing a computer system for crediting a service or product, comprising programming the computer system to provide the steps of fitting code defining a second algorithm to a second computer, said algorithm for determining if a user's code is an authorization code generated by a first algorithm;

receiving at a first computer a signal from a terminal in a retail store indicating an entitlement to credit for a product or service;

using code defining said first algorithm in said first computer to generate an authorization code for said entitlement in response to receiving said signal;

generating a certificate containing said authorization code at said terminal;

receiving a user's code from a user at said second computer;

using said second algorithm in said second computer to determine if said user's code is an authorization code generated by said first algorithm in order to determine whether to provide said product or service to said user; and wherein said authorization code contains a date on which said signal was received at said first computer.
22. A computer program comprising computer programming code means adapted to perform the steps of claim 1 or 6 when that program is run on a computer.
23. A method as claimed in claim 1 or 6 substantially as hereinbefore described with reference to, and as shown in the accompanying drawings.
24. A system as claimed in claim 1 or 6 substantially as hereinbefore described with reference to, and as shown in the accompanying drawings.
CA002403234A 2000-04-04 2000-05-09 Cooperative use of identification numbers for consumer transactions Abandoned CA2403234A1 (en)

Applications Claiming Priority (3)

Application Number Priority Date Filing Date Title
GB0008248.7 2000-04-04
GBGB0008248.7A GB0008248D0 (en) 2000-04-04 2000-04-04 Cooperative use of identification numbers for consumer transactions
PCT/US2000/006708 WO2001075826A1 (en) 2000-04-04 2000-05-09 Cooperative use of identification numbers for consumer transactions

Publications (1)

Publication Number Publication Date
CA2403234A1 true CA2403234A1 (en) 2001-10-11

Family

ID=9889159

Family Applications (1)

Application Number Title Priority Date Filing Date
CA002403234A Abandoned CA2403234A1 (en) 2000-04-04 2000-05-09 Cooperative use of identification numbers for consumer transactions

Country Status (10)

Country Link
EP (1) EP1269437A1 (en)
JP (1) JP2003529862A (en)
AU (1) AU2000246407A1 (en)
BE (1) BE1013467A3 (en)
CA (1) CA2403234A1 (en)
GB (1) GB0008248D0 (en)
IT (1) ITMI20001389A1 (en)
PT (1) PT102488A (en)
WO (1) WO2001075826A1 (en)
ZA (1) ZA200003075B (en)

Families Citing this family (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7155416B2 (en) * 2002-07-03 2006-12-26 Tri-D Systems, Inc. Biometric based authentication system with random generated PIN
US7725926B1 (en) 2004-08-23 2010-05-25 Hewlett-Packard Development Company, L.P. Authentication
WO2006086694A2 (en) * 2005-02-10 2006-08-17 Chariot Ip Holdings Llc Secure system for conducting electronic transactions and method for use thereof
CN109147227B (en) * 2018-07-17 2021-12-28 武汉云易虹科技有限公司 Certificate core code information acquisition system and method

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4819267A (en) * 1984-02-22 1989-04-04 Thumbscan, Inc. Solid state key for controlling access to computer systems and to computer software and/or for secure communications
US5892827A (en) * 1996-06-14 1999-04-06 Catalina Marketing International, Inc. Method and apparatus for generating personal identification numbers for use in consumer transactions
CA2217764C (en) * 1996-02-15 2002-01-22 Catalina Marketing International, Inc. Method and apparatus for generating personal identification numbers for use in consumer promotions
JP3117123B2 (en) * 1996-05-08 2000-12-11 勉 松本 Authentication type security system

Also Published As

Publication number Publication date
ITMI20001389A1 (en) 2001-12-20
EP1269437A1 (en) 2003-01-02
WO2001075826A1 (en) 2001-10-11
AU2000246407A1 (en) 2001-10-15
PT102488A (en) 2001-10-31
JP2003529862A (en) 2003-10-07
ZA200003075B (en) 2001-01-24
GB0008248D0 (en) 2000-05-24
ITMI20001389A0 (en) 2000-06-20
BE1013467A3 (en) 2002-02-05

Similar Documents

Publication Publication Date Title
US5892827A (en) Method and apparatus for generating personal identification numbers for use in consumer transactions
US20020069104A1 (en) Method and apparatus for generating personal identification numbers for use in consumer transactions
EP0823106B1 (en) Method and apparatus for generating personal identification numbers for use in consumer promotions
AU706165B2 (en) Refundable prepaid telephone card
US6738749B1 (en) Methods and apparatus for creating and storing secure customer receipts on smart cards
US10055925B2 (en) System for voucher or token verification
US7810720B2 (en) Account payment using barcode information exchange
US7840486B2 (en) System and method for performing secure credit card purchases
US8175924B2 (en) Presentation instrument display and activation systems and methods
US20040111322A1 (en) Multi-function transaction processing system
US20060015402A1 (en) Using multiple PINs for redemption through multiple distribution channels
US8430298B2 (en) Presentation instrument package arrangement
US20030009382A1 (en) Customer identification, loyalty and merchant payment gateway
EP1297500A2 (en) A multi-function transaction processing system
WO1996038801A1 (en) Methods and apparatus for providing a prepaid, remote entry customer account
US7533814B2 (en) Presentation instrument with user-created pin
CA2346410A1 (en) Process, system and computer readable medium for providing a prepaid fuel card and using a personal identification as a prepaid fuel card
CA2403234A1 (en) Cooperative use of identification numbers for consumer transactions
WO2004044854A1 (en) Voucher or token based payment system
WO2010094109A1 (en) Apparatus and system for the sale of value from value cards

Legal Events

Date Code Title Description
FZDE Discontinued