IES20000468A2 - A processing method and apparatus - Google Patents

A processing method and apparatus

Info

Publication number
IES20000468A2
IES20000468A2 IES20000468A IES20000468A2 IE S20000468 A2 IES20000468 A2 IE S20000468A2 IE S20000468 A IES20000468 A IE S20000468A IE S20000468 A2 IES20000468 A2 IE S20000468A2
Authority
IE
Ireland
Prior art keywords
credit card
user
authentication
authentication server
code
Prior art date
Application number
Inventor
Philip Meagher
Original Assignee
Seaglade Developmetns Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Seaglade Developmetns Ltd filed Critical Seaglade Developmetns Ltd
Priority to PCT/IE2001/000004 priority Critical patent/WO2001052205A1/en
Priority to AU2001227007A priority patent/AU2001227007A1/en
Publication of IES20000468A2 publication Critical patent/IES20000468A2/en

Links

Abstract

A method and apparatus for generating a telephone call from an authentication server to a credit card user to validate a transaction. The server retrieves a telephone number and Personal Identification Number (PIN) when a transaction request is received and when the user enters the correct PIN generates an authentication code based on the transaction and the PIN to validate the transaction. The invention prevents fraudulent use of the card and guarantees all transactions. <Figure 1>

Description

“A Processing Method and Apparatus” IE000468 The present invention relates to a processing system and apparatus for use in processing credit card transactions. The invention is particularly, but not exclusively suited for use in an electronic commerce environment. ·· *5? f-jsm .•*»X |N 2.0 2'5 The business of selling products and services across communication channels, such as the Internet, is now generally referred to as electronic commerce or “E Commerce”. Widespread acceptance of E Commerce has not been forthcoming because of legitimate user security concerns. These concerns relate to potential fraud that may be perpetrated against purchasers, vendors or even card issuing financial institutions.
Cards, which have been lost or stolen account for the majority of fraudulent use, however, this use is usually quickly discovered by the user and is easily remedied by cancellation of the card. Additionally, many credit card suppliers perform analysis of purchasing patterns and can identify a stolen card that has not been reported by a radical change in spending. In the E environment where there is no face to face transaction the fraud is easier to perpetrate and can remain undetected for a much longer period.. To perpetrate credit card 1¾ $ up § fr|ud in this arena a criminal normally requires only three data components for credit card Qhbsactions, namely the cardholders name, the credit card number and the expiry date. As ... r? £1 ? 'billing addresses are rarely verified, with this information alone the criminal is free to go “online” and make illegal purchases. The criminal can obtain this information in numerous ways. The necessary information is regularly printed on credit card receipts and therefore if a criminal obtains a carelessly discarded receipt there is significant potential for fraud both through Ecommerce and telesales transactions. People to whom the credit card information 3ias been given legitimately may also obtain the necessary information. For example, a dishonest staff member in a shop, hotel or restaurant can record the credit card number for subsequent use. This is often referred to as compromised numbers fraud. 0 Another form of credit card fraud is that associated with overcharging by unscrupulous vendors. This may occur by way of a direct charge above an agreed amount, an accidental or deliberate double billing or indeed by a service provider periodically and automatically reIE000468 billing the card when not authorised. These risks are particularly pertinent to credit card holders who have relatively high spending limits, in that if fraud should occur, it may be some time before it is detected. Indeed it is possible for low-level fraud to continue undetected if a senior member of staff in a company holds the card where the bill is automatically paid by an accounts department.
Irrespective of how the fraud is carried out there is significant potential for cardholder embarrassment as counterfeit use of the credit card may not become apparent for some time and may lead to refusal of a transaction. Additionally, when fraud does occur the consumer is required to persuade the credit card supplier that fraud has indeed occurred.
Many solutions have been proposed to these problems, however, known solutions suffer from some or all of the limitations mentioned above. Ideally the solution would be to obtain the functionality of a credit card, while ensuring the authenticity of all transactions. Obviously reporting card theft and elaborate verification of altered purchasing patterns do not provide this security. Similarly, the provision of disposable cards of predetermined maximum value or disposable codes while limiting exposure, do not adequately secure transactions.
The Secure Electronic Transaction (SET) protocol defined by leading computer companies 0 and the credit card industry for electronic transmission of credit card details via the Internet is also limited. While SET does provide a detailed protocol for encryption of credit card details and verification of participants in an electronic transaction it is still open to abuse and represents a challenge to criminals to obtain the information required to carry out fraud. SET type solutions are also in direct competition with specific electronic transaction systems such as Check Free, Cyber Cash and First Virtual and this leads to the emergence of incompatible format competing technologies. The existence of a multiplicity of these technologies will be likely to deter both traders and consumers unless a dominant force emerges. Similarly, many of these systems require modifications of the technology used at the point of sale, which will require considerable investment and further limit the uptake of the systems.
Another solution to these problems has been proposed by Millicom International Cellular IE000468 and is marketed under the name GiSMo. The GiSMo system operates as follows:a purchaser requests an order form a vendor on a data channel; upon receiving the request, the vendor retrieves and transmits the order form to the purchaser again on the data channel; the user completes the order form received from the vendor and transmits the purchase request to a GiSMo server; the GiSMo server then responds by sending a purchase specific identification number (PSIN) code for that purchase to the purchasers pre defined telephone number using a Short Messaging Service (SMS) message; the user receives this PSIN code and returns the PSIN code using the data channel to the GiSMo Server; GiSMo then issues the user with, a digital receipt across the data channel; and the account is finally settled between GiSMo and the vendor.
While undoubtedly representing a significant improvement over conventional ECommerce payment methodologies, there are a number of technical and commercial problems with this solution both in terms of security and viability. Each vendor site wishing to use this system must subscribe to the GiSMo service to obtain the appropriate software to process payments. As there is no dominant system of this type vendors have to date been reluctant to sign up for such services. Furthermore, existing credit card companies have resisted attempts by third parties to interpose themselves as Virtual charge Card authorities on any significant scale. Installation of appropriate GiSMo software on each and every vendor site 0 is required. Given the number of Web sites offering products or services currently in existence the time and cost of manually changing all of these sites means that large scale implementation is not feasible. Site owners are reluctant to re-develop their web sites to IE000468 accommodate GiSMo type forms both because of the cost implication and the lack of guaranteed returns. Even where sites do incorporate GiSMo type forms they are compelled to maintain conventional payment forms to accommodate non-GiSMo customers.
Another problem arises in that payment using GiSMo type systems can only be made to vendor sites, which incorporate GiSMo software. This significantly limits the number of sites on which the customer may shop, which is obviously unacceptable. A more appropriate solution will be one which operates independently of the vendor site, where there is no requirement for modification to existing, under-construction or planned web sites. Vendors in such a solution will not be bound to a given customer base and will not be required to make modifications to existing payment strategies. The net technical saving both in storage capacity across the net, business restriction and portability will represent a significant improvement over GiSMo and other systems of this type.
The delivery of a PSIN number to a GSM phone in the GiSMo disclosure represents an inherent risk and limitation. If the GSM phone is stolen then a purchase notification delivered to the phone thief can be authenticated back to GiSMo and allow the transaction to be processed. Thus the theft of the phone is equivalent to the theft of a credit card and offers no additional security. While timely detection of the phone theft is advantageous in limiting fraudulent use it is no better than discovering the theft of an actual credit card and further has the limitation of only operating on GiSMo sites and being operable only by GiSMo customers. The limitation of the GiSMo system arises from the requirement of the user to have access to both a data channel and the telephone thus, a user cannot avail themselves of telesales services. For example, a user cannot telephone for cinema tickets and return confirmation.
As the GiSMo site is directly attached to the Internet it is as susceptible to attach by hackers as any other site. Skilled fraudsters may access the list of authentication PSINs or functions for obtaining these pins. Even if the functions for generating the GiSMo PSIN are frequently changed the realistic possibility exists for the ubiquitous hacker to change one or more previously specified telephone numbers to numbers, which the fraudulent user may manipulate.
IE000468 The system described in GiSMo has another security risk in that the passive cancellation of the order by failure to respond to the SMS message transmitted is not a true authentication feedback loop. Positive confirmation to confirm the authenticity of a given transaction is more secure as, while unlikely, interception of the transmitted SMS in the GiSMo system could permit fraudulent use.
The present invention is directed towards overcoming the aforementioned problems.
Accordingly there is provided a method and or apparatus in accordance with the invention for use with a credit card in a commercial environment of the type having a purchaser interface, through which order transactions are placed for goods or services using credit card data, a vendor interface for receiving placed orders, foe vendor interface further having means for authenticating the legitimacy of the placed order, by communicating credit card data and order data to an authentication authority and receiving an authentication code for an approved transaction, characterised in that method and or apparatus further incorporates means for controlling communication between the authentication authority and a credit card user in response to foe order transaction. In this way, before any transaction is processed, the user must first validate the authenticity of the request rather than merely being informed after foe fact that a transaction has been processed.
Preferably, foe means for authenticating foe legitimacy of foe placed order comprises a first authentication server and a second authentication server.
In one arrangement, communication between these servers is encoded.
Preferably, the second authentication server accepts requests in a predetermined frame format IE000468 only.
In a particularly preferred arrangement, the second authentication server incorporates a computer telephony interface (CTI) for generating a phone call to a user specified telephone number.
Ideally, the second authentication server incorporates means for generating an audio message for transmission to the user.
Preferably, the second authentication server incorporates means for receiving a personal identification number (PIN) from the user and means for comparing the received PIN with a predefined PIN.
Ideally, the second authentication server incorporates means for generating an authentication code based on a periodically alterable algorithm, a user identifier, a vendor identifier, date and time.
In this way it will be understood that no transactions will be processed by the credit card issuing authority without the generated code and therefore will cease. For example the fraudulent practice known as “skimming” in which the credit card is swiped twice will generate two calls to the user and will be immediately apparent. Additionally, unscrupulous vendors will realise that automatic re-billing of the credit card will generate a call and will be declined by the user if the product or service is no longer required.
Another benefit of the card is that parents or guardians can give user cards to minors in their care with confidence. If the minor requests authorisation for a frivolous or excessive purchase the parent or guardian can decline the transaction. On the other hand, legitimate purchases can be validated. In addition to this flexibility, the use of these cards will be helpful in prevention of theft by bullies.
