EP1269437A1 - Cooperative use of identification numbers for consumer transactions - Google Patents

Cooperative use of identification numbers for consumer transactions

Info

Publication number
EP1269437A1
EP1269437A1 EP00928125A EP00928125A EP1269437A1 EP 1269437 A1 EP1269437 A1 EP 1269437A1 EP 00928125 A EP00928125 A EP 00928125A EP 00928125 A EP00928125 A EP 00928125A EP 1269437 A1 EP1269437 A1 EP 1269437A1
Authority
EP
European Patent Office
Prior art keywords
computer
code
service
product
user
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Withdrawn
Application number
EP00928125A
Other languages
German (de)
French (fr)
Inventor
Richard Stewart Livingston Maguire
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Catalina Marketing International Inc
Original Assignee
Catalina Marketing International Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Catalina Marketing International Inc filed Critical Catalina Marketing International Inc
Publication of EP1269437A1 publication Critical patent/EP1269437A1/en
Withdrawn legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/02Marketing; Price estimation or determination; Fundraising
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/08Payment architectures
    • G06Q20/20Point-of-sale [POS] network systems
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/22Payment schemes or models
    • G06Q20/28Pre-payment schemes, e.g. "pay before"
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/30Payment architectures, schemes or protocols characterised by the use of specific devices or networks
    • G06Q20/34Payment architectures, schemes or protocols characterised by the use of specific devices or networks using cards, e.g. integrated circuit [IC] cards or magnetic cards
    • G06Q20/342Cards defining paid or billed services or quantities
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07FCOIN-FREED OR LIKE APPARATUS
    • G07F17/00Coin-freed apparatus for hiring articles; Coin-freed facilities or services
    • G07F17/42Coin-freed apparatus for hiring articles; Coin-freed facilities or services for ticket printing or like apparatus, e.g. apparatus for dispensing of printed paper tickets or payment cards
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07FCOIN-FREED OR LIKE APPARATUS
    • G07F7/00Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus
    • G07F7/02Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by keys or other credit registering devices
    • G07F7/025Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by keys or other credit registering devices by means, e.g. cards, providing billing information at the time of purchase, e.g. identification of seller or purchaser, quantity of goods delivered or to be delivered
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07GREGISTERING THE RECEIPT OF CASH, VALUABLES, OR TOKENS
    • G07G1/00Cash registers
    • G07G1/12Cash registers electronically operated
    • G07G1/14Systems including one or more distant stations co-operating with a central processing unit
    • G07G1/145PLU-management

