US20130204781A1 - Credit card system and method - Google Patents

Credit card system and method Download PDF

Info

Publication number
US20130204781A1
US20130204781A1 US13/829,514 US201313829514A US2013204781A1 US 20130204781 A1 US20130204781 A1 US 20130204781A1 US 201313829514 A US201313829514 A US 201313829514A US 2013204781 A1 US2013204781 A1 US 2013204781A1
Authority
US
United States
Prior art keywords
card number
gift card
personalized gift
credit card
transaction
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
US13/829,514
Inventor
Daniel I. Flitcroft
Graham O'Donnell
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Orbis Patents Ltd
Original Assignee
Orbis Patents Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Family has litigation
First worldwide family litigation filed litigation Critical https://patents.darts-ip.com/?family=49356554&utm_source=google_patent&utm_medium=platform_link&utm_campaign=public_patent_search&patent=US20130204781(A1) "Global patent litigation dataset” by Darts-ip is licensed under a Creative Commons Attribution 4.0 International License.
Application filed by Orbis Patents Ltd filed Critical Orbis Patents Ltd
Priority to US13/829,514 priority Critical patent/US20130204781A1/en
Publication of US20130204781A1 publication Critical patent/US20130204781A1/en
Abandoned legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07FCOIN-FREED OR LIKE APPARATUS
    • G07F7/00Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus
    • G07F7/08Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means
    • G07F7/0806Details of the card
    • G07F7/0813Specific details related to card security
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/30Payment architectures, schemes or protocols characterised by the use of specific devices or networks
    • G06Q20/34Payment architectures, schemes or protocols characterised by the use of specific devices or networks using cards, e.g. integrated circuit [IC] cards or magnetic cards
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/04Payment circuits
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/08Payment architectures
    • G06Q20/10Payment architectures specially adapted for electronic funds transfer [EFT] systems; specially adapted for home banking systems
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/08Payment architectures
    • G06Q20/10Payment architectures specially adapted for electronic funds transfer [EFT] systems; specially adapted for home banking systems
    • G06Q20/105Payment architectures specially adapted for electronic funds transfer [EFT] systems; specially adapted for home banking systems involving programming of a portable memory device, e.g. IC cards, "electronic purses"
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/08Payment architectures
    • G06Q20/16Payments settled via telecommunication systems
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/22Payment schemes or models
    • G06Q20/24Credit schemes, i.e. "pay after"
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/22Payment schemes or models
    • G06Q20/28Pre-payment schemes, e.g. "pay before"
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/30Payment architectures, schemes or protocols characterised by the use of specific devices or networks
    • G06Q20/34Payment architectures, schemes or protocols characterised by the use of specific devices or networks using cards, e.g. integrated circuit [IC] cards or magnetic cards
    • G06Q20/342Cards defining paid or billed services or quantities
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/30Payment architectures, schemes or protocols characterised by the use of specific devices or networks
    • G06Q20/34Payment architectures, schemes or protocols characterised by the use of specific devices or networks using cards, e.g. integrated circuit [IC] cards or magnetic cards
    • G06Q20/354Card activation or deactivation
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/30Payment architectures, schemes or protocols characterised by the use of specific devices or networks
    • G06Q20/34Payment architectures, schemes or protocols characterised by the use of specific devices or networks using cards, e.g. integrated circuit [IC] cards or magnetic cards
    • G06Q20/355Personalisation of cards for use
    • G06Q20/3552Downloading or loading of personalisation data
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/30Payment architectures, schemes or protocols characterised by the use of specific devices or networks
    • G06Q20/34Payment architectures, schemes or protocols characterised by the use of specific devices or networks using cards, e.g. integrated circuit [IC] cards or magnetic cards
    • G06Q20/357Cards having a plurality of specified features
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/385Payment protocols; Details thereof using an alias or single-use codes
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/401Transaction verification
    • G06Q20/4016Transaction verification involving fraud or risk level assessment in transaction processing
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • G06Q40/03Credit; Loans; Processing thereof
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • G06Q40/04Trading; Exchange, e.g. stocks, commodities, derivatives or currency exchange
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07FCOIN-FREED OR LIKE APPARATUS
    • G07F19/00Complete banking systems; Coded card-freed arrangements adapted for dispensing or receiving monies or the like and posting such transactions to existing accounts, e.g. automatic teller machines
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07FCOIN-FREED OR LIKE APPARATUS
    • G07F19/00Complete banking systems; Coded card-freed arrangements adapted for dispensing or receiving monies or the like and posting such transactions to existing accounts, e.g. automatic teller machines
    • G07F19/20Automatic teller machines [ATMs]
    • G07F19/205Housing aspects of ATMs
    • G07F19/2055Anti-skimming aspects at ATMs
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07FCOIN-FREED OR LIKE APPARATUS
    • G07F7/00Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus
    • G07F7/02Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by keys or other credit registering devices
    • G07F7/025Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by keys or other credit registering devices by means, e.g. cards, providing billing information at the time of purchase, e.g. identification of seller or purchaser, quantity of goods delivered or to be delivered
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07FCOIN-FREED OR LIKE APPARATUS
    • G07F7/00Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus
    • G07F7/08Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07FCOIN-FREED OR LIKE APPARATUS
    • G07F7/00Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus
    • G07F7/08Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means
    • G07F7/10Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means together with a coded signal, e.g. in the form of personal identification information, like personal identification number [PIN] or biometric data
    • G07F7/1008Active credit-cards provided with means to personalise their use, e.g. with PIN-introduction/comparison system
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07FCOIN-FREED OR LIKE APPARATUS
    • G07F7/00Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus
    • G07F7/08Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means
    • G07F7/12Card verification
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07FCOIN-FREED OR LIKE APPARATUS
    • G07F7/00Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus
    • G07F7/08Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means
    • G07F7/12Card verification
    • G07F7/122Online card verification

Definitions

  • This invention relates to a credit card system and method, and more particularly, to a credit card system and method offering reduced potential of credit card number misuse.
  • the former are concerned about fraud because essentially the financial institutions have to bear the initial cost of the fraud.
  • the credit card companies have an efficient credit card system which is working well for face to face transactions, i.e., “card present” transactions where the credit card is physically presented to a trader and the trader can obtain the credit card number, compare signatures and in many cases photographs before accepting a particular credit card.
  • the credit card holder For remote credit card use, the credit card holder has to provide details of name, master credit card number, expiration date and address and often many other pieces of information for verification; the storing and updating of the information is expensive but necessary. This of itself is a considerable security risk as anybody will appreciate that this information could be used to fraudulently charge goods and services to the card holder's credit card account. Such fraudulent use is not limited to those people to whom the credit card information has been given legitimately, but extends to anybody who can illegitimately obtain such details.
  • a major problem in relation to this form of fraud is that the credit card may still be in the possession of the legitimate holder as these fraudulent transactions are taking place. This is often referred to as “compromised numbers” fraud. Indeed all this fraud needs is one dishonest staff member, for example in a shop, hotel or restaurant, to record the credit card number. It is thus not the same as card theft.
  • SET Secure Electronic Transaction
  • U.S. Pat. No. 5,715,314 discloses using an access message that comprises a product identifier and an access message authenticator based on a cryptographic key.
  • a buyer computer sends a payment message that identifies a particular product to a payment computer.
  • the payment computer is programmed to receive the payment message, to create the access message, and to send the access message to a merchant computer. Because the access message is tied to a particular product and a particular merchant computer, the access message can not be generated until the user sends the payment message to the payment computer. Because the access message is different from existing credit card formats, the access message is ill-suited for phone/mail orders and other traditional credit card transactions.
  • U.S. Pat. No. 5,883,810 (Franklin et al.) describes an online transaction system in which a user of the Internet or the like clicks on an icon to receive a proxy transaction number from a credit card provider.
  • This proxy number stands in for the user's regular credit card number during transmission over the Internet, but expires after a short time (e.g., one hour) to reduce the chance that the number will be effectively intercepted and fraudulently used.
  • the processing that occurs when a bank receives transaction information from a merchant involves checking whether the proxy number is a valid number and whether the transaction value and merchant match. There is no additional processing triggered when the bank processing system receives the proxy number.
  • the Franklin et al. system is that an unscrupulous merchant or a criminal who is capable of accessing or intercepting order details can then turn around and use the proxy number a number of times before the lapse of the expiration term. Thus, more than one transaction can occur within the duration of the expiration term.
  • the Franklin et al. system has nothing in place to prevent this type of fraud.
  • the Franklin et al. system merely depends upon an assumption that fewer criminals could obtain the proxy number and reuse it within the expiration term of the proxy transaction number set by the issuing bank than the total number of criminals capable of gaining access to credit card numbers used for online commerce.
  • the inclusion of specific transaction information does not prevent a fraudulent merchant from recurrent unauthorized charges within the expiry time of the proxy number. The user will not be aware of this misuse of his/her credit card details until the receipt of the statement, which will typically not be until several weeks later.
  • Japanese Patent Publication No. Hei 6-282556 discloses a one-time credit card settlement system for use by, e.g., teenage children of credit card holders.
  • This system employs a credit card which can be used only once in which various information such as specific personal information, use conditions, and an approved credit limit identical to those of the original credit card are recorded on a data recording element and displayed on the face of the card.
  • the one-time credit card contains the same member number, expiration date, card company code, and the like as on existing credit card, as well as one-time credit card expiration date not exceeding the expiration date of credit card, available credit limit for the card, and the like.
  • the one-time credit card makes use of some of the same settlement means as the conventional credit card.
  • the system also requires use permission information to be recorded on the credit card, the information permitting the credit card to be used only once or making it impossible to use the credit card when the credit limit has been exceeded.
  • a special card terminal device checks the information taken from the card for correctness and imparts use permission information for when the card is not permitted to be used on the transmission to the credit card issuing company.
  • the use permission information takes the form of a punched hole on the card itself.
  • This system has obvious drawbacks, such as the card terminal having to be modified for additional functions (e.g., punching holes, detected punched holes, imparting additional information, etc.). Also, such a system offers little additional security insofar as fraud can still be practiced perhaps by covering the holes or otherwise replacing the permission use information on the credit card. Further, such a system would require a change in nearly all card terminal equipment if it were adopted.
  • U.S. Pat. Nos. 5,627,355 and 5,478,994 disclose another type of system that uses a plurality of pin numbers which are added to a credit card number on an electronic display.
  • U.S. Pat. No. 5,627,355 discloses a credit card having a memory element containing a series of passwords in a predetermined sequence. These passwords are identical to another sequence stored in a memory of a host control computer. Further, the card contains a first fixed field containing an account number (e.g., “444 222 333”). In operation, the memory element of the credit card device provides a unique password from the sequence with each use of the credit card device.
  • U.S. Pat. Nos. 5,350,906 (Brody et al.) and 5,326,960 (Tannenbaum et al.) disclose issuing temporary PINs for one time or limited time and limited credit access to an account at an ATM.
  • These patents disclose a currency transfer system and method for an ATM network.
  • a main account holder i.e., the sponsor
  • sets up a subaccount that can be accessed by a non-subscriber by presenting a fixed limit card associated with the subaccount and by entering a password corresponding to the subaccount. Once the fixed limit is reached, the card can no longer be used.
  • the fixed limit card contains information on its magnetic stripe pertaining to the sponsor account.
  • the present invention includes a number of credit card products, which have predefined characteristics.
  • a first exemplary embodiment which pertains to a financial transaction system capable of using at least one limited use credit card number, which is limited in use by a party other than a limited use credit card number issuer and which is associated the master account number of a customer.
  • the inventive method of controlling the validity of the limited use credit card number comprising the steps of: sending to a user from a limited use credit card number issuer a limited use credit card number; communicating with a limited use card number card issuer to establish limitations on the use of the limited use credit card number by a third party before it can be used in a transaction by said user; and authorizing transactions which meet said established limitations and denying other transactions by comparing at a central location the attempted use to the established limitations on use.
  • FIG. 1 shows an exemplary system for implementing the present invention
  • FIG. 2 shows, in high-level form, the operation of the central processing station shown in FIG. 1 ;
  • FIG. 3 is a flow chart illustrating an exemplary process for allocating credit card numbers
  • FIG. 4 is a flow chart illustrating an exemplary process for limiting the use of a credit card number
  • FIG. 5 is a flow chart illustrating an exemplary process for distributing credit card numbers
  • FIG. 6 is a flow chart illustrating an exemplary process for electronically using credit card numbers
  • FIG. 7 is a flow chart illustrating an exemplary process for processing a transaction
  • FIG. 8 is a flow chart illustrating another exemplary process for processing a transaction
  • FIG. 9 is a flow chart illustrating an exemplary method of controlling the validity of a limited use credit card number
  • FIG. 10 is a flow chart illustrating an exemplary process for using a credit card number as a PIN number
  • FIG. 11 is a block diagram illustrating an exemplary location for the central processing system
  • FIG. 12 is a flow chart illustrating an exemplary method of conducting a limited use credit card number transaction
  • FIG. 13 is a flow chart illustrating an exemplary method of conducting a settlement transaction
  • FIG. 14 is a block diagram illustrating an alternate exemplary location for the central processing system
  • FIG. 15 is a block diagram illustrating an alternate exemplary process for limiting, distributing and using a limited use card number
  • FIG. 16 is a flow chart illustrating an exemplary method of providing remote access devices for accessing limited use credit card numbers.
  • FIG. 17 is a diagram illustrating how the present invention can place limitations on an configurable plastic payment card to facilitate card-present applications.
  • credit card refers to credit cards (MasterCard®, Visa®, Diners Club®, etc.) as well as charge cards (e.g., American Express ⁇ , some department store cards), debit cards such as usable at ATMs and many other locations or that are associated with a particular account, and hybrids thereof (e.g., extended payment American Express®, bank debit cards with the Visa® logo, etc.) or any other present or future financial transaction card having similar characteristics.
  • charge cards e.g., American Express ⁇ , some department store cards
  • debit cards such as usable at ATMs and many other locations or that are associated with a particular account
  • hybrids thereof e.g., extended payment American Express®, bank debit cards with the Visa® logo, etc.
  • master credit card number and “master credit card” refer to the credit card number and the credit card as generally understood, namely, that which is allocated by the credit card provider to the customer for his or her account for multiple uses for a renewable period and a credit limit.
  • an account may have many master credit cards in the sense of this specification.
  • a corporation may provide many of its employees with credit cards but essentially each of these employees holds a master credit card even if there is only one customer account.
  • Each of these master credit cards will have a unique master credit card number, which set of master credit card numbers will be linked to the account.
  • various members of the family may hold a master credit card, all of which are paid for out of the one customer account.
  • the “master credit card” account can be in some embodiments something other than a credit card account.
  • the master card number can be a prepaid account or another type of account, such as a utility, telephone service provider or Internet Service Provider (ISP) account.
  • ISP Internet Service Provider
  • the utility company, telephone company, ISP or other account holder would generate a bill, which, in possible addition to or separate from to the regular bill, would include a listing of limited use credit card transactions.
  • An advantage of this type of arrangement is that the service provider already has information as to a pool of individual and their credit worthiness, as well as low increased overhead due to the already in place billing system.
  • the “master account” may but likely does not have the format of a standard credit card or the like.
  • the term “limited-use” credit card number is used to encompass at least both the embodiment in which the credit card is designated for a single use, and the embodiment in which the credit card is designated for multiple uses providing that the charges accrued do not exceed a prescribed threshold or thresholds, such a total single charge, total charges over a limited time period, total charge in a single transaction, etc.
  • a prescribed threshold or thresholds such a total single charge, total charges over a limited time period, total charge in a single transaction, etc.
  • a common feature is that the limited use credit card number is deactivated upon satisfaction of a limited-use condition, and not just the expiration date of the card. Stated differently, the a limited-use credit card number is deactivated upon a use-triggered condition which occurs subsequent to assignment of said at least one credit card number.
  • deactivated means that new transactions cannot be initiated using the same limited-use credit card number, but the limited-use credit card number is still available for further activity related to the original transaction, such as for charge-backs where an account is credited, such as upon return of unaccepted merchandise.
  • card holder and “user” are used interchangeably to refer to an entity, e.g., an individual, that has been rightfully issued a credit/debit/charge card number, e.g., through a contractual arrangement, or that has been authorized to use such card by such entity or a representative of such entity.
  • the two ways are the allocation of additional credit card numbers for remote trade and the provision of what are effectively disposable credit cards for remote and card present trade, both of which have the feature of in the case of single use or in the case of multiple use, protecting against the worst effects of compromised numbers fraud or skimming.
  • One basic feature of the invention is to provide in a credit card system such that each master credit card holder could be provided with one or more of the following: 1) additional single use credit card numbers for remote transactions; 2) multiple use credit card numbers for remote transactions; 3) single use additional credit cards for remote and card present transactions; and 4) multiple use credit cards for remote and card present transactions.
  • a second embodiment of the invention provides the master credit card holder with an additional credit card number for use in remote trade, which credit card number could have, as in the previous example of the invention, a credit limit for each specific transaction or a credit limit such that when the aggregate amount of a series of transactions exceeded a specific credit limit that the credit card number would be canceled, invalidated or in some other way deactivated.
  • the multiple use credit card number could be limited to, for example, five uses with a credit limit not exceeding $100 in each transaction and an aggregate credit limit not exceeding $400.
  • a time restriction could be put on such a credit card number in that it would be deactivated if it was used with frequency above (or below) a given threshold, for example, more than once a week.
  • the third way in which the invention could be carried out is by physically providing additional single use credit cards each of which would have a unique additional credit card number. Such additional single use credit cards could then be used both for remote trade by using the additional credit card numbers for respective transactions, and for “card present” trade where each card would be “swiped” in the normal manner.
  • a disposable credit card could be made like any common credit card, or from a relatively inexpensive material, such as cardboard or thin plastic, with the relevant information entered into it in readable (e.g., magnetic) form, as is already the case with many forms of passes for use in public transport and the like. Again, substantially the same features as with the credit card number could be provided.
  • the disposable credit card could be limited to use geographically, to a use, to an amount, to a frequency of use, to an expiration date, and so on. Again, those skilled in the art will appreciate that there are many variations to this concept.
  • Another way of carrying out the invention is to provide a master credit card holder with a multiple-use additional credit card, where the additional credit card provides any limitations as to limited-use triggering conditions that may be desired.
  • the master credit card holder would be provided with either a plurality of single use additional credit card numbers or multiple-use credit card numbers or a mixture of single and multiple-use credits cards.
  • the present invention solves the problem by obtaining the functionality of a credit card while never in fact revealing the master credit card number as the master credit card number need never be given in a remote transaction. Further, the master credit card itself need never be given to a trader.
  • the above-discussed cards could be, in effect, debit cards in the true sense, in which funds are withdrawn against a customer's account.
  • the “credit card” issued whether it be a one time use card or multi-use card, and whether have a credit limit or not, would be used to debit the account immediately.
  • the credit card issued in these circumstances would be single use with or without a transaction amount limit which would be used and processed by the customer and merchant for a transaction as if it were a credit card, while in the customer's bank it would be treated like any other debit to the account.
  • Various aspects of the invention may be embodied in a general purpose digital computer that is running a program or program segments originating from a computer readable or usable medium, such medium including but not limited to electrical or magnetic storage media (e.g., ROMs, EEPROMs, RAM, floppy disks, hard disks, etc.), optically readable media (e.g., CD-ROMs, DVDs, etc.), and carrier waves (e.g., transmissions over the Internet) or combinations thereof.
  • ROMs, EEPROMs, RAM, floppy disks, hard disks, etc. optically readable media
  • CD-ROMs, DVDs, etc. optically readable media
  • carrier waves e.g., transmissions over the Internet
  • FIG. 1 shows an exemplary overview of a system for implementing the limited use credit card system of the present invention.
  • the system 100 comprises a central processing station 102 , which, accordingly to exemplary embodiments, may be operated by the credit card provider.
  • this station 102 receives and processes remotely generated credit card transactions.
  • the credit card transactions can originate from a merchant in the conventional manner, e.g., by swiping a credit card through a card swipe unit 106 .
  • the credit card transaction requests can originate from any remote electronic device 104 (e.g., a personal computer).
  • These remote devices can interface with the central processing station 102 through any type of network, including any type of public or propriety networks, or some combination thereof.
  • the personal computer 104 interfaces with the central processing station 102 via the Internet 112 .
  • the central processing station 102 can also interface with other types of remote devices, such as a wireless (e.g., cellular telephone) device 140 , via radio communication using transmitting/receiving antenna 138 .
  • a wireless (e.g., cellular telephone) device 140 can be interposed, as is conventional.
  • the central processing station 102 itself may include a central processing unit 120 , which interfaces with the remote units via network I/O unit 118 .
  • the central processing unit 120 has access to a database of credit card numbers 124 , a subset 126 of which can be designated as being available for limited use (referred to as the “available range”).
  • the central processing unit 120 has access to a central database 122 , referred to as a “conditions” database.
  • This database is a general purpose database which stores information regarding customers' accounts, such as information regarding various conditions which apply to each customers' account.
  • this database 122 may store the mapping between a customer's fixed master credit card number and any outstanding associated limited use credit cards, using, for instance, some type of linked-list mechanism.
  • Databases 122 and 124 are shown separately only to illustrate the type of information which may be maintained by the central processing station 102 ; the information in these databases can be commingled in a common database in a manner well understood by those having skill in the data processing arts. For instance, each limited use credit card number can be stored with a field, which identifies its master account, and various conditions regarding its use.
  • the central processing unit 120 can internally perform the approval and denial of credit card transaction requests by making reference to credit history information and other information in the conventional manner. Alternatively, this function can be delegated to a separate clearance processing facility (not shown).
  • the central processing station includes the capability of transmitting the limited use credit card numbers to customers.
  • a local card dispenser 128 can be employed to generate a plurality of limited use cards 132 and/or a master credit card 134 for delivery to a customer.
  • the limited use credit card numbers can be printed on a form 136 by printer 130 , which is then delivered to the customer via the mail.
  • the printed form 136 may include material which covers the numbers until scratched off, thereby indicating what numbers have been used and are no longer active. This listing of numbers can be included in a monthly or other periodic account statement sent to the customer.
  • these limited use numbers can be electronically downloaded to a user's personal computer 104 , where they are stored in local memory 142 of the personal computer 104 for subsequent use.
  • the credit card numbers can be encrypted (described in detail later).
  • the numbers can be downloaded to a user's smart card though an appropriate interface.
  • the single-use credit card numbers can be downloaded to a radio unit 140 (such as a portable telephone) via wireless communication.
  • an ATM 108 can be used to dispense the limited use cards 110 .
  • the logic used to perform the actual allocation and deactivation of limited use credit card numbers preferably comprises a microprocessor, which implements a stored program within the central processing unit 120 . Any general or special purpose computer will suffice.
  • the logic used to perform the allocation and deactivation of the limited use credit card numbers may comprise discrete logic components, or some combination of discrete logic components and computer-implemented control.
  • FIG. 2 shows a high-level depiction of the functions performed by the central processing station 102 or the like.
  • the process begins in step 202 by allocating one or more limited use numbers to a customer. These numbers are ultimately selected from the list 126 of available limited use numbers, or some other sub-set list which has been previously formed from the numbers in list 126 . Also, although not shown in FIG. 2 , a master account number would have been preferably assigned to the customer at a previous point in time.
  • the conditions database 122 may comprise a mechanism for associating the master account number (which can be a credit card number or some other type of account) number with the limited use credit card number. Because the limited use cards are arbitrarily chosen from the listing 126 of limited use card numbers, there should be no discernable link which would allow anyone to determine the master credit card number from any of the limited use numbers.
  • step 204 it is determined whether a customer requests or an event triggers a request for additional limited use cards or card numbers. If so, additional limited use cards or card numbers are allocated to the customer.
  • step 206 the central processing station determines whether a transaction has taken place using a previously issued limited use card.
  • step 208 a determination (in step 208 ) whether the limited use number should be deactivated. For instance, if the card is a single-use card, it will be deactivated. If the card is a fixed-limit card, the card is only deactivated if the recent transaction exceeds some stored threshold limit. These threshold limits can be stored on the card itself or in the conditions database 122 .
  • the actual step of deactivating is performed by generating a deactivation command, as represented in step 210 shown in FIG. 2 .
  • steps to processing a credit card transaction such as checking whether the card is deactivated or otherwise invalid prior to completing the transaction.
  • these deactivated numbers can be reactivated providing that a sufficiently long time since their first activation has transpired. Providing that there is a sufficiently large number of limited use credit card numbers to choose from, it would be possible to wait a long time before it was necessary to repeat any numbers. At this point, it would be very unlikely that someone who had wrongfully intercepted a credit card number years ago would be motivated to fraudulently use it before the rightful owner.
  • an additional limited use card or cards can be activated.
  • the actual activation of the credit card number can involve various intermediate processing steps. For instance, the credit card numbers from the list 126 can be first allocated to an “allocated” range of numbers, and then to an “issued but not valid” range of numbers, and then finally to an “issued and valid” range of numbers.
  • FIG. 2 is a high-level depiction of the process, and encompasses this specific embodiment, as well as the more basic case where the credit card numbers are retrieved from a database and then immediately activated.
  • the first thing that the credit card provider may do is to generate a list of additional credit card numbers, whether they be single use or multiple use, and allocate additional credit numbers to a master credit card as a further credit card number for optional use instead of the master credit card number.
  • Such a list can be produced by any suitable software package in the exemplary manner discussed in more detail below. Because the numbers allocated to a particular master credit card holder will not have any link to the master credit card number, the master credit card number should not be able to be derived from the additional credit card numbers.
  • randomness in credit card numbers is provided by the fact that there is a queue formed by the customers requiring numbers. Further, it should not be possible, even knowing the additional credit card numbers in a particular master credit card holder's possession which he or she may have used, to predict the next set of numbers that that particular master credit card holder will be allocated, since there will be randomness of access to additional credit card numbers in the truest sense. Even if the credit card provider were to allocate numbers sequentially, there would be no way of predicting the number that that credit card holder would subsequently acquire, since the numbers would be allocated by virtue of a queue, the randomness of this allocation being such as to prevent any prediction.
  • the credit card numbers generated by the central computer need not be per se random numbers.
  • these numbers are valid credit card numbers with the constraint that they must conform to industry specifications of the format in terms of their numerical content in such a way that they can be handled with no (or minimal) modifications by merchant/acquiring systems and networks and be routed to the appropriate center for processing.
  • An additional constraint is that they must be different from all other conventional account numbers and all other single use numbers during their lifetime of validity.
  • an issuing bank decides within its total available range of credit cards to allocate a certain range or ranges of numbers to the single use system, referred to herein as the “available range.”
  • This may represent spare numbers using existing header sequences (e.g., the sequence of usually 4-6 digits that define the issuing institution and are used to route the card to the appropriate transaction processor) or within newly created header sequences.
  • the numbers not allocated include existing credit card accounts for that issuer and sufficient spare capacity for new account holders and replacement numbers for existing customers.
  • the additional non-embossed components of the card details and any card specific information that is transmitted during a transaction may be varied from card to card to enhance security and privacy of credit card transactions.
  • each limited use number is unique during the its lifetime of validity, information required to route the card number and transaction details to the appropriate processor is maintained to ensure that limited use numbers are processed appropriately.
  • the limited use numbers do not need to include either the master card account number or an encoded version of the account number. Indeed privacy and security are enhanced when no unique account holder identifier is included within the limited use credit card number.
  • expiry date and checksum digit must be valid. This information may vary from limited use number to limited use number, but must be valid to ensure that the number passes checks that may be completed within the merchant terminal, i.e., the checksum is appropriately calculated for each limited use number and the associated expiry date is valid at the time of use.
  • the random allocation process used to generate lists of unique limited use numbers can involve allocation from a range of numbers in which either the entire number or portions of the account number are varied.
  • the allocation can include combinations of all or part of the account number together with all or part of additional information such as non-embossed additional numbers, expiry date and other information that identifies the card and is passed on by the merchant to the card processor during a transaction.
  • Sequential random allocation from a list of available valid credit/debit/charge card codes that have been solely allocated for use as limited use numbers ensures that the criteria specified for limited use numbers are met, i.e., no two limited use numbers are the same, no limited use number is the same as an existing account number, and no newly issued conventional card number is the same as a previously issued limited use number.
  • the random allocation process requires a truly random seed value. Such true randomness can be obtained from a physically random system with well-defined properties such as a white noise generator. An analog to digital converter that receives an analog signal from such a truly random physical system can be used to ensure truly random allocation.
  • the allocation process could randomly select valid credit card numbers within the entire range for a given card issuer and then discard the number if it is already in use as a limited use or conventional card number or if the same number was allocated within a given time frame.
  • the above process generates a series of available single use numbers.
  • the allocation process is achieved by a truly random (or less ideally a pseudo random) mapping process in which a single use number is randomly selected and then assigned to a selected account holder (either an existing credit/debit card holder, a new solely single use account holder or a bank account). Additional single use numbers can be allocated for purchase on an individual basis. Each assigned single use number is then removed from the sequence of available numbers before the next allocation, ensuring a unique allocation of each single use number.
  • An alternative mechanism for performing direct allocation to a specific account holder is for lists of single use numbers to be allocated to unique storage locations. The list from a specific storage location can then be directly allocated to a given account at a later date. This allows for rapid allocation of cards to new customers without any delay arising from the need to perform a new allocation procedure for each new customer.
  • This allocation process generates another series of single use numbers, the “allocated range” with an associated identification field to determine how the account will be settled once used, i.e., onto whose account the transaction will be charged.
  • the allocation process can occur a significant time before the single use numbers are required. Once allocated, they are not added into the list of valid accounts until required by the user.
  • FIG. 3 is a flow chart illustrating an exemplary process for allocating credit card numbers.
  • a central processing unit CPU
  • generates a database of credit card numbers step 302 ), and may select a master credit card number.
  • Step 304 the CPU checks to make sure that the master credit card number is not the same as another credit card number.
  • the CPU selects additional credit card numbers to allocate to the master credit card number or other type of account number.
  • Step 308 The CPU can use any of the techniques discussed above to select the additional numbers.
  • the CPU checks to make sure that the additional numbers are not the same as another credit card number.
  • the additional numbers can be used, for example, for single use cards.
  • the CPU can issue the additional credit card numbers to the customer. Unless these multiple-use numbers are issued directly into the hands of the customer (e.g., by an automated teller machine (ATM)), they are not directly added to the list of valid account numbers held within the central computer system. These numbers are added to an “issued, but not valid” list of numbers. (Step 312 ).
  • the number of multiple-use numbers issued at one time depends upon the rate at which the customer will use the cards and the capability of the device used to store the multiple-use numbers until used.
  • the CPU can provide the customer with enough multiple-use numbers to fulfill their multiple-use purchase requirements for up to, for example, 2 years. Each multiple-use number can be endowed with specific restrictions in terms of transaction type or value, provided that these properties do not exceed the restrictions placed up on the customer's account (such as the available credit balance).
  • Step 314 Once a series of multiple-use numbers are issued, the user has the option of confirming receipt by telephone or other communication media before any of the issued numbers become validated on the processing system.
  • Step 314 Once receipt has been confirmed (or assumed), not every issued multiple-use number is necessarily added to the “issued and valid” list.
  • Step 316 To prevent excessive valid multiple-use numbers being held within the processing system, the number of multiple-use numbers declared to be valid at any one time is limited to account for waste of numbers (i.e., numbers that are accessed by a customer but are never used to complete a transaction) and to allow for time delays between different transactions leading to differences in the sequence in which multiple-use numbers are accessed by the customer and the sequence in which they arrive at the processing center.
  • the maximum number of multiple-use numbers valid at any one time can be determined by the card issuer but would be preferably in the range of 5-10.
  • the next multiple-use number can be used as an additional identifier to validate the transaction. In this case, only a subset of the digits should be given by the user to prevent a fraudulent trader being able to gain access to multiple unused multiple-use numbers.
  • an additional number from the “issued not valid” list for that customer is allocated to the “issued and valid” list, ensuring a continual supply of multiple-use numbers up to the maximum allowed until the next set of multiple-use numbers are issued. (Step 322 ).
  • certain credit card providers print additional numbers on the card, which additional numbers are not embossed on the card and do not form part of the master credit card number.
  • These additional printed and non-embossed credit card numbers can be used to identify that the person proffering the card for a non-present card transaction is actually in possession of the card when the order is made whether it be in writing or by phone.
  • such additional credit card numbers could include a code which would identify that the person using the additional credit card number in a remote transaction is the one to whom the numbers were sent or, in the case of a disposable credit card, is the one to whom the disposable credit card was sent.
  • additional credit card numbers are constrained to be in the correct format for a credit card number with a valid check sum, while at the same time be mathematically unrelated to each other or to the master credit card.
  • the expiration date is virtually irrelevant.
  • using the month code of the expiration date with said eleven digits there are 12 ⁇ 10 11 , i.e., 1.2 ⁇ 10 12 , i.e., 1,200 billion possible unique codes available for any given credit card provider. This would allow for 50 transactions a month for 10 years for 200 million account holders, before any codes would have to be recycled or a new header code introduced.
  • the card is a VISA® card
  • the sixteen digit number has a “4” followed by a five digit code to identify the card issuer.
  • the last number is a checksum to verify that it is a valid number.
  • FIG. 4 is a flow chart illustrating an exemplary process for limiting the use of a credit card number.
  • a CPU can allocate a credit card number to a master credit card number (step 402 ), and allocate a condition to the credit card number. (Step 404 ). The CPU can then store the condition in a database of conditions. (Step 406 ).
  • These limitations can be assigned by the issuer in a predetermined manner or can be imposed according to the requests of the card holder. These limitations can be encoded with the limited use numbers when the numbers are issued to a user so that the user can determine the limitations associated with a particular card. These limitations can be altered once a number is issued by updating the issuer database and the user maintained list of numbers.
  • Step 408 Communication between the user and card issuer to make these changes can be posted, conveyed verbally or electronically.
  • the transaction details are compared by the processing software with the limitations and the transaction is authorized only if the transaction falls within these limitations.
  • Step 412 the limitations can be encoded within part of the number format that is transmitted during a transaction. The limitations would then be decoded from the transmitted transaction details by the card processor. This would offer the user more control, but would offer less security since knowledge of the encoding format could be used to fraudulently alter the limitations chosen by altering the appropriate portion of the limited use number format.
  • a credit card number can be limited to a single transaction for a pre-arranged transaction limit.
  • a credit card number can be used, for example, to implement an installment plan where the credit card number is, for example, only valid for twelve payments for a pre-arranged transaction limit for twelve months to a single merchant. This plan provides security against fraud because it is locked to a single merchant, and it is only good for one year.
  • a credit card number can be used to implement a debit plan where the credit card number is limited to a specific merchant.
  • the merchant can be prearranged by the user or can be determined by first use.
  • a limited use card can be used to generate an account specific to a single merchant. For example, this can be used in situations on the Internet where a web merchant will retain a credit card number for later purchases.
  • theft of the number from the merchant's computer systems will not allow the card to be used elsewhere.
  • any such use will immediately identify a specific merchant as having suffered a security breach. Determination-by-first use could involve linking the merchant name or credit card system identification number at the time of making the purchase, during the authorization process or during the settlement process.
  • a credit card number can be used as a gift voucher where the credit card number is limited to a specific transaction value or limit, but it can be used for any merchant.
  • a gift voucher limited use card could also have a pre-determined limitation to a specific merchant or a type of merchants or to a group of merchants such as within an “online shopping mall”.
  • additional credit card numbers and/or additional credit cards are distributed to a credit card holder.
  • One way of providing such additional credit card numbers and/or additional credit cards is to in some way provide them physically to the master credit card holder, whether it be by collection, delivery by courier, post or some other way which can generally be covered under the heading of provision by post.
  • the financial institutions wish to provide the additional credit card numbers or the additional credit cards to the user as efficiently as possible with the minimum risk of the additional credit card numbers and/or cards falling into a third party's hand.
  • a credit card provider could issue the additional credit card numbers and/or credit cards to the user.
  • One of the simplest ways would be to post them on request.
  • Another way would be for the credit card provider, after receiving a payment of an account or with a statement of an account, to provide a sufficient number of additional credit card numbers and/or additional credit cards to replace the ones used since the previous statement.
  • Such statements do not quote the master credit card number or some code number, it would be possible to put in additional checks on the activation of the additional credit card numbers or credit cards.
  • Some form of receipt system could be used. In this way effective theft would be reduced.
  • FIG. 5 is a flowchart illustrating an exemplary process for distributing credit card numbers.
  • a credit card issuer allocates a master credit card number or more generically a type of master account number to a master credit card or account owner.
  • the credit card issuer then allocates limited use numbers to the master account number.
  • the card issuer can decide whether to print (or incorporate by some other means such as embossing) one number per card or multiple numbers per card.
  • the card issuer can distribute multiple numbers using a single card (step 508 ) or distribute multiple numbers using multiple cards. (Step 512 ).
  • an opaque removable cover can be used to cover one or more portions of the card.
  • the opaque removable cover can cover the number portion of the card, so that the cover has to be removed before the card can be used. The act of removing the cover indicates that the card number has been accessed or used.
  • an opaque removable cover can conceal a message such as “used”.
  • the opaque removable cover can be a scratch off layer that is scratched off before or after the card is used.
  • the scratch off layer can resemble the layer that is often used to cover lottery numbers or the like.
  • the single use cards can be placed in a self-contained container that resembles a razor blade dispenser. (Step 516 ). The owner can remove a single use card from a first compartment and then place the used card into a second compartment.
  • the owner can keep track of the numbers by using a device that covers one or more portions of the card. (Step 510 ).
  • the device can cover the numbers until they are used.
  • the device can comprise multiple opaque layers that must be removed prior to the use of each number.
  • each number could be visible when the card is issued and each number is associated with a panel in which an opaque covering conceals a message that indicates that the number has been used. After each use, the corresponding covering is removed or scratched off to indicate that the number has been used.
  • the additional credit card numbers and/or cards can be sent with a statement. (Step 518 ).
  • the additional credit card numbers are not activated until the statement is paid. (Step 520 ).
  • the card issuer could also require that the payment be accompanied by the master credit card number or another identifier. Or, for example, an additional security step involving either direct contact with the issuing credit card company or an independently issued password to allow activation of an electronic device could be used.
  • a further way in which the additional credit card numbers and/or additional credit cards could be distributed to the user is by way of an ATM machine. (Step 522 ).
  • the ATM machine with very little modification could provide the additional credit card numbers.
  • an ATM machine could provide additional credit cards.
  • Cards/single use numbers can be issued directly into an electronic device that is capable of storing such numbers. This applies to mobile phones and pager devices to which information can be transmitted using existing systems and computers connected either directly or via a telecommunications system to the Internet or a specific host computer system. In such a situation a mechanism is required to protect these numbers in transit to prevent unauthorized access. For global applications, this mechanism must not be subject to export restrictions. In addition, this protection should not be susceptible to “brute force” decryption techniques. Such a system is described below in relation to the storage of single use cards.
  • the associated software can perform some or all of the following functions:
  • the software can integrate with Internet software in the situation where it is run on a device linked to the Internet or similar electronic network and allow automatic transmission of transaction details if the merchant software so allows.
  • the user also has the option of dragging and dropping a limited use number displayed by the software onto the appropriate part of a web page, or manually entering the number.
  • the number can either be spoken by the user or appropriate tones can be generated to automatically transmit the number to the merchant.
  • the customer uses an electronic device to store issued single use numbers.
  • This may represent a range of devices from a mobile telephone, pager, dedicated single use storage device or a software package that can run on range of platforms such as a conventional desktop computer, television based Internet access device (e.g., WebTV) or a portable computing device.
  • the software that is used within these devices for storing and accessing these numbers will have specific features that are common to all platforms/devices.
  • access to the software will be password protected or protected by another security system that allows identification of the user (e.g., magnetic stripe card reader, chip card reader, electronic token generator, fingerprint recognition system or the like).
  • Another security system that allows identification of the user (e.g., magnetic stripe card reader, chip card reader, electronic token generator, fingerprint recognition system or the like).
  • Multiple passwords may be employed to provide limited access to certain individuals, for example limiting access for a family member to single use numbers with specific pre-allocated limits on application or maximum transaction value.
  • the single use numbers are preferably stored in a secure form involving one or more encryption systems. It is proposed that a dual system will be employed using a standard protocol (e.g., DES or RSA encryption) and a specific system designed for credit cards as described below.
  • a standard protocol e.g., DES or RSA encryption
  • “Brute force” decryption involves using multiple fast computers and specific algorithms to test large numbers of possible encryption “keys.” Success can be determined by seeing whether the result appears in the expected format, for example as comprehensible English text in the case of an encrypted document. If the encrypted version is in an identical format to the unencrypted version (though with different information) then brute force decryption cannot succeed. This is not a computationally viable option for text but it is possible for credit cards.
  • the approach is to break down each component of a credit card number and encrypt these with a private password so as to maintain the numerical composition of each component.
  • the end result should be securely encrypted but should not represent another existing credit card account. This can be achieved by constraining the encryption system to convert the credit card header sequence used to identify the issuing bank (usually 4-6 digits) into a currently unused sequence. Since this information will be constant for all cards from the same issuer, this information should be randomized (rather than encrypted) to prevent recognition of a valid decryption solution. Once the rest of the number is decrypted by the program, the appropriate header sequence can be added.
  • the remaining digits excluding the checksum are then encrypted using any private key encryption system that will maintain the same number of digits and produce a result that represents the numerals 0 to 9.
  • the expiration date and any other identifying digits are also encrypted in such a manner as to respect their existing structure, i.e., the month is encrypted between 1 and 12 and the year is encrypted so as to represent a number within the next three years that ensures that the expiration date is valid.
  • the digits used to calculate the checksum in a normal card number are processed to calculate a valid checksum for the encrypted card.
  • the result is a valid appearing credit card number that has a valid checksum and which can be guaranteed not to belong to any existing credit/debit card account holder.
  • 123456 is randomly assigned to a currently unused header sequence, e.g., 090234 (this is an example and does not necessarily represent an unused header sequence).
  • 789012345 is encrypted into another 9 digit number, e.g., 209476391.
  • 12/99 is encrypted to a valid date format that ensures the card is not expired, e.g., 3/00.
  • the checksum is recalculated to produce a valid appearing credit card number, for this example the checksum is 4, i.e., 0902 3420 9476 3914 expiry 3/00.
  • the appropriate header sequence for the issuer is exchanged for the digits in the encrypted number.
  • the other digits are decrypted using the private password and the check-sum is recalculated.
  • the header number is unused and the private password remains private, then this number is encrypted in such a way that brute force encryption cannot be used to determine the original number, since it will not be possible to determine when the correct solution has been reached. In combination with standard encryption systems, this allows a means to securely store credit cards and transmit them over insecure systems with confidence.
  • the next available single use number is decrypted and either displayed, allowing the customer to use it in any form of trade that can achieved by quoting credit card information, or directly transmitted via the software to the merchant.
  • the single use number is removed from the stored list. The date of access, the number accessed and any additional available transaction details are then stored in a secure fashion and digitally signed to allow for verification in the case of a disputed transaction.
  • Each access to a single use number requires the entry of a password to prevent unauthorized access if the customer leaves his software/computer device unattended and active.
  • the final checksum digit can be handled in one of several ways. For example, the checksum digit can be recalculated based on the encrypted remaining digits as described above. Alternatively, the final checksum digit can be omitted from the encryption process and recalculated after decryption.
  • the remaining digits can be reformatted into another number with the same number of digits by any reversible encryption process.
  • the same process may also be applied to all other numerical information transmitted that may be issued during a transaction, e.g., the expiry date and other codes.
  • One process for randomizing these remaining digits is described above.
  • Another process to encode the remaining digits is to perform a digit by digit mathematical operation in combination with a mask containing the same number of digits as the remaining digits to be encoded.
  • the original remaining digits are 878918982 and the random mask digits, containing the same number of digits as the remaining digits to be encoded, are 143337658.
  • a modulo 10 arithmetic function is then performed using the original remaining digits and the random mask digits as follows to achieve the encrypted result.
  • the encrypted card number After transmission of the encrypted card number, including the replacement header sequence digits, the encrypted remaining digits and the checksum digit, if appropriate, the encrypted card number is separated out into its components.
  • the encrypted remaining digits are decrypted in the opposite manner in which they were encrypted. Specifically, knowing the random mask digits and the encrypted remaining digits, a modulo 10 subtraction is performed to reconstruct the original remaining digits as follows.
  • the decryption solution requires access to the private key because the solution cannot be identified in isolation.
  • this process enables the reconstruction of one of the sequences, i.e., the original remaining digits, the random mask digits or the encrypted remaining digits, knowing the two other sequences.
  • FIG. 6 is a flow chart illustrating an exemplary process for electronically using credit card numbers.
  • the software can be launched either on its own or activated by an icon integrated into an Internet browser. (Step 602 ).
  • the software can provide a simple interface with a graphical appearance that exploits familiar images of credit cards and/or ATM's.
  • the software can be programmed using Java code or a Java core embedded in a c/c ++ application or equivalent programming language.
  • Step 604 the user puts in one password to gain access to the main screen of a computer, which contains a keypad to allow a PIN to be inputted either by keyboard or by mouse clicks.
  • the latter protects against any covert attempts to record passwords by trapping key strokes. A consecutive number of errors in inputting the password will permanently disable the program and overwrite remaining encrypted numbers.
  • the user can select a new limited use number with or without additional constraints (e.g. maximal transaction value).
  • Step 606 A new limited use number is then displayed on the graphical interface.
  • the software can provide secure access to encrypted credit card numbers that are stored on a computer's hard disk. (Step 608 ).
  • Step 610 The numbers must therefore be able to be inserted directly into a web page (step 612 ), or printed out/copied from screen for use in other ways.
  • Step 614 The limited use number can be copied, printed, pasted via the clipboard (or equivalent) or dragged-and-dropped onto a web page.
  • the length of time a number is displayed and how the program terminates are user configurable.
  • the user can also record a comment to provide further information about how a number was to be applied.
  • the software should ideally be able to intercept and respond to merchant server initiated signals activating integrated functions within the browser.
  • Step 616 Once a number has been accessed, it can be deleted from the encrypted lists.
  • Step 616 The date, number, current URL in the case of Web use and any user comments are then stored by a separate form of encryption to facilitate audit/review.
  • Step 618 The user can review, but not edit this information
  • Step 620 There should be a facility for downloading additional numbers either from additional floppies or via the Internet using high security protocols.
  • the latter function can be performed by a separate program.
  • the program should include a maximal degree of transparent security features, i.e., features that do not affect a normal user, but that protect against the program being reinstalled or copied onto a second machine.
  • This means that the encrypted limited use numbers should either be stored within the executable file or stored in a file that also stores encrypted copies of the machine specific information. (Step 622 ). This is required to ensure that the numbers can only be accessed on the machine on which the software was first installed.
  • the data files should also be stored as hidden system files.
  • Some users may wish to have the equivalent of an electronic wallet that can be de-installed from one computer and reinserted on another, for example, when transferring a “wallet” from an office to a home machine.
  • This transfer process ensures that only one version of the program is running at any one time and that no problems arise in terms of reconciling lists of used numbers.
  • Appropriate security mechanisms can be implemented to identify the valid user.
  • Encryption of limited use numbers should involve two levels as exemplified above. At the first level, the card numbers are encrypted using an algorithm that acts only to alter the free digits within the credit card. The header sequence (i.e., BIN number) is left unaltered or converted into an unused BIN number and the checksum recalculated. This prevents any form of brute decryption because there will be no way of telling when the correct algorithm has been selected since each number starts and ends up as a valid looking credit card number. Following this step each number is encrypted with industry standard encryption methods (e.g. RSA or DES). Following decryption within the program the checksum is recalculated for the final number and the appropriate bin number reinserted.
  • industry standard encryption methods e.g. RSA or DES
  • the software can be shipped on a single 1.4 Mb Floppy (or any other computer readable or usable medium) in an encrypted form or downloaded from a website.
  • Limited use numbers can be issued either with the program or independently.
  • An independently shipped password can be required for installation.
  • the installation process will allow the program to be installed a restricted number of times after which critical data is overwritten. The precise number of allowable installations will be easily alterable within the software design.
  • the program encrypts internal information regarding the machine's configuration to protect against copying of the program onto other machines. At first installation the user can select his own passwords. These will be used to control both access to the programs and to influence the pattern of one level of encryption that is applied to limited use numbers.
  • the software can also provide a log of previously accessed numbers, the date, associated URL if activated from within a browser and comment; a summary of account expenditure; assistance with adding additional numbers from disk or via Internet; the ability to configure additional passwords/users for shared cards; and/or hot link Internet access to the card number issuer's web site.
  • additional credit card numbers and/or additional credit cards would be processed by merchants in the same manner as existing credit card numbers and/or credit cards with the merchant obtaining validation of the credit card number from the credit card company or authorized third party. In much the same way as at present, the additional credit card number would be matched to the customer account and the account would be debited accordingly. The merchant reimbursement following verification of an additional credit card transaction would be performed in the normal manner.
  • a particular advantage for the merchant is that since they are never in possession of the master credit card number or indeed, in many instances, of the master credit card, they have no responsibility for security to the master credit card holder. It is envisaged that where there are additional credit cards used, it may not be preferable to take an imprint of the credit card manually, as the imprint can be taken electronically. Similarly, those processing the credit cards will process them in the same manner described heretofore.
  • Processing systems for handling limited use cards perform a number of functions including some or all of the following:
  • a limited use number Once a limited use number enters the clearing system it can be handled in a normal fashion, e.g., by ensuring that it has not been reported as being stolen and that it represents a valid account number within the database. If the transaction is within the credit limit of the customer and the transaction limit or restricted use limitations of the limited use number, it is authorized.
  • valid limited use numbers are stored in a database of valid account numbers along with other information specific to limited use numbers. This includes sufficient information to identify the customer to whom it was issued and any additional limitations placed upon the card in terms of transaction value or category of merchant for which the card can be used.
  • the limited use number is invalidated deactivated so as to ensure that further authorization/charges cannot be made on that number.
  • delayed settlement to the same merchant must be allowed.
  • the central card processing software invalidates the card. Due to the time delay that can occur between authorization and a merchant request for settlement, improved security is achieved by linking the invalidation process to authorization. Linking invalidation to settlement facilitates pre-authorizations at the cost of increased risk of, for example, multiple use of a card number intended for limited use. Pre-authorizations can be used with authorization dependent invalidation as described above. In the case where a transaction is not authorized before being accepted by a merchant, the invalidation process will occur when the transaction details are transmitted to the processor for settlement. When no authorization is obtained for a limited use number the system will therefore still operate normally with an increased level of risk for the issuer/merchant as is the case with an unauthorized conventional card transaction.
  • the next available single use number previously allocated to the same customer and issued to the customer is added to the database of valid account numbers.
  • the transaction details and customer account details are stored together for audit purposes and the value of the transaction is added to the customer's account for billing.
  • the software for storing transaction details and printing statements can be modified to allow for both the customer's conventional account details and the limited use number transaction details to be reported.
  • Processing of limited use numbers can be integrated into existing systems in a variety of ways.
  • the authorization and settlement process can be completed in a single cycle or split into a separate authorization and settlement processes as is commonly done in existing credit card systems.
  • FIG. 7 is a flow chart illustrating an exemplary process for processing a transaction.
  • a software system receives transaction details from a merchant.
  • the software system determines whether the number is a limited use number or a conventional card number. (Step 704 ). If the number is a conventional card number, it is passed on unchanged into the processing system and can be handled by existing systems with no modification. (Step 706 ).
  • the merchant receives authorization from the system responsible for authorizing conventional card numbers. Merchant reimbursement is similarly unaffected. (Step 708 ).
  • the system can check the limited use number and the corresponding limitations. (Step 710 ). If the number is not valid for the designated transaction, the transaction is denied. (Step 712 ). Otherwise, a database look-up procedure determines the associated master account number and transmits this number (i.e. the master account number) back into the processing system. (Step 714 ). This allows all existing fraud detection, authorization and demographic software procedures to be completed with no alteration. (Step 716 ). Once the master account number is substituted for the limited use number a number of additional steps are required. (Step 718 ). If the criteria for invalidating the limited use number have been met during this transaction, then the limited use number is invalidated for all future transactions except refunds.
  • An additional limited use number can be automatically issued if a continual supply of single use numbers is required.
  • the transaction details and master account number are then transmitted for inclusion within a database to allow for tracking of transaction details and billing of the user. These functions do not need to be performed before an authorization is issued but can completed afterwards. (Step 720 ). However, performing such steps together with the validity verification of the limited use number prior to issuing an authorization message to a merchant is a feasible option with a minor reduction on the processing time required to issue an authorization message.
  • the software responsible for substituting the master account number for the limited use number can also process additional features unique to limited use numbers. These features include transaction value limitations, merchant type restrictions and geographical limitations. If the transaction exceeds the limitations placed on the limited use card then authorization is denied and the master credit card need not be passed on for further processing. In the case of a transaction falling within the limitations of a limited use card, then the transaction details are passed on with the master account number for conventional validation. In this way the restrictions in place for the master account (e.g., available balance, expiry date) are checked for each limited use transaction.
  • restrictions in place for the master account e.g., available balance, expiry date
  • Specific fraud detection mechanisms can also be incorporated into the software. For example, on the first occasion that an invalidated limited use number is used this transaction can be flagged as potentially fraudulent and appropriate measures taken. Repeated attempts to authorize invalid numbers from a single merchant or group of merchants also potentially points to fraud and can lead to activation of appropriate fraud management measures.
  • the above system requires the least modification of existing systems but may take up to twice the processing time of a conventional transaction due to the double authorization process, once within the limited use verification and translation step and once within the standard systems. It may be advantageous to initially process the limited use card as a master credit card by using a single list of limited use numbers and master credit card numbers.
  • FIG. 8 is a flow chart illustrating another exemplary process for processing a transaction.
  • a software system receives transaction details from a merchant.
  • the software system has access to a database that contains additional information to identify the associated account or means of settlement and specific limitations relating to the use of limited use cards.
  • limited use numbers can be associated with existing accounts in the manner currently used to associate multiple conventional accounts in the case of multiple cards issued to a single company for corporate use.
  • Step 804 During an authorization the associated account number need not be identified provided each limited use account is updated whenever the status of the associated account changes (e.g. available balance, account validity etc.).
  • the system can deny authorization (step 806 ) or authorize a transaction (step 808 ) without identifying the associated account number.
  • Step 812 For settlement and billing purposes (step 812 ), the associated account needs to be identified (step 810 ), but this does not need to be done during the course of an authorization.
  • the existing software should be modified or linked to a new program that performs duties specific for limited use card numbers as described above. (Steps 814 , 816 , and 818 ). These functions do not need to be performed before an authorization is issued. These functions can be completed afterwards.
  • This system requires more modification of the existing processing software systems, but offers authorization times within the same timescale as existing transactions since only one authorization steps is involved. Other activities such as updating the limitations on the limited use card when the master account changes can be performed outside the authorization process (i.e., “off-line”).
  • the system may include some or all of the following features:
  • the invention is not limited to the embodiments hereinbefore described but may be varied in both construction and detail.
  • the invention has been heretofore described mainly in the context of a system in which a customer receiving a single use card already has a main account with the credit card provider. But this need not be so.
  • an ATM machine or similar apparatus
  • disposable credit cards could then be used for either card present or remote transactions.
  • the card would be simply reinserted into the ATM machine, and after a suitable period of time the purchaser's account would be credited with any money not spent.
  • the credit card could still be purchased from the ATM machine and then any refund could take place a sufficient time after the transaction would have been cleared, which refund could be either in the form of a cash refund to the purchaser or to a crediting of that purchaser account with another financial institution.
  • the use of an ATM machine is not essential, as the disposable credit cards or single use credit cards could be purchased in the normal way in which one purchases any other goods or services, such as either directly in a face-to-face transaction or by post.
  • one step is to determine whether or not a limited use credit/debit/charge card number is valid.
  • the card holder activate the card.
  • the card holder may be required to communicate with the credit card issuer to activate the card before it can be used.
  • the card holder can control the activation or validity of a credit card number, or equivalent transaction code, during the course a transaction.
  • the card holder has the control, security and confidence that payments can only be made with his or her express permission.
  • FIG. 9 is a flow chart illustrating an exemplary method of controlling the validity of a limited use credit card number.
  • the card holder has a credit card number, or equivalent transaction code, that is allocated to the card holder, but is not yet active.
  • the card holder can acknowledge delivery of the credit card number, but the number remains inactive within the card issuer's processing system, e.g., a bank's processing system.
  • Step 904 When the card holder wishes to conduct a transaction, he or she contacts the card issuer to activate the credit card number.
  • Step 906 is a flow chart illustrating an exemplary method of controlling the validity of a limited use credit card number.
  • the card holder has a credit card number, or equivalent transaction code, that is allocated to the card holder, but is not yet active.
  • Step 908 Activating the credit card number before every transaction is cumbersome, but in the context of a remote transaction for example, via the Internet or equivalent network, the communication between the card holder and the card issuer can be achieved very rapidly by an entirely automated system that will activate the card during the process of conducting a transaction with an Internet based merchant.
  • the credit card number is activated for a specific transaction only when specifically requested by the card holder. (Step 908 ).
  • the properties of this validation or activation process can vary.
  • the validation could be for a specific time period, for a specific merchant or group of merchants, for a specific type of transaction, or for a specific number of transactions (authorizations and/or presentments).
  • These properties can also be combined in any permutation.
  • a card holder could request that his or her credit card number be validated for one transaction with a specific merchant up to a specific value limit or value range (e.g., a specific value +/ ⁇ a configurable range).
  • a specific value limit or value range e.g., a specific value +/ ⁇ a configurable range.
  • the card holder would receive a software package from the card issuer along with a unique personal validity limited credit card number.
  • This software package would also facilitate completion of the merchants web page using ECML (electronic commerce modeling language) or some other equivalent electronic wallet system.
  • ECML electronic commerce modeling language
  • Merchants wishing to use this system provide a unique merchant identification number on their web site. For merchants who are not compliant with such systems, a simpler automated method, e.g., “drag and drop,” of transferring card number and other details is supported.
  • a card holder When a card holder wants to conduct a transaction, he or she activates the validity limited credit card software using a password or hardware based user identification system (e.g., magnetic stripe card reader, chip card reader, electronic token generator, fingerprint recognition system or the like) thereby identifying himself or herself with the card issuer.
  • the card holder requests his or her credit card number to be validated for the merchant as identified by the merchant identification number. After use the card number is automatically inactivated again.
  • the card holder may also specify additional limitations as discussed above, such as value limitations and maximum number of available transactions. Alternatively, these limitations could carry default limitations, for example single transactions up to a value of $100.00.
  • This request would be transmitted via the Internet to the card issuer's card computer processing system.
  • the processing system would validate the card holder's password (or hardware device), if appropriate, and forward the appropriate validity request to the card processing systems database.
  • the card issuer's server may also verify the merchant's identity by providing confirmation of the merchant's name as it will appear on the card holder's credit card statement. This merchant verification helps to avoid a common source of potential confusion for card holders in credit card transactions.
  • the merchant identification number can either be the actual credit card systems merchant-ID or another unique code. In either case, the credit card merchant-ID that will be transmitted to the processing system during the transaction is entered into the processing system's database. This ensures that only the intended merchant can initiate a transaction with the validated credit card number. In the event that a merchant identification code does not satisfy the card holder's expectations, the card holder has the option to cancel the transaction before any information is passed to the merchant's web site.
  • the card holder When application of the one or more limitations are confirmed, generally within a matter of seconds, the card holder is given verification of such and is allowed to transfer the credit card number and transaction details to the merchant's web site. Since the merchant identification number is used to validate a specific number of transactions for that merchant, there is no benefit of a rogue or fraudulent merchant trying to steal the identity of another valid merchant. The transaction can only be reimbursed to the merchant identified to the card holder by the card issuer's system.
  • the merchant processes this in an identical manner to an existing transaction in known systems.
  • the transaction is passed through to the card issuer's processing system via the merchant acquiring and credit card networks.
  • the transaction is handled by an authorization system that allows a card number to have associated validity restrictions or limitations, such as merchant-ID. If, in response to an authorization request, the authorization system indicates a valid card number, with an appropriate merchant-ID validation and sufficient funds, a normal authorization response is returned to the merchant.
  • the number is then deactivated by the use triggered processing software within the authorization system or the in case of a multiple outstanding transactions the properties of the card number are updated to remove the permission for the authorized transaction (e.g. decrement the cumulated value limit). If the authorization system identifies a problem with the request, for example, exceeding a limitation, the merchant is denied authorization. Transaction settlements and card holder billing proceed as described above.
  • each validation by the card holder may be cumulative so that all the requested transactions can proceed. For example, if the card holder requests two transactions, one of $50.00 and one of $100.00 dollars for a specific merchant, the credit card number will be validated for two transactions to that merchant with a cumulative limit of $150. This means that both transactions will be authorized.
  • the sequence of authorization requests from the merchant may differ from original sequence of validation requests from the card holder.
  • This system may be implemented using the Internet card software package, or RAD software package, as described herein.
  • the system provides a method for numbers and accounts to be set up and issued directly to the user.
  • the system also permits users to directly alter the properties of a credit card account within an issuer's authorization and settlement system.
  • the set-up (issuance) and use of a limited use credit card number can take place at the same time, i.e., in the same interaction or at separate times, i.e., setting up (issuing) a limited use credit card number at one time and configuring the limited use credit card number at a later time.
  • This system has a number of advantages over existing credit card systems. Card fraud is greatly reduced since a stolen number requires the card holder to validate the card number before any transaction can be completed. This protects against either interception of the number during a transaction or the number being accessed from a merchant's computer systems at a later date. In addition, if the number is authorized, the merchant is assured that the card issuer has directly validated that the card holder has requested the transaction. This prevents or limits a card holder's ability to repudiate the transaction. Moreover, the card holder has additional control on the purchasing power of his or her credit card. The card holder has the reassurance that payment can only be made to the merchant described by the card issuing bank/organization.
  • the list of limited use card numbers held by each party can used as a form of identification.
  • a sequence of such numbers could be used to identify either party without the need for issuing any additional security systems. Because this identification does not need to be handled by conventional transaction systems, all or part of a limited use number can be used for this purpose.
  • FIG. 10 is a flowchart illustrating an exemplary process for using a credit card number as a PIN number.
  • a card issuer generates a database of available credit card numbers.
  • the card issuer selects a master credit card number or more generically master account number (step 1004 ) and distributes the master account number to a master account number owner.
  • the card issuer then allocates additional credit card numbers to the master account number (step 1008 ), and distributes the additional credit numbers to the master account number owner.
  • Step 1010 When the master credit card number owner needs or desires to access account information (step 1012 ), the master account owner can use one of the additional credit card numbers as a PIN number. (Step 1014 ).
  • PIN identification (and as described by Rahman) the associated account is identified first and then the PIN verified after this step. For this reason many card holders can share the same PIN, indeed in most cases due to the short length of PIN codes many users do have identical PINs but different account numbers. For our system each limited use number must be unique at the time of use and so the associated account can be uniquely identified.
  • central processing system 100 can internally perform the approval and denial of credit card transactions or this function can be delegated to a separate clearance processing facility.
  • central processing system can be located within the card issuer's main processing system or at a stand-alone facility.
  • central processing system 100 adds additional functionality to existing credit/charge/debit card systems without any, or with minimal, alterations.
  • central processing system 100 transmits certain transaction details in a bi-directional manner, i.e., utilizing dual interfaces between central processing system 100 and the merchant and between central processing system 100 and the card issuer, without revealing the master credit card number to the merchant.
  • the dual interface transmissions allow merchants and card issuers to handle transaction details in the same manner as conventional credit card transactions.
  • Such conventional credit card transactions may be, for example, authorizations, settlements, copy requests, and charge-backs.
  • Remapping can be implemented by utilizing database look-up functions using existing industry-standard computer platforms.
  • remapping may occur by replacing the limited use card number with the master account number.
  • FIG. 11 is a block diagram illustrating a credit card system 1100 in which a central processing system 1106 in accordance with an embodiment of the present invention is located within a card issuing bank's main processing system 1114 .
  • the system 1100 includes merchant acquirers 1102 connected to card issuing bank's main processing system 1114 via a credit card network 1104 and a switch 1116 .
  • the credit card network 1104 may be any type of communication network, such as the Internet, a radio network, etc. as described above.
  • a switch 1116 includes hardware and software components. The switch 1116 may be configured to direct incoming transaction details on the basis of the card number and to direct outgoing transaction details on the basis of the merchant acquirer identification number (referred to herein as the “merchant ID”).
  • the issuing bank's main processing system 1114 includes an issuing bank processing facility 1112 and a central processing system 1106 .
  • the central processing system 1106 includes an acquirer interface 1108 and a STIP interface 1110 for example.
  • FIG. 12 is a flow chart illustrating an exemplary method of conducting a limited use credit card number transaction.
  • a user initiates a transaction by presenting a limited use credit/charge/debit card number, either in person or remotely as discussed above.
  • a merchant acquirer 1102 routes this limited use credit card number to the central processing system 1106 via the network 1104 and the switch 1116 .
  • Step 1204 This routing is done on the basis of a specific bank identification number (referred to herein as “BIN”) which is the first few digits of the limited use credit card number, as discussed above.
  • the central processing system 1106 acts as a stand-in processor.
  • the central processing system 1106 will transmit a signal to merchant acquirer 1102 denying authorization of the card number via switch 1116 and network 1104 .
  • Step 1208 If the limited use credit card number is valid, and if the limited use condition has not been satisfied, the central processing system 1106 transmits a signal to the issuing processing facility 1112 via the merchant acquirer interface 1108 and the switch 1116 .
  • Step 1210 This signal includes the original transaction details but the card number and the merchant ID are remapped. This remapping provides the master credit card BIN number so the signal will be routed to processing facility 1112 .
  • Step 1212 and 1214 The authorization, or denial of authorization, is the remapped within the central processing system 1106 to the original limited use credit card number and merchant ID.
  • Step 1216 The central processing system 1106 then transmits a signal to the merchant 1102 authorizing the limited use credit card number, or denying authorization as appropriate, along with the original transaction details via the switch 1116 and the network 1104 .
  • Step 1218 The central processing system 1106 then transmits a signal to the merchant 1102 authorizing the limited use credit card number, or denying authorization as appropriate, along with the original transaction details via the switch 1116 and the network 1104 .
  • FIG. 13 is a flow chart illustrating an exemplary method of conducting a settlement transaction.
  • the merchant 1102 transmits a signal to the central processing system 1106 via the network 1104 and the switch 1116 according to the BIN of the limited use card number.
  • the central processing system 1106 remaps the limited use credit card number with the master credit card or account number, the merchant ID with a central processing system ID and the merchant text description with a central processing text description (step 1304 ), and transmits this remapped information to issuer processing facility 1112 via switch 1116 .
  • the processing facility 1112 settles the transaction by payment, if appropriate, to the central processing system 1106 .
  • Step 1308 The processing facility 1112 settles the transaction by payment, if appropriate, to the central processing system 1106 .
  • the central processing system 1106 then remaps the master credit card or account number back to the original limited use credit card number, the central processing ID back to the merchant ID and the central processing text description back to the merchant text description, (step 1310 ) and transmits this information along with the payment, if appropriate, to the merchant acquirer 1102 via the switch 1116 and the network 1104 (step 1312 ).
  • this settlement cycle ensures that settlement is obtained against the master credit card; that the card holder's billing statement reflects the limited use transaction, with the central processing ID, and that the payment for settlement is conducted through the central processing system 1106 .
  • the copy request or charge back will be routed to the central processing system 1106 , as this is the ID associated with the transaction.
  • the central processing system 1106 will remap the copy request or charge back according to the merchant ID and the limited use credit card number and transmit the copy request or the charge back to the merchant 1102 via the switch 1116 and the network 1104 .
  • the merchant 1102 transmits the requested copy or the charge back confirmation to the central processing system 1106 via the network 1104 and the switch 1116 according to the BIN of the limited use card number.
  • the central processing system 1106 then remaps the ID and card number information and forwards the requested copy or charge back information to the processing facility 1112 via the switch 1116 .
  • FIG. 14 illustrates central processing system 1406 as a stand alone facility.
  • the authorization, settlement, copy request and charge back transactions described above are equally applicable to FIG. 14 , except switch 1116 in FIG. 11 is no longer required.
  • FIG. 14 illustrates that communication between central processing system 1406 and card issuing bank's processing facility 1412 can be conducted through existing credit networks 1404 .
  • a single large central processing system 1406 can offer limited use support to a wide range of issuers, such as bank processing facility 1412 .
  • this configuration requires increased communication times and potentially increased communication fees.
  • the central processing system could be constructed to be a part of the merchant acquirer, instead of the bank processing facility as shown in FIG. 11 .
  • This configuration would also require the addition of a switch like switch 1116 but would reduce communication delays and fees.
  • the limited use credit card number and remapping system may also be used in connection with organizations other than banks.
  • the limited use credit card number may be linked to organizations such as utilities, Internet service providers, telephone accounts, fixed or mobile, anonymous prepaid accounts and the like. With such other organizations, there would be no remapping to a master credit card number, but rather to some other account number provided by the organization.
  • Linking a limited use credit card number to other organizations is advantageous for several reasons.
  • the organization may have a pre-existing relationship with the user of the limited use credit card number. This relationship provides evidence of the user's credit history with the organization, so no additional credit checks need to be performed, which can be costly and time-consuming for the organization.
  • a card holder may desire to access a list of limited use credit/debit/charge card numbers where the limited use cards are not stored on the card holder's own computer.
  • the previous description for local storage indicates the situation of a client program with a significant amount of local functionality.
  • intermediary client server arrangements such as a “thin client” with minimal functionality obtaining limited use numbers from the server as required.
  • the combination of encryption and dynamic passwords, as described herein, or any suitable alternative form of use identification allows a card holder to have “multiple wallets”, i.e., a card holder can access limited use numbers from different devices, without the need to transmit credit card numbers.
  • RAD Remote Access Device
  • FIG. 15 The overall layout of the RAD system 1500 is shown in FIG. 15 and a flow chart illustrating an exemplary method of providing remote access devices for accessing limited use credit card numbers is shown in FIG. 16 .
  • FIG. 16 The operation of the complete system from registration to completion of a transaction follows.
  • RAD 1504 includes a software package to which enables communication with a remote access device support server, referred to herein as a RAD support server 1506 , such as the Nexus User Support Server ⁇ , to enable the issuance of limited use card numbers.
  • RAD support server 1506 When the user initiates communication with RAD support server 1506 , step 1610 , RAD support server 1506 first authenticates the user. (Step 1612 ). If successfully authenticated, the user can then request a limited use number (step 1614 ) specifying any additional transaction limitations desired as discussed herein. (Step 1616 ) RAD support server 1506 issues a request over a network to a central processing station 1508 for a limited use number with the one or more specified limitations. The limited use number provided in response to the request is associated with a specific RAD system user identification previously assigned to the user.
  • the central processing station 1508 obtains the next available limited use number. (Step 1618 ). Once obtained, the limited use number, and the specified limitations, is entered into database 1502 such that the limited use number is associated with the user's information already in database 1502 . (Step 1620 ). The limited use number is then transmitted to the RAD support server 1506 for issuance to the user via RAD 1504 . (Step 1622 ). RAD software package 1504 displays the limited use number. The user can transfer this limited use number to a web site for initiating a transaction. Transferring this number to a web site can be achieved by dragging and dropping the number onto the web page, by software-simulated key-stroke entry, by “one-click” methods, or by other suitable methods known to one skilled in the art.
  • a merchant 1510 When a merchant 1510 receives a transaction utilizing a limited use number from RAD system 1506 , the transaction details are handled in the same manner as an existing number since limited use card numbers share the same format as existing credit card numbers.
  • the transaction details are transferred to the merchant acquirer and then routed onto the appropriate issuer on the basis of the leading digits of the limited use number, i.e., BIN, via central processing station 1508 .
  • the BIN is registered with central processing station 1508 to ensure appropriate routing.
  • central processing station 1508 verifies the validity of the limited use number and ensures that the transaction meets all specified limitations. If the limited use number is valid and the transaction met the specific limitations, central processing station 1508 enters the master credit card number into the transaction message in place of the limited use number. Central processing station 1508 then transmits the transaction message to the issuer's processing facility 1512 as a normal authorization request. The issuer's processing facility 1512 transmits an authorization for the master card number, if appropriate, to central processing facility 1508 . Central processing facility remaps the master card number to the limited use number and the transaction message is transmitted to the originating merchant acquirer and then the merchant. Central processing station 1508 also updates the limitations and validity of the limited use number according to the details of the transaction.
  • the limitation and validity updating is best done following verification of available funds so that a limited use number with a cumulative value limit is only decremented in value if the transaction can be completed. If limitation and validity updating is done prior to checking for the availability/validity of the linked or principal account then certain updates will need to be reversed in the case of a decline on the linked or principal account. This has a small computational overhead. If the authorization was approved by the issuer's processing facility 1512 , the user's purchase can proceed as normal. If declined, a decline message is sent to the merchant.
  • the RAD system 1500 may be configured to provide the user with many features.
  • the RAD system 1500 enables the user to have multiple and different remote devices from which the user may access RAD support server 1506 .
  • it enables a user to have multiple credit card accounts with one or more issuers and to select from amount these multiple accounts.
  • the RAD software package 1504 enables users to have additional passwords associated with an account if desired.
  • the additional passwords can be used, for example, for children and can have additional pre-defined limitations such as a low dollar transaction limits, e.g., $50.00, or merchant class restrictions, e.g., gas stations.
  • the RAD software package 1504 includes a simple intuitive interface for the ease of the user, the appearance of which may be customizable without modification to the underlying code.
  • the RAD 1504 may use images that relate to the front and back of a credit card to provide key areas of functionality.
  • the back of the RAD 1504 includes an interactive panel with a magnetic stripe for providing additional information and/or advertising panels.
  • the interactive panel/stripe area provides for password entry and functional selections.
  • the front of RAD 1504 may be configured to provide additional functions, e.g., those required to initiate an on-line purchase. As discussed herein, supplying information required for on-line purchases can be automated in a number of ways including “clicking and transferring” the information, “dragging and dropping” the information, or “one click shopping.”
  • the RAD software package 1504 is configured to issue a sequence of paired numbers which are securely issued and activated and/or decrypted by oral or written authorization, such as the communication of a password. These paired numbers include an identifier code and a mask code.
  • a user at a remote device identifies himself or herself using his or her a RAD software 1504 by transmitting the identifier code, such as a dynamic password to RAD support server 1506 .
  • the RAD support server 1506 compares the identifier code with the particular RAD software package 1504 and accepts, or validates, the identifier code if appropriate.
  • RAD support server 1506 determines the matching mask code for that identifier code from database 1502 .
  • the RAD support server 1506 uses the mask code to encrypt the limited use card number as described above, and transmits this encrypted code to the user.
  • the RAD software 1504 decrypts the encrypted code using the known mask code and reconstructs the initial digits, the BIN number and the checksum digit. The RAD software 1504 then arranges this information and reconstructs the limited use card number.
  • the RAD support server 1506 is an Internet based server that interfaces the RAD 1504 and the central processing station 1508 .
  • the RAD support server 1506 receives requests for limited use numbers from users, validates each user, if appropriate, and supplies and validates limited use card numbers with specific limitations, as requested by each user, if appropriate. Such requests may be processed in any desired order, e.g., first come first served basis.
  • the RAD support server 1506 may also be configured to provide for location identification verification, secure delivery of limited use numbers, automated completion of payment fields in a merchant's web page order form, review of previous transactions, access to additional issuer services and advertising.
  • the RAD location identification verification is verifying the physical source of the request for a limited use number, e.g., home, office, ATM machine.
  • the RAD support server 1508 can be configured to require additional identification of the user if the RAD is being used from a physical source which is unknown to the RAD support server or which has not been previously associated with the RAD by the user.
  • the RAD support server 1506 should have a high bandwidth Internet connection and highly secure firewalls to insulate critical information from undesired access. Communications between the RAD support server 1506 and the RAD 1504 is may be Internet based. Communication between the RAD support server 1506 and the central processing station 1508 and the database 1502 may be secured via private networks for additional security. In addition, to provide for additional security, the RAD support server 1506 , the central processing station 1508 and database 1502 may be located at the same physical location, for example, the issuer's processing facility or some other facility which meets the standards set for banking processing facilities.
  • Communication between the RAD 1504 and the RAD support server 1506 can use industry standard security protocols appropriate to the platform.
  • SSL secure socket layer
  • Such communication security can be selectable by the issuer. For example, issuers can select what type of communication security they desire from a range of options.
  • controlled payment numbers describes products which embody the invention described herein.
  • a software and hardware platform embodying the invention can be used to generate a range of payment products that span the virtual, wireless and real worlds it is necessary to consider the components of the complete platform and how these can be used in various combinations.
  • remarkably distinct payment products can be derived using the existing platforms such as the RAD system 1500 of FIG. 15 in a range of configurations. Addition of standard additional components and interfaces further broadens the potential scope.
  • the RAD system platform 1500 has been designed from the outset to support such applications. This provides a rapid development path for new payment products since development requirements are limited primarily to designing new client side components for configuring and controlling CPN payments.
  • the platform may be implemented with part as a personal computer connected to the Internet to provide communication with the card issuer.
  • the customer can set a range of limitations as determined by the issuer and the card number is issued in virtual form to the users computer (usually) for immediate use.
  • these applications can be implemented by varying: (1) the patterns of how the controls on specific numbers are combined, (2) the controls available to user(s), (3) who sets the controls and when, (4) how the controls are communicated to the processing system, (5) the communication device(s) or channels used to deliver an issued CPN to the user, (6) the form in which the CPN is issued (virtual via software, voice generated, text message, paper receipt, paper credit card card, plastic credit card), and (7) the form in which the CPN is presented to the merchant.
  • the core transaction processing system for authorization and settlement is not altered to any significant degree by any of these implementation variations.
  • most of the core back end systems for number generation, account generation, linkage to other accounts, customer service and maintenance remain unaltered.
  • the architecture for issuing numbers to users supports a range of interfaces so the same architecture can support computer based, phone, interactive TV or internal bank issuing for physical implementations.
  • the high degree of re-usability of core platform components is a key advantage in supporting the commercial viability of these other products.
  • new payment products can be created by placing “intelligence” within the card processing system.
  • a critical additional step is the creation of new communication channels between these processing systems and a card issuer/card holder.
  • These communication channels which can include PC computer interfaces, PDA interfaces, mobile phone/telephony interfaces, ATM interfaces.
  • these additional dynamic control features provide a mechanism for a traditional plastic payment card to be turned into a range of new products.
  • the present invention creates “instantly configurable plastic payment cards”. This capability can be combined with conventional credit cards, debit cards and pre-paid cards.
  • this card has a pre-set limit transaction amount and/or must be spent at a particular merchant or merchants (or merchant type or types).
  • a parent can receive feedback on card usage and change the spending power by computer interface or mobile phone at any time. This greatly enhances the control provided by existing pre-paid teen cards.
  • a limited use card could be issued with a product that has no value but can be activated by registering the product on-line for instance. The card is then loaded with the product rebate and can be used to purchase something on-line or at a retail store limited to the amount of the rebate. This will greatly reduce costs to administer a rebate program associated with e.g., issuing and mailing a check.
  • a limited use card could be issued with an insurance policy or by a loss-adjuster at a visit following a claim.
  • the company or the loss adjuster could provide instant card activation by computer or mobile phone to allow the consumer to spend an amount appropriate to immediate needs.
  • This limited use card can be given to employees for specific trips.
  • the expense budget and types of expense can be set by the employer at the start of the trip and the account deactivated until the next trip.
  • This limited use card can be given to employees company purchases and pre-configured for specific rules (e.g., maximum single purchase amount and monthly expenditure). To extent these rules apply the employee can make a request via a PC or mobile phone to the company purchasing system. If approved, the company system can automatically extend the purchasing capability of the specific card and the employee receives a confirmation and purchase order number.
  • specific rules e.g., maximum single purchase amount and monthly expenditure.
  • CPN's at any VISA/Mastercard/Europay accepting merchant is a key advantage of CPN technology.
  • many existing MOTO users may not have access to the Internet at the time of placing a MOTO order or indeed have Internet access at all. Without a credit card, telephone orders can be almost impossible. All the manifestations described below could also be provided linked to a bank account or pre-paid account.
  • Mobile telephony interfaces can allow both WAP (Web Access Protocol) and i-mode interaction with servers providing the CPN capabilities. This provides for authentication by password or PIN and delivery of a CPN via a simple interface for display on the screen. CPN's can also be issued by SMS (Silicon Integrated Systems), which has the additional benefit of providing automatic storage of the number for later use. Review of statements is also possible via this interface.
  • SMS Silicon Integrated Systems
  • the core functionality for MOTO orders are very similar to Internet orders and so no major differences are required in terms of additional functionality, though the functionality is best limited in line with the small screens of current mobile telephones. This application would also be well suited to web-kiosk applications where users may not want to enter authentication credentials into public systems. There is currently increasing interest in “in-store” kiosks to provide additional product lines. This implementation of the web-kiosk is designed specifically for making purchases and the mobile CPN will ideally suit such a combined “clicks and mortar” transaction.
  • the mobile CPN provides a suitable platform for MOTO or Internet payments.
  • the mobile phone is used as a private and personal means of authenticating the user and delivering the number to the user.
  • the CPN platform architecture provides for seamless integration of a wide range of web-access devices into a standard Orbiscom implementation.
  • the CPN platform can be used with interactive TV, which provides for integration of the purchasing process with “TV browsing”.
  • Issuing a MOTO/Web only card with no embossed figures can be implemented within the CPN platform with the export of CPN's to a card production process.
  • Controls can be set-up by an issuer or via a telephone or computer interface as with other limited use credit card number products. These interfaces could provide for additional functions such as on-line statements.
  • a system of distributing numbers without cards could be incorporated in the paper billing distribution system. This could involve printing an additional number(s) on a statement or other paper document as explained above.
  • Customers could also be sent a new MOTO only number in the form of a sticker that could be attached to an existing card, on expiry the number is simply removed.
  • An alternative MOTO number could also be printed on the back of an existing credit card when a new card is issued.
  • the ATM network provides an existing integrated network that provides:
  • This provides a means for providing CPN numbers or cards for a range of card-not present applications. This route is particularly suitable for people who do not possess a credit card but wish to purchase goods over the Internet, telephone or mail order.
  • the above physical manifestations of the Orbiscom platform for MOTO use a fixed number with variable controls. It is also possible to issue a series of numbers on a single card or device that users use one at a time. A mechanism is required to ensure that user can simply keep track of numbers that have been used. A range of options are possible for including peel of labels where after use a CPN label is removed revealing an additional number underneath. Alternatively scratch off cards like lottery cards could be used to ensure that a number is only revealed when a user wishes to use the card.
  • CPN payments can be presented by developments in wireless and telephony applications most notably Bluetooth and other emerging short range wireless technologies (e.g., Ultra Wide Band) and the advances in mobile phone capabilities.
  • a Bluetooth enabled WAP phone of instance, would be used to retrieve a CPN. The following steps would take place:
  • Card Present transactions are characterized by visual signature authentication, in which the signature on the credit card is compared to the signature on the sales voucher.
  • a different kind of authentication is required by wireless Card Present transactions.
  • the unique SIM card in every mobile phone can be used as an identification card, and technologies such as fingerprint identification and voice recognition will insure that a stolen phone cannot be used by anyone other than the owner.
  • Mobile POS terminals will allow credit card payments on public transport, in taxis, and at open air markets, as well as allowing. It will also be possible to pay by credit card for services such as pizza and grocery delivery, and appliance repair in the home. Card present CPN applications will allow payment in all of these situations.
  • Smart cards are an ideal method of authenticating users with a card issuer during issuing of CPN numbers in a virtual environment.
  • the transaction specific nature of CPN payments enables linkage of a smart card authentication step to a specific payment without requiring merchants or acquirers to implement authentication technology.
  • CPN numbers in smart cards for card present use.
  • Ericsson's prototype Wireless Wallet is a real wallet that contains a smart card reader and a WAP server, and allows the user to browse the cards in the wallet from a WAP phone.
  • CPNs could be stored on a smart card for use when needed. You could simply browse the cards in the wallet, and select the CPN to be sent to the POS terminal, all without taking the wallet from your pocket.
  • Third generation mobile phones and hand-held devices will be capable of requesting and storing CPN's, of displaying internet content much richer than the current WAP phones, and of running feature rich applications such as the CPN system in accordance with the present invention.
  • the march of technology will continue to create new opportunities for card payments, and CPN technology will be there to provide the security needed.