The card of the invention will also be useful to purchasing managers who can issue individual cards, departmental cards or can generally issue the office card number. The manager can IE000468 then specify contact criteria on each account oron the general account. For example, the manager may request that verification contact be made for an individual item in excess of a certain amount. They may equally request contact when a budgeted amount is exceeded in a certain period or when a good or service transaction is received outside of a given set of products or services specified.
Ideally, the second authentication server incorporates means for generating calls through the CTI in response to these conditions.
In a particularly preferred arrangement, the second authentication server incorporates means for automatically generating a response telephone box in response to and unanswered call and storing the generated message in the box.
In one embodiment, the box is formed for reception of the PIN asynchronously.
Thus, when a call to verify a transaction cannot be completed the message may be stored and the user contacted using a subsequent message or using a Short Messaging System (SMS) formatted code with a number identifying the box.
According to one aspect of the invention there is provided a method for authenticating credit card transactions comprising the steps of: identifying a purchase request; extracting customer details associated with the request; extracting vendor details associated with the request; generating a confirmation call to a user to validate the purchase request; receiving an authentication signal from the user; and IE000468 generating a unique authentication code based on extracted data and timestamp information.
Preferably, the method further incorporates the steps of retrieving a customer code associated with an account and transmits this information across a secure line or encrypts the information to an independent network .
A method and or apparatus formed or operated in accordance with the invention has a number of distinct advantages over known solutions. As no software resides on vendor sites, there is no limitation to the number and or hardware on which the invention can operate conveniently facilitating implementation and acceptance. Positive confirmation from the user for each purchase eliminates the risk of fraudulent use as the user confirms and a device does not provide confirmation. Automatic call back when the credit card is not presented significantly reduces staff or operating system requirements. Furthermore there is no subjective decision making required. As the call back facility is not accessible from the Internet there is no risk that the mechanism will be hacked by fraudsters. Furthermore, users of the invention are not bound to a specific card issuer or sites with appropriate software.
Preferably, the computer telephony interface is formed for automatic generation of an audio message for transmission to the credit card user.
Preferably, the second authentication server incorporates means for receiving a personal identification number (PIN) from the credit card user during communication between the authentication authority and a credit card user in response to the order transaction and means for comparing the received PIN with a predefined PIN stored on the second authentication server.
Ideally, the second authentication server incorporates means for automatically generating an authentication code in response to a matched PIN condition based on, a user identifier, a vendor identifier, date, time and cost.
IE000468 Preferably, the means for automatically controlling communication between the authentication authority and a credit card user in response to the order transaction further incorporates means for automatically generating a response telephone box and for communicating a telephone box location to the credit card user.
According to one aspect of the invention there is provided a processing method for authenticating credit card transactions comprising the steps of: identifying a non face to face, card not present purchase request with an associated cost and product code; extracting customer details from the identified request; extracting vendor details from the identified the request; automatically generating a confirmation call to a user to validate the purchase request in response to the identified purchase request; requesting and receiving a predefined authentication signal from the user; and generating a unique authentication code based on extracted data and timestamp information.
Preferably, the method further incorporating, prior to the automatic call generation, the steps of :retrieving a customer code associated with extracted customer details; generating a fixed length frame formatted message incorporating the customer code, cost and product code, extracted vendor details.
IE000468 . ίο transmission of the fixed length frame formatted message to a second authentication server.
Ideally, the step of automatically generating a confirmation call to a user to validate the purchase request incorporates the further step of retrieving a unique predefined contact location and validation data for the customer code of the fixed length frame formatted message.
According to another aspect of the invention there is provided an authentication server for processing credit card transactions, the server having :a vendor interface for receiving an order from a vendor; processing means for detecting a card not present flag in the received order; and means for authenticating legitimacy of the received order, characterised in that the means for authenticating legitimacy of the received order incorporates means for automatically initiating communication with a credit card user in response to the detected card not present flag, requesting a predefined verification code from the user and means for identifying an authentic verification code to enable processing of the transaction.
Preferably, the means for automatically initiating communication with a credit card user is provided by a second authentication server formed for encoded communication in a predetermined frame format with the authentication server.
Ideally, the second authentication server incorporates a computer telephony interface (CTI) for automatic communication with the credit card user using unique predefined communication data stored in the second authentication server.
IE000468 Preferably, the computer telephony interface is formed for automatic generation of an audio message for transmission to the credit card user.