Definitions

  • This invention relates generally to systems for issuing consumer entitlements in a retail store
  • the invention relates to systems for issuing promotions or certificates of the type that requires a unique personal identification number (PIN) to be conveyed to a customer receiving the item
  • PIN personal identification number
  • PINs are printed or encoded on valuable certificates awarded to customers and subject to authorization for various products and services
  • Each certificate must be resistant to fraud and must be secure from duplication Having random but valid unique numbers requires the creation and storage of the numbers in databases or on preprinted certificates.
  • the administration of such databases or certificates become expensive and is subject to fraud
  • the art relating to PIN generation is discussed in detail in United States Patent 5,892,827.
  • a marketing technique that has enjoyed increasing popularity is the awarding, at the point-of- sale, of a free product or service as an incentive to purchase other products or services
  • Typical marketing programs offer 5 or 10 minutes of long distance service as incentives to purchasing the sponsoring company's product, as potential prizes for participating in a marketing contest, or as premiums offered under a retailer's frequent shopper loyalty program, or simply as a product for purchase
  • This method entails the registration of the consumer and the issuance of a telephone "credit card" for which an account is established and is later credited with certain dollar amounts of telephone service based on the consumer's actions or purchases
  • Another method is to issue telephone "debit cards" to each consumer meeting the requirements of the particular marketing program
  • These debit cards are generally pre-authorized in 5 or 10 minute denominations The issuance of a debit card does not establish an account, but rather is authorized for the specified amount of telephone service and then becomes useless after the telephone time is exhausted.
  • PIN personal identification number
  • a dead card is one that has a PIN that must be activated by the retailer before distribution to the consumer Activating preset PINs is very expensive, time consuming and error prone Distributing dead cards with PINs that require activation is, therefore, inconvenient and is still prone to theft and misuse because some card suppliers preprint and assign the PINs in a uniform, predictable or unprotected manner Dishonest persons may dial the access number and enter PINs until they successfully access the service, or may look for a pattern in multiple PINs, and then resell the PIN and access numbers to different users Another potential problem is that some PIN sequences are purposely short, for the convenience of the user This creates a dangerous situation, since a computer dialer can more easily pick and decipher short PINs that are not encoded
  • Some prepaid telephone cards are sold or vended in enclosed plastic containers placed in a store display rack
  • the cashier selling such cards typically scans a bar code on the display itself, and a PIN is obtained by placing a call to the service provider
  • This bar-coded activation method fails to prevent fraud or misuse by others as the bar codes can be duplicated and used on more than one card A thief could steal one or more cards and purchase one to obtain the valid batch code, thus activating the stolen cards as well
  • the invention provides a computer implemented system and method for assuring security and validity of pseudo randomly numbered authorization codes, typically printed on certificates or stored in machine readable memory on user's cards, including a first algorithmic means on a first computer for generating an authorization code in response to a request, and a second algorithmic means on a second computer for determining if a code provided by a user is an authorization code that would be generated by said first algorithmic means.
  • the transmission of the second algorithmic means to the second computer obviates the requirement to transmit actual generated codes from the computer providing the authorization code to the computer determining if the code presented by a user is an authorized code.
  • the algorithm transmitted from the first computer, such as a retail store computer that functions to monitor transactions at point of sale (POS) terminals and kiosks of a store, to the second computer may either be the same algorithm used by the first computer, or the transmitted algorithm may be modified so that it functions by receiving a user's code and determining if the user's code is a code that could have been generated by the algorithm used in the first store. That is, the computer code defining the algorithm transmitted to the second computer may not have the ability to print or display codes, thereby preventing a user of the second computer from fraudulently obtaining and validating authorization codes. Instead the computer code defining the algorithm transmitted to the second computer may only have the ability to determine whether a code input to the second computer is valid in the sense that the code input into it is one that could be generated by the algorithm running on the first computer.
  • the authorization code contains a date indicating a date on which it was generated.
  • the product or service is a telecommunications services credit.
  • the product or service may be a discount on another product or service.
  • product or service is a product or service that is not provided by the retail store at which the user receives the authorization code.
