GB2366007A - Credit and charge card security technology and mechanism for e-commerce - Google Patents

Credit and charge card security technology and mechanism for e-commerce Download PDF

Info

Publication number
GB2366007A
GB2366007A GB0002968A GB0002968A GB2366007A GB 2366007 A GB2366007 A GB 2366007A GB 0002968 A GB0002968 A GB 0002968A GB 0002968 A GB0002968 A GB 0002968A GB 2366007 A GB2366007 A GB 2366007A
Authority
GB
United Kingdom
Prior art keywords
transaction
card
vendor
unique
cardholder
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
GB0002968A
Other versions
GB0002968D0 (en
GB2366007B (en
Inventor
Roy William Buckland
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to GB0002968A priority Critical patent/GB2366007B/en
Publication of GB0002968D0 publication Critical patent/GB0002968D0/en
Publication of GB2366007A publication Critical patent/GB2366007A/en
Application granted granted Critical
Publication of GB2366007B publication Critical patent/GB2366007B/en
Anticipated expiration legal-status Critical
Expired - Fee Related legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07FCOIN-FREED OR LIKE APPARATUS
    • G07F7/00Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus
    • G07F7/08Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means
    • G07F7/10Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means together with a coded signal, e.g. in the form of personal identification information, like personal identification number [PIN] or biometric data
    • G07F7/1008Active credit-cards provided with means to personalise their use, e.g. with PIN-introduction/comparison system
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/02Payment architectures, schemes or protocols involving a neutral party, e.g. certification authority, notary or trusted third party [TTP]
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/02Payment architectures, schemes or protocols involving a neutral party, e.g. certification authority, notary or trusted third party [TTP]
    • G06Q20/023Payment architectures, schemes or protocols involving a neutral party, e.g. certification authority, notary or trusted third party [TTP] the neutral party being a clearing house
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/04Payment circuits
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/30Payment architectures, schemes or protocols characterised by the use of specific devices or networks
    • G06Q20/34Payment architectures, schemes or protocols characterised by the use of specific devices or networks using cards, e.g. integrated circuit [IC] cards or magnetic cards
    • G06Q20/341Active cards, i.e. cards including their own processing means, e.g. including an IC or chip
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • G06Q20/3823Payment protocols; Details thereof insuring higher security of transaction combining multiple encryption tools for a transaction
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/385Payment protocols; Details thereof using an alias or single-use codes
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/409Device specific authentication in transaction processing
    • G06Q20/4093Monitoring of device authentication

Landscapes

  • Business, Economics & Management (AREA)
  • Engineering & Computer Science (AREA)
  • Accounting & Taxation (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Strategic Management (AREA)
  • General Business, Economics & Management (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Finance (AREA)
  • Microelectronics & Electronic Packaging (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)

Abstract

In a credit transaction with a vendor, card and transaction details are encoded with an encryption algorithm to generate a unique transaction number that can be relayed to a vendor either personally or through use of an e-commerce environment. In relation to the encryption algorithm, this is supplied to a card-holder in the form of computer software which may be incorporated into a dedicated device or a computer terminal or the like. The vendor, in response to receipt of unique transaction number, communicates the unique transaction number to the card issuing authority such as a bank or the like which acts to decode the unique transaction number using a complementary decoding algorithm associated with the card-holder's encryption algorithm. The card issuing authority is then able to respond to the request of the vendor to authorise a line of credit for the card-holder. Consequently, the vendor is not directly appraised of all card and transaction details in the initial communication with the card-holder, thereby safeguarding potentially further fraudulent mis-use of the card and transaction details.

