EP4200782A1 - A multiple payee digital transaction authentication method - Google Patents
A multiple payee digital transaction authentication methodInfo
- Publication number
- EP4200782A1 EP4200782A1 EP21862317.1A EP21862317A EP4200782A1 EP 4200782 A1 EP4200782 A1 EP 4200782A1 EP 21862317 A EP21862317 A EP 21862317A EP 4200782 A1 EP4200782 A1 EP 4200782A1
- Authority
- EP
- European Patent Office
- Prior art keywords
- payee
- payment
- transaction
- account number
- request
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000000034 method Methods 0.000 title claims abstract description 59
- 238000012795 verification Methods 0.000 claims description 45
- 238000010200 validation analysis Methods 0.000 claims description 5
- 238000010586 diagram Methods 0.000 description 4
- 230000001419 dependent effect Effects 0.000 description 3
- 239000003814 drug Substances 0.000 description 3
- 230000000694 effects Effects 0.000 description 3
- 238000013475 authorization Methods 0.000 description 2
- 230000008901 benefit Effects 0.000 description 2
- 238000013507 mapping Methods 0.000 description 2
- 230000004308 accommodation Effects 0.000 description 1
- 230000003542 behavioural effect Effects 0.000 description 1
- 229910002056 binary alloy Inorganic materials 0.000 description 1
- 238000011161 development Methods 0.000 description 1
- 230000018109 developmental process Effects 0.000 description 1
- 229940079593 drug Drugs 0.000 description 1
- 230000001815 facial effect Effects 0.000 description 1
- 230000000977 initiatory effect Effects 0.000 description 1
- 230000007246 mechanism Effects 0.000 description 1
- 238000003909 pattern recognition Methods 0.000 description 1
- 238000012545 processing Methods 0.000 description 1
- 210000001525 retina Anatomy 0.000 description 1
- 238000001356 surgical procedure Methods 0.000 description 1
- 210000003462 vein Anatomy 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/382—Payment protocols; Details thereof insuring higher security of transaction
- G06Q20/3829—Payment protocols; Details thereof insuring higher security of transaction involving key management
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/30—Payment architectures, schemes or protocols characterised by the use of specific devices or networks
- G06Q20/36—Payment architectures, schemes or protocols characterised by the use of specific devices or networks using electronic wallets or electronic money safes
- G06Q20/367—Payment architectures, schemes or protocols characterised by the use of specific devices or networks using electronic wallets or electronic money safes involving electronic purses or money safes
- G06Q20/3674—Payment architectures, schemes or protocols characterised by the use of specific devices or networks using electronic wallets or electronic money safes involving electronic purses or money safes involving authentication
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/382—Payment protocols; Details thereof insuring higher security of transaction
- G06Q20/3821—Electronic credentials
- G06Q20/38215—Use of certificates or encrypted proofs of transaction rights
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/385—Payment protocols; Details thereof using an alias or single-use codes
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/40—Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
- G06Q20/401—Transaction verification
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/40—Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
- G06Q20/401—Transaction verification
- G06Q20/4014—Identity check for transactions
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/40—Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
- G06Q20/401—Transaction verification
- G06Q20/4014—Identity check for transactions
- G06Q20/40145—Biometric identity checks
Definitions
- the present invention relates to a multiple payee digital transaction authentication method and finds particular, although not exclusive, utility in providing a digital transaction authentication method in which a plurality of payees or merchants are provided with unique transaction credentials.
- merchants have the capability to process payments by taking a 16-digit primary account number, an expiry date in YYMM format, and a card verification code/value (CVC/CVV), usually found on a bank or credit card, from a customer or payer.
- CVC/CVV card verification code/value
- exposing these transaction credentials to a merchant over a network, such as the Internet may be viewed as a security risk.
- message authentication codes or similar mechanisms One such method is by paying via a mobile wallet application on a smart device, such as a smart phone or smart watch.
