New! View global litigation for patent families

US20120303503A1 - Systems and Methods for Tokenizing Financial Information - Google Patents

Systems and Methods for Tokenizing Financial Information Download PDF

Info

Publication number
US20120303503A1
US20120303503A1 US13481394 US201213481394A US2012303503A1 US 20120303503 A1 US20120303503 A1 US 20120303503A1 US 13481394 US13481394 US 13481394 US 201213481394 A US201213481394 A US 201213481394A US 2012303503 A1 US2012303503 A1 US 2012303503A1
Authority
US
Grant status
Application
Patent type
Prior art keywords
token
device
mobile
information
computer
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
US13481394
Inventor
Devin Michael Cambridge
Brian Kean
Stephen M. Meyers
Norman Theodore Davis, JR.
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
First Data Corp
Original Assignee
First Data Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3234Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving additional secure or trusted devices, e.g. TPM, smartcard, USB or software token
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W12/00Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity
    • H04W12/02Protecting privacy or anonymity
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/80Wireless
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2463/00Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00
    • H04L2463/061Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00 applying further key derivation, e.g. deriving traffic keys from a pair-wise master key
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2463/00Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00
    • H04L2463/062Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00 applying encryption of the keys
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/06Network architectures or network communication protocols for network security for supporting key management in a packet data network
    • H04L63/061Network architectures or network communication protocols for network security for supporting key management in a packet data network for key exchange, e.g. in peer-to-peer networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/12Applying verification of the received information
    • H04L63/126Applying verification of the received information the source of the received data
    • H04W4/50

Abstract

Embodiments of the invention can provide systems and methods for tokenizing financial information associated with mobile device transactions. According to one example embodiment of the invention, a method for providing tokens to devices can be provided. The method can include receiving, from a device, a request for a token to represent financial information; identifying, in response to the request, token information associated with the token; providing at least a portion of the token information to the device; and providing the token to a third party entity, wherein the third party entity utilizes the received token to evaluate a second token subsequently received from one of the device or a user of the device.

