IE83891B1 - A method of generating payment vouchers for use in remote transactions - Google Patents

A method of generating payment vouchers for use in remote transactions Download PDF

Info

Publication number
IE83891B1
IE83891B1 IE2004/0138A IE20040138A IE83891B1 IE 83891 B1 IE83891 B1 IE 83891B1 IE 2004/0138 A IE2004/0138 A IE 2004/0138A IE 20040138 A IE20040138 A IE 20040138A IE 83891 B1 IE83891 B1 IE 83891B1
Authority
IE
Ireland
Prior art keywords
voucher
host
point
data
sale
Prior art date
Application number
IE2004/0138A
Other versions
IE20040138A1 (en
Inventor
Guilfoyle Kieron
Original Assignee
Snapcount Limited
Filing date
Publication date
Application filed by Snapcount Limited filed Critical Snapcount Limited
Priority to IE2004/0138A priority Critical patent/IE83891B1/en
Publication of IE20040138A1 publication Critical patent/IE20040138A1/en
Publication of IE83891B1 publication Critical patent/IE83891B1/en

Links

Description

"A method of generating payment vouchers for use in remote transactions" INTRODUCTION Field of the Invention The invention relates to transaction processing and payment instrument issuance mechanisms.
Prior Art Discussion Internet commerce has been increasing in recent years, and the predominant payment method is by way of credit and debit cards. However, a limit on use of credit cards for transactions with remote retailers has been reluctance of customers to transmit credit card details over the internet due to security concerns.
One approach to addressing this problem has been for customers to register with a merchant so that the details are transmitted only once and a password is used thereafter. This is of benefit where a customer intends to regularly use a particular merchant, such as an airline. However it allows little flexibility.
Another approach has been to issue limited use credit cards, such as described in EP10293llBl (Orbis Patents Limited). In this approach, there is a pool of credit card numbers at least one of which is a master number and another is a limited use number. The limited-use number is used without revealing the master number, and it is deactivated according to a use-triggered condition. This approach is of benefit, however it is limited to use by customers who have a credit card account.
US5943423 (Entegrity Solutions) describes a token system in which there is communication between a user and a server with PKI encryption and security data to obtain access to network resources. This appears to be cumbersome for the user.
US6l92349 describes a mechanism in which a smart card is loaded with an electronic ticket. While this appears to be useful for certain circumstances, it does require the customer to have a smart card and to engage in a client/ server download process which may be complex and/ or inconvenient.
US63705l4B1 (Messner) describes a system for issuing vouchers for use in on—line purchases. Problems with this approach include that vouchers generated must be redeemed for a particular vendor’s gift certificates before being used in a transaction.
This two—stage process limits the usability of the system.
WO0l/ 67407 (Technocash Inc.) describes a system for issuing electronic tokens in the form of a physical card. Markings on the card include serial numbers and a monetary value. Disadvantages of this approach are that it creates a system which does not appear to interoperate with existing card infrastructures.
The invention is directed towards providing an improved mechanism for issuing payment instruments and for using them for transactions.
SUMMARY OF THE INVENTION According to the invention, there is provided a method of generating a payment instrument voucher for use in card—not—present transactions such as online transactions, the method comprising the steps of: a point—of—sale terminal in a retailer premises receiving customer security data; the point—of-sale terminal communicating with a remote host to validate the customer security data; if validation is positive, the point—of—sa1e terminal receiving voucher request data; the point-of-sale terminal transmitting a voucher request message to the remote host, and the host responding with a request response; the point-of-sale terminal outputting voucher data in return for receiving payment by the customer, if the host response is positive; and wherein the host generates a full set of voucher data, transmits a first set of the voucher data to the point-of-sale terminal, and transmits a second set of the voucher data directly to the customer.
In another embodiment, the first set of voucher data includes a voucher number and the second set includes a voucher security code.
In a further embodiment, the second set is transmitted as a message to a customer’s mobile device.
In one embodiment, the message is an SMS message.
In another embodiment, the host includes a gateway linked with a mobile telecommunications network for transmitting the second set of voucher data.
In one embodiment, the point-of-sale terminal prints the terminal voucher data.
In one embodiment, the terminal prints the voucher data to provide a physical printed voucher.
In a further embodiment, the customer security data is read from a card presented by the customer and having the security data recorded thereon.
In one embodiment, the security data is magnetically encoded on the card.
In another embodiment, the card includes a trigger program, and the point—of—sale terminal executes said program to cause automatic activation of a voucher purchase launch program on the terminal.
In a further embodiment, the launch program automatically presents the point-of-sale operator with a menu of possible voucher values.
In one embodiment, the terminal automatically generates a voucher request message for the host using the security data and the value selection.
In another embodiment, the voucher request message includes only the security code and the requested voucher value.
In a further embodiment, the host dynamically maintains a database of security data and a database of issued voucher data linked with the security data.