  • the authorization code may include digits associated with the store at which the authorization code was generated
  • the authorization code generation algorithm generates a code only once
  • the method of the invention comprises the steps of detecting the occurrence of an event that has been preselected to trigger the generation of an authorization code for distribution to a customer of a retail store, generating a certificate or card storing in human or machine readable form the authorization code, the authorization codes generated in a seemingly random sequence by a pseudo random code generating algorithm to avoid deciphering of the algorithm, receiving at a second computer from a user a code, using an algorithm to determine if the received code from the user is one that would be generated by the algorithm, and if so, determining to provide the associated product or service associated with the code to the user If a determination is made to provide the associated product or service to the user, the product or service provider provides the product or service to the user
  • Figure 1 is a schematic of an embodiment of a novel computer system of the invention
  • Figure 2 is a flow chart of the process of a consumer receiving an authorization code for the system of Figure 1
  • FIG. 3 is a flowchart of the process of validating the authorization code for the system of Figure 1
  • FIG. 1 shows a first computer 1 connected to a POS terminal 2 and a kiosk 3 of a store 6
  • the POS terminal 2 includes means to enter transaction data and provide price information for transacting a sale with a customer POS terminals are well known in the art
  • the POS terminal 2 may include a machine means to identify products codes and a user identification, such as a bar code scanner (for scanning product identification bar codes on product items and user identification bar codes on user identification cards), a magnetic stripe reader for scanning magnetic media containing a user's identification number (such as a bank or credit card), a MICR coder reader for reading MICR codes on checks to obtain check authorization and to obtain a user identification
  • the POS terminal also includes a means to write an authorization code in either human readable form or machine readable form
  • the store 6 may also include a kiosk 3
  • a kiosk is a terminal of a computer system including a means for the customer to enter a payment (such as cash or a credit card) or a unique identification associated with the customer and a means for writing an authorization code in either human readable form or machine readable form
  • the POS terminal 2 and the kiosk 3 of the store 6 are each connected via a communication line with the first computer 1
  • the communication line may pass through network connections or other intermediaries
  • the first computer may be a store controller computer
  • the first computer 1 is connected via a communication line to a second computer 4
  • the second computer 4 is in communication with a user device 5.
  • the user device 5 may be a wire line telephone, a wire less telephone, or another computer.
  • the user device 5 may be any device that enables a user to transmit data signals conveying an authorization code to the second computer 4
  • step 10 the consumer takes action which results in a request signal transmitted from the POS terminal 2 or the kiosk 3 to the first computer 1 prompting generation of an authorization code.
  • the action by the consumer may be the purchase of an item at the POS terminal or the kiosk entitling the user to an authorization code for a product, service, or discount on a product or service, it may be an explicit request by the consumer to purchase an authorization code entitling the user to receive the product or the service, it may be based upon the customer's prior shopping history as recorded in a database associated with the first computer 1, or it may instead be based a promotional campaign in which each consumer at either the POS terminal 2 or the kiosk 3 are provided an authorization code
  • the first computer 1 generates an authorization code.
  • the first computer 1 transmits the generated code to the POS terminal or kiosk.
  • the POS terminal or kiosk records the authorization code in a recordable medium
  • the medium is paper and the code is in human readable digits, such as letters and numbers, and the printed paper includes a telephone number to call to obtain the authorized product or service
  • step 14 the second computer system 4 receives the code entered into the user device 5
  • step 21 the second computer system 4 executes an algorithm that determines if the code it received is one that could have been generated by the authorization code algorithm.
  • the product or service associated with the authorization code is prepaid telecommunication time.
  • the second computer system 4 determines that the code it received from the user device 5 is one that could have been generated by the authorization code algorithm, it queries the user device 5 for a telephone number to which to credit prepaid telecommunications time, receives a telephone number from the user device 5, and credits the account for that telephone number.
  • the second computer system 4 may also provide a dial around telephone number to the user device 5 and instruct the consumer to dial the dial around number as a precondition for using the credit obtained from the authorization code
  • the second computer system stores authorization numbers received from a user device and does not reauthorize any of those numbers