Description

    RELATED APPLICATION
  • [0001]
    This application claims priority to U.S. Ser. No. 61/490,501, titled “Trusted Service Manager,” filed on May 26, 2011, the contents of which are incorporated herein by reference.
  • FIELD OF THE INVENTION
  • [0002]
    Embodiments of the invention relate generally to mobile device transactions, and more specifically to systems and methods for tokenizing financial information associated with mobile device transactions.
  • BACKGROUND OF THE INVENTION
  • [0003]
    Mobile devices, such as cell phones, personal digital assistants (“PDAs”), smart phones, and other similar devices, have increasingly been utilized to provide additional functionality beyond traditional voice communications. One component of enabling the mobile devices to support these additional functionalities includes installing software applications on the mobile devices. Mobile device applications can facilitate a variety of services performed by or with the mobile devices, including payment applications (e.g., prepaid, credit, debit, etc.), loyalty or incentive applications, transportation payment applications, access control applications, entertainment applications, and the like. Given the sensitive nature of data that may be utilized in association with these additional applications, mobile devices may make use of secure memory elements configured to store sensitive data, such as account information.
  • [0004]
    In many situations, a user of a mobile device may wish to provide sensitive data to a service provider for authentication purposes or other transaction purposes. For example, a user may wish to provide a credit card account number to a service provider during a service call. However, because the shared memory of the mobile device is inherently insecure, the sensitive data can be exposed to security attacks, such as side channel attacks, Trojan application, and/or input sniffers, if the sensitive data is moved to a shared memory of the mobile device or communicated to a service provider by the mobile device. Accordingly, there is an opportunity for improving the security of financial information and/or other sensitive data by tokenizing the data.
  • BRIEF DESCRIPTION OF THE INVENTION
  • [0005]
    Embodiments of the invention may provide systems and methods for tokenizing financial information associated with mobile device transactions. According to one example embodiment of the invention, a method for providing tokens to devices can be provided. The method can include receiving, from a device, a request for a token to represent financial information; identifying, in response to the request, token information associated with the token; providing at least a portion of the token information to the device; and providing the token to a third party entity, wherein the third party entity utilizes the received token to evaluate a second token subsequently received from one of the device or a user of the device. In certain embodiments, one or more operations can be performed by one or more computers associated with a service provider.
  • [0006]
    According to another embodiment, a system for providing tokens to devices can be provided. The system may include at least one memory and at least one processor. The at least one memory may be configured to store computer-executable instructions. The at least one processor may be configured to receive, from a device, a request for a token to represent financial information; identify, in response to the request, token information associated with the token; provide at least a portion of the token information to the device; and provide the token to a third party entity, wherein the third party entity utilizes the received token to evaluate a second token subsequently received from one of the device or a user of the device. In certain embodiments, one or more operations can be performed by one or more computers associated with a service provider.
  • [0007]
    According to yet another embodiment, a method can be provided. The method can include receiving, from a mobile device, a request for a token to represent financial information; identifying, in response to the request, token information associated with the token; providing at least a portion of the token information to the mobile device; and providing the token to a third party entity, wherein the third party entity utilizes the received token to evaluate a second token received from one of the mobile device or a user of the mobile device. In certain embodiments, one or more operations can be performed by one or more computers associated with a service provider.
  • [0008]
    According to another embodiment, a system for providing tokens to devices can be provided. The system may include at least one memory and at least one processor. The at least one memory may be configured to store computer-executable instructions. The at least one processor may be configured to receive, from a mobile device, a request for a token to represent financial information; identify, in response to the request, token information associated with the token; provide at least a portion of the token information to the mobile device; and provide the token to a third party entity, wherein the third party entity utilizes the received token to evaluate a second token received from one of the mobile device or a user of the mobile device. In certain embodiments, one or more operations can be performed by one or more computers associated with a service provider.
  • [0009]
    Additional systems, methods, apparatus, features, and aspects are realized through the techniques of various embodiments of the invention. Other embodiments and aspects of the invention are described in detail herein and are considered a part of the claimed invention. Other advantages and features can be understood with reference to the description and to the drawings.
  • BRIEF DESCRIPTION OF THE FIGURES
  • [0010]
    FIG. 1 illustrates a block diagram of an example tokenization system that may be utilized in accordance with various embodiments of the invention.
  • [0011]
    FIG. 2 illustrates a flow diagram of an example process for communicating a token to a mobile device, according to an example embodiment of the invention.
  • [0012]
    FIG. 3 illustrates a flow diagram of an example process for utilizing a token in conjunction with a mobile device, according to an example embodiment of the invention.
  • DETAILED DESCRIPTION
  • [0013]
    Various embodiments of the invention are directed to the tokenization of information in association with device transactions. In other words, various embodiments of the invention are directed to the generation of tokens to represent sensitive data, such as financial account data and/or transaction data. Generated tokens may then be utilized by a device, such as a mobile device, in order to reference a transaction and/or authenticate the user. In one example embodiment of the invention, a device may identify a situation in which a token will be utilized to represent sensitive data. For example, a service call situation in which an account number is desired by a technician may be identified as a situation in which a token will be utilized to represent the account number. As other examples, a balance reporting situation or a transaction situation may be identified as situations in which tokens will be utilized. In certain embodiments, a situation may be identified by the device based upon the receipt of user input. For example, a user may request a service call. In other embodiments, a situation may be identified by the device based upon the processing of data, such as transaction data. For example, the device may identify a transaction error and automatically trigger a service call situation.
  • [0014]
    Once a desired tokenization situation has been identified, a tokenization request may be prepared or generated by the device, and the tokenization request may be communicated to a tokenization service provider. A wide variety of information may be included in the request, including but not limited to, a type associated with the desired situation (e.g., a service call, a balance reporting situation, a transaction, etc.), an identifier of information to be tokenized, and/or an identifier of a service provider or other party to which a token will be communicated. The tokenization service provider may process the request in order to generate token information, and the generated token information may be provided to the device. In certain embodiments, the tokenization service provider may generate a token that is returned to the requesting device. In other embodiments, the tokenization service provider may generate a token and determine information that may be utilized by the device to independent identify or generate a token. For example, the tokenization service provider may identify an algorithm that may be utilized by the device to generate a token utilizing a wide variety of information provided by the service provider and/or device information (e.g., an identifier of a mobile device secure element, card production life cycle information, etc.). As another example, the tokenization service provider may determine a token number or other identifier and provide the identifier to a device to facilitate a device selection of a token generated by the device (e.g., a first token, a fourth token, etc.). Indeed, a wide variety of token information may be prepared by the tokenization service provider and communicated to the requesting device in order to facilitate the identification of a token by the device.
  • [0015]
    In addition to returning token information to the requesting device, the tokenization service provider may additionally provide token information (e.g., a token, etc.) to another service provider or entity. For example, the tokenization service provider may provide token information to a service provider that handles technical service calls or to a transaction service provider. The recipient service provider may utilize the received token information in order to authenticate the device and/or to verify the identity of a mobile device user. For example, the recipient service provider may independently receive tokens from both the tokenization service provider and the device (or a user of the device), and the recipient service provider may compare the tokens in order to verify the identity of the device or device user. Additionally, in certain embodiments, the tokenization service provider may also communicate the sensitive data (e.g., financial account number, etc.) that is represented by the token to the recipient service provider. As desired, secure communications networks and/or other communications means may be utilized to communicate information to the recipient service provider. Once the two tokens have been matched by the recipient service provider, the received sensitive data may be utilized by the recipient service provider. As a result of the use of tokens, the storage of sensitive data on a shared or general memory of the device may be reduced and/or avoided. In this regard, security risks associated with the data may be reduced.
  • [0016]
    Various embodiments of the invention utilize trusted service management functionality, which may be implemented by the tokenization service provider, to facilitate integration between multiple service providers and multiple mobile devices operating on any number of carrier networks, each operated by a different mobile network operator (“MNO”). In certain embodiments, a tokenization service provider may be a third party entity strategically positioned to provide tokenization services.
  • [0017]
    Embodiments of the invention now will be described more fully hereinafter with reference to the accompanying drawings, in which embodiments of the invention are shown. This invention may, however, be embodied in many different forms and should not be construed as limited to the embodiments set forth herein; rather, these embodiments are provided so that this disclosure will be thorough and complete, and will fully convey the scope of the invention to those skilled in the art. Like numbers refer to like elements throughout.
  • [0018]
    FIG. 1 represents a block diagram of an example system 100 for providing tokenization services, according to one embodiment of the invention. As shown in FIG. 1, a tokenization service provider (“TSP”) computer 110; multiple mobile network operator (“MNO”) computers 140 a, 140 b; multiple mobile devices 150 a, 150 b; and multiple service provider computers 160 may be in communication via any number of networks 170 and/or multiple carrier networks 180 a, 180 b, each of the carrier networks 180 a, 180 b being associated with a respective MNO computer 140 a, 140 b. Each of these components will now be discussed in further detail.
  • [0019]
    First, the TSP computer 110 may include any number of processor-driven devices, including but not limited to, a server computer, a mainframe computer, one or more networked computers, a desktop computer, a personal computer, a laptop computer, a mobile computer, or any other processor-based device. In addition to having one or more processors 116, the TSP computer 110 may further include one or more memory devices 112, input/output (“I/O”) interface(s) 118, and network interface(s) 119. The memory 112 may be any computer-readable medium, coupled to the processor(s) 116, such as RAM, ROM, and/or a removable storage device for storing data files and a database management system (“DBMS”) to facilitate management of data files and other data stored in the memory 112 and/or stored in one or more separate databases 138. The memory 112 may also store various program modules, such as an operating system (“OS”), a service provider interface 121, a mobile network operator interface 122, and a tokenization module 126. The OS may be, but is not limited to, Microsoft Windows®, Apple OSX™, Unix, a mainframe computer operating system (e.g., IBM z/OS, MVS, OS/390, etc.), or a specially designed operating system. Each of the interfaces and modules 121, 122, 126 may comprise computer-executable program instructions or software, including a dedicated program, for receiving, storing, extracting, managing, processing, and analyzing communications associated with tokenization via any number of suitable networks, such as networks 170 and/or carrier networks 180 a, 180 b.
  • [0020]
    The tokenization module 126 may include any number of suitable software modules and/or applications that facilitate the provisioning and processing of tokenization requests. In one example operation, a tokenization request may be received from a mobile device 150 a, 150 b via a suitable interface or gateway, and the tokenization request may be provided to the tokenization module 126. The tokenization module 126 may process the received request in order to identify, determine, and/or generate token information (e.g., a token, a token life cycle, etc.), and the tokenization module 126 may direct the communication of at least a portion of the token information to the mobile device 150 a, 150 b. Additionally, the tokenization module 126 may direct provision of token information and, as desired, data represented by the token information to a service provider 160 via one or more suitable interfaces and/or gateways. In this regard, a wide variety of data (e.g., financial account data, other sensitive data, etc.) may be represented by tokens, and the tokens may be utilized by the mobile devices 150 a, 150 b and the service providers 160 to identify and/or access the data.
  • [0021]
    One example of the operations that may be performed by the tokenization module 126 is described in greater detail below with reference to FIG. 2.
  • [0022]
    An MNO gateway 134 and associated MNO interface 122 are operable for providing a common point of integration between the tokenization server computer 110 and the multiple MNO computers 140. According to one embodiment, the MNO interface 122 is configured to communicate with each MNO according to the same common MNO message standard, as described further herein. Moreover, according to various embodiments, the MNO gateway 134 and associated MNO interface 122 are further operable to permit the tokenization server computer 110 to communicate with mobile devices 150 via a respective carrier network operated by each MNO. In a similar manner, a service provider gateway 133 and associated service provider interface 121 are operable for providing a common point of integration between the tokenization server computer 110 and the multiple service provider computers 160.
  • [0023]