In one arrangement, the means for identifying an authentic verification code incorporates means for receiving a personal identification number (PIN) from the credit card user and means for comparing the received PIN with a predefined PIN stored on the second authentication server.
Preferably, the second authentication server incorporates means for automatically generating an authentication code in response to a matched PIN condition based on, a user identifier, a vendor identifier, date, time and cost.
In one embodiment, the means for automatically controlling communication between the authentication server and a credit card user in response to the order further incorporates means for automatically generating a response telephone box and for communicating a telephone box location to the credit card user.
According.to. a still further aspect of the invention there is provided a processing system for verification of credit card transactions, having a vendor interface for receiving an order from a vendor and means for authenticating legitimacy of the received order, characterised in that the means for authenticating legitimacy of the received order is provided by a first authentication server connected to the vendor interface and a second authentication server formed for encoded communication in a predetermined frame format with the first authentication server and incorporating means for automatically initiating communication with a credit card user in response to the received order, requesting a predefined verification code from the user and means for identifying an authentic verification code to enable processing of the transaction.
Preferably, the means first authentication server incorporates processing means for detecting a card not present flag in the received order and for controlling communication between the first and second authentication servers using the detected card not present flag.
IE000468 Ideally, the second authentication server incorporates a computer telephony interface (CTI) for automatic communication with the credit card user using unique predefined communication data stored in the second authentication server.
Preferably, the computer telephony interface is formed for automatic generation of an audio message for transmission to the credit card user.
Ideally, the means for identifying an authentic verification code incorporates means for receiving a personal identification number (PIN) from the credit card user and means for comparing the received PIN with a predefined PIN stored on the second authentication server.
Preferably, the second authentication server incorporates means for automatically generating an authentication code in response to a matched PIN condition based on, a user identifier, a vendor identifier, date, time and cost.
In one arrangement, the means for automatically controlling communication between the authentication server and a credit card user in response to the order further incorporates means for automatically generating a response telephone box and for communicating a telephone box location to the credit card user.
According to another aspect of the invention there is provided a processing system for verification of credit card transactions, having a vendor interface for receiving an order from a vendor and means for authenticating legitimacy of the received order, characterised in that the means for authenticating legitimacy of the received order incorporates means for generating an authentic verification code to enable processing of the order by requesting and receiving a predefined code from a user, the authentic verification code incorporating timestamp information and being independent of the predefined code.
Further characteristics and advantages of the processing method and apparatus according to the invention will become clear in the course of the detailed description which follows with reference to the appended drawings, provided by way of a non-limiting example, in which: IE000468 Fig. 1 is a diagrammatic view of an E Commerce environment operating in accordance with the method of the invention; and Fig. 2 is a flow diagram illustrating the steps of the method.
For the purposes of this description, specific system architectures, processors, memory devices, encryption methodologies, communication channels, protocol formats, interfaces, operating systems, timing and performance details have been omitted in order not to unnecessarily obscure the present invention. Thus the constituent components of the invention have been described in terms of functionality, as many ways of achieving said functionality will be readily apparent to those skilled in the art.
Referring to the drawings and initially to Fig. 1 there is illustrated in an E commerce environment in accordance with the invention indicated generally by the reference numeral 1. The component elements of the environment 1 are divided into those elements operating within the Internet shown by the interrupted line 2 and those elements outside of the Internet 2. The elements of the invention operating within the Internet 2 are a purchaser interface P, a vendor interface V and a first authentication server Al. The elements operating outside of the Internet 2 are a second authentication server A2 and a telephone T.
Referring now to Fig. 2 operation of the various components described in relation to Fig. 1 will be more clearly understood from the flow chart illustrating the method of the invention. Before the method of the invention can be implemented a number of steps are required. Firstly a potential user of the system makes an application to the credit card company for approval as a client and for issuance of a credit limit. On the application the user specifies a telephone number and a personal identification number (PIN). Providing the applicant is successful and is accepted as a client of the credit card company a card is then issued in the normal way and operates in common with normal credit card operations. This credit card can be used in conventional face-to-face transactions, however, it is important to note that a particular feature of this credit card is that first four digits of the sixteen digit credit card number which are normally used to identify the type of credit card IE000468 being used are different to those which are normally used. It is important for potential fraudulent users of the card to be made aware that this is a credit card with inherent “security”.
Having obtained a credit card the user can generate a purchase request in step 1. This purchase request is transmitted to the vendor interface V through the purchaser interface P as is currently performed in E commerce transactions. The purchase request may include details of the goods or services being purchased and the price of those goods or services. The purchase request will also include the customer’s card number with the identifying four digits. The transmission of this information to the vendor interface V is shown in Fig. 1 by the reference numeral 10.