- the smart device may store a token, which may be a 16-digit number, that is unique to the device. Furthermore, the device may store a set of keys capable of creating unique cryptograms. A fingerprint or face scan may be taken to create a cryptogram. For each transaction made from the device, the device will send the token along with a unique cryptogram created by the set of keys. Each transaction wil l have a unique cryptogram that can only be used once, for the transaction for which it was created, and is, as such, single use. The 16-digit token and the cryptogram may be used to facilitate the transaction. Accordingly, even if the token and/or a cryptogram is exposed or otherwise obtained by an unauthorised person, it cannot be used to facilitate a further payment, thereby providing some security.
- a user may use their smart device to purchase an item or a service from several merchants with a single transaction.
- a single transaction may be used to purchase a flight from an airline, a car hire from a hire company, and a hotel room booking from a hotel.
- the token is provided along with only a single unique cryptogram. Accordingly, there is not a unique ciyptogram for each of the three merchants requiring payment, which means that payments cannot be secured using the single use cryptogram.
- Another example of when a single transaction may be used to pay several merchants is when a medical bill is to be paid.
- a single monetary amount may be presented for payment.
- this single monetary amount will typically include payment for many services, medicines and other goods that may each be supplied by separate merchants. Accordingly, the single cryptogram provided with the token may not be suitable to allow for a transaction with each of the merchants.
- Objects and aspects of the present invention seek to alleviate at least these problems and improve prior known digital transaction authentication methods.
- a multiple payee digital transaction authentication method comprising: receiving a transaction request including a cryptographic payer identifier and payment information including at least two payees and corresponding payment amounts; authenticating the transaction request based on the cryptographic payer identifier; and providing each of the at least two payees with a unique account number, unique expiry data and a unique verification code which is usable by the payee to facilitate payment of the corresponding payment amount from the payer, wherein: the account number, the expiry data and the verification code are bound using a cryptographic process ; and one of the account number, the expiry data and the verification code is time limited such that a payment request from the respective payee is facilitated only if the payment request is received within a predetermined length of time of the account number, the expiiy data and the verification code being provided.
- a key advantage of the present invention is that unique and secure transaction credentials may be provided to several merchants or payees, such that secure payments may be made to several payees.
- the provision of an account number, expiry data and a verification code may be suitable for use in legacy payment system which typically require a primary account number, an expiry date and a card verification code/value.
- a payee may use the account number, the expiry data and the verification code to process a payment via legacy digital payment systems wherein the account number takes place of the primary account number, the expiry data takes place of the expiry date and the verification code takes place of the card verification code/value (CVC/CVV).
- CVC/CVV card verification code/value
- a multiple payee digital transaction may be a transaction in which a single payer pays a plurality of payees.
- the transaction may be carried out via a broker or a third party.
- a user, the payer may book a holiday via an online travel shopping company.
- the holiday booking may include a flight booking, a hotel booking, and a car hire booking.
- Each of these bookings may be made with different providers.
- the single holiday booking made by the user with the online travel shopping company includes three bookings, each with different providers.
- a user, the payee may have required medical treatment.
- the treatment may include an ambulance, an x-ray, surgery and the user may be provided with medicine to be administered at home. Each of these services and the medicine may each be provided by a different merchant. Accordingly, the treatment may include several different merchants, paid via a single medical bill transaction.
- Receiving a transaction request may mean that a request for a payment is received.
- the transaction request may be received from the payer.
- the transaction request may be received from a broker or a third party, such as an online travel shopping company.
- a cryptographic payer identifier may be generated by the payer’s digital device, such as a smart phone.
- Payment information may include an amount of money due, goods and/or services requested, a date of payment and/or any other information related to a transaction.
- the payment information may include payment amounts that may be monetary amounts to be paid to each respective payee.
- At least two payees may mean only two payees.
- the method may be used to pay more than two payees.
- the present invention provides a method which allows for secure payments to be made to several payees.
- Authenticating the transaction request may mean that the transaction request is checked or otherwise considered and is verified as being a genuine request from the payer. Authentication is important to reduce or eliminate fraudulent transactions.
- Providing each of the at least two payees with a unique account number, unique expiry data and a unique verification code may allow the payee to facilitate payment from the payer without providing payer information typically required to facilitate a payment, such as the primary account number, expiry date and card verification code/value. Accordingly, there is less exposure of the payer’s financial details which may reduce the risk or opportunity for fraudulent activity involving the payer’s details.
- the account number, the expiry data and the verification code being cryptographically bound may mean that the integrity and use of these pieces of information is protected, which may also reduce the risk or opportunity for fraudulent activity involving the payer’s details.
- One of the account number, the expiry data and the verification code being time limited may mean that a payment may not be facilitated using the time limited information if the predetermined time period has expired. In this way, some certainty regarding the time and/or date of the payment may be provided and payments outside of an allowable period may be barred.
- One or more of the account number, the expiry data and the verification code provided to a payee may include a payee identifier.
- the payee identifier may correspond to the payee to which the account number, the expiry data and the verification code are provided. In this way. the identity of the payee may be derivable from this information. Furthermore, when this information is received back from the payee, to facilitate a payment or otherwise, the identity of the payee may be established and/or verified.
- the method may further comprise receiving a payee request for payment of the payment amount from a payee.
- the payee request may include the account number, the expiry data and the verification code.
- the method may further comprise comparing the payee identifier with an identity of the payee from which the payee request is received. In this way, the source of the request from the payee for payment of the payment amount may be verified in that the identity of the payee from which the payee request is received may be matched to the payee identifier.
- the method may further comprise facilitating payment of the payment amount from the payer to the payee only if the payee identifier and the identity of the payee from which the payee request is received match. Accordingly, some verification of the payee identity is required to facilitate payment from the payer to the payee. Therefore, the likelihood of a fraudulent payment being facilitated is reduced.
- a transaction that is not facilitated may be given further consideration to determine whether fraudulent activity has been attempted, and any such determinations may be provided to the relevant law or standards agency.
- the predetermined length of time may be 24 hours. In this way, typical generation and management of date control may be used, without requiring amendment to typical and widely used transaction practices.
- the method may further comprise receiving a further transaction request from the respective payee.
- the further transaction request may include a further payment amount and the account number and the expiry data.
- the further transaction request may be a request for payment for goods and/or services not covered by the original transaction.
- the original transaction may be payment for a hotel room
- the further transaction request may be for payment for items consumed from the hotel room mini bar, after the guest has left the hotel.
- One of the account number and the expiiy data may include the payee identifier. Accordingly, the payee may be identified, and the further payment facilitated, without need of the verification code.
- the method may further comprise facilitating payment of the further payment amount from the payer to the payee.
- a further transaction may occur.
- the payee may receive payment for goods and or services not covered by the original transaction.
- the original transaction may be a consumer initiated transaction and is, as such, initiated by the payer by submitting the transaction request.
- the further transaction may be a merchant initiated transaction and is, as such, initiated by a payee by submitting the further transaction request without the involvement of the payer.
- the further transaction may be a refund which may be considered to be initiated by the consumer, but may not require the verification code.
- the further payment may be facilitated if the further transaction request is received withi n a further predetermined time of receipt of the transaction request.
- the further predetermined time may be dependent on the type of business and/or another characteristic of the payee. For example, it is common for further payments to be made to a hotel or a car hire company, whereas it may be unusual for a further payment to be made to a clothing store. Accordingly, upon receipt of a further payment request wherein a further payment request is not expected or is unusual, further checks may be undertaken and/or the further payment request may be denied.
- the unique account number, unique expiry data and/or the unique verification code may be recycled once it is no longer usable due to expiry of the further predetermined time or when a merchant initiated transaction would require a new consumer initiated transaction to be approved using newly created credentials. In this way, a finite number of unique account numbers, unique expiry data and/or the unique verification codes may be continually used.