Description

<Desc/Clms Page number 1> CREDIT AND CHARGE CARD SECURITY TECHNOLOGY AND MECHANISM FOR E-COMMERCE This invention relates, in general, to a mechanism for protecting fraudulent, unauthorised use of credit and charge cards in an e-commerce or remote vendor access environment and is particularly, but not exclusively, applicable to computer program products and apparatus that enhance the security of credit, debit and charge card (or the like) in transactions. The present invention is of particular benefit when used for internet transactions, but can also be applied advantageously to postal and telephone transactions in a way that generally protects but the cardholder and the card owner (e.g. the issuing financial house or clearing bank) responsible for authorising and validating a line of credit.
With existing credit, debit and charge cards, a variable number of card details are freely exchanged during transactions with vendors, irrespective of whether the vendor is personally present or is remote (such as in the case of internet or telephone ordering and purchases). These card details generally include the card number, the card-holder's name and the expiry date. There is thus generally little security against subsequent intentional or unintentional misuse of this information by vendors or by third parties who gain access to it; this consideration is of particular concern with internet transactions where the reputability of vendors may be difficult to establish.
Known techniques partially address the internet security problem by encrypting data during the transit only between cardholder and vendor to prevent third party misuse. Other known schemes require the vendor to be registered with the card issuing company to ensure reputability or require three-way communication between the company, the cardholder and the vendor to authorise individual transactions. As an alternative approach, some card issuing companies simply insure the holder against misuse.
Unfortunately, such existing card security techniques may incur significant
<Desc/Clms Page number 2>
additional operating costs for the card issuing company and vendor and thus limit the choice of vendor open to the cardholder. Moreover, with increasing internet and e-commerce traffic, validation with the card issuing authority (or agent) may be subject to increasing delays, especially if high levels of credit are requested that require specific consideration. Furthermore, such existing security techniques and operating procedures are also usually only applicable to transactions by internet, not post or telephone. Of course, it is possible to specifically limit the level of credit offered by a card to a predetermined (and relatively low) level, but this generally has the effect of discouraging card usage (and, in any event, does not limit the likely of fraudulent use of the card).
According to a first aspect of the present invention there is provided a method of limiting access to information pertaining to card transactions, the method comprising: applying an encryption algorithm to transaction details associated with a cardholder involved in a transaction, thereby to generate a unique transaction number for the transaction; relaying via a vendor the unique transaction number to a transaction clearance house that decodes the unique transaction number to determine at least one of authorisation and authenticity of the transaction; and sanctioning the transaction between the cardholder and the vendor subject to said determination of said at least one of authorisation and authenticity of the card transaction.
The transaction details may include at least one of hidden card data; transaction amount; payment type; and date information.
Sanctioning is typically subject to at least one of a requested payment amount; a transaction date; and a transaction period.
In a second aspect of the present invention there is provided a computer software package used for enhancing the security of credit, debit or charge card transactions by allowing the holder to produce a coded number that can be decoded by the company authorizing card payment.
<Desc/Clms Page number 3>
The authorisation code is preferably produced in the format of a conventional card number.
Preferably, the amount or limiting amount of a transaction is encrypted.
A transaction number indicator such as the time, date or counter serial number of a transaction may also be encrypted.
In a further aspect of the present invention there is provided apparatus for limiting access to information pertaining to card transactions, comprising: means for applying an encryption algorithm to transaction details associated with a card- holder involved in a transaction, thereby to generate a unique transaction number for the transaction that is communicable, via a vendor, to a transaction clearance house, wherein the unique transaction number is decodeable remote from both the cardholder and the vendor.
In a further aspect of the present invention there is provided a communication system comprising: means for applying an encryption algorithm to transaction details associated with a cardholder involved in a transaction, thereby to generate a unique transaction number for the transaction; means for relaying via a vendor the unique transaction number to a transaction clearance house; and wherein the transaction clearance house includes: i) means for decoding the unique transaction number; ii) means for determining at least one of authorisation and authenticity of the transaction; and iii) means for sanctioning the transaction between the card- holder and the vendor subject to said determination of said at least one of authorisation and authenticity of the card transaction.