In one embodiment, the step of the host generating the voucher data includes: transmitting a voucher request message to a transaction processor, the transaction processor allocating a voucher number, the transaction processor returning the voucher number to the host.
In another embodiment, the voucher request message transmitted to the host includes only a request code and the value.
In a further embodiment, the transaction processor allocates a PAN number as the voucher number, said number being suitable for processing in a subsequent transaction in a manner similar to that of a debit or credit card number.
In one embodiment, the method comprises the further steps of the transaction processor receiving a request for validation of the voucher for a proposed transaction from a card—not-present merchant system, verifying the voucher number, and transmitting a message to the host to indicate that the voucher has been used or partly used.
In another embodiment, the host automatically updates a voucher database.
In another aspect, the invention provides a method of operation of a transaction processor, comprising the steps of the processor: receiving a voucher request from a point—of-sale system, satisfying the request by generating or selecting a voucher number, transmitting the voucher number to the point—of-sale system, and updating a voucher database accordingly; subsequently, receiving a transaction request from a card-not-present merchant system, identifying a voucher number in the request, and determining if the transaction should be authorised according to the voucher database and a transaction database; and after completion of the transaction, transmitting a message to the host system including details of the transaction.
In one embodiment, the voucher request received from the point-of-sale system includes only a request indicator and a value indicator and is of common, fixed length format.
In another embodiment, the point-of-sale system is a point-of—sale host, in turn linked with a plurality of remote point-of-sale terminals.
The invention also provides, together or separately, a point-of—sale terminal, a point- of-sale host, and a transaction processor each comprising means for performing associated steps of any of the methods defined above.
DETAILED DESCRIPTION OF THE INVENTION Brief Description of the Drawings The invention will be more clearly understood from the following description of some embodiments thereof, given by way of example only with reference to the accompanying drawings in which:- Fig. l is a block diagram of systems involved in implementing a method of the invention; Fig. 2 is a representation of the layout of a voucher printed at a point-of—sale terminal in a method of the invention, and Fig. 3 is a representation of the layout of a merchant receipt printed at the terminal; Figs. 4(a), 4(b), and 4(c) are flow diagrams illustrating methods of the invention; and Fig. 5 is a representation of an over-the-air transmission.
Description of the Embodiments Referring to Fig. 1 systems involved in implementing methods of the invention are illustrated. Terminals 1 located at physical retail outlets are linked with an electronic point—of-sale ("EPOS") host 10. The host 10 comprises two servers 11 in a mirroring arrangement for automatic backup. The host 10 also comprises, in a clustering arrangement, a database 12 for voucher data and a database 13 for security card data.
The host 10 is linked with communication systems including in this embodiment an SMS gateway 14, an email gateway 15, and a customer service function 16. The gateways l4 and 15 communicate with customer devices such as mobile phones 20 via mobile networks 21.
The host l0 is linked with a remote transaction processor 30, having a voucher database 31 and a transaction database 32.
The processor 30 is also linked with online, card-not-present (CNP) merchant systems 40 via an acquirer system 41 and a card scheme 42.
Referring to Fig. 2 a voucher 50 is generated at a point-of-sale terminal 1. It may be paid for in cash or in any other payment form such as debit card. The voucher is printed by a printer of the type used for other transactions such as purchase receipts.
The printed fields include the following. : a voucher number in the same format (PAN) as that of a credit card number; 52: an amount; 53: a currency denomination; : a barcode : a customer message; and ,57: branding logos The voucher may only be used for a transaction in conjunction with separate codes/ data transmitted separately over-the-air by the gateways 14 or l5, as described in more detail below.
The voucher 50 may be used by anyone to whom it has been given. In one example, a parent purchases the voucher and gives it to his or her child to use for an online purchase. This avoids the need for the parent to allow the child have use of his or her credit card account. The voucher may alternatively be purchased by a customer who does not have a credit card, for use in making online purchases.
Referring to Fig. 3, at the same time as printing the voucher 50, the merchant point- of—sale terminal also prints a merchant receipt 60 having fields for: : merchant text, : voucher ("3V") number, : amount, : setup fee, : total paid, ,67: voucher issuance time, and date, and : merchant identifier.
In general, the customer can engage in any of the following activities relating to the vouchers. (a) Use a voucher in a series of Card Not Present Transactions. The vouchers are usable in any transaction where a physical card is not required. (b) Perform a balance enquiry via a website. Customers can find out on a website the remaining balance on a voucher and previous transaction history.
They login to a website using the unique number issued with each voucher. (c) Redeem a voucher by sending it to the voucher issuer which hosts the processor 30. (d) Customers can convert a voucher to cash by filling in a downloadable form and posting it to the voucher issuer. They will receive a cheque or money order for the voucher value. (e) Transfer balances from one voucher to another either online or over the telephone.