Landscapes

  • Business, Economics & Management (AREA)
  • Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Physics & Mathematics (AREA)
  • Accounting & Taxation (AREA)
  • Strategic Management (AREA)
  • General Business, Economics & Management (AREA)
  • Theoretical Computer Science (AREA)
  • Finance (AREA)
  • Development Economics (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Game Theory and Decision Science (AREA)
  • Entrepreneurship & Innovation (AREA)
  • Economics (AREA)
  • Marketing (AREA)
  • Microelectronics & Electronic Packaging (AREA)
  • Cash Registers Or Receiving Machines (AREA)
  • Electrically Operated Instructional Devices (AREA)

Abstract

The invention provides a computer implemented system and method for assuring security and validity of pseudo randomly numbered authorization codes, typically printed on certificates or stored in machine readable memory on user's cards, including a first algorithmic means on a first computer for generating an authorization code in response to a request, and a second algorithmic means on a second computer for determining if a code provided by a user is an authorization code that would be generated by said first algorithmic means. The transmission of the second algorithmic means to the second computer obviates the requirement to transmit actual generated codes from the computer providing the authorization code to the computer determining if the code presented by a user is an authorized code.

Description

COOPERATIVE USE OF IDENTIFICATION NUMBERS FOR CONSUMER TRANSACTIONS
BACKGROUND OF THE INVENTION
FIELD OF THE INVENTION
This invention relates generally to systems for issuing consumer entitlements in a retail store
More specifically, the invention relates to systems for issuing promotions or certificates of the type that requires a unique personal identification number (PIN) to be conveyed to a customer receiving the item
DISCUSSION OF THE BACKGROUND
PINs are printed or encoded on valuable certificates awarded to customers and subject to authorization for various products and services Each certificate must be resistant to fraud and must be secure from duplication Having random but valid unique numbers requires the creation and storage of the numbers in databases or on preprinted certificates. The administration of such databases or certificates become expensive and is subject to fraud The art relating to PIN generation is discussed in detail in United States Patent 5,892,827.
A marketing technique that has enjoyed increasing popularity is the awarding, at the point-of- sale, of a free product or service as an incentive to purchase other products or services Typical marketing programs offer 5 or 10 minutes of long distance service as incentives to purchasing the sponsoring company's product, as potential prizes for participating in a marketing contest, or as premiums offered under a retailer's frequent shopper loyalty program, or simply as a product for purchase With respect to marketing long distance telephone service, there are generally two methods employed One method entails the registration of the consumer and the issuance of a telephone "credit card" for which an account is established and is later credited with certain dollar amounts of telephone service based on the consumer's actions or purchases Another method is to issue telephone "debit cards" to each consumer meeting the requirements of the particular marketing program These debit cards are generally pre-authorized in 5 or 10 minute denominations The issuance of a debit card does not establish an account, but rather is authorized for the specified amount of telephone service and then becomes useless after the telephone time is exhausted. With both methods, the consumer is usually required to dial a toll-free number and provide a personal identification number (PIN) in order to activate the free service This PIN must be randomly generated prior to the issuance of the telephone credit/debit card so that verification of valid usage can be established prior to granting the free service
With each of the processes described above, there is a requirement that a physical card (similar to a consumer credit card) be issued to the consumer. The manufacture and delivery of these cards represents a significant expense and therefore can be cost prohibitive in many circumstances. In addition, there are security concerns inherent in the manufacture and delivery of the cards since someone other than the intended user could easily convert them for their own use (especially in the case of the debit card since the PIN is generally pre-printed on the card itself). Another limitation of the current methods of marketing telephone cards is the fact that the account and/or a PIN must be generated prior to the issuance of a card This can result in a time lag from the time the consumer complies with the offer and the time at which the telephone service is available (especially with respect to the credit card method). This limitation can also cause shortages or excess inventories of cards based on consumer demand (especially with respect to the debit card method)
Regardless of whether a certificate or award is presented to a consumer as an incentive to purchase selected products or simply in response to a request to purchase the service that the certificate provides, the difficulties described above have inhibited safe and efficient distribution of such certificates The following paragraphs discuss the problems that apply specifically to the distribution of prepaid service certificates, such as prepaid long-distance calling cards
Problems first arise at the manufacturing stage Cards are typically preprinted with the value in dollars or the time in minutes, in preset amounts, even though the consumer may prefer to have a different value or time. Moreover, preprinted cards have the further limitation that they contain fixed important information, such as an "800" toll-free number for accessing the service Access numbers may become overloaded and cause inconvenient delays for the user and new access numbers may have to be added to meet demand, but there is no convenient way to update this information on a pre-printed card Similarly, each preprinted card has a PIN (personal identification number) that must be used to activate the card, i e , turn it on for use The preprinting of PINs on the card exposes the value of the card to anonymous and usually untraceable theft Once the card is printed, its value can be stolen without physically taking the card itself The theft can take place anywhere from the printing source to the retail outlet It