Advantageously, the preferred embodiments of the present invention ensure that card details are both encoded during communication with a vendor and that the vendor is subjected to a restriction in their ability to reuse subsequently an authorised amount of credit (or the number of times that a specific credit
<Desc/Clms Page number 4>
authorisation) can be used. The potential for fraudulent or erroneous credit payments is therefore greatly reduced, with the system being reliable and having low operating costs. Moreover; the present invention allows use of credit card transactions with any vendor who accepts such credit (and charge card) payment mechanisms. Beneficially, the present invention can be used in conjunction with or independently to internet access, since the underlying inventive concept is applicable to telephone and postal transactions.
Preferred embodiments of the present invention will now be described with reference to the accompanying drawings; in which: F]Gs. 1 to 3 illustrate various transaction sequences showing exemplary frames of information presented to a cardholder (for communication to a vendor) and a card issuing authority according to preferred embodiments of the present invention.
According to the present invention, a program is loaded on to the card holder's computer (or provided in an electronic card or discrete device, such as a memory module for a cellular phone or a phone itself), which program is run when any transaction is about to be undertaken. The program produces an encrypted transaction number that is sent to the vendor and then, by the vendor, to the company which authorises payments from the "card" (i.e., in essence, the computer program encryption algorithm). It is envisaged that this encryption number will only authorise one form of payment, probably of a specified or limited amount, from the card-holder's account and its potential fcr misuse is therefore much restricted.
In one embodiment of the invention, the cardholder inputs the amount of the transaction into his card program. The card holder preferably also inputs a transaction number indicator (which could be, for example, the date). The program then produces a unique encrypted transaction number in the same format as a conventional card number for transmission to the vendor; this is the so-called E- Tu Safe number shown in the information frames of FIGs. 1 to 3. The generation of TM the E-Safe number in the form of a conventional (16-digit) card number is possible
<Desc/Clms Page number 5>
because the length of conventional card numbers is much greater than is required merely for unique identification of the card type and holder name. The unique encrypted transaction number is provided to the vendor, such as by a verbal disclosure process or by electronic or otherwise written communication.
The vendor transmits this unique encrypted transaction number to the card clearance company, who decode the number and check that the transaction number indicator and transaction amount are valid before authorising payment. The number is then disabled for further transactions within a predetermined encryption validity period, probably less than one month. A database of transactions is typically retained clearance company, which database may therefore include information pertaining to the predetermined encryption validity period and used unique encrypted transaction numbers associated with a particular cardholder.
An advantage of this particular embodiment is that the vendor treats the encrypted number exactly like a conventional card number and thus incurs no additional costs and requires no special equipment or procedures.
Of course, more elaborate encryption algorithms could be used, such as ones that allow/support multiple daily payments of the same amount, regular monthly payments, payments in different currencies and requests for refunds. Some of these options, as shown in the accompanying drawing Figures, as selectable options within transaction windows offered to the card holder and the time of their making the request. Moreover, selection of any of these particular options generally requires appropriate coding of the unique encrypted transaction number.
As regards a first preferred algorithm, the card holder essentially inputs the amount of a proposed transaction into their card program, which program contains a hidden eight-digit serial number; this is shown in the uppermost frame of FIG. 1. The eight- digit serial number (which is preferable absolutely inaccessible) allows the issuance of up to one hundred million cards. The card/encryption program preferably encrypts a four-digit amount check into a transaction number of, preferably, a 16-
<Desc/Clms Page number 6>