    Still referring to the TSP computer 110, the I/O interface(s) 118 may facilitate communication between the processor 116 and various I/O devices, such as a keyboard, mouse, printer, microphone, speaker, monitor, bar code reader/scanner, RFID reader, contactless reader, or Hardware Security Modules (“HSMs”) which facilitate secure key management (e.g., test key management for a variety of testing environments, etc.) and the like. The network interface(s) 119 may take any of a number of forms, such as, but not limited to, a network interface card, a modem, a wireless network card, a cellular network card, or any other means operable for facilitating communications with one or more carrier networks 180 a, 180 b and/or other networks 170. Indeed, the TSP computer 110 can communicate directly with mobile devices 150 a, 150 b via the carrier networks 180 a, 180 b, respectively, via network interface(s) 119 and/or via one or more of suitable Web servers 137 or the mobile network operator gateway 134. It will be appreciated that the TSP computer 110 may be implemented on a particular machine, which may include a computer that is designed, customized, configured, or programmed to perform at least one or more functions of the interfaces and modules, according to an example embodiment of the invention.
  • [0024]
    Second, the MNO computers 140 a, 140 b may include any number of processor-driven devices, including but not limited to, a server computer, a mainframe computer, one or more networked computers, a desktop computer, a personal computer, a laptop computer, a mobile computer, or any other processor-based device. In addition to having one or more processors 146 a, 146 b, each of the MNO computers 140 a, 140 b may further include one or more memory devices 142 a, 142 b, input/output (“I/O”) interface(s) 148 a, 148 b, and network interface(s) 149 a, 149 b. The memory 142 a, 142 b may be any computer-readable medium, coupled to the processor(s) 146, such as RAM, ROM, and/or a removable storage device for storing data files and a DBMS to facilitate management of data files and other data stored in the memory 142 a, 142 b and/or stored in one or more separate databases. The memory 142 a, 142 b may also store various program modules, such as an operating system (“OS”), a communications module 144 a, 144 b, and an authentication module 145 a, 145 b. The OS may be, but is not limited to, Microsoft Windows®, Apple OSX™, Unix, a mainframe computer operating system (e.g., IBM z/OS, MVS, OS/390, etc.), or a specially designed operating system. The communications module 144 a, 144 b may comprise computer-executable program instructions or software, including a dedicated program, for facilitating communications with multiple mobile devices 150 a, 150 b operating on the respective carrier networks 180 a, 180 b, and for facilitating mobile device application provisioning and management via a common MNO messaging standard as implemented by the TSP computer 110. The authentication module 145 a, 145 b may comprise computer-executable program instructions or software, including a dedicated program, for facilitating the authentication of mobile devices 150 a, 150 b and/or the establishment of secure communications channels with mobile devices 150 a, 150 b. A wide variety of authentication procedures may be utilized as desired by an authentication module 145 a, 145 b.
  • [0025]
    Still referring to each MNO computer 140 a, 140 b, the I/O interface(s) 148 a, 148 b may facilitate communication between the processors 146 a, 146 b and various I/O devices, such as a keyboard, mouse, printer, microphone, speaker, monitor, bar code reader/scanner, RFID reader, and the like. The network interface(s) 149 a, 149 b may take any of a number of forms, such as, but not limited to, a network interface card, a modem, a wireless network card, a cellular network card, or any other means operable for facilitating communications with one or more carrier networks 180 a, 180 b and/or other network 170. It will be appreciated that the MNO computers 140 a, 140 b may be implemented on a particular machine, which may include a computer that is designed, customized, configured, or programmed to perform at least one or more functions of the communications module 144 a, 144 b, according to an example embodiment of the invention.
  • [0026]
    Third, the mobile devices 150 a, 150 b may be any mobile processor-driven device, such as a mobile phone, radio, pager, laptop computer, handheld computer, PDA, and the like, or any other processor-based mobile device for facilitating communications over one or more carrier networks 180 a, 180 b. For example, each mobile device 150 a, 150 b may be registered with a specific MNO computer 140 a, 140 b for communicating via the respective carrier network 180 a, 180 b. In addition to having one or more processors 156 a, 156 b, each of the mobile devices 150 a, 150 b may further include one or more memory devices 152 a, 152 b, input/output (“I/O”) interface(s) 158 a, 158 b, and network interface(s) 159 a, 159 b. The memory 152 a, 152 b may be any computer-readable medium, coupled to the processor(s) 156, such as RAM, ROM, and/or a removable storage device for storing data files. The memory 152 a, 152 b may include any number of shared or general memories (e.g., memories that may be accessed by a wide variety of applications such as a mobile wallet) and/or any number of secure elements 155 a, 155 b configured to maintain mobile device applications and confidential data. In certain embodiments, a secure element 155 a, 155 b may be configured to store key information, as well as certain identification information for the mobile device and the secure element 155 a, 155 b (e.g., card production life cycle (“CPLC”) information, etc.). In certain embodiments, a secure element 155 a, 155 b may store an authentication module or program utilized by a mobile device 150 a, 150 b to tag an/or encrypt communications output by the mobile device 150 a, 150 b and/or to decrypt communications received by the mobile device 150 a, 150 b. As desired, the authentication module or an application stored on shared memory may be configured to generate tokenization requests and receive token information as described in greater detail below with reference to FIG. 2.
  • [0027]
    The memory 152 a, 152 b may also store any number of data files 153 a, 153 b and/or various program modules, such as an operating system (“OS”), end user interface module(s), and a provisioning module. The OS may be any mobile operating system, including proprietary operating systems by a mobile device manufacturer or mobile network operator, or third party software vendor mobile operating system, such as, but not limited to, Microsoft Windows CE®, Microsoft Windows Mobile®, Symbian OS™, Apple iPhone™ OS, RIM BlackBerry® OS, Palm OS® by ACCESS, or Google Android™. The provisioning module may comprise computer-executable program instructions or software, including a dedicated program, for facilitating mobile device application provisioning on general memory and/or on the secure elements 155 a, 155 b. According to various embodiments, the secure elements 155 a, 155 b may refer to any computer-readable storage in the memory 152 and/or may refer to any securitized medium having memory, such as a Universal Integrated Circuit Card (“UICC”), Subscriber Identity Module (“SIM”), and the like. In one example, the secure elements 155 a, 155 b may be operable with a RFID device or other NFC device associated with the mobile devices 150 a, 150 b. It is also appreciated that the secure elements 155 a, 155 b may be a separate embedded secure element (e.g., smart card chip) or a separate element (e.g., removable memory card, a key fob; connected via Bluetooth, etc.). For example, a secure element chip may be embedded in a mobile device 150 a, 150 b separately from a general operation chip utilized by the mobile device 150 a, 150 b. In certain embodiments, the secure elements 155 a, 155 b may include any suitable hardware and/or software, such as memory, processing components, and communications components. In certain embodiments, the secure elements 155 a, 155 b may be configured to communicate with other elements of the mobile devices 150 a, 150 b, such as a general or shared memory chip associated with the mobile devices 150 a, 150 b. For example, a mobile wallet may be stored in shared memory, and a secure element 155 a, 155 b may be accessed to encrypt and/or decrypt transactions generated by and/or received by the mobile wallet.
  • [0028]
    In certain embodiments, a mobile device 150 a, 150 b may be configured to generate tokenization requests that are provided to the TSP computer 110. For example, a dedicated tokenization application may be stored on a shared memory and/or the secure element 155 a, 155 b. As another example, the authentication application or other provisioned application may also be configured to perform tokenization functions. In operation, a tokenization situation or information to be tokenized may be identified, and a tokenization request may be prepared and communicated to the TSP computer 110. In response to the tokenization request, token information may be received from the TSP computer 110, and the token information may be utilized to identify a token to be utilized in place of information represented by the token. The token may then be utilized by the mobile device 150 a, 150 b or a user of the mobile device 150 a, 150 b to contact a service provider 160 and verify the identity of the device and/or user. In this regard, the security of the information represented by the token may be enhanced.
  • [0029]
    One example of the operations that may be performed by a mobile device 150 a, 150 b to facilitate tokenization is described in greater detail below with reference to FIG. 3.
  • [0030]
    Still referring to each mobile device 150 a, 150 b, the I/O interface(s) 158 a, 158 b may facilitate communication between the processors 156 a, 156 b and various I/O devices, such as a keypad, touch screen, keyboard, mouse, printer, microphone, speaker, screen display, RFID device, NFC device, and the like. The network interface(s) 159 a, 159 b may take any of a number of forms to permit wireless communications according to various communications standards, such as, but not limited to, Code Division Multiple Access (“CDMA”), Global System for Mobile Communication (“GSM”), Universal Wireless Communications (“UWC”), Universal Mobile Telecommunications System (“UMTS”), or General Packet Radio Service (“GPRS”) communication standards as may be implemented by one or more carrier networks 180 a, 180 b. The network interfaces(s) 159 a, 159 b may further permit access to other networks 170, such as via one or more carrier networks 180 a, 180 b providing Internet or other network access, or via Wi-Fi communications onto a Wi-Fi network. It will be appreciated that the mobile devices 150 a, 150 b may be implemented on a particular machine, which may include a computer that is designed, customized, configured, or programmed to perform at least one or more functions of the provisioning module 154 a, 154 b and other mobile communications, including voice communications, data communications, short message service (“SMS”), wireless application protocol (“WAP”), multimedia message service (“MMS”), Internet communications, other wireless communications, and the like, according to an example embodiment of the invention.
  • [0031]
    Although mobile devices 150 a, 150 b are illustrated in FIG. 1, embodiments of the invention may be utilized in conjunction with a wide variety of other devices configured to communicate via the networks 170 and/or carrier networks 180 a, 180 b, such as personal computers and/or tablet computers. Indeed, embodiments of the invention are applicable to any operating environment in which sensitive data may be represented by tokens.
  • [0032]
    Fourth, the service provider computers 160 may include any number of processor-driven devices, including but not limited to, a server computer, a mainframe computer, one or more networked computers, a desktop computer, a personal computer, a laptop computer, a mobile computer, or any other processor-based device. A service provider computer 160 may be configured to provide a wide variety of services to a mobile device user, such as technical services and/or financial reporting services. In addition to having one or more processors 166, each of the service provider computers 160 may further include one or more memory devices 162, input/output (“I/O”) interface(s) 168, and network interface(s) 169. The memory 162 may be any computer-readable medium, coupled to the processor(s) 166, such as RAM, ROM, and/or a removable storage device for storing data files and a DBMS to facilitate management of data files and other data stored in the memory 162 and/or stored in one or more separate databases 175 (e.g., a database of received token information, etc.). The memory 162 may also store various program modules, such as an operating system (“OS”) and a token management module 164. The OS may be, but is not limited to, Microsoft Windows®, Apple OSX™, Unix, a mainframe computer operating system (e.g., IBM z/OS, MVS, OS/390, etc.), or a specially designed operating system. The token management module 164 may comprise computer-executable program instructions or software, including a dedicated program, for managing tokens and/or token information received from the TSP computer 110, managing information represented by tokens, managing associations between tokens and other information, processing tokens received from mobile devices 150 a, 150 b in order to access stored information represented by the tokens, and/or verifying identity and/or authenticating the mobile devices 150 a, 150 b and/or mobile device users.
  • [0033]
    Still referring to each service provider computer 160 the I/O interface(s) 168 may facilitate communication between the processors 166 and various I/O devices, such as a keyboard, mouse, printer, microphone, speaker, monitor, bar code reader/scanner, RFID reader, and the like. The network interface(s) 169 may take any of a number of forms, such as, but not limited to, a network interface card, a modem, a wireless network card, a cellular network card, or any other means operable for facilitating communications with the network 170. It will be appreciated that the service provider computer 160 may be implemented on a particular machine, which may include a computer that is designed, customized, configured, or programmed to perform at least one or more functions of token verification and/or provide other functions to a mobile device or mobile device user (e.g., technical support functions, etc.).
  • [0034]
    The network 170 may include any telecommunication and/or data network, whether public, private, or a combination thereof, including a local area network, a wide area network, an intranet, an internet, the Internet, intermediate handheld data transfer devices, a publicly switched telephone network (“PSTN”), a cellular network, and/or any combination thereof and may be wired and/or wireless. The network 170 may also allow for real time, near real time, off-line, and/or batch transactions to be transmitted between or among the TSP computer 110, the MNO computer(s) 140 a, 140 b, the mobile devices 150 a, 150 b, and the service provider computers 160. Due to network connectivity, various methodologies as described herein may be practiced in the context of distributed computing environments. It will also be appreciated that the network 170 may include a plurality of networks, each with devices such as gateways and routers for providing connectivity between or among networks 170. Instead of, or in addition to, a network 170, dedicated communication links may be used to connect the various devices in accordance with an example embodiment.
  • [0035]
    The mobile carrier networks 180 a, 180 b may include any cellular telecommunication network, each operated by a respective mobile network operator. The mobile carrier networks may be implemented to operate according to one or more wireless technology formats, including, but not limited to, CDMA, GSM, UWC, UMTS, GPRS, and/or any “generation” or version thereof. Accordingly, in one embodiment, each mobile device 150 a, 150 b is configured to operate primarily on a certain carrier network 180 a, 180 b as operated by the mobile network operator with which the mobile device end user has an agreement and with which the mobile device is registered. It is appreciated, however, that, according to various embodiments, mobile devices 150 a, 150 b and carrier networks 180 a, 180 b may be configured to permit interoperability of mobile devices on non-registered carrier networks 180 a, 180 b.
  • [0036]
