CA2747642A1 - User positive approval & authentication services - Google Patents

User positive approval & authentication services Download PDF

Info

Publication number
CA2747642A1
CA2747642A1 CA 2747642 CA2747642A CA2747642A1 CA 2747642 A1 CA2747642 A1 CA 2747642A1 CA 2747642 CA2747642 CA 2747642 CA 2747642 A CA2747642 A CA 2747642A CA 2747642 A1 CA2747642 A1 CA 2747642A1
Authority
CA
Canada
Prior art keywords
user
issuer
sends
approval
legacy
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
CA 2747642
Other languages
French (fr)
Inventor
Branislav Sikljovan
Radosav Andric
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to CA 2747642 priority Critical patent/CA2747642A1/en
Publication of CA2747642A1 publication Critical patent/CA2747642A1/en
Abandoned legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/42Confirmation, e.g. check or permission by the legal debtor of payment

Landscapes

  • Business, Economics & Management (AREA)
  • Accounting & Taxation (AREA)
  • Finance (AREA)
  • Strategic Management (AREA)
  • Physics & Mathematics (AREA)
  • General Business, Economics & Management (AREA)
  • General Physics & Mathematics (AREA)
  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)

Abstract

The invention provides Users of Retail Payment and Identification instruments with the ability to review transaction details and approve transaction by capturing UVM
in User controlled environment and Issuers of these instruments with the ability to positively authenticate Users in Issuer controlled environment. The invention accounts for real time legacy or non-legacy processing systems to provide an authorization request from POA to Issuer Host. The invention introduces two UPAAS components - User Gateway and User Application. The UPAAS User Gateway is implemented in an Issuer controlled environment enabling interface between Issuer legacy Host and UPAAS User Applications. The UPAAS
User Application can be implemented on any device supporting communication protocol such as TCP/IP without any hardware changes enabling the User to login to UPAAS
User Gateway, review and approve or decline a specific transaction in real time by entering UVM, such as PIN, for User authentication purposes.

Description

User Positive Approval & Authentication Services Inventors: Branislav R Sikljovan, Guelph, ON, Canada, Radosav Andric, Toronto, ON, Canada BACKGROUND OF THE INVENTION

The foundation of the invention was a realization of the existing problems and opportunities that emerging technologies are bringing along in the areas of transaction approval and User authentication for Retail Payment and Identification transactions.

Recognized Problems = For a number of years the Card industry has been facing demands for a stronger Cardholder authentication and better protection of User and Payment instrument proprietary information. The Card industry responded with EMV- chip cards where an offline PIN was introduced replacing or substituting signature as CVM. An Offline PIN is significantly more reliable than a signature however it came with a price: the cost of EMV
implementation and maintenance is significant and is billed to all parties: Merchants/POA, Acquirer, Network and Issuers. Another downside is that the PIN remained captured at POA and User verification remained within the POA environment. To mitigate the risks the Payment Card Industry (PCI) introduced PED and Data Security standards which improved security however also further increased the cost of implementation and maintenance. Verification of a CVM at the POA
means that the Issuer is advised of the Cardholder Verification Result, but not actually performing User authentication, which opens up doors for "wedge" (man-in-the middle) attacks and other fraud risks.

= The personal and traveler's cheques industry currently provides the ability to validate the cheques or drafts being presented, verify the history of the User (account holder), to validate the Routing Number and verify the User Account number status, However User authentication is not currently available for cheque transactions which along with the cost of Cheque Verification processing contributed to the constant decline of cheque use.

= Users of identification instruments like Insurance and Health cards are either not authenticated at all or the authentication is performed by the acceptor using other pictured IDs, like a Driver's license.

User Positive Approval & Authentication Services Inventors: Branislav R Sikljovan, Guelph, ON, Canada, Radosav Andric, Toronto, ON, Canada Perceived Opportunities = Mass adoption of data enabled devices enables a reach to Users of Retail payment and Identification instruments in real time, anytime, anywhere enabling User transaction approval and User authentication in Issuer controlled environment that was previously not possible.