digit card number format (with the first four digits indicating a card type, in conventional fashion). The unique transaction number, together with the expiry date (which is optionally included by generally required by all vendors) and, possibly, cardholder name is communicated to the vendor who then seeks payment clearance via a telephone or internet link to an authorisation centre. The process could, of course, be entirely automated. The authorisation centre decodes the unique transaction number that therefore validates the transaction amount. The authorisation centre typically also checks the expiry date and possible the card- holder's name using the hidden card serial number (which the authorisation centre is, of course, aware of in view of it assigning the serial number to the card-holder). Payment is then authorised (or not) to the vendor, as the case may be. The transaction number could, in any event, be encrypted to provide a one-off transaction, thereby to provide added security in relation to previously unused vendors having no history of reputable trading.
The first embodiment, as will be understood; is simple to operate.
In a second embodiment of the present invention, as shown in FIGs. 2 and 3, additional information is included into the generation of the unique transaction number, which additional information is typically directed to payment type (e.g. standard one-off, subscription or repeat) and possibly also limited to a date of use basis. The hidden serial number may therefore need to be reduced, and is shown in the uppermost frames of FIGs. 2 and 3 to be a 7-digit number (allowing the issuance of ten million cards). The amount check may also required to be reduced to maintain a conventional 16-digiti card number format, although it will be 1M appreciated that the length of the E-Safe transaction number is arbitrary. Essentially, the process associated with the second preferred embodiment follows that embodied in relation to FIG. 1, except that the transaction date and payment type is also encoded. Consequently, interpretation of the encrypted transaction number may prevent agreed amount payments being made after expiry of a predetermined time, say one-month, since encryption (or even on agreed days of
<Desc/Clms Page number 7>
particular months, for example). The second embodiment provides a higher level of transaction security.
In summary, the invention seeks to avoid the problems of the prior art by essentially replacing the card itself with a computer program that is, in effect, individual and to each cardholder. In a credit transaction with a vendor, card and transaction details are encoded with an encryption algorithm to generate a unique transaction number that can be relayed to a vendor either personally or through use of an e-commerce environment. The vendor, in response to receipt of unique transaction number, communicates the unique transaction number to the card issuing authority (such as a bank or the like) which acts to decode the unique transaction number using a complementary decoding algorithm associated with the cardholder. The card issuing authority is then able to respond to the request of the vendor to authorise a line of credit for the cardholder. Consequently, the vendor is not directly appraised of all card and transaction details in the initial communication with the cardholder, thereby safeguarding potentially further fraudulent misuse of the card and transaction details. The unique transaction number may also include limitations as to when and how many times the unique transaction number will be acknowledged by the card issuing authority as a valid request for the release of a line of credit, with such limitations based on, for example, an encoded date within the unique transaction number.
With the transaction algorithm being software based, access to the algorithm can also be password protected to mitigate unauthorised access to the encryption algorithm. Additionally, with data recording within the encoder environment of the present invention, a transaction number could replace the date to simplify input and provide additional security.
In generality, the encoder of the present invention is effectively produced in a portable form to allow free transportation, with the portable device possibly supporting a (re-)programmable metallic strip or smart-chip to allow access of automated teller machines (ATMs) and other swipe machines, thereby extending
<Desc/Clms Page number 8>
the use of the inventive concept. The term "card" in the sense of the present invention must necessarily be viewed widely to include the concept of a credit, debit or charge card realised as an electronic artefact; although existing cards could clearly have account detail information transferred into an electronic domain where it is effectively encoded by the encryption algorithm of the present invention; this therefore supports migration of existing cards to a system having increased levels of security for the cardholder and card owner.
It will, of course, be appreciated that the above description has been given by way of example only and that modifications may be made within the scope of the present invention. For example; whilst the preferred embodiment of the present invention has been described in terms of the provision of a computer program product that can be loaded into memory of a computer terminal, the present invention may clearly be adapted, supplied or integrated in a number of forms. By way of specific (but not limiting) example, the encryption portion of the present invention can be implemented into discrete handheld devices such as electronic cards, cellular telephones or dedicated terminals, whilst a corresponding decryption portion is retained within the system and specifically in a way that is only accessible to the card issuing authority (that approves; validates or authorises the credit transaction). Of course, the size of the transaction number is not limited to 16-digits.
<Desc/Clms Page number 9>