    Generally, each of the memories and data storage devices, such as the memories 112, 142 a, 142 b, 152 a, 152 b, 162 and the databases 138, 175 and/or any other memory and data storage device, can store data and information for subsequent retrieval. In this manner, the system 100 can store various received or collected information in memory or a database associated with one or more of the TSP computer(s) 110, the MNO computer(s) 140 a, 140 b, the mobile devices 150 a, 150 b, and/or the service provider computer(s) 160. The memories and databases can be in communication with each other and/or other databases, such as a centralized database, or other types of data storage devices. When needed, data or information stored in a memory or a database may be transmitted to a centralized database capable of receiving data, information, or data records from more than one database or other data storage devices. In other embodiments, the databases shown can be integrated or distributed into any number of databases or other data storage devices.
  • [0037]
    Suitable processors, such as the processors 116, 146 a, 146 b, 151 a, 151 b, 166, may comprise a microprocessor, an application-specific integrated circuit (“ASIC”), and/or state machine. Example processors can be those provided by Intel Corporation (Santa Clara, Calif.), AMD Corporation (Sunnyvale, Calif.), and Motorola Corporation (Schaumburg, Ill.). According to various embodiments, one or more of the computers can be configured as a multi-processor computer having multiple processors 116, 146 a, 146 b, 151 a, 151 b, 166 providing parallel and/or redundant processing capabilities. Such processors comprise, or may be in communication with, media, for example, computer-readable media, which stores instructions that, when executed by the processor, cause the processor to perform the elements described herein. Embodiments of computer-readable media include, but are not limited to, an electronic, optical, magnetic, or other storage or transmission device capable of providing a processor with computer-readable instructions. Other examples of suitable media include, but are not limited to, a floppy disk, pen drive, CD-ROM, DVD, magnetic disk, memory chip, ROM, RAM, EPROM, EEPROM, a configured processor, all optical media, all magnetic tape or other magnetic media, or any other medium from which a computer processor can read instructions. Also, various other forms of computer-readable media may transmit or carry instructions to a computer, including a router, gateway, private or public network, or other transmission device or channel, both wired and wireless. The instructions may comprise code from any computer-programming language, including but not limited to, assembly, C, C++, C#, Visual Basic, Java, Python, Perl, JavaScript, GPSS, LISP, SAS, Parlay, JAIN, or Open Mobile Architecture.
  • [0038]
    The system 100 shown in and described with respect to FIG. 1 is provided by way of example only. Numerous other operating environments, system architectures, and device configurations are possible. Other system embodiments can include fewer or greater numbers of components and may incorporate some or all of the functionality described with respect to the system components shown in FIG. 1. Accordingly, embodiments of the invention should not be construed as being limited to any particular operating environment, system architecture, or device configuration.
  • [0039]
    According to an aspect of the invention, methods for representing data or information by tokens may be provided. In this regard, the security of sensitive data may be enhanced while tokens that represent the data are communicated. FIG. 2 illustrates a flow diagram of an example method 200 for communicating a token to a mobile device, according to an example embodiment of the invention. The method 400 may be performed by a suitable tokenization system, such as the system 100 illustrated in FIG. 1. The method 200 may begin at block 205.
  • [0040]
    At block 205, information to be represented by a token may be identified. For example, a tokenization request may be received from a mobile device, such as one of the mobile devices 150 a, 150 b illustrated in FIG. 1. The received tokenization request may be evaluated or analyzed in order to determine a type of tokenization situation, such as a customer support situation, a balance reporting situation, or a transaction situation, and the information to be represented by the token (e.g., financial account information, etc.) may be identified based at least in part upon the determined type of tokenization situation. As another example, an indicator of the information to be represented by a token may be included in a received tokenization request.
  • [0041]
    At block 210, a type of token for representing the information may be identified. A wide variety of different types of tokens may be utilized as desired in various embodiments of the invention. In certain embodiments, a type of token to be utilized may be determined based at least in part upon the information to be tokenized, the tokenization situation, preferences of a service provider to whom the token will be communicated, and/or preferences associated with the mobile device and/or a mobile device user. Additionally, a wide variety of suitable techniques may be utilized as desired to generate a token. For example, a token may be simply identified as a next unused sequential number. As another example, a token may be derived based upon a wide variety of combinations of base level information and/or other information, such as information associated with the mobile device (e.g., a device identifier, etc.) and/or a secure element associated with the mobile device (e.g., CPLC data, etc.).
  • [0042]
    At block 215, which may be optional in certain embodiments of the invention, a lifespan for a token may be determined. In this regard, an amount of time during which the token may be utilized and/or presented to a service provider may be limited. In certain embodiments, the type of token or tokenization situation may be taken into account when determining a token lifespan. For example, a relatively short (e.g., ten minutes, etc.) lifespan may be utilized for a transaction token while a relatively longer (e.g., one hour, one day, etc.) lifespan is utilized for a technical support process.
  • [0043]
    At block 220, a token may be generated or identified. The token may be representative of the information to be tokenized. As set forth above, a wide variety of different types of tokens and/or token generation techniques may be utilized to generate or identify a token. Once the token has been generated or identified, the token may be provided to the mobile device at block 225 in response to the tokenization request. As an alternative to communicating the token to the mobile device, base level information and/or instructions for independently identifying or generating the token may be communicated to the mobile device. For example, a base level number and/or an instruction for deriving a token utilizing the base level number and device identifying information may be communicated to the mobile device. As another example, an identifier of one of a series of tokens stored on the mobile device may be communicated.
  • [0044]
    At block 230, the token and/or the information represented by the token may be provided to another entity, such as one of the service provider computers 160 illustrated in FIG. 1. In this regard, the token and/or information represented by the token may be stored by a service provider and utilized to facilitate a subsequent authentication and/or validation of the mobile device and/or mobile device user. For example, the token may be stored for a subsequent comparison to a token received from the mobile device or mobile device user.
  • [0045]
    The method 200 may end following block 230.
  • [0046]
    FIG. 3 illustrates a flow diagram of an example method 400 for utilizing a token in conjunction with a mobile device (or other device), according to an example embodiment of the invention. The method 300 may be performed by a suitable mobile device, such as one of the mobile devices 150 a, 150 b illustrated in FIG. 1. The method 300 may begin at block 305.
  • [0047]
    At block 305, a situation in which a token will be utilized to represent information (e.g., sensitive data, etc.) may be identified. In certain embodiments, a tokenization situation may be identified based upon the receipt of user input. For example, a user may request the initiation of a transaction, and a tokenization situation may be identified based upon the received request. In other embodiments, a tokenization situation may be automatically identified by a mobile device based upon the triggering of any number of predetermined criteria or conditions. For example, an error may be identified by the mobile device, and a service request tokenization situation may be identified.
  • [0048]
    Once a tokenization situation has been identified, operations may continue at block 310, and a tokenization request may be prepare or generated. The tokenization request may then be communicated to a suitable tokenization service provider, such as the TSP computer 110 illustrated in FIG. 1. A wide variety of information may be included in the tokenization request as desired in various embodiments of the invention, including but not limited to, an identifier of a type of tokenization situation, identification information for the mobile device and/or mobile device secure element, and/or any number of user preferences for generating a token or token information. The tokenization request may be processed by the TSP computer 110, and token information may be returned to the mobile device. The token information may be received at block 315. As desired, the token information may include a wide variety of different types of information. For example, the token information may include a generated token. As another example, the token information may include an identifier of a token to be utilized by the mobile device, such as a numerical identifier of a stored token to be utilized. As yet another example, the token information may include data and/or instructions (e.g., base level data and/or algorithms, etc.) for generating or deriving a token by the mobile device.
  • [0049]
    At block 320, a determination may be made as to whether a token was received from the TSP computer 110. If it is determined at block 320 that a token has been received, then operations may continue at block 330, and the received token may be identified as a token to be utilized to represent the information. If, however, it is determined at block 320 that a token has not been received, then operations may continue at block 325, and the mobile device may independently identify, generate, or derive a token to be utilized. For example, received token information may be processed in order to derive or identify a token. Operations may then continue at block 330 and the identified or derived token may be identified as a token to be utilized to represent the information.
  • [0050]
    At block 335, the token may be provided to another entity or service provider in place of the information represented by the token. In this regard, the security of the represented information may be enhanced. A wide variety of suitable techniques may be utilized to provide the token to a service provider. For example, the mobile device may provide the token via a suitable network connection and/or via any number of suitable Web sites or graphical user interfaces hosted by the service provider. As another example, a mobile device user may provide the token to the service provider via a telephone voice connection, by entering the token via touch tone dialing or voice recognition, and/or by entering the token via a suitable Web form provided by the service provider.
  • [0051]
    Once the token has been provided by the mobile device or mobile device user to the service provider, the service provider may compare the received token to a token previously received from the TSP computer 110. In this regard, the service provider may verify the identity of the mobile device and/or user. Additionally, based upon a successful match, the service provider may access the information represented by the token (e.g., account information, etc.) without the information being communicated from the mobile device or stored one a shared memory of the mobile device. As desired, the service provider may request additional information from the mobile device or mobile device user in order to further authenticate the mobile device or mobile device user. For example, during a service call, a mobile device user may provide a service token to a service provider representative in order to facilitate the service provider representative accessing account information for the mobile device user. The service provider representative may then request additional information from the user, such as name, address, and/or security question information, in order to authenticate the user.
  • [0052]
    The method 300 may end following block 335.
  • [0053]
    The operations described and shown in the methods 200 and 300 of FIGS. 2-3 may be carried out or performed in any suitable order as desired in various embodiments of the invention. Additionally, in certain embodiments, at least a portion of the operations may be carried out in parallel. Furthermore, in certain embodiments, less than or more than the operations described in FIGS. 2-3 may be performed.
  • [0054]
    The invention is described above with reference to block and flow diagrams of systems, methods, apparatuses, and/or computer program products according to example embodiments of the invention. It will be understood that one or more blocks of the block diagrams and flow diagrams, and combinations of blocks in the block diagrams and the flow diagrams, respectively, can be implemented by computer-executable program instructions. Likewise, some blocks of the block diagrams and flow diagrams may not necessarily need to be performed in the order presented, or may not necessarily need to be performed at all, according to some embodiments of the invention.
  • [0055]
    Various block and/or flow diagrams of systems, methods, apparatus, and/or computer program products according to example embodiments of the invention are described above. It will be understood that one or more blocks of the block diagrams and flow diagrams, and combinations of blocks in the block diagrams and flow diagrams, respectively, can be implemented by computer-executable program instructions. Likewise, some blocks of the block diagrams and flow diagrams may not necessarily need to be performed in the order presented, or may not necessarily need to be performed at all, according to some embodiments of the invention.
  • [0056]
    These computer-executable program instructions may be loaded onto a special purpose computer or other particular machine, a processor, or other programmable data processing apparatus to produce a particular machine, such that the instructions that execute on the computer, processor, or other programmable data processing apparatus create means for implementing one or more functions specified in the flow diagram block or blocks. These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means that implement one or more functions specified in the flow diagram block or blocks. As an example, embodiments of the invention may provide for a computer program product, comprising a computer-usable medium having a computer-readable program code or program instructions embodied therein, said computer-readable program code adapted to be executed to implement one or more functions specified in the flow diagram block or blocks. The computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational elements or steps to be performed on the computer or other programmable apparatus to produce a computer-implemented process such that the instructions that execute on the computer or other programmable apparatus provide elements or steps for implementing the functions specified in the flow diagram block or blocks.
  • [0057]
    Accordingly, blocks of the block diagrams and flow diagrams support combinations of means for performing the specified functions, combinations of elements or steps for performing the specified functions and program instruction means for performing the specified functions. It will also be understood that each block of the block diagrams and flow diagrams, and combinations of blocks in the block diagrams and flow diagrams, can be implemented by special purpose, hardware-based computer systems that perform the specified functions, elements or steps, or combinations of special purpose hardware and computer instructions.
  • [0058]
    Many modifications and other embodiments of the invention set forth herein will be apparent having the benefit of the teachings presented in the foregoing descriptions and the associated drawings. Therefore, it is to be understood that the invention is not to be limited to the specific embodiments disclosed and that modifications and other embodiments are intended to be included within the scope of the appended claims. Although specific terms are employed herein, they are used in a generic and descriptive sense only and not for purposes of limitation.