will be apparent that sending these "live" cards through a supply and distribution process is fraught with security risks The special handling adds to the cost and difficulty of marketing and selling remote value cards Unsuspecting consumers may purchase cards that are either depleted or being used by others purchased illegally The merchandising and sales of tamper resistant cards adds to the cost and effort for everyone Live cards with protected PINs must be treated as a near-cash item through the distribution and retailing process As a delivery of cards is made to a store, if it is not kept under lock and key or in the cash drawer it may be easily stolen, lost or misplaced The cards themselves are very small and easily concealed by unscrupulous employees or shoppers Therefore, suppliers and retailers of these cards are exposed to a very large financial risk in handling the cards If the value is taken illegally from a card, it is not possible for the retailer to accept the return or bill back the supplier
One solution is to distribute "dead" cards instead of "live" ones A dead card is one that has a PIN that must be activated by the retailer before distribution to the consumer Activating preset PINs is very expensive, time consuming and error prone Distributing dead cards with PINs that require activation is, therefore, inconvenient and is still prone to theft and misuse because some card suppliers preprint and assign the PINs in a uniform, predictable or unprotected manner Dishonest persons may dial the access number and enter PINs until they successfully access the service, or may look for a pattern in multiple PINs, and then resell the PIN and access numbers to different users Another potential problem is that some PIN sequences are purposely short, for the convenience of the user This creates a dangerous situation, since a computer dialer can more easily pick and decipher short PINs that are not encoded
Another proposed solution to the security problem is to use scratch-off coatings and removable tape covers over the PINs This has a limited effect because the "live" and valuable cards can still be stolen and used anonymously by dishonest persons, anywhere through the supply chain
Systems have been proposed in which prepaid cards are sold without a PIN The PIN is activated or attached to the card after is a call is made to a central computer that issues PINs In some systems of this type PINs may be downloaded in a batch, and then held until a card is purchased, at which time a PIN is attached to the preprinted portion of the card The principal limitation of this method is that a call must be made to a central computer to issue a PIN This slows the down the transaction and, in a retail environment, slows down the cashier while the computer is dialed and the PIN is issued Further, a dishonest or inattentive cashier could sell or give away the value of the PINs
Some prepaid telephone cards are sold or vended in enclosed plastic containers placed in a store display rack The cashier selling such cards typically scans a bar code on the display itself, and a PIN is obtained by placing a call to the service provider This bar-coded activation method fails to prevent fraud or misuse by others as the bar codes can be duplicated and used on more than one card A thief could steal one or more cards and purchase one to obtain the valid batch code, thus activating the stolen cards as well
It will be appreciated from the foregoing that prior art techniques for distributing certificates or cards redeemable for a valuable service all have practical difficulties that render the certificates or cards both inconvenient to the consumer and vulnerable to fraud or theft There is a need for a new approach for distributing such certificates or cards in a convenient manner without compromising the security of the valuable services that are obtained by use of the cards. The present invention satisfies this need, as briefly described in the following summary of the invention.
While the invention will be described mainly in connection with the awarding of free long distance telephone service, it is to be understood that the principles of the invention are also applicable to providing any award, at the point-of-sale, where the subsequent verification of the award can be accomplished without the need for a pre-established list of valid authorization codes.
SUMMARY OF THE INVENTION
The invention provides a computer implemented system and method for assuring security and validity of pseudo randomly numbered authorization codes, typically printed on certificates or stored in machine readable memory on user's cards, including a first algorithmic means on a first computer for generating an authorization code in response to a request, and a second algorithmic means on a second computer for determining if a code provided by a user is an authorization code that would be generated by said first algorithmic means. The transmission of the second algorithmic means to the second computer obviates the requirement to transmit actual generated codes from the computer providing the authorization code to the computer determining if the code presented by a user is an authorized code.
The algorithm transmitted from the first computer, such as a retail store computer that functions to monitor transactions at point of sale (POS) terminals and kiosks of a store, to the second computer may either be the same algorithm used by the first computer, or the transmitted algorithm may be modified so that it functions by receiving a user's code and determining if the user's code is a code that could have been generated by the algorithm used in the first store. That is, the computer code defining the algorithm transmitted to the second computer may not have the ability to print or display codes, thereby preventing a user of the second computer from fraudulently obtaining and validating authorization codes. Instead the computer code defining the algorithm transmitted to the second computer may only have the ability to determine whether a code input to the second computer is valid in the sense that the code input into it is one that could be generated by the algorithm running on the first computer.
Preferably, the authorization code contains a date indicating a date on which it was generated. Preferably, the product or service is a telecommunications services credit. The product or service may be a discount on another product or service. Typically, but not necessarily, product or service is a product or service that is not provided by the retail store at which the user receives the authorization code. The authorization code may include digits associated with the store at which the authorization code was generated Preferably the authorization code generation algorithm generates a code only once