Landscapes

  • Business, Economics & Management (AREA)
  • Engineering & Computer Science (AREA)
  • Accounting & Taxation (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Strategic Management (AREA)
  • General Business, Economics & Management (AREA)
  • Finance (AREA)
  • Economics (AREA)
  • Development Economics (AREA)
  • Microelectronics & Electronic Packaging (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Computer Security & Cryptography (AREA)
  • Technology Law (AREA)
  • Marketing (AREA)
  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
  • Control Of Vending Devices And Auxiliary Devices For Vending Devices (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)
  • Two-Way Televisions, Distribution Of Moving Picture Or The Like (AREA)

Abstract

A credit card system is provided which has the added feature of providing additional limited use credit card numbers and/or cards. These numbers and/or cards can be used for a single or limited use transaction, thereby reducing the potential for fraudulent reuse of these numbers and/or cards. The credit card system finds application to “card remote” transactions such as by phone or Internet. Additionally, when a single use or limited use credit card is used for “card present” transactions, so called “skimming” fraud is eliminated. Various other features enhance the credit card system, which will allow secure trade without the use of elaborate encryption techniques. Methods for limiting, distributing and using a limited use card number, controlling the validity of a limited use credit card number, conducting a limited use credit card number transaction and providing remote access devices for accessing a limited use credit card number are also provided.

