US20130218768A1 - Systems and Methods for Facilitating Secured Financial Transactions - Google Patents

Systems and Methods for Facilitating Secured Financial Transactions Download PDF

Info

Publication number
US20130218768A1
US20130218768A1 US13/401,748 US201213401748A US2013218768A1 US 20130218768 A1 US20130218768 A1 US 20130218768A1 US 201213401748 A US201213401748 A US 201213401748A US 2013218768 A1 US2013218768 A1 US 2013218768A1
Authority
US
United States
Prior art keywords
payment
transaction
payee
payor
instructions
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
US13/401,748
Inventor
Mike Leber
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
HURRICANE ELECTRIC
Original Assignee
HURRICANE ELECTRIC
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by HURRICANE ELECTRIC filed Critical HURRICANE ELECTRIC
Priority to US13/401,748 priority Critical patent/US20130218768A1/en
Assigned to HURRICANE ELECTRIC reassignment HURRICANE ELECTRIC ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: LEBER, MIKE
Publication of US20130218768A1 publication Critical patent/US20130218768A1/en
Priority to US16/452,011 priority patent/US11222314B2/en
Abandoned legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/02Payment architectures, schemes or protocols involving a neutral party, e.g. certification authority, notary or trusted third party [TTP]
    • G06Q20/023Payment architectures, schemes or protocols involving a neutral party, e.g. certification authority, notary or trusted third party [TTP] the neutral party being a clearing house
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/385Payment protocols; Details thereof using an alias or single-use codes