Claims (16)

  1. Claims 1. A method of limiting access to information pertaining to card transactions, the method comprising: applying an encryption algorithm to transaction details associated with a cardholder involved in a transaction, thereby to generate a unique transaction number for the transaction; relaying via a vendor the unique transaction number to a transaction clearance house that decodes the unique transaction number to determine at least one of authorisation and authenticity of the transaction; and sanctioning the transaction between the cardholder and the vendor subject to said determination of said at least one of authorisation and authenticity of the card transaction.
  2. 2. The method of claim 1, wherein the transaction details include at least one of hidden card data; transaction amount: payment type; and date information.
  3. 3. The method of claim 1 or 2, wherein sanctioning is subject to at least one of a requested payment amount; a transaction date; and a transaction period.
  4. 4. A computer program element comprising computer program code means a make a computer-controlled system execute procedure to perform any of the method steps of claims 1 to 3.
  5. 5. The computer program element of claim 4, embodied on a computer readable medium.
  6. 6. A computer software package used for enhancing the security of credit, debit or charge card transactions by allowing the holder to produce a coded number that can be decoded by the company authorising card payment.
  7. 7. A computer package according to claim 6, in which the authorisation code is
    <Desc/Clms Page number 10>
    produced in the format of a conventional card number.
  8. 8. The computer package according to claim 6 or 7, in which the amount or limiting amount of a transaction is encrypted.
  9. 9. The computer package according to claim 6, 7 or 8, in which a transaction number indicator such as the time, date or counter serial number of a transaction is encrypted.
  10. 10. Apparatus for limiting access to information pertaining to card transactions, comprising: means for applying an encryption algorithm to transaction details associated with a cardholder involved in a transaction, thereby to generate a unique transaction number for the transaction that is communicable, via a vendor, to a transaction clearance house, wherein the unique transaction number is decodeable remote from both the cardholder and the vendor.
  11. 11. Apparatus according to claim 10, wherein the apparatus is one of a memory- chip, a computer program, and a cardholder terminal.
  12. 12. A communication system comprising: means for applying an encryption algorithm to transaction details associated with a cardholder involved in a transaction, thereby to generate a unique transaction number for the transaction; means for relaying via a vendor the unique transaction number to a transaction clearance house; and wherein the transaction clearance house includes: 1) means for decoding the unique transaction number; ii) means for determining at least one of authorisation and authenticity of the transaction; and iii) means for sanctioning the transaction between the cardholder and the vendor subject to said determination of said at least one of authorisation and
    <Desc/Clms Page number 11>
    authenticity of the card transaction.
  13. 13. A method of limiting access to information pertaining to card transactions, substantially as hereinbefore described with reference to the accompanying drawings.
  14. 14. Apparatus for limiting access to information pertaining to card transactions, substantially as hereinbefore described with reference to the accompanying drawings.
  15. 15. A computer program product substantially as hereinbefore described with reference to the accompanying drawings.
  16. 16. A communication system arranged to limit access to information pertaining to card transactions, substantially as hereinbefore described with reference to the accompanying drawings.
GB0002968A 2000-02-09 2000-02-09 Credit and charge security technology and mechanism for e-commerce Expired - Fee Related GB2366007B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
GB0002968A GB2366007B (en) 2000-02-09 2000-02-09 Credit and charge security technology and mechanism for e-commerce

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
GB0002968A GB2366007B (en) 2000-02-09 2000-02-09 Credit and charge security technology and mechanism for e-commerce

Publications (3)

Publication Number Publication Date
GB0002968D0 GB0002968D0 (en) 2000-03-29
GB2366007A true GB2366007A (en) 2002-02-27
GB2366007B GB2366007B (en) 2004-07-07

Family

ID=9885242

Family Applications (1)

Application Number Title Priority Date Filing Date
GB0002968A Expired - Fee Related GB2366007B (en) 2000-02-09 2000-02-09 Credit and charge security technology and mechanism for e-commerce

Country Status (1)

Country Link
GB (1) GB2366007B (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
FR2843217A1 (en) * 2002-08-01 2004-02-06 Patrick Uzan Secure remote payments over the Internet or by telephone, uses coded grid send by payment handlers to user to encode card data, which is decoded using a customer identifier to locate starting point on the grid
US7941370B2 (en) 2006-04-25 2011-05-10 Uc Group Limited Systems and methods for funding payback requests for financial transactions
US8832809B2 (en) 2011-06-03 2014-09-09 Uc Group Limited Systems and methods for registering a user across multiple websites

Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4707592A (en) * 1985-10-07 1987-11-17 Ware Paul N Personal universal identity card system for failsafe interactive financial transactions
US5317636A (en) * 1992-12-09 1994-05-31 Arris, Inc. Method and apparatus for securing credit card transactions
US5485510A (en) * 1992-09-29 1996-01-16 At&T Corp. Secure credit/debit card authorization
US5627355A (en) * 1994-07-13 1997-05-06 Rahman; Sam Transaction device, equipment and method for protecting account numbers and their associated personal identification numbers
WO1998030985A2 (en) * 1997-01-06 1998-07-16 Aerotel Ltd. Computerized money transfer system
US6000832A (en) * 1997-09-24 1999-12-14 Microsoft Corporation Electronic online commerce card with customer generated transaction proxy number for online transactions
EP1028401A2 (en) * 1999-02-12 2000-08-16 Citibank, N.A. Method and system for performing a bankcard transaction
WO2000075843A1 (en) * 1999-06-09 2000-12-14 Intelishield.Com, Inc. Internet payment system
GB2352861A (en) * 1999-08-04 2001-02-07 Int Computers Ltd Payment transaction system