Description

  • This application is a continuation of U.S. Non-Provisional application Ser. No. 12/268,063 filed Nov. 10, 2008, which is a continuation of U.S. Non-Provisional application Ser. No. 10/160,178 filed Jun. 4, 2002, which is a continuation-in-part of U.S. Non-Provisional application Ser. No. 09/506,830 filed Feb. 18, 2000, which in turn is a continuation-in-part of U.S. Non-Provisional application Ser. No. 09/235,836 filed Jan. 22, 1999. This application claims the benefit of U.S. Provisional Application No. 60/295,020 filed Jun. 4, 2001; U.S. Provisional Application No. 60/120,747 filed Feb. 18, 1999; U.S. Provisional Application No. 60/134,027 filed May 13, 1999; U.S. Provisional Application No. 60/144,875 filed Jul. 20, 1999; U.S. Provisional Application No. 60/147,153 filed Aug. 4, 1999; U.S. Provisional Application No. 60/099,614 filed Sep. 9, 1998; U.S. Provisional Application No. 60/098,175 filed Aug. 26, 1998; U.S. Provisional Application No. 60/092,500 filed Jul. 13, 1998; Irish Application No. S98 0458 filed Jun. 15, 1998; Irish Application No. S98 0346 filed May 5, 1998; Irish Application No. S98 0223 filed Mar. 25, 1998. The entire contents of each of these applications are incorporated herein by reference.
  • BACKGROUND
  • 1. Field of the Invention
  • This invention relates to a credit card system and method, and more particularly, to a credit card system and method offering reduced potential of credit card number misuse.
  • 2. Related Art
  • The development of retail electronic commerce has been relatively slow in spite of the perceived demand for such trade. The single greatest deterrent to the expansion of retail electronic commerce is perceived to be the potential for fraud. This potential for fraud has been a major concern for the credit card companies and financial institutions as well as the customers and the providers of the goods and services.
  • The former are concerned about fraud because essentially the financial institutions have to bear the initial cost of the fraud. Additionally, the credit card companies have an efficient credit card system which is working well for face to face transactions, i.e., “card present” transactions where the credit card is physically presented to a trader and the trader can obtain the credit card number, compare signatures and in many cases photographs before accepting a particular credit card.
  • The latter are equally concerned about fraud being well aware that ultimately the user must pay for the fraud. However, there are particular personal concerns for the consumer in that the fraudulent use of the credit card by misuse of the credit card number by a third party may not become apparent for some time. This can happen even if the card is still in his or her possession. Further, when fraud does occur the consumer has the task of persuading the credit card provider that fraud by another did indeed occur.
  • There is also the additional fear of being overcharged on a credit card. There are thus particular risks for those credit card holders who have relatively high spending limits, in that if fraud should occur, it may be some considerable time before it is detected. One particular form of fraud referred to as “skimming” is particularly difficult to control. What happens is the card holder proffers his or her card at an establishment to make a transaction, the relevant information is electronically and/or physically copied from the card and the card is subsequently reproduced. This can be a problem with travelers particularly during an extensive period of travel as the fraudulent card may turn up in other places and it may be some considerable time before the fraud is detected.
  • For remote credit card use, the credit card holder has to provide details of name, master credit card number, expiration date and address and often many other pieces of information for verification; the storing and updating of the information is expensive but necessary. This of itself is a considerable security risk as anybody will appreciate that this information could be used to fraudulently charge goods and services to the card holder's credit card account. Such fraudulent use is not limited to those people to whom the credit card information has been given legitimately, but extends to anybody who can illegitimately obtain such details. A major problem in relation to this form of fraud is that the credit card may still be in the possession of the legitimate holder as these fraudulent transactions are taking place. This is often referred to as “compromised numbers” fraud. Indeed all this fraud needs is one dishonest staff member, for example in a shop, hotel or restaurant, to record the credit card number. It is thus not the same as card theft.
  • The current approaches to the limiting of credit card fraud are dependent on the theft of a card being reported and elaborate verification systems whereby altered patterns of use initiate some inquiry from the credit card company. Many users of credit cards have no doubt received telephone calls, when their use of the card has been exceptional, or otherwise unusual in the eyes of the organization providing the verification services.
  • Thus, there have been many developments in an effort to overcome this fundamental problem of fraud, both in the general area of fraud for ordinary use of credit cards and for the particular problems associated with such remote use.
  • One of the developments is the provision of smart cards which are credit card devices containing embedded electronic circuitry that can either store information or perform computations. Generally speaking they contribute to credit card security systems by using some encryption system. A typical example of such a smart card is disclosed in U.S. Pat. No. 5,317,636 (Vizcaino).
  • Another one of the developments is the Secure Electronic Transaction (SET) protocol which represents the collaboration between many leading computer companies and the credit card industry which is particularly related to electronic transmission of credit card details and in particular via the Internet. It provides a detailed protocol for encryption of credit card details and verification of participants in an electronic transaction.
  • Another method that is particularly directed to the Internet is described in U.S. Pat. No. 5,715,314 (Payne et al.). U.S. Pat. No. 5,715,314 discloses using an access message that comprises a product identifier and an access message authenticator based on a cryptographic key. A buyer computer sends a payment message that identifies a particular product to a payment computer. The payment computer is programmed to receive the payment message, to create the access message, and to send the access message to a merchant computer. Because the access message is tied to a particular product and a particular merchant computer, the access message can not be generated until the user sends the payment message to the payment computer. Because the access message is different from existing credit card formats, the access message is ill-suited for phone/mail orders and other traditional credit card transactions.
  • U.S. Pat. No. 5,883,810 (Franklin et al.) describes an online transaction system in which a user of the Internet or the like clicks on an icon to receive a proxy transaction number from a credit card provider. This proxy number stands in for the user's regular credit card number during transmission over the Internet, but expires after a short time (e.g., one hour) to reduce the chance that the number will be effectively intercepted and fraudulently used. The processing that occurs when a bank receives transaction information from a merchant involves checking whether the proxy number is a valid number and whether the transaction value and merchant match. There is no additional processing triggered when the bank processing system receives the proxy number. In addition, a significant drawback of the Franklin et al. system is that an unscrupulous merchant or a criminal who is capable of accessing or intercepting order details can then turn around and use the proxy number a number of times before the lapse of the expiration term. Thus, more than one transaction can occur within the duration of the expiration term. The Franklin et al. system has nothing in place to prevent this type of fraud. The Franklin et al. system merely depends upon an assumption that fewer criminals could obtain the proxy number and reuse it within the expiration term of the proxy transaction number set by the issuing bank than the total number of criminals capable of gaining access to credit card numbers used for online commerce. Also, the inclusion of specific transaction information does not prevent a fraudulent merchant from recurrent unauthorized charges within the expiry time of the proxy number. The user will not be aware of this misuse of his/her credit card details until the receipt of the statement, which will typically not be until several weeks later.
  • There are also specific electronic transaction systems such as “Cyber Cash,” “Check Free” and “First Virtual.” Unfortunately, there are perceived problems with what has been proposed to date. First, any form of reliance on encryption is a challenge to those who will then try to break it. The manner in which access has been gained to extremely sensitive information in government premises would make anyone wary of any reliance on an encryption system. Second, a further problem is that some of the most secure forms of encryption system are not widely available due to government and other security requirements. Limiting the electronic trading systems and security systems for use to the Internet is of relatively little use. In addition, entirely new electronic payment systems require changes in how merchants handle transactions and this represents an important commercial disadvantage for such systems.
  • Additionally, various approaches have been taken to make “card present” transactions more attractive. For instance, Japanese Patent Publication No. Hei 6-282556 discloses a one-time credit card settlement system for use by, e.g., teenage children of credit card holders. This system employs a credit card which can be used only once in which various information such as specific personal information, use conditions, and an approved credit limit identical to those of the original credit card are recorded on a data recording element and displayed on the face of the card. The one-time credit card contains the same member number, expiration date, card company code, and the like as on existing credit card, as well as one-time credit card expiration date not exceeding the expiration date of credit card, available credit limit for the card, and the like. The one-time credit card makes use of some of the same settlement means as the conventional credit card. However, the system also requires use permission information to be recorded on the credit card, the information permitting the credit card to be used only once or making it impossible to use the credit card when the credit limit has been exceeded. A special card terminal device checks the information taken from the card for correctness and imparts use permission information for when the card is not permitted to be used on the transmission to the credit card issuing company. The use permission information takes the form of a punched hole on the card itself. This system has obvious drawbacks, such as the card terminal having to be modified for additional functions (e.g., punching holes, detected punched holes, imparting additional information, etc.). Also, such a system offers little additional security insofar as fraud can still be practiced perhaps by covering the holes or otherwise replacing the permission use information on the credit card. Further, such a system would require a change in nearly all card terminal equipment if it were adopted.
  • U.S. Pat. Nos. 5,627,355 and 5,478,994 (Rahman et al.) disclose another type of system that uses a plurality of pin numbers which are added to a credit card number on an electronic display. U.S. Pat. No. 5,627,355 discloses a credit card having a memory element containing a series of passwords in a predetermined sequence. These passwords are identical to another sequence stored in a memory of a host control computer. Further, the card contains a first fixed field containing an account number (e.g., “444 222 333”). In operation, the memory element of the credit card device provides a unique password from the sequence with each use of the credit card device. This permits verification by comparing the account number and the password provided with each use of the device with the account number and the next number in sequence as indicated by the host computer. The host computer deactivates the password after the transaction. Among the drawbacks with this type of system is the need for a power supply, a display, a memory device, a sound generator and the need to recycle a limited sequence of pin numbers. Such a system is not readily adapted to current credit card transactions because it lacks the ability of providing a check sum of the card number and cannot be read by a standard card reader. Also, if the card is lost or stolen, there is little to prevent a person from using the card until it is reported to be lost or stolen by the correct holder. See, also, U.S. Pat. No. 5,606,614 (Brady et al.).
  • Other attempts have been made to make funds available to an individual, but with limitations. For example, U.S. Pat. Nos. 5,350,906 (Brody et al.) and 5,326,960 (Tannenbaum et al.) disclose issuing temporary PINs for one time or limited time and limited credit access to an account at an ATM. These patents disclose a currency transfer system and method for an ATM network. In this system, a main account holder (i.e., the sponsor) sets up a subaccount that can be accessed by a non-subscriber by presenting a fixed limit card associated with the subaccount and by entering a password corresponding to the subaccount. Once the fixed limit is reached, the card can no longer be used. The fixed limit card contains information on its magnetic stripe pertaining to the sponsor account.
  • One of the problems with all these systems is that there are many competing technologies and therefore there is a multiplicity of incompatible formats, which will be a deterrent to both traders and consumers. Similarly, many of these systems require modifications of the technology used at the point of sale, which will require considerable investment and further limit the uptake of the systems.
  • OBJECTS AND SUMMARY OF THE INVENTION
  • Many solutions have been proposed to the problem of security of credit card transactions. However, none of them allow the use of existing credit cards and existing credit card formats and terminal equipment in the exiting credit card system, which includes provisions for charge-backs, etc. Ideally, as realized by the present inventors, the solution would be to obtain the functionality of a credit card, while never in fact revealing the master credit card number. Unfortunately, the only way to ensure that master credit card numbers cannot be used fraudulently is to never transmit the master credit card number by any direct route, i.e., phone, mail, Internet or even to print out the master credit card number during the transaction, such as is commonly the case at present.
  • According to exemplary embodiments of the invention as described in U.S. non-provisional application Ser. Nos. 09/235,836 and 09/506,830, a more secure way of using existing credit cards and, in particular, using existing credit cards in remote credit card transactions was provided. These earlier applications were specifically directed towards providing a more secure way of using existing credit cards generally which will not require any major modifications to existing credit card systems. It is further directed towards providing a credit card system that will be user friendly and will provide customers with a greater confidence in the security of the system.
  • The present invention includes a number of credit card products, which have predefined characteristics.
  • These and other advantages of the present invention are satisfied by a first exemplary embodiment, which pertains to a financial transaction system capable of using at least one limited use credit card number, which is limited in use by a party other than a limited use credit card number issuer and which is associated the master account number of a customer. The inventive method of controlling the validity of the limited use credit card number comprising the steps of: sending to a user from a limited use credit card number issuer a limited use credit card number; communicating with a limited use card number card issuer to establish limitations on the use of the limited use credit card number by a third party before it can be used in a transaction by said user; and authorizing transactions which meet said established limitations and denying other transactions by comparing at a central location the attempted use to the established limitations on use.
  • BRIEF DESCRIPTION OF THE DRAWINGS
  • The foregoing, and other, objects, features and advantages of the present invention will be more readily understood upon reading the following detailed description in conjunction with the drawings in which:
  • FIG. 1 shows an exemplary system for implementing the present invention;
  • FIG. 2 shows, in high-level form, the operation of the central processing station shown in FIG. 1;
  • FIG. 3 is a flow chart illustrating an exemplary process for allocating credit card numbers;
  • FIG. 4 is a flow chart illustrating an exemplary process for limiting the use of a credit card number;
  • FIG. 5 is a flow chart illustrating an exemplary process for distributing credit card numbers;
  • FIG. 6 is a flow chart illustrating an exemplary process for electronically using credit card numbers;
  • FIG. 7 is a flow chart illustrating an exemplary process for processing a transaction;
  • FIG. 8 is a flow chart illustrating another exemplary process for processing a transaction;
  • FIG. 9 is a flow chart illustrating an exemplary method of controlling the validity of a limited use credit card number;
  • FIG. 10 is a flow chart illustrating an exemplary process for using a credit card number as a PIN number;
  • FIG. 11 is a block diagram illustrating an exemplary location for the central processing system;
  • FIG. 12 is a flow chart illustrating an exemplary method of conducting a limited use credit card number transaction;
  • FIG. 13 is a flow chart illustrating an exemplary method of conducting a settlement transaction;
  • FIG. 14 is a block diagram illustrating an alternate exemplary location for the central processing system;
  • FIG. 15 is a block diagram illustrating an alternate exemplary process for limiting, distributing and using a limited use card number;
  • FIG. 16 is a flow chart illustrating an exemplary method of providing remote access devices for accessing limited use credit card numbers; and
  • FIG. 17 is a diagram illustrating how the present invention can place limitations on an configurable plastic payment card to facilitate card-present applications.
  • DETAILED DESCRIPTION
  • In this specification the term “credit card” refers to credit cards (MasterCard®, Visa®, Diners Club®, etc.) as well as charge cards (e.g., American Express□, some department store cards), debit cards such as usable at ATMs and many other locations or that are associated with a particular account, and hybrids thereof (e.g., extended payment American Express®, bank debit cards with the Visa® logo, etc.) or any other present or future financial transaction card having similar characteristics. Also, the terms “master credit card number” and “master credit card” refer to the credit card number and the credit card as generally understood, namely, that which is allocated by the credit card provider to the customer for his or her account for multiple uses for a renewable period and a credit limit. It will be appreciated that an account may have many master credit cards in the sense of this specification. For example, a corporation may provide many of its employees with credit cards but essentially each of these employees holds a master credit card even if there is only one customer account. Each of these master credit cards will have a unique master credit card number, which set of master credit card numbers will be linked to the account. Similarly, in families, various members of the family may hold a master credit card, all of which are paid for out of the one customer account.
  • Additionally, the “master credit card” account can be in some embodiments something other than a credit card account. For instance, while not otherwise affecting the formatting or processing of the limited use credit card numbers as described herein, the master card number can be a prepaid account or another type of account, such as a utility, telephone service provider or Internet Service Provider (ISP) account. The utility company, telephone company, ISP or other account holder would generate a bill, which, in possible addition to or separate from to the regular bill, would include a listing of limited use credit card transactions. An advantage of this type of arrangement is that the service provider already has information as to a pool of individual and their credit worthiness, as well as low increased overhead due to the already in place billing system. In these embodiments, the “master account” may but likely does not have the format of a standard credit card or the like.
  • The term “limited-use” credit card number is used to encompass at least both the embodiment in which the credit card is designated for a single use, and the embodiment in which the credit card is designated for multiple uses providing that the charges accrued do not exceed a prescribed threshold or thresholds, such a total single charge, total charges over a limited time period, total charge in a single transaction, etc. A common feature is that the limited use credit card number is deactivated upon satisfaction of a limited-use condition, and not just the expiration date of the card. Stated differently, the a limited-use credit card number is deactivated upon a use-triggered condition which occurs subsequent to assignment of said at least one credit card number.
  • The term “deactivated” means that new transactions cannot be initiated using the same limited-use credit card number, but the limited-use credit card number is still available for further activity related to the original transaction, such as for charge-backs where an account is credited, such as upon return of unaccepted merchandise.
  • The terms “card holder” and “user” are used interchangeably to refer to an entity, e.g., an individual, that has been rightfully issued a credit/debit/charge card number, e.g., through a contractual arrangement, or that has been authorized to use such card by such entity or a representative of such entity.
  • 1. Overview of System Features
  • There are at least two basic different ways of carrying out the present invention. In summary, the two ways are the allocation of additional credit card numbers for remote trade and the provision of what are effectively disposable credit cards for remote and card present trade, both of which have the feature of in the case of single use or in the case of multiple use, protecting against the worst effects of compromised numbers fraud or skimming.
  • In a refinement of the invention, it is possible to control the manner in which an actual transaction is carried out as a further protection against unscrupulous providers of goods and services.
  • Essentially, there are certain matters that will be considered in relation to this invention. They are the operational or functional features in so far as they affect customers, and then there are the technical features, namely how the invention is implemented, how the invention is provided to the customers, and finally, how the invention is handled by the providers of goods and services and the processors of the credit cards, i.e., the financial institutions and/or their service providers.
  • The operational or functional features of this invention will be discussed first in the context of a standard credit card system.
  • One basic feature of the invention is to provide in a credit card system such that each master credit card holder could be provided with one or more of the following: 1) additional single use credit card numbers for remote transactions; 2) multiple use credit card numbers for remote transactions; 3) single use additional credit cards for remote and card present transactions; and 4) multiple use credit cards for remote and card present transactions.
  • It is also envisaged that in certain situations credit cards can be provided to people who do not have an account with any credit card company. This latter feature is described in more detail below. Various other features may be provided in the above situations, which will further improve the security of credit card transactions.
  • Dealing first with the situation where a master credit card holder has an additional credit card number allocated to him or her for a single use, it will be appreciated that since the number can only be used for one single transaction, the fact that the number is in anybody else's hands is irrelevant as it has been deactivated and the master credit card number is not revealed to the third party. Various other features may be added to such single use credit card numbers, for example, the value of the transaction can be limited, thus the master credit card holder can have a plurality of single use credit card numbers of differing values. For example, when a remote trade is carried out, the master credit card holder will use a credit card number which has a credit card limit only marginally above or equal to that of the value of the transaction. This would reduce the chances of or prevent an unscrupulous trader using the credit card number to supply additional goods or services over those ordered or to increase the agreed charge.
  • A second embodiment of the invention provides the master credit card holder with an additional credit card number for use in remote trade, which credit card number could have, as in the previous example of the invention, a credit limit for each specific transaction or a credit limit such that when the aggregate amount of a series of transactions exceeded a specific credit limit that the credit card number would be canceled, invalidated or in some other way deactivated. Similarly, the multiple use credit card number could be limited to, for example, five uses with a credit limit not exceeding $100 in each transaction and an aggregate credit limit not exceeding $400. Similarly, a time restriction could be put on such a credit card number in that it would be deactivated if it was used with frequency above (or below) a given threshold, for example, more than once a week. These limits and restrictions on the use of a limited-use credit card number can be and normally would be controlled by the consumer, such as the card holder or a person overseeing a card holder's use (e.g., a parent, employer, gift giver, etc.). Hence, for limited-use credit card number, the limitations of which are defined by a consumer rather than a card issuer, the term Controlled Payment Number, or CPN has been coined.
  • It will be appreciated that the limits that can be placed on the use of a single use credit number or a multiple-use credit card number or CPN are almost limitless and those having skill in the art will consider other ways in which the use of the credit card number could be limited, whether it be by time, by amount, frequency of use, by geographical region, by merchant, by merchant class, or by purpose or use (such as limited to Internet trade and so on), or by some combination of these separate criterion.
  • The third way in which the invention could be carried out is by physically providing additional single use credit cards each of which would have a unique additional credit card number. Such additional single use credit cards could then be used both for remote trade by using the additional credit card numbers for respective transactions, and for “card present” trade where each card would be “swiped” in the normal manner. Such a disposable credit card could be made like any common credit card, or from a relatively inexpensive material, such as cardboard or thin plastic, with the relevant information entered into it in readable (e.g., magnetic) form, as is already the case with many forms of passes for use in public transport and the like. Again, substantially the same features as with the credit card number could be provided. Thus, for example, the disposable credit card could be limited to use geographically, to a use, to an amount, to a frequency of use, to an expiration date, and so on. Again, those skilled in the art will appreciate that there are many variations to this concept.
  • Another way of carrying out the invention is to provide a master credit card holder with a multiple-use additional credit card, where the additional credit card provides any limitations as to limited-use triggering conditions that may be desired.
  • Ideally, irrespective of the manner in which the invention is carried out, the master credit card holder would be provided with either a plurality of single use additional credit card numbers or multiple-use credit card numbers or a mixture of single and multiple-use credits cards. Several specific products are described in the last section of the present application.
  • It will be appreciated that with either single use credit card numbers or single use additional credit cards, it is possible to eliminate or reduce the risk of credit card number fraud. Further, depending on the credit limit imparted to the particular credit card number or additional credit card number or single use additional credit card, it is possible to further limit the possibilities of fraud in any remote transaction and that with the use of a disposable single use credit card it is possible to eliminate or reduce the risk of skimming.
  • With multiple use additional credit card numbers and multiple use additional credit cards, the above-identified problems may not be totally eliminated due to preferences of the user. This is because, in certain circumstances, credit card users may prefer to have, for example, an additional credit card number for remote trade with a specific credit limit that they use all the time and are willing to take the risk of compromised number fraud, in the sense that they can control the severity of this misuse. This would be particularly the case where some of the various user triggered limitations suggested above are used with the additional credit card number. Substantially the same criteria would apply to an additional multiple use credit card.
  • Effectively, the present invention solves the problem by obtaining the functionality of a credit card while never in fact revealing the master credit card number as the master credit card number need never be given in a remote transaction. Further, the master credit card itself need never be given to a trader.
  • In another embodiment of the invention, it is envisaged that people who do not hold master credit cards could purchase disposable credit cards which would have a credit limit for the total purchases thereon equal to the amount for which the credit card was purchased. These could then be used for both card present and card remote trade, the only proviso being that if the credit limit was not reached it will then be necessary for a refund to be given by the financial institution or credit card provider. An obvious way of obtaining such a refund would be through an automatic teller machine (ATM). In this way, the existing credit card transaction system is employed and the card holder is given the convenience of having a credit card.
  • As an alternative, the above-discussed cards could be, in effect, debit cards in the true sense, in which funds are withdrawn against a customer's account. In this case, the “credit card” issued, whether it be a one time use card or multi-use card, and whether have a credit limit or not, would be used to debit the account immediately. Preferably, the credit card issued in these circumstances would be single use with or without a transaction amount limit which would be used and processed by the customer and merchant for a transaction as if it were a credit card, while in the customer's bank it would be treated like any other debit to the account.
  • 2. Exemplary Implementation
  • 2.1 Implementation Overview
  • Various aspects of the invention may be embodied in a general purpose digital computer that is running a program or program segments originating from a computer readable or usable medium, such medium including but not limited to electrical or magnetic storage media (e.g., ROMs, EEPROMs, RAM, floppy disks, hard disks, etc.), optically readable media (e.g., CD-ROMs, DVDs, etc.), and carrier waves (e.g., transmissions over the Internet) or combinations thereof. A functional program, code and code segments, used to implement the present invention can be derived by a skilled computer programmer from the description of the invention contained herein.
  • FIG. 1 shows an exemplary overview of a system for implementing the limited use credit card system of the present invention. The system 100 comprises a central processing station 102, which, accordingly to exemplary embodiments, may be operated by the credit card provider. Generally, this station 102 receives and processes remotely generated credit card transactions. The credit card transactions can originate from a merchant in the conventional manner, e.g., by swiping a credit card through a card swipe unit 106. Alternatively, the credit card transaction requests can originate from any remote electronic device 104 (e.g., a personal computer). These remote devices can interface with the central processing station 102 through any type of network, including any type of public or propriety networks, or some combination thereof. For instance, the personal computer 104 interfaces with the central processing station 102 via the Internet 112. Actually, there may be one or more merchant computer devices (not shown) which receive credit card transactions from the remote electronic device 104, and then forward these requests to the central processing station 102. The central processing station 102 can also interface with other types of remote devices, such as a wireless (e.g., cellular telephone) device 140, via radio communication using transmitting/receiving antenna 138. Other intermediary components can be interposed, as is conventional.
  • The central processing station 102 itself may include a central processing unit 120, which interfaces with the remote units via network I/O unit 118. The central processing unit 120 has access to a database of credit card numbers 124, a subset 126 of which can be designated as being available for limited use (referred to as the “available range”). Also, the central processing unit 120 has access to a central database 122, referred to as a “conditions” database. This database is a general purpose database which stores information regarding customers' accounts, such as information regarding various conditions which apply to each customers' account. Further, this database 122 may store the mapping between a customer's fixed master credit card number and any outstanding associated limited use credit cards, using, for instance, some type of linked-list mechanism. Databases 122 and 124 are shown separately only to illustrate the type of information which may be maintained by the central processing station 102; the information in these databases can be commingled in a common database in a manner well understood by those having skill in the data processing arts. For instance, each limited use credit card number can be stored with a field, which identifies its master account, and various conditions regarding its use.
  • The central processing unit 120 can internally perform the approval and denial of credit card transaction requests by making reference to credit history information and other information in the conventional manner. Alternatively, this function can be delegated to a separate clearance processing facility (not shown).
  • Finally, the central processing station includes the capability of transmitting the limited use credit card numbers to customers. In a first embodiment, a local card dispenser 128 can be employed to generate a plurality of limited use cards 132 and/or a master credit card 134 for delivery to a customer. In a second embodiment, the limited use credit card numbers can be printed on a form 136 by printer 130, which is then delivered to the customer via the mail. The printed form 136 may include material which covers the numbers until scratched off, thereby indicating what numbers have been used and are no longer active. This listing of numbers can be included in a monthly or other periodic account statement sent to the customer. In a third embodiment, these limited use numbers can be electronically downloaded to a user's personal computer 104, where they are stored in local memory 142 of the personal computer 104 for subsequent use. In this case, the credit card numbers can be encrypted (described in detail later). Instead of the personal computer 104, the numbers can be downloaded to a user's smart card though an appropriate interface. In a fourth embodiment, the single-use credit card numbers can be downloaded to a radio unit 140 (such as a portable telephone) via wireless communication. In a fifth embodiment, an ATM 108 can be used to dispense the limited use cards 110. Those skilled in the art will readily appreciate that other means for conveying the numbers/cards can be employed. These embodiments are, of course, usable together.
  • The logic used to perform the actual allocation and deactivation of limited use credit card numbers preferably comprises a microprocessor, which implements a stored program within the central processing unit 120. Any general or special purpose computer will suffice. In alternative embodiments, the logic used to perform the allocation and deactivation of the limited use credit card numbers may comprise discrete logic components, or some combination of discrete logic components and computer-implemented control.
  • FIG. 2 shows a high-level depiction of the functions performed by the central processing station 102 or the like. The process begins in step 202 by allocating one or more limited use numbers to a customer. These numbers are ultimately selected from the list 126 of available limited use numbers, or some other sub-set list which has been previously formed from the numbers in list 126. Also, although not shown in FIG. 2, a master account number would have been preferably assigned to the customer at a previous point in time. The conditions database 122 may comprise a mechanism for associating the master account number (which can be a credit card number or some other type of account) number with the limited use credit card number. Because the limited use cards are arbitrarily chosen from the listing 126 of limited use card numbers, there should be no discernable link which would allow anyone to determine the master credit card number from any of the limited use numbers.
  • The processing then advances to step 204, where it is determined whether a customer requests or an event triggers a request for additional limited use cards or card numbers. If so, additional limited use cards or card numbers are allocated to the customer.
  • Processing then advances to step 206, where the central processing station determines whether a transaction has taken place using a previously issued limited use card. This step is followed by a determination (in step 208) whether the limited use number should be deactivated. For instance, if the card is a single-use card, it will be deactivated. If the card is a fixed-limit card, the card is only deactivated if the recent transaction exceeds some stored threshold limit. These threshold limits can be stored on the card itself or in the conditions database 122. The actual step of deactivating is performed by generating a deactivation command, as represented in step 210 shown in FIG. 2. Naturally, there are other steps to processing a credit card transaction, such as checking whether the card is deactivated or otherwise invalid prior to completing the transaction. These additional steps are system specific and are not discussed here for sake of brevity.
  • Once a number is deactivated, this number can not be fraudulently reused. Hence, the risk of fraudulent capture of these numbers over the Internet (or via other transmission means) effectively disappears. In an alternative embodiment of the invention, these deactivated numbers can be reactivated providing that a sufficiently long time since their first activation has transpired. Providing that there is a sufficiently large number of limited use credit card numbers to choose from, it would be possible to wait a long time before it was necessary to repeat any numbers. At this point, it would be very unlikely that someone who had wrongfully intercepted a credit card number years ago would be motivated to fraudulently use it before the rightful owner.
  • After the limited use card is deactivated or a number of limited use cards are deactivated, an additional limited use card or cards can be activated. As described in detail in the following section, the actual activation of the credit card number can involve various intermediate processing steps. For instance, the credit card numbers from the list 126 can be first allocated to an “allocated” range of numbers, and then to an “issued but not valid” range of numbers, and then finally to an “issued and valid” range of numbers. FIG. 2 is a high-level depiction of the process, and encompasses this specific embodiment, as well as the more basic case where the credit card numbers are retrieved from a database and then immediately activated.
  • Having set forth a summary of how the invention can be implemented, further details are provided in the following.
  • 2.2 Allocation of the Credit Card Numbers
  • The first thing that the credit card provider may do is to generate a list of additional credit card numbers, whether they be single use or multiple use, and allocate additional credit numbers to a master credit card as a further credit card number for optional use instead of the master credit card number. Such a list can be produced by any suitable software package in the exemplary manner discussed in more detail below. Because the numbers allocated to a particular master credit card holder will not have any link to the master credit card number, the master credit card number should not be able to be derived from the additional credit card numbers.
  • In effect, randomness in credit card numbers is provided by the fact that there is a queue formed by the customers requiring numbers. Further, it should not be possible, even knowing the additional credit card numbers in a particular master credit card holder's possession which he or she may have used, to predict the next set of numbers that that particular master credit card holder will be allocated, since there will be randomness of access to additional credit card numbers in the truest sense. Even if the credit card provider were to allocate numbers sequentially, there would be no way of predicting the number that that credit card holder would subsequently acquire, since the numbers would be allocated by virtue of a queue, the randomness of this allocation being such as to prevent any prediction.
  • As such, the credit card numbers generated by the central computer need not be per se random numbers. Preferably, though, these numbers are valid credit card numbers with the constraint that they must conform to industry specifications of the format in terms of their numerical content in such a way that they can be handled with no (or minimal) modifications by merchant/acquiring systems and networks and be routed to the appropriate center for processing. An additional constraint is that they must be different from all other conventional account numbers and all other single use numbers during their lifetime of validity. These constraints are practical requirements to produce a commercially viable system, which would likely not be satisfied by any process that generates random numbers in isolation.
  • To achieve these allocation requirements, an issuing bank decides within its total available range of credit cards to allocate a certain range or ranges of numbers to the single use system, referred to herein as the “available range.” This may represent spare numbers using existing header sequences (e.g., the sequence of usually 4-6 digits that define the issuing institution and are used to route the card to the appropriate transaction processor) or within newly created header sequences. The numbers not allocated include existing credit card accounts for that issuer and sufficient spare capacity for new account holders and replacement numbers for existing customers. The additional non-embossed components of the card details and any card specific information that is transmitted during a transaction may be varied from card to card to enhance security and privacy of credit card transactions.
  • Although each limited use number is unique during the its lifetime of validity, information required to route the card number and transaction details to the appropriate processor is maintained to ensure that limited use numbers are processed appropriately. However, the limited use numbers do not need to include either the master card account number or an encoded version of the account number. Indeed privacy and security are enhanced when no unique account holder identifier is included within the limited use credit card number.
  • Also, information that is verified prior to the card being processed for authorization and payment, such as expiry date and checksum digit must be valid. This information may vary from limited use number to limited use number, but must be valid to ensure that the number passes checks that may be completed within the merchant terminal, i.e., the checksum is appropriately calculated for each limited use number and the associated expiry date is valid at the time of use.
  • Within the constraint of using a valid credit card format, the random allocation process used to generate lists of unique limited use numbers can involve allocation from a range of numbers in which either the entire number or portions of the account number are varied. In addition, the allocation can include combinations of all or part of the account number together with all or part of additional information such as non-embossed additional numbers, expiry date and other information that identifies the card and is passed on by the merchant to the card processor during a transaction.
  • Sequential random allocation from a list of available valid credit/debit/charge card codes that have been solely allocated for use as limited use numbers ensures that the criteria specified for limited use numbers are met, i.e., no two limited use numbers are the same, no limited use number is the same as an existing account number, and no newly issued conventional card number is the same as a previously issued limited use number. To achieve true computational independence between account numbers and limited use cards and between limited use numbers for the same account, the random allocation process requires a truly random seed value. Such true randomness can be obtained from a physically random system with well-defined properties such as a white noise generator. An analog to digital converter that receives an analog signal from such a truly random physical system can be used to ensure truly random allocation.
  • Other approaches can result in the same result with lower computational efficiency. For example the allocation process could randomly select valid credit card numbers within the entire range for a given card issuer and then discard the number if it is already in use as a limited use or conventional card number or if the same number was allocated within a given time frame.
  • The above process generates a series of available single use numbers. To repeat, the allocation process is achieved by a truly random (or less ideally a pseudo random) mapping process in which a single use number is randomly selected and then assigned to a selected account holder (either an existing credit/debit card holder, a new solely single use account holder or a bank account). Additional single use numbers can be allocated for purchase on an individual basis. Each assigned single use number is then removed from the sequence of available numbers before the next allocation, ensuring a unique allocation of each single use number. An alternative mechanism for performing direct allocation to a specific account holder is for lists of single use numbers to be allocated to unique storage locations. The list from a specific storage location can then be directly allocated to a given account at a later date. This allows for rapid allocation of cards to new customers without any delay arising from the need to perform a new allocation procedure for each new customer.
  • This allocation process generates another series of single use numbers, the “allocated range” with an associated identification field to determine how the account will be settled once used, i.e., onto whose account the transaction will be charged. The allocation process can occur a significant time before the single use numbers are required. Once allocated, they are not added into the list of valid accounts until required by the user.
  • FIG. 3 is a flow chart illustrating an exemplary process for allocating credit card numbers. A central processing unit (CPU) generates a database of credit card numbers (step 302), and may select a master credit card number. (Step 304). In step 306, the CPU checks to make sure that the master credit card number is not the same as another credit card number. The CPU selects additional credit card numbers to allocate to the master credit card number or other type of account number. (Step 308). The CPU can use any of the techniques discussed above to select the additional numbers. In step 310, the CPU checks to make sure that the additional numbers are not the same as another credit card number. The additional numbers can be used, for example, for single use cards.
  • When a customer needs multiple-use cards, the CPU can issue the additional credit card numbers to the customer. Unless these multiple-use numbers are issued directly into the hands of the customer (e.g., by an automated teller machine (ATM)), they are not directly added to the list of valid account numbers held within the central computer system. These numbers are added to an “issued, but not valid” list of numbers. (Step 312). The number of multiple-use numbers issued at one time depends upon the rate at which the customer will use the cards and the capability of the device used to store the multiple-use numbers until used. The CPU can provide the customer with enough multiple-use numbers to fulfill their multiple-use purchase requirements for up to, for example, 2 years. Each multiple-use number can be endowed with specific restrictions in terms of transaction type or value, provided that these properties do not exceed the restrictions placed up on the customer's account (such as the available credit balance).
  • Once a series of multiple-use numbers are issued, the user has the option of confirming receipt by telephone or other communication media before any of the issued numbers become validated on the processing system. (Step 314). Once receipt has been confirmed (or assumed), not every issued multiple-use number is necessarily added to the “issued and valid” list. (Step 316). To prevent excessive valid multiple-use numbers being held within the processing system, the number of multiple-use numbers declared to be valid at any one time is limited to account for waste of numbers (i.e., numbers that are accessed by a customer but are never used to complete a transaction) and to allow for time delays between different transactions leading to differences in the sequence in which multiple-use numbers are accessed by the customer and the sequence in which they arrive at the processing center. The maximum number of multiple-use numbers valid at any one time can be determined by the card issuer but would be preferably in the range of 5-10. In the case of any attempted use outside the allocated range, the next multiple-use number can be used as an additional identifier to validate the transaction. In this case, only a subset of the digits should be given by the user to prevent a fraudulent trader being able to gain access to multiple unused multiple-use numbers. As soon as a single use number is disabled (step 320) on use (step 318), an additional number from the “issued not valid” list for that customer is allocated to the “issued and valid” list, ensuring a continual supply of multiple-use numbers up to the maximum allowed until the next set of multiple-use numbers are issued. (Step 322).
  • In relation to the actual supply of the additional credit card numbers, this will not cause any difficulties to the credit card provider. For example, with a standard master credit card number, there are up to fifteen or more digits, the first of which is used to identify the credit card provider, e.g., American Express®, VISA®, Mastercard®, etc. For major banks, three digits are used to identify the issuing bank. The last digit in a typical sixteen digit master credit card number is a checksum used to confirm that the number is a valid number. This leaves a total of up to 11 digits or more for the account identifying number and the expiration date. In some instances, the expiration date may not be sent back for clearance, while with certain credit card providers, additional credit card numbers or even additional information is required for clearance. For example, certain credit card providers print additional numbers on the card, which additional numbers are not embossed on the card and do not form part of the master credit card number. These additional printed and non-embossed credit card numbers can be used to identify that the person proffering the card for a non-present card transaction is actually in possession of the card when the order is made whether it be in writing or by phone. There are many devices, digits, pieces of information, etc. used by a credit card issuer or processor working for a credit card issuer to clear the credit card for the specific transaction. According to another embodiment, when issuing additional credit card numbers in accordance with the present invention, such additional credit card numbers could include a code which would identify that the person using the additional credit card number in a remote transaction is the one to whom the numbers were sent or, in the case of a disposable credit card, is the one to whom the disposable credit card was sent.
  • A preferred feature of these additional credit card numbers is that they be constrained to be in the correct format for a credit card number with a valid check sum, while at the same time be mathematically unrelated to each other or to the master credit card. In certain situations, for single use numbers, the expiration date is virtually irrelevant. Thus, using the month code of the expiration date with said eleven digits, there are 12×1011, i.e., 1.2×1012, i.e., 1,200 billion possible unique codes available for any given credit card provider. This would allow for 50 transactions a month for 10 years for 200 million account holders, before any codes would have to be recycled or a new header code introduced. When it is understood that there are then another 104 header numbers that a credit card provider can use, it will be appreciated that the structure and arrangement of existing master credit card numbers is sufficient to operate this invention with the advantage that the existing infrastructure of dealing with credit card transactions can be used with minimum modification. All that is required for the credit card provider is to store the generated numbers against the master credit card number or other type of account number.
  • If, for example, the card is a VISA® card, there are approximately 21,000 issuing banks. The sixteen digit number has a “4” followed by a five digit code to identify the card issuer. The last number is a checksum to verify that it is a valid number. As a result, there are 21,000×109×12 (252 trillion) unique numbers and associated expiry months. This number of codes is sufficient for 36,000 years of transaction processing at the current annual rate of approximately 7 billion transactions per year.
  • While existing credit card formats allow for a sufficiently large number of available card numbers, numbers will eventually need to be recycled for allocation. As the range of available numbers reduces in size over time, additional or recycled numbers should be added back into this range to ensure that the allocation process is performed from a range sufficiently large to maintain random allocation. The length of time prior to recycling depends on the total number of available unique card codes available to an issuer and the number of transactions that use limited use numbers. Such recycling can only occur after a number has been invalidated for further use and is no longer valid for refunds. Once recycled, automatic fraud detection mechanisms that would normally be activated on the attempted reuse of a previously inactivated card need to be altered by removing the recycled number from the list of previously issued limited use numbers.
  • 2.3 Limitations on the Use of the Credit Card Numbers
  • The use triggered condition subsequent limitations placed on limited use card numbers, i.e., transaction value limitations, number of transactions limits, etc., are central to their additional flexibility and security compared to conventional credit/debit/charge cards. These limitations can be imposed and controlled in a variety of ways. For example, the limitations can be stored within a database held by the card issuer and used to check that the transaction falls within these limitations during the authorization process.
  • FIG. 4 is a flow chart illustrating an exemplary process for limiting the use of a credit card number. A CPU can allocate a credit card number to a master credit card number (step 402), and allocate a condition to the credit card number. (Step 404). The CPU can then store the condition in a database of conditions. (Step 406). These limitations can be assigned by the issuer in a predetermined manner or can be imposed according to the requests of the card holder. These limitations can be encoded with the limited use numbers when the numbers are issued to a user so that the user can determine the limitations associated with a particular card. These limitations can be altered once a number is issued by updating the issuer database and the user maintained list of numbers. Communication between the user and card issuer to make these changes can be posted, conveyed verbally or electronically. (Step 408). When the card is used for a transaction (step 410), the transaction details are compared by the processing software with the limitations and the transaction is authorized only if the transaction falls within these limitations. (Step 412). Alternatively, the limitations can be encoded within part of the number format that is transmitted during a transaction. The limitations would then be decoded from the transmitted transaction details by the card processor. This would offer the user more control, but would offer less security since knowledge of the encoding format could be used to fraudulently alter the limitations chosen by altering the appropriate portion of the limited use number format.
  • As Internet commerce develops, there will be an increased need for a wide range of financial transactions. The limitations placed on limited use card numbers can be used to implement a wide range of payment options. For example, a credit card number can be limited to a single transaction for a pre-arranged transaction limit. Alternatively, a credit card number can be used, for example, to implement an installment plan where the credit card number is, for example, only valid for twelve payments for a pre-arranged transaction limit for twelve months to a single merchant. This plan provides security against fraud because it is locked to a single merchant, and it is only good for one year. Similarly, a credit card number can be used to implement a debit plan where the credit card number is limited to a specific merchant.
  • When the limited use number is limited to a specific merchant, the merchant can be prearranged by the user or can be determined by first use. In this situation a limited use card can be used to generate an account specific to a single merchant. For example, this can be used in situations on the Internet where a web merchant will retain a credit card number for later purchases. By being limited to a single merchant, theft of the number from the merchant's computer systems will not allow the card to be used elsewhere. Also, any such use will immediately identify a specific merchant as having suffered a security breach. Determination-by-first use could involve linking the merchant name or credit card system identification number at the time of making the purchase, during the authorization process or during the settlement process.
  • Finally, a credit card number can be used as a gift voucher where the credit card number is limited to a specific transaction value or limit, but it can be used for any merchant. A gift voucher limited use card could also have a pre-determined limitation to a specific merchant or a type of merchants or to a group of merchants such as within an “online shopping mall”.
  • 2.4 Distribution of the Credit Card Numbers
  • The next matter that is considered is how these additional credit card numbers and/or additional credit cards are distributed to a credit card holder. One way of providing such additional credit card numbers and/or additional credit cards is to in some way provide them physically to the master credit card holder, whether it be by collection, delivery by courier, post or some other way which can generally be covered under the heading of provision by post. Obviously, the financial institutions wish to provide the additional credit card numbers or the additional credit cards to the user as efficiently as possible with the minimum risk of the additional credit card numbers and/or cards falling into a third party's hand. While one can never prevent theft, for example, of a credit card from a user, what is important is to ensure that these disposable credit cards and/or credit card numbers are delivered to the user with the least possibility of a third party obtaining either the numbers or the disposable credit cards from the time they are generated until the time they are physically received by the user.
  • It is envisaged that there are various methods by which a credit card provider could issue the additional credit card numbers and/or credit cards to the user. One of the simplest ways would be to post them on request. Another way would be for the credit card provider, after receiving a payment of an account or with a statement of an account, to provide a sufficient number of additional credit card numbers and/or additional credit cards to replace the ones used since the previous statement. Particularly, if such statements do not quote the master credit card number or some code number, it would be possible to put in additional checks on the activation of the additional credit card numbers or credit cards. Some form of receipt system could be used. In this way effective theft would be reduced.
  • FIG. 5 is a flowchart illustrating an exemplary process for distributing credit card numbers. A credit card issuer allocates a master credit card number or more generically a type of master account number to a master credit card or account owner. (Step 502). The credit card issuer then allocates limited use numbers to the master account number. (Step 504). For pre-prepared cards, the card issuer can decide whether to print (or incorporate by some other means such as embossing) one number per card or multiple numbers per card. (Step 506). The card issuer can distribute multiple numbers using a single card (step 508) or distribute multiple numbers using multiple cards. (Step 512).
  • In either case, it is important that the user can keep track of which numbers have been used. If the card has only one number, an opaque removable cover can be used to cover one or more portions of the card. (Step 510). For example, the opaque removable cover can cover the number portion of the card, so that the cover has to be removed before the card can be used. The act of removing the cover indicates that the card number has been accessed or used.
  • Alternatively, an opaque removable cover can conceal a message such as “used”. The opaque removable cover can be a scratch off layer that is scratched off before or after the card is used. The scratch off layer can resemble the layer that is often used to cover lottery numbers or the like. Or alternatively, the single use cards can be placed in a self-contained container that resembles a razor blade dispenser. (Step 516). The owner can remove a single use card from a first compartment and then place the used card into a second compartment.
  • If the card has multiple numbers, the owner can keep track of the numbers by using a device that covers one or more portions of the card. (Step 510). The device can cover the numbers until they are used. As described above, the device can comprise multiple opaque layers that must be removed prior to the use of each number. Alternatively, each number could be visible when the card is issued and each number is associated with a panel in which an opaque covering conceals a message that indicates that the number has been used. After each use, the corresponding covering is removed or scratched off to indicate that the number has been used.
  • In both above cases the solutions incorporated on the cards act to remind the user which numbers have been used. The critical check on the validity of the number is performed by the processing software responsible for authorizing card transactions.
  • The additional credit card numbers and/or cards can be sent with a statement. (Step 518). The additional credit card numbers are not activated until the statement is paid. (Step 520). The card issuer could also require that the payment be accompanied by the master credit card number or another identifier. Or, for example, an additional security step involving either direct contact with the issuing credit card company or an independently issued password to allow activation of an electronic device could be used.
  • A further way in which the additional credit card numbers and/or additional credit cards could be distributed to the user is by way of an ATM machine. (Step 522). The ATM machine with very little modification could provide the additional credit card numbers. Similarly, with relatively little modification, an ATM machine could provide additional credit cards.
  • Cards/single use numbers can be issued directly into an electronic device that is capable of storing such numbers. This applies to mobile phones and pager devices to which information can be transmitted using existing systems and computers connected either directly or via a telecommunications system to the Internet or a specific host computer system. In such a situation a mechanism is required to protect these numbers in transit to prevent unauthorized access. For global applications, this mechanism must not be subject to export restrictions. In addition, this protection should not be susceptible to “brute force” decryption techniques. Such a system is described below in relation to the storage of single use cards.
  • An alternative method to provide additional credit card numbers could be by way of a computer programs. Obviously it would be necessary for the credit card provider to have sufficient security that when the computer program was dispatched, either through the telecommunications network or through the post, that unauthorized access could not be obtained.
  • 2.5 Electronic Use of the Credit Card Numbers
  • In the situation where the user stores and accesses limited use numbers via an electronic device such a computer of any form (desktop, television or cable linked Internet access device, laptop, palmtop, personal organizer, etc), any device that can deliver the same functions as a computer or dedicated Internet access device, a dedicated microprocessor device with key pad and screen or any form of telephone with associated microprocessor controlled electronics, the associated software can perform some or all of the following functions:
  • 1) Password controlled access to software or other security activation system that can verify that the user has a valid right of access.
  • 2) Secure storage of issued limited use credit/debit/charge card numbers until required by the user. These numbers can be stored in a variety of encrypted forms. An additional security step is to encrypt the number in the form a valid credit card number as previously described.
  • 3) Secure storage of transaction details and date of use for reconciliation with records held by the credit/debit/charge card company in case of disagreement. This may include digitally signing each transaction record.
  • 4) Facility for user to review past usage of limited use card numbers and transactions.
  • 5) Notification to user of available number of limited use cards.
  • 6) Initiate automated request from software to card issuing organization or agreed agent for further cards to be issued by previously agreed route if requested by user or if the number of available limited use cards is less than a pre-arranged limit.
  • 7) Secure communication between software package and card issuing organization or agreed agent for downloading additional limited use numbers. This secure communication can exploit any available form of encryption suitable for this purpose.
  • 8) Secure communication between card issuing organization or agreed agent and the software package for the transmission of information regarding credit card transactions, account balances and other information as requested by the user or card issuer. This secure communication can exploit any available form of encryption suitable for this purpose.
  • 9) Automated or manual means for transfer of credit card information to the merchant. The software can integrate with Internet software in the situation where it is run on a device linked to the Internet or similar electronic network and allow automatic transmission of transaction details if the merchant software so allows. To ensure compatibility with any form of merchant software the user also has the option of dragging and dropping a limited use number displayed by the software onto the appropriate part of a web page, or manually entering the number. In the case a device intended for use over the telephone, the number can either be spoken by the user or appropriate tones can be generated to automatically transmit the number to the merchant.
  • 10) Use of digital signature verification to verify both parties of a credit card transaction (i.e. merchant and cardholder).
  • 11) Use of digital signature verification to verify both parties of a communication involving the transmission of financial information or additional limited use card numbers (i.e. card issuer and cardholder).
  • 12) Use of stored lists of limited use numbers held by user and card issuer as dynamic passwords to verify both parties (user and card issuer) of a communication involving transmission of financial information or additional limited card numbers.
  • For “card not present” transactions, it is proposed that the customer uses an electronic device to store issued single use numbers. This may represent a range of devices from a mobile telephone, pager, dedicated single use storage device or a software package that can run on range of platforms such as a conventional desktop computer, television based Internet access device (e.g., WebTV) or a portable computing device.
  • The software that is used within these devices for storing and accessing these numbers will have specific features that are common to all platforms/devices.
  • For security reasons, access to the software will be password protected or protected by another security system that allows identification of the user (e.g., magnetic stripe card reader, chip card reader, electronic token generator, fingerprint recognition system or the like). Multiple passwords may be employed to provide limited access to certain individuals, for example limiting access for a family member to single use numbers with specific pre-allocated limits on application or maximum transaction value.
  • The single use numbers are preferably stored in a secure form involving one or more encryption systems. It is proposed that a dual system will be employed using a standard protocol (e.g., DES or RSA encryption) and a specific system designed for credit cards as described below.
  • “Brute force” decryption involves using multiple fast computers and specific algorithms to test large numbers of possible encryption “keys.” Success can be determined by seeing whether the result appears in the expected format, for example as comprehensible English text in the case of an encrypted document. If the encrypted version is in an identical format to the unencrypted version (though with different information) then brute force decryption cannot succeed. This is not a computationally viable option for text but it is possible for credit cards.
  • The approach is to break down each component of a credit card number and encrypt these with a private password so as to maintain the numerical composition of each component. The end result should be securely encrypted but should not represent another existing credit card account. This can be achieved by constraining the encryption system to convert the credit card header sequence used to identify the issuing bank (usually 4-6 digits) into a currently unused sequence. Since this information will be constant for all cards from the same issuer, this information should be randomized (rather than encrypted) to prevent recognition of a valid decryption solution. Once the rest of the number is decrypted by the program, the appropriate header sequence can be added. The remaining digits excluding the checksum (the last digit) are then encrypted using any private key encryption system that will maintain the same number of digits and produce a result that represents the numerals 0 to 9. The expiration date and any other identifying digits are also encrypted in such a manner as to respect their existing structure, i.e., the month is encrypted between 1 and 12 and the year is encrypted so as to represent a number within the next three years that ensures that the expiration date is valid. Following these steps, the digits used to calculate the checksum in a normal card number are processed to calculate a valid checksum for the encrypted card. The result is a valid appearing credit card number that has a valid checksum and which can be guaranteed not to belong to any existing credit/debit card account holder.
  • For example, for a card with a 6 digit header and valid checksum, e.g., “1234 5678 9012 3452 expiration date of 12/99,” 123456 is randomly assigned to a currently unused header sequence, e.g., 090234 (this is an example and does not necessarily represent an unused header sequence). 789012345 is encrypted into another 9 digit number, e.g., 209476391. 12/99 is encrypted to a valid date format that ensures the card is not expired, e.g., 3/00. The checksum is recalculated to produce a valid appearing credit card number, for this example the checksum is 4, i.e., 0902 3420 9476 3914 expiry 3/00.
  • To decrypt this number for use or after transmission from the bank, the appropriate header sequence for the issuer is exchanged for the digits in the encrypted number. The other digits are decrypted using the private password and the check-sum is recalculated.
  • Provided that the header number is unused and the private password remains private, then this number is encrypted in such a way that brute force encryption cannot be used to determine the original number, since it will not be possible to determine when the correct solution has been reached. In combination with standard encryption systems, this allows a means to securely store credit cards and transmit them over insecure systems with confidence.
  • Once the appropriate password is entered into the software, the next available single use number is decrypted and either displayed, allowing the customer to use it in any form of trade that can achieved by quoting credit card information, or directly transmitted via the software to the merchant. Once used, the single use number is removed from the stored list. The date of access, the number accessed and any additional available transaction details are then stored in a secure fashion and digitally signed to allow for verification in the case of a disputed transaction. Each access to a single use number requires the entry of a password to prevent unauthorized access if the customer leaves his software/computer device unattended and active.
  • Other types of encryption may also be used, for example, which require the use of a mask and/or private key. For example, as described above, this approach also breaks down and encrypts each component of a credit card number so as to maintain the numerical composition of each component. Similar to that described above, the bank identifying header sequence, e.g., in the case of VISA® cards, the initial digit “4” followed by the 5 digit BIN number, is replaced with an equal number of random digits taken from the range of unused headers. This ensures that the resulting number does not represent some other valid existing credit card number. These replacement header sequence digits can be fixed for a given card issuer and can be reconstructed after decryption.
  • The final checksum digit can be handled in one of several ways. For example, the checksum digit can be recalculated based on the encrypted remaining digits as described above. Alternatively, the final checksum digit can be omitted from the encryption process and recalculated after decryption.
  • The remaining digits can be reformatted into another number with the same number of digits by any reversible encryption process. The same process may also be applied to all other numerical information transmitted that may be issued during a transaction, e.g., the expiry date and other codes. One process for randomizing these remaining digits is described above. Another process to encode the remaining digits is to perform a digit by digit mathematical operation in combination with a mask containing the same number of digits as the remaining digits to be encoded.
  • For example, assume the original remaining digits are 878918982 and the random mask digits, containing the same number of digits as the remaining digits to be encoded, are 143337658. A modulo 10 arithmetic function is then performed using the original remaining digits and the random mask digits as follows to achieve the encrypted result.
  • Original remaining digits 8 7 8 9 1 8 9 8 2
    Random mask digits 1 4 3 3 3 7 6 5 8
    Encrypted remaining digits 9 1 1 2 4 5 5 3 0
  • After transmission of the encrypted card number, including the replacement header sequence digits, the encrypted remaining digits and the checksum digit, if appropriate, the encrypted card number is separated out into its components. The encrypted remaining digits are decrypted in the opposite manner in which they were encrypted. Specifically, knowing the random mask digits and the encrypted remaining digits, a modulo 10 subtraction is performed to reconstruct the original remaining digits as follows.
  • Encrypted remaining digits 9 1 1 2 4 5 5 3 0
    Random mask digits 1 4 3 3 3 7 6 5 8
    Original remaining digits 8 7 8 9 1 8 9 8 2
  • Even with this simple encryption technique, the decryption solution requires access to the private key because the solution cannot be identified in isolation. In addition, this process enables the reconstruction of one of the sequences, i.e., the original remaining digits, the random mask digits or the encrypted remaining digits, knowing the two other sequences.
  • FIG. 6 is a flow chart illustrating an exemplary process for electronically using credit card numbers. The software can be launched either on its own or activated by an icon integrated into an Internet browser. (Step 602). The software can provide a simple interface with a graphical appearance that exploits familiar images of credit cards and/or ATM's. The software can be programmed using Java code or a Java core embedded in a c/c++ application or equivalent programming language.
  • Once launched the user puts in one password to gain access to the main screen of a computer, which contains a keypad to allow a PIN to be inputted either by keyboard or by mouse clicks. (Step 604). The latter protects against any covert attempts to record passwords by trapping key strokes. A consecutive number of errors in inputting the password will permanently disable the program and overwrite remaining encrypted numbers. After the correct PIN is entered, the user can select a new limited use number with or without additional constraints (e.g. maximal transaction value). (Step 606). A new limited use number is then displayed on the graphical interface. The software can provide secure access to encrypted credit card numbers that are stored on a computer's hard disk. (Step 608). These numbers can be accessed for use on the Internet or for use over the phone/mail order. (Step 610). The numbers must therefore be able to be inserted directly into a web page (step 612), or printed out/copied from screen for use in other ways. (Step 614). The limited use number can be copied, printed, pasted via the clipboard (or equivalent) or dragged-and-dropped onto a web page. The length of time a number is displayed and how the program terminates are user configurable. The user can also record a comment to provide further information about how a number was to be applied. For automated transactions, the software should ideally be able to intercept and respond to merchant server initiated signals activating integrated functions within the browser.
  • Once a number has been accessed, it can be deleted from the encrypted lists. (Step 616). The date, number, current URL in the case of Web use and any user comments are then stored by a separate form of encryption to facilitate audit/review. (Step 618). The user can review, but not edit this information
  • There should be a facility for downloading additional numbers either from additional floppies or via the Internet using high security protocols. (Step 620). The latter function can be performed by a separate program.
  • The program should include a maximal degree of transparent security features, i.e., features that do not affect a normal user, but that protect against the program being reinstalled or copied onto a second machine. This means that the encrypted limited use numbers should either be stored within the executable file or stored in a file that also stores encrypted copies of the machine specific information. (Step 622). This is required to ensure that the numbers can only be accessed on the machine on which the software was first installed. The data files should also be stored as hidden system files.
  • Some users may wish to have the equivalent of an electronic wallet that can be de-installed from one computer and reinserted on another, for example, when transferring a “wallet” from an office to a home machine. This transfer process ensures that only one version of the program is running at any one time and that no problems arise in terms of reconciling lists of used numbers. Appropriate security mechanisms can be implemented to identify the valid user.
  • Appropriate security measures include encryption. Encryption of limited use numbers should involve two levels as exemplified above. At the first level, the card numbers are encrypted using an algorithm that acts only to alter the free digits within the credit card. The header sequence (i.e., BIN number) is left unaltered or converted into an unused BIN number and the checksum recalculated. This prevents any form of brute decryption because there will be no way of telling when the correct algorithm has been selected since each number starts and ends up as a valid looking credit card number. Following this step each number is encrypted with industry standard encryption methods (e.g. RSA or DES). Following decryption within the program the checksum is recalculated for the final number and the appropriate bin number reinserted.
  • The software can be shipped on a single 1.4 Mb Floppy (or any other computer readable or usable medium) in an encrypted form or downloaded from a website. Limited use numbers can be issued either with the program or independently. An independently shipped password can be required for installation. The installation process will allow the program to be installed a restricted number of times after which critical data is overwritten. The precise number of allowable installations will be easily alterable within the software design. Once installed on the host computer, the program encrypts internal information regarding the machine's configuration to protect against copying of the program onto other machines. At first installation the user can select his own passwords. These will be used to control both access to the programs and to influence the pattern of one level of encryption that is applied to limited use numbers.
  • As numbers are accessed, a graphical indicator of the remaining amount of limited use numbers provides early warning if additional numbers are required. The software can also provide a log of previously accessed numbers, the date, associated URL if activated from within a browser and comment; a summary of account expenditure; assistance with adding additional numbers from disk or via Internet; the ability to configure additional passwords/users for shared cards; and/or hot link Internet access to the card number issuer's web site.
  • 2.6 Processing of Card Transactions
  • It is envisioned that additional credit card numbers and/or additional credit cards would be processed by merchants in the same manner as existing credit card numbers and/or credit cards with the merchant obtaining validation of the credit card number from the credit card company or authorized third party. In much the same way as at present, the additional credit card number would be matched to the customer account and the account would be debited accordingly. The merchant reimbursement following verification of an additional credit card transaction would be performed in the normal manner. A particular advantage for the merchant is that since they are never in possession of the master credit card number or indeed, in many instances, of the master credit card, they have no responsibility for security to the master credit card holder. It is envisaged that where there are additional credit cards used, it may not be preferable to take an imprint of the credit card manually, as the imprint can be taken electronically. Similarly, those processing the credit cards will process them in the same manner described heretofore.
  • Processing systems for handling limited use cards perform a number of functions including some or all of the following:
  • 1) Verify that the limited use number is valid.
  • 2) Verify that the transaction falls within limitations placed on the specific number.
  • 3) In the case of a limited use number associated with another account, verify that transaction falls within limits acceptable for the associated account.
  • 4) Provide authorization to the merchant if valid and within the limitations for specified number and associated account.
  • 5) Permit later transactions to be charged to a limited use number that has been invalidated for further authorizations only if the transaction is generated by the same merchant that obtained pre-authorization for the same transaction.
  • 6) Deny authorization if invalid or exceeding limitations on number or associated account.
  • 7) Activate fraud detection mechanisms if invalid number or on attempt to reuse an invalidated limited use number.
  • 8) Invalidate limited use number for further authorizations/payments if limitations on use are met or exceeded by a specific transaction.
  • 9) Maintain list of invalidated numbers for reimbursement in the case of returned or faulty goods for a defined period.
  • 10) Limited use numbers and transaction details logged and linked to associated account.
  • 11) Transmit records of limited use and other card transactions to the user by post or e-mail.
  • 12) Instigate payment to merchant for approved transactions.
  • 13) Instigate reimbursement to account holder in case of a refund.
  • 14) Invoice account holder for payment for charges incurred or arrange settlement via another account.
  • Many of the procedures associated with limited use cards represent functions already performed by the clearing systems. These existing functions include: adding new credit/debit card numbers to the processing databases; allowing these card numbers to be activated following a confirmatory call to the issuer by the customer; conferring a credit limit on a credit card number; and invalidating a credit card number from further use and marking any further use as fraudulent. This overlap represents part of the commercial value of the single use invention, minimizing the required changes.
  • Once a limited use number enters the clearing system it can be handled in a normal fashion, e.g., by ensuring that it has not been reported as being stolen and that it represents a valid account number within the database. If the transaction is within the credit limit of the customer and the transaction limit or restricted use limitations of the limited use number, it is authorized.
  • Several specific modifications should be made to the processing software to implement the features of limited use cards. For instance, valid limited use numbers are stored in a database of valid account numbers along with other information specific to limited use numbers. This includes sufficient information to identify the customer to whom it was issued and any additional limitations placed upon the card in terms of transaction value or category of merchant for which the card can be used.
  • Once authorized, the limited use number is invalidated deactivated so as to ensure that further authorization/charges cannot be made on that number. To allow for authorization preceding request for settlement by a substantial delay, for example in the context of a mail order purchase where a credit/debit card number may be authorized at the time of order and charged only when the product ships, delayed settlement to the same merchant must be allowed.
  • Once the number of transactions permitted for a limited use card is reached, the central card processing software invalidates the card. Due to the time delay that can occur between authorization and a merchant request for settlement, improved security is achieved by linking the invalidation process to authorization. Linking invalidation to settlement facilitates pre-authorizations at the cost of increased risk of, for example, multiple use of a card number intended for limited use. Pre-authorizations can be used with authorization dependent invalidation as described above. In the case where a transaction is not authorized before being accepted by a merchant, the invalidation process will occur when the transaction details are transmitted to the processor for settlement. When no authorization is obtained for a limited use number the system will therefore still operate normally with an increased level of risk for the issuer/merchant as is the case with an unauthorized conventional card transaction.
  • Whenever the credit limit or validity of a customer's account changes, all currently valid limited use numbers are identified and their associated credit limit is altered to the lower of either their allocated transaction or the existing credit limit. If the customer account is closed or declared delinquent, all valid single use numbers are handled in the same manner.
  • Whenever a limited use number is used, the next available single use number previously allocated to the same customer and issued to the customer is added to the database of valid account numbers.
  • When a transaction is charged to a limited use number, the transaction details and customer account details are stored together for audit purposes and the value of the transaction is added to the customer's account for billing.
  • The software for storing transaction details and printing statements can be modified to allow for both the customer's conventional account details and the limited use number transaction details to be reported.
  • Processing of limited use numbers can be integrated into existing systems in a variety of ways. The authorization and settlement process can be completed in a single cycle or split into a separate authorization and settlement processes as is commonly done in existing credit card systems.
  • In the case of an entirely new, stand-alone, limited use credit/debit/charge card processing system, the above functions can be implemented without restriction in any suitable computer capable of incorporating the required database and communication functions. Such a system should be able to provide an authorization for a transaction within the same time scale as an existing credit/debit/charge card transaction.
  • In the case where the above functions have to be integrated into existing systems several approaches can be taken to minimize the required changes. It is possible to add steps to the processing chain that is encountered as soon as a credit/debit/charge card number is received from a merchant.
  • FIG. 7 is a flow chart illustrating an exemplary process for processing a transaction. In step 702, a software system receives transaction details from a merchant. The software system determines whether the number is a limited use number or a conventional card number. (Step 704). If the number is a conventional card number, it is passed on unchanged into the processing system and can be handled by existing systems with no modification. (Step 706). The merchant receives authorization from the system responsible for authorizing conventional card numbers. Merchant reimbursement is similarly unaffected. (Step 708).
  • The system can check the limited use number and the corresponding limitations. (Step 710). If the number is not valid for the designated transaction, the transaction is denied. (Step 712). Otherwise, a database look-up procedure determines the associated master account number and transmits this number (i.e. the master account number) back into the processing system. (Step 714). This allows all existing fraud detection, authorization and demographic software procedures to be completed with no alteration. (Step 716). Once the master account number is substituted for the limited use number a number of additional steps are required. (Step 718). If the criteria for invalidating the limited use number have been met during this transaction, then the limited use number is invalidated for all future transactions except refunds. An additional limited use number can be automatically issued if a continual supply of single use numbers is required. The transaction details and master account number are then transmitted for inclusion within a database to allow for tracking of transaction details and billing of the user. These functions do not need to be performed before an authorization is issued but can completed afterwards. (Step 720). However, performing such steps together with the validity verification of the limited use number prior to issuing an authorization message to a merchant is a feasible option with a minor reduction on the processing time required to issue an authorization message.
  • With the above system, the software responsible for substituting the master account number for the limited use number can also process additional features unique to limited use numbers. These features include transaction value limitations, merchant type restrictions and geographical limitations. If the transaction exceeds the limitations placed on the limited use card then authorization is denied and the master credit card need not be passed on for further processing. In the case of a transaction falling within the limitations of a limited use card, then the transaction details are passed on with the master account number for conventional validation. In this way the restrictions in place for the master account (e.g., available balance, expiry date) are checked for each limited use transaction.
  • Specific fraud detection mechanisms can also be incorporated into the software. For example, on the first occasion that an invalidated limited use number is used this transaction can be flagged as potentially fraudulent and appropriate measures taken. Repeated attempts to authorize invalid numbers from a single merchant or group of merchants also potentially points to fraud and can lead to activation of appropriate fraud management measures.
  • The above system requires the least modification of existing systems but may take up to twice the processing time of a conventional transaction due to the double authorization process, once within the limited use verification and translation step and once within the standard systems. It may be advantageous to initially process the limited use card as a master credit card by using a single list of limited use numbers and master credit card numbers.
  • FIG. 8 is a flow chart illustrating another exemplary process for processing a transaction. In step 802, a software system receives transaction details from a merchant. The software system has access to a database that contains additional information to identify the associated account or means of settlement and specific limitations relating to the use of limited use cards. As a result, limited use numbers can be associated with existing accounts in the manner currently used to associate multiple conventional accounts in the case of multiple cards issued to a single company for corporate use. (Step 804). During an authorization the associated account number need not be identified provided each limited use account is updated whenever the status of the associated account changes (e.g. available balance, account validity etc.). The system can deny authorization (step 806) or authorize a transaction (step 808) without identifying the associated account number.
  • For settlement and billing purposes (step 812), the associated account needs to be identified (step 810), but this does not need to be done during the course of an authorization. The existing software should be modified or linked to a new program that performs duties specific for limited use card numbers as described above. ( Steps 814, 816, and 818). These functions do not need to be performed before an authorization is issued. These functions can be completed afterwards.
  • This system requires more modification of the existing processing software systems, but offers authorization times within the same timescale as existing transactions since only one authorization steps is involved. Other activities such as updating the limitations on the limited use card when the master account changes can be performed outside the authorization process (i.e., “off-line”).
  • Such other activities can also take place while the system is operating. The system may include some or all of the following features:
  • 1) A system capable of altering the nature and value of limitations associated with a specific limited use credit/debit/charge card number on the basis of the usage of that specific limited use card number in transactions, where such alteration is conducted while the system is operational;
  • 2) A system capable of altering the nature and value of limitations associated with a specific limited use credit/debit/charge card number on the basis of instructions generating on behalf of the issuing bank, where such alteration is conducted while the system is operational; and
  • 3) A system capable of altering the nature and value of limitation associated with a specific limited use credit/debit/charge card number on the basis of instructions generated on behalf of the card holder, where such alteration is conducted while the system is operational.
  • The invention is not limited to the embodiments hereinbefore described but may be varied in both construction and detail. For instance, the invention has been heretofore described mainly in the context of a system in which a customer receiving a single use card already has a main account with the credit card provider. But this need not be so. For example, it is envisaged that an ATM machine (or similar apparatus) could be used by people who did not have a credit card account to purchase disposable credit cards, which disposable credit cards could then be used for either card present or remote transactions. When the card had been used, the card would be simply reinserted into the ATM machine, and after a suitable period of time the purchaser's account would be credited with any money not spent. Similarly, if the person who purchases the disposable credit card does not have an account of any sort with the credit card provider, the credit card could still be purchased from the ATM machine and then any refund could take place a sufficient time after the transaction would have been cleared, which refund could be either in the form of a cash refund to the purchaser or to a crediting of that purchaser account with another financial institution. Similarly, it will be appreciated that the use of an ATM machine is not essential, as the disposable credit cards or single use credit cards could be purchased in the normal way in which one purchases any other goods or services, such as either directly in a face-to-face transaction or by post.
  • Similarly, while in the above it has been suggested that there could be single use credit cards that would be purchased, there is no reason why they could not be multiple transaction credit cards with an aggregate credit limit. Further, these cards could, instead of being credit cards, be simply credit card numbers for single or multiple use. It is, however, envisaged that for operational efficiency, these numbers are much more likely to be issued as disposable credit cards or single use credit cards. Thus, for those who do not wish to handle a credit card or whose credit worthiness is such that they would not be allowed to have a credit card, it will now be possible for them to have the use of a credit card. This would have considerable advantages for the credit card providers.
  • 2.7 Card Holder Controlled Validity of Credit Card Numbers
  • In processing a transaction as described above, one step is to determine whether or not a limited use credit/debit/charge card number is valid. As discussed above, when a new credit card is presently issued, it is commonly required that the card holder activate the card. Specifically, the card holder may be required to communicate with the credit card issuer to activate the card before it can be used. Alternatively, in one embodiment of the present system, the card holder can control the activation or validity of a credit card number, or equivalent transaction code, during the course a transaction. Thus, in this embodiment, the card holder has the control, security and confidence that payments can only be made with his or her express permission.
  • FIG. 9 is a flow chart illustrating an exemplary method of controlling the validity of a limited use credit card number. The card holder has a credit card number, or equivalent transaction code, that is allocated to the card holder, but is not yet active. (Step 902). The card holder can acknowledge delivery of the credit card number, but the number remains inactive within the card issuer's processing system, e.g., a bank's processing system. (Step 904). When the card holder wishes to conduct a transaction, he or she contacts the card issuer to activate the credit card number. (Step 906). Activating the credit card number before every transaction is cumbersome, but in the context of a remote transaction for example, via the Internet or equivalent network, the communication between the card holder and the card issuer can be achieved very rapidly by an entirely automated system that will activate the card during the process of conducting a transaction with an Internet based merchant. The credit card number is activated for a specific transaction only when specifically requested by the card holder. (Step 908).
  • The properties of this validation or activation process can vary. For example, the validation could be for a specific time period, for a specific merchant or group of merchants, for a specific type of transaction, or for a specific number of transactions (authorizations and/or presentments). These properties can also be combined in any permutation. For example, a card holder could request that his or her credit card number be validated for one transaction with a specific merchant up to a specific value limit or value range (e.g., a specific value +/− a configurable range). In the event that no authorization is received within a defined period, the validity can lapse. This combination provides a solution that meets the need for a secure, flexible payment system for remote transactions.
  • More specifically, for Internet transactions the card holder would receive a software package from the card issuer along with a unique personal validity limited credit card number. This software package would also facilitate completion of the merchants web page using ECML (electronic commerce modeling language) or some other equivalent electronic wallet system. Merchants wishing to use this system provide a unique merchant identification number on their web site. For merchants who are not compliant with such systems, a simpler automated method, e.g., “drag and drop,” of transferring card number and other details is supported.
  • When a card holder wants to conduct a transaction, he or she activates the validity limited credit card software using a password or hardware based user identification system (e.g., magnetic stripe card reader, chip card reader, electronic token generator, fingerprint recognition system or the like) thereby identifying himself or herself with the card issuer. The card holder then requests his or her credit card number to be validated for the merchant as identified by the merchant identification number. After use the card number is automatically inactivated again. The card holder may also specify additional limitations as discussed above, such as value limitations and maximum number of available transactions. Alternatively, these limitations could carry default limitations, for example single transactions up to a value of $100.00. This request would be transmitted via the Internet to the card issuer's card computer processing system. The processing system would validate the card holder's password (or hardware device), if appropriate, and forward the appropriate validity request to the card processing systems database.
  • The card issuer's server may also verify the merchant's identity by providing confirmation of the merchant's name as it will appear on the card holder's credit card statement. This merchant verification helps to avoid a common source of potential confusion for card holders in credit card transactions. The merchant identification number can either be the actual credit card systems merchant-ID or another unique code. In either case, the credit card merchant-ID that will be transmitted to the processing system during the transaction is entered into the processing system's database. This ensures that only the intended merchant can initiate a transaction with the validated credit card number. In the event that a merchant identification code does not satisfy the card holder's expectations, the card holder has the option to cancel the transaction before any information is passed to the merchant's web site.
  • When application of the one or more limitations are confirmed, generally within a matter of seconds, the card holder is given verification of such and is allowed to transfer the credit card number and transaction details to the merchant's web site. Since the merchant identification number is used to validate a specific number of transactions for that merchant, there is no benefit of a rogue or fraudulent merchant trying to steal the identity of another valid merchant. The transaction can only be reimbursed to the merchant identified to the card holder by the card issuer's system.
  • When a merchant receives the card holder's credit card number, the merchant processes this in an identical manner to an existing transaction in known systems. The transaction is passed through to the card issuer's processing system via the merchant acquiring and credit card networks. At the card issuer's processing system, the transaction is handled by an authorization system that allows a card number to have associated validity restrictions or limitations, such as merchant-ID. If, in response to an authorization request, the authorization system indicates a valid card number, with an appropriate merchant-ID validation and sufficient funds, a normal authorization response is returned to the merchant. The number is then deactivated by the use triggered processing software within the authorization system or the in case of a multiple outstanding transactions the properties of the card number are updated to remove the permission for the authorized transaction (e.g. decrement the cumulated value limit). If the authorization system identifies a problem with the request, for example, exceeding a limitation, the merchant is denied authorization. Transaction settlements and card holder billing proceed as described above.
  • In the situation where a card holder is making multiple purchases with the same merchant within a short period of time, each validation by the card holder may be cumulative so that all the requested transactions can proceed. For example, if the card holder requests two transactions, one of $50.00 and one of $100.00 dollars for a specific merchant, the credit card number will be validated for two transactions to that merchant with a cumulative limit of $150. This means that both transactions will be authorized. In this case, the sequence of authorization requests from the merchant may differ from original sequence of validation requests from the card holder.
  • This system may be implemented using the Internet card software package, or RAD software package, as described herein.
  • In general, the system provides a method for numbers and accounts to be set up and issued directly to the user. In addition, the system also permits users to directly alter the properties of a credit card account within an issuer's authorization and settlement system. The set-up (issuance) and use of a limited use credit card number can take place at the same time, i.e., in the same interaction or at separate times, i.e., setting up (issuing) a limited use credit card number at one time and configuring the limited use credit card number at a later time.
  • This system has a number of advantages over existing credit card systems. Card fraud is greatly reduced since a stolen number requires the card holder to validate the card number before any transaction can be completed. This protects against either interception of the number during a transaction or the number being accessed from a merchant's computer systems at a later date. In addition, if the number is authorized, the merchant is assured that the card issuer has directly validated that the card holder has requested the transaction. This prevents or limits a card holder's ability to repudiate the transaction. Moreover, the card holder has additional control on the purchasing power of his or her credit card. The card holder has the reassurance that payment can only be made to the merchant described by the card issuing bank/organization.
  • 2.8 Additional Uses of the Credit Card Numbers
  • In situations where the card-holder and card issuer are in communication and authentication is required of one or both parties, the list of limited use card numbers held by each party can used as a form of identification. In the manner of a dynamic password all or part of a single limited use number a sequence of such numbers could be used to identify either party without the need for issuing any additional security systems. Because this identification does not need to be handled by conventional transaction systems, all or part of a limited use number can be used for this purpose.
  • FIG. 10 is a flowchart illustrating an exemplary process for using a credit card number as a PIN number. In step 1002, a card issuer generates a database of available credit card numbers. The card issuer selects a master credit card number or more generically master account number (step 1004) and distributes the master account number to a master account number owner. (Step 1006). The card issuer then allocates additional credit card numbers to the master account number (step 1008), and distributes the additional credit numbers to the master account number owner. (Step 1010). When the master credit card number owner needs or desires to access account information (step 1012), the master account owner can use one of the additional credit card numbers as a PIN number. (Step 1014).
  • As can be readily seen, there are fundamental differences between the system of the present invention and any system that uses a PIN or other number (whether constant or varying from transaction to transaction) to validate a transaction. In the present system the numerical details conveyed in the course of a transaction are identical in format to an existing credit card number but no unique account code is included. This maximizes the security and privacy of a credit/debit/charge card transaction. Within the processing system the validity of the limited use number is verified first and then the associated account identified second by examining information stored with the limited use number. With the transmission of an additional PIN or other number in addition to the account number or other unique identifier, there is a lower level of security and privacy. Within any form of PIN identification (and as described by Rahman) the associated account is identified first and then the PIN verified after this step. For this reason many card holders can share the same PIN, indeed in most cases due to the short length of PIN codes many users do have identical PINs but different account numbers. For our system each limited use number must be unique at the time of use and so the associated account can be uniquely identified.
  • 2.9 System Locations
  • With reference back to FIG. 1, and as described above, central processing system 100 can internally perform the approval and denial of credit card transactions or this function can be delegated to a separate clearance processing facility. In other words, central processing system can be located within the card issuer's main processing system or at a stand-alone facility. In an exemplary embodiment of the present invention, central processing system 100 adds additional functionality to existing credit/charge/debit card systems without any, or with minimal, alterations. In general, central processing system 100 transmits certain transaction details in a bi-directional manner, i.e., utilizing dual interfaces between central processing system 100 and the merchant and between central processing system 100 and the card issuer, without revealing the master credit card number to the merchant. The dual interface transmissions, referred to herein as remapping, allow merchants and card issuers to handle transaction details in the same manner as conventional credit card transactions. Such conventional credit card transactions may be, for example, authorizations, settlements, copy requests, and charge-backs.
  • Remapping can be implemented by utilizing database look-up functions using existing industry-standard computer platforms. In addition, remapping may occur by replacing the limited use card number with the master account number.
  • FIG. 11 is a block diagram illustrating a credit card system 1100 in which a central processing system 1106 in accordance with an embodiment of the present invention is located within a card issuing bank's main processing system 1114. The system 1100 includes merchant acquirers 1102 connected to card issuing bank's main processing system 1114 via a credit card network 1104 and a switch 1116. The credit card network 1104 may be any type of communication network, such as the Internet, a radio network, etc. as described above. A switch 1116 includes hardware and software components. The switch 1116 may be configured to direct incoming transaction details on the basis of the card number and to direct outgoing transaction details on the basis of the merchant acquirer identification number (referred to herein as the “merchant ID”). The issuing bank's main processing system 1114 includes an issuing bank processing facility 1112 and a central processing system 1106. The central processing system 1106 includes an acquirer interface 1108 and a STIP interface 1110 for example.
  • Exemplary transactions will now be described with reference to FIGS. 11 and 12. FIG. 12 is a flow chart illustrating an exemplary method of conducting a limited use credit card number transaction. A user initiates a transaction by presenting a limited use credit/charge/debit card number, either in person or remotely as discussed above. (Step 1202). A merchant acquirer 1102 routes this limited use credit card number to the central processing system 1106 via the network 1104 and the switch 1116. (Step 1204). This routing is done on the basis of a specific bank identification number (referred to herein as “BIN”) which is the first few digits of the limited use credit card number, as discussed above. In this example, the central processing system 1106 acts as a stand-in processor.
  • If the limited use credit card number is invalid, or if the limited use condition has been satisfied, i.e., the condition has been met or exceeded, step 1206, the central processing system 1106 will transmit a signal to merchant acquirer 1102 denying authorization of the card number via switch 1116 and network 1104. (Step 1208). If the limited use credit card number is valid, and if the limited use condition has not been satisfied, the central processing system 1106 transmits a signal to the issuing processing facility 1112 via the merchant acquirer interface 1108 and the switch 1116. (Step 1210). This signal includes the original transaction details but the card number and the merchant ID are remapped. This remapping provides the master credit card BIN number so the signal will be routed to processing facility 1112. This ensures that the authorization can be obtained against the master credit card and that any resulting authorization, or denial thereof, is returned to central processing system 1116, as this appears to the processing facility 1112 to be the merchant. (Steps 1212 and 1214). The authorization, or denial of authorization, is the remapped within the central processing system 1106 to the original limited use credit card number and merchant ID. (Step 1216). The central processing system 1106 then transmits a signal to the merchant 1102 authorizing the limited use credit card number, or denying authorization as appropriate, along with the original transaction details via the switch 1116 and the network 1104. (Step 1218).
  • FIG. 13 is a flow chart illustrating an exemplary method of conducting a settlement transaction. In a settlement transaction, the merchant 1102 transmits a signal to the central processing system 1106 via the network 1104 and the switch 1116 according to the BIN of the limited use card number. (Step 1302). The central processing system 1106 remaps the limited use credit card number with the master credit card or account number, the merchant ID with a central processing system ID and the merchant text description with a central processing text description (step 1304), and transmits this remapped information to issuer processing facility 1112 via switch 1116. (Step 1306.) The processing facility 1112 settles the transaction by payment, if appropriate, to the central processing system 1106. (Step 1308). The central processing system 1106 then remaps the master credit card or account number back to the original limited use credit card number, the central processing ID back to the merchant ID and the central processing text description back to the merchant text description, (step 1310) and transmits this information along with the payment, if appropriate, to the merchant acquirer 1102 via the switch 1116 and the network 1104 (step 1312). As with the authorization cycle, this settlement cycle ensures that settlement is obtained against the master credit card; that the card holder's billing statement reflects the limited use transaction, with the central processing ID, and that the payment for settlement is conducted through the central processing system 1106.
  • If a card holder challenges or questions a specific charge on his or her billing statement, the copy request or charge back will be routed to the central processing system 1106, as this is the ID associated with the transaction. In a similar manner to that described above, the central processing system 1106 will remap the copy request or charge back according to the merchant ID and the limited use credit card number and transmit the copy request or the charge back to the merchant 1102 via the switch 1116 and the network 1104. The merchant 1102 transmits the requested copy or the charge back confirmation to the central processing system 1106 via the network 1104 and the switch 1116 according to the BIN of the limited use card number. The central processing system 1106 then remaps the ID and card number information and forwards the requested copy or charge back information to the processing facility 1112 via the switch 1116.
  • The system 1100 is advantageous in that it reduces communication delays and fees but it requires the addition of the switch 1116. Alternatively, FIG. 14 illustrates central processing system 1406 as a stand alone facility. The authorization, settlement, copy request and charge back transactions described above are equally applicable to FIG. 14, except switch 1116 in FIG. 11 is no longer required. FIG. 14 illustrates that communication between central processing system 1406 and card issuing bank's processing facility 1412 can be conducted through existing credit networks 1404. In addition to not requiring a switch, such as switch 1116, in this configuration, a single large central processing system 1406 can offer limited use support to a wide range of issuers, such as bank processing facility 1412. However, this configuration requires increased communication times and potentially increased communication fees.
  • In another exemplary embodiment, the central processing system could be constructed to be a part of the merchant acquirer, instead of the bank processing facility as shown in FIG. 11. This configuration would also require the addition of a switch like switch 1116 but would reduce communication delays and fees.
  • The limited use credit card number and remapping system may also be used in connection with organizations other than banks. For example, the limited use credit card number may be linked to organizations such as utilities, Internet service providers, telephone accounts, fixed or mobile, anonymous prepaid accounts and the like. With such other organizations, there would be no remapping to a master credit card number, but rather to some other account number provided by the organization.
  • Linking a limited use credit card number to other organizations is advantageous for several reasons. First, the organization may have a pre-existing relationship with the user of the limited use credit card number. This relationship provides evidence of the user's credit history with the organization, so no additional credit checks need to be performed, which can be costly and time-consuming for the organization. Second, because the organization is already providing other services to the user, a billing procedure is already established. The time and cost associated with establishing and implementing billing procedures has already been incurred. Minimal cost and effort is associated with adding a section to a billing statement for a limited use credit card number.
  • 2.10. Remote Access Devices for Accessing Limited Use Numbers
  • A card holder may desire to access a list of limited use credit/debit/charge card numbers where the limited use cards are not stored on the card holder's own computer. In the context of modern client server architecture this represents one extreme of the situation where all information storage is at the server. The previous description for local storage indicates the situation of a client program with a significant amount of local functionality. Between these two extremes a range of intermediary client server arrangements such as a “thin client” with minimal functionality obtaining limited use numbers from the server as required. The combination of encryption and dynamic passwords, as described herein, or any suitable alternative form of use identification allows a card holder to have “multiple wallets”, i.e., a card holder can access limited use numbers from different devices, without the need to transmit credit card numbers.
  • As discussed above, software and limited use numbers can be issued via electronic communication media. In one embodiment, a card holder can access limited use credit card numbers during electronic transactions via a Remote Access Device, referred to herein as “RAD”, such as the Orbis Internet Card□. The overall layout of the RAD system 1500 is shown in FIG. 15 and a flow chart illustrating an exemplary method of providing remote access devices for accessing limited use credit card numbers is shown in FIG. 16. In general, the operation of the complete system from registration to completion of a transaction follows.
  • When a user desires to register with RAD system 1500, the user submits user authentication information, the master account number and other identifying data for entry into a database 1502. (Step 1602). To register with RAD system 1500, the user must be a valid holder/user of the master credit card or account number. (Step 1604). Once registered, step 1606, the user obtains a RAD 1504, step 1608. RAD 1504 includes a software package to which enables communication with a remote access device support server, referred to herein as a RAD support server 1506, such as the Nexus User Support Server□, to enable the issuance of limited use card numbers.
  • When the user initiates communication with RAD support server 1506, step 1610, RAD support server 1506 first authenticates the user. (Step 1612). If successfully authenticated, the user can then request a limited use number (step 1614) specifying any additional transaction limitations desired as discussed herein. (Step 1616) RAD support server 1506 issues a request over a network to a central processing station 1508 for a limited use number with the one or more specified limitations. The limited use number provided in response to the request is associated with a specific RAD system user identification previously assigned to the user.
  • The central processing station 1508 obtains the next available limited use number. (Step 1618). Once obtained, the limited use number, and the specified limitations, is entered into database 1502 such that the limited use number is associated with the user's information already in database 1502. (Step 1620). The limited use number is then transmitted to the RAD support server 1506 for issuance to the user via RAD 1504. (Step 1622). RAD software package 1504 displays the limited use number. The user can transfer this limited use number to a web site for initiating a transaction. Transferring this number to a web site can be achieved by dragging and dropping the number onto the web page, by software-simulated key-stroke entry, by “one-click” methods, or by other suitable methods known to one skilled in the art.
  • When a merchant 1510 receives a transaction utilizing a limited use number from RAD system 1506, the transaction details are handled in the same manner as an existing number since limited use card numbers share the same format as existing credit card numbers. The transaction details are transferred to the merchant acquirer and then routed onto the appropriate issuer on the basis of the leading digits of the limited use number, i.e., BIN, via central processing station 1508. The BIN is registered with central processing station 1508 to ensure appropriate routing.
  • As described above, central processing station 1508 verifies the validity of the limited use number and ensures that the transaction meets all specified limitations. If the limited use number is valid and the transaction met the specific limitations, central processing station 1508 enters the master credit card number into the transaction message in place of the limited use number. Central processing station 1508 then transmits the transaction message to the issuer's processing facility 1512 as a normal authorization request. The issuer's processing facility 1512 transmits an authorization for the master card number, if appropriate, to central processing facility 1508. Central processing facility remaps the master card number to the limited use number and the transaction message is transmitted to the originating merchant acquirer and then the merchant. Central processing station 1508 also updates the limitations and validity of the limited use number according to the details of the transaction. The limitation and validity updating is best done following verification of available funds so that a limited use number with a cumulative value limit is only decremented in value if the transaction can be completed. If limitation and validity updating is done prior to checking for the availability/validity of the linked or principal account then certain updates will need to be reversed in the case of a decline on the linked or principal account. This has a small computational overhead. If the authorization was approved by the issuer's processing facility 1512, the user's purchase can proceed as normal. If declined, a decline message is sent to the merchant.
  • For settlements, the same routing occurs with all transactions deriving from a limited use number obtained from RAD system 1500.
  • The above described system will now be discussed in greater detail.
  • The RAD system 1500 may be configured to provide the user with many features. The RAD system 1500 enables the user to have multiple and different remote devices from which the user may access RAD support server 1506. In addition, it enables a user to have multiple credit card accounts with one or more issuers and to select from amount these multiple accounts. The RAD software package 1504 enables users to have additional passwords associated with an account if desired. The additional passwords can be used, for example, for children and can have additional pre-defined limitations such as a low dollar transaction limits, e.g., $50.00, or merchant class restrictions, e.g., gas stations.
  • The RAD software package 1504 includes a simple intuitive interface for the ease of the user, the appearance of which may be customizable without modification to the underlying code. The RAD 1504 may use images that relate to the front and back of a credit card to provide key areas of functionality. The back of the RAD 1504 includes an interactive panel with a magnetic stripe for providing additional information and/or advertising panels. The interactive panel/stripe area provides for password entry and functional selections. Upon activation, the front of RAD 1504 may be configured to provide additional functions, e.g., those required to initiate an on-line purchase. As discussed herein, supplying information required for on-line purchases can be automated in a number of ways including “clicking and transferring” the information, “dragging and dropping” the information, or “one click shopping.”
  • In one embodiment, the RAD software package 1504 is configured to issue a sequence of paired numbers which are securely issued and activated and/or decrypted by oral or written authorization, such as the communication of a password. These paired numbers include an identifier code and a mask code. In order to retrieve a limited use number, a user at a remote device identifies himself or herself using his or her a RAD software 1504 by transmitting the identifier code, such as a dynamic password to RAD support server 1506. The RAD support server 1506 compares the identifier code with the particular RAD software package 1504 and accepts, or validates, the identifier code if appropriate. If valid, RAD support server 1506 determines the matching mask code for that identifier code from database 1502. The RAD support server 1506 uses the mask code to encrypt the limited use card number as described above, and transmits this encrypted code to the user. The RAD software 1504 decrypts the encrypted code using the known mask code and reconstructs the initial digits, the BIN number and the checksum digit. The RAD software 1504 then arranges this information and reconstructs the limited use card number.
  • The RAD support server 1506 is an Internet based server that interfaces the RAD 1504 and the central processing station 1508. The RAD support server 1506 receives requests for limited use numbers from users, validates each user, if appropriate, and supplies and validates limited use card numbers with specific limitations, as requested by each user, if appropriate. Such requests may be processed in any desired order, e.g., first come first served basis. The RAD support server 1506 may also be configured to provide for location identification verification, secure delivery of limited use numbers, automated completion of payment fields in a merchant's web page order form, review of previous transactions, access to additional issuer services and advertising. The RAD location identification verification is verifying the physical source of the request for a limited use number, e.g., home, office, ATM machine. This additional identification is evidence to limit a user's ability to deny a transaction. The RAD support server 1508 can be configured to require additional identification of the user if the RAD is being used from a physical source which is unknown to the RAD support server or which has not been previously associated with the RAD by the user.
  • To accomplish the above tasks, the RAD support server 1506 should have a high bandwidth Internet connection and highly secure firewalls to insulate critical information from undesired access. Communications between the RAD support server 1506 and the RAD 1504 is may be Internet based. Communication between the RAD support server 1506 and the central processing station 1508 and the database 1502 may be secured via private networks for additional security. In addition, to provide for additional security, the RAD support server 1506, the central processing station 1508 and database 1502 may be located at the same physical location, for example, the issuer's processing facility or some other facility which meets the standards set for banking processing facilities.
  • Communication between the RAD 1504 and the RAD support server 1506 can use industry standard security protocols appropriate to the platform. For example, secure socket layer (SSL) encryption may be used in the case of communication by a personal computer of the Internet. Alternatively, one of the encryption schemes described herein may be implemented alone or in combination with password protection and/or smart card user authentication. Such communication security can be selectable by the issuer. For example, issuers can select what type of communication security they desire from a range of options.
  • 3. Controlled Payment Number (CPN) Applications
  • As can be seen from the above, the described limited-use credit card numbers can be provided with user defined controls on how the numbers can be used. Hence, the phrase “controlled payment numbers” describes products which embody the invention described herein.
  • To appreciate how a software and hardware platform embodying the invention can be used to generate a range of payment products that span the virtual, wireless and real worlds it is necessary to consider the components of the complete platform and how these can be used in various combinations. To a large extent, remarkably distinct payment products can be derived using the existing platforms such as the RAD system 1500 of FIG. 15 in a range of configurations. Addition of standard additional components and interfaces further broadens the potential scope. The RAD system platform 1500 has been designed from the outset to support such applications. This provides a rapid development path for new payment products since development requirements are limited primarily to designing new client side components for configuring and controlling CPN payments.
  • At the heart of the CPN platform are a number of core components:
      • A card number generating and allocation system (e.g., support server 1508) that allows for additional controls to allocated to the cards in a dynamic manner.
      • A card issuing process for distribution of CPN's to users that supports industry standard protocols, such as shown in FIGS. 5 and 6.
      • A card authorization and settlement process (e.g., FIGS. 7 and 8) that provides additional verification and validation of cards against the current set of controls that have been set up for that card.
      • A mechanism for relating a specific CPN to an existing credit card, debit card or general financial account (e.g., FIGS. 11, 12 and 13).
  • The platform may be implemented with part as a personal computer connected to the Internet to provide communication with the card issuer. The customer can set a range of limitations as determined by the issuer and the card number is issued in virtual form to the users computer (usually) for immediate use.
  • This arrangement is ideal for e-commerce applications but, by altering how the core component functions are implemented and integrated, a range of additional applications can be produced. These applications can be broadly divided into:
  • 1. Card present Transactions;
  • 2. MOTO (Mail Order and Telephone Order); and
  • 3. Wireless applications.
  • Specifically these applications can be implemented by varying: (1) the patterns of how the controls on specific numbers are combined, (2) the controls available to user(s), (3) who sets the controls and when, (4) how the controls are communicated to the processing system, (5) the communication device(s) or channels used to deliver an issued CPN to the user, (6) the form in which the CPN is issued (virtual via software, voice generated, text message, paper receipt, paper credit card card, plastic credit card), and (7) the form in which the CPN is presented to the merchant.
  • The core transaction processing system for authorization and settlement is not altered to any significant degree by any of these implementation variations. In addition most of the core back end systems for number generation, account generation, linkage to other accounts, customer service and maintenance remain unaltered. The architecture for issuing numbers to users supports a range of interfaces so the same architecture can support computer based, phone, interactive TV or internal bank issuing for physical implementations. The high degree of re-usability of core platform components is a key advantage in supporting the commercial viability of these other products.
  • The following sections elaborate on these principles to indicate how in practical terms the system would operate and how a consumer would use the system in the various manifestations.
  • 3.1 Card Present Applications
  • There are considerable opportunities to create new payment products by issuing fixed number plastic cards with flexibility and control provided by the present invention. There are applications of this approach in both the consumer and business markets.
  • In these applications, new payment products can be created by placing “intelligence” within the card processing system. A critical additional step is the creation of new communication channels between these processing systems and a card issuer/card holder.
  • These communication channels which can include PC computer interfaces, PDA interfaces, mobile phone/telephony interfaces, ATM interfaces.
  • In combination with an issuer's capability to configure specific card products, these additional dynamic control features provide a mechanism for a traditional plastic payment card to be turned into a range of new products. In effect, the present invention creates “instantly configurable plastic payment cards”. This capability can be combined with conventional credit cards, debit cards and pre-paid cards.
  • 3.1.1 Consumer Applications
  • There are range of consumer applications of which a few are listed here.
  • Teen Card
  • Given to a teenager, for example, this card has a pre-set limit transaction amount and/or must be spent at a particular merchant or merchants (or merchant type or types). A parent can receive feedback on card usage and change the spending power by computer interface or mobile phone at any time. This greatly enhances the control provided by existing pre-paid teen cards.
  • Gift Certificate Card
  • Given to someone to spend with a pre-set limit and can be limited to a particular merchant or merchant type. These merchants can be Visa or M/C compatible and protected by signature.
  • Product Rebates
  • A limited use card could be issued with a product that has no value but can be activated by registering the product on-line for instance. The card is then loaded with the product rebate and can be used to purchase something on-line or at a retail store limited to the amount of the rebate. This will greatly reduce costs to administer a rebate program associated with e.g., issuing and mailing a check.
  • Insurance Card
  • A limited use card could be issued with an insurance policy or by a loss-adjuster at a visit following a claim. The company or the loss adjuster could provide instant card activation by computer or mobile phone to allow the consumer to spend an amount appropriate to immediate needs.
  • 3.1.2 Corporate Applications
  • For corporate applications the controls inherent in CPN technology together with the capability to support a range of communication systems to set up controls for a specific account provide a powerful business tool. Examples include:
  • Company Bonus
  • Given to employees as a bonus this limited use credit card number can be used anywhere Visa or M/C is accepted or alternatively limited to a particular merchant or merchant type. Cards can be issued and the company can set the reward amounts via a PC-computer interface. All charges can be billed to a central company account.
  • Company Expense Travel Account
  • This limited use card can be given to employees for specific trips. The expense budget and types of expense can be set by the employer at the start of the trip and the account deactivated until the next trip.
  • Purchasing Account with Integrated PO Request
  • This limited use card can be given to employees company purchases and pre-configured for specific rules (e.g., maximum single purchase amount and monthly expenditure). To extent these rules apply the employee can make a request via a PC or mobile phone to the company purchasing system. If approved, the company system can automatically extend the purchasing capability of the specific card and the employee receives a confirmation and purchase order number.
  • 3.1.3 Mail Order/Telephone Order (MOTO)
  • The acceptability of CPN's at any VISA/Mastercard/Europay accepting merchant is a key advantage of CPN technology. This means that the existing computer based system can be for mail order and telephone order with any alterations. Having said that, the current system is not specifically directed at MOTO users and users may not appreciate this capability. In addition many existing MOTO users may not have access to the Internet at the time of placing a MOTO order or indeed have Internet access at all. Without a credit card, telephone orders can be almost impossible. All the manifestations described below could also be provided linked to a bank account or pre-paid account.
  • The following represent specific products more specifically marketed the MOTO market. As with the potential cross over between Internet and MOTO usage, these MOTO products could also be used in Internet applications.
  • 3.1.4 Telephone Interfaces for CPN Delivery
  • Mobile telephony interfaces can allow both WAP (Web Access Protocol) and i-mode interaction with servers providing the CPN capabilities. This provides for authentication by password or PIN and delivery of a CPN via a simple interface for display on the screen. CPN's can also be issued by SMS (Silicon Integrated Systems), which has the additional benefit of providing automatic storage of the number for later use. Review of statements is also possible via this interface. The core functionality for MOTO orders are very similar to Internet orders and so no major differences are required in terms of additional functionality, though the functionality is best limited in line with the small screens of current mobile telephones. This application would also be well suited to web-kiosk applications where users may not want to enter authentication credentials into public systems. There is currently increasing interest in “in-store” kiosks to provide additional product lines. This implementation of the web-kiosk is designed specifically for making purchases and the mobile CPN will ideally suit such a combined “clicks and mortar” transaction.
  • This application, the mobile CPN, provides a suitable platform for MOTO or Internet payments. In this situation the mobile phone is used as a private and personal means of authenticating the user and delivering the number to the user.
  • 3.1.5 Alternative Web Access Devices
  • It is expected that web access will increasingly involve non-PC devices such as PDA's, set-top TV boxes, Interactive TV and “smart” consumer devices. The CPN platform architecture provides for seamless integration of a wide range of web-access devices into a standard Orbiscom implementation. The CPN platform can be used with interactive TV, which provides for integration of the purchasing process with “TV browsing”.
  • 3.1.6 MOTO/Web Only Plastic/Paper Card
  • Issuing a MOTO/Web only card with no embossed figures can be implemented within the CPN platform with the export of CPN's to a card production process.
  • In combination with the CPN platform this approach has a number of advantages even though the number is fixed and used for a number of transactions.
      • Greatly reduced re-issue costs for compromised cards. This is especially true in a chip environment where card re-issue costs are greatly increased. Also it greatly reduces the inconvenience involved in re-issuing a card.
      • A physical card is useful when collecting tickets for example.
      • Additional controls from the Orbiscom platform provide for the flexible control of the overall limit.
      • Controls can be applied to create specific mail order merchant cards with incentives by applying merchant ID controls.
      • The CPN platform provides for simple integration into an existing credit facility or account without the need to create a separate credit line.
  • Controls can be set-up by an issuer or via a telephone or computer interface as with other limited use credit card number products. These interfaces could provide for additional functions such as on-line statements.
  • 3.1.7 MOTO-Only Account Number Distribution Options
  • In addition to the above card based solution, a system of distributing numbers without cards could be incorporated in the paper billing distribution system. This could involve printing an additional number(s) on a statement or other paper document as explained above.
  • Customers could also be sent a new MOTO only number in the form of a sticker that could be attached to an existing card, on expiry the number is simply removed. An alternative MOTO number could also be printed on the back of an existing credit card when a new card is issued.
  • 3.1.8 ATM Delivery of CPN Numbers and or Cards
  • The ATM network provides an existing integrated network that provides:
      • user authentication
      • a configurable user interface
      • an interface to process customer requests
      • a screen and printing system to provide visual and printed information for the
      • capability for delivering other physical materials (cash, stamps and potentially magnetic stripe cards).
  • This provides a means for providing CPN numbers or cards for a range of card-not present applications. This route is particularly suitable for people who do not possess a credit card but wish to purchase goods over the Internet, telephone or mail order.
  • 3.1.9 Unique CPN Transactions for MOTO
  • The above physical manifestations of the Orbiscom platform for MOTO use a fixed number with variable controls. It is also possible to issue a series of numbers on a single card or device that users use one at a time. A mechanism is required to ensure that user can simply keep track of numbers that have been used. A range of options are possible for including peel of labels where after use a CPN label is removed revealing an additional number underneath. Alternatively scratch off cards like lottery cards could be used to ensure that a number is only revealed when a user wishes to use the card.
  • 4. Wireless Card Present Applications
  • CPN payments can be presented by developments in wireless and telephony applications most notably Bluetooth and other emerging short range wireless technologies (e.g., Ultra Wide Band) and the advances in mobile phone capabilities.
  • The use of Bluetooth-enabled smart card readers communicating with POS (point of sale) terminals, or mobile network operators allowing users to buy products and pay for them on their bills. However, smart cards have not yet been widely deployed, and mobile network operators do not have a track record in e-commerce payments. A better solution is offered by the present invention, which utilizes the existing credit card network.
  • In operation, a Bluetooth enabled WAP phone, of instance, would be used to retrieve a CPN. The following steps would take place:
    • 1. The user would connect to the issuer's website using the WAP phone, and would log in and request a CPN.
    • 2. The issuer's web server would communicate with the Orbiscom server, which would issue an CPN with the required controls and link to the users account (either set by the user at the time or using pre-determined default values).
    • 3. The CPN would be returned to the user's WAP phone over the mobile network.
    • 4. The user would instruct the Bluetooth-enabled WAP phone to discover the POS service of the POS terminal.
    • 5. The phone and POS terminal would establish a Bluetooth connection, using suitable authentication security.
    • 6. The phone would beam the CPN to the POS terminal.
    Signature Authentication
  • Card Present transactions are characterized by visual signature authentication, in which the signature on the credit card is compared to the signature on the sales voucher. A different kind of authentication is required by wireless Card Present transactions. The unique SIM card in every mobile phone can be used as an identification card, and technologies such as fingerprint identification and voice recognition will insure that a stolen phone cannot be used by anyone other than the owner.
  • Mobile POS
  • As well as the familiar card present situations, such as payment at a restaurant, the growth of wireless mobile networks has made possible the development of mobile POS terminals. Up to now, mobile retailers and service providers have been at a disadvantage as the world moves towards a system of cashless transactions. Mobile POS terminals will allow credit card payments on public transport, in taxis, and at open air markets, as well as allowing. It will also be possible to pay by credit card for services such as pizza and grocery delivery, and appliance repair in the home. Card present CPN applications will allow payment in all of these situations.
  • Smart Cards
  • As credit cards migrate to smart card technology, the payment possibilities will broaden. Smart cards are an ideal method of authenticating users with a card issuer during issuing of CPN numbers in a virtual environment. The transaction specific nature of CPN payments enables linkage of a smart card authentication step to a specific payment without requiring merchants or acquirers to implement authentication technology.
  • In addition several additional possibilities exist for storing CPN numbers in smart cards for card present use. For example, Ericsson's prototype Wireless Wallet is a real wallet that contains a smart card reader and a WAP server, and allows the user to browse the cards in the wallet from a WAP phone. CPNs could be stored on a smart card for use when needed. You could simply browse the cards in the wallet, and select the CPN to be sent to the POS terminal, all without taking the wallet from your pocket.
  • 3G Phones
  • Third generation mobile phones and hand-held devices will be capable of requesting and storing CPN's, of displaying internet content much richer than the current WAP phones, and of running feature rich applications such as the CPN system in accordance with the present invention. The march of technology will continue to create new opportunities for card payments, and CPN technology will be there to provide the security needed.
  • While the foregoing description makes reference to particular illustrative embodiments, these examples should not be construed as limitations. Not only can the inventive system be modified for other card numbered systems; it can also be modified for other computer networks or numbering schemes. Thus, the present invention is not limited to the disclosed embodiments, but is to be accorded the widest scope consistent with the claims below.