Referring to Fig. 4(a) a process 80 for issuing a security card is illustrated. The security card has a magnetic stripe. It is carried by the customer for use in purchasing vouchers from time to time. A batch of cards is generated in step 81.
Each card of the batch has a unique identifier and a common trigger program encoded in its magnetic stripe. In step 82, an organisation responsible for issuing security cards receives a request from a customer via any convenient channel such as physically visiting an issuing desk, by email, or by a Web form. Subscriber data is captured in step 83 including the subscriber’s name, address, date of birth, telephone numbers, and email address. Also, a password is collected. The server allocates a card to the subscriber in step 84. In step 85 the security card database 13 is updated with the subscriber data and the linked security code data.
Referring to Figs. 4(b) and 4(c) a process 90 for generating a voucher for a subscriber is illustrated. The subscriber presents his/her security card at a "physical" merchant’s premises. The premises may be a retail outlet of any type, the only requirement being that it operates a point-of-sale terminal 1. The terminal 1 reads the data from the security card when it is "swiped" in step 91, and in step 92 it updates a local memory dataset with the read card code. The terminal 1 also reads and uploads the trigger program and upon executing this program a launch program in the terminal 1 is executed in step 93. This generates a simple display of a menu of possible voucher values on a touch screen, in step 94.
Upon receiving a selection made by the point—of—sale operator, the terminal 1 generates a message in step 95, including the card code and value. This message is transmitted to the host 10. It will be appreciated that this message is short, requiring little of the point-of-sale network bandwidth.
The host 10 receives the message, and in step 96 it verifies the card code. An error message is transmitted back in step 97 to the terminal 1 if the card code is marked in the database 13 as invalid. This may be the case if the code was not issued in an authorised manner, or if the card has been reported as lost or stolen.
The host 10 then generates a short message for onward transmission to the processor if the card code is valid in step 99. This message includes only the voucher request and the selected value. This message has a fixed, predetermined length, again minimising bandwidth requirements on the host-processor link.
The processor 30 does not need to perform any validating operations. It simply, in The number is selected from a batch with a BIN (Bank Identification Number) range, in a step 100, assigns a number in the industry-standard PAN 16-digit format. manner akin to issuance of credit card numbers.
The PAN is transmitted to the host 10 in step 101, together with associated data including the amount, currency, and expiry.
At the host 10 a "Web code" is assigned to the PAN, and a full voucher dataset is completed. The full dataset includes: the PAN number, amount, currency, purchase time and date, web code expiry date, security code (3 digits).
The host 10 automatically splits the data into that used for printing the voucher (shown in Fig. 2) and that for electronic transmission as shown in Fig. 5. The former is transmitted to the terminal 1 for printing the voucher 50, shown in Fig. 2. The latter is routed to one of the gateways 14 or 15 for onward over-the-air transmission separately to the customer as a message 110. The subscriber can not make a purchase unless he/ she has both the printed voucher data and also the information transmitted over-the-air.
The voucher is used for transactions with card-not-present merchants having systems 40. To make a purchase, the voucher number is entered on the web site or via telephone in the normal manner for a debit card (or credit card) transaction. The site will also require the user to enter the 3-digit "CVV2" code transmitted over-the-air as shown in Fig. 5. The merchant system 40 communicates with an acquirer system 41, which in turn communicates via a card scheme 42 with the processor 30. The processor 30 performs authorisation with reference to the databases 31 and 32. Thus, the CNP merchant systems 40 operate in a conventional manner, treating the number and code as if they were from a credit or debit card. The processor 30 is in a position to dynamically update both voucher issuance data and also transaction data arising from use of the Vouchers.
Each voucher customer is represented as a row of data in a ‘Cash Customer Table’ of the database 13 of the EPOS host 10. Each issued voucher is represented as a row in ‘3V Table’ of the database 12. There is a relationship between the relevant ‘Cash Customer Table’ and the ‘3V Table’. Each transaction that occurs for a voucher ~ e.g. issuance and redemption is a separate row in a ‘Transaction Table’ of the database 32. Each row in this table is linked back to a row in the ‘3V table’ of the database 12.
The following represents the Cash Customer Table.
# Type Name Description 1 lnt(16) ID Automatically generated by Database String(40) First_Name First Name of Customer String(40) Middle_Name Middle Name of Customer String (40) Last_Name Second Name of Customer String (20) Date_Of_Birth Date of Birth of Customer String (40) Nationality Nationality of Customer String (1) Gender Gender of Customer — M=Male, F=Female String (40) Address] 15‘ Line of Customer Address String (40) Address2 2" Line of Customer Address String (40) Address3 3'" Line of Customer Address String (40) Address4 4"‘ Line of Customer Address Date Application_Date Date of receipt of ISC Application. 13 Date Document_Retum_Date Date of return of Identity Documents 14 Date ISC_Issue_Date Date of issue of ISC String (20) ISC ID Identity of ISC Card — this value is on magnetic stripe of ISC Card and identify is used to uniquely C1lStOII]CI'S.
Int(2) Status Code Customer: describing status of = Active — customer allowed purchase voucher. l = InActive — customer not allowed purchase voucher.