- the further payment may be facilitated if the further transaction request conforms to predetermined criteria selected from the list: a payment amount, a number of previous payments and/or a characteristic of the payee. In this way, a check is applied to further payments, thereby improving security.
- the further payment may be facilitated if the further transaction request includes reference to a previously facilitated payment from the payer to the respective payee. In this way, the further payment may only be facilitated if it follows an original payment authorised by the payer.
- the cryptographic payer identifier may comprise a proof of biometric authentication.
- the biometric authentication proof may be obtained via an authentication method.
- the authentication method may comprise a fingerprint identification, facial recognition, a retina scan, an iris scan, a palm vein scan, a hand geometry scan, voice analysis, behavioural pattern recognition or any combination thereof.
- the cryptographic payer identifier may comprise a password, a passcode, a personal identification number (PIN), security questions and corresponding answers, a verification code received by the user via their device, an identification token from a list or any combination thereof.
- PIN personal identification number
- the payee identifier may comprise sufficient information such that at least 16 payees can be assigned a unique payee identifier.
- the payee identifier may comprise at least 4 characters, or bits. For example, if the payee identifier is expressed in a binary system, 4 binary characters allows for 16 unique payee identifiers to be provided, whereas 5 binary characters allows for 32 unique payee identifiers to be provided. The number of characters used for the payee identifier may be dependent on the expected number of payees.
- the account number and the validation code may be provided as a character string.
- the characters may be numbers 0 to 9, letters A to Z, values from any other character set or a combination thereof.
- the character string may include 18 character positions. Positions 1 to 15 may relate to the account number. Positions 16 to 18 may relate to the validation code. Other combinations are envisaged.
- the character string may include 19 character positions, with positions 1 to 16 relating to the account number and positions 17 to 19 relating to the verification code.
- the character strong may comprise a checksum. The checksum may be computer over, or related to, a subset or the entire list of characters.
- the payee may be required to delete, wipe or othenvise destroy the verification code after the original transaction, as is typically required by law or official standards, for example PCI compliance.
- the payee may retain the account number and the expiry data such that a further payment may be requested and facilitated.
- the transaction request may be received from a user, the payer, via a mobile wallet application on a user device.
- the transaction request may be received via Apple Pay, Google Pay, or some other application capable of sending a transaction request including a cryptogram.
- the user device may be a smart device.
- the user device may be a smart phone, a smart watch, smart eyewear, an RFID chip, or any other suitable device.
- the generation of the transaction request may be delegated to a service provider when no user device is available to deliver the transaction request.
- the expiry data and the verification code may be time limited such that the payment request from the respective payee is facilitated only if the payment request is received within the predetermined length of time of the account number, the expiry data and the verification code being provided.
- a broker or third party such as an online travel shopping company, may receive the transaction request and forward the transaction request to a payment facilitator.
- the broker or third party may also provide a number of payees to be paid.
- the payment facilitator may then, after authenticating the transaction request, provide each of the payees, directly or via the broker or third party, with a unique account number, unique expiry data and a unique verification code.
- a list of mapping information between the transaction request and the account number, the expiry data and the verification code provided to each payee may be stored.
- the list of mapping information may be accessed and used by a payment authorisation system.
- a computer readable storage medium system configured to store computer executable code that when executed by a computer configures the computer to carry out the method of the first aspect of the present invention.
- Figure 1 is a first schematic process diagram showing a method of authenticating a payment and providing unique transaction credentials to multiple merchants
- Figure 2 is a second schematic process diagram showing a method of authenticating and facilitating a secure remote transaction via an online travel provider.
- FIG. 1 is a first schematic process diagram 100 showing a method of authenticating a payment and providing unique transaction credentials to multiple merchants.
- the method 100 includes receiving a transaction request 110 from a user.
- the transaction request 110 includes a cryptogram which allows the identity of the user to be verified.
- the user will typically submit the payment request from a digital device, such as a smart phone, which has the capability to take a biometric scan or otherwise verify the identity of the user.
- the transaction request 110 also includes payment information including details of at least two merchants and monetary values to be paid to each of the merchants.
- the transaction request 1 10 may be received via a third party, which may provide some or all of the payment information.
- the transaction request 110 is then authenticated 120 based on the cryptogram provided in the transaction request 110, such that the likelihood of fraudulent or otherwise unauthorised transactions being allowed is reduced.
- transaction credential s are provided to each of the merchants 130, 140.
- the transaction credentials include a unique account number, unique expiry data and a unique verification code.
- the merchants 130, 140 can then use the transaction credentials to process payments using legacy transaction systems which require a primary account number, an expiiy date and a card verification code/value. To ensure transaction security, the account number, the expiiy data and the verification code are cryptographically bound.
- one of the account number, the expiry data and the verification code is time limited such that it may only be used to successfully process a transaction within a predetermined time period.
- the predetermined time period may be 24 hours.
- Figure 2 is a second schematic process diagram 200 showing a method of authenticating and facilitating a secure remote transaction via an online travel provider.
- a user via a user device 210, may browse the website or an app of an online travel provider and select a holiday package to book.
- the holiday package may be displayed on the website or app as a single purchasable item, but in reality the holiday package may include several purchases bundled into one larger purchase.
- the holiday package may include a flight booking, transport, and accommodation. Accordingly, payments may be due to an airline 230, a hire company 240 and a hotel 250, or other similar providers. As such, the payment facilitator 220 will provide unique transaction credentials to the airline 230, the hire company 240 and the hotel 250.
- the airline 230 may then use the unique transaction credentials provided to them by the payment facilitator 220 to undertake a Consumer Initiated Transaction (CIT) 260 to take payment for the airline’s 230 portion of the holiday package.
- CIT Consumer Initiated Transaction
- the airline 230 may make use of existing legacy payment systems to process the payment. Once the CIT 260 has been undertaken, the airline may be required to delete the verification code provided to them, to comply with law or regulation.
- the hire company 240 may also use the unique transaction credentials provided to them by the payment facilitator 220 to undertake a Consumer Initiated Transaction (CIT) 270 to take payment or pre-authorize a given amount for their portion of the holiday package.
- CIT Consumer Initiated Transaction
- the hire company 240 may make use of existing legacy payment systems to process the payment. Once the CIT 270 has been undertaken, the hire company may be required to delete the verification code provided to them, to comply with law or regulation.
- the hotel 250 may also use the unique transaction credentials provided to them by the payment facilitator 220 to undertake a Consumer Initiated Transaction (CIT) 280 to take payment for the hotel’s 250 portion of the holiday package or use a pre-authorization process to get the assurance that the card is in good standing, with the full outstanding amount charged on checkout using one or more Merchant Initiation Transactions (MITs).
- CIT Consumer Initiated Transaction
- MITs Merchant Initiation Transactions
- the hotel 250 may make use of existing legacy payment systems to process the payment. Once the CIT 280 has been undertaken, the hotel may be required to delete the verification code provided to them, to comply with law or regulation.
- each of the airline 230, the hire company 240 and the hotel 250 will have received the payment due to them for the holiday package or will have received assurance that later payment via the processing of one or more MITs is possible.
- the user may also make use of services, or consume goods, whilst on the holiday that were not covered by the original payment.
- the airline 230, the hire company 240 and/or the hotel 250 may undertake one or more Merchant Initiated Transactions (MIT) to take payment for these services or goods.
- MIT Merchant Initiated Transactions
- the stored account number and expiry data may be used to process the MITs via legacy payment systems.
- the allowability of MITs may be decided by the payment facilitator 220, based on a number of predetermined criteria such as a previous approval of a corresponding CH', time since the CIT, a value of the MIT, or the number of MITs already allowed.
- the airline 230 may undertake a first MIT 262 to take payment for excess baggage not covered by the original booking. Furthermore, the airline 230 may undertake a second MI T 264 for a upgrade package requested after the original CIT 260 has been completed. The hotel 250 may also undertake a single MIT 282 to take payment for items taken from a minibar that were not paid for upon check out. Other additional goods and services are envisaged.
- Figures 1 and 2 may include further steps.
- the sequence of steps shown does not exclude preceding, intermediate or following steps.
- any suitable digital device may be used, such as a smart watch.
- Figure 1 has been described above in relation to two merchants. However, other numbers of merchants are envisaged, and the number of merchants is dependent on the specific transaction.
- An exemplar predetermined time period of 24 hours is discussed above. However, other time periods are contemplated.
- the transaction credentials described above may include further information and is not limited to including only the information detailed above.
- Figure 2 is described in relation to a transaction with an online travel provider. However, it is to be understood that the method described is applicable to any scenario in which a single transaction request is used to facilitate payment of two or more merchants. For example, any type of package payment, such as a medical bill, may be facilitated with the method described above.
- Figure 2 is described in relation to three merchants, it is to be understood that the method is application to scenarios in which any two or more merchants require payment.
Landscapes
- Business, Economics & Management (AREA)
- Accounting & Taxation (AREA)
- Engineering & Computer Science (AREA)
- Finance (AREA)
- Strategic Management (AREA)
- Physics & Mathematics (AREA)
- General Business, Economics & Management (AREA)
- General Physics & Mathematics (AREA)
- Theoretical Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
Abstract
Description
Claims
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
GB2013230.4A GB2598311A (en) | 2020-08-24 | 2020-08-24 | A multiple payee digital transaction authentication method |
PCT/US2021/041872 WO2022046311A1 (en) | 2020-08-24 | 2021-07-15 | A multiple payee digital transaction authentication method |
Publications (2)
Publication Number | Publication Date |
---|---|
EP4200782A1 true EP4200782A1 (en) | 2023-06-28 |
EP4200782A4 EP4200782A4 (en) | 2024-08-07 |
Family
ID=72660912
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
EP21862317.1A Pending EP4200782A4 (en) | 2020-08-24 | 2021-07-15 | A multiple payee digital transaction authentication method |
Country Status (3)
Country | Link |
---|---|
EP (1) | EP4200782A4 (en) |
GB (1) | GB2598311A (en) |
WO (1) | WO2022046311A1 (en) |
Family Cites Families (13)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7953671B2 (en) * | 1999-08-31 | 2011-05-31 | American Express Travel Related Services Company, Inc. | Methods and apparatus for conducting electronic transactions |
US7996288B1 (en) * | 2000-11-15 | 2011-08-09 | Iprivacy, Llc | Method and system for processing recurrent consumer transactions |
US6908030B2 (en) * | 2001-10-31 | 2005-06-21 | Arcot Systems, Inc. | One-time credit card number generator and single round-trip authentication |
US8700729B2 (en) * | 2005-01-21 | 2014-04-15 | Robin Dua | Method and apparatus for managing credentials through a wireless network |
US8249985B2 (en) * | 2007-11-29 | 2012-08-21 | Bank Of America Corporation | Sub-account mechanism |
WO2010099352A1 (en) * | 2009-02-25 | 2010-09-02 | Miri Systems, Llc | Payment system and method |
WO2012142131A2 (en) * | 2011-04-11 | 2012-10-18 | Visa International Service Association | Interoperable financial transactions via mobile devices |
US20130218769A1 (en) * | 2011-08-23 | 2013-08-22 | Stacy Pourfallah | Mobile Funding Method and System |
US11836706B2 (en) * | 2012-04-16 | 2023-12-05 | Sticky.Io, Inc. | Systems and methods for facilitating a transaction using a virtual card on a mobile device |
US8706557B1 (en) * | 2013-05-08 | 2014-04-22 | Visa International Service Association | Systems and methods to identify merchants |
US20150371234A1 (en) * | 2014-02-21 | 2015-12-24 | Looppay, Inc. | Methods, devices, and systems for secure provisioning, transmission, and authentication of payment data |
US10692085B2 (en) * | 2015-02-13 | 2020-06-23 | Yoti Holding Limited | Secure electronic payment |
US10510074B1 (en) * | 2019-02-01 | 2019-12-17 | Capital One Services, Llc | One-tap payment using a contactless card |
-
2020
- 2020-08-24 GB GB2013230.4A patent/GB2598311A/en not_active Withdrawn
-
2021
- 2021-07-15 WO PCT/US2021/041872 patent/WO2022046311A1/en unknown
- 2021-07-15 EP EP21862317.1A patent/EP4200782A4/en active Pending
Also Published As
Publication number | Publication date |
---|---|
GB2598311A (en) | 2022-03-02 |
WO2022046311A1 (en) | 2022-03-03 |
EP4200782A4 (en) | 2024-08-07 |
GB202013230D0 (en) | 2020-10-07 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US10460397B2 (en) | Transaction-history driven counterfeit fraud risk management solution | |
US20220114591A1 (en) | Payer-controlled payment processing | |
US11080678B2 (en) | Payment processing platform | |
US7849014B2 (en) | System and method for facilitating a financial transaction with a dynamically generated identifier | |
RU2651179C2 (en) | Method and system to enable mobile contactless ticketing/payments via mobile phone application | |
US20090281951A1 (en) | Payment Processing Platform | |
US20150178753A1 (en) | System and method for reconciliation of non-currency related transaction account spend | |
US20090012901A1 (en) | Multifactor authentication system for "cash back" at the point of sale | |
US20070094152A1 (en) | Secure electronic transaction authentication enhanced with RFID | |
US20060076400A1 (en) | Limited use pin system and method | |
US20070185782A1 (en) | Method for anonymous purchase of goods by not providing identifying information to a non-host entity | |
US20090089211A1 (en) | System and method for person to person fund transfer | |
KR100841750B1 (en) | Electronic funds transfers-zipfund | |
EP2245583A1 (en) | Dynamic card verification value | |
US20130268439A1 (en) | Vtex3 fraud protection system mobile verification protocol (mvp) | |
US20190220881A1 (en) | Systems, methods and computer readable media for creating and processing a digital voucher | |
US20130159188A1 (en) | Automatic user validation system and method | |
WO2009137716A2 (en) | Payment processing platform | |
US20170046665A1 (en) | Payment Approval Platform | |
US20160328717A1 (en) | BioWallet Biometrics Platform | |
US11663582B1 (en) | Intermediary payment system and method for protecting a payor's payment card data | |
US20170046697A1 (en) | Payment Approval Platform | |
US11669825B2 (en) | Peer-to-peer prepaid card management system | |
EP4200782A1 (en) | A multiple payee digital transaction authentication method | |
US11227274B2 (en) | Computer system and computer-implemented method for processing a cashless payment transaction via a point-of-sale terminal |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
STAA | Information on the status of an ep patent application or granted ep patent |
Free format text: STATUS: THE INTERNATIONAL PUBLICATION HAS BEEN MADE |
|
PUAI | Public reference made under article 153(3) epc to a published international application that has entered the european phase |
Free format text: ORIGINAL CODE: 0009012 |
|
STAA | Information on the status of an ep patent application or granted ep patent |
Free format text: STATUS: REQUEST FOR EXAMINATION WAS MADE |
|
17P | Request for examination filed |
Effective date: 20230210 |
|
AK | Designated contracting states |
Kind code of ref document: A1 Designated state(s): AL AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HR HU IE IS IT LI LT LU LV MC MK MT NL NO PL PT RO RS SE SI SK SM TR |
|
DAV | Request for validation of the european patent (deleted) | ||
DAX | Request for extension of the european patent (deleted) | ||
A4 | Supplementary search report drawn up and despatched |
Effective date: 20240708 |
|
RIC1 | Information provided on ipc code assigned before grant |
Ipc: G06Q 20/40 20120101AFI20240702BHEP |