Claims (35)

What is claimed:
1. A method for processing a transaction initiated by a customer presenting a personalized gift card number to a merchant, the method comprising the steps of:
associating, in a database, a plurality of merchant identifiers and a predetermined amount with the personalized gift card number;
receiving, in a central processing system, the personalized gift card number, a transaction amount, and a merchant identification number electronically routed from the merchant;
determining electronically whether the personalized gift card number has been deactivated because the predetermined amount has been satisfied;
electronically determining whether the merchant identification number corresponds to one of the plurality of merchant identifiers associated with the personalized gift card number;
electronically determining whether authorization can be obtained against the personalized gift card number based on the merchant identification number determining step, the received transaction amount, and the predetermined amount; and
electronically transmitting a signal to the merchant with the results of the authorization determining step for the personalized gift card number.
2. The method of claim 1, further comprising:
transmitting a signal to the merchant denying authorization if the personalized gift card number has been deactivated.
3. The method of claim 1, further comprising:
authorizing the transaction based on the results of the authorization determining step.
4. The method of claim 3, further comprising:
subtracting the transaction amount from the predetermined amount associated with the personalized gift card in the database.
5. The method of claim 1, further comprising:
declining authorization of the transaction based on the results of the authorization determining step.
6. The method of claim 1, wherein the personalized gift card number is associated with a master account number of an account holder.
7. The method of claim 6, further comprising:
electronically transmitting a signal to a facility which issued the personalized gift card number, the signal including original transaction details but with the personalized gift card number remapped to be the master account number if the personalized gift card number has not been deactivated,
wherein the authorization determining step includes electronically determining whether authorization can be obtained against the master account number.
8. The method of claim 7, wherein the personalized gift card number is linked to an organization selected from a group consisting of: a utility, a public network service provider, a telephone company, a bank account, a prepaid account, and a credit card issuer.
9. The method of claim 8, further comprising:
transmitting a signal to the organization which is linked to the personalized gift card number, the signal including the original transaction details if the personalized gift card number has not been deactivated;
performing a credit check to determine whether authorization can be obtained against the personalized gift card number; and
transmitting a signal to the merchant with the results of the authorization determining step for the personalized gift card number.
10. The method of claim 1, wherein the predetermined amount corresponds to a funding amount for a predetermined number of transactions.
11. The method of claim 10, wherein the predetermined number of transactions is one of: a single transaction, a plurality of transactions, and a number of recurring transactions.
12. A method for conducting a transaction involving a personalized gift card number, the method comprising the steps of:
initiating a transaction by a customer presenting the personalized gift card number to a merchant electronically or in person;
electronically routing the personalized gift card number to a central processing system;
determining electronically whether the personalized gift card number has been deactivated because a predetermined amount associated with the personalized gift card number has been satisfied;
electronically determining whether a merchant identification number associated with the merchant corresponds to one of a plurality of merchant identifiers associated with the personalized gift card number;
electronically determining whether authorization can be obtained against the personalized gift card number based on the merchant identification number determining step, the predetermined amount associated with the personalized gift card number, and a transaction amount of the transaction; and
electronically transmitting a signal to the merchant with the results of the authorization determining step for the personalized gift card number.
13. A method for implementing a personalized gift card system, the method comprising:
maintaining a pool of credit card numbers which share identical formatting;
assigning at least one credit card number from the pool of credit card numbers to be a personalized gift card number which is deactivated upon use of a predetermined amount which occurs subsequent to assignment of the at least one credit card number;
associating the predetermined amount with the personalized gift card number;
determining whether to deactivate the personalized gift card number when the personalized gift card number was used to perform a transaction, and for generating a deactivation command in response thereto, wherein the determining step of whether to deactivate the personalized gift card number determines whether the predetermined amount has been used to fund transactions, and if so, generates the deactivation command when the predetermined amount has been used; and
deactivating the personalized gift card number based on the deactivation command,
wherein the personalized gift card number is valid for use at a plurality of merchants for at least one financial transaction totaling up to the predetermined amount.
14. The method of claim 13, further comprising:
associating a master account number with the personalized gift card number, while ensuring that the master account number cannot be discovered on the basis of the personalized gift card number.
15. The method of claim 13, wherein the predetermined amount corresponds to a funding amount for a predetermined number of transactions.
16. The method of claim 15, wherein the predetermined number of transactions is one of: a single transaction, a plurality of transactions, and a number of recurring transactions.
17. The method of claim 13, further comprising:
transmitting, to a receiver, a personalized gift card associated with the personalized gift card number in electronic or physical form.
18. The method of claim 13, further comprising:
associating the personalized gift card number with a message received from a gift provider, wherein the message is displayed to a receiver of the personalized gift card number upon use of the personalized gift card number.
19. A system for processing a transaction initiated by a customer presenting a personalized gift card number to a merchant, the system comprising:
a database configured to store a plurality of merchant identifiers and a predetermined amount associated with the personalized gift card number;
a receiving device configured to receiving the personalized gift card number, a transaction amount, and a merchant identification number electronically routed from the merchant;
a processing device configured to
determine electronically whether the personalized gift card number has been deactivated because the predetermined amount has been satisfied,
electronically determine whether the merchant identification number corresponds to one of the plurality of merchant identifiers associated with the personalized gift card number, and
electronically determine whether authorization can be obtained against the personalized gift card number based on the merchant identification number determining step, the received transaction amount, and the predetermined amount; and
a transmitting device configured to electronically transmit a signal to the merchant with the results of the authorization determination for the personalized gift card number.
20. The system of claim 19, wherein the transmitting device is further configured to electronically transmit a signal to the merchant denying authorization if the personalized gift card number has been deactivated.
21. The system of claim 19, wherein the processing device is further configured to authorize the transaction based on the results of the authorization determination.
22. The system of claim 21, wherein the processing device is further configured to subtract the transaction amount from the predetermined amount associated with the personalized gift card number.
23. The system of claim 19, wherein the processing device is further configured to decline authorization of the transaction based on the results of the authorization determination.
24. The system of claim 19, wherein the personalized gift card number is associated with a master account number of an account holder.
25. The system of claim 24, wherein the transmitting device is further configured to electronically transmit a signal to a facility which issued the personalized gift card number, the signal including original transaction details but with the personalized gift card number remapped to be the master account number if the personalized gift card number has not been deactivated, and
wherein the authorization determination includes electronically determining whether authorization can be obtained against the master account number.
26. The system of claim 25, wherein the personalized gift card number is linked to an organization selected from a group consisting of: a utility, a public network service provider, a telephone company, a bank account, a prepaid account, and a credit card issuer.
27. The system of claim 26, wherein
the transmitting device is further configured to electronically transmit a signal to the organization which is linked to the personalized gift card number, the signal including the original transaction details if the personalized gift card number has not been deactivated,
the processing device is further configured to perform a credit check to determine whether authorization can be obtained against the personalized gift card number, and
the transmitting device is further configured to electronically transmit a signal to the merchant with the results of the authorization determination for the personalized gift card number.
28. The system of claim 19, wherein the predetermined amount corresponds to a funding amount for a predetermined number of transactions.
29. The system of claim 28, wherein the predetermined number of transactions is one of: a single transaction, a plurality of transactions, and a number of recurring transactions.
30. A system for conducting a transaction involving a personalized gift card number, the system comprising:
an initiating device configured to initiate a transaction by a customer presenting the personalized gift card number to a merchant electronically or in person;
a routing device configured to electronically route the personalized gift card number to a central processing system;
a processing device configured to
determine electronically whether the personalized gift card number has been deactivated because a predetermined amount associated with the personalized gift card number has been satisfied,
electronically determine whether a merchant identification number associated with the merchant corresponds to one of a plurality of merchant identifiers associated with the personalized gift card number, and
electronically determine whether authorization can be obtained against the personalized gift card number based on the merchant identification number determination, the predetermined amount associated with the personalized gift card number, and a transaction amount of the transaction; and
a transmitting device configured to electronically transmit a signal to the merchant with the results of the authorization determination for the personalized gift card number.
31. A personalized gift card system, comprising:
a database configured to store a pool of credit card numbers which share identical formatting;
an assignment device configured to assign at least one credit card number from the pool of credit card numbers to be a personalized gift card number which is deactivated upon use of a predetermined amount which occurs subsequent to assignment of the at least one credit card number,
an associating device configured to associate the predetermined amount with the personalized gift card number; and
a processing device configured to
determine whether to deactivate the personalized gift card number when the personalized gift card number was used to perform a transaction, and to generate a deactivation command in response thereto, wherein the determination of whether to deactivate the personalized gift card number determines whether the predetermined amount has been used to fund transactions, and if so, generates the deactivation command when the predetermined amount has been used, and
deactivate the personalized gift card number based on the deactivation command,
wherein the personalized gift card number is valid for use at a plurality of merchants for a plurality of financial transactions totaling up to the predetermined amount.
32. The system of claim 31, wherein the associating device is further configured to associate a master account number with the personalized gift card number, while ensuring that the master account number cannot be discovered on the basis of the personalized gift card number.
33. The system of claim 31, wherein the predetermined amount corresponds to a funding amount for a predetermined number of transactions.
34. The system of claim 33, wherein the predetermined number of transactions is one of: a single transaction, a plurality of transactions, and a number of recurring transactions.
35. The system of claim 31, further comprising a transmitting device configured to transmit, to a receiver, a personalized gift card associated with the personalized gift card number in electronic or physical form.
US13/829,514 1998-03-25 2013-03-14 Credit card system and method Abandoned US20130204781A1 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
US13/829,514 US20130204781A1 (en) 1998-03-25 2013-03-14 Credit card system and method