= Providing Users of Payment and Identification instruments with the ability to review and approve transactions and enter UVMs at the devices they control improves the security of UVM and effectively externalizes User Transaction approval and User authentication from POA / acceptor's environment thus removing the line between User (Cardholder) Present and User (Cardholder) Not Present transactions.

= User Transaction approval and User authentication naturally belong to Issuer environment. Ensuring this decouples the Payment Instrument information (processed in authorization request/response) from User Authentication information which significantly contributes to fraud prevention.

BRIEF SUMMARY OF THE INVENTION

The invention accounts for legacy or non-legacy real time processing systems providing transaction details captured at a POA to the Issuer Host through an Acquirer and when appropriate Network environment in the form of transaction authorization request. At a minimum the Transaction authorization request provides Payment or Identification Instrument ID (i.e. Primary Account Number), POA information (i.e. Acceptor Name and Location) and Transaction Amount.

The invention introduces two components:

= UPAAS User Gateway (125) implemented in Issuer controlled environment which facilitates processing of Approval Request/Response between Issuer Card, Card-less or ID
Legacy systems and UPAAS User Application (122).

= UPAAS User Application (122) which can be implemented on any device supporting appropriate data communication protocol such as TCP/IP. It provides Users with User Positive Approval & Authentication Services Inventors: Branislav R Sikljovan, Guelph, ON, Canada, Radosav Andric, Toronto, ON, Canada ability to review and accept or decline the transaction once the authorization request is received by the Issuer. The User confirms acceptance of a transaction by entering UVM
which is encrypted by the UPAAS User application and forwarded to Issuer for User authentication and Issuer approval.

The invention externalizes User Authentication from a legacy POA, Acquiring and Network systems and enables Issuers of Retail Payment and Identification instruments with ability to positively authenticate Users of these instruments in real time in Issuer controlled environment without any involvement of POA, acquiring and network systems in User authentication.

The invention externalizes User transaction approval from a legacy POA and enables Issuers of Retail Payment and Identification instruments with ability to request a transaction approval from Users in real time after the Issuer receives authorization request for the transaction and before the Issuer approval is granted. As a result of this the invention makes the Issuer approval contingent to the User's approval ensuring non-repudiation of Issuer approved transactions.

The invention provides Users of Retail Payment and Identification instruments with the ability to review and approve or decline transaction and capture UVM on self controlled devices, thus decoupling Point of (Instrument) Acceptance from Point of Transaction Approval and Point of User Authentication, which effectively removes the line between User Present and User Not-Present transactions.

By externalizing User Authentication from the POA the invention ensures that the Payment Instrument information (i.e. Primary Account Number) and User Verification information (i.e. PIN) are neither captured nor processed together at any point of the transaction life cycle. This prevents the association of the Instrument and UVM
information by anyone but the User and Issuer, thus reducing the possibility of creating and using the counterfeit instruments.

User Positive Approval & Authentication Services Inventors: Branislav R Sikljovan, Guelph, ON, Canada, Radosav Andric, Toronto, ON, Canada The major benefits of the invention are the following:

= No physical changes or modifications are required to devices where the UPAAS
User Application is implemented.

= Issuer performs User Authentication in its own environment which is currently possible for ATM on-us transactions only. The same increases transaction security and simplifies implementation and change management: any modification or improvements can be done without impacts to Merchant, Acquirer and Network environments.

= Acceptors of Payment or Identification instruments are spared from implementing and maintaining User Authentication functions at their POA devices while enjoying increased guarantee of payment and non-repudiation.

= Acquirer processors and Networks are spared from implementing and maintaining Industry mandates related to User authentication and data security standards including but not limited to secure UVM capture, encryption and support of associated key infrastructure.

= Users are provided with the opportunity to review and approve or decline the transaction in a self controlled environment and the ability to identify and decline a fraudulent or incorrectly processed transaction request before it is processed by the Issuer Host.

BRIEF DESCRIPTION OF THE SEVERAL VIEWS OF THE DRAWINGS
The drawings provided herein present possible implementation scenarios of the invention. These scenarios should be taken as examples only and they are not meant to limit implementation of the invention beyond presented scenarios, nor limit the scope, implementation type or configuration of the invention providing that the spirit of the invention is preserved as set forth in the invention claims.