Briefly, and in general terms, the method of the invention comprises the steps of detecting the occurrence of an event that has been preselected to trigger the generation of an authorization code for distribution to a customer of a retail store, generating a certificate or card storing in human or machine readable form the authorization code, the authorization codes generated in a seemingly random sequence by a pseudo random code generating algorithm to avoid deciphering of the algorithm, receiving at a second computer from a user a code, using an algorithm to determine if the received code from the user is one that would be generated by the algorithm, and if so, determining to provide the associated product or service associated with the code to the user If a determination is made to provide the associated product or service to the user, the product or service provider provides the product or service to the user
BRIEF DESCRIPTION OF THE DRAWINGS A more complete appreciation of the invention and many of the attendant advantages thereof will be readily obtained as the same becomes better understood by reference to the following detailed description when considered in connection with the accompanying drawings, wherein
Figure 1 is a schematic of an embodiment of a novel computer system of the invention, Figure 2 is a flow chart of the process of a consumer receiving an authorization code for the system of Figure 1 , and
Figure 3 is a flowchart of the process of validating the authorization code for the system of Figure 1
DESCRIPTION OF THE PREFERRED EMBODIMENTS
In the drawings, like reference numerals designate identical or corresponding parts throughout the several views, and Figure 1 shows a first computer 1 connected to a POS terminal 2 and a kiosk 3 of a store 6 The POS terminal 2 includes means to enter transaction data and provide price information for transacting a sale with a customer POS terminals are well known in the art The POS terminal 2 may include a machine means to identify products codes and a user identification, such as a bar code scanner (for scanning product identification bar codes on product items and user identification bar codes on user identification cards), a magnetic stripe reader for scanning magnetic media containing a user's identification number (such as a bank or credit card), a MICR coder reader for reading MICR codes on checks to obtain check authorization and to obtain a user identification The POS terminal also includes a means to write an authorization code in either human readable form or machine readable form
The store 6 may also include a kiosk 3 For the purposes of this invention, a kiosk is a terminal of a computer system including a means for the customer to enter a payment (such as cash or a credit card) or a unique identification associated with the customer and a means for writing an authorization code in either human readable form or machine readable form
The POS terminal 2 and the kiosk 3 of the store 6 are each connected via a communication line with the first computer 1 The communication line may pass through network connections or other intermediaries For example, there may be a store controller computer interposed in the communication line between the first computer 1 and the POS terminal 2 and kiosk 3. However, it is to be understood that the first computer may be a store controller computer
The first computer 1 is connected via a communication line to a second computer 4 There may be intermediary devices interposed along the communication line connecting the first computer 1 and the second computer 4 so long as the first computer 1 can communicate with the second computer 4.
The second computer 4 is in communication with a user device 5. The user device 5 may be a wire line telephone, a wire less telephone, or another computer. The user device 5 may be any device that enables a user to transmit data signals conveying an authorization code to the second computer 4
In figure 2, in step 10, the consumer takes action which results in a request signal transmitted from the POS terminal 2 or the kiosk 3 to the first computer 1 prompting generation of an authorization code. The action by the consumer may be the purchase of an item at the POS terminal or the kiosk entitling the user to an authorization code for a product, service, or discount on a product or service, it may be an explicit request by the consumer to purchase an authorization code entitling the user to receive the product or the service, it may be based upon the customer's prior shopping history as recorded in a database associated with the first computer 1, or it may instead be based a promotional campaign in which each consumer at either the POS terminal 2 or the kiosk 3 are provided an authorization code In step 11, the first computer 1 generates an authorization code. In step 12, the first computer 1 transmits the generated code to the POS terminal or kiosk. In step 13, the POS terminal or kiosk records the authorization code in a recordable medium In the preferred embodiment the medium is paper and the code is in human readable digits, such as letters and numbers, and the printed paper includes a telephone number to call to obtain the authorized product or service
In figure 3, in step 14, the second computer system 4 receives the code entered into the user device 5 In step 21, the second computer system 4 executes an algorithm that determines if the code it received is one that could have been generated by the authorization code algorithm.
In the preferred embodiment, the product or service associated with the authorization code is prepaid telecommunication time. In the preferred embodiment, if the second computer system 4 determines that the code it received from the user device 5 is one that could have been generated by the authorization code algorithm, it queries the user device 5 for a telephone number to which to credit prepaid telecommunications time, receives a telephone number from the user device 5, and credits the account for that telephone number. Optionally, the second computer system 4 may also provide a dial around telephone number to the user device 5 and instruct the consumer to dial the dial around number as a precondition for using the credit obtained from the authorization code Preferably, the second computer system stores authorization numbers received from a user device and does not reauthorize any of those numbers