Applications Claiming Priority (11)

Application Number Priority Date Filing Date Title
IES980223 1998-03-25
IES980223 1998-03-25
IES980346 1998-05-07
IES980346 1998-05-07
IES980458 1998-06-15
IES980458 1998-06-15
US09/235,836 US6636833B1 (en) 1998-03-25 1999-01-22 Credit card system and method
US09/506,830 US7571142B1 (en) 1998-03-25 2000-02-18 Credit card system and method
US10/160,178 US7567934B2 (en) 1998-03-25 2002-06-04 Credit card system and method
US12/268,063 US9881298B2 (en) 1998-03-25 2008-11-10 Credit card system and method
US13/829,514 US20130204781A1 (en) 1998-03-25 2013-03-14 Credit card system and method

Related Parent Applications (1)

Application Number Title Priority Date Filing Date
US12/268,063 Continuation US9881298B2 (en) 1998-03-25 2008-11-10 Credit card system and method

Publications (1)

Publication Number Publication Date
US20130204781A1 true US20130204781A1 (en) 2013-08-08

Family

ID=49356554

Family Applications (11)

Application Number Title Priority Date Filing Date
US09/235,836 Expired - Lifetime US6636833B1 (en) 1998-03-25 1999-01-22 Credit card system and method
US09/506,830 Expired - Fee Related US7571142B1 (en) 1998-03-25 2000-02-18 Credit card system and method
US09/665,574 Expired - Lifetime US7136835B1 (en) 1998-03-25 2000-09-18 Credit card system and method
US09/691,175 Expired - Lifetime US7593896B1 (en) 1998-03-25 2000-10-19 Credit card system and method
US10/160,178 Expired - Fee Related US7567934B2 (en) 1998-03-25 2002-06-04 Credit card system and method
US12/219,952 Expired - Fee Related US8676707B2 (en) 1998-03-25 2008-07-30 Credit cards system and method having additional features
US12/268,063 Expired - Fee Related US9881298B2 (en) 1998-03-25 2008-11-10 Credit card system and method
US12/359,971 Expired - Fee Related US8756150B2 (en) 1998-03-25 2009-01-26 Credit card system and method
US13/829,514 Abandoned US20130204781A1 (en) 1998-03-25 2013-03-14 Credit card system and method
US14/150,231 Abandoned US20140122340A1 (en) 1998-03-25 2014-01-08 Credit card system and method having additional features
US14/264,110 Expired - Lifetime US9898730B2 (en) 1998-03-25 2014-04-29 Credit card system and method

Family Applications Before (8)

Application Number Title Priority Date Filing Date
US09/235,836 Expired - Lifetime US6636833B1 (en) 1998-03-25 1999-01-22 Credit card system and method
US09/506,830 Expired - Fee Related US7571142B1 (en) 1998-03-25 2000-02-18 Credit card system and method
US09/665,574 Expired - Lifetime US7136835B1 (en) 1998-03-25 2000-09-18 Credit card system and method
US09/691,175 Expired - Lifetime US7593896B1 (en) 1998-03-25 2000-10-19 Credit card system and method
US10/160,178 Expired - Fee Related US7567934B2 (en) 1998-03-25 2002-06-04 Credit card system and method
US12/219,952 Expired - Fee Related US8676707B2 (en) 1998-03-25 2008-07-30 Credit cards system and method having additional features
US12/268,063 Expired - Fee Related US9881298B2 (en) 1998-03-25 2008-11-10 Credit card system and method
US12/359,971 Expired - Fee Related US8756150B2 (en) 1998-03-25 2009-01-26 Credit card system and method

Family Applications After (2)

Application Number Title Priority Date Filing Date
US14/150,231 Abandoned US20140122340A1 (en) 1998-03-25 2014-01-08 Credit card system and method having additional features
US14/264,110 Expired - Lifetime US9898730B2 (en) 1998-03-25 2014-04-29 Credit card system and method

Country Status (27)

Country Link
US (11) US6636833B1 (en)
EP (3) EP1029311B2 (en)
JP (1) JP2002508550A (en)
KR (2) KR20010040411A (en)
CN (1) CN1292131A (en)
AP (1) AP2000001918A0 (en)
AR (1) AR014771A1 (en)
AT (1) ATE202647T1 (en)
AU (1) AU748558B2 (en)
BR (1) BR9909065A (en)
CA (2) CA2362033C (en)
DE (2) DE69900169T3 (en)
DK (1) DK1029311T3 (en)
EA (1) EA003027B1 (en)
ES (1) ES2154625T5 (en)
GR (1) GR3036728T3 (en)
HK (1) HK1030472A1 (en)
HU (1) HUP0102408A3 (en)
IE (2) IES81088B2 (en)
IL (2) IL137456A0 (en)
NO (1) NO323708B1 (en)
NZ (1) NZ506636A (en)
PL (1) PL343253A1 (en)
PT (1) PT1029311E (en)
SG (1) SG115360A1 (en)
TR (1) TR200002758T2 (en)
WO (1) WO1999049424A1 (en)

Cited By (16)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20120265682A1 (en) * 2011-03-04 2012-10-18 Citibank, N.A. Methods and Systems Using Contactless Card
US8930274B1 (en) * 2013-10-30 2015-01-06 Google Inc. Securing payment transactions with rotating application transaction counters
US9064268B2 (en) 2010-11-01 2015-06-23 Outerwall Inc. Gift card exchange kiosks and associated methods of use
US9129294B2 (en) 2012-02-06 2015-09-08 Outerwall Inc. Coin counting machines having coupon capabilities, loyalty program capabilities, advertising capabilities, and the like
US20160086187A1 (en) * 2013-06-17 2016-03-24 Raymond Anthony Joao Apparatus and method for providing transaction security and/or account security
US9799014B2 (en) 2011-11-23 2017-10-24 Coinstar Asset Holdings, Llc Mobile commerce platforms and associated systems and methods for converting consumer coins, cash, and/or other forms of value for use with same
US20180150837A1 (en) * 2016-11-29 2018-05-31 Mastercard International Incorporated System and method for delivering a cashless gift useable during a cashless transaction
US10346819B2 (en) 2015-11-19 2019-07-09 Coinstar Asset Holdings, Llc Mobile device applications, other applications and associated kiosk-based systems and methods for facilitating coin saving
US10546462B2 (en) * 2014-09-18 2020-01-28 Gamblit Gaming, Llc Pseudo anonymous account wagering system
US10885746B2 (en) 2017-08-09 2021-01-05 Raymond Anthony Joao Sports betting apparatus and method
US10891610B2 (en) 2013-10-11 2021-01-12 Visa International Service Association Network token system
US11069195B2 (en) 2017-08-09 2021-07-20 Raymond Anthony Joao Sports betting apparatus and method
US11093936B2 (en) 2013-07-24 2021-08-17 Visa International Service Association Systems and methods for communicating token attributes associated with a token vault
US11568405B2 (en) 2014-06-05 2023-01-31 Visa International Service Association Identification and verification for provisioning mobile application
US11922429B2 (en) 2005-07-22 2024-03-05 Gtj Ventures, Llc Transaction security apparatus and method
US12008523B2 (en) * 2015-08-01 2024-06-11 Bitnote, Inc. Single-use multi-layered ticket and redeeming technique