Claims (15)

  1. 1. A computer-implemented method for providing tokens to devices, the method comprising:
    receiving, from a device, a request for a token to represent financial information;
    identifying, in response to the request, token information associated with the token;
    providing at least a portion of the token information to the device; and
    providing the token to a third party entity, wherein the third party entity utilizes the received token to evaluate a second token subsequently received from one of the device or a user of the device,
    wherein the above operations are performed by one or more computers associated with a tokenization service provider.
  2. 2. The computer-implemented method of claim 1, wherein the token information comprises the token.
  3. 3. The computer-implemented method of claim 1, wherein the token information comprises information that may be utilized by the device to identify or derive the token.
  4. 4. The computer-implemented method of claim 1, wherein receiving a request for a token comprises receiving a request for a token to represent a financial account number.
  5. 5. The computer-implemented method of claim 1, further comprising:
    identifying a tokenization situation associated with the request; and
    identifying the token information based at least in part upon the identified tokenization situation.
  6. 6. A system for providing tokens to devices, the system comprising:
    at least one memory configured to store computer-executable instructions; and
    at least one processor configured to access the at least one memory and execute the computer-executable instructions to:
    receive, from a device, a request for a token to represent financial information;
    identify, in response to the request, token information associated with the token;
    provide at least a portion of the token information to the device; and
    provide the token to a third party entity, wherein the third party entity utilizes the received token to evaluate a second token subsequently received from one of the device or a user of the device,
    wherein the above operations are performed by one or more computers associated with a tokenization service provider.
  7. 7. The system of claim 6, wherein the token information comprises the token.
  8. 8. The system of claim 6, wherein the token information comprises information that may be utilized by the device to identify or derive the token.
  9. 9. The system of claim 6, wherein the computer-executable instructions to receive a request for a token comprise instructions to receive a request for a token to represent a financial account number.
  10. 10. The system of claim 6, wherein the at least one processor is further configured to execute the computer-executable instructions to:
    identify a tokenization situation associated with the request; and
    identify the token information based at least in part upon the identified tokenization situation.
  11. 11. A method comprising:
    receiving, from a mobile device, a request for a token to represent financial information;
    identifying, in response to the request, token information associated with the token;
    providing at least a portion of the token information to the mobile device; and
    providing the token to a third party entity, wherein the third party entity utilizes the received token to evaluate a second token received from one of the mobile device or a user of the mobile device,
    wherein the above operations are performed by one or more computers associated with a service provider.
  12. 12. The computer-implemented method of claim 11, wherein the token information comprises the token.
  13. 13. The computer-implemented method of claim 11, wherein the token information comprises information that may be utilized by the mobile device to identify or derive the token.
  14. 14. The computer-implemented method of claim 11, wherein receiving a request for a token comprises receiving a request for a token to represent a financial account number.
  15. 15. The computer-implemented method of claim 11, further comprising:
    identifying a tokenization situation associated with the request; and
    identifying the token information based at least in part upon the identified tokenization situation.
US13481394 2011-05-26 2012-05-25 Systems and Methods for Tokenizing Financial Information Pending US20120303503A1 (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
US201161490501 true 2011-05-26 2011-05-26
US13481394 US20120303503A1 (en) 2011-05-26 2012-05-25 Systems and Methods for Tokenizing Financial Information

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
US13481394 US20120303503A1 (en) 2011-05-26 2012-05-25 Systems and Methods for Tokenizing Financial Information

Publications (1)

Publication Number Publication Date
US20120303503A1 true true US20120303503A1 (en) 2012-11-29

Family

ID=47219227

Family Applications (10)

Application Number Title Priority Date Filing Date
US13481356 Active 2033-05-11 US9059980B2 (en) 2011-05-26 2012-05-25 Systems and methods for authenticating mobile devices
US13481352 Active US9106632B2 (en) 2011-05-26 2012-05-25 Provisioning by delivered items
US13481364 Active 2033-05-08 US9106633B2 (en) 2011-05-26 2012-05-25 Systems and methods for authenticating mobile device communications
US13481377 Active 2032-08-10 US8752127B2 (en) 2011-05-26 2012-05-25 Systems and methods for identifying devices by a trusted service manager
US13481437 Active US8775305B2 (en) 2011-05-26 2012-05-25 Card-present on-line transactions
US13481433 Active 2032-07-17 US8880886B2 (en) 2011-05-26 2012-05-25 Systems and methods for authenticating mobile devices
US13481394 Pending US20120303503A1 (en) 2011-05-26 2012-05-25 Systems and Methods for Tokenizing Financial Information
US13481346 Abandoned US20120303310A1 (en) 2011-05-26 2012-05-25 Systems and Methods for Providing Test Keys to Mobile Devices
US13481387 Active 2032-12-16 US9154477B2 (en) 2011-05-26 2012-05-25 Systems and methods for encrypting mobile device communications
US14268703 Active US9331996B2 (en) 2011-05-26 2014-05-02 Systems and methods for identifying devices by a trusted service manager

Family Applications Before (6)

Application Number Title Priority Date Filing Date
US13481356 Active 2033-05-11 US9059980B2 (en) 2011-05-26 2012-05-25 Systems and methods for authenticating mobile devices
US13481352 Active US9106632B2 (en) 2011-05-26 2012-05-25 Provisioning by delivered items
US13481364 Active 2033-05-08 US9106633B2 (en) 2011-05-26 2012-05-25 Systems and methods for authenticating mobile device communications
US13481377 Active 2032-08-10 US8752127B2 (en) 2011-05-26 2012-05-25 Systems and methods for identifying devices by a trusted service manager
US13481437 Active US8775305B2 (en) 2011-05-26 2012-05-25 Card-present on-line transactions
US13481433 Active 2032-07-17 US8880886B2 (en) 2011-05-26 2012-05-25 Systems and methods for authenticating mobile devices

Family Applications After (3)

Application Number Title Priority Date Filing Date
US13481346 Abandoned US20120303310A1 (en) 2011-05-26 2012-05-25 Systems and Methods for Providing Test Keys to Mobile Devices
US13481387 Active 2032-12-16 US9154477B2 (en) 2011-05-26 2012-05-25 Systems and methods for encrypting mobile device communications
US14268703 Active US9331996B2 (en) 2011-05-26 2014-05-02 Systems and methods for identifying devices by a trusted service manager

Country Status (1)

Country Link
US (10) US9059980B2 (en)

Cited By (35)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20130282588A1 (en) * 2012-04-22 2013-10-24 John Hruska Consumer, Merchant and Mobile Device Specific, Real-Time Dynamic Tokenization Activation within a Secure Mobile-Wallet Financial Transaction System
US8645280B2 (en) * 2010-06-04 2014-02-04 Craig McKenzie Electronic credit card with fraud protection
US8827154B2 (en) 2009-05-15 2014-09-09 Visa International Service Association Verification of portable consumer devices
WO2014186635A1 (en) 2013-05-15 2014-11-20 Visa International Service Association Mobile tokenization hub
US9038886B2 (en) 2009-05-15 2015-05-26 Visa International Service Association Verification of portable consumer devices
US9059980B2 (en) 2011-05-26 2015-06-16 First Data Corporation Systems and methods for authenticating mobile devices
US9256871B2 (en) 2012-07-26 2016-02-09 Visa U.S.A. Inc. Configurable payment tokens
US9280765B2 (en) 2011-04-11 2016-03-08 Visa International Service Association Multiple tokenization for authentication
US9317848B2 (en) 2009-05-15 2016-04-19 Visa International Service Association Integration of verification tokens with mobile communication devices
US9372971B2 (en) 2009-05-15 2016-06-21 Visa International Service Association Integration of verification tokens with portable computing devices
US9424413B2 (en) 2010-02-24 2016-08-23 Visa International Service Association Integration of payment capability into secure elements of computers
WO2016181612A1 (en) * 2015-05-13 2016-11-17 Sony Corporation Apparatus and method for issued token management
US9516487B2 (en) 2013-11-19 2016-12-06 Visa International Service Association Automated account provisioning
US9524501B2 (en) 2012-06-06 2016-12-20 Visa International Service Association Method and system for correlating diverse transaction data
US9530131B2 (en) 2008-07-29 2016-12-27 Visa U.S.A. Inc. Transaction processing using a global unique identifier
US9537841B2 (en) * 2014-09-14 2017-01-03 Sophos Limited Key management for compromised enterprise endpoints
US9547769B2 (en) 2012-07-03 2017-01-17 Visa International Service Association Data protection hub
US9582801B2 (en) 2009-05-15 2017-02-28 Visa International Service Association Secure communication of payment information to merchants using a verification token
US9646303B2 (en) 2013-08-15 2017-05-09 Visa International Service Association Secure remote payment transaction processing using a secure element
US9665722B2 (en) 2012-08-10 2017-05-30 Visa International Service Association Privacy firewall
US9680942B2 (en) 2014-05-01 2017-06-13 Visa International Service Association Data verification using access device
US9704155B2 (en) 2011-07-29 2017-07-11 Visa International Service Association Passing payment tokens through an hop/sop
US9715681B2 (en) 2009-04-28 2017-07-25 Visa International Service Association Verification of portable consumer devices
US9741051B2 (en) 2013-01-02 2017-08-22 Visa International Service Association Tokenization and third-party interaction
US9775029B2 (en) 2014-08-22 2017-09-26 Visa International Service Association Embedding cloud-based functionalities in a communication device
US9780953B2 (en) 2014-07-23 2017-10-03 Visa International Service Association Systems and methods for secure detokenization
US9792611B2 (en) 2009-05-15 2017-10-17 Visa International Service Association Secure authentication system and method
US9830595B2 (en) 2012-01-26 2017-11-28 Visa International Service Association System and method of providing tokenization as a service
US9846861B2 (en) 2012-07-25 2017-12-19 Visa International Service Association Upstream and downstream data conversion
US9846878B2 (en) 2014-01-14 2017-12-19 Visa International Service Association Payment account identifier system
US9848052B2 (en) 2014-05-05 2017-12-19 Visa International Service Association System and method for token domain control
US9898740B2 (en) 2008-11-06 2018-02-20 Visa International Service Association Online challenge-response
US9911118B2 (en) 2012-11-21 2018-03-06 Visa International Service Association Device pairing via trusted intermediary
US9922322B2 (en) 2013-12-19 2018-03-20 Visa International Service Association Cloud-based transactions with magnetic secure transmission
US9942043B2 (en) 2015-04-23 2018-04-10 Visa International Service Association Token security on a communication device