Claims

I CLAIM:
1. A method for crediting a service or product, comprising the steps of: transmitting code defining an algorithm from a first computer to a second computer, said algorithm for generating authorization codes; receiving at the first computer a signal from a terminal in a retail store indicating an entitlement to credit for a product or service; using said algorithm in said first computer to generate an authorization code for said entitlement in response to receiving said signal; generating a certificate containing said authorization code at said terminal; receiving a user's code from a user at said second computer; and using said algorithm in said second computer to determine if said user's code is an authorization code in order to determine whether to provide said product or service to said user.
2. The method of claim 1 wherein said authorization code contains a date on which said signal was received at said first computer.
3. The method of claim 1 or 2 wherein said product or service is a telecommunications services credit.
4. The method of claim 1 or 2 wherein said product or service is a discount on another product or service.
5. The method of claim 1 wherein said product or service is not provided by said retail store.
6. A method for crediting a service or product, comprising the steps of: transmitting code defining a second algorithm to a second computer, said algorithm for determining if a user's code is an authorization code generated by a first algorithm; receiving at a first computer a signal from a terminal in a retail store indicating an entitlement to credit for a product or service; using code defining said first algorithm in said first computer to generate an authorization code for said entitlement in response to receiving said signal; generating a certificate containing said authorization code at said terminal; receiving a user's code from a user at said second computer; and using said second algorithm in said second computer to determine if said user's code is an authorization code generated by said first algorithm in order to determine whether to provide said product or service to said user.
7. The method of claim 6 wherein said authorization code contains a date on which said signal was received at said first computer.
8. The method according to claim 6 wherein said product or service is a telecommunications services credit.
9. The method of claim 6 wherein said product or service is a discount on another product or service.
10. The method of claim 6 wherein said product or service is not provided by said retail store.
11. A system for crediting a service or product, comprising: means for transmitting code defining an algorithm from a first computer to a second computer, said algorithm for generating authorization codes; means for receiving at the first computer a signal from a terminal in a retail store indicating an entitlement to credit for a product or service; means for using said algorithm in said first computer to generate an authorization code for said entitlement in response to receiving said signal; means for generating a certificate containing said authorization code at said terminal; means for receiving a user's code from a user at said second computer; and means for using said algorithm in said second computer to determine if said user's code is an authorization code in order to determine whether to provide said product or service to said user.
12. The system of claim 11 wherein said authorization code contains a date on which said signal was received at said first computer.
13. The system of claim 11 wherein said product or service is a telecommunications services credit.
14. The system of claim 11 wherein said product or service is a discount on another product or service.
15. The system of claim 11 wherein said product or service is not provided by said retail store.
16. A system for crediting a service or product, comprising the steps of: means for transmitting code defining a second algorithm to a second computer, said algorithm for determining if a user's code is an authorization code generated by a first algorithm; means for receiving at a first computer a signal from a terminal in a retail store indicating an entitlement to credit for a product or service; means for using code defining said first algorithm in said first computer to generate an authorization code for said entitlement in response to receiving said signal; means for generating a certificate containing said authorization code at said terminal; means for receiving a user's code from a user at said second computer; and means for using said second algorithm in said second computer to determine if said user's code is an authorization code generated by said first algorithm in order to determine whether to provide said product or service to said user.
17. The system of claim 16 wherein said authorization code contains a date on which said signal was received at said first computer.
18. The system according to claim 16 wherein said product or service is a telecommunications services credit.
19. The system of claim 16 wherein said product or service is a discount on another product or service.
20. The system of claim 16 wherein said product or service is not provided by said retail store.
21. A computer program product for instructing a computer system for crediting a service or product, comprising programming the computer system to provide the steps of: transmitting code defining a second algorithm to a second computer, said algorithm for determining if a user's code is an authorization code generated by a first algorithm; receiving at a first computer a signal from a terminal in a retail store indicating an entitlement to credit for a product or service; using code defining said first algorithm in said first computer to generate an authorization code for said entitlement in response to receiving said signal; generating a certificate containing said authorization code at said terminal; receiving a user's code from a user at said second computer; and using said second algorithm in said second computer to determine if said user's code is an authorization code generated by said first algorithm in order to determine whether to provide said product or service to said user.
22. A computer program comprising computer programming code means adapted to perform the steps of claim 1 or 6 when that program is run on a computer.
23. A method as claimed in claim 1 or 6 substantially as hereinbefore described with reference to, and as shown in the accompanying drawings.
24. A system as claimed in claim 1 or 6 substantially as hereinbefore described with reference to, and as shown in the accompanying drawings.
EP00928125A 2000-04-04 2000-05-09 Cooperative use of identification numbers for consumer transactions Withdrawn EP1269437A1 (en)

Applications Claiming Priority (3)

Application Number Priority Date Filing Date Title
GBGB0008248.7A GB0008248D0 (en) 2000-04-04 2000-04-04 Cooperative use of identification numbers for consumer transactions
GB0008248 2000-04-04
PCT/US2000/006708 WO2001075826A1 (en) 2000-04-04 2000-05-09 Cooperative use of identification numbers for consumer transactions

Publications (1)

Publication Number Publication Date
EP1269437A1 true EP1269437A1 (en) 2003-01-02

Family

ID=9889159

Family Applications (1)

Application Number Title Priority Date Filing Date
EP00928125A Withdrawn EP1269437A1 (en) 2000-04-04 2000-05-09 Cooperative use of identification numbers for consumer transactions

Country Status (10)