Families Citing this family (1231)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6119101A (en) 1996-01-17 2000-09-12 Personal Agents, Inc. Intelligent agents for electronic commerce
US20050027618A1 (en) * 1996-01-17 2005-02-03 Privacy Infrastructure, Inc. Third party privacy system
US7171560B2 (en) 1998-06-22 2007-01-30 Semtek Solutions, Inc. Method and apparatus for securing and authenticating encoded data and documents containing such data
US6636833B1 (en) * 1998-03-25 2003-10-21 Obis Patents Ltd. Credit card system and method
US20030171992A1 (en) 1999-04-23 2003-09-11 First Data Corporation System and methods for redeeming rewards associated with accounts
US20040049452A1 (en) * 2002-09-09 2004-03-11 First Data Corporation Multiple credit line presentation instrument
US6131811A (en) 1998-05-29 2000-10-17 E-Micro Corporation Wallet consolidator
US20070250442A1 (en) * 1998-08-31 2007-10-25 Hogan Edward J Financial Transaction Card With Installment Loan Feature
US20050049964A1 (en) * 2003-01-14 2005-03-03 Winterer Mary Jo Financial transaction card with automatic payment feature
US8799153B2 (en) 1998-08-31 2014-08-05 Mastercard International Incorporated Systems and methods for appending supplemental payment data to a transaction message
US6315193B1 (en) * 1998-08-31 2001-11-13 Mastercard International Incorporated Financial transaction card with installment loan feature
FI981902A (en) * 1998-09-04 2000-03-05 Sonera Oyj Security module, security system and mobile station
US6339766B1 (en) * 1998-12-02 2002-01-15 Transactionsecure Electronic payment system employing limited-use account number
US7058597B1 (en) * 1998-12-04 2006-06-06 Digital River, Inc. Apparatus and method for adaptive fraud screening for electronic commerce transactions
US7617124B1 (en) * 1998-12-04 2009-11-10 Digital River, Inc. Apparatus and method for secure downloading of files
US20030195974A1 (en) * 1998-12-04 2003-10-16 Ronning Joel A. Apparatus and method for scheduling of search for updates or downloads of a file
CN1439142A (en) 1998-12-23 2003-08-27 大通银行 System and method for integrating trading operations including the generation, processing and tracking of and trade documents
US6324526B1 (en) * 1999-01-15 2001-11-27 D'agostino John System and method for performing secure credit card purchases
EP1028401A3 (en) * 1999-02-12 2003-06-25 Citibank, N.A. Method and system for performing a bankcard transaction
US20040139004A1 (en) * 1999-04-08 2004-07-15 Aceinc Pty Ltd. Secure online commerce transactions
PL351167A1 (en) 1999-04-13 2003-03-24 Orbis Patents Ltd System for carrying on financial operation in person vs. person, person vs. company, company vs. person and company vs. company relationships
WO2000065502A2 (en) 1999-04-23 2000-11-02 First Data Resources Inc. Methods for processing a group of accounts corresponding to different products
US7089208B1 (en) * 1999-04-30 2006-08-08 Paypal, Inc. System and method for electronically exchanging value among distributed users
US20010034705A1 (en) * 1999-05-19 2001-10-25 Rhoads Geoffrey B. Payment-based systems for internet music
GB2367168B (en) * 1999-05-25 2004-02-18 Safepay Australia Pty Ltd System for handling network transactions
EP1222561A2 (en) * 1999-05-28 2002-07-17 The Coca-Cola Company Method and apparatus for surrogate control of network-based electronic transactions
AU781021B2 (en) * 1999-06-18 2005-04-28 Echarge Corporation Method and apparatus for ordering goods, services and content over an internetwork using a virtual payment account
US20020184152A1 (en) * 1999-06-30 2002-12-05 Martin David A. Method and device for preventing check fraud
AU5968000A (en) 1999-07-21 2001-02-13 E-Payments A method for performing a transaction over a network
US8706630B2 (en) 1999-08-19 2014-04-22 E2Interactive, Inc. System and method for securely authorizing and distributing stored-value card data
US6575361B1 (en) * 1999-08-19 2003-06-10 E-2 Interactive, Inc. System and method for managing stored-value card data
EP1077436A3 (en) 1999-08-19 2005-06-22 Citicorp Development Center, Inc. System and method for performing an on-line transaction using a single-use payment instrument
US7814018B1 (en) * 1999-08-27 2010-10-12 Netspend Corporation Charge number issuing and transaction system and method
US7306158B2 (en) * 2001-07-10 2007-12-11 American Express Travel Related Services Company, Inc. Clear contactless card
US7239226B2 (en) 2001-07-10 2007-07-03 American Express Travel Related Services Company, Inc. System and method for payment using radio frequency identification in contact and contactless transactions
US7889052B2 (en) 2001-07-10 2011-02-15 Xatra Fund Mx, Llc Authorizing payment subsequent to RF transactions
US9430769B2 (en) 1999-10-01 2016-08-30 Cardinalcommerce Corporation Secure and efficient payment processing system
US7742967B1 (en) * 1999-10-01 2010-06-22 Cardinalcommerce Corporation Secure and efficient payment processing system
US7240363B1 (en) * 1999-10-06 2007-07-03 Ellingson Robert E System and method for thwarting identity theft and other identity misrepresentations
IL149270A0 (en) * 1999-10-22 2002-11-10 Cyota System and method for secure electronic transactions
US8458086B2 (en) * 1999-11-05 2013-06-04 Lead Core Fund, L.L.C. Allocating partial payment of a transaction amount using an allocation rule
US7904385B2 (en) * 1999-11-05 2011-03-08 American Express Travel Related Services Company, Inc. Systems and methods for facilitating budgeting transactions
US8275704B2 (en) * 1999-11-05 2012-09-25 Lead Core Fund, L.L.C. Systems and methods for authorizing an allocation of an amount between transaction accounts
US20090048885A1 (en) * 1999-11-05 2009-02-19 American Express Travel Related Services Company, Inc. Systems and Methods for Facilitating Cost-Splitting Transactions
US8851369B2 (en) 1999-11-05 2014-10-07 Lead Core Fund, L.L.C. Systems and methods for transaction processing using a smartcard
US7877325B2 (en) * 1999-11-05 2011-01-25 American Express Travel Related Services Company, Inc. Systems and methods for settling an allocation of an amount between transaction accounts
US6876991B1 (en) 1999-11-08 2005-04-05 Collaborative Decision Platforms, Llc. System, method and computer program product for a collaborative decision platform
US6895391B1 (en) 1999-11-09 2005-05-17 Arcot Systems, Inc. Method and system for secure authenticated payment on a computer network
DE19955096B4 (en) * 1999-11-16 2009-10-01 Siemens Ag A method of authenticating a radio communication network to a mobile station and a radio communication network and a mobile station
US7783537B1 (en) 1999-12-01 2010-08-24 Walker Digital, Llc Method and apparatus for conditional payment to a seller
AU4711801A (en) * 1999-12-06 2001-06-18 Rolfe M. Philip Method of masking the identity of a purchaser during a credit transaction
US7720750B2 (en) 1999-12-15 2010-05-18 Equifax, Inc. Systems and methods for providing consumers anonymous pre-approved offers from a consumer-selected group of merchants
WO2001045008A1 (en) * 1999-12-16 2001-06-21 Debit.Net, Inc. Secure networked transaction system
JP2001250068A (en) * 1999-12-27 2001-09-14 Tokyo Mechatronics:Kk Card settlement system utilizing debit card
US7870065B2 (en) 2000-01-05 2011-01-11 Uniteller Financial Services, Inc. Money-transfer techniques
US6938013B1 (en) * 2000-01-05 2005-08-30 Uniteller Financial Services, Inc. Money-transfer techniques
US7720754B1 (en) 2000-01-05 2010-05-18 Uniteller Financial Services, Inc. Money-transfer techniques
JP2001202429A (en) * 2000-01-18 2001-07-27 Star Net Kk Method and system for settlement using portable telephone set and storage medium stored with program for settling method using portable telephone set
US8429041B2 (en) 2003-05-09 2013-04-23 American Express Travel Related Services Company, Inc. Systems and methods for managing account information lifecycles
US8543423B2 (en) 2002-07-16 2013-09-24 American Express Travel Related Services Company, Inc. Method and apparatus for enrolling with multiple transaction environments
US7172112B2 (en) 2000-01-21 2007-02-06 American Express Travel Related Services Company, Inc. Public/private dual card system and method
AU2001232230A1 (en) * 2000-02-08 2001-08-20 Tokyo Mechatronics Co., Limited Prepaid card settlement system and method on internet and apparatus and method for using them
JP2001297288A (en) * 2000-02-08 2001-10-26 Tokyo Mechatronics:Kk System and method for prepaid card clearance using internet and device and method used for the same
US7003501B2 (en) * 2000-02-11 2006-02-21 Maurice Ostroff Method for preventing fraudulent use of credit cards and credit card information, and for preventing unauthorized access to restricted physical and virtual sites
US7822656B2 (en) * 2000-02-15 2010-10-26 Jpmorgan Chase Bank, N.A. International banking system and method
US6834270B1 (en) * 2000-02-28 2004-12-21 Carlo Pagani Secured financial transaction system using single use codes
US20010029485A1 (en) * 2000-02-29 2001-10-11 E-Scoring, Inc. Systems and methods enabling anonymous credit transactions
EP1510984A3 (en) * 2000-03-01 2005-06-08 Passgate Corporation Method, system and computer readable medium for web site account and e-commerce management from a central location
US7865414B2 (en) 2000-03-01 2011-01-04 Passgate Corporation Method, system and computer readable medium for web site account and e-commerce management from a central location
TW550477B (en) * 2000-03-01 2003-09-01 Passgate Corp Method, system and computer readable medium for Web site account and e-commerce management from a central location
US7627531B2 (en) 2000-03-07 2009-12-01 American Express Travel Related Services Company, Inc. System for facilitating a transaction
US8121941B2 (en) * 2000-03-07 2012-02-21 American Express Travel Related Services Company, Inc. System and method for automatic reconciliation of transaction account spend
CA2403283A1 (en) * 2000-03-15 2001-09-20 Edward J. Hogan Method and system for secure payments over a computer network
WO2001069346A2 (en) * 2000-03-16 2001-09-20 Harex Infotech Inc. Optical payment transceiver and system using the same
AU2001257019B2 (en) * 2000-04-11 2007-06-21 Mastercard International Incorporated An improved method and system for conducting secure payments over a computer network
US7379919B2 (en) * 2000-04-11 2008-05-27 Mastercard International Incorporated Method and system for conducting secure payments over a computer network
US20100228668A1 (en) * 2000-04-11 2010-09-09 Hogan Edward J Method and System for Conducting a Transaction Using a Proximity Device and an Identifier
US20020010640A1 (en) * 2000-04-12 2002-01-24 Rana Dutta Technique for securely conducting online transactions
US7698217B1 (en) * 2000-04-20 2010-04-13 Christopher Phillips Masking private billing data by assigning other billing data to use in commerce with businesses
US10521782B2 (en) * 2000-05-15 2019-12-31 Efunds Corporation System for and method of effecting an electronic transaction
US6755341B1 (en) 2000-05-15 2004-06-29 Jacob Y. Wong Method for storing data in payment card transaction
US6592044B1 (en) 2000-05-15 2003-07-15 Jacob Y. Wong Anonymous electronic card for generating personal coupons useful in commercial and security transactions
US6805288B2 (en) 2000-05-15 2004-10-19 Larry Routhenstein Method for generating customer secure card numbers subject to use restrictions by an electronic card
US6609654B1 (en) 2000-05-15 2003-08-26 Privasys, Inc. Method for allowing a user to customize use of a payment card that generates a different payment card number for multiple transactions
US20010056409A1 (en) * 2000-05-15 2001-12-27 Bellovin Steven Michael Offline one time credit card numbers for secure e-commerce
EP1305750A1 (en) * 2000-05-25 2003-05-02 Wilson How Kiap Gueh Transaction system and method
AU2001267188A1 (en) * 2000-06-06 2001-12-17 Albert D. March System and method for transferring funds
US20090150294A1 (en) * 2000-06-06 2009-06-11 March Albert D Systems and methods for authenticating financial transactions involving financial cards
US8046288B1 (en) * 2000-06-13 2011-10-25 Paymentech, Llc System and method for payment data processing
JP4901053B2 (en) * 2000-06-14 2012-03-21 貴子 浄弘 Settlement method using mobile phone and mobile phone
EP1292930A1 (en) * 2000-06-20 2003-03-19 Hubert Juillet Electronic commerce method
WO2002001376A1 (en) * 2000-06-28 2002-01-03 Yozan Inc. Host computer, mobile communication device, program, and recording medium
EP1170685A3 (en) * 2000-06-29 2004-03-03 Hitachi, Ltd. IC card, settlement system and method with IC card
US8195568B2 (en) 2000-06-30 2012-06-05 Tara Chand Singhal Method and apparatus for a payment card system
US20080147564A1 (en) * 2001-06-26 2008-06-19 Tara Chand Singhal Security in use of bankcards that protects bankcard data from merchant systems in a payment card system
JP2002024716A (en) * 2000-07-03 2002-01-25 Juki Corp Method and system for payment
ITMI20001642A1 (en) * 2000-07-19 2002-01-19 D T E Solutions B V HIGH SAFETY ON-LINE PURCHASE PROCEDURE
US20050229003A1 (en) 2004-04-09 2005-10-13 Miles Paschini System and method for distributing personal identification numbers over a computer network
WO2002011019A1 (en) 2000-08-01 2002-02-07 First Usa Bank, N.A. System and method for transponder-enabled account transactions
US8468071B2 (en) * 2000-08-01 2013-06-18 Jpmorgan Chase Bank, N.A. Processing transactions using a register portion to track transactions
US7337145B2 (en) 2000-08-03 2008-02-26 Fujitsu Limited E-money managing method and system, e-money managing/holding medium, computer-readable recording medium in which e-money managing program is recorded, e-value managing/holding medium, and e-value managing method
WO2002013152A1 (en) * 2000-08-08 2002-02-14 Davide Martignon Safety method and system for circulating confidential data on public-access communication means
ES2272533T3 (en) * 2000-08-28 2007-05-01 Axalto S.A. PROCEDURE TO PROVIDE IDENTIFICATION DATA OF A PAYMENT CARD TO A USER.
US7509285B1 (en) * 2000-08-31 2009-03-24 Capital One Financial Corporation Method of establishing a credit limit
DE10043554C2 (en) * 2000-09-01 2002-10-24 Otfried Rumberg Data network based identification procedure
US7233920B1 (en) * 2000-09-07 2007-06-19 Paymentech, L.P. System and apparatus for credit transaction data transmission
US7373372B1 (en) * 2000-09-08 2008-05-13 International Business Machines Corporation Method for accrediting event participants
US7742996B1 (en) * 2000-09-27 2010-06-22 Khai Hee Kwan Computer program, system and method for on-line issuing and verifying a representation of economic value interchangeable for money having identification data and password protection over a computer network
US7337144B1 (en) 2000-09-28 2008-02-26 Microsoft Corporation Method and system for restricting the usage of payment accounts
US7155411B1 (en) * 2000-09-28 2006-12-26 Microsoft Corporation Integrating payment accounts and an electronic wallet
US7552088B2 (en) 2000-10-02 2009-06-23 International Business Machines Corporation Personally customizable credit card accounts
US7360688B1 (en) * 2000-10-16 2008-04-22 Harris Scott C Intelligent credit card system
US6877656B1 (en) * 2000-10-24 2005-04-12 Capital One Financial Corporation Systems, methods, and apparatus for instant issuance of a credit card
JP2004513438A (en) * 2000-10-31 2004-04-30 ウリ テクノロジー インク Electronic commerce system and method
US8145567B2 (en) 2000-10-31 2012-03-27 Wells Fargo Bank, N.A. Transaction ID system and process
US7333953B1 (en) 2000-10-31 2008-02-19 Wells Fargo Bank, N.A. Method and apparatus for integrated payments processing and decisioning for internet transactions
US10915296B2 (en) 2000-11-01 2021-02-09 Flexiworld Technologies, Inc. Information apparatus that includes a touch sensitive screen interface for managing or replying to e-mails
US20150363763A1 (en) * 2000-11-01 2015-12-17 Flexiworld Technologies, Inc, Mobile Information Apparatus That Includes A Secure Element Storing Payment Information And Using A Cryptographic Technique For Implementing Mobile Payment
AU2002243279A1 (en) 2000-11-01 2002-06-18 Flexiworld Technologies, Inc. Controller and manager for device-to-device pervasive digital output
US10860290B2 (en) 2000-11-01 2020-12-08 Flexiworld Technologies, Inc. Mobile information apparatuses that include a digital camera, a touch sensitive screen interface, support for voice activated commands, and a wireless communication chip or chipset supporting IEEE 802.11
US11467856B2 (en) 2002-12-12 2022-10-11 Flexiworld Technologies, Inc. Portable USB device for internet access service
US11204729B2 (en) 2000-11-01 2021-12-21 Flexiworld Technologies, Inc. Internet based digital content services for pervasively providing protected digital content to smart devices based on having subscribed to the digital content service
US9836257B2 (en) 2001-01-19 2017-12-05 Flexiworld Technologies, Inc. Mobile information apparatus that includes intelligent wireless display, wireless direct display, or transfer of digital content for playing over air the digital content at smart televisions, television controllers, or audio output devices
US7379916B1 (en) * 2000-11-03 2008-05-27 Authernative, Inc. System and method for private secure financial transactions
US8285641B2 (en) 2000-11-06 2012-10-09 Jpmorgan Chase Bank, N.A. System and method for selectable funding of electronic transactions
GB0027922D0 (en) * 2000-11-15 2001-01-03 Haidar Mahmoud N Y Electronic payment and associated systems
US6980969B1 (en) * 2000-11-16 2005-12-27 Sears, Roebuck And Co. Methods and apparatus for allowing internet based purchases based on a temporary credit card number
US20020083012A1 (en) * 2000-11-16 2002-06-27 Steve Bush Method and system for account management
US6947995B2 (en) 2000-11-20 2005-09-20 Flexiworld Technologies, Inc. Mobile and pervasive output server
JP2002163584A (en) * 2000-11-24 2002-06-07 Fujitsu Ltd Method for card settlement using portable information terminal and its system
US20070288394A1 (en) * 2000-12-01 2007-12-13 Carrott Richard F Transactional security over a network
US8260723B2 (en) 2000-12-01 2012-09-04 Carrott Richard F Transactional security over a network
US6839692B2 (en) * 2000-12-01 2005-01-04 Benedor Corporation Method and apparatus to provide secure purchase transactions over a computer network
US20040143553A1 (en) * 2000-12-01 2004-07-22 Torget John W. System and method for remotely generating instruments
US20020073345A1 (en) * 2000-12-11 2002-06-13 Joseph Esfahani Secure indentification method and apparatus
US20040078276A1 (en) * 2000-12-22 2004-04-22 Kotaro Shimogori System for electronic merchandising and shopping
JP2002203195A (en) * 2000-12-28 2002-07-19 Sony Corp Ic card collation system and its method
US20020095344A1 (en) * 2001-01-12 2002-07-18 Mares John F. Accounting and business transaction method and system
FR2819662B1 (en) * 2001-01-16 2003-07-04 Schlumberger Systems & Service METHOD OF USING ELECTRONIC PAYMENT CARDS TO SECURE TRANSACTIONS
US20030233317A1 (en) * 2001-01-30 2003-12-18 Nyce Corporation Methods and systems for transferring funds
US8805739B2 (en) * 2001-01-30 2014-08-12 Jpmorgan Chase Bank, National Association System and method for electronic bill pay and presentment
US7689502B2 (en) 2001-02-12 2010-03-30 Capital One Financial Corporation System and method for providing extra lines of credit
US7685060B2 (en) * 2001-02-16 2010-03-23 Morgan Stanley System and method for managing financial account information
US7606744B1 (en) 2001-02-16 2009-10-20 Financial Systems Technology (Intellectual Property) Pty. Ltd. System and method for real-time pricing with volume discounting
US7809650B2 (en) 2003-07-01 2010-10-05 Visa U.S.A. Inc. Method and system for providing risk information in connection with transaction processing
JP4738613B2 (en) * 2001-03-13 2011-08-03 エスアイアイ・データサービス株式会社 Online ticket
US7237117B2 (en) 2001-03-16 2007-06-26 Kenneth P. Weiss Universal secure registry
BR0207533A (en) * 2001-03-16 2004-03-09 Holdings Ltd G Method and system for renewing an identification data element and portable identification device
US7752134B2 (en) * 2001-03-20 2010-07-06 United Parcel Service Of America, Inc. Hybrid credit card transaction system
US7640187B1 (en) 2001-03-30 2009-12-29 Novell, Inc. Anonymous shopping transactions on a network through information broker services
JP2002298045A (en) * 2001-03-30 2002-10-11 Fujitsu Ltd Credit card control method
US7783568B1 (en) * 2001-05-01 2010-08-24 Visa International Service Association Payment services for multi-national corporations
US7739162B1 (en) * 2001-05-04 2010-06-15 West Corporation System, method, and business method for setting micropayment transaction to a pre-paid instrument
US7676430B2 (en) * 2001-05-09 2010-03-09 Lenovo (Singapore) Ptd. Ltd. System and method for installing a remote credit card authorization on a system with a TCPA complaint chipset
US7028052B2 (en) 2001-05-10 2006-04-11 Equifax, Inc. Systems and methods for notifying a consumer of changes made to a credit report
US7542993B2 (en) 2001-05-10 2009-06-02 Equifax, Inc. Systems and methods for notifying a consumer of changes made to a credit report
CA2347396A1 (en) * 2001-05-11 2002-11-11 Webcc Inc. Method and for secure, anonymous electronic financial transactions
US20020184143A1 (en) * 2001-05-14 2002-12-05 Khater Ali Mohamed Khater plus system
US7650314B1 (en) 2001-05-25 2010-01-19 American Express Travel Related Services Company, Inc. System and method for securing a recurrent billing transaction
US7542942B2 (en) * 2001-07-10 2009-06-02 American Express Travel Related Services Company, Inc. System and method for securing sensitive information during completion of a transaction
US7725427B2 (en) 2001-05-25 2010-05-25 Fred Bishop Recurrent billing maintenance with radio frequency payment devices
US7401049B2 (en) * 2001-05-29 2008-07-15 American Express Travel Related Services Company, Inc. System and method for a prepaid card issued by a foreign financial institution
US6796497B2 (en) * 2002-04-23 2004-09-28 American Express Travel Related Services Company, Inc. System and method for facilitating a subsidiary card account
US7899742B2 (en) 2001-05-29 2011-03-01 American Express Travel Related Services Company, Inc. System and method for facilitating a subsidiary card account
US7249092B2 (en) * 2001-05-29 2007-07-24 American Express Travel Related Services Company, Inc. System and method for facilitating a subsidiary card account with controlled spending capability
US10592901B2 (en) 2001-06-04 2020-03-17 Orbis Patents, Ltd. Business-to-business commerce using financial transaction numbers
JP4363800B2 (en) 2001-06-11 2009-11-11 ソニー株式会社 Electronic commerce support apparatus, electronic commerce support method, and computer program
US8280761B1 (en) * 2001-06-15 2012-10-02 West Corporation Method of facilitating contact between a consumer and a requesting entity
WO2003001866A1 (en) * 2001-06-27 2003-01-09 Snapcount Limited Transcation processing
US8294552B2 (en) 2001-07-10 2012-10-23 Xatra Fund Mx, Llc Facial scan biometrics on a payment device
US8548927B2 (en) 2001-07-10 2013-10-01 Xatra Fund Mx, Llc Biometric registration for facilitating an RF transaction
US8635131B1 (en) 2001-07-10 2014-01-21 American Express Travel Related Services Company, Inc. System and method for managing a transaction protocol
US7925535B2 (en) 2001-07-10 2011-04-12 American Express Travel Related Services Company, Inc. System and method for securing RF transactions using a radio frequency identification device including a random number generator
US9031880B2 (en) 2001-07-10 2015-05-12 Iii Holdings 1, Llc Systems and methods for non-traditional payment using biometric data
US8001054B1 (en) 2001-07-10 2011-08-16 American Express Travel Related Services Company, Inc. System and method for generating an unpredictable number using a seeded algorithm
US7503480B2 (en) * 2001-07-10 2009-03-17 American Express Travel Related Services Company, Inc. Method and system for tracking user performance
US7493288B2 (en) 2001-07-10 2009-02-17 Xatra Fund Mx, Llc RF payment via a mobile device
US9454752B2 (en) 2001-07-10 2016-09-27 Chartoleaux Kg Limited Liability Company Reload protocol at a transaction processing entity
US7249112B2 (en) 2002-07-09 2007-07-24 American Express Travel Related Services Company, Inc. System and method for assigning a funding source for a radio frequency identification device
US7805378B2 (en) 2001-07-10 2010-09-28 American Express Travel Related Servicex Company, Inc. System and method for encoding information in magnetic stripe format for use in radio frequency identification transactions
US9024719B1 (en) 2001-07-10 2015-05-05 Xatra Fund Mx, Llc RF transaction system and method for storing user personal data
US7996324B2 (en) 2001-07-10 2011-08-09 American Express Travel Related Services Company, Inc. Systems and methods for managing multiple accounts on a RF transaction device using secondary identification indicia
US20040236699A1 (en) 2001-07-10 2004-11-25 American Express Travel Related Services Company, Inc. Method and system for hand geometry recognition biometrics on a fob
US7668750B2 (en) 2001-07-10 2010-02-23 David S Bonalle Securing RF transactions using a transactions counter
US7119659B2 (en) 2001-07-10 2006-10-10 American Express Travel Related Services Company, Inc. Systems and methods for providing a RF transaction device for use in a private label transaction
US7762457B2 (en) 2001-07-10 2010-07-27 American Express Travel Related Services Company, Inc. System and method for dynamic fob synchronization and personalization
US8279042B2 (en) 2001-07-10 2012-10-02 Xatra Fund Mx, Llc Iris scan biometrics on a payment device
US8960535B2 (en) 2001-07-10 2015-02-24 Iii Holdings 1, Llc Method and system for resource management and evaluation
US7360689B2 (en) 2001-07-10 2008-04-22 American Express Travel Related Services Company, Inc. Method and system for proffering multiple biometrics for use with a FOB
US7735725B1 (en) 2001-07-10 2010-06-15 Fred Bishop Processing an RF transaction using a routing number
US7746215B1 (en) * 2001-07-10 2010-06-29 Fred Bishop RF transactions using a wireless reader grid
US7705732B2 (en) 2001-07-10 2010-04-27 Fred Bishop Authenticating an RF transaction using a transaction counter
US7429927B2 (en) * 2001-07-10 2008-09-30 American Express Travel Related Services Company, Inc. System and method for providing and RFID transaction device
US7303120B2 (en) 2001-07-10 2007-12-04 American Express Travel Related Services Company, Inc. System for biometric security using a FOB
US20060237528A1 (en) * 2001-07-10 2006-10-26 Fred Bishop Systems and methods for non-traditional payment
US7139397B2 (en) * 2001-07-20 2006-11-21 Stmicroelectronics S.R.L. Hybrid architecture for realizing a random numbers generator
AU2002327322A1 (en) 2001-07-24 2003-02-17 First Usa Bank, N.A. Multiple account card and transaction routing
FR2827982B1 (en) * 2001-07-27 2005-02-18 Smart Design METHOD FOR SECURING TRANSACTIONS
US7840495B2 (en) * 2001-08-03 2010-11-23 Jay Levenson System and method for the payment and accounting of petty disbursements
GB2379133B (en) * 2001-08-22 2003-10-29 Turriff Internat Ltd Method of crediting an account
US7103576B2 (en) * 2001-09-21 2006-09-05 First Usa Bank, Na System for providing cardless payment
EP1442404B1 (en) 2001-09-24 2014-01-01 E2Interactive, Inc. D/B/A E2Interactive, Inc. System and method for supplying communication service
US7054842B2 (en) * 2001-10-03 2006-05-30 First Data Corporation Stored value cards and methods for their issuance
US7917444B1 (en) 2001-10-29 2011-03-29 Mcafee, Inc. Secure single-use transaction numbers
JP3902453B2 (en) * 2001-11-19 2007-04-04 富士通株式会社 Electronic money processing method, program, and recording medium
KR20030045232A (en) * 2001-12-01 2003-06-11 주식회사 디지털서비스 Device and method for settling price using transfer card
KR20030045231A (en) * 2001-12-01 2003-06-11 주식회사 디지털서비스 Device and method for settling price using bar code of mobile communication cellular phone
US7577585B2 (en) * 2001-12-07 2009-08-18 American Express Travel Related Services Company, Inc. Method and system for completing transactions involving partial shipments
US6901387B2 (en) 2001-12-07 2005-05-31 General Electric Capital Financial Electronic purchasing method and apparatus for performing the same
US20090177563A1 (en) * 2001-12-07 2009-07-09 American Express Travel Related Services Company, Inc. Authorization refresh system and method
US7805376B2 (en) * 2002-06-14 2010-09-28 American Express Travel Related Services Company, Inc. Methods and apparatus for facilitating a transaction
US7512566B1 (en) * 2001-12-11 2009-03-31 Jpmorgan Chase Bank, N.A. System and method for using a stored value account having subaccount feature
US20030140062A1 (en) * 2002-01-24 2003-07-24 R & B 21 Card management system and server
DK1503308T3 (en) 2002-01-31 2010-05-25 Servicios Para Medios De Pago Reversible method for generating mutated debit cards using a mathematical algorithm
US7152048B1 (en) * 2002-02-07 2006-12-19 Oracle International Corporation Memphis: multiple electronic money payment highlevel integrated security
US7389275B2 (en) 2002-03-05 2008-06-17 Visa U.S.A. Inc. System for personal authorization control for card transactions
US7899753B1 (en) 2002-03-25 2011-03-01 Jpmorgan Chase Bank, N.A Systems and methods for time variable financial authentication
US20030187781A1 (en) * 2002-03-26 2003-10-02 First Data Corporation Method and system for processing card reissue transactions
FR2840434A1 (en) * 2002-05-31 2003-12-05 Anne Marie Etcheverry AUTHENTICATION AND VIRTUAL AND / OR REAL PAYMENT DEVICE AND IMPLEMENTATION METHOD
JP2005530234A (en) * 2002-06-18 2005-10-06 マスターカード インターナシヨナル インコーポレーテツド Integrated electronic invoice issuance and payment system and method
US20070239614A1 (en) * 2002-07-10 2007-10-11 Union Beach, L.P. System and method for the storage of data in association with financial accounts
FR2842631A1 (en) * 2002-07-19 2004-01-23 Grp Des Cartes Bancaires METHOD FOR RECORDING IN A CHIP CARD AND CHIP CARD FOR CARRYING OUT THIS METHOD
US20040019543A1 (en) * 2002-07-25 2004-01-29 First Data Corporation Systems and methods for non-account based liability reporting
US7774273B2 (en) * 2002-07-30 2010-08-10 Acs State & Local Solutions, Inc. Systems and methods for processing benefits
JP2004078697A (en) * 2002-08-20 2004-03-11 Fuji Xerox Co Ltd Method for processing image, method for forming image, image processor, and image forming device
IL166717A0 (en) * 2002-08-26 2006-01-15 Computer Ass Think Inc Web services apparatus and methods
US7603320B1 (en) * 2002-08-31 2009-10-13 Lingyan Shu Method and system for protecting sensitive information and preventing unauthorized use of identity information
US6805287B2 (en) 2002-09-12 2004-10-19 American Express Travel Related Services Company, Inc. System and method for converting a stored value card to a credit card
US20040050929A1 (en) * 2002-09-16 2004-03-18 Fayfield Robert W. Extranet security system and method
US20040073688A1 (en) * 2002-09-30 2004-04-15 Sampson Scott E. Electronic payment validation using Transaction Authorization Tokens
US7587434B2 (en) * 2002-10-01 2009-09-08 Acs State & Local Solutions, Inc. Method and system for managing a distributed transaction process
US8340979B2 (en) * 2002-10-01 2012-12-25 Acs State & Local Solutions, Inc. Systems and methods for electronically processing government sponsored benefits
US7765162B2 (en) * 2002-10-07 2010-07-27 Mastercard International Incorporated Method and system for conducting off-line and on-line pre-authorized payment transactions
US8577795B2 (en) * 2002-10-10 2013-11-05 Convergys Information Management Group, Inc. System and method for revenue and authorization management
US20040098351A1 (en) * 2002-11-15 2004-05-20 Ibgc Corporation Interest bearing gift card and related methods and systems
US8396790B2 (en) * 2002-12-04 2013-03-12 Efficient Finance Ltd. System and method for financing commercial transactions
IL153275A (en) * 2002-12-04 2017-04-30 Efficient Finance Ltd Method for providing collaborative financing of trade credit
US20040111329A1 (en) * 2002-12-10 2004-06-10 First Data Corporation Restricted-use transaction systems
US10205721B2 (en) 2002-12-10 2019-02-12 Ewi Holdings, Inc. System and method for distributing personal identification numbers over a computer network
WO2004055638A2 (en) 2002-12-12 2004-07-01 Flexiworld Technologies, Inc. Wireless communication between computing devices
TW587226B (en) * 2002-12-26 2004-05-11 Min-Jie Su Card verification and authorization system and method thereof
US7472090B1 (en) * 2002-12-31 2008-12-30 Capital One Financial Corporation Method and system for providing a higher credit limit to a customer
US20040133507A1 (en) * 2003-01-02 2004-07-08 Paul Barbour Method and system for conducting financial transactions using single use credit card numbers
EP1602055A1 (en) * 2003-03-07 2005-12-07 Snapcount Limited Transaction processing
US10311412B1 (en) 2003-03-28 2019-06-04 Jpmorgan Chase Bank, N.A. Method and system for providing bundled electronic payment and remittance advice
US6983882B2 (en) * 2003-03-31 2006-01-10 Kepler, Ltd. Personal biometric authentication and authorization device
CN101208657B (en) 2003-04-11 2017-11-14 富意科技 A kind of portable integrated circuit memory equipment and its operation method
EP1475760A1 (en) * 2003-05-06 2004-11-10 Alcatel Method for executing transactions
US20040225545A1 (en) * 2003-05-08 2004-11-11 Turner James E. System and method for offering unsecured consumer credit transactions
US7895119B2 (en) * 2003-05-13 2011-02-22 Bank Of America Corporation Method and system for pushing credit payments as buyer initiated transactions
US7100821B2 (en) * 2003-05-15 2006-09-05 Mehran Randall Rasti Charge card and debit transactions using a variable charge number
US7131578B2 (en) 2003-05-28 2006-11-07 Ewi Holdings, Inc. System and method for electronic prepaid account replenishment
US7853525B2 (en) * 2003-07-15 2010-12-14 Microsoft Corporation Electronic draft capture
US10679452B2 (en) * 2003-09-04 2020-06-09 Oracle America, Inc. Method and apparatus having multiple identifiers for use in making transactions
US7949594B2 (en) 2003-09-26 2011-05-24 First Data Corporation Systems and methods for participant controlled communications regarding financial accounts
US7567936B1 (en) 2003-10-14 2009-07-28 Paradox Technical Solutions Llc Method and apparatus for handling pseudo identities
US8250225B1 (en) 2003-10-14 2012-08-21 Paradox Technical Solutions Llc Generation of suffixes for pseudo e-mail addresses
US8793187B2 (en) * 2003-10-17 2014-07-29 Nexxo Financial Corporation Self-service money remittance with an access card
US7641113B1 (en) 2003-10-17 2010-01-05 Nexxo Financial, Inc. Systems and methods for generating revenue from banking transactions using a stored-value card
US20050092826A1 (en) * 2003-10-29 2005-05-05 Lee Blackman Disposable financial tools (DFT) / Yfee
IL158694A (en) * 2003-10-30 2014-11-30 Verifone Israel Ltd Prepaid debit card processing
KR100511317B1 (en) 2003-10-31 2005-08-31 엘지전자 주식회사 Fraud protection method and apparatus for contactless card in mobile communication terminal
TWI290439B (en) * 2005-11-09 2007-11-21 Min-Chieh Su Mobile communication terminal verification authorization system and method thereof
US8655309B2 (en) 2003-11-14 2014-02-18 E2Interactive, Inc. Systems and methods for electronic device point-of-sale activation
US8015085B2 (en) 2003-11-14 2011-09-06 First Data Corporation System for distributing funds
US7039440B2 (en) 2003-11-20 2006-05-02 International Business Machines Corporation Wireless rechargeable money card
CN1906629A (en) * 2003-11-26 2007-01-31 支付点公司 Secure payment system
FR2863089B1 (en) * 2003-12-01 2007-02-23 Jcdecaux Sa METHOD AND SYSTEM FOR AUTOMATICALLY RENTING ARTICLES.
US7814003B2 (en) * 2003-12-15 2010-10-12 Jp Morgan Chase Billing workflow system for crediting charges to entities creating derivatives exposure
US7543739B2 (en) 2003-12-17 2009-06-09 Qsecure, Inc. Automated payment card fraud detection and location
US7641124B2 (en) * 2003-12-17 2010-01-05 Qsecure, Inc. Magnetic data recording device
EA009978B1 (en) * 2004-01-06 2008-04-28 Епасспорте, Н.В. Method of managing prepaid accounts
US20050154643A1 (en) * 2004-01-08 2005-07-14 International Business Machines Corporation Purchasing information requested and conveyed on demand
US8386376B2 (en) * 2004-02-09 2013-02-26 American Express Travel Related Services Company, Inc. System and method using enhanced authorization data to reduce travel-related transaction fraud
US20070239786A1 (en) * 2004-02-24 2007-10-11 First Data Corporation System for maintaining regulatory compliance of communication point data
US20070237315A1 (en) * 2004-02-24 2007-10-11 First Data Corporation System for maintaining type and/or status information for a party - communication point relationship
US20050187782A1 (en) * 2004-02-24 2005-08-25 First Data Corporation System for maintaining account and presentation instrument data
US20050187870A1 (en) * 2004-02-24 2005-08-25 First Data Corporation System for maintaining balance data
CA2559166A1 (en) * 2004-03-11 2005-09-22 Atrana Solutions, Inc. System for processing stored value instrument
US20050203843A1 (en) * 2004-03-12 2005-09-15 Wood George L. Internet debit system
US7413112B2 (en) * 2004-03-16 2008-08-19 American Express Travel Related Services Company, Inc. Method and system for manual authorization
US20050216728A1 (en) * 2004-03-26 2005-09-29 Sandeep Relan Integration of credit card into mobile terminal
EP1733350A4 (en) * 2004-03-26 2008-03-19 Citicorp Credit Services Inc Methods and systems for integration of multiple rewards programs
US8190517B1 (en) * 2004-04-07 2012-05-29 American Express Travel Related Services Company, Inc. System and method for transferring a line of credit balance to a cash account
US11475436B2 (en) * 2010-01-08 2022-10-18 Blackhawk Network, Inc. System and method for providing a security code
US11599873B2 (en) 2010-01-08 2023-03-07 Blackhawk Network, Inc. Systems and methods for proxy card and/or wallet redemption card transactions
US7280644B2 (en) 2004-12-07 2007-10-09 Ewi Holdings, Inc. Transaction processing platform for faciliating electronic distribution of plural prepaid services
US20140019352A1 (en) 2011-02-22 2014-01-16 Visa International Service Association Multi-purpose virtual card transaction apparatuses, methods and systems
US7748617B2 (en) * 2004-04-12 2010-07-06 Gray R O'neal Electronic identification system
US7275685B2 (en) * 2004-04-12 2007-10-02 Rearden Capital Corporation Method for electronic payment
US7337956B2 (en) * 2004-04-12 2008-03-04 Rearden Capital Corporation System and method for facilitating the purchase of goods and services
US7500602B2 (en) * 2005-02-22 2009-03-10 Gray R O'neal System for increasing the security of credit and debit cards transactions
US7472827B2 (en) * 2004-05-17 2009-01-06 American Express Travel Related Services Company, Inc. Limited use PIN system and method
US20060004829A1 (en) * 2004-05-27 2006-01-05 Silverbrook Research Pty Ltd Rolling keys
US7021532B2 (en) * 2004-06-02 2006-04-04 American Express Travel Related Services Company, Inc. Transaction authorization system and method
WO2005119607A2 (en) * 2004-06-03 2005-12-15 Tyfone, Inc. System and method for securing financial transactions
WO2005119608A1 (en) * 2004-06-03 2005-12-15 Tyfone, Inc. System and method for securing financial transactions
US8554673B2 (en) 2004-06-17 2013-10-08 Jpmorgan Chase Bank, N.A. Methods and systems for discounts management
US8001047B2 (en) 2004-06-18 2011-08-16 Paradox Technical Solutions Llc Method and apparatus for effecting payment
US8121944B2 (en) * 2004-06-24 2012-02-21 Jpmorgan Chase Bank, N.A. Method and system for facilitating network transaction processing
US7318550B2 (en) 2004-07-01 2008-01-15 American Express Travel Related Services Company, Inc. Biometric safeguard method for use with a smartcard
US8249988B2 (en) * 2004-07-13 2012-08-21 Sandisk Il Ltd. System and method for verifying payment
US7287692B1 (en) 2004-07-28 2007-10-30 Cisco Technology, Inc. System and method for securing transactions in a contact center environment
EP1628242B1 (en) * 2004-08-16 2019-10-16 Swisscom AG Method for recycling identification codes
KR100930457B1 (en) * 2004-08-25 2009-12-08 에스케이 텔레콤주식회사 Authentication and payment system and method using mobile communication terminal
WO2006026658A2 (en) * 2004-08-31 2006-03-09 Best Buy Enterprise Services, Inc. Indirect costumer identification system and method
US7506812B2 (en) 2004-09-07 2009-03-24 Semtek Innovative Solutions Corporation Transparently securing data for transmission on financial networks
US20060064378A1 (en) * 2004-09-21 2006-03-23 Jeff Clementz Method and apparatus for maintaining linked accounts
US20060074757A1 (en) * 2004-10-05 2006-04-06 Romello Burdoucci Method and system for expediting coupon and rebate processing resulting in improving a user's credit rating
CA2585432A1 (en) * 2004-11-04 2006-05-18 Telcordia Technologies, Inc. System and method for trust management
JP2006139591A (en) * 2004-11-12 2006-06-01 Fujitsu Ltd Process synchronous certification system and process synchronous certification method
US8049594B1 (en) 2004-11-30 2011-11-01 Xatra Fund Mx, Llc Enhanced RFID instrument security
US8346910B2 (en) 2004-11-30 2013-01-01 American Express Travel Related Services Company, Inc. Method and apparatus for managing an interactive network session
US7844518B1 (en) 2004-11-30 2010-11-30 Jp Morgan Chase Bank Method and apparatus for managing credit limits
US20060178899A1 (en) * 2005-02-04 2006-08-10 Jung Edward K Identifying a participant loss in a virtual world
US20060229976A1 (en) * 2005-03-30 2006-10-12 Searete Llc, A Limited Liability Corporation Of The State Of Delaware Virtual credit with transferability
US20060178218A1 (en) * 2005-02-04 2006-08-10 Searete Llc, A Limited Liability Corporation Of The State Of Delaware Virtual world escrow user interface
US20060190284A1 (en) * 2005-02-04 2006-08-24 Jung Edward K Reporting a participant loss in a virtual world
US20060190282A1 (en) * 2005-02-04 2006-08-24 Jung Edward K Providing risk mitigation in a virtual world
US20090198604A1 (en) * 2004-12-17 2009-08-06 Searete Llc, A Limited Liability Corporation Of The State Of Delaware Tracking a participant loss in a virtual world
US7774275B2 (en) * 2005-02-28 2010-08-10 Searete Llc Payment options for virtual credit
US20070164098A1 (en) * 2004-12-28 2007-07-19 ATM Khalid Staging of Financial Accounts: The Ultimate Charge Account and Ultimate Credit/ATM Card
US7431207B1 (en) * 2005-01-05 2008-10-07 American Express Travel Related Services Co., Inc. System and method for two-step payment transaction authorizations
US8700729B2 (en) * 2005-01-21 2014-04-15 Robin Dua Method and apparatus for managing credentials through a wireless network
US20070038559A1 (en) * 2005-07-28 2007-02-15 Searete Llc, A Limited Liability Corporation Of The State Of Delaware Rating notification for virtual world environment
US7958047B2 (en) * 2005-02-04 2011-06-07 The Invention Science Fund I Virtual credit in simulated environments
US7720687B2 (en) * 2005-10-03 2010-05-18 The Invention Science Fund I, Llc Virtual world property disposition after real-world occurrence
US20070024613A1 (en) * 2005-07-28 2007-02-01 Searete Llc, A Limited Liability Corporation Of Delaware Selecting auxiliary control features for virtual world environment
US20100114662A1 (en) * 2008-10-31 2010-05-06 Searette Llc, A Limited Liability Corporation Of The State Of Delaware Real-world profile data for making virtual world contacts
US20060235791A1 (en) * 2005-04-15 2006-10-19 Searete Llc Follow-up contacts with virtual world participants
US20060195377A1 (en) * 2005-02-28 2006-08-31 Searete Llc Financial ventures based on virtual credit
US20090043682A1 (en) * 2005-02-04 2009-02-12 Searete Llc, A Limited Liability Corporation Of The State Of Delaware Real-world profile data for making virtual world contacts
US20060178966A1 (en) * 2005-02-04 2006-08-10 Jung Edward K Virtual world property disposition after virtual world occurence
US20090144148A1 (en) * 2005-02-04 2009-06-04 Searete Llc, A Limited Liability Corporation Of The State Of Delaware Attribute enhancement in virtual world environments
US20090043683A1 (en) * 2005-02-04 2009-02-12 Searete Llc, A Limited Liability Corporation Of The State Of Delaware Virtual world reversion rights
US20070174183A1 (en) * 2006-01-26 2007-07-26 Jung Edward K Context determinants in virtual world environment
US20060178967A1 (en) * 2005-02-04 2006-08-10 Searete Llc Disposition of proprietary virtual rights
US20060195376A1 (en) * 2005-02-28 2006-08-31 Jung Edward K Compensation techniques for virtual credit transactions
US20060178968A1 (en) * 2005-02-04 2006-08-10 Jung Edward K Virtual world interconnection technique
US20090138333A1 (en) * 2005-02-04 2009-05-28 Searete Llc, A Limited Liablity Of The State Of Delaware Follow-up contacts with virtual world participants
US20070136185A1 (en) * 2005-02-04 2007-06-14 Searete Llc, A Limited Liability Corporation Of The State Of Delaware Disposition of proprietary virtual rights
US20080215434A1 (en) * 2005-02-04 2008-09-04 Searete Llc, A Limited Liability Corporation Of The State Of Delaware Real world interaction with virtual world privileges
US20060178180A1 (en) * 2005-02-04 2006-08-10 Jung Edward K Virtual world escrow environment
US20070036328A1 (en) * 2005-07-19 2007-02-15 Searete Llc Virtual world escrow
US20070118420A1 (en) * 2005-02-04 2007-05-24 Searete Llc, A Limited Liability Corporation Of The State Of Delaware Context determinants in virtual world environment
US20090125383A1 (en) * 2005-02-04 2009-05-14 Searete Llc, A Limited Liability Corporation Of The State Of Delaware Participation profiles of virtual world players
US20090099930A1 (en) * 2005-02-04 2009-04-16 Searete Llc, A Limited Liability Corporation Of The State Of Delaware Participation profiles of virtual world players
US20070112660A1 (en) * 2005-02-04 2007-05-17 Searete Llc, A Limited Liability Corporation Of The State Of Delaware Disposition of proprietary virtual rights
US20070013691A1 (en) * 2005-07-18 2007-01-18 Searete Llc, A Limited Liability Corporation Of The State Of Delaware Supervisory authority in virtual world environment
US20070112624A1 (en) * 2005-11-15 2007-05-17 Searete Llc, A Limited Liability Corporation Of The State Of Delaware Use of patron profiles in virtual world environment
US20090018910A1 (en) * 2007-07-10 2009-01-15 Searete Llc, A Limited Liability Corporation Of The State Of Delaware Virtual world interconnection technique
US20080133392A1 (en) * 2005-02-04 2008-06-05 Searete Llc, A Limited Liability Corporation Of The State Of Delaware Security arrangements for virtual world obligations
US20070198305A1 (en) * 2005-03-30 2007-08-23 Searete Llc, A Limited Liability Corporation Of The State Of Delaware Virtual credit with transferability
US20090037364A1 (en) * 2005-02-04 2009-02-05 Searete Llc, A Limited Liability Corporation Of The State Of Delaware Participation profiles of virtual world players
US20070035549A1 (en) * 2005-08-12 2007-02-15 Searete Llc, A Limited Liability Corporation Of The State Of Delaware Variant rating plans for a virtual world environment
US20090144132A1 (en) * 2005-02-04 2009-06-04 Searete Llc, A Limited Liability Corporation Of The State Of Delaware Follow-up contacts with virtual world participants
US20080270165A1 (en) * 2005-02-04 2008-10-30 Searete Llc, A Limited Liability Corporation Of The State Of Delaware Virtual world property disposition after real-world occurrence
US20060224505A1 (en) * 2005-03-30 2006-10-05 Searete Llc, A Limited Liability Corporation Of The State Of Delaware Multi-player game using simulated credit transactions
US20070130001A1 (en) * 2005-11-18 2007-06-07 Searete Llc, A Limited Liability Corporation Of The State Of Delaware Real-world profile data for making virtual world contacts
US20080109338A1 (en) * 2005-02-04 2008-05-08 Searete Llc, A Limited Liability Corporation Virtual credit in simulated environments
US20070124239A1 (en) * 2005-02-04 2007-05-31 Searete LLC, a limited liability corporation of Multi-player game using simulated credit transactions
US20070203828A1 (en) * 2005-02-04 2007-08-30 Searete Llc, A Limited Liability Corporation Of The State Of Delaware Real-world incentives offered to virtual world participants
US20080177558A1 (en) * 2005-02-04 2008-07-24 Searete Llc, A Limited Liability Corporation Of The State Of Delaware Resolution of virtual world revocable transfers
US20070156509A1 (en) * 2005-02-04 2007-07-05 Searete Llc, A Limited Liability Corporation Of The State Of Delaware Real-world incentives offered to virtual world participants
US20070268299A1 (en) * 2005-02-04 2007-11-22 Searete Llc, A Limited Liability Corporation Of The State Of Delaware Attribute enhancement in virtual world environments
US20070035548A1 (en) * 2005-08-12 2007-02-15 Searete Llc Rating technique for virtual world environment
WO2006082913A1 (en) * 2005-02-04 2006-08-10 Secured Communications, Inc. Network settling card, network settling program, authentication server, and shopping system and settling method
US20070073582A1 (en) * 2005-09-27 2007-03-29 Searete Llc Real-world incentives offered to virtual world participants
US20060195378A1 (en) * 2005-02-28 2006-08-31 Searete Llc, A Limited Liability Corporation Of The State Of Delaware Hybrid charge account for virtual world credit
US20090138355A1 (en) * 2005-02-04 2009-05-28 Searete Llc, A Limited Liability Corporation Of The State Of Delaware Real-world profile data for making virtual world contacts
US20070150986A1 (en) * 2005-03-30 2007-06-28 Searete Llc, A Limited Liability Corporation Of The State Of Delaware Virtual credit with transferability
US20070203725A1 (en) * 2006-02-27 2007-08-30 Searete Llc, A Limited Liability Corporation Of The State Of Delaware Security arrangements for virtual world obligations
US20080228607A1 (en) * 2005-02-04 2008-09-18 Jung Edward K Y Resolution of virtual world revocable transfers
US20090100354A1 (en) * 2005-02-04 2009-04-16 Searete Llc, A Limited Liability Corporation Of The State Of Delaware Third party control over virtual world characters
US7581678B2 (en) 2005-02-22 2009-09-01 Tyfone, Inc. Electronic transaction card
US20070078737A1 (en) * 2005-02-28 2007-04-05 Searete Llc, A Limited Liability Corporation Of The State Of Delaware Financial ventures based on virtual credit
EP1703479A1 (en) * 2005-03-18 2006-09-20 Hewlett-Packard Development Company, L.P. Computer system and user device
US8474694B2 (en) * 2005-03-23 2013-07-02 E2Interactive, Inc. Radio frequency identification purchase transactions
US7537152B2 (en) * 2005-03-23 2009-05-26 E2Interative, Inc. Delivery of value identifiers using short message service (SMS)
US7472822B2 (en) * 2005-03-23 2009-01-06 E2Interactive, Inc. Delivery of value identifiers using short message service (SMS)
US20060217996A1 (en) * 2005-03-23 2006-09-28 E2Interactive, Inc. D/B/A E2Interactive, Inc. Point-of-sale activation of media device account
US7801808B1 (en) 2005-03-24 2010-09-21 Morgan Stanley Database structure for financial products with unique, consistent identifier for parties that assume roles with respect to the products and methods of using the database structure
US20060226217A1 (en) * 2005-04-07 2006-10-12 Tyfone, Inc. Sleeve for electronic transaction card
US20130085938A1 (en) * 2011-10-04 2013-04-04 Keith J. Stone Method and system for account holders to make, track and control virtual credit card numbers using an electronic device
US7796940B2 (en) * 2005-04-26 2010-09-14 Harris Technology, Llc Personal audio player with wireless filesharing and radio recording and timeshifting
US7779456B2 (en) * 2005-04-27 2010-08-17 Gary M Dennis System and method for enhanced protection and control over the use of identity
US7533047B2 (en) * 2005-05-03 2009-05-12 International Business Machines Corporation Method and system for securing card payment transactions using a mobile communication device
US7506804B2 (en) * 2005-05-27 2009-03-24 U.S. Bancorp Licensing, Inc. System and method for an integrated payment and reward card
EP1732034A1 (en) * 2005-06-06 2006-12-13 First Data Corporation System and method for authorizing electronic payment transactions
US7822682B2 (en) 2005-06-08 2010-10-26 Jpmorgan Chase Bank, N.A. System and method for enhancing supply chain transactions
US7984851B2 (en) * 2005-07-13 2011-07-26 Sean Macguire Consumer self-activated financial card
US8189788B2 (en) * 2005-07-15 2012-05-29 Tyfone, Inc. Hybrid symmetric/asymmetric cryptography with user authentication
US8477940B2 (en) * 2005-07-15 2013-07-02 Tyfone, Inc. Symmetric cryptography with user authentication
US7805615B2 (en) * 2005-07-15 2010-09-28 Tyfone, Inc. Asymmetric cryptography with user authentication
US8571979B1 (en) * 2005-07-22 2013-10-29 Tcf Financial Corporation Arrangements and methods for automatically dispersing and tracking funds
US7925578B1 (en) 2005-08-26 2011-04-12 Jpmorgan Chase Bank, N.A. Systems and methods for performing scoring optimization
US8762263B2 (en) 2005-09-06 2014-06-24 Visa U.S.A. Inc. System and method for secured account numbers in proximity devices
US20070057039A1 (en) * 2005-09-14 2007-03-15 Carlson Michael P Charge card network with an implementation to enable card owners to limit the use of their cards to sales points in designated geographic areas and to sales points for designated types of goods and services
US7689007B2 (en) * 2005-09-16 2010-03-30 Privacy Card, Llc Methods and systems for protection of identity
US8396747B2 (en) * 2005-10-07 2013-03-12 Kemesa Inc. Identity theft and fraud protection system and method
US8200575B2 (en) * 2005-10-11 2012-06-12 Raul Armando Cordero Torres Secure electronic payment system and methods
US20070080212A1 (en) * 2005-10-11 2007-04-12 Capital One Financial Corporation Systems, methods, and computer-readable media for providing financial accounts with unique characteristics
US7937320B2 (en) * 2005-11-14 2011-05-03 Hoshiko, Llc Managed purchasing account for defined commodities
US8171531B2 (en) * 2005-11-16 2012-05-01 Broadcom Corporation Universal authentication token
US8190471B2 (en) * 2005-12-16 2012-05-29 E2Interactive, Inc. Rebate card system
US8190472B2 (en) * 2005-12-16 2012-05-29 E2Interactive, Inc. Multiple use rebate card
US7664699B1 (en) * 2005-12-21 2010-02-16 Symantec Corporation Automatic generation of temporary credit card information
US8200576B1 (en) 2005-12-30 2012-06-12 United Services Automobile Association (Usaa) Comprehensive online loan transaction
US8121938B1 (en) * 2005-12-30 2012-02-21 United Services Automobile Association (Usaa) Comprehensive online loan transaction
US20070262136A1 (en) * 2006-01-31 2007-11-15 Xiaofeng Ou Anti-Fraud Credit/Debit Card Authorization System and Method
US7587349B2 (en) * 2006-02-10 2009-09-08 American Express Travel Related Services Company, Inc. Method, system, and computer program product for card selector tool
US8234220B2 (en) 2007-02-21 2012-07-31 Weiss Kenneth P Universal secure registry
US8001055B2 (en) 2006-02-21 2011-08-16 Weiss Kenneth P Method, system and apparatus for secure access, payment and identification
US11227676B2 (en) 2006-02-21 2022-01-18 Universal Secure Registry, Llc Universal secure registry
US7552867B2 (en) 2006-03-15 2009-06-30 Qualcomm Incorporated M-commerce virtual cash system, method, and apparatus
FR2898711A1 (en) * 2006-03-20 2007-09-21 Stephane Givin Financial/banking operation e.g. purchase, securing method for e.g. banking organization, involves parametering operations, secret codes and transmission mode of codes, when client accesses page/site of organization to carryout operations
BRPI0621426A2 (en) * 2006-03-24 2011-12-13 Metabank information management system and method
US20070226140A1 (en) * 2006-03-24 2007-09-27 American Express Travel Related Services Company, Inc. Expedited Issuance and Activation of a Transaction Instrument
US7818264B2 (en) * 2006-06-19 2010-10-19 Visa U.S.A. Inc. Track data encryption
US9065643B2 (en) 2006-04-05 2015-06-23 Visa U.S.A. Inc. System and method for account identifier obfuscation
US7552467B2 (en) 2006-04-24 2009-06-23 Jeffrey Dean Lindsay Security systems for protecting an asset
CA2650662A1 (en) * 2006-04-24 2007-11-08 Encryptakey, Inc. Portable device and methods for performing secure transactions
US20070282740A1 (en) * 2006-05-05 2007-12-06 Wendt Bradley W Electronic funds card
US10152712B2 (en) * 2006-05-10 2018-12-11 Paypal, Inc. Inspecting event indicators
US20070266131A1 (en) * 2006-05-12 2007-11-15 Simpera Inc. Obtaining and Using Primary Access Numbers Utilizing a Mobile Wireless Device
US20070277244A1 (en) * 2006-05-23 2007-11-29 The De Beasley Group, Llc. Privacy protection system and method
US20080314977A1 (en) * 2006-06-08 2008-12-25 American Express Travel Related Services Company, Inc. Method, System, and Computer Program Product for Customer-Level Data Verification
US9195985B2 (en) 2006-06-08 2015-11-24 Iii Holdings 1, Llc Method, system, and computer program product for customer-level data verification
US20070299774A1 (en) * 2006-06-22 2007-12-27 First Data Corporation System and method for card not present transactions
US8855296B2 (en) * 2006-06-28 2014-10-07 Voltage Security, Inc. Data processing systems with format-preserving encryption and decryption engines
US7864952B2 (en) * 2006-06-28 2011-01-04 Voltage Security, Inc. Data processing systems with format-preserving encryption and decryption engines
US8069084B2 (en) 2006-07-14 2011-11-29 Wells Fargo Bank, N.A. Customer controlled account, system, and process
US20080033825A1 (en) * 2006-07-20 2008-02-07 David Goldin Method and apparatus for a reward system for merchants for credit card processing and merchant cash advances
US7860769B2 (en) * 2006-07-26 2010-12-28 Benson Tracey M Method of preventing fraud
TW200820109A (en) * 2006-07-26 2008-05-01 Joseph Sally Method for managing multiple credit accounts
US10296895B2 (en) 2010-01-08 2019-05-21 Blackhawk Network, Inc. System for processing, activating and redeeming value added prepaid cards
US8464938B2 (en) * 2007-06-22 2013-06-18 Intelispend Prepaid Solutions, Llc Client customized virtual or physical card for use with selected merchants
US20090024533A1 (en) * 2006-09-05 2009-01-22 Mobibucks Payment systems and methods
US7698220B2 (en) * 2006-09-14 2010-04-13 E2Interactive, Inc. Virtual terminal for payment processing
US8125667B2 (en) * 2006-09-15 2012-02-28 Avery Levy System and method for enabling transactions by means of print media that incorporate electronic recording and transmission means
US20120130838A1 (en) * 2006-09-24 2012-05-24 Rfcyber Corp. Method and apparatus for personalizing secure elements in mobile devices
US8769279B2 (en) * 2006-10-17 2014-07-01 Verifone, Inc. System and method for variable length encryption
US9361617B2 (en) 2008-06-17 2016-06-07 Verifone, Inc. Variable-length cipher system and method
US8769275B2 (en) * 2006-10-17 2014-07-01 Verifone, Inc. Batch settlement transactions system and method
US9123042B2 (en) * 2006-10-17 2015-09-01 Verifone, Inc. Pin block replacement
US20080114691A1 (en) * 2006-10-31 2008-05-15 Chuck Foster Processing transactions
US8682791B2 (en) * 2006-10-31 2014-03-25 Discover Financial Services Redemption of credit card rewards at a point of sale
CN101584166A (en) 2006-11-02 2009-11-18 迪吉福尼卡(国际)有限公司 Producing routing messages for voice over IP communications
US20100094735A1 (en) * 2006-11-15 2010-04-15 Charles Reynolds Methods and systems for automated payments
MX2009005751A (en) 2006-11-29 2009-08-26 Digifonica Int Ltd Intercepting voice over ip communications and other data communications.
US7792686B2 (en) 2006-12-05 2010-09-07 Stoneeagle Services, Inc. Medical benefits payment system
US7991158B2 (en) * 2006-12-13 2011-08-02 Tyfone, Inc. Secure messaging
US7606766B2 (en) 2006-12-21 2009-10-20 American Express Travel Related Services Company, Inc. Computer system and computer-implemented method for selecting invoice settlement options
US8655786B2 (en) * 2006-12-29 2014-02-18 Amazon Technologies, Inc. Aggregate constraints for payment transactions
US8924295B2 (en) 2007-01-03 2014-12-30 At&T Intellectual Property I, L.P. User terminal location based credit card authorization servers, systems, methods and computer program products
US7594605B2 (en) * 2007-01-10 2009-09-29 At&T Intellectual Property I, L.P. Credit card transaction servers, methods and computer program products employing wireless terminal location and registered purchasing locations
US8958562B2 (en) * 2007-01-16 2015-02-17 Voltage Security, Inc. Format-preserving cryptographic systems
US8566240B2 (en) * 2007-01-16 2013-10-22 E2Interactive, Inc. Systems and methods for the payment of customer bills utilizing payment platform of biller
US20080172331A1 (en) * 2007-01-16 2008-07-17 Graves Phillip C Bill Payment Card Method and System
US8818904B2 (en) * 2007-01-17 2014-08-26 The Western Union Company Generation systems and methods for transaction identifiers having biometric keys associated therewith
SE531960C2 (en) * 2007-01-26 2009-09-15 Smartrefill I Helsingborg Ab Method of securely executing a payment transaction
GB2446179B (en) * 2007-02-01 2011-08-31 Monitise Group Ltd Methods and a System for Providing Transaction Related Information
US20090048970A1 (en) * 2007-02-09 2009-02-19 Muscato Michael A Approval and Issuance of a Financial Card
US9846866B2 (en) * 2007-02-22 2017-12-19 First Data Corporation Processing of financial transactions using debit networks
US20080208687A1 (en) * 2007-02-27 2008-08-28 Mcneill Garry S Systems and methods for providing consolidated card delivery for a plurality of advertisers
EP2135202A4 (en) * 2007-03-05 2010-12-08 Mastercard International Inc Systems and methods for controlling payment and information flows in payment-by-card networks
US8935187B2 (en) 2007-03-07 2015-01-13 Playspan, Inc. Distributed payment system and method
US20080228638A1 (en) * 2007-03-14 2008-09-18 Ebay Inc. Method and system of controlling linked accounts
US7945512B2 (en) * 2007-03-14 2011-05-17 Ebay Inc. Spending and savings secondary linked accounts
WO2008116296A1 (en) 2007-03-26 2008-10-02 Digifonica (International) Limited Emergency assistance calling for voice over ip communications systems
CN101276448A (en) * 2007-03-29 2008-10-01 阿里巴巴集团控股有限公司 Payment system and method performing trading with identification card including IC card
US20080244208A1 (en) * 2007-03-30 2008-10-02 Narendra Siva G Memory card hidden command protocol
JP5156254B2 (en) * 2007-04-17 2013-03-06 楽天株式会社 Information processing apparatus, information processing method, and information processing program
US8756659B2 (en) 2007-04-19 2014-06-17 At&T Intellectual Property I, L.P. Access authorization servers, methods and computer program products employing wireless terminal location
US8109436B1 (en) 2007-04-26 2012-02-07 United Services Automobile Association (Usaa) Secure card
US20080288403A1 (en) * 2007-05-18 2008-11-20 Clay Von Mueller Pin encryption device security
US8666905B2 (en) * 2007-05-25 2014-03-04 Robert Bourne Anonymous online payment systems and methods
US8121942B2 (en) 2007-06-25 2012-02-21 Visa U.S.A. Inc. Systems and methods for secure and transparent cardless transactions
US7739169B2 (en) 2007-06-25 2010-06-15 Visa U.S.A. Inc. Restricting access to compromised account information
US8600872B1 (en) 2007-07-27 2013-12-03 Wells Fargo Bank, N.A. System and method for detecting account compromises
US8355982B2 (en) 2007-08-16 2013-01-15 Verifone, Inc. Metrics systems and methods for token transactions
US8494959B2 (en) * 2007-08-17 2013-07-23 Emc Corporation Payment card with dynamic account number
US9830582B1 (en) * 2007-08-18 2017-11-28 Expensify, Inc. System, computer readable medium, and method for authorizing purchase using on-demand prepaid card
US10423896B2 (en) 2007-08-18 2019-09-24 Expensify, Inc. Computer system implementing a network transaction service
US10163092B2 (en) 2007-08-18 2018-12-25 Expensify, Inc. System and method for establishing a payment mechanism with a plurality of merchants
US10185947B2 (en) 2007-08-18 2019-01-22 Expensify, Inc. Computer system implementing a network transaction service
US10068225B2 (en) 2007-08-18 2018-09-04 Espensify, Inc. System and method for utilizing a universal prepaid card
WO2009026460A1 (en) 2007-08-23 2009-02-26 Giftango Corporation Systems and methods for electronic delivery of stored value
US20090063343A1 (en) * 2007-08-29 2009-03-05 Inmate Calling Solutions Llc D/B/A Icsolutions Method and system to provide cashless refund
US7937324B2 (en) * 2007-09-13 2011-05-03 Visa U.S.A. Inc. Account permanence
US7792748B1 (en) * 2007-09-19 2010-09-07 Capital One Financial Corporation Method and system for performing a financial transaction using a user interface
US10657503B1 (en) * 2007-09-19 2020-05-19 Capital One Services, Llc System and method of providing a customer with method of making a payment to a third party using a remote dispensing machine
US8671050B1 (en) 2007-09-25 2014-03-11 United Services Automobile Association (Usaa) Systems and methods for funding and binding auto loans
US8249935B1 (en) 2007-09-27 2012-08-21 Sprint Communications Company L.P. Method and system for blocking confidential information at a point-of-sale reader from eavesdropping
US7707113B1 (en) * 2007-09-28 2010-04-27 Sprint Communications Company L.P. Method and system for setting levels of electronic wallet security
US20140067675A1 (en) * 2012-09-06 2014-03-06 American Express Travel Related Services Company, Inc. Authentication using dynamic codes
US9747598B2 (en) 2007-10-02 2017-08-29 Iii Holdings 1, Llc Dynamic security code push
US9883381B1 (en) 2007-10-02 2018-01-30 Sprint Communications Company L.P. Providing secure access to smart card applications
US8549279B1 (en) 2007-10-23 2013-10-01 United Parcel Service Of America, Inc. Encryption and tokenization architectures
US20090119170A1 (en) * 2007-10-25 2009-05-07 Ayman Hammad Portable consumer device including data bearing medium including risk based benefits
US8376222B1 (en) 2007-10-30 2013-02-19 United Services Automobile Association (Usaa) Systems and methods to temporarily transfer funds to a member
US11244289B2 (en) * 2007-11-02 2022-02-08 Citicorp Credit Services, Inc. (Usa) Methods and systems for managing financial institution customer accounts
US8512131B2 (en) * 2007-11-08 2013-08-20 Igt Player bonus choice
US20090132416A1 (en) * 2007-11-21 2009-05-21 Microsoft Corporation Tagging virtual currency
US8126806B1 (en) 2007-12-03 2012-02-28 Sprint Communications Company L.P. Method for launching an electronic wallet
US9741027B2 (en) 2007-12-14 2017-08-22 Tyfone, Inc. Memory card based contactless devices
US20090164374A1 (en) * 2007-12-21 2009-06-25 Ebay Inc. System and Methods for One Time Check Numbers
US20090171835A1 (en) * 2007-12-26 2009-07-02 Mastercard International, Inc. Multiple Payment Transaction Systems
US20090171830A1 (en) * 2007-12-27 2009-07-02 Mastercard International, Inc. Payment Transaction System
US8622308B1 (en) 2007-12-31 2014-01-07 Jpmorgan Chase Bank, N.A. System and method for processing transactions using a multi-account transactions device
US7958052B2 (en) * 2007-12-31 2011-06-07 Mastercard International Incorporated Methods and systems for cardholder initiated transactions
US7766244B1 (en) 2007-12-31 2010-08-03 Jpmorgan Chase Bank, N.A. System and method for processing transactions using a multi-account transactions device
MX2010007993A (en) * 2008-01-24 2010-12-21 Visa Usa Inc System and method for conducting transactions with a financial presentation device linked to multiple accounts.
US8055184B1 (en) 2008-01-30 2011-11-08 Sprint Communications Company L.P. System and method for active jamming of confidential information transmitted at a point-of-sale reader
US10540712B2 (en) * 2008-02-08 2020-01-21 The Pnc Financial Services Group, Inc. User interface with controller for selectively redistributing funds between accounts
US20090228384A1 (en) * 2008-03-08 2009-09-10 Stefan Melik-Aslanian Real Time Replacement System and Method for Lost or Stolen Credit Cards / Debit Cards
US8655310B1 (en) 2008-04-08 2014-02-18 Sprint Communications Company L.P. Control of secure elements through point-of-sale device
US20090265262A1 (en) * 2008-04-22 2009-10-22 Ebay Inc. Method and system for installment payment utilization
US8208627B2 (en) * 2008-05-02 2012-06-26 Voltage Security, Inc. Format-preserving cryptographic systems
US11488134B2 (en) 2008-05-02 2022-11-01 Micro Focus Llc Format-preserving cryptographic systems
US8862509B2 (en) 2008-05-09 2014-10-14 Rajesh G. Shakkarwar Systems and methods for secure debit payment
US9953313B2 (en) * 2008-05-09 2018-04-24 Verient, Inc. System and method for distributed payment products
US20120271757A9 (en) * 2008-05-09 2012-10-25 Shakkarwar Rajesh G Systems and methods for managing accounts payable
US11080678B2 (en) * 2008-05-09 2021-08-03 Verient, Inc. Payment processing platform
US20090281951A1 (en) * 2008-05-09 2009-11-12 Shakkarwar Rajesh G Payment Processing Platform
US8229806B1 (en) 2008-05-12 2012-07-24 The Pnc Financial Services Group, Inc. Computer implemented method of tracking customer spending and income
US8768736B1 (en) 2008-05-12 2014-07-01 The Pnc Financial Services Group, Inc. Tracking customer spending
US8401938B1 (en) 2008-05-12 2013-03-19 The Pnc Financial Services Group, Inc. Transferring funds between parties' financial accounts
US20090287600A1 (en) * 2008-05-15 2009-11-19 International Business Machines Corporation Automatically updating records of corporate expense systems using category specific payment mechanisms based on point of sale acquired data
US8751385B1 (en) 2008-05-15 2014-06-10 The Pnc Financial Services Group, Inc. Financial email
BRPI0915027A2 (en) * 2008-06-10 2017-06-20 Visa Usa Inc system and method for financing a financial transition card, and, computer readable storage medium
US20090327107A1 (en) * 2008-06-30 2009-12-31 Raghav Lal Consumer spending threshold evaluation
US9449319B1 (en) * 2008-06-30 2016-09-20 Amazon Technologies, Inc. Conducting transactions with dynamic passwords
US8065230B1 (en) 2008-07-14 2011-11-22 The Pnc Financial Services Group, Inc. Family purchase card for developing financial management skills
JP5279379B2 (en) * 2008-07-16 2013-09-04 株式会社セフティーアングル Authentication system and authentication method
US20100019025A1 (en) * 2008-07-23 2010-01-28 Fa-Yu Wang Mobile selling system and a method thereof
US8948375B2 (en) * 2009-05-05 2015-02-03 Voltage Security, Inc. Systems for embedding information in data strings
US8630234B2 (en) 2008-07-28 2014-01-14 Digifonica (International) Limited Mobile gateway
US8219489B2 (en) 2008-07-29 2012-07-10 Visa U.S.A. Inc. Transaction processing using a global unique identifier
US7620580B1 (en) * 2008-07-31 2009-11-17 Branch Banking & Trust Company Method for online account opening
US20100030670A1 (en) * 2008-08-04 2010-02-04 Mastercard International, Inc. Method of monitoring different debit card transactions associated with a single funding source
EP2329439A4 (en) * 2008-08-07 2013-10-02 Mastercard International Inc A method for providing a credit cardholder with multiple funding options
US8144940B2 (en) 2008-08-07 2012-03-27 Clay Von Mueller System and method for authentication of data
US20100033310A1 (en) * 2008-08-08 2010-02-11 Narendra Siva G Power negotation for small rfid card
US8451122B2 (en) 2008-08-08 2013-05-28 Tyfone, Inc. Smartcard performance enhancement circuits and systems
US7961101B2 (en) 2008-08-08 2011-06-14 Tyfone, Inc. Small RFID card with integrated inductive element
US8447669B2 (en) 2008-08-26 2013-05-21 Visa U.S.A. Inc. System and method for implementing financial assistance programs
US8116749B2 (en) 2008-09-08 2012-02-14 Proctor Jr James Arthur Protocol for anonymous wireless communication
US20100063932A1 (en) * 2008-09-08 2010-03-11 Jan Leonhard Camenisch Forming Credentials
CN102232224A (en) * 2008-09-08 2011-11-02 万事达卡国际股份有限公司 A method for a payment cardholder to control and manage the use of a payment card
US8977567B2 (en) 2008-09-22 2015-03-10 Visa International Service Association Recordation of electronic payment transaction information
US9824355B2 (en) * 2008-09-22 2017-11-21 Visa International Service Association Method of performing transactions with contactless payment devices using pre-tap and two-tap operations
US10706402B2 (en) 2008-09-22 2020-07-07 Visa International Service Association Over the air update of payment transaction data stored in secure memory
US20100088207A1 (en) * 2008-09-25 2010-04-08 Mastercard International Incorporated Method and System for Linkage of Generally Available Healthcare Accounts to Credit Card
US8181861B2 (en) 2008-10-13 2012-05-22 Miri Systems, Llc Electronic transaction security system and method
US7995597B2 (en) * 2008-10-14 2011-08-09 Nortel Networks Limited Method and system for weighted fair queuing
US20100174556A1 (en) * 2008-10-21 2010-07-08 Mastercard International Incorporated Method and apparatus for facilitating provider payment
US20100114731A1 (en) * 2008-10-30 2010-05-06 Kingston Tamara S ELECTRONIC WALLET ("eWallet")
US10867298B1 (en) 2008-10-31 2020-12-15 Wells Fargo Bank, N.A. Payment vehicle with on and off function
US20100114768A1 (en) 2008-10-31 2010-05-06 Wachovia Corporation Payment vehicle with on and off function
CA2742963A1 (en) 2008-11-06 2010-05-14 Visa International Service Association Online challenge-response
US8725601B2 (en) * 2008-11-21 2014-05-13 Pscu Financial Services Method and apparatus for consumer driven protection for payment card transactions
US8600883B2 (en) * 2008-12-02 2013-12-03 Ebay Inc. Mobile barcode generation and payment
US8196813B2 (en) * 2008-12-03 2012-06-12 Ebay Inc. System and method to allow access to a value holding account
US8812402B2 (en) * 2009-01-05 2014-08-19 Mastercard International Incorporated Methods, apparatus and articles for use in association with token
US8200582B1 (en) 2009-01-05 2012-06-12 Sprint Communications Company L.P. Mobile device password system
US8060449B1 (en) 2009-01-05 2011-11-15 Sprint Communications Company L.P. Partially delegated over-the-air provisioning of a secure element
WO2010080899A1 (en) * 2009-01-07 2010-07-15 Visa U.S.A. Inc. System and method for managing items of interest selected from online merchants
US8127982B1 (en) 2009-01-09 2012-03-06 Apple Inc. Parental controls
US8255323B1 (en) 2009-01-09 2012-08-28 Apple Inc. Motion based payment confirmation
US8140418B1 (en) 2009-01-09 2012-03-20 Apple Inc. Cardholder-not-present authorization
AU2010204567A1 (en) * 2009-01-15 2011-08-11 Visa U.S.A. Inc. Incentives associated with linked financial accounts
US10628881B2 (en) 2009-01-22 2020-04-21 First Data Corporation Processing transactions with an extended application ID and dynamic cryptograms
US10037524B2 (en) * 2009-01-22 2018-07-31 First Data Corporation Dynamic primary account number (PAN) and unique key per card
US10354321B2 (en) 2009-01-22 2019-07-16 First Data Corporation Processing transactions with an extended application ID and dynamic cryptograms
US10891037B1 (en) * 2009-01-30 2021-01-12 The Pnc Financial Services Group, Inc. User interfaces and system including same
US8965798B1 (en) 2009-01-30 2015-02-24 The Pnc Financial Services Group, Inc. Requesting reimbursement for transactions
US8768845B1 (en) 2009-02-16 2014-07-01 Sprint Communications Company L.P. Electronic wallet removal from mobile electronic devices
WO2010099093A1 (en) 2009-02-24 2010-09-02 Tyfone, Inc. Contactless device with miniaturized antenna
WO2010099352A1 (en) * 2009-02-25 2010-09-02 Miri Systems, Llc Payment system and method
US20100229245A1 (en) * 2009-03-05 2010-09-09 Tara Chand Singhal System of security that prevents abuse of identity data in global commerce via mobile wireless authorizations
US9934496B1 (en) * 2009-04-09 2018-04-03 Intuit Inc. Data masking using a proxy server
US9715681B2 (en) 2009-04-28 2017-07-25 Visa International Service Association Verification of portable consumer devices
EP2425386A2 (en) * 2009-04-30 2012-03-07 Donald Michael Cardina Systems and methods for randomized mobile payment
US20100276484A1 (en) * 2009-05-01 2010-11-04 Ashim Banerjee Staged transaction token for merchant rating
AU2010246085A1 (en) * 2009-05-04 2011-12-01 Visa International Service Association Determining targeted incentives based on consumer transaction history
US8251283B1 (en) 2009-05-08 2012-08-28 Oberon Labs, LLC Token authentication using spatial characteristics
US9038886B2 (en) 2009-05-15 2015-05-26 Visa International Service Association Verification of portable consumer devices
US8893967B2 (en) 2009-05-15 2014-11-25 Visa International Service Association Secure Communication of payment information to merchants using a verification token
US9105027B2 (en) 2009-05-15 2015-08-11 Visa International Service Association Verification of portable consumer device for secure services
US7891560B2 (en) 2009-05-15 2011-02-22 Visa International Service Assocation Verification of portable consumer devices
US8534564B2 (en) 2009-05-15 2013-09-17 Ayman Hammad Integration of verification tokens with mobile communication devices
US10846683B2 (en) 2009-05-15 2020-11-24 Visa International Service Association Integration of verification tokens with mobile communication devices
US8602293B2 (en) 2009-05-15 2013-12-10 Visa International Service Association Integration of verification tokens with portable computing devices
US10140598B2 (en) 2009-05-20 2018-11-27 Visa International Service Association Device including encrypted data for expiration date and verification value creation
US20100306029A1 (en) * 2009-06-01 2010-12-02 Ryan Jolley Cardholder Clusters
US8393545B1 (en) * 2009-06-23 2013-03-12 Dynamics Inc. Cards deployed with inactivated products for activation
US8290868B2 (en) 2009-07-07 2012-10-16 Chenot Richard H Financial cards and methods for per-transaction personal financial management
US8439274B2 (en) 2009-07-07 2013-05-14 Richard H Chenot Financial card with a per-transaction user definable magnetic strip portion
WO2011005848A2 (en) * 2009-07-07 2011-01-13 Chenot Richard H Systems and methods for per-transaction financial card enabled personal financial management
US8265998B2 (en) 2009-07-07 2012-09-11 Chenot Richard H Systems and methods for per-transaction financial card enabled personal financial management
US20110010254A1 (en) 2009-07-07 2011-01-13 Chenot Richard H Transaction processing systems and methods for per-transaction personal financial management
US20120191615A1 (en) * 2009-07-27 2012-07-26 Suridx, Inc. Secure Credit Transactions
US8266031B2 (en) * 2009-07-29 2012-09-11 Visa U.S.A. Systems and methods to provide benefits of account features to account holders
US20110024496A1 (en) * 2009-07-29 2011-02-03 Keith Herman Nicaise Credit card, debit card or prepaid card with improved security features
US20110047075A1 (en) * 2009-08-19 2011-02-24 Mastercard International Incorporated Location controls on payment card transactions
US8638939B1 (en) 2009-08-20 2014-01-28 Apple Inc. User authentication on an electronic device
US9996825B1 (en) 2009-08-20 2018-06-12 Apple Inc. Electronic device enabled payments
US8468580B1 (en) 2009-08-20 2013-06-18 Apple Inc. Secure communication between trusted parties
JP5484823B2 (en) * 2009-08-21 2014-05-07 株式会社ジャパンネット銀行 Information processing apparatus, cardless payment system, cardless payment method, cashless payment method and program for cardless payment
US20110055079A1 (en) * 2009-08-31 2011-03-03 David Meaney Real time accounts payable web service
US8675566B2 (en) 2009-09-17 2014-03-18 Digifonica (International) Limited Uninterrupted transmission of internet protocol transmissions during endpoint changes
US9373141B1 (en) 2009-09-23 2016-06-21 Verient, Inc. System and method for automatically filling webpage fields
MX2012004070A (en) 2009-10-05 2012-08-17 Miri Systems Llc Electronic transaction security system and method.
US20110093324A1 (en) 2009-10-19 2011-04-21 Visa U.S.A. Inc. Systems and Methods to Provide Intelligent Analytics to Cardholders and Merchants