Definitions

  • Embodiments of the disclosure relate to the facilitation of secure financial transactions. More specifically, but not by way of limitation, the present technology may be utilized to facilitate secure financial transactions between one or more payors and one or more payees.
  • enterprises may employ different types of heuristics to attempt to determine if a transaction is fraudulent. For example, it may be determined that because a credit card was utilized in separate locations that are located across the country from one another and within a specified time frame, that at least one of the transactions may be fraudulent. In other instances, enterprises may not employ any fraud detection measures. Customers may be subject to time intensive and laborious efforts in order to recover their money lost during a fraudulent transaction.
  • the present technology may be directed to methods for facilitating at least a portion of a secure electronic financial transaction.
  • Methods may include: (a) generating a unique payee identifier that represents a payee; (b) receiving a transaction request, the transaction request comprising an instrument that has been digitally signed by at least one payor and the unique payee identifier; and (c) authorizing a payment to the payee according to payment instructions included in the instrument.
  • the present technology may be directed to systems facilitating at least a portion of a secure electronic financial transaction.
  • the systems may comprise: (a) a memory for storing executable instructions; (b) a processor for executing the instructions stored in memory; (c) an identification generator stored in memory and executable by the processor to generate a unique payee identifier that represents a payee; (d) a communications module stored in memory and executable by the processor to receive a transaction request, the transaction request comprising an instrument that has been digitally signed by at least one payor and the unique payee identifier; and (e) a transaction authorization module stored in memory and executable by the processor to authorize a payment to the payee according to payment instructions included in the instrument.
  • FIG. 1 illustrates an exemplary system for practicing aspects of the present technology
  • FIG. 2 illustrates an exemplary conversion application for facilitating at least a portion of a secure electronic financial transaction
  • FIG. 3 is a flowchart of an exemplary method for facilitating at least a portion of a secure electronic financial transaction
  • FIG. 4 illustrates an exemplary computing system that may be used to implement embodiments according to the present technology.
  • the present technology may be directed to systems and methods for facilitating at least a portion of a secure financial transaction. More specifically, but not by way of limitation, the present technology may facilitate at least a portion of a secured financial transaction such as transaction request authentication, payment authorization, and/or payment transmission.
  • the present technology may be implemented within the context of a third party transaction processor that is configured to securely process financial transactions on behalf of both payor(s) and payee(s). It is noteworthy that in some instances, the present technology may also comprise the financial institution (e.g., bank) that transmits monetary assets to the payee in response to the authorization of payment to the payee.
  • the financial institution e.g., bank
  • the present technology may generate a unique payee identifier, hereinafter “UPI,” that is utilized to verify the identity of a payee before authorization of a payment to a payee.
  • UPI unique payee identifier
  • the present technology may also generate digital instruments that represent a unique payment relationship between a payee and one or more payors.
  • a payor such as a customer may desire to execute a secure financial transaction with a payee such as a merchant.
  • the digital instrument may include payment instructions that define how payments to the payee are authorized.
  • the digital instrument may specify the type of information (such as name, address, account number, etc.) that must be gathered from the payor before payment can be authorized.
  • the payment instructions may allow for multiple transactions between the parties, as long as the transactions comport with the payment instructions.
  • the payment instructions may specify that a payment amount may be requested and provided to the payee within a specified period of time.
  • payment instructions may allow for installment payments, pre-dated payments, or other temporally based payments between payors and payees. Other variations on payment instructions will be discussed in greater detail infra.
  • the present technology may also employ security measures such as cryptography that allow payors to digitally sign the digital instruments.
  • the payor and/or payee may utilize a program and/or digital security protocol that can be used to verify the identity of the payor and/or payee and digitally sign a digital instrument.
  • the present technology may utilize pretty good privacy (PGP) encryption or other encryption mechanisms such as a secure socket layer (SSL), tokenization, along with any other suitable encryption/decryption systems and processes that would be known to one of ordinary skill in the art with the present disclosure before them.
  • PGP pretty good privacy
  • SSL secure socket layer
  • a digital instrument may comprise a set of payment instructions that govern the manner with which financial transactions between a payor and a payee are conducted by the payment processor. That is, payment instructions may include a specific set of rules that are defined by the payor and/or the payee. In some instances, the payment processor may specify the type of payment information that should be obtained from the payor and/or payee. Also, the payment processor may establish one or more required types of cryptographic or tokenization processes that may be employed by the payor and/or payee.
  • the payment information may incorporate the use of standard commercial agreements and/or negotiable financial instruments. Examples of these agreements include a check, a wire, a cashier's check, card-present credit card terms, card-not-present credit card terms, automated clearing house terms, an escrow agreement, a contract, a bill, a letter of intent, a purchase order, a promissory note, and a mortgage—just to name a few.
  • the payment information may include only sections of one or more of the aforementioned agreements.
  • the present technology may receive a transaction request from either the payor or the payee.
  • the transaction request may comprise a digital instrument that has been digitally signed, along with a unique payee identifier.
  • the digital instrument may include payment instructions.
  • the present technology may authorize a payment to the payee that corresponds to the payment instructions. It is noteworthy that authorization of the payment may not include an actual transfer of funds to the payee. For example, authorization may include communication of an authorization signal from the payment processor to a financial institution such as a bank. Alternatively, if the payment processor and the financial institution are the same entity, authorization of payment may result in the immediate transfer of funds to the payee.
  • the present technology may allow for a payment to be split or apportioned amongst multiple payors. In other embodiments the present technology may allow for payors to act as guarantors for other parties, such as another payor or a third party.
  • present technology may be utilized within the context of secured electronic payments for actual monetary consideration, the present technology may also be applied to virtual currency systems such as those utilized in video gaming environments or other types of virtual social constructs (e.g., social networking).
  • virtual currency systems such as those utilized in video gaming environments or other types of virtual social constructs (e.g., social networking).
  • FIGS. 1-4 These and other advantages of the present technology will be described in greater detail with reference to the collective FIGS. 1-4 .
  • FIG. 1 illustrates an exemplary system 100 for practicing aspects of the present technology.
  • the system 100 may include a transaction processing system 105 that may be implemented in a cloud-based computing environment.
  • a cloud-based computing environment is a resource that typically combines the computational power of a large grouping of processors and/or that combines the storage capacity of a large grouping of computer memories or storage devices.
  • systems that provide a cloud resource may be utilized exclusively by their owners; or such systems may be accessible to outside users who deploy applications within the computing infrastructure to obtain the benefit of large computational or storage resources.
  • the cloud may be formed, for example, by a network of web servers, with each web server (or at least a plurality thereof) providing processor and/or storage resources. These servers may manage workloads provided by multiple users (e.g., cloud resource customers or other users). Typically, each user places workload demands upon the cloud that vary in real-time, sometimes dramatically. The nature and extent of these variations typically depend on the type of business associated with the user.
  • the transaction processing system 105 may include a distributed group of computing devices such as web servers that do not share computing resources or workload. Additionally, the transaction processing system 105 may include a single computing system that has been provisioned with a plurality of programs that each produces instances of event data.
  • Payors and payees may communicate transaction data (e.g., digital instruments) between one another and/or the transaction processing system 105 via individual client devices such as payor client device 110 A and payee client device 110 B.
  • the transaction processing system 105 may communicatively couple with the payor client device 110 A and payee client device 110 B via a network connection 115 .
  • the network connection 115 may include any one of a number of private and public communications mediums such as the Internet.
  • the payor client device 110 A and the payee client device 110 B may utilize PGP, SSL, or another suitable cryptographic protocol for transmitting transaction information between each other and/or the transaction processing system 105 .
  • payor client device 110 A and payee client device 110 B may communicate with the transaction processing system 105 using a secure application programming interface or API.
  • An API allows various types of programs to communicate with one another in a language (e.g., code) dependent or language agnostic manner.
  • the transaction processing system 105 may also communicate with a third party 120 such as a financial institution that may provide monetary funds to a payee, often using the payee's account associated with the payee's financial institution of choice.
  • the transaction processing system 105 and the financial institution 120 may also communicate via the network connection 115 , which may comprise any one of a number of secure/insecure communications protocols.
  • the transaction processing system 105 may be generally described as a system for facilitating at least a portion of a secure financial transaction. It is noteworthy that the system may facilitate at least a portion of a secure financial transaction as the system may in some instances authorize a payment, whereas in other instances the system may also transmit payment to the payee as well.
  • the transaction processing system 105 may facilitate at least a portion of a secure financial transaction by generating a UPI for each payee. Also, the transaction processing system 105 may receive a transaction request, where the transaction request may comprise at least the UPI and a digital instrument that has been digitally signed by at least one payor.
  • the digital instrument may include payment instructions such as the payment amount. It is noteworthy that the transaction request may be received from either the payor or the payee, as will be described in greater detail below.
  • the transaction processing system 105 may generally comprise memory that includes executable instructions and a processor that executes the instructions stored in memory. Further details regarding exemplary memory and processor for the transaction processing system 105 are described relative to computing system 400 as described in FIG. 4 .
  • the executable instructions may be embodied as an application 200 .
  • the application 200 may generally comprise a transaction templating module 205 , an identification generator 210 , a communications module 215 , and a transaction authorization module 220 .
  • the application 200 may include additional modules, engines, or components, and still fall within the scope of the present technology.
  • the term “module” may also refer to any of an application-specific integrated circuit (“ASIC”), an electronic circuit, a processor (shared, dedicated, or group) that executes one or more software or firmware programs, a combinational logic circuit, and/or other suitable components that provide the described functionality.
  • ASIC application-specific integrated circuit
  • individual modules/engines/generators of the application 200 may include separately configured web servers.
  • the application 200 may be provisioned with a cloud as with the transaction processing system 105 .
  • the transaction templating module 205 may be executed to define transaction specifications used by the transaction processing system 105 . That is, the transaction templating module 205 may establish digital instruments that are accepted by the transaction processing system 105 , and may be utilized by the payor and payee to conduct a secure financial transaction. Additionally, the identification generator 210 may be executed to generate a UPI for a payee.
  • the underlying transaction specified in the digital instrument may be processed according to payment instructions included in the digital instrument. For example, a payment to the payee may be authorized in the digital instrument. The presence of the UPI may ensure that only authorized payees receive payment.