= Pending — customer not allowed purchase voucher.
The following represents the 3V table of the database 12.
# Type Name Description lnt(l 6) ID Automatically generated by Database. 2 String(l6) PAN 16 Digit PAN.
String(5) Expiry Expiry Date of PAN.
String(3) CVV Security Code.
Date Issue_Date Date of issue of 3V.
Time Issue Time Time of issue of 3V.
String(l) Type H = Cash, D = Card.
Int(16) Cash_Customer_ID ID of Cash Customer if this is a Cash 3V. 8 String(l6) 3V_lD_Number ID Number of 3V.
String(l0) Merchant_lD ID of merchant where 3V was sold.
Int(10,2) Amount Limit of 3V. ll String(3) Currency Currency of 3V.
The following represents the transaction table of the database 32.
# Type Name Description Int(l6) ID Automatically generated by database. 2 lnt(l6) 3V_ID ID of voucher.
String(1) Type P = Purchase of voucher.
R = Redemption of voucher. 3 Date Date Date of Transaction. 4 Time Time Time of Transaction.
Prior to requesting a voucher from the processor 30 the host 10 performs the following database operations via ODBC: Check that a Cash~Customer_Table row exists where the ISCHID matches the ISC_ID read from the magnetic stripe of the ISC card presented by the customer.
If the Status field of this row is 0 (‘Active’) Allow the transaction to proceed o Else Deny the transaction After a voucher has been purchased, the EPOS Network performs the following database operations: Insert a new row into the 3V_Table.
Field Value PAN From PROCESSOR Expiry From PROCESSOR CVV From PROCESSOR Issue_Date Current Date Issue Time Current Time Type ‘H’ if Cash voucher ‘D’ if Card voucher Cash_Customer_ID ID field of matching row in Cash_Customer_Tab1e. (only if Type = ‘H’ above) V_ID_Number From PROCESSOR Merchant_ID EPOS Network ID Merchant.
Amount From PROCESSOR Currency ‘EUR’ Insert a new row into the Transaction Table.
Field Value 3V_ID ID From 3V_Table in previous transaction above.
Type ‘P’ Date Current Date Time Current Time The processor 30 provides a website at which the host organisation can cancel a Communication to this website is over HTTP with a URL of the form ‘http://wvvw.3vcance1.com/’. This is redirected to a HTTPS URL of the form: ‘https://www.3vcancel.com/’. Appropriate SSL certificates are created and maintained by the processor 30. voucher, and review MIS information.
At this point the host 10 enters a username and password and is invited to enter the voucher ID Number. After this is entered, the system responds with the current balance on the 3V and an invitation to cancel this voucher.
The processor 30 also provides a website at which a customer can enter the ‘ID Number’ associated with a voucher and receive back an up—to—date balance statement on that voucher. Communication to this website is over HTTP with a URL of the form ‘http://www.3vbalance.com/’. This should be redirected to a HTTPS URL of the form: ‘https://www.3vbalance.corn/’. Appropriate SSL certificates are created and maintained by the processor 30.
At this point the customer is invited to enter the voucher ID Number. After this is entered, the system responds with the current balance on the voucher. The customer can then continue to enter more ID Numbers and receive the current balance for each. The website should log the customer out after 2 minutes of inactivity.
All communication between the EPOS host 10 and the processor 30 uses an SSL based HTTP interface over the Internet. In this interface, the processor 30 acts as HTTPS server, and the EPOS host 30 act as HTTPS client using a port on the server side. The processor 30 supplies certificates that are required by the EPOS host 10.
The EPOS host 10 can be located anywhere, and it supplies a set of public IP addresses from which all connections to the processor will be made.
The logical interface consists of function calls and parameters which can be called over the HTTPS interface.
Functions and Parameters, including a username and password are sent to the processor via URL encoded parameters.
Eg: https : / / 1 .2.3 .4/ CL_LoadValue.asp?userid=uid&pwd=xxx&cardnum=l l 1 12222333 34444&purseno=99&amt=9.99&sourceid=30 The response to each HTTP request is text based.
: Operation Successful It is the duty of EPOS host 10 to recognise a connection failure. This is detected by the EPOS host 10 through a HTTPS error or/ and a timeout of 10 seconds.
When detected, the operation is retried a second time and if the connection fails again, then the operation is reported as failed to the terminal.
Communication with the host 10 database uses ODBC Version 2. The EPOS host 10 supplies a local LAN ip address which will be used on database server.
The invention provides for vouchers which are automatically generated at any participating merchant using existing point-of—sale hardware. There is no need for the customer to have a credit card account, and there is little need to worry that the number may be misappropriated as the voucher only has a limited value. The use of a security card as described helps to ensure traceability, thus deterring money laundering and other illegal use of the vouchers. Also, because the voucher data is transmitted to the customer via two separate channels the risk of fraud is further minimised. It will also be appreciated that implementation of the invention can be achieved with little additional hardware equipment . The point-of-sale terminals, the point—of-sale network, some of the EPOS host hardware, some of the processor hardware, and the CNP merchant systems exist already. A fiirther advantage is the dual purpose of the security card, providing both security by way of customer validation and also automatic launching of the point—of—sale merchant interface. This minimises merchant staff training required, and helps to ensure integrity of the voucher generation operations. This is particularly important as a wide variety and large number of merchants may be involved in issuing vouchers.
The invention is not limited to the embodiments described but may be varied in construction and detail. For example, the processor 30 may comprise any appropriate number of interlinked local or remote systems.

Claims (1)

1. Claims A method of generating a payment instrument voucher (50) for use in card- not-present transactions such as online transactions, the method comprising the steps of: a point-of-sale terminal (1) in a retailer premises receiving customer security data; the point-of-sale terminal communicating with a remote host (10) to validate the customer security data; if validation is positive, the point-of-sale terminal (1) receiving voucher request data; the point-of-sale terminal transmitting a voucher request message to the remote host (10), and the host responding with a request response; the point-of-sale terminal outputting voucher data in return for receiving payment by the customer, if the host response is positive; and wherein the host (10) generates a full set of voucher data, transmits a first set of the voucher data to the point-of-sale terminal, and transmits a second set of the voucher data directly to the customer. A method as claimed in claim 1, wherein the first set of voucher data includes a voucher number (51) and the second set includes a voucher security code. A method as claimed in claims 1 or 2, wherein the second set is transmitted as a message (110) to a customer’s mobile device. A method as claimed in claim 3, wherein the message is an SMS message. A method as claimed in any of claims 1 to 4, wherein the host (10) includes a gateway (14, 15) linked with a mobile telecommunications network (21) for transmitting the second set of voucher data. A method as claimed in any preceding claim, wherein the point—of-sale terminal (1) prints the terminal voucher data (51-55). A method as claimed in claim 6, wherein the terminal prints the voucher data to provide a physical printed voucher. A method as claimed in any preceding claim, wherein the customer security data is read from a card presented by the customer and having the security data recorded thereon. A method as claimed in claim 8, wherein the security data is magnetically encoded on the card. A method as claimed in claim 8 or 9, wherein the card includes a trigger program, and the point—of-sale terminal (1) executes said program to cause automatic activation of a voucher purchase launch program on the terminal. A method as claimed in claim 10, wherein the launch program automatically presents the point—of-sale operator with a menu of possible voucher values. A method as claimed in claim 11, wherein the terminal (1) automatically generates a voucher request message for the host (10) using the security data and the value selection. A method as claimed in claim 12, wherein the voucher request message includes only the security code and the requested voucher value. A method as claimed in any preceding claim, wherein the host (10) dynamicafly maintains a database (13) of security data and a database (12) of issued voucher data linked with the security data. A method as claimed in any preceding claim, wherein the step of the host (10) generating the voucher data includes: transmitting a voucher request message to a transaction processor (30), the transaction processor (30) allocating a voucher number, the transaction processor (30) returning the voucher number to the host (10). A method as claimed in claim 15, wherein the voucher request message transmitted to the host includes only a request code and the value. A method as claimed in claims 15 or 16, wherein the transaction processor (30) allocates a PAN number as the voucher number, said number being suitable for processing in a subsequent transaction in a manner similar to that of a debit or credit card number. A method as claimed in any preceding claim, comprising the further steps of the transaction processor (30) receiving a request for validation of the voucher for a proposed transaction from a card—not—present merchant system (30), verifying the voucher number, and transmitting a message to the host (10) to indicate that the voucher has been used or partly used. A method as claimed in claim 18, wherein the host automatically updates a voucher database (12). A method of operation of a transaction processor, comprising the steps of the processor: receiving a voucher request from a point-of-sale system (10), satisfying the request by generating or selecting a voucher number, transmitting the voucher number to the point—of—sale system, and updating a voucher database (31) accordingly; subsequently, receiving a transaction request from a card-not-present merchant system (40), identifying a voucher number in the request, and determining if the transaction should be authorised according to the voucher database and a transaction database (32); and after completion of the transaction, transmitting a message to the host system including details of the transaction. A method as claimed in claim 20, wherein the voucher request received from the point—of—sale system includes only a request indicator and a value indicator and is of common, fixed length format. A method as claimed in claims 20 or 21, wherein the point-of-sale system is a point—of-sale host, in turn linked with a plurality of remote point-of-sale terminals. A point-of-sale terminal comprising means for performing point—of-sale terminal operations of a method of any of claims 1 to 19. A point—of—sa1e host comprises means for performing point-of-sale host operations of a method of any preceding claim. A transaction processor comprises means for performing transaction processor operations of a method of any preceding claim.
IE2004/0138A 2004-03-08 A method of generating payment vouchers for use in remote transactions IE83891B1 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
IE2004/0138A IE83891B1 (en) 2004-03-08 A method of generating payment vouchers for use in remote transactions