Families Citing this family (150)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9047601B2 (en) * 2006-09-24 2015-06-02 RFCyber Corpration Method and apparatus for settling payments using mobile devices
KR101207178B1 (en) * 2008-12-12 2012-11-30 에스케이플래닛 주식회사 A system, a method, a service server, a mobile terminal, an end terminal and a storage means for service supply
US20120035993A1 (en) * 2009-03-09 2012-02-09 Rajender Kumar Nangia Method of providing brand promotion via mobile terminal and the system thereof
US8989705B1 (en) 2009-06-18 2015-03-24 Sprint Communications Company L.P. Secure placement of centralized media controller application in mobile access terminal
FR2951898B1 (en) * 2009-10-27 2015-10-02 Sagem Comm A method for establishing an application session, and corresponding communication device
US9172680B2 (en) * 2010-06-07 2015-10-27 Protected Mobility, Llc Systems and methods for enabling secure messaging, command, and control of remote devices, communicated via a short message service or other message oriented communications mediums
US8538845B2 (en) 2011-06-03 2013-09-17 Mozido, Llc Monetary transaction system
US9639825B1 (en) 2011-06-14 2017-05-02 Amazon Technologies, Inc. Securing multifactor authentication
US9628875B1 (en) * 2011-06-14 2017-04-18 Amazon Technologies, Inc. Provisioning a device to be an authentication device
CA2841776C (en) * 2011-07-11 2018-03-06 Blackberry Limited Data integrity for proximity-based communication
KR20140058564A (en) * 2011-07-18 2014-05-14 비자 인터네셔널 서비스 어소시에이션 Mobile device with secure element
US20150222729A1 (en) * 2011-10-26 2015-08-06 Mastercard International Incorporated Methods, systems and computer readable media for enabling a downloadable service to access components in a mobile device
EP2771862A4 (en) * 2011-10-26 2015-07-29 Mastercard International Inc Methods, systems and computer readable media for enabling a downloadable service to access components in a mobile device
WO2013066621A1 (en) 2011-11-01 2013-05-10 Jvl Ventures, Llc Systems, methods, and computer program products for managing secure elements
US9544759B2 (en) 2011-11-01 2017-01-10 Google Inc. Systems, methods, and computer program products for managing states
US9208488B2 (en) 2011-11-21 2015-12-08 Mozido, Inc. Using a mobile wallet infrastructure to support multiple mobile wallet providers
JP5643741B2 (en) * 2011-12-02 2014-12-17 株式会社東芝 Authentication device, authentication method and authentication program
US8774403B2 (en) 2011-12-08 2014-07-08 Dark Matter Labs, Inc. Key creation and rotation for data encryption
US8712044B2 (en) * 2012-06-29 2014-04-29 Dark Matter Labs Inc. Key management system
US9077769B2 (en) * 2011-12-29 2015-07-07 Blackberry Limited Communications system providing enhanced trusted service manager (TSM) verification features and related methods
US8712407B1 (en) 2012-04-05 2014-04-29 Sprint Communications Company L.P. Multiple secure elements in mobile electronic device with near field communication capability
US9619852B2 (en) * 2012-04-17 2017-04-11 Zighra Inc. Context-dependent authentication system, method and device
US9027102B2 (en) 2012-05-11 2015-05-05 Sprint Communications Company L.P. Web server bypass of backend process on near field communications and secure element chips
US9094774B2 (en) 2012-05-14 2015-07-28 At&T Intellectual Property I, Lp Apparatus and methods for maintaining service continuity when transitioning between mobile network operators
US8875265B2 (en) 2012-05-14 2014-10-28 Qualcomm Incorporated Systems and methods for remote credentials management
US9148785B2 (en) 2012-05-16 2015-09-29 At&T Intellectual Property I, Lp Apparatus and methods for provisioning devices to utilize services of mobile network operators
US8862181B1 (en) 2012-05-29 2014-10-14 Sprint Communications Company L.P. Electronic purchase transaction trust infrastructure
US9286491B2 (en) 2012-06-07 2016-03-15 Amazon Technologies, Inc. Virtual service provider zones
US8800015B2 (en) 2012-06-19 2014-08-05 At&T Mobility Ii, Llc Apparatus and methods for selecting services of mobile network operators
US9473929B2 (en) 2012-06-19 2016-10-18 At&T Mobility Ii Llc Apparatus and methods for distributing credentials of mobile network operators
US9282898B2 (en) 2012-06-25 2016-03-15 Sprint Communications Company L.P. End-to-end trusted communications infrastructure
US9066230B1 (en) 2012-06-27 2015-06-23 Sprint Communications Company L.P. Trusted policy and charging enforcement function
US8649770B1 (en) 2012-07-02 2014-02-11 Sprint Communications Company, L.P. Extended trusted security zone radio modem
US9160719B2 (en) 2012-07-20 2015-10-13 Protected Mobility, Llc Hiding ciphertext using a linguistics algorithm with dictionaries
US8667607B2 (en) 2012-07-24 2014-03-04 Sprint Communications Company L.P. Trusted security zone access to peripheral devices
US8863252B1 (en) * 2012-07-25 2014-10-14 Sprint Communications Company L.P. Trusted access to third party applications systems and methods
US9373121B1 (en) * 2012-08-09 2016-06-21 Sprint Communications Company L.P. User communication device control with operating system action request messages
US9183412B2 (en) 2012-08-10 2015-11-10 Sprint Communications Company L.P. Systems and methods for provisioning and using multiple trusted security zones on an electronic device
US8954588B1 (en) 2012-08-25 2015-02-10 Sprint Communications Company L.P. Reservations in real-time brokering of digital content delivery
US9015068B1 (en) 2012-08-25 2015-04-21 Sprint Communications Company L.P. Framework for real-time brokering of digital content delivery
US9215180B1 (en) 2012-08-25 2015-12-15 Sprint Communications Company L.P. File retrieval in real-time brokering of digital content
EP2706770A1 (en) * 2012-09-06 2014-03-12 Gemalto SA Method for cloning a secure element
US8752140B1 (en) 2012-09-11 2014-06-10 Sprint Communications Company L.P. System and methods for trusted internet domain networking
KR101793664B1 (en) 2012-09-18 2017-11-06 구글 엘엘씨 Systems, methods, and computer program products for interfacing multiple service provider trusted service managers and secure elements
WO2014059079A1 (en) * 2012-10-10 2014-04-17 Mastercard International Incorporated System and methods for issuance of a mobile payment account
CN103856938B (en) * 2012-12-04 2017-07-28 中兴通讯股份有限公司 A method for encryption and decryption, system and device
US9881143B2 (en) * 2012-12-06 2018-01-30 Qualcomm Incorporated Methods and apparatus for providing private expression protection against impersonation risks
US20140180931A1 (en) * 2012-12-07 2014-06-26 David Lie System and Method for Secure Wi-Fi- Based Payments Using Mobile Communication Devices
CN105027493A (en) 2012-12-21 2015-11-04 移动熨斗公司 Secure mobile app connection bus
US9866382B2 (en) 2012-12-21 2018-01-09 Mobile Iron, Inc. Secure app-to-app communication
US20150012863A1 (en) * 2012-12-28 2015-01-08 Panasonic Intellectual Property Corporation Of America Control method
US9232394B2 (en) * 2013-01-02 2016-01-05 International Business Machines Corporation Authentication of phone caller identity
US8869306B2 (en) * 2013-01-24 2014-10-21 Bank Of America Corporation Application usage in device identification program
WO2014116589A1 (en) 2013-01-25 2014-07-31 Jvl Ventures, Llc Systems, methods, and computer program products for managing data re-installation
US9161227B1 (en) 2013-02-07 2015-10-13 Sprint Communications Company L.P. Trusted signaling in long term evolution (LTE) 4G wireless communication
US9578664B1 (en) 2013-02-07 2017-02-21 Sprint Communications Company L.P. Trusted signaling in 3GPP interfaces in a network function virtualization wireless communication system
US9590959B2 (en) 2013-02-12 2017-03-07 Amazon Technologies, Inc. Data security service
US9367697B1 (en) 2013-02-12 2016-06-14 Amazon Technologies, Inc. Data security with a security module
US9705674B2 (en) 2013-02-12 2017-07-11 Amazon Technologies, Inc. Federated key management
US9547771B2 (en) 2013-02-12 2017-01-17 Amazon Technologies, Inc. Policy enforcement with associated data
US9300464B1 (en) * 2013-02-12 2016-03-29 Amazon Technologies, Inc. Probabilistic key rotation
US8909143B2 (en) 2013-02-25 2014-12-09 Lexmark International, Inc. Provisioning user attributes for use with mobile computing device
US9270336B2 (en) 2013-02-25 2016-02-23 Lexmark International, Inc. Provisioning user attributes for use with mobile computing device
US9104840B1 (en) 2013-03-05 2015-08-11 Sprint Communications Company L.P. Trusted security zone watermark
US9613208B1 (en) 2013-03-13 2017-04-04 Sprint Communications Company L.P. Trusted security zone enhanced with trusted hardware drivers
US8881977B1 (en) 2013-03-13 2014-11-11 Sprint Communications Company L.P. Point-of-sale and automated teller machine transactions using trusted mobile access device
US9049186B1 (en) 2013-03-14 2015-06-02 Sprint Communications Company L.P. Trusted security zone re-provisioning and re-use capability for refurbished mobile devices
US9049013B2 (en) 2013-03-14 2015-06-02 Sprint Communications Company L.P. Trusted security zone containers for the protection and confidentiality of trusted service manager data
US9191388B1 (en) 2013-03-15 2015-11-17 Sprint Communications Company L.P. Trusted security zone communication addressing on an electronic device
US9021585B1 (en) 2013-03-15 2015-04-28 Sprint Communications Company L.P. JTAG fuse vulnerability determination and protection using a trusted execution environment
US9374363B1 (en) 2013-03-15 2016-06-21 Sprint Communications Company L.P. Restricting access of a portable communication device to confidential data or applications via a remote network based on event triggers generated by the portable communication device
US8984592B1 (en) 2013-03-15 2015-03-17 Sprint Communications Company L.P. Enablement of a trusted security zone authentication for remote mobile device management systems and methods
US9160542B2 (en) * 2013-03-18 2015-10-13 Lenovo Enterprise Solutions (Singapore) Pte. Ltd. Authorizing use of a test key signed build
JP5999256B2 (en) * 2013-03-28 2016-09-28 富士通株式会社 Information management apparatus, an information management system, information management method, and information management program
US9171243B1 (en) 2013-04-04 2015-10-27 Sprint Communications Company L.P. System for managing a digest of biographical information stored in a radio frequency identity chip coupled to a mobile communication device
US9324016B1 (en) 2013-04-04 2016-04-26 Sprint Communications Company L.P. Digest of biographical information for an electronic device with static and dynamic portions
US9454723B1 (en) 2013-04-04 2016-09-27 Sprint Communications Company L.P. Radio frequency identity (RFID) chip electrically and communicatively coupled to motherboard of mobile communication device
US9838869B1 (en) 2013-04-10 2017-12-05 Sprint Communications Company L.P. Delivering digital content to a mobile device via a digital rights clearing house
US9479922B2 (en) 2013-04-12 2016-10-25 Google Inc. Provisioning a plurality of computing devices
US9443088B1 (en) 2013-04-15 2016-09-13 Sprint Communications Company L.P. Protection for multimedia files pre-downloaded to a mobile device
FR3004884B1 (en) * 2013-04-17 2016-09-09 Oberthur Tech Secure Element for telecommunications terminal
US9426604B1 (en) 2013-04-30 2016-08-23 Sprint Communications Company L.P. Prevention of inductive coupling between components of a mobile communication device
US9069952B1 (en) 2013-05-20 2015-06-30 Sprint Communications Company L.P. Method for enabling hardware assisted operating system region for safe execution of untrusted code using trusted transitional memory
CN105379326A (en) * 2013-05-21 2016-03-02 谷歌公司 Systems, methods, and computer program products for managing states
US9763067B2 (en) 2013-05-28 2017-09-12 Protected Mobility, Llc Methods and apparatus for long-short wave, low-high frequency radio secure message service
US9560519B1 (en) 2013-06-06 2017-01-31 Sprint Communications Company L.P. Mobile communication device profound identity brokering framework
US20140373184A1 (en) * 2013-06-12 2014-12-18 Lookout, Inc. Mobile device persistent security mechanism
US9832171B1 (en) 2013-06-13 2017-11-28 Amazon Technologies, Inc. Negotiating a session with a cryptographic domain
WO2014204832A1 (en) * 2013-06-17 2014-12-24 Jvl Ventures, Llc Systems, methods, and computer program products for processing a request relating to a mobile communication device
US9183606B1 (en) 2013-07-10 2015-11-10 Sprint Communications Company L.P. Trusted processing location within a graphics processing unit
US9208339B1 (en) 2013-08-12 2015-12-08 Sprint Communications Company L.P. Verifying Applications in Virtual Environments Using a Trusted Security Zone
US8904195B1 (en) 2013-08-21 2014-12-02 Citibank, N.A. Methods and systems for secure communications between client applications and secure elements in mobile devices
WO2015038551A1 (en) * 2013-09-10 2015-03-19 Visa International Service Association Mobile payment application provisioning and personalization on a mobile device
US9100175B2 (en) * 2013-11-19 2015-08-04 M2M And Iot Technologies, Llc Embedded universal integrated circuit card supporting two-factor authentication
US9350550B2 (en) 2013-09-10 2016-05-24 M2M And Iot Technologies, Llc Power management and security for wireless modules in “machine-to-machine” communications
US20150095238A1 (en) * 2013-09-30 2015-04-02 Apple Inc. Online payments using a secure element of an electronic device
US20150106270A1 (en) * 2013-10-14 2015-04-16 Equifax Inc. Providing Identification Information to Mobile Commerce Applications
US9185626B1 (en) 2013-10-29 2015-11-10 Sprint Communications Company L.P. Secure peer-to-peer call forking facilitated by trusted 3rd party voice server provisioning
US8930274B1 (en) * 2013-10-30 2015-01-06 Google Inc. Securing payment transactions with rotating application transaction counters
US9301132B2 (en) 2013-11-07 2016-03-29 International Business Machines Corporation Managing distribution of software updates in near field communication (NFC) mobile devices
US9191522B1 (en) 2013-11-08 2015-11-17 Sprint Communications Company L.P. Billing varied service based on tier
US9161325B1 (en) 2013-11-20 2015-10-13 Sprint Communications Company L.P. Subscriber identity module virtualization
US8886933B1 (en) * 2013-12-17 2014-11-11 Google Inc. Streamlined provisioning and configuration of computing devices
US20150178723A1 (en) * 2013-12-23 2015-06-25 Apple Inc. Deletion of credentials from an electronic device
US9118655B1 (en) 2014-01-24 2015-08-25 Sprint Communications Company L.P. Trusted display and transmission of digital ticket documentation
US9313190B2 (en) 2014-02-07 2016-04-12 Bank Of America Corporation Shutting down access to all user accounts
US9213974B2 (en) 2014-02-07 2015-12-15 Bank Of America Corporation Remote revocation of application access based on non-co-location of a transaction vehicle and a mobile device
US9286450B2 (en) 2014-02-07 2016-03-15 Bank Of America Corporation Self-selected user access based on specific authentication types
US9208301B2 (en) 2014-02-07 2015-12-08 Bank Of America Corporation Determining user authentication requirements based on the current location of the user in comparison to the users's normal boundary of location
US9305149B2 (en) 2014-02-07 2016-04-05 Bank Of America Corporation Sorting mobile banking functions into authentication buckets
US9213814B2 (en) 2014-02-07 2015-12-15 Bank Of America Corporation User authentication based on self-selected preferences
US9647999B2 (en) 2014-02-07 2017-05-09 Bank Of America Corporation Authentication level of function bucket based on circumstances
US9317674B2 (en) 2014-02-07 2016-04-19 Bank Of America Corporation User authentication based on fob/indicia scan
US9317673B2 (en) 2014-02-07 2016-04-19 Bank Of America Corporation Providing authentication using previously-validated authentication credentials
US9331994B2 (en) 2014-02-07 2016-05-03 Bank Of America Corporation User authentication based on historical transaction data
US9223951B2 (en) 2014-02-07 2015-12-29 Bank Of America Corporation User authentication based on other applications
EP3108673A1 (en) 2014-02-17 2016-12-28 Kaba AG Group Innovation Management System and method for managing application data of contactless card applications
US9226145B1 (en) 2014-03-28 2015-12-29 Sprint Communications Company L.P. Verification of mobile device integrity during activation
US20150326545A1 (en) * 2014-05-06 2015-11-12 Apple Inc. Secure key rotation for an issuer security domain of an electronic device
US20150350177A1 (en) * 2014-05-29 2015-12-03 Apple Inc. Management of credentials on an electronic device using an online resource
US9438421B1 (en) 2014-06-27 2016-09-06 Amazon Technologies, Inc. Supporting a fixed transaction rate with a variably-backed logical cryptographic key
US9230085B1 (en) 2014-07-29 2016-01-05 Sprint Communications Company L.P. Network based temporary trust extension to a remote or mobile device enabled via specialized cloud services
US20160036790A1 (en) * 2014-07-31 2016-02-04 Vishwanath Shastry System and method for identity verification across mobile applications
US9788203B2 (en) 2014-08-19 2017-10-10 Zighra Inc. System and method for implicit authentication
US9398428B2 (en) * 2014-08-26 2016-07-19 Verizon Patent And Licensing Inc. Enterprise messaging client and messaging archive
US20160063480A1 (en) * 2014-09-03 2016-03-03 Miguel Ballesteros Methods and arrangements to complete online transactions
DE102014013516A1 (en) * 2014-09-11 2016-03-17 Giesecke & Devrient Gmbh Methods and apparatus for testing a mobile terminal having a security element
US9866392B1 (en) 2014-09-15 2018-01-09 Amazon Technologies, Inc. Distributed system web of trust provisioning
US9807607B2 (en) * 2014-10-03 2017-10-31 T-Mobile Usa, Inc. Secure remote user device unlock
US9288043B1 (en) * 2014-10-17 2016-03-15 Motorola Solutions, Inc. Methods and systems for providing high-security cryptographic keys to mobile radios
US20160125203A1 (en) * 2014-10-31 2016-05-05 Xiaomi Inc. Method and apparatus of verifying terminal and medium
US20160171482A1 (en) * 2014-12-10 2016-06-16 American Express Travel Related Services Company, Inc. System and method for over the air provisioned wearable contactless payments
US9779232B1 (en) 2015-01-14 2017-10-03 Sprint Communications Company L.P. Trusted code generation and verification to prevent fraud from maleficent external devices that capture data
US9838868B1 (en) 2015-01-26 2017-12-05 Sprint Communications Company L.P. Mated universal serial bus (USB) wireless dongles configured with destination addresses
US20160285636A1 (en) * 2015-03-27 2016-09-29 Comcast Cable Communications, Llc Methods And Systems For Key Generation
US9473945B1 (en) 2015-04-07 2016-10-18 Sprint Communications Company L.P. Infrastructure for secure short message transmission
US9591434B1 (en) * 2015-04-27 2017-03-07 Sprint Communications Company L.P. Virtual private network (VPN) tunneling in a user equipment (UE) brokered by a radio frequency identity (RFID) chip communicatively coupled to the user equipment
EP3104635A1 (en) * 2015-06-09 2016-12-14 Deutsche Telekom AG Method for an improved installation of a secure-element-related service application in a secure element being located in a communication device, system and telecommunications network for an improved installation of a secure-element-related service application in a secure element being located in a communication device, program comprising a computer readable program code, and computer program product
US9819679B1 (en) 2015-09-14 2017-11-14 Sprint Communications Company L.P. Hardware assisted provenance proof of named data networking associated to device data, addresses, services, and servers
US9641539B1 (en) 2015-10-30 2017-05-02 Bank Of America Corporation Passive based security escalation to shut off of application based on rules event triggering
US9820148B2 (en) 2015-10-30 2017-11-14 Bank Of America Corporation Permanently affixed un-decryptable identifier associated with mobile device
US9729536B2 (en) 2015-10-30 2017-08-08 Bank Of America Corporation Tiered identification federated authentication network system
US9817992B1 (en) 2015-11-20 2017-11-14 Sprint Communications Company Lp. System and method for secure USIM wireless network access
US9578122B1 (en) * 2015-12-08 2017-02-21 International Business Machines Corporation Communicating an E-mail from a sender to a plurality of recipients
US20170177417A1 (en) * 2015-12-22 2017-06-22 Mcafee, Inc. Trusted computing resource meter
US9924347B1 (en) * 2016-09-14 2018-03-20 At&T Intellectual Property I, L.P. Method and apparatus for reassigning mobile subscriber identification information
US9843922B1 (en) * 2016-09-14 2017-12-12 At&T Intellectual Property I, L.P. Method and apparatus for utilizing mobile subscriber identification information with multiple devices based on registration errors
US9814010B1 (en) * 2016-09-14 2017-11-07 At&T Intellectual Property I, L.P. Method and apparatus for utilizing mobile subscriber identification information with multiple devices based on registration requests
US9906943B1 (en) 2016-09-29 2018-02-27 At&T Intellectual Property I, L.P. Method and apparatus for provisioning mobile subscriber identification information to multiple devices and provisioning network elements
US9918220B1 (en) 2016-10-17 2018-03-13 At&T Intellectual Property I, L.P. Method and apparatus for managing and reusing mobile subscriber identification information to multiple devices