  • the transaction templating module 205 may maintain and utilize transaction templates that comprise a set of established transaction specifications. These transaction templates define a plurality of types of financial transactions that the transaction processing system 105 may process. While transaction templates have been contemplated, the present technology may utilize other data stores, abstractions, or collections of transaction data that define the type of transaction information (e.g., transaction specifications) that are to be collected from the payor and/or payee before authorization of payment can be made to the payee.
  • transaction templates may utilize other data stores, abstractions, or collections of transaction data that define the type of transaction information (e.g., transaction specifications) that are to be collected from the payor and/or payee before authorization of payment can be made to the payee.
  • transaction specifications may comprise data types that are to be received from either the payor or the payee in order to facilitate a specific type of secure financial transaction, typically in the form of a digital instrument.
  • Non-limiting examples of financial transactions may include payment for goods and/or services, installment contracts, mortgages, promissory notes, and so forth.
  • Types of information that may be gathered include names, addresses, account numbers, payment, currency preferences, payment dates, and so forth. Therefore, for as many different types of financial transactions that may be conducted by different payors and payees, the transaction processing system 105 may employ combinations of transaction specifications.
  • the payor and payee may register with the transaction processing system 105 .
  • Profiles for each payor and payee may be created. These profiles may include information that may be utilized by the transaction processing system 105 to generate digital instrument for a specific payor and payee combination. That is, in some embodiments, the digital instrument is a representation of a unique payment relationship between a payee and one or more payors. Because the digital instrument is unique to the payee and payor(s) and can be combined with a UPI, the digital instrument cannot be surreptitiously presented to the transaction processing system 105 by another party.
  • the application 200 awaits receipt of a transaction request from either a payor or a payee.
  • the transaction processing system 105 functions as an intermediary between the payor and payee.
  • the payor and payee may also communicate directly with one another.
  • the identification generator 210 may be executed to generate a UPI each payee.
  • the UPI may be used for transactions conducted between a payor and a payee. This uniquely identifying information, when presented along with a digital instrument, may ensure that the digital instrument is used to authorize payment to the correct payee.
  • the digital instrument may be generated by the payor and/or payee, rather than the transaction processing system 105 .
  • the payee may provide to the transaction processing system 105 a digital instrument such as a contract that is to be used as the basis for consummating a transaction.
  • the transaction processing system 105 may provide the digital instrument to one or more payors on behalf of the payee.
  • a payor may utilize a program to digitally sign the digital instrument. This program may reside on the computing device associated with the payor (see FIG. 1 ).
  • the signed digital instrument may be provided back to the transaction processing system 105 , along with the UPI for the payee, for payment authorization. If the signed digital instrument comports with the requirements established for the payee, payment may be authorized to the payee.
  • the transaction processing system 105 may be the entity that establishes the requirements necessary for payment authorization.
  • the payor or the payee may establish the requirements necessary for payment authorization, while the transaction processing system 105 effectuates the requirements established by the payor and the payee.
  • the digital instrument may comprise payment instructions that include transaction specifications as described above. That is, the digital instrument may include specific contract provisions that define the types of information that are to be gathered from the payor and payee. In some instances the digital instrument is a contract (e.g., digital instrument) that is based upon a set of transaction specifications. This digital instrument may be provided to the payor and the payee, where each party completes and digitally signs the digital instrument before securely transmitting the same back to the transaction processing system 105 . Again, the present technology may employ one or more various types of cryptographic techniques for securing the digital instrument. In its simplest form, the digital instrument may specify a payment amount that is to be authorized to the payee.
  • a digital instrument may be utilized in conjunction with a single transaction, or may be utilized as the basis to perform many transactions.
  • the digital instrument may be used by a payor to purchase a single product from a payee.
  • the digital instrument may specify that the payee is authorized to request a set number of payments from the payor within a given period of time. For example, the payor may specify that the payee is allowed to request two payments from the payor each month.
  • the digital instrument may specify that the payee is authorized to request a particular payment amount from the payor within a given period of time. For example, the payor may authorize the payee to request up to five hundred dollars in payments each month.
  • the payor may specify that the payee is to be paid at a defined point in the future (e.g. pre-dating the payment).
  • a payor may maintain a list of approved payees, where transaction requests that include a digital instrument for a payee on the list are automatically approved by the transaction authorization module 220 .
  • payments may be apportioned between two or more payors, such as in a guarantor/guarantee relationship.
  • a second payor may be obligated to pay a specified amount if a first payor fails to make a required payment.
  • a payor may obligate themselves to pay for products/services purchased by another party, which has limited or no payment responsibility to the payee.
  • a parent may establish a list of approved merchants (payees) with which their child may conduct transactions.
  • the payor may place various types of limits on the transactions such as amount, frequency, and so forth.
  • the communications module 215 may allow the payor client device 110 A and the payee client device 110 B to interact with the application 200 to conduct financial transactions.
  • the communications module 215 may employ a web-based interface that is utilized by both payors and payees to conduct secure financial transactions.
  • the communications module 215 may authenticate the payor and payee devices before establishing a path of communications between the payor/payee and the application 200 . Again, the communications module 215 may utilize PGP, SSL, or any other suitable method for establishing secure data transfer between computing devices.
  • the communications module 215 may await receipt of a transaction request from a payor or payee.
  • the transaction request may include both the digital instrument that has been digitally signed by at least one payor, along with the UPI for the payee. Again, either the payor or payee may generate the digital instrument.
  • the transaction authorization module 220 may be executed to verify that the contents of the digital instrument complies with transaction specifications (e.g., a transaction template) established by the transaction processing system 105 . That is, transaction authorization module 220 may compare the digital instrument received by the communications module 215 to transaction templates managed by the transaction templating module 205 .
  • the digital instrument may specify that a third party (such as an insurer) is to be queried to determine if the payment is insured by the insurer.
  • a third party such as an insurer
  • the transaction authorization module 220 may query an insurer for the payor to determine if a payment that corresponds to the payment specified in the digital instrument is covered by the payor's insurance policy.
  • the transaction authorization module 220 may authorize the transaction. That is, the transaction authorization module 220 may authorize payment to be made to the payee from the one or more payors, according to further payment instructions included in the digital instrument. Again, authorization for payment may include providing an authorization signal to a financial institution (e.g., bank) that monetary funds should be provided to the payee.
  • a financial institution e.g., bank
  • FIG. 3 illustrates a flowchart of an exemplary method for facilitating at least a portion of a secure financial transaction.
  • the method may include a step 305 of generating a unique payee identifier that represents a payee. This UPI may be used as a verification mechanism to ensure that payments are being approved for the proper payee.
  • the method may include a step 310 of receiving a transaction request.
  • the transaction request may include an instrument that has been digitally signed by at least one payor and the UPI.
  • the method may include a step 315 of verifying a digital signature associated with the transaction request, along with a step 320 of verifying that the UPI is correct.
  • the method may then include a step 325 of authorizing a payment to the payee according to payment instructions included in the instrument. It is noteworthy that the method may include fewer or more steps that those recited above.
  • FIG. 4 illustrates an exemplary computing system 400 that may be used to implement the various embodiments of the present technology.
  • the computing system 400 of FIG. 4 includes one or more processors 410 and memory 420 .
  • Main memory 420 stores, in part, instructions and data for execution by processor 410 .
  • Main memory 420 can store the executable code when the system 400 is in operation.
  • the system 400 of FIG. 4 may further include a mass storage device 430 , portable storage medium drive(s) 440 , output devices 450 , user input devices 460 , a graphics display 440 , and other peripheral devices 480 .
  • FIG. 4 The components shown in FIG. 4 are depicted as being connected via a single bus 490 .
  • the components may be connected through one or more data transport means.
  • Processor unit 410 and main memory 420 may be connected via a local microprocessor bus, and the mass storage device 430 , peripheral device(s) 480 , portable storage device 440 , and display system 470 may be connected via one or more input/output (I/O) buses.
  • I/O input/output
  • Mass storage device 430 which may be implemented with a magnetic disk drive or an optical disk drive, is a non-volatile storage device for storing data and instructions for use by processor unit 410 .
  • Mass storage device 430 can store the system software for implementing embodiments of the present technology for purposes of loading that software into main memory 420 .
  • Portable storage device 440 operates in conjunction with a portable non-volatile storage medium, such as a floppy disk, compact disk or digital video disc, to input and output data and code to and from the computing system 400 of FIG. 4 .
  • the system software for implementing embodiments of the present technology may be stored on such a portable medium and input to the computing system 400 via the portable storage device 440 .
  • Input devices 460 provide a portion of a user interface.
  • Input devices 460 may include an alphanumeric keypad, such as a keyboard, for inputting alphanumeric and other information, or a pointing device, such as a mouse, a trackball, stylus, or cursor direction keys.
  • the system 400 as shown in FIG. 4 includes output devices 450 . Suitable output devices include speakers, printers, network interfaces, and monitors.
  • Display system 470 may include a liquid crystal display (LCD) or other suitable display device.
  • Display system 470 receives textual and graphical information, and processes the information for output to the display device.
  • LCD liquid crystal display
  • Peripherals 480 may include any type of computer support device to add additional functionality to the computing system.
  • Peripheral device(s) 480 may include a modem or a router.
  • the components contained in the computing system 400 of FIG. 4 are those typically found in computing systems that may be suitable for use with embodiments of the present technology and are intended to represent a broad category of such computer components that are well known in the art.
  • the computing system 400 of FIG. 4 can be a personal computer, hand held computing system, telephone, mobile computing system, workstation, server, minicomputer, mainframe computer, or any other computing system.
  • the computer can also include different bus configurations, networked platforms, multi-processor platforms, etc.
  • Various operating systems can be used including UNIX, Linux, Windows, Macintosh OS, Palm OS, and other suitable operating systems.
  • Some of the above-described functions may be composed of instructions that are stored on storage media (e.g., computer-readable medium).
  • the instructions may be retrieved and executed by the processor.
  • Some examples of storage media are memory devices, tapes, disks, and the like.
  • the instructions are operational when executed by the processor to direct the processor to operate in accord with the technology. Those skilled in the art are familiar with instructions, processor(s), and storage media.
  • Non-volatile media include, for example, optical or magnetic disks, such as a fixed disk.
  • Volatile media include dynamic memory, such as system RAM.
  • Transmission media include coaxial cables, copper wire and fiber optics, among others, including the wires that comprise one embodiment of a bus.
  • Transmission media can also take the form of acoustic or light waves, such as those generated during radio frequency (RF) and infrared (IR) data communications.
  • RF radio frequency
  • IR infrared
  • Common forms of computer-readable media include, for example, a floppy disk, a flexible disk, a hard disk, magnetic tape, any other magnetic medium, a CD-ROM disk, digital video disk (DVD), any other optical medium, any other physical medium with patterns of marks or holes, a RAM, a PROM, an EPROM, an EEPROM, a FLASHEPROM, any other memory chip or data exchange adapter, a carrier wave, or any other medium from which a computer can read.

Landscapes

  • Business, Economics & Management (AREA)
  • Accounting & Taxation (AREA)
  • Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Physics & Mathematics (AREA)
  • General Business, Economics & Management (AREA)
  • Strategic Management (AREA)
  • Theoretical Computer Science (AREA)
  • Finance (AREA)
  • Computer Security & Cryptography (AREA)
  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
  • Development Economics (AREA)
  • Economics (AREA)

Abstract

Systems and methods for facilitating at least a portion of a secure electronic financial transaction are provided herein. Methods may include generating a unique payee identifier that represents a unique payment relationship between a payee and one or more payors, receiving a transaction request, the transaction request comprising the unique payee identifier and a payment, and authorizing a payment to the payee that corresponds to the payment.

Description

    FIELD OF THE TECHNOLOGY
  • Embodiments of the disclosure relate to the facilitation of secure financial transactions. More specifically, but not by way of limitation, the present technology may be utilized to facilitate secure financial transactions between one or more payors and one or more payees.
  • BACKGROUND OF THE DISCLOSURE
  • Current methods for processing financial transactions utilizing financial instruments such as checks and credit cards are woefully ineffective in preventing fraud. As such, fraudulent transactions may be conducted by a fraudster by obtaining relevant account information and using the same in a manner which is unauthorized by the legitimate account holder.
  • In some instances, enterprises may employ different types of heuristics to attempt to determine if a transaction is fraudulent. For example, it may be determined that because a credit card was utilized in separate locations that are located across the country from one another and within a specified time frame, that at least one of the transactions may be fraudulent. In other instances, enterprises may not employ any fraud detection measures. Customers may be subject to time intensive and laborious efforts in order to recover their money lost during a fraudulent transaction.
  • SUMMARY OF THE DISCLOSURE
  • According to some embodiments, the present technology may be directed to methods for facilitating at least a portion of a secure electronic financial transaction. Methods may include: (a) generating a unique payee identifier that represents a payee; (b) receiving a transaction request, the transaction request comprising an instrument that has been digitally signed by at least one payor and the unique payee identifier; and (c) authorizing a payment to the payee according to payment instructions included in the instrument.
  • According to additional embodiments, the present technology may be directed to systems facilitating at least a portion of a secure electronic financial transaction. The systems may comprise: (a) a memory for storing executable instructions; (b) a processor for executing the instructions stored in memory; (c) an identification generator stored in memory and executable by the processor to generate a unique payee identifier that represents a payee; (d) a communications module stored in memory and executable by the processor to receive a transaction request, the transaction request comprising an instrument that has been digitally signed by at least one payor and the unique payee identifier; and (e) a transaction authorization module stored in memory and executable by the processor to authorize a payment to the payee according to payment instructions included in the instrument.
  • BRIEF DESCRIPTION OF THE DRAWINGS
  • The accompanying drawings, where like reference numerals refer to identical or functionally similar elements throughout the separate views, together with the detailed description below, are incorporated in and form part of the specification, and serve to further illustrate embodiments of concepts that include the claimed disclosure, and explain various principles and advantages of those embodiments.
  • The methods and systems disclosed herein have been represented where appropriate by conventional symbols in the drawings, showing only those specific details that are pertinent to understanding the embodiments of the present disclosure so as not to obscure the disclosure with details that will be readily apparent to those of ordinary skill in the art having the benefit of the description herein.
  • FIG. 1 illustrates an exemplary system for practicing aspects of the present technology;
  • FIG. 2 illustrates an exemplary conversion application for facilitating at least a portion of a secure electronic financial transaction;
  • FIG. 3 is a flowchart of an exemplary method for facilitating at least a portion of a secure electronic financial transaction; and
  • FIG. 4 illustrates an exemplary computing system that may be used to implement embodiments according to the present technology.
  • DETAILED DESCRIPTION
  • In the following description, for purposes of explanation, numerous specific details are set forth in order to provide a thorough understanding of the disclosure. It will be apparent, however, to one skilled in the art, that the disclosure may be practiced without these specific details. In other instances, structures and devices are shown at block diagram form only in order to avoid obscuring the disclosure.
  • Generally described, the present technology may be directed to systems and methods for facilitating at least a portion of a secure financial transaction. More specifically, but not by way of limitation, the present technology may facilitate at least a portion of a secured financial transaction such as transaction request authentication, payment authorization, and/or payment transmission.
  • Broadly speaking, the present technology may be implemented within the context of a third party transaction processor that is configured to securely process financial transactions on behalf of both payor(s) and payee(s). It is noteworthy that in some instances, the present technology may also comprise the financial institution (e.g., bank) that transmits monetary assets to the payee in response to the authorization of payment to the payee.
  • The present technology may generate a unique payee identifier, hereinafter “UPI,” that is utilized to verify the identity of a payee before authorization of a payment to a payee.
  • The present technology may also generate digital instruments that represent a unique payment relationship between a payee and one or more payors. In some instances, a payor such as a customer may desire to execute a secure financial transaction with a payee such as a merchant. The digital instrument may include payment instructions that define how payments to the payee are authorized. For example, the digital instrument may specify the type of information (such as name, address, account number, etc.) that must be gathered from the payor before payment can be authorized.
  • The payment instructions may allow for multiple transactions between the parties, as long as the transactions comport with the payment instructions. For example, the payment instructions may specify that a payment amount may be requested and provided to the payee within a specified period of time. Advantageously, payment instructions may allow for installment payments, pre-dated payments, or other temporally based payments between payors and payees. Other variations on payment instructions will be discussed in greater detail infra.
  • In addition to the use of an UPI, the present technology may also employ security measures such as cryptography that allow payors to digitally sign the digital instruments. The payor and/or payee may utilize a program and/or digital security protocol that can be used to verify the identity of the payor and/or payee and digitally sign a digital instrument. For example, the present technology may utilize pretty good privacy (PGP) encryption or other encryption mechanisms such as a secure socket layer (SSL), tokenization, along with any other suitable encryption/decryption systems and processes that would be known to one of ordinary skill in the art with the present disclosure before them.
  • In general, a digital instrument may comprise a set of payment instructions that govern the manner with which financial transactions between a payor and a payee are conducted by the payment processor. That is, payment instructions may include a specific set of rules that are defined by the payor and/or the payee. In some instances, the payment processor may specify the type of payment information that should be obtained from the payor and/or payee. Also, the payment processor may establish one or more required types of cryptographic or tokenization processes that may be employed by the payor and/or payee.
  • In some embodiments, the payment information may incorporate the use of standard commercial agreements and/or negotiable financial instruments. Examples of these agreements include a check, a wire, a cashier's check, card-present credit card terms, card-not-present credit card terms, automated clearing house terms, an escrow agreement, a contract, a bill, a letter of intent, a purchase order, a promissory note, and a mortgage—just to name a few. In other embodiments, the payment information may include only sections of one or more of the aforementioned agreements.
  • The present technology may receive a transaction request from either the payor or the payee. At a minimum, the transaction request may comprise a digital instrument that has been digitally signed, along with a unique payee identifier. Again, the digital instrument may include payment instructions.
  • Once the present technology has processed the transaction request, the present technology may authorize a payment to the payee that corresponds to the payment instructions. It is noteworthy that authorization of the payment may not include an actual transfer of funds to the payee. For example, authorization may include communication of an authorization signal from the payment processor to a financial institution such as a bank. Alternatively, if the payment processor and the financial institution are the same entity, authorization of payment may result in the immediate transfer of funds to the payee.
  • In some instances the present technology may allow for a payment to be split or apportioned amongst multiple payors. In other embodiments the present technology may allow for payors to act as guarantors for other parties, such as another payor or a third party.
  • Additionally, while the present technology may be utilized within the context of secured electronic payments for actual monetary consideration, the present technology may also be applied to virtual currency systems such as those utilized in video gaming environments or other types of virtual social constructs (e.g., social networking).
  • These and other advantages of the present technology will be described in greater detail with reference to the collective FIGS. 1-4.
  • FIG. 1 illustrates an exemplary system 100 for practicing aspects of the present technology. The system 100 may include a transaction processing system 105 that may be implemented in a cloud-based computing environment. A cloud-based computing environment is a resource that typically combines the computational power of a large grouping of processors and/or that combines the storage capacity of a large grouping of computer memories or storage devices. For example, systems that provide a cloud resource may be utilized exclusively by their owners; or such systems may be accessible to outside users who deploy applications within the computing infrastructure to obtain the benefit of large computational or storage resources.
  • The cloud may be formed, for example, by a network of web servers, with each web server (or at least a plurality thereof) providing processor and/or storage resources. These servers may manage workloads provided by multiple users (e.g., cloud resource customers or other users). Typically, each user places workload demands upon the cloud that vary in real-time, sometimes dramatically. The nature and extent of these variations typically depend on the type of business associated with the user.
  • In other embodiments, the transaction processing system 105 may include a distributed group of computing devices such as web servers that do not share computing resources or workload. Additionally, the transaction processing system 105 may include a single computing system that has been provisioned with a plurality of programs that each produces instances of event data.
  • Payors and payees may communicate transaction data (e.g., digital instruments) between one another and/or the transaction processing system 105 via individual client devices such as payor client device 110A and payee client device 110B. The transaction processing system 105 may communicatively couple with the payor client device 110A and payee client device 110B via a network connection 115. The network connection 115 may include any one of a number of private and public communications mediums such as the Internet. As mentioned briefly above, the payor client device 110A and the payee client device 110B may utilize PGP, SSL, or another suitable cryptographic protocol for transmitting transaction information between each other and/or the transaction processing system 105.
  • In some embodiments, payor client device 110A and payee client device 110B may communicate with the transaction processing system 105 using a secure application programming interface or API. An API allows various types of programs to communicate with one another in a language (e.g., code) dependent or language agnostic manner.
  • The transaction processing system 105 may also communicate with a third party 120 such as a financial institution that may provide monetary funds to a payee, often using the payee's account associated with the payee's financial institution of choice. The transaction processing system 105 and the financial institution 120 may also communicate via the network connection 115, which may comprise any one of a number of secure/insecure communications protocols.
  • The transaction processing system 105 may be generally described as a system for facilitating at least a portion of a secure financial transaction. It is noteworthy that the system may facilitate at least a portion of a secure financial transaction as the system may in some instances authorize a payment, whereas in other instances the system may also transmit payment to the payee as well.
  • The transaction processing system 105 may facilitate at least a portion of a secure financial transaction by generating a UPI for each payee. Also, the transaction processing system 105 may receive a transaction request, where the transaction request may comprise at least the UPI and a digital instrument that has been digitally signed by at least one payor. Advantageously, the digital instrument may include payment instructions such as the payment amount. It is noteworthy that the transaction request may be received from either the payor or the payee, as will be described in greater detail below.
  • Referring now to FIG. 2, the transaction processing system 105 may generally comprise memory that includes executable instructions and a processor that executes the instructions stored in memory. Further details regarding exemplary memory and processor for the transaction processing system 105 are described relative to computing system 400 as described in FIG. 4.
  • According to some embodiments, the executable instructions may be embodied as an application 200. The application 200 may generally comprise a transaction templating module 205, an identification generator 210, a communications module 215, and a transaction authorization module 220. It is noteworthy that the application 200 may include additional modules, engines, or components, and still fall within the scope of the present technology. As used herein, the term “module” may also refer to any of an application-specific integrated circuit (“ASIC”), an electronic circuit, a processor (shared, dedicated, or group) that executes one or more software or firmware programs, a combinational logic circuit, and/or other suitable components that provide the described functionality. In other embodiments, individual modules/engines/generators of the application 200 may include separately configured web servers. Also, the application 200 may be provisioned with a cloud as with the transaction processing system 105.
  • Prior to facilitating secure financial transactions between payors and payees, the transaction templating module 205 may be executed to define transaction specifications used by the transaction processing system 105. That is, the transaction templating module 205 may establish digital instruments that are accepted by the transaction processing system 105, and may be utilized by the payor and payee to conduct a secure financial transaction. Additionally, the identification generator 210 may be executed to generate a UPI for a payee.
  • Generally speaking, when a digital instrument that has been digitally signed by at least one payor has been received, along with a UPI, the underlying transaction specified in the digital instrument may be processed according to payment instructions included in the digital instrument. For example, a payment to the payee may be authorized in the digital instrument. The presence of the UPI may ensure that only authorized payees receive payment.
  • According to some embodiments, the transaction templating module 205 may maintain and utilize transaction templates that comprise a set of established transaction specifications. These transaction templates define a plurality of types of financial transactions that the transaction processing system 105 may process. While transaction templates have been contemplated, the present technology may utilize other data stores, abstractions, or collections of transaction data that define the type of transaction information (e.g., transaction specifications) that are to be collected from the payor and/or payee before authorization of payment can be made to the payee.
  • Stated otherwise, transaction specifications may comprise data types that are to be received from either the payor or the payee in order to facilitate a specific type of secure financial transaction, typically in the form of a digital instrument. Non-limiting examples of financial transactions may include payment for goods and/or services, installment contracts, mortgages, promissory notes, and so forth. Types of information that may be gathered include names, addresses, account numbers, payment, currency preferences, payment dates, and so forth. Therefore, for as many different types of financial transactions that may be conducted by different payors and payees, the transaction processing system 105 may employ combinations of transaction specifications.
  • In some instances, the payor and payee may register with the transaction processing system 105. Profiles for each payor and payee may be created. These profiles may include information that may be utilized by the transaction processing system 105 to generate digital instrument for a specific payor and payee combination. That is, in some embodiments, the digital instrument is a representation of a unique payment relationship between a payee and one or more payors. Because the digital instrument is unique to the payee and payor(s) and can be combined with a UPI, the digital instrument cannot be surreptitiously presented to the transaction processing system 105 by another party.
  • Once transaction templates have been generated by the transaction templating module 205, the application 200 awaits receipt of a transaction request from either a payor or a payee. In some instances, the transaction processing system 105 functions as an intermediary between the payor and payee. In other instances, the payor and payee may also communicate directly with one another.
  • In some embodiments, the identification generator 210 may be executed to generate a UPI each payee. The UPI may be used for transactions conducted between a payor and a payee. This uniquely identifying information, when presented along with a digital instrument, may ensure that the digital instrument is used to authorize payment to the correct payee.
  • In some instances the digital instrument may be generated by the payor and/or payee, rather than the transaction processing system 105. For example, the payee may provide to the transaction processing system 105 a digital instrument such as a contract that is to be used as the basis for consummating a transaction. The transaction processing system 105 may provide the digital instrument to one or more payors on behalf of the payee. A payor may utilize a program to digitally sign the digital instrument. This program may reside on the computing device associated with the payor (see FIG. 1). The signed digital instrument may be provided back to the transaction processing system 105, along with the UPI for the payee, for payment authorization. If the signed digital instrument comports with the requirements established for the payee, payment may be authorized to the payee.
  • From the above examples, it may be understood that the transaction processing system 105 may be the entity that establishes the requirements necessary for payment authorization. Alternatively, the payor or the payee may establish the requirements necessary for payment authorization, while the transaction processing system 105 effectuates the requirements established by the payor and the payee.
  • The digital instrument may comprise payment instructions that include transaction specifications as described above. That is, the digital instrument may include specific contract provisions that define the types of information that are to be gathered from the payor and payee. In some instances the digital instrument is a contract (e.g., digital instrument) that is based upon a set of transaction specifications. This digital instrument may be provided to the payor and the payee, where each party completes and digitally signs the digital instrument before securely transmitting the same back to the transaction processing system 105. Again, the present technology may employ one or more various types of cryptographic techniques for securing the digital instrument. In its simplest form, the digital instrument may specify a payment amount that is to be authorized to the payee.
  • A digital instrument may be utilized in conjunction with a single transaction, or may be utilized as the basis to perform many transactions. For example, the digital instrument may be used by a payor to purchase a single product from a payee. In other examples, the digital instrument may specify that the payee is authorized to request a set number of payments from the payor within a given period of time. For example, the payor may specify that the payee is allowed to request two payments from the payor each month. In other instances, the digital instrument may specify that the payee is authorized to request a particular payment amount from the payor within a given period of time. For example, the payor may authorize the payee to request up to five hundred dollars in payments each month. Alternatively, the payor may specify that the payee is to be paid at a defined point in the future (e.g. pre-dating the payment). In other embodiments, a payor may maintain a list of approved payees, where transaction requests that include a digital instrument for a payee on the list are automatically approved by the transaction authorization module 220.
  • According to other embodiments, payments may be apportioned between two or more payors, such as in a guarantor/guarantee relationship. A second payor may be obligated to pay a specified amount if a first payor fails to make a required payment. Likewise, a payor may obligate themselves to pay for products/services purchased by another party, which has limited or no payment responsibility to the payee.
  • For example, a parent (payor) may establish a list of approved merchants (payees) with which their child may conduct transactions. The payor may place various types of limits on the transactions such as amount, frequency, and so forth.
  • Generally speaking, the communications module 215 may allow the payor client device 110A and the payee client device 110B to interact with the application 200 to conduct financial transactions. In some instances, the communications module 215 may employ a web-based interface that is utilized by both payors and payees to conduct secure financial transactions.
  • The communications module 215 may authenticate the payor and payee devices before establishing a path of communications between the payor/payee and the application 200. Again, the communications module 215 may utilize PGP, SSL, or any other suitable method for establishing secure data transfer between computing devices.
  • The communications module 215 may await receipt of a transaction request from a payor or payee. The transaction request may include both the digital instrument that has been digitally signed by at least one payor, along with the UPI for the payee. Again, either the payor or payee may generate the digital instrument. If the digital instrument has been generated by the payor or payee, the transaction authorization module 220 may be executed to verify that the contents of the digital instrument complies with transaction specifications (e.g., a transaction template) established by the transaction processing system 105. That is, transaction authorization module 220 may compare the digital instrument received by the communications module 215 to transaction templates managed by the transaction templating module 205.
  • In some instances, the digital instrument may specify that a third party (such as an insurer) is to be queried to determine if the payment is insured by the insurer. For example, the transaction authorization module 220 may query an insurer for the payor to determine if a payment that corresponds to the payment specified in the digital instrument is covered by the payor's insurance policy.
  • If the transaction request is approved under the payment instructions included in the digital instrument, the transaction authorization module 220 may authorize the transaction. That is, the transaction authorization module 220 may authorize payment to be made to the payee from the one or more payors, according to further payment instructions included in the digital instrument. Again, authorization for payment may include providing an authorization signal to a financial institution (e.g., bank) that monetary funds should be provided to the payee.
  • FIG. 3 illustrates a flowchart of an exemplary method for facilitating at least a portion of a secure financial transaction. The method may include a step 305 of generating a unique payee identifier that represents a payee. This UPI may be used as a verification mechanism to ensure that payments are being approved for the proper payee.
  • Next, the method may include a step 310 of receiving a transaction request. It is noteworthy that the transaction request may include an instrument that has been digitally signed by at least one payor and the UPI.
  • The method may include a step 315 of verifying a digital signature associated with the transaction request, along with a step 320 of verifying that the UPI is correct.
  • Next, the method may then include a step 325 of authorizing a payment to the payee according to payment instructions included in the instrument. It is noteworthy that the method may include fewer or more steps that those recited above.
  • FIG. 4 illustrates an exemplary computing system 400 that may be used to implement the various embodiments of the present technology. The computing system 400 of FIG. 4 includes one or more processors 410 and memory 420. Main memory 420 stores, in part, instructions and data for execution by processor 410. Main memory 420 can store the executable code when the system 400 is in operation. The system 400 of FIG. 4 may further include a mass storage device 430, portable storage medium drive(s) 440, output devices 450, user input devices 460, a graphics display 440, and other peripheral devices 480.
  • The components shown in FIG. 4 are depicted as being connected via a single bus 490. The components may be connected through one or more data transport means. Processor unit 410 and main memory 420 may be connected via a local microprocessor bus, and the mass storage device 430, peripheral device(s) 480, portable storage device 440, and display system 470 may be connected via one or more input/output (I/O) buses.
  • Mass storage device 430, which may be implemented with a magnetic disk drive or an optical disk drive, is a non-volatile storage device for storing data and instructions for use by processor unit 410. Mass storage device 430 can store the system software for implementing embodiments of the present technology for purposes of loading that software into main memory 420.
  • Portable storage device 440 operates in conjunction with a portable non-volatile storage medium, such as a floppy disk, compact disk or digital video disc, to input and output data and code to and from the computing system 400 of FIG. 4. The system software for implementing embodiments of the present technology may be stored on such a portable medium and input to the computing system 400 via the portable storage device 440.
  • Input devices 460 provide a portion of a user interface. Input devices 460 may include an alphanumeric keypad, such as a keyboard, for inputting alphanumeric and other information, or a pointing device, such as a mouse, a trackball, stylus, or cursor direction keys. Additionally, the system 400 as shown in FIG. 4 includes output devices 450. Suitable output devices include speakers, printers, network interfaces, and monitors.
  • Display system 470 may include a liquid crystal display (LCD) or other suitable display device. Display system 470 receives textual and graphical information, and processes the information for output to the display device.
  • Peripherals 480 may include any type of computer support device to add additional functionality to the computing system. Peripheral device(s) 480 may include a modem or a router.
  • The components contained in the computing system 400 of FIG. 4 are those typically found in computing systems that may be suitable for use with embodiments of the present technology and are intended to represent a broad category of such computer components that are well known in the art. Thus, the computing system 400 of FIG. 4 can be a personal computer, hand held computing system, telephone, mobile computing system, workstation, server, minicomputer, mainframe computer, or any other computing system. The computer can also include different bus configurations, networked platforms, multi-processor platforms, etc. Various operating systems can be used including UNIX, Linux, Windows, Macintosh OS, Palm OS, and other suitable operating systems.
  • Some of the above-described functions may be composed of instructions that are stored on storage media (e.g., computer-readable medium). The instructions may be retrieved and executed by the processor. Some examples of storage media are memory devices, tapes, disks, and the like. The instructions are operational when executed by the processor to direct the processor to operate in accord with the technology. Those skilled in the art are familiar with instructions, processor(s), and storage media.
  • It is noteworthy that any hardware platform suitable for performing the processing described herein is suitable for use with the technology. The terms “computer-readable storage medium” and “computer-readable storage media” as used herein refer to any medium or media that participate in providing instructions to a CPU for execution. Such media can take many forms, including, but not limited to, non-volatile media, volatile media and transmission media. Non-volatile media include, for example, optical or magnetic disks, such as a fixed disk. Volatile media include dynamic memory, such as system RAM. Transmission media include coaxial cables, copper wire and fiber optics, among others, including the wires that comprise one embodiment of a bus. Transmission media can also take the form of acoustic or light waves, such as those generated during radio frequency (RF) and infrared (IR) data communications. Common forms of computer-readable media include, for example, a floppy disk, a flexible disk, a hard disk, magnetic tape, any other magnetic medium, a CD-ROM disk, digital video disk (DVD), any other optical medium, any other physical medium with patterns of marks or holes, a RAM, a PROM, an EPROM, an EEPROM, a FLASHEPROM, any other memory chip or data exchange adapter, a carrier wave, or any other medium from which a computer can read.
  • The above description is illustrative and not restrictive. Many variations of the technology will become apparent to those of skill in the art upon review of this disclosure. The scope of the technology should, therefore, be determined not with reference to the above description, but instead should be determined with reference to the appended claims along with their full scope of equivalents.
  • In the foregoing specification, the invention is described with reference to specific embodiments thereof, but those skilled in the art will recognize that the invention is not limited thereto. Various features and aspects of the above-described invention can be used individually or jointly. Further, the invention can be utilized in any number of environments and applications beyond those described herein without departing from the broader spirit and scope of the specification. The specification and drawings are, accordingly, to be regarded as illustrative rather than restrictive. It will be recognized that the terms “comprising,” “including,” and “having,” as used herein, are specifically intended to be read as open-ended terms of art.

Claims (21)

1. A method for facilitating at least a portion of a secure electronic financial transaction, the method comprising:
executing instructions via a processor of a transaction processing system for:
generating a unique payee identifier that represents a payee;
receiving a transaction request, the transaction request comprising an instrument that has been digitally singed by at least one payor and the unique payee identifier; and
authorizing a payment to the payee according to payment instructions included in the instrument.
2. The method according to claim 1, further comprising verifying a digital signature associated with the transaction request.
3. The method according to claim 1, wherein the digital signature comprises at least one of pretty good privacy (PGP) and secure socket layer (SSL) authentication.
4. The method according to claim 1, wherein the payment instructions specify that a payee may receive a set number of authorized payments from a payor within a given period of time.
5. The method according to claim 1, wherein the payment instructions specify that a payee may receive an aggregate payment amount from one or more payors within a given period of time.
6. The method according to claim 1, wherein the payment instructions comprise any of contract clauses, an invoice, a letter of intent, a bill of lading, a promissory note, a mortgage, and an automated clearing house request.
7. The method according to claim 1, wherein the payment instructions define an apportionment of the payment between two or more payors.
8. The method according to claim 1, further comprising querying a third party to determine if the payment of a payor is allowable.
9. The method according to claim 1, further comprising providing the authorized payment to the payee.
10. The method according to claim 1, further comprising comparing the transaction request to a transaction template that comprises a set of established transaction specifications, wherein transaction requests that correspond to the transaction template are available for authorization.
11. A system for facilitating at least a portion of a secure electronic financial transaction, the method comprising:
a memory for storing executable instructions;
a processor for executing the instructions, wherein the instructions comprise:
an identification generator stored in memory and executable by the processor to generate a unique payee identifier that represents a payee;
a communications module stored in memory and executable by the processor to receive a transaction request, the transaction request comprising an instrument that has been digitally singed by at least one payor and the unique payee identifier; and
a transaction authorization module stored in memory and executable by the processor to authorize a payment to the payee according to payment instructions included in the instrument.
12. The system according to claim 12, wherein the transaction authorization module verifies a digital signature associated with the transaction request.
13. The system according to claim 12, wherein the digital signature comprises at least one of pretty good privacy (PGP) and secure socket layer (SSL) authentication.
14. The system according to claim 11, wherein the transaction authorization module compares the transaction request to a transaction template that comprises a set of established transaction specifications, wherein the transaction template is established by a translation templating module that is stored in memory and executable by the processor.
15. The system according to claim 11, wherein the transaction request comprises payment instructions.
16. The system according to claim 11, wherein the payment instructions specify that a payee may receive a set number of authorized payments from at least one payor within a given period of time.
17. The system according to claim 11, wherein the payment instructions specify that a payee may receive an aggregate payment amount from a payor within a given period of time.
18. The system according to claim 11, wherein the payment instructions comprise any of contract clauses, an invoice, a letter of intent, a bill of lading, a promissory note, a mortgage, and an automated clearing house request.
19. The system according to claim 11, wherein the payment instructions define an apportionment of the payment between two or more payors.
20. The system according to claim 19, wherein the communications module further queries a third party to determine if the payment is allowable.
21. The system according to claim 11, wherein the communications module provides the payment authorization to a bank that provides the authorized payment to the payee.
US13/401,748 2012-02-21 2012-02-21 Systems and Methods for Facilitating Secured Financial Transactions Abandoned US20130218768A1 (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
US13/401,748 US20130218768A1 (en) 2012-02-21 2012-02-21 Systems and Methods for Facilitating Secured Financial Transactions
US16/452,011 US11222314B2 (en) 2012-02-21 2019-06-25 Systems and methods for securing electronic transactions

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
US13/401,748 US20130218768A1 (en) 2012-02-21 2012-02-21 Systems and Methods for Facilitating Secured Financial Transactions

Related Child Applications (1)

Application Number Title Priority Date Filing Date
US16/452,011 Continuation US11222314B2 (en) 2012-02-21 2019-06-25 Systems and methods for securing electronic transactions

Publications (1)

Publication Number Publication Date
US20130218768A1 true US20130218768A1 (en) 2013-08-22

Family

ID=48983054

Family Applications (2)

Application Number Title Priority Date Filing Date
US13/401,748 Abandoned US20130218768A1 (en) 2012-02-21 2012-02-21 Systems and Methods for Facilitating Secured Financial Transactions
US16/452,011 Active US11222314B2 (en) 2012-02-21 2019-06-25 Systems and methods for securing electronic transactions

Family Applications After (1)

Application Number Title Priority Date Filing Date
US16/452,011 Active US11222314B2 (en) 2012-02-21 2019-06-25 Systems and methods for securing electronic transactions

Country Status (1)

Country Link
US (2) US20130218768A1 (en)

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20140146965A1 (en) * 2012-11-28 2014-05-29 Sap Ag Method to verify that a user has made an external copy of a cryptographic key
US8990956B2 (en) 2012-08-06 2015-03-24 Hurricane Electric Systems and methods of exchanging information for a reward
US20150348033A1 (en) * 2012-12-21 2015-12-03 Leon Johannes Brits Secure Payments Using Portable Communication Devices and Two Dimensional Codes
US9965760B2 (en) 2012-06-29 2018-05-08 Hurricane Electric Systems and methods for facilitating electronic transactions utilizing a mobile computing device
US10320951B2 (en) 2011-10-31 2019-06-11 Hurricane Electric Systems and methods for establishing a virtual local area network
US10419927B2 (en) 2014-06-18 2019-09-17 Samsung Electronics Co., Ltd. Key sharing method and device
US11222314B2 (en) 2012-02-21 2022-01-11 Hurricane Electric Systems and methods for securing electronic transactions

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US11334881B2 (en) * 2019-01-28 2022-05-17 Bank Of America Corporation Security tool

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6532450B1 (en) * 1998-12-09 2003-03-11 American Management Systems, Inc. Financial management system including an offset payment process
US20050055319A1 (en) * 2003-09-05 2005-03-10 Pitney Bowes Incorporated Payment release system
US20080162350A1 (en) * 2000-02-29 2008-07-03 First Data Corporation Electronic purchasing and funds transfer systems and methods
US20100312702A1 (en) * 2009-06-06 2010-12-09 Bullock Roddy M System and method for making money by facilitating easy online payment

Family Cites Families (55)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5250943A (en) 1991-03-29 1993-10-05 International Business Machines Corporation GVT-NET--A Global Virtual Time Calculation Apparatus for Multi-Stage Networks
US5774869A (en) 1995-06-06 1998-06-30 Interactive Media Works, Llc Method for providing sponsor paid internet access and simultaneous sponsor promotion
US5862223A (en) 1996-07-24 1999-01-19 Walker Asset Management Limited Partnership Method and apparatus for a cryptographically-assisted commercial network system designed to facilitate and support expert-based commerce
US6993495B2 (en) 1998-03-02 2006-01-31 Insightexpress, L.L.C. Dynamically assigning a survey to a respondent
JP3602972B2 (en) 1998-07-28 2004-12-15 富士通株式会社 Communication performance measuring device and its measuring method
US6505240B1 (en) 1998-08-31 2003-01-07 Trevor I. Blumenau Ameliorating bandwidth requirements for the simultaneous provision of multiple sets of content over a network
US6708219B1 (en) 1999-10-26 2004-03-16 3Com Corporation Method and system for dual-network address utilization
AU2001222939A1 (en) 2000-03-06 2001-09-17 Theodore V Benderev On-line survey method
US6845091B2 (en) 2000-03-16 2005-01-18 Sri International Mobile ad hoc extensions for the internet
US7644171B2 (en) 2001-09-12 2010-01-05 Netmotion Wireless, Inc. Mobile networking system and method using IPv4 and IPv6
US7636793B1 (en) 2001-11-02 2009-12-22 At&T Intellectual Property I, Lp Multimedia distribution in a heterogeneous network
US20030233455A1 (en) 2002-06-14 2003-12-18 Mike Leber Distributed file sharing system
US8131649B2 (en) 2003-02-07 2012-03-06 Igware, Inc. Static-or-dynamic and limited-or-unlimited content rights
US7261239B2 (en) 2003-12-17 2007-08-28 Bindu Rama Rao Questionnaire network for mobile handsets and a trading system for contracts on user commitments to answer questionnaires
US7953114B2 (en) 2004-08-06 2011-05-31 Ipeak Networks Incorporated System and method for achieving accelerated throughput
US7512547B2 (en) 2004-09-16 2009-03-31 Target Brands, Inc. Financial transaction approval system and method
US7599289B2 (en) 2005-05-13 2009-10-06 Lockheed Martin Corporation Electronic communication control
WO2007027958A1 (en) 2005-08-29 2007-03-08 Junaid Islam ARCHITECTURE FOR MOBILE IPv6 APPLICATIONS OVER IPv4
WO2007040292A1 (en) 2005-10-06 2007-04-12 Egc & C Co., Ltd. Method and system for voting optimal route in multicasting
US8149846B2 (en) 2005-11-10 2012-04-03 Hewlett-Packard Development Company, L.P. Data processing system and method
KR100814400B1 (en) 2006-01-12 2008-03-18 삼성전자주식회사 apparatus and method of security communication in IPv4/IPv6 coordination network system
US20070199043A1 (en) 2006-02-06 2007-08-23 Morris Richard M Multi-channel high-bandwidth media network
US20080091528A1 (en) 2006-07-28 2008-04-17 Alastair Rampell Methods and systems for an alternative payment platform
WO2008147572A1 (en) 2007-05-31 2008-12-04 Facebook, Inc. Systems and methods for auction based polling
US7894438B2 (en) 2007-06-07 2011-02-22 Ambriel Technologies Device and method for communicating with a legacy device, network or application
US8379623B2 (en) 2007-07-10 2013-02-19 Motorola Solutions, Inc. Combining mobile VPN and internet protocol
US7895463B2 (en) 2007-08-28 2011-02-22 Cisco Technology, Inc. Redundant application network appliances using a low latency lossless interconnect link
US8375269B2 (en) 2008-01-31 2013-02-12 International Business Machines Corporation Data transmission system and method of correcting an error in parallel data paths of a data transmission system
US8239889B2 (en) 2008-03-10 2012-08-07 Hulu, LLC Method and apparatus for collecting viewer survey data and for providing compensation for same
US7720976B2 (en) 2008-03-31 2010-05-18 Alcatel-Lucent Usa Inc. Peer-to-peer communication between different types of internet hosts
US8739289B2 (en) 2008-04-04 2014-05-27 Microsoft Corporation Hardware interface for enabling direct access and security assessment sharing
US8417766B2 (en) 2008-06-25 2013-04-09 Viasat, Inc. Methods and systems for peer-to-peer app-level performance enhancing protocol (PEP)
US8255323B1 (en) 2009-01-09 2012-08-28 Apple Inc. Motion based payment confirmation
US8164442B2 (en) 2009-01-22 2012-04-24 T-Mobile Usa, Inc. Interactive map for displaying remote user location and supplemental information
US8234377B2 (en) 2009-07-22 2012-07-31 Amazon Technologies, Inc. Dynamically migrating computer networks
US9392080B2 (en) 2009-12-18 2016-07-12 Microsoft Technology Licensing, Llc IPv4/IPv6 bridge
WO2011143094A2 (en) 2010-05-09 2011-11-17 Citrix Systems, Inc. Systems and methods for allocation of classes of service to network connections corresponding to virtual channels
WO2011151734A2 (en) 2010-06-03 2011-12-08 Morrigan Partners Limited Secure communication systems, methods, and devices
WO2011153475A1 (en) 2010-06-04 2011-12-08 Skype Ireland Technologies Holdings Limited Server-assisted video conversation
US20120089471A1 (en) 2010-10-06 2012-04-12 Rt7 Incorporated System and method of capturing point-of-sale data and providing real-time advertising content
US20120215690A1 (en) 2011-01-25 2012-08-23 Ewise Systems Pty Ltd Method and apparatus for facilitating payment via mobile networks
US20120203701A1 (en) 2011-02-07 2012-08-09 Ayuso De Paul Joaquin Systems and methods for establishing a communication session between communication devices
US20120203695A1 (en) 2011-02-09 2012-08-09 American Express Travel Related Services Company, Inc. Systems and methods for facilitating secure transactions
CN106803175B (en) 2011-02-16 2021-07-30 维萨国际服务协会 Snap mobile payment device, method and system
US9270747B2 (en) 2011-04-08 2016-02-23 Kaseya Limited Method and apparatus of performing peer-to-peer communication establishment and connection change-over
US20120290415A1 (en) 2011-05-11 2012-11-15 Riavera Corp. Mobile image payment system
US9785935B2 (en) 2011-05-11 2017-10-10 Riavera Corp. Split mobile payment system
US20130024255A1 (en) 2011-07-18 2013-01-24 Appinion Llc Systems and methods for enabling a client to acquire a commodity via a survey
US8392585B1 (en) 2011-09-26 2013-03-05 Theranos, Inc. Methods and systems for facilitating network connectivity
US10320951B2 (en) 2011-10-31 2019-06-11 Hurricane Electric Systems and methods for establishing a virtual local area network
US20130218768A1 (en) 2012-02-21 2013-08-22 Mike Leber Systems and Methods for Facilitating Secured Financial Transactions
US9965760B2 (en) 2012-06-29 2018-05-08 Hurricane Electric Systems and methods for facilitating electronic transactions utilizing a mobile computing device
EP2878161B1 (en) 2012-07-27 2019-08-21 Telefonaktiebolaget LM Ericsson (publ) Enhancing positioning in multi-plmn deployments
US8990956B2 (en) 2012-08-06 2015-03-24 Hurricane Electric Systems and methods of exchanging information for a reward
US20150172135A1 (en) 2013-12-17 2015-06-18 Limelight Networks, Inc. Dynamic bandwidth allocation for cooperative delivery systems

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6532450B1 (en) * 1998-12-09 2003-03-11 American Management Systems, Inc. Financial management system including an offset payment process
US20030135461A1 (en) * 1998-12-09 2003-07-17 American Management Systems, Inc. Financial management system including an offset payment process
US20080162350A1 (en) * 2000-02-29 2008-07-03 First Data Corporation Electronic purchasing and funds transfer systems and methods
US20050055319A1 (en) * 2003-09-05 2005-03-10 Pitney Bowes Incorporated Payment release system
US20100312702A1 (en) * 2009-06-06 2010-12-09 Bullock Roddy M System and method for making money by facilitating easy online payment

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10320951B2 (en) 2011-10-31 2019-06-11 Hurricane Electric Systems and methods for establishing a virtual local area network
US11222314B2 (en) 2012-02-21 2022-01-11 Hurricane Electric Systems and methods for securing electronic transactions
US9965760B2 (en) 2012-06-29 2018-05-08 Hurricane Electric Systems and methods for facilitating electronic transactions utilizing a mobile computing device
US8990956B2 (en) 2012-08-06 2015-03-24 Hurricane Electric Systems and methods of exchanging information for a reward
US20140146965A1 (en) * 2012-11-28 2014-05-29 Sap Ag Method to verify that a user has made an external copy of a cryptographic key
US8792638B2 (en) * 2012-11-28 2014-07-29 Sap Ag Method to verify that a user has made an external copy of a cryptographic key
US20150348033A1 (en) * 2012-12-21 2015-12-03 Leon Johannes Brits Secure Payments Using Portable Communication Devices and Two Dimensional Codes
US10419927B2 (en) 2014-06-18 2019-09-17 Samsung Electronics Co., Ltd. Key sharing method and device

Also Published As

Publication number Publication date
US20190318324A1 (en) 2019-10-17
US11222314B2 (en) 2022-01-11

Similar Documents

Publication Publication Date Title
US11222314B2 (en) Systems and methods for securing electronic transactions
AU2021218146B2 (en) Browser integration with cryptogram
US20210295325A1 (en) Public ledger authentication system
US11651352B2 (en) Digital asset distribution by transaction device
US20170372417A1 (en) Digital asset account management
WO2019013854A1 (en) Token provisioning utilizing a secure authentication system
CN113435869A (en) Method and system for associating blockchain-based assets to fiat currency accounts
CN113435895A (en) System and method for fraud control for blockchain based transactions
CN112651726A (en) System and method for processing blockchain based transactions over existing payment networks
US20210192520A1 (en) Distributed credit ecosystem
WO2016118087A1 (en) System and method for secure online payment using integrated circuit card
US11716200B2 (en) Techniques for performing secure operations
JP2022514613A (en) Technology for securely implementing offline authentication
US20220036347A1 (en) Payment transaction process employing dynamic account expiry and dynamic token verification code
US20200242573A1 (en) Cryptographic transactions supporting real world requirements
CN112970234B (en) Account assertion
KR102375888B1 (en) System for real name authentication based on passport and method for account transfer using the same
WO2023064086A1 (en) Efficient and protected data transfer system and method

Legal Events

Date Code Title Description
AS Assignment

Owner name: HURRICANE ELECTRIC, CALIFORNIA

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:LEBER, MIKE;REEL/FRAME:027796/0940

Effective date: 20120217

STCV Information on status: appeal procedure

Free format text: REQUEST RECONSIDERATION AFTER BOARD OF APPEALS DECISION

STCV Information on status: appeal procedure

Free format text: BOARD OF APPEALS DECISION RENDERED AFTER REQUEST FOR RECONSIDERATION

STCB Information on status: application discontinuation

Free format text: ABANDONED -- AFTER EXAMINER'S ANSWER OR BOARD OF APPEALS DECISION