Patent Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4707592A (en) * 1985-10-07 1987-11-17 Ware Paul N Personal universal identity card system for failsafe interactive financial transactions
US5485510A (en) * 1992-09-29 1996-01-16 At&T Corp. Secure credit/debit card authorization
US5317636A (en) * 1992-12-09 1994-05-31 Arris, Inc. Method and apparatus for securing credit card transactions
US5627355A (en) * 1994-07-13 1997-05-06 Rahman; Sam Transaction device, equipment and method for protecting account numbers and their associated personal identification numbers
WO1998030985A2 (en) * 1997-01-06 1998-07-16 Aerotel Ltd. Computerized money transfer system
US6000832A (en) * 1997-09-24 1999-12-14 Microsoft Corporation Electronic online commerce card with customer generated transaction proxy number for online transactions
EP1028401A2 (en) * 1999-02-12 2000-08-16 Citibank, N.A. Method and system for performing a bankcard transaction
WO2000075843A1 (en) * 1999-06-09 2000-12-14 Intelishield.Com, Inc. Internet payment system
GB2352861A (en) * 1999-08-04 2001-02-07 Int Computers Ltd Payment transaction system

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
FR2843217A1 (en) * 2002-08-01 2004-02-06 Patrick Uzan Secure remote payments over the Internet or by telephone, uses coded grid send by payment handlers to user to encode card data, which is decoded using a customer identifier to locate starting point on the grid
US7941370B2 (en) 2006-04-25 2011-05-10 Uc Group Limited Systems and methods for funding payback requests for financial transactions
US8099329B2 (en) 2006-04-25 2012-01-17 Uc Group Limited Systems and methods for determining taxes owed for financial transactions conducted over a network
US8832809B2 (en) 2011-06-03 2014-09-09 Uc Group Limited Systems and methods for registering a user across multiple websites

Also Published As

Publication number Publication date
GB0002968D0 (en) 2000-03-29
GB2366007B (en) 2004-07-07

Similar Documents

Publication Publication Date Title
AU748558B2 (en) Credit card system and method
JP2597672B2 (en) Multi-user card having a plurality of variable personal identification information and a card system provided with the card
EP1153375B1 (en) Credit card system and method
US20040128256A1 (en) Remote location credit card transaction system with card present security system
KR20010025234A (en) A certification method of credit of a financing card based on fingerprint and a certification system thereof
JP2007521556A (en) Method of authorizing payment order by credit card and related devices
US20020095580A1 (en) Secure transactions using cryptographic processes
EP1265200A1 (en) Credit card system and method
US20180308076A1 (en) Electronic financial processing system using personal atm terminal and method for processing thereof
KR100598573B1 (en) Creating and authenticating one time card data using smartcard and the system therefor
WO2019246303A1 (en) System and method for confirmation of credit transactions
TWI234096B (en) E-commerce transaction system, e-commerce transaction server, and e-commerce transaction method
US20020073315A1 (en) Placing a cryptogram on the magnetic stripe of a personal transaction card
US20020184143A1 (en) Khater plus system
GB2366007A (en) Credit and charge card security technology and mechanism for e-commerce
US20030191715A1 (en) Secured purchase transaction
KR20030082018A (en) Method of a credit card approval using interactive short message service
AU753159B2 (en) Credit card system and method
Pircalab Security of Internet Payments
ITPD20000102A1 (en) EQUIPMENT PARTICULARLY FOR THE SALE SUPPORT VIA TELEMATICS
ZA200106639B (en) Credit card system and method.
CZ20003230A3 (en) System and procedure used for credit cards

Legal Events

Date Code Title Description
PCNP Patent ceased through non-payment of renewal fee

Effective date: 20140209