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6349290B1 (en) * 1998-06-30 2002-02-19 Citibank, N.A. Automated system and method for customized and personalized presentation of products and services of a financial institution
US20060106738A1 (en) * 2004-11-17 2006-05-18 Paypal. Inc. Automatic address validation
US20060168089A1 (en) * 2002-09-30 2006-07-27 Sampson Scott E Controlling incoming communication by issuing tokens
US20070256124A1 (en) * 2006-04-13 2007-11-01 Go Play Network, Inc. Collectible token data management
US20090134217A1 (en) * 1998-03-25 2009-05-28 Orbis Patents Ltd. Credit card system and method

Family Cites Families (156)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5491750A (en) 1993-12-30 1996-02-13 International Business Machines Corporation Method and apparatus for three-party entity authentication and key distribution using message authentication codes
US6163771A (en) 1997-08-28 2000-12-19 Walker Digital, Llc Method and device for generating a single-use financial account number
US6084969A (en) * 1997-12-31 2000-07-04 V-One Corporation Key encryption system and method, pager unit, and pager proxy for a two-way alphanumeric pager network
US6282294B1 (en) * 1998-01-07 2001-08-28 Microsoft Corporation System for broadcasting to, and programming, a motor device in a protocol, device, and network independent fashion
US6422462B1 (en) 1998-03-30 2002-07-23 Morris E. Cohen Apparatus and methods for improved credit cards and credit card transactions
US6411941B1 (en) * 1998-05-21 2002-06-25 Beeble, Inc. Method of restricting software operation within a license limitation
US7357312B2 (en) * 1998-05-29 2008-04-15 Gangi Frank J System for associating identification and personal data for multiple magnetic stripe cards or other sources to facilitate a transaction and related methods
DE69935913T2 (en) 1998-07-02 2008-01-10 Cryptography Research Inc., San Francisco A leak resistant update an indexed cryptographic wrench
US6607136B1 (en) 1998-09-16 2003-08-19 Beepcard Inc. Physical presence digital authentication system
US6044350A (en) 1998-12-24 2000-03-28 Pitney Bowes Inc. Certificate meter with selectable indemnification provisions
US7461010B2 (en) * 1999-09-13 2008-12-02 Khai Hee Kwan Computer network method for conducting payment over a network by debiting and crediting telecommunication accounts
FI112418B (en) * 2000-02-01 2003-11-28 Nokia Corp A method for checking the integrity of data, system and mobile station
FR2804810B1 (en) 2000-02-09 2003-09-12 France Telecom Enabling service virtual pre-payee map
US20010029485A1 (en) 2000-02-29 2001-10-11 E-Scoring, Inc. Systems and methods enabling anonymous credit transactions
US6986046B1 (en) 2000-05-12 2006-01-10 Groove Networks, Incorporated Method and apparatus for managing secure collaborative transactions
US6829596B1 (en) * 2000-05-23 2004-12-07 Steve Frazee Account/asset activation device and method
US20040030659A1 (en) * 2000-05-25 2004-02-12 Gueh Wilson How Kiap Transaction system and method
WO2002023452A1 (en) * 2000-09-12 2002-03-21 American Express Travel Related Services Company, Inc. Microchip-enabled online transaction system
US20020091646A1 (en) 2000-11-03 2002-07-11 Lake Lawrence L. Method and system for verifying the identity of on-line credit card purchasers through a proxy transaction
US6931382B2 (en) * 2001-01-24 2005-08-16 Cdck Corporation Payment instrument authorization technique
US7292999B2 (en) 2001-03-15 2007-11-06 American Express Travel Related Services Company, Inc. Online card present transaction
US7543739B2 (en) * 2003-12-17 2009-06-09 Qsecure, Inc. Automated payment card fraud detection and location
US20020156689A1 (en) * 2001-04-18 2002-10-24 Far Soft, Inc. System and method for securing transactions between buyer and credit authorizer
EP1255372B1 (en) 2001-05-03 2008-03-19 Telefonaktiebolaget LM Ericsson (publ) Method and system for data integrity protection
US7783566B2 (en) 2001-06-27 2010-08-24 American Express Travel Related Services Company, Inc. Consolidated payment account system and method
EP1417788A4 (en) * 2001-08-15 2010-05-26 Qualcomm Inc Test enabled application execution
CA2356823C (en) * 2001-09-10 2010-05-11 Research In Motion Limited System and method for real time self-provisioning for a mobile communication device
US20040159700A1 (en) 2001-12-26 2004-08-19 Vivotech, Inc. Method and apparatus for secure import of information into data aggregation program hosted by personal trusted device
US7051932B2 (en) * 2001-12-26 2006-05-30 Vivotech, Inc. Adaptor for magnetic stripe card reader
US9305314B2 (en) 2002-02-05 2016-04-05 Square, Inc. Methods of transmitting information to mobile devices using cost effective card readers
US7418596B1 (en) * 2002-03-26 2008-08-26 Cellco Partnership Secure, efficient, and mutually authenticated cryptographic key distribution
US7436966B2 (en) * 2002-08-21 2008-10-14 International Business Machines Corporation Secure approach to send data from one system to another
WO2004025921A3 (en) 2002-09-16 2004-06-24 Ericsson Telefon Ab L M Secure access to a subscription module
US7494055B2 (en) 2002-09-17 2009-02-24 Vivotech, Inc. Collaborative negotiation techniques for mobile personal trusted device financial transactions
US7548621B1 (en) 2002-09-26 2009-06-16 Ncr Corporation System and method for securing a base derivation key for use in injection of derived unique key per transaction devices
CN1717893B (en) * 2002-10-28 2010-05-05 诺基亚有限公司 Device keys
US20040098312A1 (en) 2002-11-19 2004-05-20 American Express Travel Related Service Co., Inc. System and method for facilitating interaction between consumer and merchant
US6685088B1 (en) 2002-12-13 2004-02-03 American Express Travel Related Services Company, Inc. System and method for selecting an account
US20060179305A1 (en) 2004-03-11 2006-08-10 Junbiao Zhang WLAN session management techniques with secure rekeying and logoff
GB0312038D0 (en) 2003-05-24 2003-07-02 Edwards Michael A security method
US20050092839A1 (en) 2003-10-31 2005-05-05 Oram Thomas K. Method and apparatus for providing and processing active barcodes
US7702577B1 (en) 2003-11-06 2010-04-20 Jp Morgan Chase Bank, N.A. System and method for conversion of initial transaction to final transaction
US20050198506A1 (en) 2003-12-30 2005-09-08 Qi Emily H. Dynamic key generation and exchange for mobile devices
US7353388B1 (en) 2004-02-09 2008-04-01 Avaya Technology Corp. Key server for securing IP telephony registration, control, and maintenance
US7797454B2 (en) 2004-02-13 2010-09-14 Hewlett-Packard Development Company, L.P. Media data transcoding devices
US20090006262A1 (en) 2006-12-30 2009-01-01 Brown Kerry D Financial transaction payment processor
US7328011B2 (en) 2004-03-31 2008-02-05 The Boeing Company Management of mobile networks
US20050279827A1 (en) 2004-04-28 2005-12-22 First Data Corporation Methods and systems for providing guaranteed merchant transactions
US20050250538A1 (en) 2004-05-07 2005-11-10 July Systems, Inc. Method and system for making card-based payments using mobile devices
WO2005119607A3 (en) 2004-06-03 2006-05-04 Siva G Narendra System and method for securing financial transactions
EP1817729A4 (en) 2004-06-25 2010-11-03 Ian Charles Ogilvy A transaction processing method, apparatus and system
US9342664B2 (en) 2004-07-30 2016-05-17 Etrans L.C. Method to make payment or charge safe transactions using programmable mobile telephones
US7174174B2 (en) 2004-08-20 2007-02-06 Dbs Communications, Inc. Service detail record application and system
US7548152B2 (en) 2004-10-08 2009-06-16 Entrust Limited RFID transponder information security methods systems and devices
US7610631B2 (en) * 2004-11-15 2009-10-27 Alexander Frank Method and apparatus for provisioning software
US8151364B2 (en) * 2004-12-21 2012-04-03 Emue Holdings Pty Ltd Authentication device and/or method
US20060217111A1 (en) * 2005-02-11 2006-09-28 Sunil Marolia Network for customer care and distribution of firmware and software updates
FI20050384A0 (en) * 2005-04-14 2005-04-14 Nokia Corp The use of generic todentamisarkkitehtuurin Internet protocol distribution of keys in mobile devices
US8078867B2 (en) 2005-08-12 2011-12-13 Research In Motion Limited System and method for authenticating streamed data
US20070063024A1 (en) * 2005-09-21 2007-03-22 Plastyc Inc. Dual macro- and micro-payment card system
US20070101122A1 (en) * 2005-09-23 2007-05-03 Yile Guo Method and apparatus for securely generating application session keys
US8788802B2 (en) 2005-09-29 2014-07-22 Qualcomm Incorporated Constrained cryptographic keys
KR101137340B1 (en) 2005-10-18 2012-04-19 엘지전자 주식회사 Method of Providing Security for Relay Station
US7626963B2 (en) 2005-10-25 2009-12-01 Cisco Technology, Inc. EAP/SIM authentication for mobile IP to leverage GSM/SIM authentication infrastructure
WO2007087194A3 (en) 2006-01-20 2007-09-20 Greg Benson System and method for the automated processing of physical objects
US8567669B2 (en) 2006-02-24 2013-10-29 Fair Isaac Corporation Method and apparatus for a merchant profile builder
EP1835688A1 (en) 2006-03-16 2007-09-19 BRITISH TELECOMMUNICATIONS public limited company SIM based authentication
WO2007108962B1 (en) 2006-03-21 2008-11-27 Nordic Information Security Gr Method for automatic encryption and decryption of electronic communication
US7751810B1 (en) * 2006-03-21 2010-07-06 Nextel Communications Inc. System and method for transmitting information to subscriber communication units at events
EP1997269A4 (en) 2006-03-22 2014-01-08 Lg Electronics Inc Asymmetric cryptography for wireless systems
US7936878B2 (en) 2006-04-10 2011-05-03 Honeywell International Inc. Secure wireless instrumentation network system
US7562813B2 (en) 2006-05-10 2009-07-21 First Data Corporation System and method for activating telephone-based payment instrument
CA2550698A1 (en) 2006-06-19 2007-12-19 Daniel Mccann Method and apparatus for encryption and pass-through handling of confidential information in software applications
EP1873960B1 (en) * 2006-06-29 2013-06-05 Incard SA Method for session key derivation in a IC card
US20080006685A1 (en) * 2006-07-06 2008-01-10 Firethorn Holdings, Llc Methods and Systems For Real Time Account Balances in a Mobile Environment
DE102006038037A1 (en) 2006-08-14 2008-02-21 Siemens Ag A method and system for providing an access-specific key
US8761401B2 (en) * 2006-08-28 2014-06-24 Motorola Mobility Llc System and method for secure key distribution to manufactured products
US9240009B2 (en) * 2006-09-24 2016-01-19 Rich House Global Technology Ltd. Mobile devices for commerce over unsecured networks
US7761380B2 (en) 2006-09-28 2010-07-20 Verifi, Inc. System and method for authenticating a payment instrument transaction originating from a non-internet channel
US20080136592A1 (en) * 2006-12-07 2008-06-12 Symbol Technologies, Inc. Rfid-based reminder service
US8583923B2 (en) 2006-12-08 2013-11-12 Toshiba America Research, Inc. EAP method for EAP extension (EAP-EXT)
JP4081724B1 (en) * 2006-12-27 2008-04-30 日本電気株式会社 Client terminal, the relay server, communication system, and communication method
US8958562B2 (en) * 2007-01-16 2015-02-17 Voltage Security, Inc. Format-preserving cryptographic systems
US20080235513A1 (en) * 2007-03-19 2008-09-25 Microsoft Corporation Three Party Authentication
US20080257952A1 (en) 2007-04-18 2008-10-23 Andre Luis Zandonadi System and Method for Conducting Commercial Transactions
EP1988587B1 (en) 2007-04-30 2016-12-07 Novaled GmbH Oxocarbon, pseudo oxocarbon and radialene compounds and their use
US8750796B2 (en) * 2007-05-17 2014-06-10 Abbott Medical Optics Inc. Exclusive pairing technique for short-range communication devices
US8489740B2 (en) 2007-05-18 2013-07-16 Red Hat, Inc. Method and an apparatus to generate message authentication codes at a proxy server for validating a web session
US8725638B2 (en) 2007-05-18 2014-05-13 Visa U.S.A. Inc. Method and system for payment authorization and card presentation using pre-issued identities
US20100174649A1 (en) 2007-06-04 2010-07-08 Bce Inc. Methods and systems for validating online transactions using location information
US8345604B2 (en) 2007-06-07 2013-01-01 Qualcomm Incorporated Effectuating establishment of internet protocol security tunnels for utilization in a wireless communication environment
US20080303665A1 (en) 2007-06-08 2008-12-11 Bilcare, Inc. Package-companion-user interactive system and associated method
US8099363B1 (en) 2007-06-30 2012-01-17 Michael W. Kilchenstein, Jr. Methods and systems for processing card-not-present financial transactions as card-present financial transactions
US8908870B2 (en) * 2007-11-01 2014-12-09 Infineon Technologies Ag Method and system for transferring information to a device
KR100958108B1 (en) * 2007-11-12 2010-05-17 한국전자통신연구원 Method and apparatus for protecting illegal program copy of mobile communication terminals
US8812401B2 (en) 2007-11-20 2014-08-19 Propay Usa Inc. Secure payment capture processes
US9349127B2 (en) * 2007-11-29 2016-05-24 Visa Usa Inc. Serial number and payment data based payment card processing
US8495375B2 (en) 2007-12-21 2013-07-23 Research In Motion Limited Methods and systems for secure channel initialization
US20120296824A1 (en) 2007-12-28 2012-11-22 Rosano Sharon A Systems and methods for correction of information in card-not-present account-on-file transactions
US7802720B2 (en) * 2008-01-04 2010-09-28 Intuit Inc. Method and system for performing a card-present transaction using image capture on a portable device
US20120190386A1 (en) 2008-02-05 2012-07-26 Victor Thomas Anderson Wireless location establishing device
US20110185178A1 (en) * 2008-03-31 2011-07-28 Compugroup Holding Ag Communication method of an electronic health insurance card with a reading device
US8219558B1 (en) 2008-04-25 2012-07-10 David Scott Trandal Methods and systems for inventory management
CA2630388A1 (en) 2008-05-05 2009-11-05 Nima Sharifmehr Apparatus and method to prevent man in the middle attack
US8930275B2 (en) 2008-09-08 2015-01-06 Robin Heizmann Apparatuses, methods and systems for providing a virtual development and deployment environment including real and synthetic data
US8369521B2 (en) * 2008-10-17 2013-02-05 Oracle International Corporation Smart card based encryption key and password generation and management
US8689012B1 (en) 2008-10-17 2014-04-01 Sprint Communications Company L.P. Diagnostics for secure elements in a mobile device
US8578153B2 (en) 2008-10-28 2013-11-05 Telefonaktiebolaget L M Ericsson (Publ) Method and arrangement for provisioning and managing a device
US8644514B2 (en) * 2008-10-31 2014-02-04 Nokia Siemens Networks Oy Security model for a relay network system
US8146798B2 (en) 2008-11-07 2012-04-03 Advanced Custom Engineered Systems & Equipment Co. Method and apparatus for monitoring waste removal and administration
US8135964B2 (en) * 2008-12-09 2012-03-13 Nvidia Corporation Apparatus, system, method, and computer program product for executing a program utilizing a processor to generate keys for decrypting content
US20100153709A1 (en) * 2008-12-10 2010-06-17 Qualcomm Incorporated Trust Establishment From Forward Link Only To Non-Forward Link Only Devices
US8874701B2 (en) * 2008-12-22 2014-10-28 Sap Se On-demand provisioning of services running on embedded devices
GB0901407D0 (en) 2009-01-28 2009-03-11 Validsoft Uk Ltd Card false-positive prevention
US8521821B2 (en) 2009-03-17 2013-08-27 Brigham Young University Encrypted email based upon trusted overlays
GB0904874D0 (en) 2009-03-20 2009-05-06 Validsoft Uk Ltd Smartcard security system
US20100274691A1 (en) 2009-04-28 2010-10-28 Ayman Hammad Multi alerts based system
WO2010129571A3 (en) 2009-05-04 2011-02-24 Visa International Service Association Demographic analysis using time-based consumer transaction histories
US8725122B2 (en) * 2009-05-13 2014-05-13 First Data Corporation Systems and methods for providing trusted service management services
US8560851B1 (en) * 2009-05-15 2013-10-15 Sprint Communications Company L.P. Managing digital certificates
US9471920B2 (en) 2009-05-15 2016-10-18 Idm Global, Inc. Transaction assessment and/or authentication
US9105027B2 (en) * 2009-05-15 2015-08-11 Visa International Service Association Verification of portable consumer device for secure services
US8571995B2 (en) 2009-06-02 2013-10-29 Voltage Security, Inc. Purchase transaction system with encrypted payment card data
US20110004653A1 (en) * 2009-07-06 2011-01-06 Barry Richard Cavill Method for activation of a media processing device to a web server
WO2011005900A1 (en) * 2009-07-07 2011-01-13 Finsphere Corporation Mobile directory number and email verification of financial transactions
US20110047072A1 (en) * 2009-08-07 2011-02-24 Visa U.S.A. Inc. Systems and Methods for Propensity Analysis and Validation
US20110047075A1 (en) 2009-08-19 2011-02-24 Mastercard International Incorporated Location controls on payment card transactions
US20110087547A1 (en) * 2009-10-09 2011-04-14 Visa U.S.A. Systems and Methods for Advertising Services Based on a Local Profile
WO2011047042A3 (en) 2009-10-13 2011-07-28 Square, Inc. Systems and methods for dynamic receipt generation with environmental information
US8573486B2 (en) 2010-10-13 2013-11-05 Square, Inc. Systems and methods for financial transaction through miniaturized card reader with confirmation of payment sent to buyer
US8595058B2 (en) 2009-10-15 2013-11-26 Visa U.S.A. Systems and methods to match identifiers
US8413894B2 (en) 2009-11-05 2013-04-09 X-Card Holdings, Llc Card with illuminated codes for use in secure transactions
US8386381B1 (en) * 2009-12-16 2013-02-26 Jpmorgan Chase Bank, N.A. Method and system for detecting, monitoring and addressing data compromises
CA2694500C (en) * 2010-02-24 2015-07-07 Diversinet Corp. Method and system for secure communication
US9280768B2 (en) * 2010-03-17 2016-03-08 Verifone, Inc. Payment systems and methodologies
US8626663B2 (en) 2010-03-23 2014-01-07 Visa International Service Association Merchant fraud risk score
CA2697687C (en) 2010-03-24 2014-02-18 Diversinet Corp. Method and system for secure communication using hash-based message authentication codes
WO2011133899A3 (en) 2010-04-23 2012-04-05 Visa U.S.A. Inc. Systems and methods to provide loyalty programs
FR2959896B1 (en) * 2010-05-06 2014-03-21 4G Secure Method for authentication of a user requesting a transaction with a service provider
US9294506B2 (en) * 2010-05-17 2016-03-22 Certes Networks, Inc. Method and apparatus for security encapsulating IP datagrams
US20110288918A1 (en) 2010-05-24 2011-11-24 Karen Louise Cervenka Systems and Methods for Redemption of Offers
US8554653B2 (en) 2010-07-22 2013-10-08 Visa International Service Association Systems and methods to identify payment accounts having business spending activities
US20120084806A1 (en) * 2010-09-30 2012-04-05 Comcast Cable Communications, Llc Key Derivation for Secure Communications
US9723481B2 (en) 2010-10-29 2017-08-01 Apple Inc. Access data provisioning apparatus and methods
US8621168B2 (en) 2010-12-17 2013-12-31 Google Inc. Partitioning the namespace of a contactless smart card
US20120171992A1 (en) 2010-12-30 2012-07-05 Sk C&C System and method for secure containment of sensitive financial information stored in a mobile communication terminal
CA2766029A1 (en) * 2011-01-28 2012-07-28 Janet Smith Method and system for determining fraud in a card-not-present transaction
US20120203698A1 (en) * 2011-02-07 2012-08-09 Dustin Duncan Method and System for Fraud Detection and Notification
US20120215610A1 (en) 2011-02-23 2012-08-23 Visa International Service Association Systems and Methods to Facilitate Offer Sharing
US20120239479A1 (en) 2011-03-15 2012-09-20 Visa International Service Association Systems and Methods to Combine Transaction Terminal Location Data and Social Networking Check-In
US20120239574A1 (en) 2011-03-18 2012-09-20 Janet Smith Methods and systems for electronic commerce verification
US20130163764A1 (en) * 2011-03-28 2013-06-27 Nxp B.V. Secure dynamic on chip key programming
US20120296741A1 (en) 2011-05-19 2012-11-22 Verifone, Inc. Cloud based electronic wallet
US9059980B2 (en) 2011-05-26 2015-06-16 First Data Corporation Systems and methods for authenticating mobile devices
US8612771B2 (en) 2012-01-06 2013-12-17 Netflix, Inc. Verifying authenticity of playback device
US20130303142A1 (en) * 2012-05-09 2013-11-14 Sprint Communications Company L.P. Self-Identification of Brand and Branded Firmware Installation in a Generic Electronic Device