On receipt of the purchase request the vendor transmits an authentication request to an authentication authority within step 2. The transmission is identified in Fig. 1 by the reference numeral 11. The authentication authority comprises the first authentication server Al and the second authentication server A2. In step 3 the authentication server Al performs the normal credit verification process to establish whether the user that generated the initial purchasing request has sufficient available credit balance to allow this request to continue. In order not to unnecessarily obscure the present invention, the mechanics of this verification are not described and do not form part of this invention. When the verification of available credit balance and conformation of the fact that the credit card has not been reported stolen are received the first authentication server Al generates a frame format message for transmission to the second authentication server A2 in step 4. (Numeral 12 in Fig. 1). It is an important feature of the current invention that this frame format message is generated only when the card is not physically presented during the transaction. This is achieved by monitoring a “card not presented” or “card not present” field in the conventional validation described.
Another important feature of this invention is that the second authentication server A2 is outside of the Internet and is therefore not susceptible to malicious computer interference called “Hacking”. The second authentication server A2 will only accept communications from the first authentication server Al in a predefined format. It is important to appreciate IE000468 therefore that interrogation requests to the authentication server A2 will not be processed as the only acceptable format of information transmission to the second authentication server A2 will contain a code relating to the particular customer who generated the initial request, an identification of the vendor, an identification of the products or service purchased and details of the cost of that product or service. This information may he encrypted and will in one aspect of the invention not be clearly identifiably related to the credit card number. On receipt of a validly formatted authentication request from the first authentication server Al the second authentication server A2 in step 5 retrieves from a list of customers the telephone number and PIN number specified on initial setup of the account. An automatic dialer forming part of the second authentication server then dials the retrieved telephone number in step 6 (numeral 13 in Fig. 1) and an automatically generated message is played to the telephone when answered. This message will identify the name of the vendor, the product or service being purchased and the cost as identified in the initial purchase request and relayed by the vendor interface V. Typically, this message will take the format of a spoken message saying “You have requested authorisation for......product or service......from....... vendor........at.....currency......value......please enter your PIN number to verify transaction”.
The user can then enter the PIN number specified on initial setup of the account in step 6 (14 Fig. 1) to authenticate the purchase request or alternatively enter 0 to cancel the transaction. On receiving a valid PIN number the authentication server 2 generates an encrypted authentication code being a function of the vendor identification, user identification, time and date in step 7. This code may then be encrypted for retransmission to the first authentication server Al in step 8 (Numeral 15 of Fig. 1).
The various methods of fraudulent use of credit cards above are therefore eliminated, as vendors are aware that double billing or automatic rebilling of the credit card will 0 immediately cause a telephone call to be placed to the user. Similarly it will not be possible for an unscrupulous vendor to double bill using the original authentication as the credit card supplier in charge of the authentication servers Al, A2 will not process IE000468 transactions unless accompanied by a valid code. This code relates as described as above to the user ID, vendor ID time and date. The first authentication server transmits this code together with an approval purchase order to the vendor (Step 8 and numeral 16 of Fig. 1) and the vendor may optionally notify the purchaser of acceptance of the purchase order (Step 9 and numeral 17 of Fig. 1).
As all transactions will be notified to the user of the card it is possible, for example, for a parent to give a credit card to a child where this was previously not possible. In the circumstances where a child uses the card legitimately the parent or guardian will have no problem is validating these legitimate purchase requests. However, if a child uses the credit card to purchase an item of which the parent or guardian does not approve the request can be declined.
In the event that the telephone number being called by the second authentication server A2 is engaged or otherwise unreachable the system can be defined to recall the number within a predefined time period and continue recalling until an answer is obtained.
When a call is answered by some automatic means such as a telephone answering machine or message minder a telephone number can be generated to which the user can telephone to authenticate the transaction request at a later stage.
It is anticipated that the use of GSM standards to extract caller identification number may be used in further verification of the transaction processing request. In any event, the PIN number for the credit card may be taken as general authorisation to proceed with the transaction.
Another feature of this invention is the ability of the system to be modified for use by purchasing managers. For example, if an organisation has many individuals who are authorised to purchase set amounts of materials or supplies in a given period a single credit card number can be made available for such electronic purchases. The account can be modified so that a single source is contactable to validate purchasing requests and the details of this account may specify the purchase requests below a given financial value are IE000468 automatically authorised without reference to the authority.
It will be understood that the invention described above with reference to the use of a credit card may equally well be used with a charge card, debit card or virtual payment system.
The invention is not limited to the embodiments hereinbefore described which may be varied in both construction and detail.