Applications Claiming Priority (3)

Application Number Priority Date Filing Date Title
IEIRELAND07/03/20032003/0165
IE20030165 2003-03-07
IE2004/0138A IE83891B1 (en) 2004-03-08 A method of generating payment vouchers for use in remote transactions

Publications (2)

Publication Number Publication Date
IE20040138A1 IE20040138A1 (en) 2004-10-20
IE83891B1 true IE83891B1 (en) 2005-05-04

Family

ID=

Similar Documents

Publication Publication Date Title
US20060085269A1 (en) Transaction processing
AU2001256518B2 (en) Electronic processing system
US7766225B2 (en) Issuing a value-bearing card associated with only non-personally identifying information
US20050033645A1 (en) Virtual cashier
US20090254484A1 (en) Anon virtual prepaid internet shopping card
US20110145047A1 (en) System and method for applying credits from third parties for redemption at member retailers
US20110087595A1 (en) Method and system for facilitating commercial purchases
CN108292398A (en) Utilize holder's authentication token of enhancing
US20080265020A1 (en) System and method for performing payment transactions, verifying age, verifying identity, and managing taxes
WO2021190455A1 (en) Digital asset exchange system and related methods
WO2003075192A1 (en) Electronic transfer system
KR20060034228A (en) Customer authentication in e-commerce transactions
CN101273378A (en) Method and system for performing two factor mutual authentication
TW200306483A (en) System and method for secure credit and debit card transactions
US20070007330A1 (en) System and method for processing transactions
US20150154587A1 (en) System and method for applying credits from third parties for redemption at member retailers
KR101723734B1 (en) The server and method for selling gift certificate
US20130041746A1 (en) Methods and Systems of Electronic Messaging
WO2007029123A2 (en) System and method for processing transactions
IE83891B1 (en) A method of generating payment vouchers for use in remote transactions
IE20040138A1 (en) A method of generating payment vouchers for use in remote transactions
US20050103836A1 (en) Payment system
GB2428126A (en) System for processing transactions
NZ529868A (en) E commerce system
JP2022025719A (en) Credit device and credit system