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20090134217A1 (en) * 1998-03-25 2009-05-28 Orbis Patents Ltd. Credit card system and method
US6349290B1 (en) * 1998-06-30 2002-02-19 Citibank, N.A. Automated system and method for customized and personalized presentation of products and services of a financial institution
US20060168089A1 (en) * 2002-09-30 2006-07-27 Sampson Scott E Controlling incoming communication by issuing tokens
US20060106738A1 (en) * 2004-11-17 2006-05-18 Paypal. Inc. Automatic address validation
US20070256124A1 (en) * 2006-04-13 2007-11-01 Go Play Network, Inc. Collectible token data management

Cited By (44)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9530131B2 (en) 2008-07-29 2016-12-27 Visa U.S.A. Inc. Transaction processing using a global unique identifier
US9898740B2 (en) 2008-11-06 2018-02-20 Visa International Service Association Online challenge-response
US9715681B2 (en) 2009-04-28 2017-07-25 Visa International Service Association Verification of portable consumer devices
US9317848B2 (en) 2009-05-15 2016-04-19 Visa International Service Association Integration of verification tokens with mobile communication devices
US9038886B2 (en) 2009-05-15 2015-05-26 Visa International Service Association Verification of portable consumer devices
US9582801B2 (en) 2009-05-15 2017-02-28 Visa International Service Association Secure communication of payment information to merchants using a verification token
US9792611B2 (en) 2009-05-15 2017-10-17 Visa International Service Association Secure authentication system and method
US9372971B2 (en) 2009-05-15 2016-06-21 Visa International Service Association Integration of verification tokens with portable computing devices
US8827154B2 (en) 2009-05-15 2014-09-09 Visa International Service Association Verification of portable consumer devices
US9904919B2 (en) 2009-05-15 2018-02-27 Visa International Service Association Verification of portable consumer devices
US9424413B2 (en) 2010-02-24 2016-08-23 Visa International Service Association Integration of payment capability into secure elements of computers
US9589268B2 (en) 2010-02-24 2017-03-07 Visa International Service Association Integration of payment capability into secure elements of computers
US8645280B2 (en) * 2010-06-04 2014-02-04 Craig McKenzie Electronic credit card with fraud protection
US9280765B2 (en) 2011-04-11 2016-03-08 Visa International Service Association Multiple tokenization for authentication
US9331996B2 (en) 2011-05-26 2016-05-03 First Data Corporation Systems and methods for identifying devices by a trusted service manager
US9106633B2 (en) 2011-05-26 2015-08-11 First Data Corporation Systems and methods for authenticating mobile device communications
US9106632B2 (en) 2011-05-26 2015-08-11 First Data Corporation Provisioning by delivered items
US9154477B2 (en) 2011-05-26 2015-10-06 First Data Corporation Systems and methods for encrypting mobile device communications
US9059980B2 (en) 2011-05-26 2015-06-16 First Data Corporation Systems and methods for authenticating mobile devices
US9704155B2 (en) 2011-07-29 2017-07-11 Visa International Service Association Passing payment tokens through an hop/sop
US9830595B2 (en) 2012-01-26 2017-11-28 Visa International Service Association System and method of providing tokenization as a service
US20130282588A1 (en) * 2012-04-22 2013-10-24 John Hruska Consumer, Merchant and Mobile Device Specific, Real-Time Dynamic Tokenization Activation within a Secure Mobile-Wallet Financial Transaction System
US9524501B2 (en) 2012-06-06 2016-12-20 Visa International Service Association Method and system for correlating diverse transaction data
US9547769B2 (en) 2012-07-03 2017-01-17 Visa International Service Association Data protection hub
US9846861B2 (en) 2012-07-25 2017-12-19 Visa International Service Association Upstream and downstream data conversion
US9256871B2 (en) 2012-07-26 2016-02-09 Visa U.S.A. Inc. Configurable payment tokens
US9727858B2 (en) 2012-07-26 2017-08-08 Visa U.S.A. Inc. Configurable payment tokens
US9665722B2 (en) 2012-08-10 2017-05-30 Visa International Service Association Privacy firewall
US9911118B2 (en) 2012-11-21 2018-03-06 Visa International Service Association Device pairing via trusted intermediary
US9741051B2 (en) 2013-01-02 2017-08-22 Visa International Service Association Tokenization and third-party interaction
EP2997532A4 (en) * 2013-05-15 2016-05-11 Visa Int Service Ass Mobile tokenization hub
WO2014186635A1 (en) 2013-05-15 2014-11-20 Visa International Service Association Mobile tokenization hub
US9646303B2 (en) 2013-08-15 2017-05-09 Visa International Service Association Secure remote payment transaction processing using a secure element
US9516487B2 (en) 2013-11-19 2016-12-06 Visa International Service Association Automated account provisioning
US9922322B2 (en) 2013-12-19 2018-03-20 Visa International Service Association Cloud-based transactions with magnetic secure transmission
US9846878B2 (en) 2014-01-14 2017-12-19 Visa International Service Association Payment account identifier system
US9680942B2 (en) 2014-05-01 2017-06-13 Visa International Service Association Data verification using access device
US9848052B2 (en) 2014-05-05 2017-12-19 Visa International Service Association System and method for token domain control
US9780953B2 (en) 2014-07-23 2017-10-03 Visa International Service Association Systems and methods for secure detokenization
US9775029B2 (en) 2014-08-22 2017-09-26 Visa International Service Association Embedding cloud-based functionalities in a communication device
US9537841B2 (en) * 2014-09-14 2017-01-03 Sophos Limited Key management for compromised enterprise endpoints
US20170078093A1 (en) * 2014-09-14 2017-03-16 Sophos Limited Key management for compromised enterprise endpoints
US9942043B2 (en) 2015-04-23 2018-04-10 Visa International Service Association Token security on a communication device
WO2016181612A1 (en) * 2015-05-13 2016-11-17 Sony Corporation Apparatus and method for issued token management

Also Published As

Publication number Publication date Type
US20120303496A1 (en) 2012-11-29 application
US9331996B2 (en) 2016-05-03 grant
US9154477B2 (en) 2015-10-06 grant
US8752127B2 (en) 2014-06-10 grant
US20120303310A1 (en) 2012-11-29 application
US9106632B2 (en) 2015-08-11 grant
US20140237551A1 (en) 2014-08-21 application
US9106633B2 (en) 2015-08-11 grant
US9059980B2 (en) 2015-06-16 grant
US8775305B2 (en) 2014-07-08 grant
US8880886B2 (en) 2014-11-04 grant
US20120300938A1 (en) 2012-11-29 application
US20120300932A1 (en) 2012-11-29 application
US20120317019A1 (en) 2012-12-13 application
US20120304255A1 (en) 2012-11-29 application
US20120304254A1 (en) 2012-11-29 application
US20120303961A1 (en) 2012-11-29 application

Similar Documents

Publication Publication Date Title
US8566168B1 (en) Electronic payment using a proxy account number stored in a secure element
US8126449B2 (en) Servicing attributes on a mobile device
US20150046339A1 (en) Methods and systems for provisioning mobile devices with payment credentials
US20130054433A1 (en) Multi-Factor Identity Fingerprinting with User Behavior
US20090327131A1 (en) Dynamic account authentication using a mobile device
US20110087610A1 (en) Global secure service provider directory
US20130212666A1 (en) Tokenization in mobile environments
US20120159612A1 (en) System for Storing One or More Passwords in a Secure Element
US6799272B1 (en) Remote device authentication system
US20120284195A1 (en) Method and system for secure user registration
US20120123868A1 (en) System and Method for Physical-World Based Dynamic Contactless Data Emulation in a Portable Communication Device
US20090307142A1 (en) Trusted service manager (tsm) architectures and methods
US20060246872A1 (en) Limited supply access to mobile terminal features
US20090055322A1 (en) Removable module in personal handheld devices for personal information exchange
US20120266220A1 (en) System and Method for Controlling Access to a Third-Party Application with Passwords Stored in a Secure Element
US20120214444A1 (en) System and Method for Identity Management for Mobile Devices
US20120144201A1 (en) Secure element authentication
US20120150750A1 (en) System and method for initiating transactions on a mobile device
US20090298468A1 (en) System and method for deleting data in a communication device
US20140066015A1 (en) Secure device service enrollment
US20090119759A1 (en) Method and Arrangement for Secure Authentication
US20100094752A1 (en) Method and system for mobile banking and mobile payments
US20100291899A1 (en) Method and system for delivering a command to a mobile device
US20130060618A1 (en) Method and System for Electronic Wallet Access
US20120124658A1 (en) System and Method for Providing Secure Data Communication Functionality to a Variety of Applications on a Portable Communication Device

Legal Events

Date Code Title Description
AS Assignment

Owner name: FIRST DATA CORPORATION, COLORADO

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:CAMBRIDGE, DEVIN MICHAEL;KEAN, BRIAN;MEYERS, STEPHEN M.;AND OTHERS;SIGNING DATES FROM 20120530 TO 20120806;REEL/FRAME:028741/0628

AS Assignment

Owner name: CREDIT SUISSE AG, CAYMAN ISLANDS BRANCH, NEW YORK

Free format text: SECURITY AGREEMENT;ASSIGNORS:FIRST DATA CORPORATION;CLOVER NETWORKS, INC.;MONEY NETWORK FINANCIAL, LLC;REEL/FRAME:030080/0531

Effective date: 20130320

AS Assignment

Owner name: WELLS FARGO BANK, NATIONAL ASSOCIATION, AS COLLATE

Free format text: SECURITY INTEREST;ASSIGNOR:FIRST DATA CORPORATION;REEL/FRAME:036656/0224

Effective date: 20150811