Claims (3)

Claims
1. A processing system for use in processing credit card transactions, the system being of the of the type having a purchaser interface, for generating an order transaction incorporating credit card data, a vendor interface for receiving the generated order transaction and having means for authenticating legitimacy of the generated order transaction, by communication with an authentication authority to receive an authentication code for an approved transaction characterised in that the system further incorporates means for automatically controlling communication between the authentication authority and a credit card user in response to the generated order transaction for card not present identified transactions.
2. A processing system as claimed in claim 1 optionally: in which the means for means for automatically controlling communication is provided by a second authentication server formed for encoded communication in a predetermined frame format with the authentication authority; in which the second authentication server incorporates a computer telephony interface (CTI) for automatic communication with the credit card user using unique predefined communication data stored in the second authentication server; in which the computer telephony interface is formed for automatic generation of an audio message for transmission to the credit card user; in which the second authentication server incorporates means for receiving a personal identification number (PIN) from the credit card user during communication between the authentication authority and a credit card user in response to the order transaction and means for comparing the received PIN with a predefined PIN stored on the second authentication server, the second IE000468 authentication server optionally incorporating means for automatically generating an authentication code in response to a matched PIN condition based on, a user identifier, a vendor identifier, date, time and cost; in which the means for automatically controlling communication between the authentication authority and a credit card user in response to the order transaction further incorporates means for automatically generating a response telephone box and for communicating a telephone box location to the credit card user.
3. A processing method for authenticating credit card transactions comprising the steps of: identifying a non face to face, card not present purchase request with an associated cost and product code ; extracting customer details from the identified request; extracting vendor details from the identified the request; automatically generating a confirmation call to a user to validate the purchase request in response to the identified purchase request; requesting and receiving a predefined authentication signal from the user; and generating a unique authentication code based on extracted data and timestamp information. the processing method optionally incorporating the further steps of: incorporating, prior to the automatic call generation, retrieving a customer code associated with extracted customer details, IE000468 generating a fixed length frame formatted message incorporating the customer code, cost and product code, extracted vendor details, transmission of the fixed length frame formatted message to a second authentication server, and or automatically generating a confirmation call to a user to validate the purchase request incorporates the further step of retrieving a unique predefined contact location and validation data for the customer code of the fixed length frame formatted message. An authentication server for processing credit card transactions, the server having:a vendor interface for receiving an order from a vendor; processing means for detecting a card not present flag in the received order; and means for authenticating legitimacy of the received order, characterised in that the means for authenticating legitimacy of the received order incorporates means for automatically initiating communication with a credit card user in response to the detected card not present flag, requesting a predefined verification code from the user and means for identifying an authentic verification code to enable processing of the transaction. A processing system method and apparatus substantially as herein described with reference to and as shown in the accompanying drawings.
IES20000468 2000-01-12 2000-06-09 A processing method and apparatus IES20000468A2 (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
PCT/IE2001/000004 WO2001052205A1 (en) 2000-01-12 2001-01-12 A processing method and apparatus
AU2001227007A AU2001227007A1 (en) 2000-01-12 2001-01-12 A processing method and apparatus