Country Link
EP (1) EP1269437A1 (en)
JP (1) JP2003529862A (en)
AU (1) AU2000246407A1 (en)
BE (1) BE1013467A3 (en)
CA (1) CA2403234A1 (en)
GB (1) GB0008248D0 (en)
IT (1) ITMI20001389A1 (en)
PT (1) PT102488A (en)
WO (1) WO2001075826A1 (en)
ZA (1) ZA200003075B (en)

Families Citing this family (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7155416B2 (en) * 2002-07-03 2006-12-26 Tri-D Systems, Inc. Biometric based authentication system with random generated PIN
US7725926B1 (en) 2004-08-23 2010-05-25 Hewlett-Packard Development Company, L.P. Authentication
WO2006086694A2 (en) * 2005-02-10 2006-08-17 Chariot Ip Holdings Llc Secure system for conducting electronic transactions and method for use thereof
CN109147227B (en) * 2018-07-17 2021-12-28 武汉云易虹科技有限公司 Certificate core code information acquisition system and method

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4819267A (en) * 1984-02-22 1989-04-04 Thumbscan, Inc. Solid state key for controlling access to computer systems and to computer software and/or for secure communications
JPH11501753A (en) * 1996-02-15 1999-02-09 カタリナ マーケティング インターナショナル,インク. Method and apparatus for generating a password for use in consumer promotion
US5892827A (en) * 1996-06-14 1999-04-06 Catalina Marketing International, Inc. Method and apparatus for generating personal identification numbers for use in consumer transactions
JP3117123B2 (en) * 1996-05-08 2000-12-11 勉 松本 Authentication type security system

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
See references of WO0175826A1 *

Also Published As

Publication number Publication date
PT102488A (en) 2001-10-31
ITMI20001389A1 (en) 2001-12-20
ITMI20001389A0 (en) 2000-06-20
JP2003529862A (en) 2003-10-07
GB0008248D0 (en) 2000-05-24
BE1013467A3 (en) 2002-02-05
WO2001075826A1 (en) 2001-10-11
ZA200003075B (en) 2001-01-24
CA2403234A1 (en) 2001-10-11
AU2000246407A1 (en) 2001-10-15

Similar Documents

Publication Publication Date Title
US5892827A (en) Method and apparatus for generating personal identification numbers for use in consumer transactions
US20020069104A1 (en) Method and apparatus for generating personal identification numbers for use in consumer transactions
EP0823106B1 (en) Method and apparatus for generating personal identification numbers for use in consumer promotions
AU706165B2 (en) Refundable prepaid telephone card
US6032859A (en) Method for processing debit purchase transactions using a counter-top terminal system
US6738749B1 (en) Methods and apparatus for creating and storing secure customer receipts on smart cards
US10055925B2 (en) System for voucher or token verification
US8175924B2 (en) Presentation instrument display and activation systems and methods
US20040111322A1 (en) Multi-function transaction processing system
US20060015402A1 (en) Using multiple PINs for redemption through multiple distribution channels
US8430298B2 (en) Presentation instrument package arrangement
US20030009382A1 (en) Customer identification, loyalty and merchant payment gateway
WO1996038801A1 (en) Methods and apparatus for providing a prepaid, remote entry customer account
WO2000042486A2 (en) System and method for performing secure credit card purchases
EP1297500A2 (en) A multi-function transaction processing system
US7533814B2 (en) Presentation instrument with user-created pin
CA2346410A1 (en) Process, system and computer readable medium for providing a prepaid fuel card and using a personal identification as a prepaid fuel card
WO2001075826A1 (en) Cooperative use of identification numbers for consumer transactions
CN101305380A (en) Presentation tool display and activation system and method
WO2010094109A1 (en) Apparatus and system for the sale of value from value cards

Legal Events

Date Code Title Description
PUAI Public reference made under article 153(3) epc to a published international application that has entered the european phase

Free format text: ORIGINAL CODE: 0009012

17P Request for examination filed

Effective date: 20020930

AK Designated contracting states

Kind code of ref document: A1

Designated state(s): AT BE CH CY DE DK ES FI FR GB GR IE IT LI LU MC NL PT SE

AX Request for extension of the european patent

Free format text: AL;LT;LV;MK;RO;SI

STAA Information on the status of an ep patent application or granted ep patent

Free format text: STATUS: THE APPLICATION IS DEEMED TO BE WITHDRAWN

18D Application deemed to be withdrawn

Effective date: 20061201