Figure 1 presents a process flow of the embodiment enabling transaction approvals to Users and User Authentication to Issuers of non-proprietary Card Retail Payment Instruments in legacy Open Loop scenario where Issuer uses its legacy system for PIN
verification.

User Positive Approval & Authentication Services Inventors: Branislav R Sikljovan, Guelph, ON, Canada, Radosav Andric, Toronto, ON, Canada Figure 2 presents a process flow of the embodiment enabling transaction approvals to Users and User Authentication to Issuers of non-proprietary Card Retail Payment Instruments in legacy Open Loop scenario where Issuer uses UPAAS for UVM verification.

Figure 3 presents a process flow of the embodiment enabling transaction approval to Users and User Authentication to Issuers of proprietary Card Retail Payment Instruments in legacy Closed Loop scenario where Issuer uses UPAAS for UVM verification.

Figure 4 presents a process flow of the embodiment enabling transaction approval to Users and User Authentication to Issuers of Card-less Retail Payment Instruments in legacy Open Loop scenario where Issuer uses UPAAS for UVM verification.

Figure 5 presents a process flow of the embodiment enabling transaction approval to Users and User Authentication to Issuers of Card-less Retail Payment Instruments in legacy Closed Loop scenario where Issuer uses UPAAS for UVM verification.

Figure 6 presents a process flow of the embodiment enabling transaction approval to Users and User Authentication to Issuers when Identification Instruments are used in legacy Closed Loop scenario where Issuer uses UPAAS for UVM verification.

DETAILED DESCRIPTION OF THE INVENTION

Details of end-to end transaction flow and User transaction approval and User Authentication processes are as presented in Figures 1-6 and corresponding descriptions in the tables below.

Table 1: Detailed description of process flow and relevant business logic exercised in UPAAS implementation scenario presented in Figure 1 where User Approval and Authentication processes are exercised for Card retail payment transactions initiated and processed in an Open Loop Card Legacy environment where Issuer verifies PIN in its legacy environment.

1110 If unattended POA 111 swipes card; If eCommerce transaction 111 enters Card number and other requested information (i.e. CVV2/CVC2) as requested by e-Commerce web site.

User Positive Approval & Authentication Services Inventors: Branislav R Sikljovan, Guelph, ON, Canada, Radosav Andric, Toronto, ON, Canada 2130 If attended POA 213 swipes card and enters amount; If MOTO 213 enters Card number and amount;
1117 111 activates 122 in order to establish connection with 125 1227 122 sends Login Request to 125 where User Name is implicitly provided by 122.
Subject to Issuer requirements Password is either entered by 111 or implicitly provided by 122 1258 125 verifies User Name & Password, checks 111 status and if valid sends Login Response to 122 / establishes an open session and awaits for Approval Request from 116 2141 214 sends Authorization Request to 215 with appropriate 214 information, Transaction Amount and captured Card Information 2151 215 enriches Authorization Request with appropriate acquirer and merchant information and Forwards Authorization Request to 315 3151 315 identifies 116 based on PAN BIN and forwards Authorization Request to 1163 116 checks PAN provided in 3151 to determine if 111 is registered for UPAAS
services and if yes sends Approval Request to 125 with PAN, 214 information and Transaction Amount 1253 125 identifies 122 using PAN, checks 122 status and if valid sends Approval Request to 122 1114 111 reviews 214 Name & Location, Transaction Amount as received in 1253 and displayed by 122 and confirms acceptance by entering PIN and "From Account Type"
1224 122 sends Approval Response to 125 with encrypted PIN Block and "From Account" type 1254 125 sends Approval Response to 116 with encrypted PIN Block and "From Account" type 1165 116 sends PIN Verification Request to 109 1096 109 verifies PIN and sends PIN Verification Response to 116 1161 116 sends Fund Authorization Request to 118 1182 118 verifies account balance / open to buy and sends Authorization Response to User Positive Approval & Authentication Services Inventors: Branislav R Sikljovan, Guelph, ON, Canada, Radosav Andric, Toronto, ON, Canada 1162 116 sends Authorization Response to 315 3152 315 forwards Authorization Response to 215 2152 215 forwards Authorization Response to 214 at which point goods or services are granted to 111 1169 Subject to Issuer Requirement 116 sends Authorization Advice to 125 1259 If 1169 received from 116 then 125 sends Authorization Advice to 122 at which point the session is closed Table 2: Detailed description of process flow and relevant business logic exercised in UPAAS implementation scenario presented in Figure 2 where User Approval and Authentication processes are exercised for Card retail payment transactions initiated at and processed through an Open Loop Card Legacy environment where UVM Verification is completed between the UPAAS User Gateway and Issuer UVM Verification system.

1110 If unattended POA 111 swipes card; if eCommerce transaction 111 enters Card number and other requested information (i.e. CVV2/CVC2) as requested by e-Commerce web site.
2130 If attended POA 213 swipes card and enters amount; If MOTO 213 enters Card number and amount;
1117 111 activates 122 in order to establish connection with 125 1227 122 sends Login Request to 125 where User Name is implicitly provided by 122.
Subject to Issuer requirements Password is either entered by 111 or implicitly provided by 122 1258 125 verifies User Name & Password, checks 111 status and if valid sends Login Response to 122 / establishes an open session and awaits for Approval Request from 116 2141 214 sends Authorization Request to 215 with appropriate 214 information, Transaction Amount and captured Card Information 2151 215 enriches Authorization Request with appropriate acquirer and merchant information and Forwards Authorization Request to 315 User Positive Approval & Authentication Services Inventors: Branislav R Sikljovan, Guelph, ON, Canada, Radosav Andric, Toronto, ON, Canada 3151 315 identifies 116 based on PAN BIN and forwards Authorization Request to 1163 116 checks PAN provided in 3151 to determine if 111 is registered for UPAAS
services and if yes sends Approval Request to 125 with PAN, 214 information and Transaction Amount 1253 125 identifies 122 using PAN, checks 122 status and if valid sends Approval Request to 122 1114 111 reviews 214 Name & Location, Transaction Amount as displayed by 122 and confirms acceptance by entering UVM and "From Account Type"
1224 122 sends Approval Response to 125 with Encrypted UVM and "From Account"
type 1255 125 sends UVM Verification Request to 109 1096 109 verifies UVM and sends UVM Verification Response to 125 1254 125 sends Approval Response to 116 with "From Account" type 1161 116 sends Fund Authorization Request to 118 1182 118 verifies account balance / open to buy and sends Authorization Response to 1162 116 sends Authorization Response to 315 3152 315 forwards Authorization Response to 215 2152 215 forwards Authorization Response to 214 at which point goods or services are granted to 111 1169 Subject to Issuer Requirement 116 sends Authorization Advice to 125 1259 If 1169 received from 116 125 sends Authorization Advice to 122 at which point the session is closed Table 3: Detailed description of process flow and relevant business logic exercised in UPAAS implementation scenario presented in Figure 3 where User Approval and Authentication processes are exercised for Card retail payment transactions initiated at and processed through a Closed Loop Card Legacy environment where UVM Verification is completed between the UPAAS User Gateway and Issuer UVM Verification system.

1110 If unattended POA 111 swipes card.

User Positive Approval & Authentication Services Inventors: Branislav R Sikljovan, Guelph, ON, Canada, Radosav Andric, Toronto, ON, Canada 2130 If attended POA 213 swipes card and enters amount 1117 111 activates 122 in order to establish connection with 125 1227 122 sends Login Request to 125 where User Name is implicitly provided by 122.
Subject to Issuer requirements Password is either entered by 111 or implicitly provided by 122 1258 125 verifies User Name & Password, checks 111 status and if valid sends Login Response to 122 / establishes an open session and awaits for Approval Request from 2141 214 sends Authorization Request to 215 with appropriate 214 information, Transaction Amount and captured Card Information 2151 215 enriches Authorization Request with appropriate acquirer and merchant information and Forwards Authorization Request to 116 1163 116 checks PAN provided in 3151 to determine if 111 is registered for UPAAS services and if yes sends Approval Request to 125 with PAN, 214 information and Transaction Amount 1253 125 identifies 122 using PAN, checks 122 status and if valid sends Approval Request to 1114 111 reviews 214 Name & Location, Transaction Amount as displayed by 122 and confirms acceptance by entering UVM and "From Account Type"
1224 122 sends Approval Response to 125 with UVM Block Encrypted and "From Account"
type 1255 125 sends UVM Verification Request to 109 1096 109 verifies UVM and sends UVM Verification Response to 125 1254 125 sends Approval Response to 116 with "From Account" type 1161 116 sends Fund Authorization Request to 118 1182 118 verifies account balance / open to buy and sends Authorization Response to 116 1162 116 sends Authorization Response to 215 2152 215 forwards Authorization Response to 214 at which point goods or services are granted to 111 1169 Subject to Issuer Requirement 116 sends Authorization Advice to 125 User Positive Approval & Authentication Services Inventors: Branislav R Sikljovan, Guelph, ON, Canada, Radosav Andric, Toronto, ON, Canada 1259 If 1169 received from 116 then 125 sends Authorization Advice to 122 at which point the session is closed Table 4: Detailed description of process flow and relevant business logic exercised in UPAAS implementation scenario presented in Figure 4 where User Approval and Authentication processes are exercised for Card-less retail payment transactions initiated at and processed through an Open Loop Legacy environment where UVM Verification is completed between the UPAAS User Gateway and Issuer UVM Verification system.

2330 233 enters amount and Cheque number (manual entry or bar code read) 1317 131 activates 122 in order to establish connection with 125 1227 122 sends Login Request to 125 where User Name is implicitly provided by 122.
Subject to Issuer requirements Password is either entered by 131 or implicitly provided by 122 1258 125 verifies User Name & Password, checks 131 status and if valid sends Login Response to 122 / establishes an open session and awaits for Approval Request from 136 2341 234 sends Cheque Verification Request to 235 with appropriate 234 information, Transaction Amount and captured Cheque Information 2351 235 sends Cheque Verification Request with appropriate acquirer and merchant information to 335 3351 335 identifies 136 based on cheque number and forwards Cheque Verification Request to 136 1363 136 checks Cheque Number provided in 3351 to verify if 131 is registered for UPAAS services and if yes sends Approval Request to 125 with Cheque Number, 234 information and Transaction Amount 1253 125 identifies 122 using Cheque Number, checks 122 status and if valid sends Approval Request to 122 1314 131 reviews Cheque Number, 234 Name & Location, Transaction Amount as displayed by 122 and confirms acceptance by entering UVM
1224 122 sends Approval Response to 125 with encrypted UVM Block User Positive Approval & Authentication Services Inventors: Branislav R Sikljovan, Guelph, ON, Canada, Radosav Andric, Toronto, ON, Canada 1255 125 sends UVM Verification Request to 109 1096 109 verifies UVM and sends UVM Verification Response to 125 1254 125 sends Approval Response to 136 1361 136 sends Fund Authorization Request to 138 1382 138 verifies account balance against requested amount and sends Fund Authorization Response to 136 1362 136 sends Cheque Verification Response to 335 3352 335 forwards Cheque Verification Response to 235 2352 235 forwards Cheque Verification Response to 234 at which point goods or services or cash withdrawal is granted to 131 1369 Subject to Issuer Requirement 136 sends Cheque Verification Advice to 125 1259 If 1369 received from 136 then 125 sends Cheque Verification Advice to 122 at which point the session is closed Table 5: Detailed description of process flow and relevant business logic exercised in UPAAS implementation scenario presented in Figure 5 where User Approval and Authentication processes are exercised for Card-less retail payment transactions initiated at and processed through a Close Loop Legacy environment where UVM Verification is completed between the UPAAS User Gateway and Issuer UVM Verification system.

2330 233 enters amount and cheque number (manual entry or bar code read) 1317 131 activates 122 in order to establish connection with 125 1227 122 sends Login Request to 125 where User Name is implicitly provided by 122.
Subject to Issuer requirements Password is either entered by 131 or implicitly provided by 122 1258 125 verifies User Name & Password, checks 131 status and if valid sends Login Response to 122 / establishes an open session and awaits for Approval Request from 136 2341 234 sends Cheque Verification Request to 235 with appropriate 234 information, Transaction Amount and captured Cheque Information 2351 235 sends Cheque Verification Request with appropriate acquirer and merchant User Positive Approval & Authentication Services Inventors: Branislav R Sikljovan, Guelph, ON, Canada, Radosav Andric, Toronto, ON, Canada information to 136 1363 136 checks Cheque Number provided in 3351 to verify if 131 is registered for UPAAS services and if yes sends Approval Request to 125 with Cheque Number, 234 information and Transaction Amount 1253 125 identifies 122 using Cheque Number, checks 122 status and if valid sends Approval Request to 122 1314 131 reviews Cheque Number, 234 Name & Location, Transaction Amount as displayed by 122 and confirms acceptance by entering UVM
1224 122 sends Approval Response to 125 with encrypted UVM Block 1255 125 sends UVM Verification Request to 109 1096 109 verifies UVM and sends UVM Verification Response to 125 1254 125 sends Approval Response to 136 1361 136 sends Fund Authorization Request to 138 1382 138 verifies account balance against requested amount and sends Fund Authorization Response to 136 1362 136 sends Cheque Verification Response to 235 2352 235 forwards Cheque Verification Response to 234 at which point goods or services or cash withdrawal is granted to 131 1369 Subject to Issuer Requirement 136 sends Cheque Verification Advice to 125 1259 If 1369 received from 136 then 125 sends Cheque Verification Advice to 122 at which point the session is closed Table 6: Detailed description of process flow and relevant business logic exercised in UPAAS implementation scenario presented in Figure 6 where User Approval and Authentication processes are exercised for Identification instrument transactions initiated at and processed through a Close Loop processing environment where UVM Verification is completed between the UPAAS User Gateway and Issuer UVM Verification system 2430 243 enters ID Number (manually or through bar or magstripe read) 1417 141 activates 122 in order to establish connection with 125 1227 122 sends Login Request to 125 where User Name is implicitly provided by 122.

User Positive Approval & Authentication Services Inventors: Branislav R Sikljovan, Guelph, ON, Canada, Radosav Andric, Toronto, ON, Canada Subject to Issuer requirements Password is either entered by 141 or implicitly provided by 122 1258 125 verifies User Name & Password, checks 141 status and if valid sends Login Response to 122 / establishes an open session and awaits for Approval Request from 146 2441 244 sends ID Verification Request to 245 with appropriate 244 information and captured ID Information 2451 245 forwards ID Verification Request to 146 1463 146 checks ID provided in 2451 to determine if 141 is registered for UPAAS
services and if yes sends Approval Request to 125 with 214 information 1253 125 identifies 122 using ID, checks its status and if valid sends Approval Request to 122 1414 141 reviews 244 Name & Location as displayed by 122 and confirms acceptance by entering UVM
1224 122 sends Approval Response to 125 with encrypted UVM Block 1255 125 sends UVM Verification Request to 109 1096 109 verifies UVM and sends UVM Verification Response to 125 1254 125 sends Approval Response to 146 1462 146 sends ID Verification Response to 245 2452 245 forwards ID Verification Response to 244 at which point User verification has been confirmed 1469 Subject to Issuer Requirement 146 sends ID Verification Advice to 125 1259 If 1469 received from 146 then 125 sends ID Verification Advice to 122 at which point the session is closed bUp z a;
r- N ~n z O
~- r-I ~O N O ^~
-. O -4 I - .~-I O N N N N N N M M M M

cG

U
z o o 0 h C!1 U ~" 0 U E

0 Z c U U y a, a U U o w o b W d ) i W '~ W W !~, z d U w m v)1 r~ w U w as --+
,~ U C7 ~õ~ $-I I ~-I Sr t, I ~I d s..1 Y-I I 1.1 I-I -I
Q a) ~. d d a) a) a) a) ~.
a I
CIO

0.1 O Z n cn ^^' O 60) z W a) m z U c- a 0 0 a o u U ~, 0 a A; ~,) a d a1 d 3 S o a~~i o y cl ' z W d off, C7 '% A~ d Z z -~ U a; U b as y .-+ N M O r+ N M ~t I O w - N M d N
bA
Gr ~O N M V 1 M M M V~ V1 V) tn V1 -+ -- r- N N N M M M d d - N M IT
N N N N N N N N N N N N M M M M
U
CIO
ZO o o o j o O O

O c~ 0 c~ `a p N ~= U
C;S
O C+ N

vj Q C e~ y Ar O A O
p~ 3¾ vs 3 3 0 3 b¾ b t= b w o U i 0 i o U i o b v x x x v ¾ a^ ¾ v~ 3 3 3 3 ~ v p U v p U U p U U Q a> i a~
o O CA ¾ a¾¾ a¾¾ a¾¾ a¾ Z z z Z
Qn, a. o E

r a~ o ~ C U
cd o o w fit N ~+ O
I1 L.~
U U

~o N 00 Cl o bA
z ` o v~

z a 0 o + z w z +~ O w O Q
cz ~, as W -y Q~
V 6> o 0 O O s Ln CA

'O O iii it N ¾+ C G~ d C1+

z z M o a d y y u w N iN
a s Q Q W -- N
N
.-a ! N
Q+~. N

o o CA

cn 00 y c con r.
w 04, N
IZ+ il, d d d d cn z a O Z N 00 O\

M
3 a Q

0 03 1=4 E
o an - O c"c 4 >1 v u cu ;..4 H u o 0 H o z 0 -d O a .., 0 o W .0 H a~ O
o A o 0 -d H O U 0. 404 CA
H p N

Loo 0-4 El b U
]C C 3 C> N y V y,,,b A 0 m "S 41 U
= E
cm 0 b o b H
U Oa CIS u ; Q 3 C) 4w4 ¾ W O C b o C45 (a) 0 r.
co) a~
> O A U -o U v W5 4.4 E
ry o 0 3 >, o 4, 0 a v, F~ nc ``" U U o Q o a a~i a a i A, > ."' 'd G U U ~'" N iG t~
03 d) U U H H U py = W a w' c y $-4 0 O Q) ti >
o o a U O
M
a H ~
U U U U S U

co~

y ~ a o cd Q+ y U ~' y 'O
U y , c? O
z b 3 -O N
U

o w o U
E~ 0 ~' p=
O CL b N
V+ h! S ti U

Vj Q O O ~ bA y C N y "O
U
c>d y O ~,, V >, y w U
O N r~r Gw cz N N 40. E-+
CID CA ca C ^O A ,~ ^ ~ O c~ ~, x "O N tN y >> ~p, Ur `~ Q c~ N ~CC cd d" U
d 'b "d ~r w y U G1 U
ed 0 o cW O O O Q .~ w z v, z y o y b b C7 co .. c .~ w y o 0 Q a~ v~
N O -= Gin it, 'b 0 >1 04 ,~ ZFi U =.V+ =~ 0 .O h 04 N y c~
> al N wO U Q -cqs .
> ?;r+ k 0< o I 3 ti O_ > co >..
o~i ?~ i1. a~ Pa O a0i cl v U a~
04 ej a4 0 o 1-4 W a4 04 40.
o oo Z y U W a t-+ r=, i S ~~, H U U
GO
;;.N
S ~ S

Q O
CA

con v U W w - - U

o~i0 b o yy RS
bA xO+ 2 O 4) .~ RS 3 N .+ a'S
U a) '~ Q Q O
CIO ' at v ~n O O U N '- b O
O Q cn ."O O =~ =w ..
y U N O t, O
40. o q 0 a u CZ Q b [ y ~7 r =.-r a~)+ b sn s. > v c - U GL C
G4 O V g 0 O
cts rA 4.4 co >1 cz j t'3 o o a) ,,y,y a, a4 '~ ~ ojj c~ O ^N~+ O
,O O rn N Lam. U G y A yNy V~ b h f~. >> =.. U W .. a+ eQ
c~ O a7 :3 0 cz Go A 'ti '" b c 0 co 0 0. u co 04 > aj t4.4 t=
O
rY O c~d ca v O CIO w 'o 03 0 0 (71 cqs aa) a w a a ,$ o o S a as a) Q d 0 y a a a 0 H

Claims (5)

1. A method and technology solution enabling Issuers of Retail Payment and Identification instruments to request approval from Users of these instruments in real time for the transactions initiated at and processed through legacy or non-legacy systems once the transaction authorization request is received from Acquirer or Network and before it is processed for approval by Issuer Host.
2. A method and technology solution enabling Issuers of Retail Payment and Identification instruments to authenticate Users of these instruments in real time in Issuer controlled environment for the transactions initiated at and processed through legacy or non-legacy systems once the transaction authorization request is received from Acquirer or Network and after the transaction has been approved by the User.
3. A method and technology solution enabling Issuers of Retail Payment and Identification instruments to request additional information from Users of these instruments in real time for the transactions initiated at and processed through legacy or non-legacy systems once the transaction authorization request is received from Acquirer or Network and before it is processed for approval by Issuer Host.
4. A method and technology solution enabling Users of Retail Payment and Identification instruments to review in real time details of the transaction initiated at legacy or non-legacy POA and approve or decline the transaction in a self controlled environment outside of POA and Acquirer environment.
5. A method and technology solution enabling Users of Retail Payment and Identification instruments to enter UVM in self controlled environment and transmission of UVM from the User application to the Issuer Host without ever capturing, receiving or storing any User or Payment / Identification instrument information on the application used for capturing and processing of UVM.
CA 2747642 2011-08-01 2011-08-01 User positive approval & authentication services Abandoned CA2747642A1 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CA 2747642 CA2747642A1 (en) 2011-08-01 2011-08-01 User positive approval & authentication services

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CA 2747642 CA2747642A1 (en) 2011-08-01 2011-08-01 User positive approval & authentication services

Publications (1)

Publication Number Publication Date
CA2747642A1 true CA2747642A1 (en) 2013-02-01

Family

ID=47625535

Family Applications (1)

Application Number Title Priority Date Filing Date
CA 2747642 Abandoned CA2747642A1 (en) 2011-08-01 2011-08-01 User positive approval & authentication services

Country Status (1)

Country Link
CA (1) CA2747642A1 (en)

Similar Documents

Publication Publication Date Title
US20240177154A1 (en) User positive approval and authentication services (upaas)
US20200286088A1 (en) Method, device, and system for securing payment data for transmission over open communication networks
US11995633B2 (en) Security system incorporating mobile device
RU2686003C2 (en) Electronic payment system
KR101946591B1 (en) Biometric solution enabling high throughput fare payments and system access
US20140297435A1 (en) Bank card secured payment system and method using real-time communication technology
US20130262295A1 (en) Digital emulation of cash-based transactions
US20180322501A1 (en) Systems and methods for registering for card authentication reads
CN109716373A (en) Cipher authentication and tokenized transaction
US20180130052A1 (en) Systems and methods for performing card authentication reads
US20040139014A1 (en) Anti-fraud remote cash transaction system
US11544718B2 (en) Trusted pair authentication with edge-computing devices
El Madhoun et al. An overview of the emv protocol and its security vulnerabilities
RU137815U1 (en) PAYMENT CARD HOLDER AUTHENTICITY INSPECTION SYSTEM
KR20160149596A (en) Method for providing financial service using virtual account
US20230137135A1 (en) Multi nodal authentication technology
CA2747642A1 (en) User positive approval &amp; authentication services
CN111386545A (en) Method and system for conducting transaction
US7320072B1 (en) Method and token for authenticating a control point
WO2011058376A1 (en) Payment authentication system and processing method
Pardhi et al. Electronic Cash Payment System
KR20160074313A (en) Apparatus and method for issuing check card
EP3474208A1 (en) System and method for performing transactions
Barisani et al. Practical EMV PIN interception and fraud detection
KR20100119229A (en) System and method for settling deferred payment and recording medium

Legal Events

Date Code Title Description
FZDE Dead

Effective date: 20170801