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
EP00650003 2000-01-12

Publications (1)

Publication Number Publication Date
IES20000468A2 true IES20000468A2 (en) 2001-07-25

Family

ID=27635757

Family Applications (1)

Application Number Title Priority Date Filing Date
IES20000468 IES20000468A2 (en) 2000-01-12 2000-06-09 A processing method and apparatus

Country Status (1)

Country Link
IE (1) IES20000468A2 (en)

Similar Documents

Publication Publication Date Title
US6834270B1 (en) Secured financial transaction system using single use codes
US8660955B2 (en) Method and apparatus for consumer driven protection for payment card transactions
US7379920B2 (en) System and method for facilitating electronic financial transactions using a mobile telecommunication device
US6612488B2 (en) Method and system to prevent fraudulent payment in credit/debit card transactions, and terminals therefor
US20030061163A1 (en) Method and apparatus for verification/authorization by credit or debit card owner of use of card concurrently with merchant transaction
US8645280B2 (en) Electronic credit card with fraud protection
US20040248554A1 (en) Method of paying from an account by a customer having a mobile user terminal, and a customer authenticating network
US20100179906A1 (en) Payment authorization method and apparatus
US20010051902A1 (en) Method for performing secure internet transactions
US20070198410A1 (en) Credit fraud prevention systems and methods
US20070094113A1 (en) Transactional mobile system
US20060106699A1 (en) System and method for conducting secure commercial order transactions
WO2001052205A1 (en) A processing method and apparatus
EP1134707A1 (en) Payment authorisation method and apparatus
GB2398159A (en) Electronic payment authorisation using a mobile communications device
KR20000049788A (en) Personal ID automatic delivery and security by telecommunication system
JP2003168063A (en) Method and system for approving payment in card payment method
US20130144756A1 (en) Transaction system
AU2004312730B2 (en) Transaction processing system and method
JP2003337917A (en) Personal identification system by mobile terminal
IES20000468A2 (en) A processing method and apparatus
GB2360383A (en) Payment authorisation
EP1308912A2 (en) Method and apparatus for crediting debit service accounts
AU2002349173B2 (en) System and method for facilitating electronic financial transactions using a mobile telecommunication device
WO2006055002A1 (en) System and method for conducting secure commercial order transactions