US20110106715A1 (en) * 2009-10-30 2011-05-05 Bizilia Stephen J Family membership of businesses and consumers bound together by credit and debit cards for safety
US8938067B2 (en) 2009-10-30 2015-01-20 Voltage Security, Inc. Format preserving encryption methods for data strings with constraints
WO2011063024A2 (en) * 2009-11-18 2011-05-26 Magid Joseph Mina Anonymous transaction payment systems and methods
US20110137805A1 (en) * 2009-12-03 2011-06-09 International Business Machines Corporation Inter-cloud resource sharing within a cloud computing environment
US20110137740A1 (en) 2009-12-04 2011-06-09 Ashmit Bhattacharya Processing value-ascertainable items
WO2011084648A2 (en) 2009-12-16 2011-07-14 Giftango Corporation Systems and methods for generating a virtual value item for a promotional campaign
US10255591B2 (en) 2009-12-18 2019-04-09 Visa International Service Association Payment channel returning limited use proxy dynamic value
US10049356B2 (en) 2009-12-18 2018-08-14 First Data Corporation Authentication of card-not-present transactions
US8387869B2 (en) * 2009-12-24 2013-03-05 International Business Machines Corporation Protecting electronic cards
CA2786264A1 (en) 2010-01-08 2011-07-14 Blackhawk Network, Inc. A system for processing, activating and redeeming value added prepaid cards
US10037526B2 (en) 2010-01-08 2018-07-31 Blackhawk Network, Inc. System for payment via electronic wallet
AU2011205391B2 (en) 2010-01-12 2014-11-20 Visa International Service Association Anytime validation for verification tokens
US10387853B1 (en) 2010-01-19 2019-08-20 The Pnc Financial Services Group, Inc. Secondary purchase card for financial transactions (“cap card”)
US10719876B2 (en) * 2010-01-22 2020-07-21 Verient, Inc. Systems and methods for controlling payment processing
US8868458B1 (en) 2010-02-12 2014-10-21 Jpmorgan Chase Bank, N.A. Remote account control system and method
US9799070B1 (en) 2010-02-14 2017-10-24 Expensify, Inc. System and method for aggregating and presenting financial information
US8788333B2 (en) * 2010-02-23 2014-07-22 Mastercard International Incorporated Method, apparatus, and computer program product for facilitating promotions with an E-wallet
US8935797B1 (en) * 2010-02-25 2015-01-13 American Express Travel Related Services Company, Inc. System and method for online data processing
US10255601B2 (en) 2010-02-25 2019-04-09 Visa International Service Association Multifactor authentication using a directory server
US9245267B2 (en) * 2010-03-03 2016-01-26 Visa International Service Association Portable account number for consumer payment account
US20110238511A1 (en) * 2010-03-07 2011-09-29 Park Steve H Fuel dispenser payment system and method
US20110225067A1 (en) * 2010-03-12 2011-09-15 The Western Union Company Fraud prevention using customer and agent facing devices
AU2011228735A1 (en) * 2010-03-18 2012-11-08 Tranwall Holdings Limited Operation of a mobile communication device
US8635159B1 (en) * 2010-03-26 2014-01-21 Bank Of America Corporation Self-service terminal limited access personal identification number (“PIN”)
US8447641B1 (en) 2010-03-29 2013-05-21 Jpmorgan Chase Bank, N.A. System and method for automatically enrolling buyers into a network
US9317850B2 (en) 2010-04-05 2016-04-19 Cardinalcommerce Corporation Method and system for processing PIN debit transactions
US8780115B1 (en) 2010-04-06 2014-07-15 The Pnc Financial Services Group, Inc. Investment management marketing tool
US8791949B1 (en) 2010-04-06 2014-07-29 The Pnc Financial Services Group, Inc. Investment management marketing tool
US8762278B2 (en) * 2010-04-13 2014-06-24 Enservio, Inc. Dual-activation financial products
US8346665B2 (en) * 2010-04-13 2013-01-01 Enservio, Inc. Dual-activation financial products
US9471926B2 (en) 2010-04-23 2016-10-18 Visa U.S.A. Inc. Systems and methods to provide offers to travelers
US8375066B2 (en) * 2010-04-26 2013-02-12 International Business Machines Corporation Generating unique identifiers
US20110302084A1 (en) * 2010-06-02 2011-12-08 Stefan Melik-Aslanian System and method for immediate replacement of lost or stolen credit cards/debit cards
AU2011261259B2 (en) * 2010-06-04 2015-05-14 Visa International Service Association Payment tokenization apparatuses, methods and systems
US10068287B2 (en) 2010-06-11 2018-09-04 David A. Nelsen Systems and methods to manage and control use of a virtual card
US20120323783A1 (en) * 2011-06-14 2012-12-20 Matt Canetto Method and System for Customizing Fraud Detection
US8560698B2 (en) 2010-06-27 2013-10-15 International Business Machines Corporation Allocating unique identifiers using metadata
US11475524B1 (en) 2010-07-02 2022-10-18 The Pnc Financial Services Group, Inc. Investor retirement lifestyle planning tool
US8423444B1 (en) 2010-07-02 2013-04-16 The Pnc Financial Services Group, Inc. Investor personality tool
US8417614B1 (en) 2010-07-02 2013-04-09 The Pnc Financial Services Group, Inc. Investor personality tool
US11475523B1 (en) 2010-07-02 2022-10-18 The Pnc Financial Services Group, Inc. Investor retirement lifestyle planning tool
US8548857B2 (en) 2010-07-10 2013-10-01 William Jennings STEVISON Method and system for detection of credit card fraud
US9940619B2 (en) 2010-07-13 2018-04-10 Dfs Services Llc Processing non-traditional transactions on a traditional payment network
WO2012012545A1 (en) * 2010-07-20 2012-01-26 Wi-Mexx International Limited System and methods for transferring money
US9760905B2 (en) 2010-08-02 2017-09-12 Visa International Service Association Systems and methods to optimize media presentations using a camera
US9342832B2 (en) 2010-08-12 2016-05-17 Visa International Service Association Securing external systems with account token substitution
AU2011293250A1 (en) 2010-08-27 2013-03-21 Blackhawk Network, Inc. Prepaid card with savings feature
US9536366B2 (en) 2010-08-31 2017-01-03 Democracyontheweb, Llc Systems and methods for voting
US20120072346A1 (en) * 2010-09-16 2012-03-22 Yomir Sp System and method for securing and authenticating purchase transactions
WO2012037479A1 (en) 2010-09-17 2012-03-22 Universal Secure Registry, Llc Apparatus, system and method employing a wireless user-device
US8589288B1 (en) 2010-10-01 2013-11-19 Jpmorgan Chase Bank, N.A. System and method for electronic remittance of funds
US9483786B2 (en) 2011-10-13 2016-11-01 Gift Card Impressions, LLC Gift card ordering system and method
US9031869B2 (en) 2010-10-13 2015-05-12 Gift Card Impressions, LLC Method and system for generating a teaser video associated with a personalized gift
WO2012054786A1 (en) 2010-10-20 2012-04-26 Playspan Inc. Flexible monetization service apparatuses, methods and systems
US20120101938A1 (en) * 2010-10-25 2012-04-26 Sheldon Kasower Method and system for secure online payments
US11144916B2 (en) * 2010-10-28 2021-10-12 Ncr Corporation Techniques for conducting single or limited use purchases via a mobile device
US8880421B2 (en) * 2010-11-10 2014-11-04 Mobiteris, Inc. System and method for rewarding customer loyalty in a mobile environment
US10176477B2 (en) 2010-11-16 2019-01-08 Mastercard International Incorporated Methods and systems for universal payment account translation
JP5656583B2 (en) * 2010-11-25 2015-01-21 株式会社日本総合研究所 Credit examination system, credit examination method, portable information processing apparatus, and computer program
WO2012078810A2 (en) * 2010-12-07 2012-06-14 Groupon Zappedy, Inc. Method and system for credit card holder identification
EP2649745A4 (en) * 2010-12-10 2014-05-07 Electronic Payment Exchange Tokenized contactless payments for mobile devices
US11978031B2 (en) 2010-12-14 2024-05-07 E2Interactive, Inc. Systems and methods that create a pseudo prescription from transaction data generated during a point of sale purchase at a front of a store
US8762284B2 (en) * 2010-12-16 2014-06-24 Democracyontheweb, Llc Systems and methods for facilitating secure transactions
US10204327B2 (en) 2011-02-05 2019-02-12 Visa International Service Association Merchant-consumer bridging platform apparatuses, methods and systems
WO2012109628A2 (en) 2011-02-10 2012-08-16 Visa International Service Assocation Electronic coupon issuance and redemption apparatuses, methods and systems
US10586227B2 (en) 2011-02-16 2020-03-10 Visa International Service Association Snap mobile payment apparatuses, methods and systems
CN106803175B (en) 2011-02-16 2021-07-30 维萨国际服务协会 Snap mobile payment device, method and system
US8688512B2 (en) 2011-02-17 2014-04-01 Boku, Inc. Offer insertion system
US10223691B2 (en) 2011-02-22 2019-03-05 Visa International Service Association Universal electronic payment apparatuses, methods and systems
WO2012116221A1 (en) 2011-02-23 2012-08-30 Mastercard International, Inc. Demand deposit account payment system
US8374940B1 (en) 2011-02-28 2013-02-12 The Pnc Financial Services Group, Inc. Wealth allocation analysis tools
US9665908B1 (en) 2011-02-28 2017-05-30 The Pnc Financial Services Group, Inc. Net worth analysis tools
US8321316B1 (en) 2011-02-28 2012-11-27 The Pnc Financial Services Group, Inc. Income analysis tools for wealth management
US9852470B1 (en) 2011-02-28 2017-12-26 The Pnc Financial Services Group, Inc. Time period analysis tools for wealth management transactions
AU2012223415B2 (en) 2011-02-28 2017-05-18 Visa International Service Association Secure anonymous transaction apparatuses, methods and systems
US8458069B2 (en) * 2011-03-04 2013-06-04 Brighterion, Inc. Systems and methods for adaptive identification of sources of fraud
US9996838B2 (en) 2011-03-04 2018-06-12 Visa International Service Association Cloud service facilitator apparatuses, methods and systems
EP2681701A4 (en) 2011-03-04 2014-08-20 Visa Int Service Ass Integration of payment capability into secure elements of computers
US20120238206A1 (en) * 2011-03-14 2012-09-20 Research In Motion Limited Communications device providing near field communication (nfc) secure element disabling features related methods
US11514451B2 (en) 2011-03-15 2022-11-29 Capital One Services, Llc Systems and methods for performing financial transactions using active authentication
US10453062B2 (en) * 2011-03-15 2019-10-22 Capital One Services, Llc Systems and methods for performing person-to-person transactions using active authentication
US10089612B2 (en) 2011-03-15 2018-10-02 Capital One Services, Llc Systems and methods for performing ATM fund transfer using active authentication
US8543504B1 (en) 2011-03-30 2013-09-24 Jpmorgan Chase Bank, N.A. Systems and methods for automated invoice entry
US8543503B1 (en) 2011-03-30 2013-09-24 Jpmorgan Chase Bank, N.A. Systems and methods for automated invoice entry
US20120259768A1 (en) * 2011-04-05 2012-10-11 Ebay Inc. System and method for providing proxy accounts
US10210497B2 (en) 2011-04-06 2019-02-19 OnDot Systems, Inc. System and method for cashless peer-to-peer payment
US8887994B1 (en) * 2011-04-07 2014-11-18 Wells Fargo Bank, N.A. System and method of authentication using a re-writable card verification value
WO2012142045A2 (en) 2011-04-11 2012-10-18 Visa International Service Association Multiple tokenization for authentication
US10769624B1 (en) * 2011-04-15 2020-09-08 United Services Automobile Association (Usaa) Methods and systems for re-provisioning a mobile wallet
US8688589B2 (en) * 2011-04-15 2014-04-01 Shift4 Corporation Method and system for utilizing authorization factor pools
US9256874B2 (en) 2011-04-15 2016-02-09 Shift4 Corporation Method and system for enabling merchants to share tokens
US9818111B2 (en) 2011-04-15 2017-11-14 Shift4 Corporation Merchant-based token sharing
US10733570B1 (en) 2011-04-19 2020-08-04 The Pnc Financial Services Group, Inc. Facilitating employee career development
WO2012149062A2 (en) * 2011-04-25 2012-11-01 Mastercard International Incorporated Methods and systems for offer and dynamic gift verification and redemption
US10380570B2 (en) 2011-05-02 2019-08-13 Ondot System, Inc. System and method for secure communication for cashless transactions
WO2012151590A2 (en) * 2011-05-05 2012-11-08 Transaction Network Services, Inc. Systems and methods for enabling mobile payments
US8861861B2 (en) 2011-05-10 2014-10-14 Expensify, Inc. System and method for processing receipts and other records of users
WO2012155081A1 (en) 2011-05-11 2012-11-15 Visa International Service Association Electronic receipt manager apparatuses, methods and systems
US20130204793A1 (en) * 2011-05-17 2013-08-08 Kevin S. Kerridge Smart communication device secured electronic payment system
KR101797245B1 (en) * 2011-05-26 2017-11-14 주식회사 케이티 System and method for payment based on near field communication
US20120303310A1 (en) 2011-05-26 2012-11-29 First Data Corporation Systems and Methods for Providing Test Keys to Mobile Devices
SG195079A1 (en) 2011-06-03 2013-12-30 Visa Int Service Ass Virtual wallet card selection apparatuses, methods and systems
US20120317034A1 (en) * 2011-06-13 2012-12-13 Microsoft Corporation Transparent virtual currency using verifiable tokens
US11049110B2 (en) * 2011-06-17 2021-06-29 Zelis Payments, Llc Healthcare transaction facilitation platform apparatuses, methods and systems
US20120323787A1 (en) * 2011-06-17 2012-12-20 Giftango Corporation Systems and methods for fixed form card to virtual card communication
US9600808B1 (en) * 2011-06-24 2017-03-21 Epic One Texas, Llc Secure payment card, method and system
JP5400097B2 (en) * 2011-06-30 2014-01-29 楽天株式会社 Credit card information processing system, credit card information processing method, order information receiving apparatus, credit card settlement apparatus, program, and information recording medium
US9582598B2 (en) 2011-07-05 2017-02-28 Visa International Service Association Hybrid applications utilizing distributed models and views apparatuses, methods and systems
US10121129B2 (en) 2011-07-05 2018-11-06 Visa International Service Association Electronic wallet checkout platform apparatuses, methods and systems
US9355393B2 (en) 2011-08-18 2016-05-31 Visa International Service Association Multi-directional wallet connector apparatuses, methods and systems
US20130013502A1 (en) * 2011-07-07 2013-01-10 Bank Of America Corporation Facilitation of Transactions Using a Transaction Code
US10438176B2 (en) 2011-07-17 2019-10-08 Visa International Service Association Multiple merchant payment processor platform apparatuses, methods and systems
US20130024383A1 (en) * 2011-07-18 2013-01-24 Sasikumar Kannappan Mobile Device With Secure Element
US20130030926A1 (en) 2011-07-28 2013-01-31 American Express Travel Related Services Company, Inc. Systems and methods for generating and using a digital pass
US9704155B2 (en) 2011-07-29 2017-07-11 Visa International Service Association Passing payment tokens through an hop/sop
US9704195B2 (en) * 2011-08-04 2017-07-11 Fair Isaac Corporation Multiple funding account payment instrument analytics
US9710807B2 (en) 2011-08-18 2017-07-18 Visa International Service Association Third-party value added wallet features and interfaces apparatuses, methods and systems
US10242358B2 (en) 2011-08-18 2019-03-26 Visa International Service Association Remote decoupled application persistent state apparatuses, methods and systems
US10318941B2 (en) 2011-12-13 2019-06-11 Visa International Service Association Payment platform interface widget generation apparatuses, methods and systems
US10825001B2 (en) 2011-08-18 2020-11-03 Visa International Service Association Multi-directional wallet connector apparatuses, methods and systems
US10223707B2 (en) 2011-08-19 2019-03-05 Visa International Service Association Systems and methods to communicate offer options via messaging in real time with processing of payment transaction
US9165294B2 (en) 2011-08-24 2015-10-20 Visa International Service Association Method for using barcodes and mobile devices to conduct payment transactions
US20130060686A1 (en) * 2011-09-02 2013-03-07 Randy Mersky Virtual debit card
US10460378B1 (en) 2011-09-12 2019-10-29 OnDot Systems, Inc. Payment card policy enforcement
DE102011053658A1 (en) 2011-09-15 2013-03-21 Tim Meyer-Dulheuer System for electronic archiving of e.g. receipts in commercial shopping area, has signature and cryptographic device connected with point-of-sale system, where identification of consumers is carried out during each transaction
US9117225B2 (en) 2011-09-16 2015-08-25 Visa International Service Association Apparatuses, methods and systems for transforming user infrastructure requests inputs to infrastructure design product and infrastructure allocation outputs
US20130080275A1 (en) * 2011-09-23 2013-03-28 Bank Of America Corporation Transaction device and processing system
US9105020B2 (en) 2011-09-23 2015-08-11 Bank Of America Corporation Transaction device and processing system
US10223730B2 (en) 2011-09-23 2019-03-05 Visa International Service Association E-wallet store injection search apparatuses, methods and systems
US9111269B2 (en) * 2011-09-23 2015-08-18 Bank Of America Corporation Transaction device and processing system
US20130080331A1 (en) * 2011-09-26 2013-03-28 Ebay Inc. System and Method for Instantaneous Retail Payment
US10242368B1 (en) * 2011-10-17 2019-03-26 Capital One Services, Llc System and method for providing software-based contactless payment
US9544759B2 (en) 2011-11-01 2017-01-10 Google Inc. Systems, methods, and computer program products for managing states
CN107104939B (en) 2011-11-01 2021-01-12 谷歌有限责任公司 System, method for managing secure elements
US8401904B1 (en) 2011-11-13 2013-03-19 Google Inc. Real-time payment authorization
EP2595104B1 (en) * 2011-11-17 2018-07-11 Deutsche Post AG Electronic transaction method
US8799162B2 (en) * 2011-11-30 2014-08-05 Boku, Inc. Pass-through payment system
US20140337230A1 (en) * 2011-12-01 2014-11-13 Sk C&C Co., Ltd. Method and system for secure mobile wallet transaction
US8918855B2 (en) * 2011-12-09 2014-12-23 Blackberry Limited Transaction provisioning for mobile wireless communications devices and related methods
US9111301B2 (en) 2011-12-13 2015-08-18 Boku, Inc. Activating an account based on an SMS message
US9953378B2 (en) 2012-04-27 2018-04-24 Visa International Service Association Social checkout widget generation and integration apparatuses, methods and systems
US10096022B2 (en) 2011-12-13 2018-10-09 Visa International Service Association Dynamic widget generator apparatuses, methods and systems
US20130159178A1 (en) * 2011-12-14 2013-06-20 Firethorn Mobile, Inc. System and Method For Loading A Virtual Token Managed By A Mobile Wallet System
US20130166441A1 (en) * 2011-12-22 2013-06-27 Egor Kobylkin Instant Disposable Payment Card
KR20130082948A (en) * 2011-12-23 2013-07-22 주식회사 케이티 Payment agency system, user terminal and market server
US10147089B2 (en) 2012-01-05 2018-12-04 Visa International Service Association Data protection with translation
US10223710B2 (en) 2013-01-04 2019-03-05 Visa International Service Association Wearable intelligent vision device apparatuses, methods and systems
US11308227B2 (en) 2012-01-09 2022-04-19 Visa International Service Association Secure dynamic page content and layouts apparatuses, methods and systems
US8812396B2 (en) 2012-01-09 2014-08-19 Mastercard International Incorporated E-wallet with cross-border capability
US10262148B2 (en) 2012-01-09 2019-04-16 Visa International Service Association Secure dynamic page content and layouts apparatuses, methods and systems
US20130191279A1 (en) * 2012-01-20 2013-07-25 Bank Of America Corporation Mobile device with rewritable general purpose card
US10169812B1 (en) 2012-01-20 2019-01-01 The Pnc Financial Services Group, Inc. Providing financial account information to users
WO2013113004A1 (en) 2012-01-26 2013-08-01 Visa International Service Association System and method of providing tokenization as a service
US8949625B2 (en) 2012-01-30 2015-02-03 Voltage Security, Inc. Systems for structured encryption using embedded information in data strings
US10417677B2 (en) 2012-01-30 2019-09-17 Gift Card Impressions, LLC Group video generating system
US10929830B2 (en) * 2012-01-30 2021-02-23 Paypal, Inc. Systems and methods to provide check-in based payment processes
AU2013214801B2 (en) 2012-02-02 2018-06-21 Visa International Service Association Multi-source, multi-dimensional, cross-entity, multimedia database platform apparatuses, methods and systems
US9129320B2 (en) 2012-02-08 2015-09-08 Boku, Inc. Default phone bill charging
US20130212007A1 (en) 2012-02-10 2013-08-15 Protegrity Corporation Tokenization in payment environments
US8630904B2 (en) 2012-02-14 2014-01-14 Boku, Inc. Transaction authentication with a variable-type user-stored account identifier
US8719167B2 (en) 2012-03-02 2014-05-06 American Express Travel Related Services Company, Inc. Systems and methods for enhanced authorization fraud mitigation
US10282724B2 (en) 2012-03-06 2019-05-07 Visa International Service Association Security system incorporating mobile device
CN103312499B (en) * 2012-03-12 2018-07-03 西安西电捷通无线网络通信股份有限公司 A kind of identity identifying method and system
US20130246259A1 (en) * 2012-03-15 2013-09-19 Firethorn Mobile, Inc. System and method for managing payment in transactions with a pcd
US9092776B2 (en) 2012-03-15 2015-07-28 Qualcomm Incorporated System and method for managing payment in transactions with a PCD
US9105021B2 (en) * 2012-03-15 2015-08-11 Ebay, Inc. Systems, methods, and computer program products for using proxy accounts
WO2013147904A1 (en) * 2012-03-31 2013-10-03 Intel Corporation Securely generating time and location bounded virtual transaction cards using mobile wallets without involving third parties or point of sale terminals
US20130259028A1 (en) * 2012-04-02 2013-10-03 Thomas E. Skala Telephony integrated communication system and method
US11042870B2 (en) 2012-04-04 2021-06-22 Blackhawk Network, Inc. System and method for using intelligent codes to add a stored-value card to an electronic wallet
US8249893B1 (en) 2012-04-05 2012-08-21 Stoneeagle Services, Inc. Automated service provider payment method
DE102012205904A1 (en) * 2012-04-11 2013-10-17 Deutsche Post Ag Secure generation of a user account in a service server
EP2654006A1 (en) * 2012-04-17 2013-10-23 Deutsche Post AG Electronic transaction method
US20140229388A1 (en) * 2012-04-18 2014-08-14 Edgard Lobo Baptista Pereira System and Method for Data and Identity Verification and Authentication
US20130282588A1 (en) * 2012-04-22 2013-10-24 John Hruska Consumer, Merchant and Mobile Device Specific, Real-Time Dynamic Tokenization Activation within a Secure Mobile-Wallet Financial Transaction System
US10275764B2 (en) 2012-05-04 2019-04-30 Mastercard International Incorporated Transaction data tokenization
US20130297501A1 (en) 2012-05-04 2013-11-07 Justin Monk System and method for local data conversion
US20130297509A1 (en) * 2012-05-07 2013-11-07 Infosys Limited Mobile payment using dynamic authorization code and multi-payer shared card number
US20130311382A1 (en) * 2012-05-21 2013-11-21 Klaus S. Fosmark Obtaining information for a payment transaction
US8332238B1 (en) 2012-05-30 2012-12-11 Stoneeagle Services, Inc. Integrated payment and explanation of benefits presentation method for healthcare providers
US10068295B1 (en) 2012-05-30 2018-09-04 Vpay, Inc. Merchant portal system with explanation of benefits
US9031877B1 (en) * 2012-05-31 2015-05-12 Deloitte Development Llc Credit card fraud prevention system and method
US9524501B2 (en) 2012-06-06 2016-12-20 Visa International Service Association Method and system for correlating diverse transaction data
US20130339188A1 (en) * 2012-06-18 2013-12-19 Ebay Inc. Gift token
US20190147450A1 (en) 2012-06-19 2019-05-16 Ondot System Real-time enrichment of raw merchant data from iso transactions on data communication networks for preventing false declines in fraud prevention systems
US12112300B2 (en) 2012-06-19 2024-10-08 OnDot Systems, Inc. Injecting user control for card-on-file merchant data and implicitly-identified recurring payment transaction parameters between acquirer processors and issuer processors over data communication networks
US11899711B2 (en) 2012-06-19 2024-02-13 Ondot Systems Inc. Merchant logo detection artificial intelligence (AI) for injecting user control to ISO back-end transaction approvals between acquirer processors and issuer processors over data communication networks
US11636489B2 (en) 2013-10-19 2023-04-25 Ondot Systems Inc. System and method for authorizing a transaction based on dynamic location updates from a user device
US20130346173A1 (en) * 2012-06-25 2013-12-26 Ebay, Inc. Driving New User Acquisition from Payment Transactions
US10984415B2 (en) * 2012-06-25 2021-04-20 Li Tan System and methods for using limit-use encrypted code to transfer values securely among users
US20130346305A1 (en) * 2012-06-26 2013-12-26 Carta Worldwide Inc. Mobile wallet payment processing
KR20140003840A (en) * 2012-06-29 2014-01-10 주식회사 케이티 Method and system for financial transaction
DE202012006284U1 (en) 2012-06-30 2012-07-12 Tassilo Priebisch Serving for credit cards and the like
WO2014008403A1 (en) 2012-07-03 2014-01-09 Visa International Service Association Data protection hub
US20140012704A1 (en) 2012-07-05 2014-01-09 Google Inc. Selecting a preferred payment instrument based on a merchant category
US20140025445A1 (en) * 2012-07-17 2014-01-23 Mastercard International Incorporated Method and system for on demand daily deal settlement
US20140025576A1 (en) * 2012-07-20 2014-01-23 Ebay, Inc. Mobile Check-In
US9846861B2 (en) 2012-07-25 2017-12-19 Visa International Service Association Upstream and downstream data conversion
US9256871B2 (en) 2012-07-26 2016-02-09 Visa U.S.A. Inc. Configurable payment tokens
US8676709B2 (en) 2012-07-31 2014-03-18 Google Inc. Merchant category codes in a proxy card transaction
US20140046838A1 (en) * 2012-08-10 2014-02-13 Mastercard International Incorporated System and method for beneficiary controlled use of paid benefits
US9665722B2 (en) 2012-08-10 2017-05-30 Visa International Service Association Privacy firewall
CN104871189B (en) * 2012-08-21 2018-11-23 西班牙洲际银行 The method and system of mobile contactless ticketing service/payment is realized by mobile phone application
US20140067566A1 (en) * 2012-09-06 2014-03-06 American Express Travel Related Services Company, Inc. Smartphone barcode transactions
AU2013315510B2 (en) 2012-09-11 2019-08-22 Visa International Service Association Cloud-based Virtual Wallet NFC Apparatuses, methods and systems
US20140081852A1 (en) * 2012-09-14 2014-03-20 Bank Of America Corporation Bill payment using gift card
US9569769B2 (en) 2012-09-17 2017-02-14 E2Interactive, Inc. Composite activation indicia substrate
KR101793664B1 (en) 2012-09-18 2017-11-06 구글 엘엘씨 Systems, methods, and computer program products for interfacing multiple service provider trusted service managers and secure elements
US9824471B2 (en) 2012-09-27 2017-11-21 Oracle International Corporation Automatic generation of hierarchy visualizations
US20140095390A1 (en) * 2012-09-28 2014-04-03 Oracle International Corporation Mobile transaction approvals
US11210648B2 (en) 2012-10-17 2021-12-28 Royal Bank Of Canada Systems, methods, and devices for secure generation and processing of data sets representing pre-funded payments
US20160019536A1 (en) * 2012-10-17 2016-01-21 Royal Bank Of Canada Secure processing of data
US11961075B2 (en) * 2014-10-10 2024-04-16 Royal Bank Of Canada Systems for processing electronic transactions
US11080701B2 (en) 2015-07-02 2021-08-03 Royal Bank Of Canada Secure processing of electronic payments
CA3126471A1 (en) 2012-10-17 2014-04-17 Royal Bank Of Canada Virtualization and secure processing of data
US10176478B2 (en) 2012-10-23 2019-01-08 Visa International Service Association Transaction initiation determination system utilizing transaction data elements
JP5962440B2 (en) * 2012-11-01 2016-08-03 沖電気工業株式会社 Transaction apparatus and transaction method
US10057400B1 (en) 2012-11-02 2018-08-21 Majen Tech, LLC Lock screen interface for a mobile device apparatus
US11222329B2 (en) * 2012-11-05 2022-01-11 Mastercard International Incorporated Electronic wallet apparatus, method, and computer program product
KR20140060849A (en) * 2012-11-12 2014-05-21 주식회사 케이티 System and method for card payment
US10621589B2 (en) 2012-11-14 2020-04-14 Jonathan E. Jaffe System for merchant and non-merchant based tractions utilizing secure communications while allowing for secure additional functionality
WO2014081822A2 (en) 2012-11-20 2014-05-30 Blackhawk Network, Inc. System and method for using intelligent codes in conjunction with stored-value cards
US9911118B2 (en) 2012-11-21 2018-03-06 Visa International Service Association Device pairing via trusted intermediary
KR101460179B1 (en) 2012-11-28 2014-11-10 에스케이씨앤씨 주식회사 Method for Temporary Payment Card Set-up and Mobile Device using the same
US10304047B2 (en) 2012-12-07 2019-05-28 Visa International Service Association Token generating component
US9786003B2 (en) 2012-12-11 2017-10-10 Visa International Service Association Prepaid load with account linking
KR101354388B1 (en) * 2012-12-12 2014-01-23 신한카드 주식회사 Generating method for one time code
US10360627B2 (en) 2012-12-13 2019-07-23 Visa International Service Association Systems and methods to provide account features via web based user interfaces
US10049404B2 (en) * 2012-12-18 2018-08-14 Trading Technologies International, Inc. Methods and systems to prevent adverse exchange limit effects
US10740731B2 (en) 2013-01-02 2020-08-11 Visa International Service Association Third party settlement
US9741051B2 (en) 2013-01-02 2017-08-22 Visa International Service Association Tokenization and third-party interaction
US9858571B2 (en) * 2013-01-02 2018-01-02 Mastercard International Incorporated Methods and systems for mitigating fraud losses during a payment card transaction
US9147187B1 (en) * 2013-01-09 2015-09-29 Sprint Communications Company L.P. Storing and accessing a plurality of payment options on a secure element
US11431834B1 (en) 2013-01-10 2022-08-30 Majen Tech, LLC Screen interface for a mobile device apparatus
US10051103B1 (en) 2013-01-10 2018-08-14 Majen Tech, LLC Screen interface for a mobile device apparatus
US11219288B2 (en) 2013-02-15 2022-01-11 E2Interactive, Inc. Gift card box with slanted tray and slit
US9565911B2 (en) 2013-02-15 2017-02-14 Gift Card Impressions, LLC Gift card presentation devices
US10163108B1 (en) 2013-02-28 2018-12-25 OnDot Systems, Inc. Transparently reconstructing sniffed network traffic over a back-end data communications network to reconstruct payment card transactions for generating user notifications during transactions
US9092767B1 (en) 2013-03-04 2015-07-28 Google Inc. Selecting a preferred payment instrument
US20140279554A1 (en) * 2013-03-12 2014-09-18 Seth Priebatsch Distributed authenticity verification for consumer payment transactions
EP2956825B1 (en) 2013-03-15 2020-06-24 Apple Inc. Facilitating transactions with a user account using a wireless device
US10339506B2 (en) * 2013-03-25 2019-07-02 Swoop Ip Holdings Llc Method and system for a secure registration
WO2014178128A1 (en) * 2013-04-30 2014-11-06 楽天株式会社 Information processing device, information processing method, and information processing program
US11055710B2 (en) 2013-05-02 2021-07-06 Visa International Service Association Systems and methods for verifying and processing transactions using virtual currency
US10217107B2 (en) 2013-05-02 2019-02-26 Gift Card Impressions, LLC Stored value card kiosk system and method
BR112015028628A2 (en) 2013-05-15 2017-07-25 Visa Int Service Ass method and system
US10552832B2 (en) 2013-05-22 2020-02-04 Mastercard International Incorporated System and method for processing financial transactions funded via limited use virtual payment numbers
US10878422B2 (en) 2013-06-17 2020-12-29 Visa International Service Association System and method using merchant token
US10878416B2 (en) 2013-06-21 2020-12-29 Mastercard International Incorporated Apparatus, method, and computer program product for bus rapid transit ticketing and the like
AP2015008886A0 (en) * 2013-06-26 2015-11-30 Visa Cape Town Pty Ltd Financial account with group authorization
US10489852B2 (en) * 2013-07-02 2019-11-26 Yodlee, Inc. Financial account authentication
GB2518277B (en) * 2013-07-15 2017-05-03 Mastercard International Inc Improvements relating to secure payment transactions
GB201312975D0 (en) * 2013-07-19 2013-09-04 Barclays Bank Plc Payment system
WO2015008084A1 (en) * 2013-07-19 2015-01-22 Barclays Bank Plc Discount offer system
AP2016009010A0 (en) 2013-07-26 2016-01-31 Visa Int Service Ass Provisioning payment credentials to a consumer
US11605070B2 (en) * 2013-07-29 2023-03-14 The Toronto-Dominion Bank Cloud-based electronic payment processing
US20150039506A1 (en) * 2013-08-05 2015-02-05 Mastercard International Incorporated Methods and systems for providing 3-d secure service on-behalf-of merchants
US10510073B2 (en) 2013-08-08 2019-12-17 Visa International Service Association Methods and systems for provisioning mobile devices with payment credentials
US10496986B2 (en) 2013-08-08 2019-12-03 Visa International Service Association Multi-network tokenization processing
EP2843605A1 (en) * 2013-08-30 2015-03-04 Gemalto SA Method for authenticating transactions
US20150199683A1 (en) * 2013-09-25 2015-07-16 Global Ödeme Sistemleri Anonim Sirketi Online shopping system and method with cash
US10515370B2 (en) * 2013-10-09 2019-12-24 The Toronto-Dominion Bank Systems and methods for providing tokenized transaction accounts
US9978094B2 (en) 2013-10-11 2018-05-22 Visa International Service Association Tokenization revocation list
US20150106274A1 (en) * 2013-10-11 2015-04-16 Xerox Corporation Credit card security enhancements for authorizing a credit card transaction
US10515358B2 (en) 2013-10-18 2019-12-24 Visa International Service Association Contextual transaction token methods and systems
US10489779B2 (en) 2013-10-21 2019-11-26 Visa International Service Association Multi-network token bin routing with defined verification parameters
US10043182B1 (en) 2013-10-22 2018-08-07 Ondot System, Inc. System and method for using cardholder context and preferences in transaction authorization
US10769613B1 (en) 2013-10-22 2020-09-08 Ondot Systems, Inc Delegate cards
US10366387B2 (en) 2013-10-29 2019-07-30 Visa International Service Association Digital wallet system and method
US9058626B1 (en) 2013-11-13 2015-06-16 Jpmorgan Chase Bank, N.A. System and method for financial services device usage
SG10201900029SA (en) 2013-11-19 2019-02-27 Visa Int Service Ass Automated account provisioning
US20150161596A1 (en) * 2013-12-05 2015-06-11 Alliance Messaging Limited Token used in lieu of account identifier
US9747419B2 (en) 2013-12-18 2017-08-29 Mastercard International Incorporated Privacy-compliant analysis of health by transaction data
JP6551850B2 (en) 2013-12-19 2019-07-31 ビザ インターナショナル サービス アソシエーション Cloud-based transaction method and system
US9922322B2 (en) 2013-12-19 2018-03-20 Visa International Service Association Cloud-based transactions with magnetic secure transmission
US11062301B2 (en) * 2014-01-07 2021-07-13 Visa International Service Association Encrypted payment transactions
CN104765999B (en) * 2014-01-07 2020-06-30 腾讯科技(深圳)有限公司 Method, terminal and server for processing user resource information
US10433128B2 (en) 2014-01-07 2019-10-01 Visa International Service Association Methods and systems for provisioning multiple devices
US20150199679A1 (en) * 2014-01-13 2015-07-16 Karthikeyan Palanisamy Multiple token provisioning
US9846878B2 (en) 2014-01-14 2017-12-19 Visa International Service Association Payment account identifier system
US20150206251A1 (en) * 2014-01-19 2015-07-23 Mastercard International Incorporated Method and system for Virtual Account Number-Based Travel Expense Controls and Accounting
WO2015120082A1 (en) * 2014-02-04 2015-08-13 Visa International Service Association Token verification using limited use certificates
US9858572B2 (en) 2014-02-06 2018-01-02 Google Llc Dynamic alteration of track data
US9647999B2 (en) 2014-02-07 2017-05-09 Bank Of America Corporation Authentication level of function bucket based on circumstances
US9965606B2 (en) 2014-02-07 2018-05-08 Bank Of America Corporation Determining user authentication based on user/device interaction
US9223951B2 (en) 2014-02-07 2015-12-29 Bank Of America Corporation User authentication based on other applications
US9286450B2 (en) 2014-02-07 2016-03-15 Bank Of America Corporation Self-selected user access based on specific authentication types
US9208301B2 (en) 2014-02-07 2015-12-08 Bank Of America Corporation Determining user authentication requirements based on the current location of the user in comparison to the users's normal boundary of location
GB2522905A (en) * 2014-02-10 2015-08-12 Mastercard International Inc Management of multiple identities in a transaction infrastructure
US10304045B2 (en) 2014-02-12 2019-05-28 Mastercard International Incorporated Biometric solution enabling high throughput fare payments and system access
US20150235214A1 (en) * 2014-02-19 2015-08-20 Bank Of America Corporation User Authentication and Authorization
US20150242853A1 (en) * 2014-02-26 2015-08-27 Mastercard International Incorporated Payment account tokenization method
GB2523758A (en) * 2014-03-03 2015-09-09 Mastercard International Inc Secure mobile device transactions
US10002352B2 (en) 2014-03-04 2018-06-19 Bank Of America Corporation Digital wallet exposure reduction
US9830597B2 (en) 2014-03-04 2017-11-28 Bank Of America Corporation Formation and funding of a shared token
US9406065B2 (en) 2014-03-04 2016-08-02 Bank Of America Corporation Customer token preferences interface
US9600817B2 (en) 2014-03-04 2017-03-21 Bank Of America Corporation Foreign exchange token
US9721248B2 (en) 2014-03-04 2017-08-01 Bank Of America Corporation ATM token cash withdrawal
US9721268B2 (en) 2014-03-04 2017-08-01 Bank Of America Corporation Providing offers associated with payment credentials authenticated in a specific digital wallet
US9600844B2 (en) 2014-03-04 2017-03-21 Bank Of America Corporation Foreign cross-issued token
US9424572B2 (en) 2014-03-04 2016-08-23 Bank Of America Corporation Online banking digital wallet management
US20150262291A1 (en) * 2014-03-17 2015-09-17 Comenity Llc Apply and buy with a co-branded virtual card
US9785940B2 (en) * 2014-03-27 2017-10-10 Bank of the Ozarks System and method for distributed real time authorization of payment transactions
WO2015152948A1 (en) * 2014-03-29 2015-10-08 Nuspay International Incorporated Systems and methods of generating and processing payment transaction using alternate channels and payments mode
US10726472B2 (en) 2014-03-31 2020-07-28 Monticello Enterprises LLC System and method for providing simplified in-store, product-based and rental payment processes
US11080777B2 (en) 2014-03-31 2021-08-03 Monticello Enterprises LLC System and method for providing a social media shopping experience
US10511580B2 (en) 2014-03-31 2019-12-17 Monticello Enterprises LLC System and method for providing a social media shopping experience
US11282131B2 (en) 2014-03-31 2022-03-22 Monticello Enterprises LLC User device enabling access to payment information in response to user input
US10026087B2 (en) 2014-04-08 2018-07-17 Visa International Service Association Data passed in an interaction
US20150294314A1 (en) * 2014-04-09 2015-10-15 Mastercard International Incorporated System and method of providing multinational card programs
US9942043B2 (en) 2014-04-23 2018-04-10 Visa International Service Association Token security on a communication device
US20150310419A1 (en) * 2014-04-24 2015-10-29 Buy It Mobility Networks Inc. Cardless point-of-sale payment method
US11574300B1 (en) 2014-04-30 2023-02-07 Wells Fargo Bank, N.A. Mobile wallet systems and methods using trace identifier using card networks
US10262346B2 (en) 2014-04-30 2019-04-16 Gift Card Impressions, Inc. System and method for a merchant onsite personalization gifting platform
US10997592B1 (en) 2014-04-30 2021-05-04 Wells Fargo Bank, N.A. Mobile wallet account balance systems and methods
US11288660B1 (en) 2014-04-30 2022-03-29 Wells Fargo Bank, N.A. Mobile wallet account balance systems and methods
US11461766B1 (en) * 2014-04-30 2022-10-04 Wells Fargo Bank, N.A. Mobile wallet using tokenized card systems and methods
US11610197B1 (en) * 2014-04-30 2023-03-21 Wells Fargo Bank, N.A. Mobile wallet rewards redemption systems and methods
US9652770B1 (en) 2014-04-30 2017-05-16 Wells Fargo Bank, N.A. Mobile wallet using tokenized card systems and methods
US11663599B1 (en) 2014-04-30 2023-05-30 Wells Fargo Bank, N.A. Mobile wallet authentication systems and methods
US11748736B1 (en) 2014-04-30 2023-09-05 Wells Fargo Bank, N.A. Mobile wallet integration within mobile banking
CN106233664B (en) 2014-05-01 2020-03-13 维萨国际服务协会 Data authentication using an access device
SG11201609216YA (en) 2014-05-05 2016-12-29 Visa Int Service Ass System and method for token domain control
SG11201609361PA (en) * 2014-05-09 2016-12-29 Diebold Inc Cardless financial transactions
US10373154B2 (en) 2014-05-19 2019-08-06 Mastercard International Incorporated Apparatus, method, and computer program product for settlement to a merchant's card account using an on-line bill payment platform
US10970684B1 (en) 2014-05-20 2021-04-06 Wells Fargo Bank, N.A. Systems and methods for maintaining deposits of math-based currency
US11270274B1 (en) * 2014-05-20 2022-03-08 Wells Fargo Bank, N.A. Mobile wallet using math based currency systems and methods
US11037110B1 (en) 2014-05-20 2021-06-15 Wells Fargo Bank, N.A. Math based currency point of sale systems and methods
US10909509B1 (en) 2014-05-20 2021-02-02 Wells Fargo Bank, N.A. Infrastructure for maintaining math-based currency accounts
US10565645B1 (en) 2014-05-20 2020-02-18 Wells Fargo Bank, N.A. Systems and methods for operating a math-based currency exchange
US11176524B1 (en) 2014-05-20 2021-11-16 Wells Fargo Bank, N.A. Math based currency credit card
US11170351B1 (en) 2014-05-20 2021-11-09 Wells Fargo Bank, N.A. Systems and methods for identity verification of math-based currency account holders
US10846694B2 (en) 2014-05-21 2020-11-24 Visa International Service Association Offline authentication
US10395237B2 (en) 2014-05-22 2019-08-27 American Express Travel Related Services Company, Inc. Systems and methods for dynamic proximity based E-commerce transactions
US11017384B2 (en) 2014-05-29 2021-05-25 Apple Inc. Apparatuses and methods for using a primary user device to provision credentials onto a secondary user device
US9400977B2 (en) 2014-05-29 2016-07-26 Apple Inc. User device enabling access to payment information in response to mechanical input detection
US20150348024A1 (en) * 2014-06-02 2015-12-03 American Express Travel Related Services Company, Inc. Systems and methods for provisioning transaction data to mobile communications devices
US10726415B2 (en) * 2014-06-06 2020-07-28 Tyson Kopczynski Token-based transaction system and method to facilitate non-cash payments without using personally identifiable information data
US20150371231A1 (en) * 2014-06-23 2015-12-24 Mastercard International Incorporated Method and system for temporary replacement of real account numbers
US10454926B2 (en) 2014-06-27 2019-10-22 American Express Travel Related Services Company, Inc. System and method for connectivity contextual services local online experience
US10360597B2 (en) 2014-06-27 2019-07-23 American Express Travel Related Services Company, Inc. System and method for contextual services experience
US20160012399A1 (en) * 2014-07-09 2016-01-14 Uniloc Luxembourg S.A. Secure two-stage transactions
US20160012432A1 (en) * 2014-07-10 2016-01-14 The Toronto-Dominion Bank Universal electronic payment credential processing
US9652759B2 (en) 2014-07-11 2017-05-16 Google Inc. Hands-free transactions
US20160012422A1 (en) * 2014-07-11 2016-01-14 Google Inc. Hands-free transactions with a transaction confirmation request
CA2896763C (en) 2014-07-11 2021-01-12 The Toronto Dominion Bank Systems and methods for providing pre-paid multicards
US20160027000A1 (en) * 2014-07-23 2016-01-28 Bank Of America Corporation Mobile one-time bank card number generator for digital wallet
US10217151B1 (en) 2014-07-23 2019-02-26 American Express Travel Related Services Company, Inc. Systems and methods for proximity based communication
US9780953B2 (en) 2014-07-23 2017-10-03 Visa International Service Association Systems and methods for secure detokenization
US9292849B2 (en) 2014-07-23 2016-03-22 Bank Of America Corporation Mobile one-time card number generator for ATM usage
US9600949B2 (en) 2014-07-30 2017-03-21 Master Lock Company Llc Wireless key management for authentication
US10484345B2 (en) 2014-07-31 2019-11-19 Visa International Service Association System and method for identity verification across mobile applications
US20160034859A1 (en) * 2014-08-04 2016-02-04 Ubona Technologies Pvt Ltd System and method for cashless transactions
US10055725B2 (en) * 2014-08-13 2018-08-21 Google Llc Simple in-store payments
US10445739B1 (en) 2014-08-14 2019-10-15 Wells Fargo Bank, N.A. Use limitations for secondary users of financial accounts
US9775029B2 (en) 2014-08-22 2017-09-26 Visa International Service Association Embedding cloud-based functionalities in a communication device
US10062073B2 (en) 2014-08-26 2018-08-28 American Express Travel Related Services Company, Inc. System and method for providing a BLUETOOTH low energy mobile payment system
US10417703B2 (en) 2014-09-09 2019-09-17 Mastercard International Incorporated Method and system for implementing self-imposed spending limit
US10140615B2 (en) 2014-09-22 2018-11-27 Visa International Service Association Secure mobile device credential provisioning using risk decision non-overrides
SG11201701653WA (en) 2014-09-26 2017-04-27 Visa Int Service Ass Remote server encrypted data provisioning system and methods
CA2906914C (en) 2014-09-29 2023-05-02 The Toronto-Dominion Bank Systems and methods for administering mobile applications using pre-loaded tokens
US11257074B2 (en) 2014-09-29 2022-02-22 Visa International Service Association Transaction risk based token
CA2961916C (en) * 2014-09-29 2023-10-24 Royal Bank Of Canada Secure processing of data
US10510071B2 (en) 2014-09-29 2019-12-17 The Toronto-Dominion Bank Systems and methods for generating and administering mobile applications using pre-loaded tokens
CN107111810A (en) 2014-10-13 2017-08-29 万事达卡国际股份有限公司 Method and system for direct operator's charging
US10671980B2 (en) * 2014-10-20 2020-06-02 Mastercard International Incorporated Systems and methods for detecting potentially compromised payment cards
US10015147B2 (en) 2014-10-22 2018-07-03 Visa International Service Association Token enrollment system and method
GB201419016D0 (en) 2014-10-24 2014-12-10 Visa Europe Ltd Transaction Messaging
US10614457B2 (en) 2014-11-12 2020-04-07 BenedorTSE LLC Secure authorizations using independent communications and different one-time-use encryption keys for each party to a transaction
US9558492B2 (en) 2014-11-12 2017-01-31 Benedoretse Llc Secure authorizations using independent communications and different one-time-use encryption keys for each party to a transaction
US9558493B2 (en) 2014-11-12 2017-01-31 BenedorTSE LLC Secure authorizations using independent communications and different one-time-use encryption keys for each party to a transaction
WO2016077847A2 (en) * 2014-11-12 2016-05-19 Tiragalo Creations Cc System and method for conducting secure credit, debit and retail card transactions
US9569776B2 (en) 2014-11-12 2017-02-14 BenedorTSE LLC Secure authorizations using independent communications and different one-time-use encryption keys for each party to a transaction
US10325261B2 (en) 2014-11-25 2019-06-18 Visa International Service Association Systems communications with non-sensitive identifiers
CN107004192B (en) 2014-11-26 2021-08-13 维萨国际服务协会 Method and apparatus for tokenizing requests via an access device
US9256870B1 (en) 2014-12-02 2016-02-09 Mastercard International Incorporated Methods and systems for updating expiry information of an account
US10614442B2 (en) 2014-12-03 2020-04-07 Mastercard International Incorporated System and method of facilitating cash transactions at an ATM system without an ATM card using mobile
US11580519B2 (en) 2014-12-12 2023-02-14 Visa International Service Association Provisioning platform for machine-to-machine devices
US10257185B2 (en) 2014-12-12 2019-04-09 Visa International Service Association Automated access data provisioning
KR102323805B1 (en) * 2014-12-24 2021-11-10 십일번가 주식회사 Apparatus for authentication and payment based on web, method for authentication and payment based on web, system for authentication and payment based on web and computer readable medium having computer program recorded therefor
US10157397B2 (en) 2014-12-29 2018-12-18 Comenity Llc Collecting and analyzing data from a mobile device
US10423976B2 (en) 2014-12-29 2019-09-24 Comenity Llc Collecting and analyzing data for targeted offers
US10187363B2 (en) 2014-12-31 2019-01-22 Visa International Service Association Hybrid integration of software development kit with secure execution environment
US10373168B2 (en) 2015-01-12 2019-08-06 Mastercard International Incorporated Method and system for retry processing of controlled payment transactions
SG10201500276VA (en) * 2015-01-14 2016-08-30 Mastercard Asia Pacific Pte Ltd Method and system for making a secure payment transaction
CA2974151C (en) 2015-01-19 2023-11-21 Royal Bank Of Canada Secure processing of electronic payments
US11354651B2 (en) 2015-01-19 2022-06-07 Royal Bank Of Canada System and method for location-based token transaction processing
US10096009B2 (en) 2015-01-20 2018-10-09 Visa International Service Association Secure payment processing using authorization request
US20160217459A1 (en) * 2015-01-28 2016-07-28 American Express Travel Related Services Company, Inc. Systems and methods for smart token allocation scheme
US11250391B2 (en) 2015-01-30 2022-02-15 Visa International Service Association Token check offline
WO2016126729A1 (en) 2015-02-03 2016-08-11 Visa International Service Association Validation identity tokens for transactions
US10762496B2 (en) * 2015-02-06 2020-09-01 Google Llc Providing payment account information associated with a digital wallet account to a user at a merchant point of sale device
US11216468B2 (en) 2015-02-08 2022-01-04 Visa International Service Association Converged merchant processing apparatuses, methods and systems
US10977657B2 (en) 2015-02-09 2021-04-13 Visa International Service Association Token processing utilizing multiple authorizations
US11068895B2 (en) * 2015-02-17 2021-07-20 Visa International Service Association Token and cryptogram using transaction specific information
US20160239825A1 (en) * 2015-02-17 2016-08-18 Gopal Nandakumar System and Method for Determining a Secured Resource Account Number
US11853919B1 (en) 2015-03-04 2023-12-26 Wells Fargo Bank, N.A. Systems and methods for peer-to-peer funds requests
US10853502B1 (en) 2015-03-04 2020-12-01 Micro Focus Llc Systems and methods for reducing computational difficulty of cryptographic operations
US10164996B2 (en) 2015-03-12 2018-12-25 Visa International Service Association Methods and systems for providing a low value token buffer
US20160275493A1 (en) * 2015-03-19 2016-09-22 Microsoft Technology Licensing, Llc Secure electronic transaction framework
US11429975B1 (en) 2015-03-27 2022-08-30 Wells Fargo Bank, N.A. Token management system
SG10201908338TA (en) 2015-04-10 2019-10-30 Visa Int Service Ass Browser integration with cryptogram
CA2982774A1 (en) * 2015-04-14 2016-10-20 Capital One Services, Llc A system, method, and apparatus for a dynamic transaction card
US9998978B2 (en) 2015-04-16 2018-06-12 Visa International Service Association Systems and methods for processing dormant virtual access devices
KR101649934B1 (en) * 2015-04-28 2016-08-31 엔에이치엔엔터테인먼트 주식회사 Simple payment system and simple payment method using the system
US10552834B2 (en) 2015-04-30 2020-02-04 Visa International Service Association Tokenization capable authentication framework
US20170004506A1 (en) * 2015-06-14 2017-01-05 Tender Armor, Llc Security for electronic transactions and user authentication
US11620628B2 (en) 2015-06-30 2023-04-04 Mastercard International Incorporated Method and system for fraud control based on geolocation
US10535067B2 (en) 2015-07-01 2020-01-14 Mastercard International Incorporated Electronic incremental payments
US10311413B2 (en) 2015-07-01 2019-06-04 Mastercard International Incorporated By-item bill payments
US10621567B2 (en) 2015-07-01 2020-04-14 Mastercard International Incorporation Electronic grace period billing
US11599879B2 (en) 2015-07-02 2023-03-07 Royal Bank Of Canada Processing of electronic transactions
US11170364B1 (en) 2015-07-31 2021-11-09 Wells Fargo Bank, N.A. Connected payment card systems and methods
US10803428B2 (en) * 2015-08-10 2020-10-13 Greenlight Financial Technology, Inc. Method, non-transitory computer-readable medium, and system for payment approval
WO2017031142A1 (en) 2015-08-20 2017-02-23 Mastercard International Incorporated Method and system for credits in a social network
EP3136329A1 (en) * 2015-08-28 2017-03-01 Mastercard International Incorporated Securing mo/to processing
US10817862B2 (en) 2015-09-01 2020-10-27 Bank Of America Corporation System for authenticating a mobile device for comprehensive access to a facility
US10360560B2 (en) 2015-09-01 2019-07-23 Bank Of America Corporation System for authenticating a wearable device for transaction queuing
US20170068960A1 (en) * 2015-09-08 2017-03-09 Sk Planet Co., Ltd. Web based payment service providing apparatus, method, system, and non-transitory computer readable storage medium storing computer program recorded thereon
US10438201B2 (en) 2015-09-09 2019-10-08 Bank Of America Corporation System for generating a transaction specific tokenization for a wearable device
US11004071B2 (en) 2015-09-09 2021-05-11 Pay with Privacy, Inc. Systems and methods for automatically securing and validating multi-server electronic communications over a plurality of networks
US9935961B2 (en) * 2015-09-11 2018-04-03 Bank Of America Corporation Controlling access to data
US20170083909A1 (en) * 2015-09-22 2017-03-23 Bank Of America Corporation Internal vault storage of tokens for account identification
US12118533B1 (en) * 2015-09-25 2024-10-15 Wells Fargo Bank, N.A. Behavior based allocation of payment tokens
US20170091757A1 (en) * 2015-09-30 2017-03-30 Bank Of America Corporation Tokenization provisioning and allocating system
US10127539B2 (en) 2015-09-30 2018-11-13 Bank Of America Corporation System for tokenization and token selection associated with wearable device transactions
US10607215B2 (en) 2015-09-30 2020-03-31 Bank Of America Corporation Account tokenization for virtual currency resources
US10453059B2 (en) 2015-09-30 2019-10-22 Bank Of America Corporation Non-intrusive geo-location determination associated with transaction authorization
SG10201508517SA (en) * 2015-10-14 2017-05-30 Mastercard International Inc A Method And System For Selecting Consumers For Targeted Messages
JP2018530834A (en) 2015-10-15 2018-10-18 ビザ インターナショナル サービス アソシエーション Token immediate issue system
US10367905B2 (en) 2015-10-22 2019-07-30 The Western Union Company Integration framework and user interface for embedding transfer services into applications
US10325251B2 (en) 2015-10-22 2019-06-18 Mastercard International Incorporated Apparatus, method, and computer program product for secure, privacy-aware qualified expenditure tracking in an ISO 8583 network or the like
SG10201508945YA (en) 2015-10-29 2017-05-30 Mastercard International Inc Method and system for cardless use of an automated teller machine (atm)
US9729536B2 (en) 2015-10-30 2017-08-08 Bank Of America Corporation Tiered identification federated authentication network system
US10719816B1 (en) 2015-11-19 2020-07-21 Wells Fargo Bank, N.A. Systems and methods for math-based currency escrow transactions
CN108370319B (en) 2015-12-04 2021-08-17 维萨国际服务协会 Method and computer for token verification
US11257085B1 (en) * 2015-12-11 2022-02-22 Wells Fargo Bank, N.A Systems and methods for authentication device-assisted transactions
WO2017106472A1 (en) 2015-12-17 2017-06-22 Mastercard International Incorporated Method and system for distribution, use and validation of electronic entitlement certificates
US10650383B2 (en) 2015-12-29 2020-05-12 Mastercard International Incorporated Method and system for verification at point of sale
US10929839B2 (en) * 2015-12-31 2021-02-23 Mastercard International Incorporated Digital wallet with installments and combo-card
EP3400696B1 (en) 2016-01-07 2020-05-13 Visa International Service Association Systems and methods for device push provisioning
US20170200149A1 (en) 2016-01-08 2017-07-13 Mastercard International Incorporated Authenticating payment credentials in closed loop transaction processing
US10515384B2 (en) 2016-05-13 2019-12-24 American Express Travel Related Services Company, Inc. Systems and methods for contextual services using voice personal assistants
KR102651522B1 (en) * 2016-01-13 2024-03-28 삼성전자주식회사 Payment processing method and electronic device supporting the same
US20170330233A1 (en) 2016-05-13 2017-11-16 American Express Travel Related Services Company, Inc. Systems and methods for contextual services across platforms based on selectively shared information
US20170200151A1 (en) * 2016-01-13 2017-07-13 American Express Travel Related Services Co., Inc. System and method for creating and administering electronic credentials
US11232187B2 (en) 2016-01-13 2022-01-25 American Express Travel Related Services Company, Inc. Contextual identification and information security
US11159519B2 (en) 2016-01-13 2021-10-26 American Express Travel Related Services Company, Inc. Contextual injection
WO2017136418A1 (en) 2016-02-01 2017-08-10 Visa International Service Association Systems and methods for code display and use
US11501288B2 (en) * 2016-02-09 2022-11-15 Visa International Service Association Resource provider account token provisioning and processing
CN108780477B (en) 2016-03-01 2022-10-21 谷歌有限责任公司 Facial profile modification for hands-free transactions
US10861019B2 (en) * 2016-03-18 2020-12-08 Visa International Service Association Location verification during dynamic data transactions
KR20170109433A (en) * 2016-03-21 2017-09-29 삼성전자주식회사 Device for performing security transaction and method thereof
US10313321B2 (en) 2016-04-07 2019-06-04 Visa International Service Association Tokenization of co-network accounts
AU2016403734B2 (en) 2016-04-19 2022-11-17 Visa International Service Association Systems and methods for performing push transactions
US10903854B2 (en) 2016-04-20 2021-01-26 Micro Focus Llc Replacing a subset of digits in a sequence
US10460367B2 (en) 2016-04-29 2019-10-29 Bank Of America Corporation System for user authentication based on linking a randomly generated number to the user and a physical item
US10007875B1 (en) 2016-05-03 2018-06-26 The Meyers Printing Companies, Inc. Point-of-sale security activation card
US10706414B1 (en) * 2016-05-06 2020-07-07 Jpmorgan Chase Bank, N.A. System and method for token based mobile payment
US10902405B1 (en) * 2016-05-11 2021-01-26 Wells Fargo Bank, N.A. Transient mobile wallets
US10373156B2 (en) 2016-05-17 2019-08-06 Mastercard International Incorporated Method and system for linked electronic wallet application
US11250424B2 (en) 2016-05-19 2022-02-15 Visa International Service Association Systems and methods for creating subtokens using primary tokens
EP3466017B1 (en) 2016-06-03 2021-05-19 Visa International Service Association Subtoken management system for connected devices
CN112990932A (en) * 2016-06-07 2021-06-18 华为技术有限公司 Data processing method, related device and system
US10565589B2 (en) 2016-06-14 2020-02-18 Mastercard International Incorporated Methods and system for real-time fraud decisioning based upon user-defined valid activity location data
US10417638B2 (en) 2016-06-14 2019-09-17 Mastercard International Incorporated Method and system for real time fraud decisioning in transaction processing
WO2017218490A1 (en) 2016-06-14 2017-12-21 Mastercard International Incorporated Method and system for real time fraud decisioning in transaction processing
US20170364879A1 (en) * 2016-06-15 2017-12-21 Mastercard International Incorporated Transaction flows and transaction processing for bridged payment systems
US10268635B2 (en) 2016-06-17 2019-04-23 Bank Of America Corporation System for data rotation through tokenization
US11068899B2 (en) 2016-06-17 2021-07-20 Visa International Service Association Token aggregation for multi-party transactions
US10361856B2 (en) 2016-06-24 2019-07-23 Visa International Service Association Unique token authentication cryptogram
EP3459060B1 (en) 2016-06-29 2022-05-18 Mastercard International Incorporated Method and system for cardless disbursement from an automated teller machine
US11386223B1 (en) 2016-07-01 2022-07-12 Wells Fargo Bank, N.A. Access control tower
US11615402B1 (en) 2016-07-01 2023-03-28 Wells Fargo Bank, N.A. Access control tower
US10992679B1 (en) 2016-07-01 2021-04-27 Wells Fargo Bank, N.A. Access control tower
US11886611B1 (en) 2016-07-01 2024-01-30 Wells Fargo Bank, N.A. Control tower for virtual rewards currency
US11935020B1 (en) 2016-07-01 2024-03-19 Wells Fargo Bank, N.A. Control tower for prospective transactions
WO2018009492A1 (en) * 2016-07-06 2018-01-11 Alibaba Group Holding Limited Systems and methods for connecting disparate computing devices via standard interfaces
EP3482337B1 (en) 2016-07-11 2021-09-29 Visa International Service Association Encryption key exchange process using access device
US20180018657A1 (en) * 2016-07-18 2018-01-18 Ca, Inc. Mobile terminals providing secure user interfaces
CN116739570A (en) 2016-07-19 2023-09-12 维萨国际服务协会 Method for distributing tokens and managing token relationships
KR20210125616A (en) 2016-07-31 2021-10-18 구글 엘엘씨 Automatic hands free service requests
US20180068284A1 (en) 2016-09-08 2018-03-08 Mastercard International Incorporated Method and system for browser-integrated generation of controlled payment numbers
US10509779B2 (en) 2016-09-14 2019-12-17 Visa International Service Association Self-cleaning token vault
US10558977B2 (en) 2016-09-26 2020-02-11 Mastercard International Incorporated System and method for linking bill payment service with remittance
US10748130B2 (en) * 2016-09-30 2020-08-18 Square, Inc. Sensor-enabled activation of payment instruments
US10776772B2 (en) * 2016-09-30 2020-09-15 Middleware, Inc. Automated digital method and system of providing or sharing access
US11257066B2 (en) 2016-09-30 2022-02-22 Middleware, Inc. Automated digital method and system of providing or sharing access
US11468414B1 (en) 2016-10-03 2022-10-11 Wells Fargo Bank, N.A. Systems and methods for establishing a pull payment relationship
US10475035B2 (en) * 2016-10-11 2019-11-12 Mastercard International Incorporated Methods, systems, and computer readable media for consolidated registration of payment cards
US11810017B2 (en) 2016-10-18 2023-11-07 Mastercard International Incorporated Method and system for universal control account activities
CN108074178A (en) * 2016-11-14 2018-05-25 平安科技(深圳)有限公司 The method and apparatus for handling credit card application
WO2018094530A1 (en) * 2016-11-25 2018-05-31 Royal Bank Of Canada System, process and device for e-commerce transactions
CN110036386B (en) 2016-11-28 2023-08-22 维萨国际服务协会 Access identifier supplied to application program
US10706420B2 (en) 2016-12-06 2020-07-07 Mastercard International Incorporated Method and system for fraud mitigation via account security
US20180174237A1 (en) * 2016-12-21 2018-06-21 Mastercard International Incorporated Method and system for person-to-person arbitrary currency exchange service
US11113690B2 (en) * 2016-12-22 2021-09-07 Mastercard International Incorporated Systems and methods for processing data messages from a user vehicle
US11250422B1 (en) * 2016-12-29 2022-02-15 Wells Fargo Bank, N.A. Enhanced mobile wallet payment elements
US20180191685A1 (en) * 2016-12-31 2018-07-05 The Western Union Company Recurring transfer notifications and secure transfers
US10740757B2 (en) 2017-01-04 2020-08-11 Mastercard International Incorporated Method and system for secured merchant verification
WO2018170404A1 (en) * 2017-03-16 2018-09-20 Jpmorgan Chase Bank, N.A. Systems and methods for supporting legacy and tokenized e-commerce
US10915899B2 (en) 2017-03-17 2021-02-09 Visa International Service Association Replacing token on a multi-token user device
US20180276669A1 (en) * 2017-03-21 2018-09-27 Bank Of America Corporation Fraud Remedy Tool
KR101837168B1 (en) * 2017-04-18 2018-03-09 주식회사 코인플러그 Method for approving the use of credit card by using token id based on blockchain and server using the same
US11556936B1 (en) 2017-04-25 2023-01-17 Wells Fargo Bank, N.A. System and method for card control
US10902418B2 (en) 2017-05-02 2021-01-26 Visa International Service Association System and method using interaction token
US11494765B2 (en) 2017-05-11 2022-11-08 Visa International Service Association Secure remote transaction system using mobile devices
US11922400B2 (en) * 2017-06-09 2024-03-05 Jpmorgan Chase Bank, N.A. Systems and methods for activating and using dynamic cards
US10524165B2 (en) 2017-06-22 2019-12-31 Bank Of America Corporation Dynamic utilization of alternative resources based on token association
US10313480B2 (en) 2017-06-22 2019-06-04 Bank Of America Corporation Data transmission between networked resources
US10511692B2 (en) 2017-06-22 2019-12-17 Bank Of America Corporation Data transmission to a networked resource based on contextual information
US20190005488A1 (en) * 2017-06-28 2019-01-03 Goldman Sachs Bank Usa Interface-Specific Account Identifiers
KR102523695B1 (en) * 2017-06-28 2023-04-20 골드만 삭스 뱅크 유에스에이 Interface-specific account identifier
US11062388B1 (en) 2017-07-06 2021-07-13 Wells Fargo Bank, N.A Data control tower
US20190012648A1 (en) * 2017-07-07 2019-01-10 ReAble Inc. Assistance systems for cash transactions and money management
US10491389B2 (en) 2017-07-14 2019-11-26 Visa International Service Association Token provisioning utilizing a secure authentication system
US11062312B2 (en) * 2017-07-14 2021-07-13 The Toronto-Dominion Bank Smart chip card with fraud alert and biometric reset
US11574359B1 (en) 2017-07-25 2023-02-07 Wells Fargo Bank, N.A. Interactive banking using multiple checking accounts
US10592543B2 (en) * 2017-08-31 2020-03-17 Oath Inc. Sub-account management
US11080712B2 (en) * 2017-09-11 2021-08-03 Visa International Service Association Secondary account management platform
US10749674B2 (en) 2017-09-29 2020-08-18 Micro Focus Llc Format preserving encryption utilizing a key version
EP3471038A1 (en) * 2017-10-13 2019-04-17 Mastercard International Incorporated User authentication and transaction staging
US11188887B1 (en) 2017-11-20 2021-11-30 Wells Fargo Bank, N.A. Systems and methods for payment information access management
US20190156413A1 (en) 2017-11-21 2019-05-23 Mastercard International Incorporated Method and system for real time installment options on inter- and intra-bank transactions
US10963871B2 (en) 2017-11-22 2021-03-30 Mastercard International Incorporated Bin-conserving tokenization techniques generating tokens in reverse order and employing common device pan with differing pan sequence number values across token instances
KR102429000B1 (en) * 2017-11-29 2022-08-04 주식회사 플랫포스 Method of providing service for issuing mobile gift certification, server and system thereof
US10954049B2 (en) 2017-12-12 2021-03-23 E2Interactive, Inc. Viscous liquid vessel for gifting
US10564796B2 (en) 2017-12-14 2020-02-18 Mastercard International Incorporated Haptic interaction
US10877560B2 (en) 2017-12-22 2020-12-29 Mastercard International Incorporated Haptic feedback for authentication and security in computer systems
US11544781B2 (en) 2017-12-23 2023-01-03 Mastercard International Incorporated Leveraging a network “positive card” list to inform risk management decisions
US20190205871A1 (en) * 2018-01-04 2019-07-04 Mastercard International Incorporated System and methods for populating a merchant advice code
SG10201800215WA (en) * 2018-01-09 2019-08-27 Mastercard International Inc A tokenisation platform and computer-implemented method for generating a modified payment token for an express payment transaction
US11443295B2 (en) 2018-01-17 2022-09-13 Visa International Service Association System and method for rapid activation and provisioning of an electronic payment device
US10949842B1 (en) * 2018-01-30 2021-03-16 Mastercard International Incorporated Preventing data analysis interruptions by identifying card continuity without using personally identifiable information
US11295297B1 (en) 2018-02-26 2022-04-05 Wells Fargo Bank, N.A. Systems and methods for pushing usable objects and third-party provisioning to a mobile wallet
SG11202008451RA (en) 2018-03-07 2020-09-29 Visa Int Service Ass Secure remote token release with online authentication
US11687929B2 (en) * 2018-03-23 2023-06-27 American Express Travel Related Services Co., Inc. Authenticated secure online and offline transactions
US10796016B2 (en) * 2018-03-28 2020-10-06 Visa International Service Association Untethered resource distribution and management
US11775955B1 (en) 2018-05-10 2023-10-03 Wells Fargo Bank, N.A. Systems and methods for making person-to-person payments via mobile client application
US11074577B1 (en) 2018-05-10 2021-07-27 Wells Fargo Bank, N.A. Systems and methods for making person-to-person payments via mobile client application
US12020309B2 (en) 2018-05-18 2024-06-25 E2Interactive, Inc. Augmented reality gifting on a mobile device
WO2019232169A1 (en) * 2018-05-30 2019-12-05 Jpmorgan Chase Bank, N.A. System and method for billpay using credit-based products
US11321717B2 (en) * 2018-05-31 2022-05-03 Visa International Service Association System and method for analyzing transaction nodes using visual analytics
US11204648B2 (en) 2018-06-12 2021-12-21 Mastercard International Incorporated Handshake to establish agreement between two parties in virtual reality
US11256789B2 (en) 2018-06-18 2022-02-22 Visa International Service Association Recurring token transactions
US10410207B1 (en) 2018-06-21 2019-09-10 Capital One Services, Llc Systems for providing and processing surprise conditional gifts
EP3588417A1 (en) * 2018-06-28 2020-01-01 Vocalink Limited Data processing apparatus and methods
FR3083356B1 (en) * 2018-06-29 2020-09-11 Ingenico Group PROCESS FOR CARRYING OUT A TRANSACTION, TERMINAL, SERVER AND CORRESPONDING COMPUTER PROGRAM
SG10201806753RA (en) 2018-08-08 2020-03-30 Mastercard International Inc System and method for processing a card-not-present payment transaction by a purchaser using a friend's card for obtaining a reward
WO2020041594A1 (en) 2018-08-22 2020-02-27 Visa International Service Association Method and system for token provisioning and processing
WO2020047106A1 (en) 2018-08-28 2020-03-05 Eris Digital Holdings, Llc Blockchain-enabled electronic futures trading system with optional computerized delivery of cryptocurrency
US12045809B1 (en) 2018-08-30 2024-07-23 Wells Fargo Bank, N.A. Biller consortium enrollment and transaction management engine
US11093911B2 (en) 2018-09-28 2021-08-17 Paypal, Inc. Systems, methods, and computer program products providing an identity-storing browser
US10581611B1 (en) * 2018-10-02 2020-03-03 Capital One Services, Llc Systems and methods for cryptographic authentication of contactless cards
KR20210065109A (en) 2018-10-02 2021-06-03 캐피탈 원 서비시즈, 엘엘씨 System and method for cryptographic authentication of contactless card
CN112805737A (en) 2018-10-08 2021-05-14 维萨国际服务协会 Techniques for token proximity transactions
US11210654B2 (en) * 2018-10-23 2021-12-28 Capital One Services, Llc Systems and methods for multicomputer data transferring to activate contactless communication
US11250437B2 (en) 2018-11-08 2022-02-15 Capital One Services, Llc Systems and methods for mobile pre-authorization of a credit transaction
SG11202104782TA (en) 2018-11-14 2021-06-29 Visa Int Service Ass Cloud token provisioning of multiple tokens
CA3062211A1 (en) * 2018-11-26 2020-05-26 Mir Limited Dynamic verification method and system for card transactions
US20200193415A1 (en) * 2018-12-14 2020-06-18 Jpmorgan Chase Bank, N.A. Systems and methods for using integrated pay-on-demand virtual cards
US11050571B2 (en) 2019-02-14 2021-06-29 Carrott Richard F Systems for producing and maintaining verified electronic signatures
US11849042B2 (en) 2019-05-17 2023-12-19 Visa International Service Association Virtual access credential interaction system and method
SG11202112251WA (en) * 2019-05-30 2021-12-30 Eris Digital Holdings Llc Distributed ledger management system for interest bearing digitized fiat currencies
CN110062374B (en) * 2019-05-31 2022-06-07 贵阳朗玛通信科技有限公司 Method and device for distributing numbers and SIM cards
US11551190B1 (en) 2019-06-03 2023-01-10 Wells Fargo Bank, N.A. Instant network cash transfer at point of sale
US20210012321A1 (en) * 2019-07-08 2021-01-14 Mastercard International Incorporated Enhanced payment processing
US11620651B2 (en) 2019-07-11 2023-04-04 Mastercard International Incorporated Method and system for blocking and unblocking merchants for future transactions
US11481743B2 (en) 2019-07-15 2022-10-25 Mastercard International Incorporated Real-time digital cash management solution
US11887102B1 (en) 2019-07-31 2024-01-30 Block, Inc. Temporary virtual payment card
AU2019469080A1 (en) 2019-10-02 2022-04-21 Capital One Services, Llc Client device authentication using contactless legacy magnetic stripe data
US11410194B1 (en) * 2019-10-18 2022-08-09 Wells Fargo Bank, N.A. Systems and methods for linking ATM to retailer transaction to preserve anonymity
WO2021096459A1 (en) * 2019-11-11 2021-05-20 Ismet Yesil Electronic authentication method
US11043059B2 (en) 2019-11-12 2021-06-22 Capital One Services, Llc Methods and systems for delivering a document
US20210174355A1 (en) * 2019-12-09 2021-06-10 Capital One Services, Llc Systems and methods for binding unique tokens with transaction parameters to authorize transactions
US20240046258A1 (en) * 2019-12-18 2024-02-08 Wells Fargo Bank, N.A. Group payment accounts
US11308552B1 (en) 2019-12-20 2022-04-19 Wells Fargo Bank, N.A. Device-to-device microlending within a distributed system
US11138657B1 (en) 2019-12-20 2021-10-05 Wells Fargo Bank, N.A. Device-to-device microlending within a distributed system
US11734656B1 (en) 2019-12-20 2023-08-22 Wells Fargo Bank N.A. Distributed device rating system
US11113685B2 (en) * 2019-12-23 2021-09-07 Capital One Services, Llc Card issuing with restricted virtual numbers
US11334887B2 (en) 2020-01-10 2022-05-17 International Business Machines Corporation Payment card authentication management
US11354648B2 (en) 2020-03-09 2022-06-07 Capital One Services, Llc Transaction card utilizing voice-activated commands
WO2021207037A1 (en) * 2020-04-10 2021-10-14 Zadorozhny Ivan Two-in-one process for payments and electronic data
US11961088B2 (en) * 2020-04-21 2024-04-16 Jpmorgan Chase Bank, N.A. System and method for providing temporal card verification value (CVV) for secure online transaction processing
CN111583029A (en) * 2020-05-11 2020-08-25 中国银行股份有限公司 Consumption processing method and system
US20220005039A1 (en) * 2020-07-02 2022-01-06 Richard Philip Hires Delegation method and delegation request managing method
US11928665B2 (en) * 2020-07-21 2024-03-12 Mastercard International Incorporated Methods and systems for facilitating a payment transaction over a secure radio frequency connection
US11328274B2 (en) 2020-07-28 2022-05-10 Bank Of America Corporation Data processing system and method for managing electronic split transactions using user profiles
US10992606B1 (en) 2020-09-04 2021-04-27 Wells Fargo Bank, N.A. Synchronous interfacing with unaffiliated networked systems to alter functionality of sets of electronic assets
KR102499625B1 (en) * 2020-09-10 2023-02-14 코나아이 (주) Multi card including fingerprint input unit and payment method using the same
US11861618B2 (en) 2020-09-22 2024-01-02 International Business Machines Corporation Proximal distance and usage pattern access management
US11783337B2 (en) 2020-09-25 2023-10-10 Bank Of America Corporation Mobile application-based error reporting
US11244127B1 (en) 2020-09-25 2022-02-08 Bank Of America Corporation Mobile application-based error response
US11765221B2 (en) 2020-12-14 2023-09-19 The Western Union Company Systems and methods for adaptive security and cooperative multi-system operations with dynamic protocols
US20220198452A1 (en) * 2020-12-21 2022-06-23 Shopify Inc. Payment gateway disintermediation
CN112785789A (en) * 2020-12-31 2021-05-11 深圳怡化电脑股份有限公司 Card returning processing method and device, self-service equipment and storage medium
US11546338B1 (en) 2021-01-05 2023-01-03 Wells Fargo Bank, N.A. Digital account controls portal and protocols for federated and non-federated systems and devices
US11687939B2 (en) 2021-02-09 2023-06-27 Capital One Services, Llc Fraud prevention systems and methods for selectively generating virtual account numbers
US11935055B2 (en) 2021-03-22 2024-03-19 Bank Of America Corporation Wired multi-factor authentication for ATMs using an authentication media
US11790120B2 (en) 2021-03-26 2023-10-17 Bank Of America Corporation System and method for encrypting storage mediums with an encryption chip
US20230068700A1 (en) * 2021-08-27 2023-03-02 Visa International Service Association System, Method, and Computer Program Product for Transaction Based Activation
US20230065342A1 (en) * 2021-09-01 2023-03-02 Capital One Services, Llc Using quick response code to extend access to an account
CN117897718A (en) * 2021-09-17 2024-04-16 维萨国际服务协会 Systems, methods, and computer program products for host-based purchase limiting
US20230123264A1 (en) * 2021-10-15 2023-04-20 GTE Financial Systems, apparatuses and methods for providing a virtual card
US20230123311A1 (en) * 2021-10-15 2023-04-20 Mastercard International Incorporated Method and system for enabling e-commerce via digital wallets
US11995621B1 (en) 2021-10-22 2024-05-28 Wells Fargo Bank, N.A. Systems and methods for native, non-native, and hybrid registration and use of tags for real-time services
US20230140190A1 (en) * 2021-11-02 2023-05-04 Onriva Llc Buffering services for suppliers
US20230351043A1 (en) * 2022-04-28 2023-11-02 Fidelity Information Services, Llc Systems and methods for securing data by stateless tokenization
US11606360B1 (en) * 2022-05-10 2023-03-14 Capital One Services, Llc System and method for multi-account provisioning
GB202208742D0 (en) * 2022-06-14 2022-07-27 Tintra 3 0 Ltd Authentication and association of multi-platform accounts and method of obfuscating senstive personal data in processes requiring personal identification
US12033122B2 (en) 2022-07-07 2024-07-09 Lithic, Inc. Systems and methods for configuring serverless authorization stream access (ASA) for virtual bank account transactions
US11775977B1 (en) * 2022-07-07 2023-10-03 Lithic, Inc. Systems and methods for dynamic authorization of virtual bank account transactions
US20240013221A1 (en) * 2022-07-07 2024-01-11 Lithic, Inc. Systems and Methods for Authorizing Permission-based Virtual Bank Account Transactions
US11971862B1 (en) 2022-09-20 2024-04-30 Lithic, Inc. Processing transactions with idempotency in real-time ledgers
US12014137B2 (en) * 2022-09-20 2024-06-18 American Express Travel Related Services Company, Inc. Automated document processing
US11948150B1 (en) 2022-10-21 2024-04-02 Capital One Services, Llc Computer-based systems and/or computing devices programmed for instant issuance of a replacement physical access instrument; and methods of use thereof
US12093925B1 (en) * 2023-04-25 2024-09-17 Discover Financial Services Smart payment card, and computing systems and methods for configuring smart payment card and processing transactions involving smart payment card

Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6138106A (en) * 1997-05-19 2000-10-24 Walker Asset Management Limited Partnership Dynamically changing system for fulfilling concealed value gift certificate obligations

Family Cites Families (179)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US120587A (en) * 1871-11-07 Improvement in bed-bottoms
US36116A (en) * 1862-08-05 Improvement in projectiles for rifled ordnance
US216997A (en) * 1879-07-01 Improvement in wire bale-ties
US97331A (en) * 1869-11-30 Improvement in fastenings for neckties
US3938091A (en) 1972-03-17 1976-02-10 Atalla Technovations Company Personal verification system
JPS5757368A (en) 1980-09-24 1982-04-06 Omron Tateisi Electronics Co Transfer processing method in transaction processing device
ZA828578B (en) 1981-12-10 1983-09-28 Hawker Siddeley Revenue Contr Credit card systems
US4608485A (en) 1983-07-25 1986-08-26 Kabushiki Kaisha Toshiba Automatic transfer transaction processing apparatus
GB2146815A (en) 1983-09-17 1985-04-24 Ibm Electronic fund transfer systems
US4720860A (en) 1984-11-30 1988-01-19 Security Dynamics Technologies, Inc. Method and apparatus for positively identifying an individual
US4998279A (en) 1984-11-30 1991-03-05 Weiss Kenneth P Method and apparatus for personal verification utilizing nonpredictable codes and biocharacteristics
US4856062A (en) 1984-11-30 1989-08-08 Kenneth Weiss Computing and indicating device
SE448127B (en) * 1985-06-18 1987-01-19 Ventronic Venture Electronics ACCOUNT PAYMENT DEVICE
JP2568066B2 (en) 1985-10-07 1996-12-25 パイオニア株式会社 Disk holder
US4707592A (en) 1985-10-07 1987-11-17 Ware Paul N Personal universal identity card system for failsafe interactive financial transactions
US4725719A (en) 1986-07-21 1988-02-16 First City National Bank Of Austin Restricted purpose, commercial, monetary regulation method
JP2624674B2 (en) 1987-04-10 1997-06-25 株式会社日立製作所 Transaction processing system
US4797920A (en) 1987-05-01 1989-01-10 Mastercard International, Inc. Electronic funds transfer system with means for verifying a personal identification number without pre-established secret keys
US5023904A (en) 1987-08-04 1991-06-11 Science Dynamics Corporation Direct telephone dial ordering service
US4874932A (en) 1987-09-26 1989-10-17 Omron Tateisi Electronics Co. Card authorization terminal
US4941090A (en) 1989-01-27 1990-07-10 Mccarthy Patrick D Centralized consumer cash value accumulation system for multiple merchants
US5202826A (en) 1989-01-27 1993-04-13 Mccarthy Patrick D Centralized consumer cash value accumulation system for multiple merchants
US5117355A (en) 1989-01-27 1992-05-26 Mccarthy Patrick D Centralized consumer cash valve accumulation system for multiple merchants
US4893330A (en) * 1989-06-01 1990-01-09 American Telephone And Telegraph Company, At&T Bell Laboratories Method and apparatus for restricting credit card communication calls
JPH0333733U (en) * 1989-08-07 1991-04-03
US5097505A (en) 1989-10-31 1992-03-17 Securities Dynamics Technologies, Inc. Method and apparatus for secure identification and verification
US5130519A (en) 1990-01-16 1992-07-14 George Bush Portable pin card
GB9003326D0 (en) 1990-02-14 1990-04-11 Enfranchise Sixty Ltd Apparatus and method for data communication
GB9003325D0 (en) 1990-02-14 1990-04-11 Enfranchise Sixty Ltd Apparatus and method for controlling access to broadcast signals
EP0515565A1 (en) 1990-02-16 1992-12-02 Scanera S.C. Device for increasing the dynamic range of a camera
GB9003999D0 (en) 1990-02-22 1990-04-18 Enfranchise Sixty Ltd Pseudo-random sequence generators
FR2661996A1 (en) 1990-05-10 1991-11-15 Bremard Guy System for controlling access to an apparatus
US5093861A (en) 1990-10-12 1992-03-03 Cardkey Systems, Inc. Recognition apparatus and method for security systems
US5196840A (en) 1990-11-05 1993-03-23 International Business Machines Corporation Secure communications system for remotely located computers
US5231570A (en) * 1990-12-11 1993-07-27 Lee Gerritt S K Credit verification system
GB2252270B (en) 1991-01-30 1995-05-24 Wren Hilton Giles Martin Improvements in and relating to cards and like information stores
US5239583A (en) 1991-04-10 1993-08-24 Parrillo Larry A Method and apparatus for improved security using access codes
US5163097A (en) 1991-08-07 1992-11-10 Dynamicserve, Ltd. Method and apparatus for providing secure access to a limited access system
US5193114A (en) 1991-08-08 1993-03-09 Moseley Donald R Consumer oriented smart card system and authentication techniques
JP3083187B2 (en) 1991-09-30 2000-09-04 富士通株式会社 Key management method of electronic wallet system
JP2708083B2 (en) * 1991-12-27 1998-02-04 国際電信電話株式会社 Credit card billing simple dial operation service device
FI264U1 (en) 1992-01-15 1992-09-16 Stephen Ind Inc Oy Medelanskaffningsmedel
CA2100134C (en) * 1992-09-29 1999-06-22 Raymond Otto Colbert Secure credit/debit card authorization
TW250555B (en) 1992-09-30 1995-07-01 Hudson Kk
US5479494A (en) 1992-10-05 1995-12-26 At&T Corp. Virtual calling card system
US5350906A (en) 1992-11-25 1994-09-27 Brody Bill E Currency transfer system and method using fixed limit cards
US5326960A (en) 1992-11-25 1994-07-05 Tannenbaum David H Currency transfer system and method
US5317636A (en) 1992-12-09 1994-05-31 Arris, Inc. Method and apparatus for securing credit card transactions
US5363449A (en) 1993-03-11 1994-11-08 Tandem Computers Incorporated Personal identification encryptor and method
JPH06282556A (en) 1993-03-30 1994-10-07 Hisashi Iwata One-time credit card settlement system
US5466919A (en) 1993-04-02 1995-11-14 Hovakimian; Henry Credit/charge card system enabling purchasers to contribute to selected charities
JP3053527B2 (en) 1993-07-30 2000-06-19 インターナショナル・ビジネス・マシーンズ・コーポレイション Method and apparatus for validating a password, method and apparatus for generating and preliminary validating a password, method and apparatus for controlling access to resources using an authentication code
US5506393A (en) 1993-09-07 1996-04-09 Ziarno; Witold A. Donation kettle accepting credit card, debit card, and cash donations, and donation kettle network
WO1995008232A1 (en) 1993-09-14 1995-03-23 Chantilley Corporation Limited Apparatus for key distribution in an encryption system
US5343529A (en) 1993-09-28 1994-08-30 Milton Goldfine Transaction authentication using a centrally generated transaction identifier
GB9321357D0 (en) 1993-10-15 1993-12-22 British Telecomm Personal identification systems
US5557109A (en) 1993-11-01 1996-09-17 International Research And Development Radiation sterilization unit
US5465206B1 (en) 1993-11-01 1998-04-21 Visa Int Service Ass Electronic bill pay system
EP0734556B1 (en) 1993-12-16 2002-09-04 Open Market, Inc. Network based payment system and method for using such system
US5826243A (en) 1994-01-03 1998-10-20 Merrill Lynch & Co., Inc. Integrated system for controlling master account and nested subaccount(s)
JPH07231367A (en) 1994-02-17 1995-08-29 Fujitsu Ltd Personal communication charging service device by credit card
US6142368A (en) 1994-03-03 2000-11-07 Busch Entertainment Corporation Prepayment wristband and computer debit system
US5555497A (en) 1994-03-21 1996-09-10 Helbling; Edward Charitable contribution centralization system and apparatus
AU2076695A (en) 1994-03-23 1995-10-09 Chantilley Corporation Limited Apparatus for generating encryption/decryption look-up tables using a session key
AU2227995A (en) 1994-03-28 1995-10-17 Robert Waxman, Inc. Interactive product selection and purchasing system
US5500513A (en) * 1994-05-11 1996-03-19 Visa International Automated purchasing control system
US5504808A (en) 1994-06-01 1996-04-02 Hamrick, Jr.; James N. Secured disposable debit card calling system and method
US5577109A (en) 1994-06-06 1996-11-19 Call Processing, Inc. Pre-paid card system and method
US5590038A (en) * 1994-06-20 1996-12-31 Pitroda; Satyan G. Universal electronic transaction card including receipt storage and system and methods of conducting electronic transactions
US5478994A (en) 1994-07-13 1995-12-26 Rahman; Sam Secure credit card which prevents unauthorized transactions
US5627355A (en) 1994-07-13 1997-05-06 Rahman; Sam Transaction device, equipment and method for protecting account numbers and their associated personal identification numbers
US5694471A (en) 1994-08-03 1997-12-02 V-One Corporation Counterfeit-proof identification card
US5826241A (en) 1994-09-16 1998-10-20 First Virtual Holdings Incorporated Computerized system for making payments and authenticating transactions over the internet
GB9418709D0 (en) 1994-09-16 1994-11-16 Chantilley Corp Ltd Secure computer network
US5715314A (en) 1994-10-24 1998-02-03 Open Market, Inc. Network sales system
US6298335B1 (en) 1995-01-06 2001-10-02 Robert Bernstein Method of controlling payment of debts
JPH08263600A (en) * 1995-03-22 1996-10-11 Toshiba Corp Method and device for issuing portable storage medium
US5677955A (en) 1995-04-07 1997-10-14 Financial Services Technology Consortium Electronic funds transfer instruments
JP3047092B2 (en) 1995-05-02 2000-05-29 日本信販株式会社 Credit card system and method of using credit card using the system
US5708422A (en) 1995-05-31 1998-01-13 At&T Transaction authorization and alert system
US5696908A (en) 1995-06-07 1997-12-09 Southeast Phonecard, Inc. Telephone debit card dispenser and method
US5748908A (en) 1995-06-07 1998-05-05 Yu; Mason K. Automated, classified expenditure data card recording system
US5678010A (en) 1995-06-07 1997-10-14 Compuserve Incorporated Automated routing of messages over a network
US5878141A (en) * 1995-08-25 1999-03-02 Microsoft Corporation Computerized purchasing system and method for mediating purchase transactions over an interactive network
GB2305393A (en) 1995-08-31 1997-04-09 Powerhouse Marketing Limited Telephone card with scratch-off panel
JP2942478B2 (en) * 1995-09-14 1999-08-30 日立ソフトウエアエンジニアリング株式会社 Network billing method
US5893907A (en) 1995-10-26 1999-04-13 Ukuda; Shuko Apparatus and system for managing a card number
JPH09128601A (en) * 1995-10-31 1997-05-16 Universal Denshi Keisan Kk Postpaid card system
US5757917A (en) 1995-11-01 1998-05-26 First Virtual Holdings Incorporated Computerized payment system for purchasing goods and services on the internet
US5671279A (en) 1995-11-13 1997-09-23 Netscape Communications Corporation Electronic commerce using a secure courier system
US5673309A (en) 1995-11-17 1997-09-30 Avery Dennison Corporation ATM phone card system
JP3133243B2 (en) 1995-12-15 2001-02-05 株式会社エヌケーインベストメント Online shopping system
US6252869B1 (en) * 1995-12-29 2001-06-26 At&T Corp. Data network security system and method
US6016482A (en) * 1996-01-11 2000-01-18 Merrill Lynch & Co., Inc. Enhanced collateralized funding processor
US20050027618A1 (en) 1996-01-17 2005-02-03 Privacy Infrastructure, Inc. Third party privacy system
US5777305A (en) 1996-01-24 1998-07-07 Incomm Package assembly and method for activating prepaid debit cards
US5883801A (en) * 1996-05-14 1999-03-16 Microwave Science, Llc Method and apparatus for managing electromagnetic radiation usage
US5825881A (en) 1996-06-28 1998-10-20 Allsoft Distributing Inc. Public network merchandising system
US5903830A (en) * 1996-08-08 1999-05-11 Joao; Raymond Anthony Transaction security apparatus and method
US6970837B1 (en) 1996-09-04 2005-11-29 Walker Digital, Llc Methods and apparatus wherein a buyer arranges to purchase a first product using a communication network and subsequently takes possession of a substitute product at a retailer
JPH10143572A (en) 1996-09-12 1998-05-29 N T T Data Tsushin Kk Prepaid card system, prepaid card and recording medium
US6018343A (en) 1996-09-27 2000-01-25 Timecruiser Computing Corp. Web calendar architecture and uses thereof
US5913203A (en) * 1996-10-03 1999-06-15 Jaesent Inc. System and method for pseudo cash transactions
AU745141B2 (en) 1996-10-09 2002-03-14 Visa International Service Association Electronic statement presentment system
US5953710A (en) * 1996-10-09 1999-09-14 Fleming; Stephen S. Children's credit or debit card system
US5868236A (en) 1996-11-27 1999-02-09 Darrell G. Rademacher Pin vending dispenser
US6193155B1 (en) * 1996-12-09 2001-02-27 Walker Digital, Llc Method and apparatus for issuing and managing gift certificates
US5798508A (en) 1996-12-09 1998-08-25 Walker Asset Management, L.P. Postpaid traveler's checks
IL119965A0 (en) 1997-01-06 1997-04-15 Aerotel Ltd Computerized money transfer system
US5864830A (en) 1997-02-13 1999-01-26 Armetta; David Data processing method of configuring and monitoring a satellite spending card linked to a host credit card
US6282522B1 (en) 1997-04-30 2001-08-28 Visa International Service Association Internet payment system using smart card
US6012048A (en) 1997-05-30 2000-01-04 Capital Security Systems, Inc. Automated banking system for dispensing money orders, wire transfer and bill payment
US5949044A (en) 1997-06-13 1999-09-07 Walker Asset Management Limited Partnership Method and apparatus for funds and credit line transfers
US6144948A (en) 1997-06-23 2000-11-07 Walker Digital, Llc Instant credit card marketing system for reservations for future services
US5945653A (en) * 1997-06-26 1999-08-31 Walker Asset Management Limited Partnership System and method for establishing and executing functions to affect credit card accounts and transactions
GB2327831B (en) 1997-07-23 2002-10-09 Chantilley Corp Ltd Document or message security arrangements
US6021379A (en) * 1997-07-29 2000-02-01 Exxon Production Research Company Method for reconstructing seismic wavefields
US5903878A (en) 1997-08-20 1999-05-11 Talati; Kirit K. Method and apparatus for electronic commerce
US6163771A (en) 1997-08-28 2000-12-19 Walker Digital, Llc Method and device for generating a single-use financial account number
US5914472A (en) * 1997-09-23 1999-06-22 At&T Corp Credit card spending authorization control system
US5883810A (en) * 1997-09-24 1999-03-16 Microsoft Corporation Electronic online commerce card with transactionproxy number for online transactions
US6000832A (en) 1997-09-24 1999-12-14 Microsoft Corporation Electronic online commerce card with customer generated transaction proxy number for online transactions
US5984180A (en) 1997-10-06 1999-11-16 Albrecht; Jerry L. Method and system for gift credit card
US6188761B1 (en) 1997-10-21 2001-02-13 Mci Communications Corporation System and method for providing operator and customer services
US5987118A (en) * 1997-10-21 1999-11-16 Mci Communiations Corporation Method and computer program logic for providing an intelligent network operator console with enhanced services
US5991750A (en) 1997-10-24 1999-11-23 Ge Capital System and method for pre-authorization of individual account transactions
US5995948A (en) * 1997-11-21 1999-11-30 First Usa Bank, N.A. Correspondence and chargeback workstation
US6021397A (en) * 1997-12-02 2000-02-01 Financial Engines, Inc. Financial advisory system
US6035025A (en) * 1998-01-07 2000-03-07 National Telemanagement Corporation System and method for a prepaid bundled telecommunications account
US6636833B1 (en) * 1998-03-25 2003-10-21 Obis Patents Ltd. Credit card system and method
US7747523B2 (en) 1998-03-30 2010-06-29 Cohen Morris E Internet-based financial vehicles
US6422462B1 (en) * 1998-03-30 2002-07-23 Morris E. Cohen Apparatus and methods for improved credit cards and credit card transactions
US20020198806A1 (en) 1998-04-24 2002-12-26 First Data Corporation Systems and methods for accessing and modifying usage parameters associated with a financial transaction account
US20030171992A1 (en) 1999-04-23 2003-09-11 First Data Corporation System and methods for redeeming rewards associated with accounts
US6029890A (en) 1998-06-22 2000-02-29 Austin; Frank User-Specified credit card system
WO2000002150A1 (en) 1998-07-01 2000-01-13 Webcard Inc. Transaction authorisation method
US6393411B1 (en) * 1998-07-21 2002-05-21 Amdahl Corporation Device and method for authorized funds transfer
US6343279B1 (en) 1998-08-26 2002-01-29 American Management Systems, Inc. System integrating credit card transactions into a financial management system
JP2002530757A (en) 1998-11-17 2002-09-17 プレネット コーポレイション Electronic payment system using intermediate account
US6339766B1 (en) 1998-12-02 2002-01-15 Transactionsecure Electronic payment system employing limited-use account number
US6173269B1 (en) 1998-12-16 2001-01-09 Zowi.Com, Inc Method and apparatus for executing electronic commercial transactions with minors
US6324526B1 (en) 1999-01-15 2001-11-27 D'agostino John System and method for performing secure credit card purchases
US6240397B1 (en) 1999-02-17 2001-05-29 Arye Sachs Method for transferring, receiving and utilizing electronic gift certificates
ATE231266T1 (en) 1999-02-18 2003-02-15 Orbis Patents Ltd CREDIT CARD SYSTEM AND PROCEDURES
US6375084B1 (en) 1999-03-29 2002-04-23 Transmo Limited Card charging systems
PL351167A1 (en) 1999-04-13 2003-03-24 Orbis Patents Ltd System for carrying on financial operation in person vs. person, person vs. company, company vs. person and company vs. company relationships
US6227447B1 (en) 1999-05-10 2001-05-08 First Usa Bank, Na Cardless payment system
US7013292B1 (en) * 1999-06-10 2006-03-14 Felicite.Com Inc. Method and system for universal gift registry
US7319986B2 (en) 1999-09-28 2008-01-15 Bank Of America Corporation Dynamic payment cards and related management systems and associated methods
US20090164325A1 (en) * 1999-11-05 2009-06-25 American Express Travel Related Services Company, Inc. Systems and Methods for Locating an Automated Clearing House Utilizing a Point of Sale Device
US7877325B2 (en) * 1999-11-05 2011-01-25 American Express Travel Related Services Company, Inc. Systems and methods for settling an allocation of an amount between transaction accounts
US6826542B1 (en) 1999-11-23 2004-11-30 Ipayables, Inc. System and method for collecting, enhancing and distributing invoices electronically via the internet
AU2462701A (en) 1999-12-30 2001-07-16 Motient Communications Inc. System and method of transmitting data messages between subscriber units communicating with/between complementary/disparate networks
US20010047336A1 (en) 2000-04-03 2001-11-29 Maycock Sidney M. Credit card management system
US7263506B2 (en) 2000-04-06 2007-08-28 Fair Isaac Corporation Identification and management of fraudulent credit/debit card purchases at merchant ecommerce sites
GB0010422D0 (en) 2000-04-28 2000-06-14 Cast Technologies Limited Payment apparatus and method
FR2810179B1 (en) 2000-06-09 2005-02-18 Sami Atig METHOD FOR MAKING TRANSACTIONS USING SECRET CODE CARDS SECRET
US6598031B1 (en) 2000-07-31 2003-07-22 Edi Secure Lllp Apparatus and method for routing encrypted transaction card identifying data through a public telephone network
US6839692B2 (en) * 2000-12-01 2005-01-04 Benedor Corporation Method and apparatus to provide secure purchase transactions over a computer network
US20020087461A1 (en) * 2000-12-28 2002-07-04 Ravi Ganesan Technique for electronic funds escrow
US6931382B2 (en) 2001-01-24 2005-08-16 Cdck Corporation Payment instrument authorization technique
US10592901B2 (en) 2001-06-04 2020-03-17 Orbis Patents, Ltd. Business-to-business commerce using financial transaction numbers
WO2003001866A1 (en) 2001-06-27 2003-01-09 Snapcount Limited Transcation processing
KR20030002534A (en) 2001-06-29 2003-01-09 에스케이 텔레콤주식회사 Method for notification and management of credit card approvement using mobile phone
US7890375B2 (en) 2001-07-31 2011-02-15 Half.Com, Inc. Method and system to facilitate pre-ordering via an electronic commerce facility, and to automatically facilitate satisfying of a pre-order upon listing of an appropriate offer via the electronic commerce facility
US6901387B2 (en) 2001-12-07 2005-05-31 General Electric Capital Financial Electronic purchasing method and apparatus for performing the same
US7805376B2 (en) 2002-06-14 2010-09-28 American Express Travel Related Services Company, Inc. Methods and apparatus for facilitating a transaction
US7389275B2 (en) 2002-03-05 2008-06-17 Visa U.S.A. Inc. System for personal authorization control for card transactions
US20030216997A1 (en) 2002-05-16 2003-11-20 Cohen Morris E. Financial cards
US7571140B2 (en) * 2002-12-16 2009-08-04 First Data Corporation Payment management
WO2008027023A2 (en) * 2004-02-05 2008-03-06 Bae Systems Information And Electronic Systems Integration Inc. Threat launch detection system and method
US7374095B2 (en) * 2005-07-20 2008-05-20 Arthur Blank & Company, Inc. Transaction card and envelope assembly
US20070166411A1 (en) 2005-12-16 2007-07-19 Bristol-Myers Squibb Company Nutritional supplement containing long-chain polyunsaturated fatty acids
EP1821249A1 (en) 2006-02-14 2007-08-22 Lufthansa AirPlus Servicekarten GmbH Technique for interconnecting card payment networks
JP4827613B2 (en) * 2006-05-24 2011-11-30 株式会社ソニー・コンピュータエンタテインメント TERMINAL DEVICE, BATTERY CHARGE CONTROL METHOD, AND GAME SYSTEM
KR100845572B1 (en) 2006-07-14 2008-07-10 전수안 Private limit adjustmenting method
WO2008010740A1 (en) * 2006-07-20 2008-01-24 Intel Corporation Method and apparatus to improve performance in a multicarrier mimo channel using the hadamard transform
US20080217399A1 (en) 2007-03-07 2008-09-11 Eric Leblanc System and method for controlling usage of a payment card
US20150095239A1 (en) * 2013-09-30 2015-04-02 Fiserv , Inc. Card account identifiers associated with conditions for temporary use

Patent Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6138106A (en) * 1997-05-19 2000-10-24 Walker Asset Management Limited Partnership Dynamically changing system for fulfilling concealed value gift certificate obligations

Cited By (25)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US11922429B2 (en) 2005-07-22 2024-03-05 Gtj Ventures, Llc Transaction security apparatus and method
US10600069B2 (en) 2010-11-01 2020-03-24 Cardpool, Inc. Gift card exchange kiosks and associated methods of use
US9064268B2 (en) 2010-11-01 2015-06-23 Outerwall Inc. Gift card exchange kiosks and associated methods of use
US8630952B2 (en) * 2011-03-04 2014-01-14 Citibank, N.A. Methods and systems using contactless card
US20120265682A1 (en) * 2011-03-04 2012-10-18 Citibank, N.A. Methods and Systems Using Contactless Card
US10716675B2 (en) 2011-11-23 2020-07-21 Coinstar Asset Holdings, Llc Mobile commerce platforms and associated systems and methods for converting consumer coins, cash, and/or other forms of value for use with same
US9799014B2 (en) 2011-11-23 2017-10-24 Coinstar Asset Holdings, Llc Mobile commerce platforms and associated systems and methods for converting consumer coins, cash, and/or other forms of value for use with same
US11100744B2 (en) 2011-11-23 2021-08-24 Coinstar Asset Holdings, Llc Mobile commerce platforms and associated systems and methods for converting consumer coins, cash, and/or other forms of value for use with same
US9129294B2 (en) 2012-02-06 2015-09-08 Outerwall Inc. Coin counting machines having coupon capabilities, loyalty program capabilities, advertising capabilities, and the like
US20160086187A1 (en) * 2013-06-17 2016-03-24 Raymond Anthony Joao Apparatus and method for providing transaction security and/or account security
US11915235B2 (en) 2013-07-24 2024-02-27 Visa International Service Association Systems and methods for communicating token attributes associated with a token vault
US11093936B2 (en) 2013-07-24 2021-08-17 Visa International Service Association Systems and methods for communicating token attributes associated with a token vault
EP3937108A1 (en) * 2013-10-11 2022-01-12 Visa International Service Association Network token system
US10891610B2 (en) 2013-10-11 2021-01-12 Visa International Service Association Network token system
US11710119B2 (en) 2013-10-11 2023-07-25 Visa International Service Association Network token system
US10491605B2 (en) 2013-10-30 2019-11-26 Google Llc Secure interface using non-secure element processors
US11374943B2 (en) 2013-10-30 2022-06-28 Google Llc Secure interface using non-secure element processors
US8930274B1 (en) * 2013-10-30 2015-01-06 Google Inc. Securing payment transactions with rotating application transaction counters
US11568405B2 (en) 2014-06-05 2023-01-31 Visa International Service Association Identification and verification for provisioning mobile application
US10546462B2 (en) * 2014-09-18 2020-01-28 Gamblit Gaming, Llc Pseudo anonymous account wagering system
US12008523B2 (en) * 2015-08-01 2024-06-11 Bitnote, Inc. Single-use multi-layered ticket and redeeming technique
US10346819B2 (en) 2015-11-19 2019-07-09 Coinstar Asset Holdings, Llc Mobile device applications, other applications and associated kiosk-based systems and methods for facilitating coin saving
US20180150837A1 (en) * 2016-11-29 2018-05-31 Mastercard International Incorporated System and method for delivering a cashless gift useable during a cashless transaction
US10885746B2 (en) 2017-08-09 2021-01-05 Raymond Anthony Joao Sports betting apparatus and method
US11069195B2 (en) 2017-08-09 2021-07-20 Raymond Anthony Joao Sports betting apparatus and method

Also Published As

Publication number Publication date
US20030028481A1 (en) 2003-02-06
CA2322356A1 (en) 1999-09-30
ES2154625T5 (en) 2006-03-16
US7567934B2 (en) 2009-07-28
US7571142B1 (en) 2009-08-04
PL343253A1 (en) 2001-07-30
CA2362033C (en) 2003-12-30
EP1029311B2 (en) 2005-08-31
HUP0102408A3 (en) 2003-05-28
GR3036728T3 (en) 2001-12-31
EA003027B1 (en) 2002-12-26
HK1030472A1 (en) 2001-05-04
KR20010040411A (en) 2001-05-15
DE69900169T3 (en) 2006-06-29
EP1115095A2 (en) 2001-07-11
US7136835B1 (en) 2006-11-14
KR20030051863A (en) 2003-06-25
CA2362033A1 (en) 1999-09-30
NO20004657D0 (en) 2000-09-19
EP1029311B1 (en) 2001-06-27
EP1729267A2 (en) 2006-12-06
US9898730B2 (en) 2018-02-20
DE69900169T2 (en) 2002-03-07
DK1029311T3 (en) 2001-10-22
US20140122340A1 (en) 2014-05-01
NO20004657L (en) 2000-11-16
US7593896B1 (en) 2009-09-22
AU748558B2 (en) 2002-06-06
EA200000980A1 (en) 2001-02-26
ATE202647T1 (en) 2001-07-15
US20090037333A1 (en) 2009-02-05
BR9909065A (en) 2000-12-05
HUP0102408A2 (en) 2001-11-28
AP2000001918A0 (en) 2000-09-30
TR200002758T2 (en) 2001-07-23
IL141060A0 (en) 2002-02-10
EP1029311A1 (en) 2000-08-23
IES990239A2 (en) 1999-10-20
US20140236831A1 (en) 2014-08-21
CN1292131A (en) 2001-04-18
CA2322356C (en) 2001-12-04
AR014771A1 (en) 2001-03-28
JP2002508550A (en) 2002-03-19
US8676707B2 (en) 2014-03-18
US20090070260A1 (en) 2009-03-12
DE1029311T1 (en) 2001-04-19
IES81088B2 (en) 2000-03-08
EP1115095A3 (en) 2002-03-20
NZ506636A (en) 2002-11-26
IL137456A0 (en) 2001-07-24
PT1029311E (en) 2001-12-28
SG115360A1 (en) 2005-10-28
DE69900169D1 (en) 2001-08-02
US20090134217A1 (en) 2009-05-28
NO323708B1 (en) 2007-06-25
ES2154625T3 (en) 2002-02-01
US9881298B2 (en) 2018-01-30
ES2154625T1 (en) 2001-04-16
EP1729267A3 (en) 2006-12-27
US8756150B2 (en) 2014-06-17
IL137456A (en) 2001-03-19
WO1999049424A1 (en) 1999-09-30
IE990240A1 (en) 1999-10-20
AU3050699A (en) 1999-10-18
US6636833B1 (en) 2003-10-21

Similar Documents

Publication Publication Date Title
US9881298B2 (en) Credit card system and method
EP1153375B1 (en) Credit card system and method
WO2008018052A2 (en) Secure mechanism and system for processing financial transactions
JP2004531827A (en) System and method for secure refund
US20040153410A1 (en) Anonymous payment system and method
EP1265200A1 (en) Credit card system and method
JP2003507824A (en) Guarantee system for performing electronic commerce and method used therefor
AU753159B2 (en) Credit card system and method
ZA200106639B (en) Credit card system and method.
Ezema et al. An Assessment of Computer Based Transactions in Nigeria
by Visa Card not present fraud
MXPA00009309A (en) Credit card system and method

Legal Events

Date Code Title Description
STCB Information on status: application discontinuation

Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION