US20180240115A1 - Methods and systems for payments assurance - Google Patents

Methods and systems for payments assurance Download PDF

Info

Publication number
US20180240115A1
US20180240115A1 US15/936,708 US201815936708A US2018240115A1 US 20180240115 A1 US20180240115 A1 US 20180240115A1 US 201815936708 A US201815936708 A US 201815936708A US 2018240115 A1 US2018240115 A1 US 2018240115A1
Authority
US
United States
Prior art keywords
service manager
server computer
manager server
consumer
authentication
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
US15/936,708
Inventor
Shoon Ping Wong
Sandeep Malhotra
Tadepally Venkata Seshadri
Chayan Hazra
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Mastercard International Inc
Original Assignee
Mastercard International Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Mastercard International Inc filed Critical Mastercard International Inc
Priority to US15/936,708 priority Critical patent/US20180240115A1/en
Publication of US20180240115A1 publication Critical patent/US20180240115A1/en
Abandoned legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/401Transaction verification
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/409Device specific authentication in transaction processing
    • G06Q20/4097Device specific authentication in transaction processing using mutual authentication between devices and transaction partners

Definitions

  • FIG. 1A is a block diagram illustrating components that may be utilized to perform an activation process for a consumer/cardholder having a mobile device for an authentication service according to an embodiment of the invention
  • FIG. 1B is a block diagram illustrating components that may be used to perform an activation process for a merchant having a merchant device for an authentication service according to an embodiment of the invention
  • FIG. 2 illustrates an embodiment of an assurance service system for supporting merchant initiated remote payments according to an embodiment of the invention
  • FIG. 3 is a block diagram of an embodiment of an Authentication Service Manager Server computer in accordance with an embodiment of the invention
  • FIG. 4 is a block diagram of an embodiment of a Proxy Service Manager Server computer in accordance with an embodiment of the invention.
  • FIG. 5 is a flowchart illustrating a consumer authentication and payment authorization process from the point of view of the Proxy Service Manager Server computer of FIG. 2 according to an embodiment of the invention
  • FIG. 6 is a flowchart illustrating a consumer authentication process from the point of view of the Authentication Service Manager Server computer of FIG. 2 according to an embodiment of the invention
  • FIG. 7 illustrates a process for issuing a pre-authorized token according to an embodiment of the invention.
  • FIG. 8 is a flowchart illustrating a consumer authentication and payment authorization process that includes the use of a pre-authorized token from the point of view of the Proxy Service Manager Server computer of FIG. 2 according to an embodiment of the invention.
  • Authentication Service Manager to authenticate and/or validate a consumer (cardholder) who is utilizing a mobile device (or merchant device) to pay for goods and/or services.
  • a consumer with a mobile device such as a cell phone, personal digital assistant (PDA), laptop computer, touchpad computer, and the like
  • PDA personal digital assistant
  • a payment application enrolls his or her payment account with an Authentication Service Manager that has a relationship with an Issuer financial institution (Issuer FI; which issued the payment account to the cardholder).
  • Issuer financial institution Issuer financial institution
  • a merchant having a merchant device (such as a point-of-sale (POS) terminal, automatic teller machine (ATM), personal computer, computer server (hosting a website, for example), an interactive voice response (IVR) system, a land-line telephone, or any type of mobile device such as a mobile telephone, personal digital assistant (PDA), laptop computer, touchpad computer, and the like) enrolls his or her merchant financial account with a Proxy Service Manager that has a relationship with an Acquirer financial institution (Acquirer FI; which holds the merchant's financial account).
  • POS point-of-sale
  • ATM automatic teller machine
  • IVR interactive voice response
  • land-line telephone or any type of mobile device
  • PDA personal digital assistant
  • Acquirer FI Acquirer financial institution
  • a purchase transaction for example, when the consumer uses her or her mobile device to pay for merchandise at a merchant's retail store
  • the consumer provides payment information to the merchant who utilizes a merchant device to initiate the purchase transaction request by transmitting the cardholder payment information to the Proxy Service Manager.
  • many types of transactions qualify for the service described herein including, but not limited to, telephone orders, mail orders, e-commerce (Internet) orders, POS-initiated transactions, standing instructions for a transaction, and/or other types of transactions including non-financial transactions.
  • the Proxy Service Manager forwards the payment information to the Authentication Service Manager, which validates the consumer information including cardholder authentication credentials and sends a challenge/response request to the consumer's mobile device.
  • the consumer through the mobile device, authenticates to the challenge and transmits a response to the Authentication Service Manager which then validates the cardholder authentication credentials and generates a dynamic and unique Accountholder Authentication Value (“AAV”).
  • AAV is then returned to the Proxy Service Manager, which transmits the financial transaction information including the AAV to the Acquirer Financial Institution, which submits the transaction information to a payment network.
  • the payment network submits the financial transaction information to the Issuer FI (which issued the payment account to the consumer/cardholder, who also is the mobile device owner).
  • the Issuer FI validates the AAV and continues to process the authentication request by, for example, checking to make sure that the accountholder has adequate funds in his or her financial account (which may be a credit card account or a debit card account, for example) to pay for the merchandise or services of the merchant. If everything is in order, the Issuer FI approves the transaction and funds are transferred to the merchant's account, which is held by the Acquirer FI. The Acquirer FI then notifies the Proxy Service Manager that the transaction has been approved, which in turn contacts the merchant with the approval information. The transaction is then consummated as the merchant provides the merchandise and/or the service to the consumer.
  • his or her financial account which may be a credit card account or a debit card account, for example
  • Such a process may occur in real-time, for example, while the consumer/cardholder is in a checkout line at a merchant retail location. Furthermore, such a method provides chargeback protection for the merchant because of the additional security provided by requiring both cardholder authentication and issuer validation.
  • consumer device may refer to a handheld or portable or mobile device carried or used by a cardholder or consumer, or may refer to other types of electronic devices such as a personal computer, a land-line telephone, an IVR system, and the like.
  • a “mobile device” is a device, such as a laptop computer, a personal digital assistant (PDA), a mobile telephone, a portable music player (such as an iPodTM and the like), that has a payment application stored, loaded or otherwise installed in or on the mobile device such that the cardholder (or consumer) may conduct payment transactions involving a financial account such as a payment card account (which may refer to a credit card account, a debit card account, and/or a pre-paid card account, for example).
  • a payment card account which may refer to a credit card account, a debit card account, and/or a pre-paid card account, for example.
  • an Acquirer FI is the organization that transmits a purchase transaction to a payment system for routing to the Issuer of the payment account in question.
  • the Acquirer FI has an agreement with merchants, wherein the Acquirer FI receives authorization requests for purchase transactions from the merchants, and routes the authorization requests to the Issuers via payment networks.
  • the terms “Acquirer”, “Acquirer FI”, “Acquiring FI”, and “merchant's bank” may be used interchangeably herein.
  • Issuer may also be used interchangeably herein to refer to the financial institution that issued a payment account (which may be a cardholder account associated with, for example, a credit card, a debit card and/or a pre-paid card).
  • a payment account which may be a cardholder account associated with, for example, a credit card, a debit card and/or a pre-paid card.
  • a payment network is used to refer to one or more networks that are used to process a payment transaction, which may include one or more server computers.
  • a payment network may be the BankNet® processing network operated by MasterCard International Incorporated.
  • MasterCard International Incorporated a payment network that may be used to facilitate the authorization, clearing and settlement of payment transactions as described herein.
  • PAN primary account number
  • a payment account is a credit account which is issued by a financial institution pursuant to the MasterCard International Incorporated rules
  • the PAN may be a twelve to nineteen-digit string that identifies both the issuer (which may be based on the first few digits of the string, for example, the first five to ten digits) and the payment account number at the issuer.
  • the PAN is typically utilized to route and process transactions that involve the payment card and the payment card account.
  • the Authentication Service Manager activates the authentication service for a cardholder (consumer) and a Proxy Service Manager activates the authentication service for a merchant.
  • FIG. 1A is a block diagram 100 illustrating the components that may be utilized to perform a process for activating the authentication service for a consumer (cardholder) having a mobile device 102 according to an embodiment.
  • an Issuer FI establishes a relationship with an Authentication Manager which may entail using an Issuer FI server computer 104 to communicate with an Authentication Service Manager Computer 106 to transmit cardholder identification information so that an enrollment and activation process can be initiated with the Authentication Service Manager for cardholders.
  • the Authentication Service Manager receives the information and then activates the authentication service for each individual cardholder by creating a link between a particular cardholder's mobile device and that cardholder's financial account payment credentials (which information was provided by the Issuer FI).
  • the consumer may provide an alias or surrogate factor as an identifier that can be mapped to, for example, the primary account number (PAN) of the cardholder's account.
  • PAN primary account number
  • the consumer may provide a mobile telephone number, a national identification number (NID), a user identifier (UID), a frequent flier identifier, a driver's license identifier and/or some other consumer identifier that may be linked to the cardholder's mobile device and that can be used to map to a financial account of the consumer.
  • identifiers may include numbers and/or alphabetical characters.
  • the consumer may also provide data such as an expiration date for a particular financial account (such as a credit card, or a debit card, or a pre-paid card, or other type of financial account).
  • a particular financial account such as a credit card, or a debit card, or a pre-paid card, or other type of financial account.
  • FIG. 1B is a block diagram 120 illustrating components according to an embodiment that may be used to perform a process for activating the authentication service for a merchant having a merchant device 122 (which may be, for example, a point-of-sale (POS) terminal, or a laptop computer, or a mobile device (such as a cell phone)).
  • An Acquirer FI establishes a relationship with a Proxy Service Manager, which in some embodiments involves using an Acquirer FI server computer 124 to communicate with a Proxy Service Manager Server computer 126 .
  • the Proxy Service Manager computer receives information concerning financial accounts held by the Acquirer FI for one or more merchants, and then activates the authentication service for those merchants. Each merchant may be notified by the Proxy Service Manager Server computer that activation of the authentication assurance service was successful for that merchant's financial account held by the Acquirer FI.
  • FIG. 2 illustrates an embodiment of an assurance service system 200 for supporting merchant-initiated remote payments.
  • the system 200 includes a merchant device 202 adapted for communications with a Proxy Service Manager server computer 204 , an Authentication Service Manager server computer 206 , an Acquirer FI server computer 208 , a payment network 210 , and an Issuer FI server computer 212 . Also shown is a consumer mobile device 102 , which is utilized by a cardholder as explained below to initiate a payment transaction with the merchant device 202 .
  • Proxy Service Manager Server computer For ease of understanding only one Proxy Service Manager Server computer and one Authentication Service Manager Server computer are illustrated in the assurance service system 200 depicted in FIG. 2 . But it should be understood that in some embodiments a plurality of Proxy Service Manager Server computers and a plurality of Authentication Service Manager Server computers may be utilized.
  • a parameter file may be transmitted to each Proxy Service Manager Server computer at predetermined intervals (such as daily) that includes an updated list of Authentication Service Managers and associated consumers (or cardholders).
  • each Proxy Service Manager Server computer may transmit authentication requests to a “master” Authentication Service Manager Server computer (not shown) which is operable to route the authentication request to a particular designated Authentication Service Manager Server computer.
  • a challenge and response process is utilized by the assurance service system 200 to authenticate the cardholder during a payment transaction.
  • the consumer may utilize her mobile device 102 to provide 215 an identifier (which may be an alias identifier, for example) and/or payment information to the merchant device 202 .
  • the consumer's mobile device may be a mobile telephone (or cell phone) that includes an integrated circuit (IC) and a stored payment application (which may be a mobile wallet application running on the consumer's mobile telephone that includes data concerning one or more of the consumer's financial accounts).
  • IC integrated circuit
  • a stored payment application which may be a mobile wallet application running on the consumer's mobile telephone that includes data concerning one or more of the consumer's financial accounts.
  • Such a mobile telephone may be configured for transmitting required payment transaction data to a proximity device associated with a POS terminal.
  • the consumer may tap her cell phone on a proximity payment device (a receiver) associated with a POS terminal to initiate a purchase transaction.
  • Consumer information which may include an identifier or surrogate factor and/or payment information that may include identity information and/or payment card account data is then transferred from the cell phone to the POS terminal for processing.
  • the merchant device 202 initiates 217 an authentication request and transmits the consumer information to the Proxy Service Manager Server computer 204 .
  • the Proxy Service Manager Server computer 204 establishes a secure channel with the Authentication Service Manager Server computer 206 and then transmits 219 the consumer information thereto.
  • the consumer information consists of a surrogate factor or an alias (for example, a frequent flyer account number or a user identifier)
  • the Authentication Service Manager computer 206 performs a mapping function of the surrogate factor or alias to a particular consumer account to thus determine the cardholder payment account information.
  • the Authentication Service Manager validates the cardholder's payment information and looks up the MSISDN (the “Mobile Subscriber Integrated Services Digital Network” number, which is the same number as the mobile telephone number of a SIM card of the consumer's cell phone) that is registered to the cardholder.
  • MSISDN the “Mobile Subscriber Integrated Services Digital Network” number, which is the same number as the mobile telephone number of a SIM card of the consumer's cell phone
  • the Authentication Service Manager Server computer 206 transmits 221 a challenge/response request (for example, an IVR call-back message) to the cardholder's mobile device 102 .
  • the cardholder then authenticates 223 to the challenge/response request with the Authentication Service Manager Server computer 206 .
  • the Authentication Service Manager Server computer validates the credentials (for example, a password, a numeric PIN or a real-time token with a purchase identifier (previously generated by the Authentication Service Manager Server computer and transmitted to the cardholder's mobile device via any of a variety of communication channels, for example, SMS, e-mail, and the like) provided by the cardholder and generates a dynamic and unique (and non-repudiable) accountholder authentication value (“AAV”) token.
  • a non-repudiable AAV token is defined as a transaction-specific security token for transaction matching at the Issuer's server that cannot be disputed after the transaction-specific security token is verified by the Issuer.
  • the Authentication Service Manager Server computer 206 next provides 225 the AAV token to the Proxy Service Manager Server computer 204 , which creates a payment authorization request (for example, an ISO-8583authorization request message) with the AAV token in, for example, a Universal Card Authentication Field (“UCAF”).
  • a payment authorization request for example, an ISO-8583authorization request message
  • UCAF Universal Card Authentication Field
  • ISO-8583 refers to a standard that provides a set of rules for the definition of financial transaction protocols.
  • the UCAF is intended to be security-scheme independent and offers standardized fields and messages for use by merchants and MasterCardTM members to collect and transport authentication information. Once collected by the merchant and the Acquirer FI, this information is communicated to the Issuer in the payment authorization request and it provides explicit evidence that the transaction was originated by the account holder.
  • the authorization request is then transmitted 227 to the Acquirer FI server computer 208 .
  • the Acquirer FI server computer 208 then sends 229 the authorization request to the payment network 210 which routes 231 the authorization request to the Issuer FI server computer 212 .
  • the Issuer FI server computer validates the AAV supplied in the UCAF, and if all is in order, transmits 233 a payment authorization response message to the payment network 210 , which routes it 235 to the Acquirer FI server computer 208 .
  • the Acquirer FI server computer 208 then transmits 237 the payment authorization message to the Proxy Service Manager server computer which sends 239 the payment authorization message to the Merchant Device 202 so that the merchant can complete the purchase transaction with the consumer.
  • a one-time token (the AAV token) is generated during the lifecycle of a transaction and validated during that transaction, which occurs in some embodiments.
  • the AAV token may be generated before the payment transaction is initiated and then it is validated during the payment transaction.
  • the processing differs in that after the cardholder is authenticated, the Proxy Service Manager 204 returns (see dotted line 241 ) the AAV generated by the Authentication Service Manager 206 directly to the Merchant Device 202 .
  • the Merchant Device 202 is operable to create a payment authorization request message with the AAV token in the UCAF, and to transmit that payment authorization request directly (see dotted line 243 ) to the Acquirer FI Server computer 208 for further processing as described above.
  • the Acquirer FI Server computer 208 then routes 229 the payment authorization request through the payment network 210 which transmits 231 the request to the Issuer FI Server computer 212 , which validates the AAV and generates a payment authorization response message.
  • the payment authorization message is then routed 233 , 235 back to the Acquirer FI Server computer 208 and then next routed 237 to the Proxy Service Manager Server computer 204 , and lastly routed 239 to the Merchant Device 202 , so that the merchant can complete the purchase transaction with the consumer.
  • the merchant device 202 may be operable to interact directly with the authentication service manager server computer 206 (pathway not shown in FIG. 2 ), or may be operable to first interact with the acquirer FI computer 208 or with the Issuer FI computer 212 , or with a payment gateway (not shown) or with a payment processor (not shown) during a payment transaction.
  • the Proxy Service Manager computer 204 may be operable to first interact with the Issuer FI server computer 212 , or with a payment gateway (not shown) or with a payment processor (not shown) during a payment transaction.
  • FIG. 3 is a block diagram of an embodiment of an Authentication Service Manager Server computer 300 .
  • the Authentication Service Manager Server computer may be conventional in its hardware aspects but may be controlled by software to cause it to operate in accordance with aspects of the methods presented herein.
  • the Authentication Service Manager Server computer 300 may include a computer processor 302 operatively coupled to a communication device 304 , an input device 306 , an output device 308 , and a storage device 310 .
  • the computer processor 302 may constitute one or more conventional processors. Processor 302 operates to execute processor-executable steps, contained in program instructions described herein, so as to control the Authentication Service Manager Server computer 300 to provide desired functionality.
  • Communication device 304 may be used to facilitate communication with, for example, other devices (such as a consumer mobile device 102 and/or a Proxy Service Manager Server computer 204 shown in FIG. 2 ).
  • Communication device 304 may, for example, have capabilities for engaging in data communication over proprietary networks and/or over conventional computer-to-computer data networks. Such data communication may be in digital form and/or in analog form.
  • Input device 306 may comprise one or more of any type of peripheral device typically used to input data into a computer.
  • the input device 306 may include a keyboard and a mouse and/or a touchpad and/or a touch screen.
  • Output device 308 may comprise, for example, a display and/or a printer.
  • Storage device 310 may comprise any appropriate information storage device, including combinations of magnetic storage devices (e.g., magnetic tape and hard disk drives), optical storage devices such as CDs and/or DVDs, and/or semiconductor memory devices such as Random Access Memory (RAM) devices and Read Only Memory (ROM) devices, as well as “flash” memory devices. Any one or more of the listed storage devices may be referred to as a “memory”, “storage”, “storage medium” or “computer readable medium”.
  • Storage device 310 stores one or more programs or applications for controlling the processor 302 .
  • the programs comprise program instructions that contain processor-executable process steps for the Authentication Service Manager Server computer 300 , including, in some cases, process steps that constitute processes provided in accordance with principles of the processes presented herein.
  • the programs may include an application 312 that manages processes by which the Authentication Service Manager Server computer establishes relationships with Issuer financial institutions by enrolling the Issuer FIs, and an application 314 that enrolls and activates the authentication and validation service for consumers (cardholders) that have payment accounts (or other types of financial accounts) associated with and issued by the enrolled Issuer FIs.
  • the cardholder enrollment application 314 may operate to activate an authentication service for a cardholder by creating a link between the cardholder's mobile device and the payment credentials of the cardholder's payment account (which credentials may include, for example, a PAN, account expiration date and/or a password).
  • a cardholder validation application 316 may be included, which may, for example, cause the processor 302 to validate cardholder information based on payment account information, look up the registered MSISDN of the cardholder's mobile telephone, generate a dynamic and unique accountholder authentication value (AAV), and transmit the AAV, for example, to a Proxy Service Manager Server computer upon successful cardholder authentication.
  • AAV dynamic and unique accountholder authentication value
  • Reference numeral 318 in FIG. 3 identifies one or more databases that are maintained by the Authentication Service Manager Server computer 300 on the storage device 310 .
  • these databases may be, for example, cardholder mobile device data, cardholder payment account data, Proxy Service Manager identification data, security logs, an Issuer database, and a transaction database.
  • the computer processor 402 may constitute one or more conventional processors. Processor 402 operates to execute processor-executable steps, contained in program instructions described herein, so as to control the Proxy Service Manager Server computer 400 to provide desired functionality.
  • Storage device 410 may comprise any appropriate information storage device, including combinations of magnetic storage devices (e.g., magnetic tape and hard disk drives), optical storage devices such as CDs and/or DVDs, and/or semiconductor memory devices such as Random Access Memory (RAM) devices and Read Only Memory (ROM) devices, as well as “flash” memory devices. Any one or more of the listed storage devices may be referred to as a “memory”, “storage”, “storage medium” or “computer readable medium”.
  • Storage device 410 stores one or more programs or applications for controlling the processor 402 .
  • the programs comprise program instructions that contain processor-executable process steps for the Proxy Service Manager Server computer 400 , including, in some cases, process steps that constitute processes provided in accordance with principles of the processes presented herein.
  • the programs may include an application 412 that manages a process by which the Proxy Service Manager Server computer establishes relationships with Acquirer financial institutions by enrolling a particular Acquirer FI, and an application 414 that enrolls and activates merchants that have financial accounts associated with and issued by the enrolled Acquirer FI's.
  • the merchant enrollment application 414 may operate to activate the authentication service for a merchant by linking a merchant's device (such as a POS terminal or a merchant's cell phone) and the merchant's account(s) credentials (which credentials may include, for example, an account number and/or a password).
  • an application may be stored therein that causes the processor 402 to build an ISO-8583 purchase transaction and submit it for authorization to an acquiring FI or payment gateway or payment processor, or for submit it directly to a payment network.
  • Reference numeral 416 in FIG. 4 identifies one or more databases that are maintained by the Proxy Service Manager Server computer 400 on the storage device 410 .
  • these databases may be, for example, merchant device data, merchant account data, Proxy Service Manager identification data, security logs, an Acquirer database, and a transaction database.
  • FIG. 5 is a flowchart illustrating a consumer authentication and payment authorization process 500 according to an embodiment from the point of view of the Proxy Service Manager Server computer 204 of FIG. 2 .
  • the Proxy Service Manager Server computer receives 502 a consumer identifier and an authentication request from a merchant device.
  • the Proxy Service Manager Server computer establishes a secure channel with an Authentication Service Manager Server computer and then transmits 504 the consumer identifier to the Authentication Service Manager Server computer.
  • the consumer identifier is an alias entered by the consumer or provided to the merchant, and it contains two pieces of information.
  • such an alias/identifier includes information to identify the consumer and to identify a specific cardholder account to be utilized for the payment transaction.
  • the Authentication Service Manager computer maps the consumer identifier to the consumer's cardholder account or other financial information and continues to process the information. (Of course, if the consumer identifier is a cardholder account identifier, then a mapping process is not necessary.)
  • the Proxy Service Manager Server computer will receive a non-repudiable accountholder authentication value (“AAV”) token.
  • AAV non-repudiable accountholder authentication value
  • the Proxy Service Manager Server computer if an AAV token is received 506 , in some embodiments the Proxy Service Manager Server computer generates 508 a payment authorization request (for example, an ISO-8583 authorization request message) with the AAV token in, for example, a Universal Card Authentication Field (“UCAF”).
  • UCAF Universal Card Authentication Field
  • the Proxy Service Manager Server computer next transmits 510 the payment request to the Acquirer FI Server computer.
  • the Proxy Service Manager Server computer receives 512 a payment authorization response message.
  • the payment authorization response message is then transmitted 514 to the Merchant Device so that the merchant can complete the purchase transaction with the consumer.
  • the Proxy Service Manager receives, for example, a payment declined message then the Proxy Service Manager transmits 516 a payment authorization denied message to the merchant. In this case, the merchant does not complete the purchase transaction with the consumer.
  • step 506 in FIG. 5 if an AAV token is not received from the Authentication Service Manager Server computer within a predefined time (for example), or if an “authentication failed” message is received from the Authentication Service Manager Server computer, then the Proxy Service Manager Server computer transmits 518 a “cardholder authentication failure” message to the Merchant Device.
  • the Proxy Service Manager Server computer transmits 518 a “cardholder authentication failure” message to the Merchant Device.
  • a problem occurred with regard to the consumer identifier and/or the authentication service manager could not map the alias or surrogate factor to a cardholder account.
  • the merchant does not complete the purchase transaction with the consumer because the consumer's payment credentials were not authenticated.
  • FIG. 6 is a flowchart illustrating a consumer authentication process 600 from the point of view of the Authentication Service Manager Server computer 206 of FIG. 2 according to an embodiment.
  • the Authentication Service Manager Server computer receives 602 the consumer identifier from the Proxy Service Manager Server computer.
  • the consumer identifier is a surrogate factor, for example, a frequent flyer account number or a user identifier.
  • the consumer provided the frequent flyer account number or identification number to the Authentication Service Manager during the registration process.
  • the Authentication Service Manager Server computer attempts to map 60 the surrogate factor to the consumer's cardholder account.
  • the Authentication Service Manager Server computer transmits 606 a challenge/response request (for example, an IVR call-back message) to the cardholder's mobile telephone or other mobile device.
  • a challenge/response request for example, an IVR call-back message
  • the cardholder authenticates to the challenge/response request 608 , for example by providing a correct password or numeric PIN or a real-time token with a purchase identifier (previously generated by the Authentication Service Manager Server computer and transmitted to the cardholder's device via any of a variety of communication channels, such as via SMS, or e-mail, and the like), then the Authentication Service Manager Server computer validates the credentials provided by cardholder or consumer and generates 610 a dynamic and unique (and non-repudiable) accountholder authentication value (“AAV”) token. Next, the Authentication Service Manager Server computer transmits 612 the AAV token to the Proxy Service Manager Server computer for further processing. At this point, the Authentication Service Manager Server computer awaits further authentication requests.
  • AAV accountholder authentication value
  • MS-ISDN the mobile telephone number of a SIM card of the consumer's cell phone
  • step 608 if in step 608 the cardholder fails to authenticate to the challenge/response request, then the Authentication Service Manager Server computer again transmits 614 a cardholder authentication failure message to the Proxy Service Manager Server computer and the process ends.
  • the purchase transaction will not be consummated in this case because the Proxy Service Manager Server computer will in turn transmit the cardholder authentication failure message to the Merchant Device to alert the merchant that the cardholder has not been authenticated.
  • the consumer utilizes his or her mobile device (for example, cell phone or laptop or touchpad computer) or uses a personal computer with a web browser, to transmit his or her authentication credentials to the Authentication Service Manager Server computer along with a request for a pre-authorized token. If the consumer's authentication credentials (such as a mobile telephone number, driver's license ID, frequent flyer ID and the like) are successfully validated 704 , then the Authentication Service Manager Server computer generates 706 a pre-authorized token that includes an expiration date or period. In some implementations, the expiration date is no more than twenty-four (24) hours from the time of issuance of the pre-authorized token, whereas in other embodiments the pre-authorized token may be valid for shorter or longer periods of time.
  • the expiration date is no more than twenty-four (24) hours from the time of issuance of the pre-authorized token, whereas in other embodiments the pre-authorized token may be valid for shorter or longer periods of time.
  • the Authentication Service Manager Server computer then transmits 708 the generated pre-authorized token (with an expiration date) to, for example, the consumer's mobile device for use in making purchase transactions. However, if in step 704 the consumers' identifier could not be validated, then the Authentication Service Manager computer transmits 710 a “Request Denied” message to the consumer's mobile device.
  • such a pre-authorized token will, in some embodiments, always be associated to a specific cardholder payment account during the time of generation. For example, if a consumer has two or more payment accounts registered with the Authentication Service Manager, and a pre-authorized token is generated for “Account A”, then the pre-authorized token will only be valid for Account A and not for any of the other accounts that consumer has with the Authentication Service Manager. If the consumer uses the pre-authorized token and specifies a payment account other than “Account A” for making a purchase transaction authorization request, then the Authentication Service Manager Server computer will reject the transaction request.
  • the pre-authorized token may be associated with a specific merchant (for example, BestBuyTM, amazon.comTM and the like), and/or with a merchant category (for example, airlines, hotels and the like).
  • a merchant category for example, airlines, hotels and the like.
  • the pre-authorized token may be assigned a maximum purchase amount (for example, $100 US Dollars). In such an embodiment, for example, if the consumer attempts to use that pre-authorized token for purchases that exceed $100 US Dollars, then the Authentication Service Manager Server computer will reject the transaction request.
  • a maximum purchase amount for example, $100 US Dollars
  • FIG. 8 is a flowchart illustrating a consumer authentication and payment authorization process 800 according to an embodiment that includes the use of a pre-authorized token from the point of view of the Proxy Service Manager Server computer 204 of FIG. 2 .
  • the Proxy Service Manager Server computer receives 802 an authentication request including a pre-authorized token from a merchant device.
  • the authentication request also includes a consumer identifier, which may be an alias or surrogate factor as described herein.
  • the Proxy Service Manager Server computer then establishes a secure channel with an Authentication Service Manager Server computer and transmits 804 the consumer identifier and the pre-authorized token to the Authentication Service Manager Server computer.
  • the Proxy Service Manager Server computer receives 812 a payment authorization message and then transmits 814 the payment authorization message to the Merchant Device so that the merchant can complete the purchase transaction with the consumer. But if a payment authorization message was not received in step 812 (for example, the Proxy Service Manager receives a payment declined message), then the Proxy Service Manager transmits 816 a payment authorization denied message to the merchant. In this case, the merchant does not complete the purchase transaction with the consumer.
  • step 806 if in step 806 an AAV token is not received from the Authentication Service Manager Server computer within a predefined time limit, or if an “authentication failed” message is received from the Authentication Service Manager Server computer, then the Proxy Service Manager Server computer transmits 818 a “cardholder authentication failure” message to the Merchant Device. In this case, the merchant doe not complete the purchase transaction with the consumer.
  • the Proxy Service Manager Server computer 204 transmits the AAV token generated by the Authentication Service Manager Server computer 206 directly to the Merchant Device 202 (see FIG. 2 ).
  • the Merchant Device is operable to create a payment authorization request message with the AAV token in the UCAF, and to transmit the payment authorization request directly to the Acquirer FI Server computer.
  • processing then continues as described above, with the Acquirer FI Server computer 208 routing the payment authorization request through the payment network 210 to the Issuer FI Server computer 212 , which validates the AAV token and generates a payment authorization message.
  • the payment authorization message is routed back to the Acquirer FI Server computer 208 and to the Proxy Service Manager Server computer 204 , and lastly to the Merchant Device 202 , so that the merchant can complete the purchase transaction with the consumer.
  • the cardholder receives the unique token or real-time token and the purchase identifier at her mobile device, and then provides them both to the merchant device 202 . (Since the consumer receives the token and purchase identifier at the time of entering into a purchase transaction, the process may be thought of as occurring in “real time”.)
  • the merchant device submits the real-time token with a purchase identifier of the cardholder to the Proxy Service Manager Server computer 204 .
  • the Proxy Service Manager Server computer again establishes a secure channel with the Authentication Service Manager Server computer then transmits the real-time token and the purchase identifier to it.
  • the Issuer FI computer validates the AAV supplied in the UCAF, and if all is in order, transmits a payment authorized message to the payment network 210 , which routes it to the Acquirer FI server computer 208 .
  • the Acquirer FI server computer 208 then transmits the payment authorized message to the Proxy Service Manager Server computer which sends it to the Merchant Device 202 so that the merchant can complete the purchase transaction with the consumer.
  • a settlement process may occur at a later time wherein the necessary funds to cover the payment transaction are transferred from the cardholder's financial account held by the Issuer FI to the merchant's financial account held by the Acquirer FI.
  • the Proxy Service Manager Server computer 204 returns the AAV generated by the Authentication Service Manager Server computer 206 to the Merchant Device 202 .
  • the Merchant Device 202 is operable to create a payment authorization request message with the AAV token in the UCAF, and to transmit the payment authorization request directly to the Acquirer FI Server computer 208 .
  • Processing then continues as described above, with the Acquirer FI Server computer 208 routing the payment authorization request through the payment network 210 to the Issuer FI Server computer 212 , which validates the AAV and generates a payment authorization message.
  • the payment authorization message is routed back to the Acquirer FI Server computer 208 and to the Proxy Service Manager Server computer 204 , and lastly to the Merchant Device 202 , so that the merchant can complete the purchase transaction with the consumer.
  • the Proxy Service Manager Server computer instead of the Proxy Service Manager Server computer 204 generating the payment authorization request during the process, the Proxy Service Manager Server computer instead transmits the AAV token generated by the Authentication Service Manager Server computer 206 to the Merchant Device 202 .
  • the Merchant Device is operable to create a payment authorization request message with the AAV token in the UCAF, and to transmit the payment authorization request directly to the Acquirer FI Server computer 208 .
  • processing then continues as described above, with the Acquirer FI Server computer 208 routing the payment authorization request through the payment network 210 to the Issuer FI Server computer 212 , which validates the AAV and generates a payment authorized message (if all is in order).
  • the payment authorized message is then routed back to the Acquirer FI Server computer 208 through the payment network 210 , and next to the Proxy Service Manager Server computer 204 which transmits it to the Merchant Device 202 . Once the payment authorized message is received at the Merchant Device, the merchant can complete the purchase transaction with the consumer.
  • Issuer FI's are reluctant to accept debit account transactions (for example, by using a system such as the MaestroTM CNP system) because of the inability to authenticate a cardholder (except for an electronic-commerce transaction wherein a process such as that promulgated by SecureCodeTM is used).
  • the systems and methods described herein provide Issuer FIs in those markets with a solution for the additional authentication to be performed, and furthermore provide for other remote payment channels such as IVR/Phone, Mail Order and potentially recurring payment transactions.

Abstract

A remote payments assurance system includes a Proxy Service Manager Server, an Authentication Service Manager Server computer, an Acquirer Financial Institution (FI) Server computer, a payment network, and an Issuer financial institution server computer. A storage device of the Proxy Service Manager Server computer stores instructions which causes a processor to receive a consumer authentication request from a merchant device obtained during a card not present (CNP) transaction, transmit the consumer authentication request to the Authentication Service Manager Server computer, establish a secure communications channel between the Proxy Service Manager Server computer and the Authentication Service Manager Server computer, and transmit the consumer authentication request via the secure communications channel to the Authentication Service Manager Server computer. Next, the processor receives a non-repudiable one-time accountholder authentication value (“AAV”) token, transmits a payment authorization request to the Acquirer FI Server computer, receives a payment authorization message, and transmits a payment authorization message to the merchant device to complete the CNP purchase transaction.

Description

    CROSS REFERENCE TO RELATED APPLICATION
  • This application is a continuation of U.S. patent application Ser. No. 13/547,445, filed on Jul. 12, 2012, which claims the benefit of and priority to U.S. Provisional Patent Application Ser. No. 61/508,325, filed on Jul. 15, 2011, which are incorporated herein by reference for all purposes.
  • BACKGROUND OF THE INVENTION
  • Mobile telephones and other mobile communications devices (such as personal digital assistants) are carried by millions of consumers, and there have been a number of attempts to integrate payment applications with these mobile devices. However, some of these attempts to provide methods and systems to facilitate “card not present” payment capabilities require substantial changes to existing payment authorization systems, making it difficult to achieve widespread adoption of mobile payments. In addition, difficulties arose due to various country mandates and/or regulatory requirements, such as those required by India that require cardholder authentication or validation to be performed by the cardholder (consumer) and verified by the Issuer financial institution (the entity that issued the payment account to the consumer). Accordingly, there is a need for authentication methods and systems for facilitating payment schemes where cardholder authentication and Issuer financial institution verification are desired and/or mandated.
  • BRIEF DESCRIPTION OF THE DRAWINGS
  • FIG. 1A is a block diagram illustrating components that may be utilized to perform an activation process for a consumer/cardholder having a mobile device for an authentication service according to an embodiment of the invention;
  • FIG. 1B is a block diagram illustrating components that may be used to perform an activation process for a merchant having a merchant device for an authentication service according to an embodiment of the invention;
  • FIG. 2 illustrates an embodiment of an assurance service system for supporting merchant initiated remote payments according to an embodiment of the invention;
  • FIG. 3 is a block diagram of an embodiment of an Authentication Service Manager Server computer in accordance with an embodiment of the invention;
  • FIG. 4 is a block diagram of an embodiment of a Proxy Service Manager Server computer in accordance with an embodiment of the invention;
  • FIG. 5 is a flowchart illustrating a consumer authentication and payment authorization process from the point of view of the Proxy Service Manager Server computer of FIG. 2 according to an embodiment of the invention;
  • FIG. 6 is a flowchart illustrating a consumer authentication process from the point of view of the Authentication Service Manager Server computer of FIG. 2 according to an embodiment of the invention;
  • FIG. 7 illustrates a process for issuing a pre-authorized token according to an embodiment of the invention; and
  • FIG. 8 is a flowchart illustrating a consumer authentication and payment authorization process that includes the use of a pre-authorized token from the point of view of the Proxy Service Manager Server computer of FIG. 2 according to an embodiment of the invention.
  • DETAILED DESCRIPTION
  • In general, and for the purpose of introducing concepts of the embodiments described herein, systems, methods and apparatus are described for providing an Authentication Service Manager to authenticate and/or validate a consumer (cardholder) who is utilizing a mobile device (or merchant device) to pay for goods and/or services. In particular, in some embodiments, a consumer with a mobile device (such as a cell phone, personal digital assistant (PDA), laptop computer, touchpad computer, and the like) having a payment application enrolls his or her payment account with an Authentication Service Manager that has a relationship with an Issuer financial institution (Issuer FI; which issued the payment account to the cardholder). In addition, a merchant having a merchant device (such as a point-of-sale (POS) terminal, automatic teller machine (ATM), personal computer, computer server (hosting a website, for example), an interactive voice response (IVR) system, a land-line telephone, or any type of mobile device such as a mobile telephone, personal digital assistant (PDA), laptop computer, touchpad computer, and the like) enrolls his or her merchant financial account with a Proxy Service Manager that has a relationship with an Acquirer financial institution (Acquirer FI; which holds the merchant's financial account). During a purchase transaction (for example, when the consumer uses her or her mobile device to pay for merchandise at a merchant's retail store), the consumer provides payment information to the merchant who utilizes a merchant device to initiate the purchase transaction request by transmitting the cardholder payment information to the Proxy Service Manager. It should be understood that many types of transactions qualify for the service described herein including, but not limited to, telephone orders, mail orders, e-commerce (Internet) orders, POS-initiated transactions, standing instructions for a transaction, and/or other types of transactions including non-financial transactions.
  • In some embodiments, the Proxy Service Manager forwards the payment information to the Authentication Service Manager, which validates the consumer information including cardholder authentication credentials and sends a challenge/response request to the consumer's mobile device. The consumer, through the mobile device, authenticates to the challenge and transmits a response to the Authentication Service Manager which then validates the cardholder authentication credentials and generates a dynamic and unique Accountholder Authentication Value (“AAV”). The AAV is then returned to the Proxy Service Manager, which transmits the financial transaction information including the AAV to the Acquirer Financial Institution, which submits the transaction information to a payment network. The payment network submits the financial transaction information to the Issuer FI (which issued the payment account to the consumer/cardholder, who also is the mobile device owner). The Issuer FI validates the AAV and continues to process the authentication request by, for example, checking to make sure that the accountholder has adequate funds in his or her financial account (which may be a credit card account or a debit card account, for example) to pay for the merchandise or services of the merchant. If everything is in order, the Issuer FI approves the transaction and funds are transferred to the merchant's account, which is held by the Acquirer FI. The Acquirer FI then notifies the Proxy Service Manager that the transaction has been approved, which in turn contacts the merchant with the approval information. The transaction is then consummated as the merchant provides the merchandise and/or the service to the consumer. Such a process may occur in real-time, for example, while the consumer/cardholder is in a checkout line at a merchant retail location. Furthermore, such a method provides chargeback protection for the merchant because of the additional security provided by requiring both cardholder authentication and issuer validation.
  • The term “consumer device” as used herein may refer to a handheld or portable or mobile device carried or used by a cardholder or consumer, or may refer to other types of electronic devices such as a personal computer, a land-line telephone, an IVR system, and the like. In the context of some embodiments, a “mobile device” is a device, such as a laptop computer, a personal digital assistant (PDA), a mobile telephone, a portable music player (such as an iPod™ and the like), that has a payment application stored, loaded or otherwise installed in or on the mobile device such that the cardholder (or consumer) may conduct payment transactions involving a financial account such as a payment card account (which may refer to a credit card account, a debit card account, and/or a pre-paid card account, for example).
  • In general, an Acquirer FI is the organization that transmits a purchase transaction to a payment system for routing to the Issuer of the payment account in question. Typically, the Acquirer FI has an agreement with merchants, wherein the Acquirer FI receives authorization requests for purchase transactions from the merchants, and routes the authorization requests to the Issuers via payment networks. The terms “Acquirer”, “Acquirer FI”, “Acquiring FI”, and “merchant's bank” may be used interchangeably herein. The terms “Issuer”, “Issuer FI” and “Issuing FI” may also be used interchangeably herein to refer to the financial institution that issued a payment account (which may be a cardholder account associated with, for example, a credit card, a debit card and/or a pre-paid card).
  • In addition, the term “payment network” is used to refer to one or more networks that are used to process a payment transaction, which may include one or more server computers. For example, a payment network may be the BankNet® processing network operated by MasterCard International Incorporated. Those skilled in the art will appreciate that other networks may also be used to facilitate the authorization, clearing and settlement of payment transactions as described herein.
  • The term “primary account number” (or “PAN”) is used herein to refer to a number of digits (or characters) which identify a payment account issued by an issuer. For example, in some embodiments a payment account is a credit account which is issued by a financial institution pursuant to the MasterCard International Incorporated rules, and the PAN may be a twelve to nineteen-digit string that identifies both the issuer (which may be based on the first few digits of the string, for example, the first five to ten digits) and the payment account number at the issuer. The PAN is typically utilized to route and process transactions that involve the payment card and the payment card account. Those skilled in the art will appreciate that other primary account number schemes and formats may be used in conjunction with embodiments described herein.
  • In some embodiments, the Authentication Service Manager activates the authentication service for a cardholder (consumer) and a Proxy Service Manager activates the authentication service for a merchant.
  • FIG. 1A is a block diagram 100 illustrating the components that may be utilized to perform a process for activating the authentication service for a consumer (cardholder) having a mobile device 102 according to an embodiment. In particular, an Issuer FI establishes a relationship with an Authentication Manager which may entail using an Issuer FI server computer 104 to communicate with an Authentication Service Manager Computer 106 to transmit cardholder identification information so that an enrollment and activation process can be initiated with the Authentication Service Manager for cardholders. The Authentication Service Manager receives the information and then activates the authentication service for each individual cardholder by creating a link between a particular cardholder's mobile device and that cardholder's financial account payment credentials (which information was provided by the Issuer FI). In some embodiments, the consumer (cardholder) may provide an alias or surrogate factor as an identifier that can be mapped to, for example, the primary account number (PAN) of the cardholder's account. For example, the consumer may provide a mobile telephone number, a national identification number (NID), a user identifier (UID), a frequent flier identifier, a driver's license identifier and/or some other consumer identifier that may be linked to the cardholder's mobile device and that can be used to map to a financial account of the consumer. Such identifiers may include numbers and/or alphabetical characters. During the registration process, in addition to one or more identifiers and the PAN, the consumer may also provide data such as an expiration date for a particular financial account (such as a credit card, or a debit card, or a pre-paid card, or other type of financial account).
  • In some embodiments, the Authentication Service Manager 106 may notify the cardholder that registration and/or activation was successfully achieved by transmitting an SMS message (or a text message, or some other type of message) to the consumer mobile device 102. For example, the mobile device may receive and then display a message that states: “Congratulations! Your payment account number XCX-3682 has been activated for mobile purchase transactions!” The message may include details (such as a consumer identifier and/or the telephone number of the consumer's mobile telephone) concerning the link to the cardholder's financial account and/or provide a link to a website that allows the cardholder to manage the account or to obtain further information.
  • FIG. 1B is a block diagram 120 illustrating components according to an embodiment that may be used to perform a process for activating the authentication service for a merchant having a merchant device 122 (which may be, for example, a point-of-sale (POS) terminal, or a laptop computer, or a mobile device (such as a cell phone)). An Acquirer FI establishes a relationship with a Proxy Service Manager, which in some embodiments involves using an Acquirer FI server computer 124 to communicate with a Proxy Service Manager Server computer 126. The Proxy Service Manager computer receives information concerning financial accounts held by the Acquirer FI for one or more merchants, and then activates the authentication service for those merchants. Each merchant may be notified by the Proxy Service Manager Server computer that activation of the authentication assurance service was successful for that merchant's financial account held by the Acquirer FI.
  • In some embodiments, the authentication service manager computer 106 and the proxy service manager computer 126 may be controlled and/or maintained by a single, third-party entity. Thus, the same entity (and same server computer) may be responsible for performing the separate consumer registration and merchant registration functions as explained above. In addition, in some embodiments the functionality of the authentication service manager computer 106 and of the proxy service manager computer 126 may be handled by one server computer operated by a single third-party entity.
  • FIG. 2 illustrates an embodiment of an assurance service system 200 for supporting merchant-initiated remote payments. The system 200 includes a merchant device 202 adapted for communications with a Proxy Service Manager server computer 204, an Authentication Service Manager server computer 206, an Acquirer FI server computer 208, a payment network 210, and an Issuer FI server computer 212. Also shown is a consumer mobile device 102, which is utilized by a cardholder as explained below to initiate a payment transaction with the merchant device 202.
  • For ease of understanding only one Proxy Service Manager Server computer and one Authentication Service Manager Server computer are illustrated in the assurance service system 200 depicted in FIG. 2. But it should be understood that in some embodiments a plurality of Proxy Service Manager Server computers and a plurality of Authentication Service Manager Server computers may be utilized.
  • As explained above with regard to FIGS. 1A and 1B, merchants and consumers register in order to utilize the present payments assurance service system. In some embodiments, a parameter file may be transmitted to each Proxy Service Manager Server computer at predetermined intervals (such as daily) that includes an updated list of Authentication Service Managers and associated consumers (or cardholders). In some embodiments, each Proxy Service Manager Server computer may transmit authentication requests to a “master” Authentication Service Manager Server computer (not shown) which is operable to route the authentication request to a particular designated Authentication Service Manager Server computer.
  • Referring again to FIG. 2, in some embodiments a challenge and response process is utilized by the assurance service system 200 to authenticate the cardholder during a payment transaction. For example, the consumer may utilize her mobile device 102 to provide 215 an identifier (which may be an alias identifier, for example) and/or payment information to the merchant device 202. In such implementations, the consumer's mobile device may be a mobile telephone (or cell phone) that includes an integrated circuit (IC) and a stored payment application (which may be a mobile wallet application running on the consumer's mobile telephone that includes data concerning one or more of the consumer's financial accounts). Such a mobile telephone may be configured for transmitting required payment transaction data to a proximity device associated with a POS terminal. For example, the consumer may tap her cell phone on a proximity payment device (a receiver) associated with a POS terminal to initiate a purchase transaction. Consumer information which may include an identifier or surrogate factor and/or payment information that may include identity information and/or payment card account data is then transferred from the cell phone to the POS terminal for processing. Once this occurs, in some embodiments the merchant device 202 initiates 217 an authentication request and transmits the consumer information to the Proxy Service Manager Server computer 204.
  • In some embodiments, the Proxy Service Manager Server computer 204 establishes a secure channel with the Authentication Service Manager Server computer 206 and then transmits 219 the consumer information thereto. In embodiments wherein the consumer information consists of a surrogate factor or an alias (for example, a frequent flyer account number or a user identifier), the Authentication Service Manager computer 206 performs a mapping function of the surrogate factor or alias to a particular consumer account to thus determine the cardholder payment account information. The Authentication Service Manager then validates the cardholder's payment information and looks up the MSISDN (the “Mobile Subscriber Integrated Services Digital Network” number, which is the same number as the mobile telephone number of a SIM card of the consumer's cell phone) that is registered to the cardholder.
  • Next, the Authentication Service Manager Server computer 206 transmits 221 a challenge/response request (for example, an IVR call-back message) to the cardholder's mobile device 102. The cardholder then authenticates 223 to the challenge/response request with the Authentication Service Manager Server computer 206. The Authentication Service Manager Server computer then validates the credentials (for example, a password, a numeric PIN or a real-time token with a purchase identifier (previously generated by the Authentication Service Manager Server computer and transmitted to the cardholder's mobile device via any of a variety of communication channels, for example, SMS, e-mail, and the like) provided by the cardholder and generates a dynamic and unique (and non-repudiable) accountholder authentication value (“AAV”) token. A non-repudiable AAV token is defined as a transaction-specific security token for transaction matching at the Issuer's server that cannot be disputed after the transaction-specific security token is verified by the Issuer.
  • With reference again to FIG. 2, the Authentication Service Manager Server computer 206 next provides 225 the AAV token to the Proxy Service Manager Server computer 204, which creates a payment authorization request (for example, an ISO-8583authorization request message) with the AAV token in, for example, a Universal Card Authentication Field (“UCAF”). (The term “ISO-8583” refers to a standard that provides a set of rules for the definition of financial transaction protocols. The UCAF is intended to be security-scheme independent and offers standardized fields and messages for use by merchants and MasterCard™ members to collect and transport authentication information. Once collected by the merchant and the Acquirer FI, this information is communicated to the Issuer in the payment authorization request and it provides explicit evidence that the transaction was originated by the account holder.)
  • The authorization request is then transmitted 227 to the Acquirer FI server computer 208. The Acquirer FI server computer 208 then sends 229 the authorization request to the payment network 210 which routes 231 the authorization request to the Issuer FI server computer 212. The Issuer FI server computer validates the AAV supplied in the UCAF, and if all is in order, transmits 233 a payment authorization response message to the payment network 210, which routes it 235 to the Acquirer FI server computer 208. The Acquirer FI server computer 208 then transmits 237 the payment authorization message to the Proxy Service Manager server computer which sends 239 the payment authorization message to the Merchant Device 202 so that the merchant can complete the purchase transaction with the consumer.
  • The process described immediately above is an example of a method wherein a one-time token (the AAV token) is generated during the lifecycle of a transaction and validated during that transaction, which occurs in some embodiments. In some other implementations, however, the AAV token may be generated before the payment transaction is initiated and then it is validated during the payment transaction.
  • Referring again to FIG. 2, in some embodiments the processing differs in that after the cardholder is authenticated, the Proxy Service Manager 204 returns (see dotted line 241) the AAV generated by the Authentication Service Manager 206 directly to the Merchant Device 202. In this case, the Merchant Device 202 is operable to create a payment authorization request message with the AAV token in the UCAF, and to transmit that payment authorization request directly (see dotted line 243) to the Acquirer FI Server computer 208 for further processing as described above. In particular, the Acquirer FI Server computer 208 then routes 229 the payment authorization request through the payment network 210 which transmits 231 the request to the Issuer FI Server computer 212, which validates the AAV and generates a payment authorization response message. The payment authorization message is then routed 233, 235 back to the Acquirer FI Server computer 208 and then next routed 237 to the Proxy Service Manager Server computer 204, and lastly routed 239 to the Merchant Device 202, so that the merchant can complete the purchase transaction with the consumer.
  • It should be understood that other processing techniques can be utilized in accordance with the embodiments described herein that may depend upon the capabilities of the authorization system 200. For example, the merchant device 202 may be operable to interact directly with the authentication service manager server computer 206 (pathway not shown in FIG. 2), or may be operable to first interact with the acquirer FI computer 208 or with the Issuer FI computer 212, or with a payment gateway (not shown) or with a payment processor (not shown) during a payment transaction. In some other embodiments, the Proxy Service Manager computer 204, for example, may be operable to first interact with the Issuer FI server computer 212, or with a payment gateway (not shown) or with a payment processor (not shown) during a payment transaction.
  • FIG. 3 is a block diagram of an embodiment of an Authentication Service Manager Server computer 300. The Authentication Service Manager Server computer may be conventional in its hardware aspects but may be controlled by software to cause it to operate in accordance with aspects of the methods presented herein. In particular, the Authentication Service Manager Server computer 300 may include a computer processor 302 operatively coupled to a communication device 304, an input device 306, an output device 308, and a storage device 310.
  • The computer processor 302 may constitute one or more conventional processors. Processor 302 operates to execute processor-executable steps, contained in program instructions described herein, so as to control the Authentication Service Manager Server computer 300 to provide desired functionality.
  • Communication device 304 may be used to facilitate communication with, for example, other devices (such as a consumer mobile device 102 and/or a Proxy Service Manager Server computer 204 shown in FIG. 2). Communication device 304 may, for example, have capabilities for engaging in data communication over proprietary networks and/or over conventional computer-to-computer data networks. Such data communication may be in digital form and/or in analog form.
  • Input device 306 may comprise one or more of any type of peripheral device typically used to input data into a computer. For example, the input device 306 may include a keyboard and a mouse and/or a touchpad and/or a touch screen. Output device 308 may comprise, for example, a display and/or a printer.
  • Storage device 310 may comprise any appropriate information storage device, including combinations of magnetic storage devices (e.g., magnetic tape and hard disk drives), optical storage devices such as CDs and/or DVDs, and/or semiconductor memory devices such as Random Access Memory (RAM) devices and Read Only Memory (ROM) devices, as well as “flash” memory devices. Any one or more of the listed storage devices may be referred to as a “memory”, “storage”, “storage medium” or “computer readable medium”.
  • Storage device 310 stores one or more programs or applications for controlling the processor 302. The programs comprise program instructions that contain processor-executable process steps for the Authentication Service Manager Server computer 300, including, in some cases, process steps that constitute processes provided in accordance with principles of the processes presented herein.
  • The programs may include an application 312 that manages processes by which the Authentication Service Manager Server computer establishes relationships with Issuer financial institutions by enrolling the Issuer FIs, and an application 314 that enrolls and activates the authentication and validation service for consumers (cardholders) that have payment accounts (or other types of financial accounts) associated with and issued by the enrolled Issuer FIs. For example, the cardholder enrollment application 314 may operate to activate an authentication service for a cardholder by creating a link between the cardholder's mobile device and the payment credentials of the cardholder's payment account (which credentials may include, for example, a PAN, account expiration date and/or a password). In addition, a cardholder validation application 316 may be included, which may, for example, cause the processor 302 to validate cardholder information based on payment account information, look up the registered MSISDN of the cardholder's mobile telephone, generate a dynamic and unique accountholder authentication value (AAV), and transmit the AAV, for example, to a Proxy Service Manager Server computer upon successful cardholder authentication.
  • Reference numeral 318 in FIG. 3 identifies one or more databases that are maintained by the Authentication Service Manager Server computer 300 on the storage device 310. Among these databases may be, for example, cardholder mobile device data, cardholder payment account data, Proxy Service Manager identification data, security logs, an Issuer database, and a transaction database.
  • It should be understood that other application programs may also be stored on the storage device 310 that are operable to cause a processor to function in accordance with embodiments disclosed herein. For example, a mapping application may be stored in the storage device 310 that causes the processor 302 to map a consumer alias or surrogate factor to a financial account of a consumer during a payment transaction.
  • FIG. 4 is a block diagram of an embodiment of a Proxy Service Manager Server computer 400. The Proxy Service Manager Server computer may be conventional in its hardware aspects but may be controlled by software to cause it to operate in accordance with aspects of the methods presented herein. In particular, the Proxy Service Manager Server computer 400 may include a computer processor 402 operatively coupled to a communication device 404, an input device 406, an output device 408, and a storage device 410.
  • The computer processor 402 may constitute one or more conventional processors. Processor 402 operates to execute processor-executable steps, contained in program instructions described herein, so as to control the Proxy Service Manager Server computer 400 to provide desired functionality.
  • Communication device 404 may be used to facilitate communication with, for example, other devices (such as a merchant device 202 and/or an Authentication Service Manager Server computer 206 shown in FIG. 2). Communication device 404 may, for example, have capabilities for engaging in data communication over proprietary networks and/or over conventional computer-to-computer data networks. The data communication may be in digital form and/or in analog form.
  • Input device 406 may comprise one or more of any type of peripheral device typically used to input data into a computer. For example, the input device 406 may include a keyboard and a mouse and/or a touchpad and/or a touch screen. Output device 408 may comprise, for example, a display and/or a printer.
  • Storage device 410 may comprise any appropriate information storage device, including combinations of magnetic storage devices (e.g., magnetic tape and hard disk drives), optical storage devices such as CDs and/or DVDs, and/or semiconductor memory devices such as Random Access Memory (RAM) devices and Read Only Memory (ROM) devices, as well as “flash” memory devices. Any one or more of the listed storage devices may be referred to as a “memory”, “storage”, “storage medium” or “computer readable medium”.
  • Storage device 410 stores one or more programs or applications for controlling the processor 402. The programs comprise program instructions that contain processor-executable process steps for the Proxy Service Manager Server computer 400, including, in some cases, process steps that constitute processes provided in accordance with principles of the processes presented herein.
  • The programs may include an application 412 that manages a process by which the Proxy Service Manager Server computer establishes relationships with Acquirer financial institutions by enrolling a particular Acquirer FI, and an application 414 that enrolls and activates merchants that have financial accounts associated with and issued by the enrolled Acquirer FI's. For example, the merchant enrollment application 414 may operate to activate the authentication service for a merchant by linking a merchant's device (such as a POS terminal or a merchant's cell phone) and the merchant's account(s) credentials (which credentials may include, for example, an account number and/or a password).
  • It should be understood that other application programs may also be stored on the storage device 410 operable to cause a processor to function in accordance with embodiments disclosed herein. For example, in some embodiments an application may be stored therein that causes the processor 402 to build an ISO-8583 purchase transaction and submit it for authorization to an acquiring FI or payment gateway or payment processor, or for submit it directly to a payment network.
  • Reference numeral 416 in FIG. 4 identifies one or more databases that are maintained by the Proxy Service Manager Server computer 400 on the storage device 410. Among these databases may be, for example, merchant device data, merchant account data, Proxy Service Manager identification data, security logs, an Acquirer database, and a transaction database.
  • FIG. 5 is a flowchart illustrating a consumer authentication and payment authorization process 500 according to an embodiment from the point of view of the Proxy Service Manager Server computer 204 of FIG. 2. In particular, the Proxy Service Manager Server computer receives 502 a consumer identifier and an authentication request from a merchant device. In some embodiments, the Proxy Service Manager Server computer establishes a secure channel with an Authentication Service Manager Server computer and then transmits 504 the consumer identifier to the Authentication Service Manager Server computer. In some embodiments, the consumer identifier is an alias entered by the consumer or provided to the merchant, and it contains two pieces of information. In particular, such an alias/identifier includes information to identify the consumer and to identify a specific cardholder account to be utilized for the payment transaction. Thus, if the consumer identifier is an alias (or surrogate factor), then the Authentication Service Manager computer maps the consumer identifier to the consumer's cardholder account or other financial information and continues to process the information. (Of course, if the consumer identifier is a cardholder account identifier, then a mapping process is not necessary.) Next, if the consumer (cardholder) is authenticated, the Proxy Service Manager Server computer will receive a non-repudiable accountholder authentication value (“AAV”) token. Thus, if an AAV token is received 506, in some embodiments the Proxy Service Manager Server computer generates 508 a payment authorization request (for example, an ISO-8583 authorization request message) with the AAV token in, for example, a Universal Card Authentication Field (“UCAF”). The Proxy Service Manager Server computer next transmits 510 the payment request to the Acquirer FI Server computer.
  • Referring again to FIG. 5, if all was in order (i.e., the cardholder account was verified by the Issuer financial institution and contains sufficient funds or a sufficient credit line to cover the cost of the purchase transaction) then the Proxy Service Manager Server computer receives 512 a payment authorization response message. The payment authorization response message is then transmitted 514 to the Merchant Device so that the merchant can complete the purchase transaction with the consumer. However, if instead of receiving a payment authorization response in step 512, the Proxy Service Manager receives, for example, a payment declined message then the Proxy Service Manager transmits 516 a payment authorization denied message to the merchant. In this case, the merchant does not complete the purchase transaction with the consumer.
  • Referring again to step 506 in FIG. 5, if an AAV token is not received from the Authentication Service Manager Server computer within a predefined time (for example), or if an “authentication failed” message is received from the Authentication Service Manager Server computer, then the Proxy Service Manager Server computer transmits 518 a “cardholder authentication failure” message to the Merchant Device. Thus, in this case, either a problem occurred with regard to the consumer identifier and/or the authentication service manager could not map the alias or surrogate factor to a cardholder account. Thus, in such a case the merchant does not complete the purchase transaction with the consumer because the consumer's payment credentials were not authenticated.
  • FIG. 6 is a flowchart illustrating a consumer authentication process 600 from the point of view of the Authentication Service Manager Server computer 206 of FIG. 2 according to an embodiment. The Authentication Service Manager Server computer receives 602 the consumer identifier from the Proxy Service Manager Server computer. In some embodiments, the consumer identifier is a surrogate factor, for example, a frequent flyer account number or a user identifier. In some embodiments, the consumer provided the frequent flyer account number or identification number to the Authentication Service Manager during the registration process. Next the Authentication Service Manager Server computer attempts to map 60 the surrogate factor to the consumer's cardholder account. If the mapping was successful (for example, the Authentication Service Manager computer found a match in a database of registered consumer accounts), then the Authentication Service Manager Server computer transmits 606 a challenge/response request (for example, an IVR call-back message) to the cardholder's mobile telephone or other mobile device. If the cardholder authenticates to the challenge/response request 608, for example by providing a correct password or numeric PIN or a real-time token with a purchase identifier (previously generated by the Authentication Service Manager Server computer and transmitted to the cardholder's device via any of a variety of communication channels, such as via SMS, or e-mail, and the like), then the Authentication Service Manager Server computer validates the credentials provided by cardholder or consumer and generates 610 a dynamic and unique (and non-repudiable) accountholder authentication value (“AAV”) token. Next, the Authentication Service Manager Server computer transmits 612 the AAV token to the Proxy Service Manager Server computer for further processing. At this point, the Authentication Service Manager Server computer awaits further authentication requests.
  • However, referring again to FIG. 6, if mapping was unsuccessful in step 604 because, for example the MS-ISDN (the mobile telephone number of a SIM card of the consumer's cell phone) is not registered with the Authentication Service Manager (or the payment account is otherwise not registered with the Authentication Service Manager), then the Authentication Service Manager Server computer transmits 614 a cardholder authentication failure message to the Proxy Service Manager Server computer and the process ends. In this case, the purchase transaction will not be consummated because the Proxy Service Manager Server computer will in turn transmit the cardholder authentication failure message to the Merchant Device to alert the merchant that the cardholder has not been authenticated.
  • Referring again to FIG. 6, if in step 608 the cardholder fails to authenticate to the challenge/response request, then the Authentication Service Manager Server computer again transmits 614 a cardholder authentication failure message to the Proxy Service Manager Server computer and the process ends. As before, the purchase transaction will not be consummated in this case because the Proxy Service Manager Server computer will in turn transmit the cardholder authentication failure message to the Merchant Device to alert the merchant that the cardholder has not been authenticated.
  • In some embodiments, Issuer financial institutions may desire to implement a process that includes providing a pre-authorized token to registered cardholders for use in making purchase transactions. Use of such a pre-authorized token may enhance the consumers' purchase transaction experiences because it facilitates authentication of the consumer when the consumer wishes to consummate a purchase transaction with a merchant. For example, FIG. 7 illustrates a process 700 for issuing a pre-authorized token according to an embodiment. An authentication service manager computer receives 702 a request for a pre-authorized token from a consumer who is already registered with an Issuer FI and registered with an associated Authentication Service Manager. In some embodiments, the consumer utilizes his or her mobile device (for example, cell phone or laptop or touchpad computer) or uses a personal computer with a web browser, to transmit his or her authentication credentials to the Authentication Service Manager Server computer along with a request for a pre-authorized token. If the consumer's authentication credentials (such as a mobile telephone number, driver's license ID, frequent flyer ID and the like) are successfully validated 704, then the Authentication Service Manager Server computer generates 706 a pre-authorized token that includes an expiration date or period. In some implementations, the expiration date is no more than twenty-four (24) hours from the time of issuance of the pre-authorized token, whereas in other embodiments the pre-authorized token may be valid for shorter or longer periods of time. The Authentication Service Manager Server computer then transmits 708 the generated pre-authorized token (with an expiration date) to, for example, the consumer's mobile device for use in making purchase transactions. However, if in step 704 the consumers' identifier could not be validated, then the Authentication Service Manager computer transmits 710 a “Request Denied” message to the consumer's mobile device.
  • It should be noted that such a pre-authorized token will, in some embodiments, always be associated to a specific cardholder payment account during the time of generation. For example, if a consumer has two or more payment accounts registered with the Authentication Service Manager, and a pre-authorized token is generated for “Account A”, then the pre-authorized token will only be valid for Account A and not for any of the other accounts that consumer has with the Authentication Service Manager. If the consumer uses the pre-authorized token and specifies a payment account other than “Account A” for making a purchase transaction authorization request, then the Authentication Service Manager Server computer will reject the transaction request. In some embodiments, the pre-authorized token may be associated with a specific merchant (for example, BestBuy™, amazon.com™ and the like), and/or with a merchant category (for example, airlines, hotels and the like). In this implementation, if the consumer attempts to use a pre-authorized token that is not configured for use with either a particular merchant or merchant category, the Authentication Service Manager Server computer will reject the transaction request. In addition, in some embodiments the pre-authorized token may be assigned a maximum purchase amount (for example, $100 US Dollars). In such an embodiment, for example, if the consumer attempts to use that pre-authorized token for purchases that exceed $100 US Dollars, then the Authentication Service Manager Server computer will reject the transaction request. Such limitations on the use and/or dollar amount that may be spent and/or other restrictions may be applied together or in any combination to any pre-authorized token or class of pre-authorized tokens.
  • FIG. 8 is a flowchart illustrating a consumer authentication and payment authorization process 800 according to an embodiment that includes the use of a pre-authorized token from the point of view of the Proxy Service Manager Server computer 204 of FIG. 2. In particular, the Proxy Service Manager Server computer receives 802 an authentication request including a pre-authorized token from a merchant device. In some embodiments, the authentication request also includes a consumer identifier, which may be an alias or surrogate factor as described herein. In some implementations, the Proxy Service Manager Server computer then establishes a secure channel with an Authentication Service Manager Server computer and transmits 804 the consumer identifier and the pre-authorized token to the Authentication Service Manager Server computer.
  • Next, the Authentication Service Manager computer processes the information, and if the cardholder is authenticated, the Proxy Service Manager Server computer receives 806 a non-repudiable accountholder authentication value (“AAV”) token. If an AAV token is received 806, then the Proxy Service Manager Server computer generates 808 a payment authorization request with the AAV token in, for example, a Universal Card Authentication Field (“UCAF”). The Proxy Service Manager Server computer next transmits 810 the payment authorization request to an Acquirer FI Server computer. If all was in order (i.e., the cardholder account was verified by the Issuer financial institution) then the Proxy Service Manager Server computer receives 812 a payment authorization message and then transmits 814 the payment authorization message to the Merchant Device so that the merchant can complete the purchase transaction with the consumer. But if a payment authorization message was not received in step 812 (for example, the Proxy Service Manager receives a payment declined message), then the Proxy Service Manager transmits 816 a payment authorization denied message to the merchant. In this case, the merchant does not complete the purchase transaction with the consumer.
  • Referring again FIG. 8, if in step 806 an AAV token is not received from the Authentication Service Manager Server computer within a predefined time limit, or if an “authentication failed” message is received from the Authentication Service Manager Server computer, then the Proxy Service Manager Server computer transmits 818 a “cardholder authentication failure” message to the Merchant Device. In this case, the merchant doe not complete the purchase transaction with the consumer.
  • In some embodiments, instead of generating the payment authorization request in step 808 of the process 800, the Proxy Service Manager Server computer 204 transmits the AAV token generated by the Authentication Service Manager Server computer 206 directly to the Merchant Device 202 (see FIG. 2). In this case, the Merchant Device is operable to create a payment authorization request message with the AAV token in the UCAF, and to transmit the payment authorization request directly to the Acquirer FI Server computer. With reference to FIG. 2, processing then continues as described above, with the Acquirer FI Server computer 208 routing the payment authorization request through the payment network 210 to the Issuer FI Server computer 212, which validates the AAV token and generates a payment authorization message. The payment authorization message is routed back to the Acquirer FI Server computer 208 and to the Proxy Service Manager Server computer 204, and lastly to the Merchant Device 202, so that the merchant can complete the purchase transaction with the consumer.
  • In some embodiments, the remote payments assurance service may include a process wherein the Issuer FI permits the Authentication Service Manager Server computer to generate a unique “one-time” token or “real-time” token for a consumer during the authentication request. Such a process will now be explained with reference to the assurance service system 200 of FIG. 2, which supports merchant initiated remote payments. In this implementation, the cardholder utilizes her consumer mobile device 102 to provide cardholder payment account information to a merchant device 202. The merchant device 202 then initiates an authentication request and transmits the cardholder payment information to the Proxy Service Manager Server computer 204. In some embodiments, the Proxy Service Manager Server computer establishes a secure channel with the Authentication Service Manager Server computer 206, and then provides the cardholder payment account information to it. The Authentication Service Manager receives and authenticates the cardholder's payment information and looks up the MSISDN (the mobile telephone number of a SIM card of the consumer's cell phone) that is registered to the consumer or cardholder. In some embodiments, the Authentication Service Manager Server computer 206 then generates a unique real-time token with a purchase identifier and transmits it to the cardholders' mobile device utilizing any of a variety of communications channels, for example, SMS, e-mail, etc.
  • In this implementation, the cardholder receives the unique token or real-time token and the purchase identifier at her mobile device, and then provides them both to the merchant device 202. (Since the consumer receives the token and purchase identifier at the time of entering into a purchase transaction, the process may be thought of as occurring in “real time”.) The merchant device in turn submits the real-time token with a purchase identifier of the cardholder to the Proxy Service Manager Server computer 204. At this point, the Proxy Service Manager Server computer again establishes a secure channel with the Authentication Service Manager Server computer then transmits the real-time token and the purchase identifier to it. The Authentication Service Manager Server computer 206 validates the real-time token and the purchase identifier, and then generates a dynamic and unique (and non-repudiable) accountholder authentication value (“AAV”) token. The Authentication Service Manager Server computer 206 next provides the AAV token to the Proxy Service Manager Server computer 204, which creates a payment authorization request with the AAV token in, for example, a Universal Card Authentication Field (“UCAF”), and then transmits the authorization request to the Acquirer FI Server computer 208. The Acquirer FI Server computer 208 sends the authorization request to the payment network 210 which routes it to the Issuer FI Server computer 212. The Issuer FI computer validates the AAV supplied in the UCAF, and if all is in order, transmits a payment authorized message to the payment network 210, which routes it to the Acquirer FI server computer 208. The Acquirer FI server computer 208 then transmits the payment authorized message to the Proxy Service Manager Server computer which sends it to the Merchant Device 202 so that the merchant can complete the purchase transaction with the consumer. In some embodiments, a settlement process may occur at a later time wherein the necessary funds to cover the payment transaction are transferred from the cardholder's financial account held by the Issuer FI to the merchant's financial account held by the Acquirer FI.
  • In some embodiments, after the cardholder is authenticated, the Proxy Service Manager Server computer 204 returns the AAV generated by the Authentication Service Manager Server computer 206 to the Merchant Device 202. In this case, the Merchant Device 202 is operable to create a payment authorization request message with the AAV token in the UCAF, and to transmit the payment authorization request directly to the Acquirer FI Server computer 208. Processing then continues as described above, with the Acquirer FI Server computer 208 routing the payment authorization request through the payment network 210 to the Issuer FI Server computer 212, which validates the AAV and generates a payment authorization message. The payment authorization message is routed back to the Acquirer FI Server computer 208 and to the Proxy Service Manager Server computer 204, and lastly to the Merchant Device 202, so that the merchant can complete the purchase transaction with the consumer.
  • In an alternative embodiment, instead of the Proxy Service Manager Server computer 204 generating the payment authorization request during the process, the Proxy Service Manager Server computer instead transmits the AAV token generated by the Authentication Service Manager Server computer 206 to the Merchant Device 202. In this case, the Merchant Device is operable to create a payment authorization request message with the AAV token in the UCAF, and to transmit the payment authorization request directly to the Acquirer FI Server computer 208. With reference to FIG. 2, processing then continues as described above, with the Acquirer FI Server computer 208 routing the payment authorization request through the payment network 210 to the Issuer FI Server computer 212, which validates the AAV and generates a payment authorized message (if all is in order). The payment authorized message is then routed back to the Acquirer FI Server computer 208 through the payment network 210, and next to the Proxy Service Manager Server computer 204 which transmits it to the Merchant Device 202. Once the payment authorized message is received at the Merchant Device, the merchant can complete the purchase transaction with the consumer.
  • The real-time token process described immediately above may be acceptable to regulators in certain countries or jurisdictions as a legitimate and secure process for remote payments. It may be acceptable to the regulators because of several characteristics. First, the payment card account number proves knowledge of payment information; second, the MSISDN (of the cardholder's mobile device, which was pre-registered by the cardholder) used to for sending the real-time token is proof of an item that the cardholder owns (the mobile device); and third, the real-time token that is generated is not based on any of the information visible on a payment card or on a visible surface of the cardholder's mobile device.
  • Due to regulatory requirements in some jurisdictions, such as those mandated in India, there is a need for remote payments assurance services that allow cardholder authentication for a card-not-present purchase transaction to be performed by a cardholder and verified by the Issuer FI. The systems and processes described herein provide remote payments assurance services that satisfy that need. In particular, the described systems provide the components needed for Issuer FI's and Acquirer FIs (and their end customers, who are the cardholders and merchants) to satisfy such requirements in a secure and efficient manner, and without the need for significant system changes.
  • In some markets, Issuer FI's are reluctant to accept debit account transactions (for example, by using a system such as the Maestro™ CNP system) because of the inability to authenticate a cardholder (except for an electronic-commerce transaction wherein a process such as that promulgated by SecureCode™ is used). The systems and methods described herein provide Issuer FIs in those markets with a solution for the additional authentication to be performed, and furthermore provide for other remote payment channels such as IVR/Phone, Mail Order and potentially recurring payment transactions.
  • Merchants and Acquirer FI's also benefit from the described systems and methods due to the shift in liability that occurs. In particular, for properly identified purchase transactions under the processes described herein, the Issuer FI loses fraud related chargeback rights because the Issuer FI, through use of an Authentication Service Manager, not only authenticated the cardholder but also approved the payment request during the process.
  • Lastly, cardholders benefit from the described systems and processes because of the additional security inherent in a process wherein the cardholder self-authenticates. That is, in each of the described processes, the cardholder pre-registers with an Authentication Service Manager before entering into any purchase transactions. When initiating a purchase transaction, the cardholder provides information to authenticate him or herself to the Authentication Service Manager Server computer for a particular purchase transaction before a payment is made.
  • It should be understood that the above description and/or the accompanying drawings are not meant to imply a fixed order or sequence of steps for any process referred to herein. Rather, any process described herein may be performed in any order that is practicable, including but not limited to simultaneous performance of steps indicated as sequential. In addition, in some instances steps that are depicted or described herein as being sequential may be performed in parallel in some embodiments.
  • Although the present invention has been described in connection with specific exemplary embodiments, it should be understood that various changes, substitutions, and alterations apparent to those skilled in the art can be made to the disclosed embodiments without departing from the spirit and scope of the invention as set forth in the appended claims.

Claims (22)

What is claimed is:
1. A remote payments assurance system, comprising:
a Proxy Service Manager Server computer comprising a Proxy Service Manager Server processor operably connected to a storage device;
an Authentication Service Manager Server computer operably connected to the Proxy Service Manager Server computer;
an Acquirer Financial Institution (FI) Server computer operably connected to the Proxy Service Manager Server computer;
a payment network operably connected to the Acquirer Financial Institution Server computer; and
an Issuer financial institution server computer operably connected to the payment network;
wherein the storage device of the Proxy Service Manager Server computer stores instructions configured to cause the Proxy Service Manager Server processor to:
receive a consumer authentication request from a merchant device, the consumer authentication request including consumer information obtained by the merchant device from a consumer mobile device operated by a consumer during a card not present (CNP) transaction;
transmit the consumer authentication request to the Authentication Service Manager Server computer;
establish a secure communications channel between the Proxy Service Manager Server computer and the Authentication Service Manager Server computer;
transmit the consumer authentication request comprising the consumer information via the secure communications channel to the Authentication Service Manager Server computer associated with the consumer;
receive a non-repudiable one-time accountholder authentication value (“AAV”) token generated by the Authentication Service Manager Server computer;
generate a payment authorization request that includes the AAV token in a Universal Card Authentication Field;
transmit the payment authorization request to the Acquirer FI Server computer;
receive a payment authorization message signifying that the Issuer FI validated the AAV token; and
transmit the payment authorization message to the merchant device to complete the CNP purchase transaction.
2. The system of claim 1, wherein the consumer authentication request received by the Proxy Service Manager Server computer comprises one of an alias or a surrogate factor, and wherein the storage device of the Proxy Service Manager Server computer stores further instructions, prior to the instructions for establishing a secure communications channel, configured to cause the Proxy Service Manager Server processor to transmit the alias or surrogate factor to the Authentication Service Manager computer.
3. The system of claim 1, further comprising, prior to the instructions for receiving a payment authorization message, instructions configured for causing the Proxy Service Manager Server processor to:
receive a payment authorization denied message; and
transmit the payment authorization denied message to a merchant device.
4. The system of claim 1, further comprising, prior to the instructions for receiving the AAV token, instructions configured to cause the Proxy Service Manager Server processor to:
receive an authentication failed message from the Authentication Service Manager Server computer; and
transmit a cardholder authentication failure message to a merchant device.
5. A non-transitory computer readable medium storing instructions for authenticating a consumer and authorizing a card not present (CNP) transaction by causing a Proxy Service Manager Server computer to:
receive a consumer authentication request from a merchant device, the consumer authentication request including consumer information obtained by the merchant device from a consumer mobile device operated by a consumer during a card not present (CNP) transaction;
transmit the consumer authentication request to the Authentication Service Manager Server computer;
establish a secure communications channel between the Proxy Service Manager Server computer and the Authentication Service Manager Server computer;
transmit the consumer authentication request comprising the consumer information via the secure communications channel to the Authentication Service Manager Server computer associated with the consumer;
receive a non-repudiable one-time accountholder authentication value (“AAV”) token generated by the Authentication Service Manager Server computer;
generate a payment authorization request that includes the AAV token in a Universal Card Authentication Field;
transmit the payment authorization request to the Acquirer FI Server computer;
receive a payment authorization message signifying that the Issuer FI validated the AAV token; and
transmit the payment authorization message to the merchant device to complete the CNP purchase transaction.
6. The non-transitory computer readable medium of claim 5, wherein the consumer authentication request comprises one of an alias or a surrogate factor, and wherein the instructions for transmitting the consumer authentication request further comprises instructions configured to transmit the alias or surrogate factor to the Authentication Service Manager computer.
7. The non-transitory computer readable medium of claim 5, further comprising, prior to the instructions for receiving a payment authorization message, instructions configured for causing the Proxy Service Manager Server computer to:
receive a payment authorization denied message; and
transmit the payment authorization denied message to a merchant device.
8. The non-transitory computer readable medium of claim 5, further comprising, prior to the instructions for receiving the AAV token, instructions configured to cause the Proxy Service Manager Server computer to:
receive an authentication failed message from the Authentication Service Manager Server computer; and
transmit a cardholder authentication failure message to a merchant device.
9. A remote payments assurance system, comprising:
a Proxy Service Manager Server computer comprising a Proxy Service Manager Server processor operably connected to a storage device;
an Authentication Service Manager Server computer operably connected to the Proxy Service Manager Server computer;
an Acquirer Financial Institution (FI) Server computer operably connected to the Proxy Service Manager Server computer;
a payment network operably connected to the Acquirer Financial Institution Server computer; and
an Issuer financial institution server computer operably connected to the payment network;
wherein the storage device of the Proxy Service Manager Server computer stores instructions configured to cause the Proxy Service Manager Server processor to:
receive, from a merchant device, a consumer authentication request comprising a consumer identifier and a pre-authorization token-having an expiration date, the merchant device communicating with a consumer mobile device when a consumer initiates a card not present (CNP) transaction;
determine that the expiration date of the pre-authorization token is valid;
establish a secure communications channel between the Proxy Service Manager Server computer and the Authentication Service Manager Server computer;
transmit the consumer authentication request via the secure communications channel to the Authentication Service Manager Server computer associated with the consumer;
receive a non-repudiable, one-time accountholder authentication value (“AAV”) token from the Authentication Service Manager Server computer;
generate a payment authorization request that includes the AAV token in a Universal Card Authentication Field;
transmit the payment authorization request to an Acquirer financial institution (FI) Server computer;
receive a payment authorization message signifying that the Issuer FI validated the AAV token; and
transmit the payment authorization message to the merchant device to complete the CNP purchase transaction.
10. The system of claim 9, wherein the storage device of the Proxy Service Manager Server computer stores further instructions, prior to the instructions for receiving the AAV token, configured to cause the Proxy Service Manager Server processor to:
receive an authentication failure message; and
transmit the authentication failure message to the merchant device.
11. The system of claim 9, wherein the storage device of the Proxy Service Manager Server computer stores further instructions, subsequent to transmitting the payment authorization request, configured to cause the Proxy Service Manager Server processor to:
receive a payment authorization denied message; and
transmit the payment authorization denied message to a merchant device.
12. The system of claim 9, wherein the instructions for transmitting the payment authorization request to an Acquirer FI Server computer further comprises instructions configured to cause the Proxy Service Manager Server processor to transmit merchant identification information.
13. The system of claim 12, wherein the storage device of the Proxy Service Manager Server computer stores further instructions, subsequent to the instructions for transmitting the payment authorization request to an Acquirer FI Server computer, instructions configured to cause the Proxy Service Manager Server processor to receive a payment authorization denied message based on the merchant identification information.
14. A non-transitory computer readable medium storing instructions for authenticating a consumer and authorizing a card not present (CNP) transaction by causing a Proxy Service Manager Server computer to:
receive, from a merchant device, a consumer authentication request comprising a consumer identifier and a pre-authorization token-having an expiration date, the merchant device communicating with a consumer mobile device when a consumer initiates a card not present (CNP) transaction;
determine that the expiration date of the pre-authorization token is valid;
establish a secure communications channel between the Proxy Service Manager Server computer and the Authentication Service Manager Server computer;
transmit the consumer authentication request via the secure communications channel to the Authentication Service Manager Server computer associated with the consumer;
receive a non-repudiable, one-time accountholder authentication value (“AAV”) token from the Authentication Service Manager Server computer;
generate a payment authorization request that includes the AAV token in a Universal Card Authentication Field;
transmit the payment authorization request to an Acquirer financial institution (FI) Server computer;
receive a payment authorization message signifying that the Issuer FI validated the AAV token; and
transmit the payment authorization message to the merchant device to complete the CNP purchase transaction.
15. The non-transitory computer readable medium of claim 14, storing further instructions, prior to the instructions for receiving the AAV token, configured to cause the Proxy Service Manager Server computer to:
receive an authentication failure message; and
transmit the authentication failure message to the merchant device.
16. The non-transitory computer readable medium of claim 14, storing further instructions, subsequent to transmitting the payment authorization request, configured to cause the Proxy Service Manager Server computer to:
receive a payment authorization denied message; and
transmit the payment authorization denied message to a merchant device.
17. The non-transitory computer readable medium of claim 14, wherein the instructions for transmitting the payment authorization request to an Acquirer FI Server computer further comprises instructions configured to cause the Proxy Service Manager Server computer to transmit merchant identification information.
18. The non-transitory computer readable medium of claim 17, storing further instructions, subsequent to the instructions for transmitting the payment authorization request to an Acquirer FI Server computer, instructions configured to cause the Proxy Service Manager Server computer to receive a payment authorization denied message based on the merchant identification information.
19. A remote payments assurance system, comprising:
a Proxy Service Manager Server computer;
an Authentication Service Manager Server computer comprising an Authentication Service Manager Server processor operably connected to a storage device, the Authentication Service Manager Server computer operably connected to the Proxy Service Manager Server computer;
an Acquirer Financial Institution (FI) Server computer in communication with the Proxy Service Manager Server computer;
a payment network operably connected to the Acquirer FI Server computer; and
an Issuer FI server computer operably connected to the payment network;
wherein the storage device of the Authentication Service Manager Server computer stores instructions configured to cause the Authentication Service Manager Server processor to:
receive from the Proxy Service Manager computer having a relationship with an Acquirer FI, a consumer identifier;
retrieve, based on the consumer identifier, a MS-ISDN number from a database storing consumer mobile device data;
match the consumer identifier to data stored in a database;
transmit, by utilizing the MS-ISDN number, a challenge/response request to a consumer device;
receive a correct response to the challenge/response request from the consumer device;
generate a unique and non-repudiable AAV token; and
transmit the non-repudiable AAV token to a Proxy Service Manager Server computer.
20. The system of claim 19, further comprising, subsequent to the instructions for receiving the consumer identifier, instructions configured for causing the Proxy Service Manager Server processor to:
fail to match the consumer identifier to data stored in the database; and
transmit an authentication failure message to the Proxy Service Manager Server computer.
21. A non-transitory computer readable medium storing instructions for authenticating a consumer by causing an Authentication Service Manager Server computer to:
receive from the Proxy Service Manager computer having a relationship with an Acquirer FI, a consumer identifier;
retrieve, based on the consumer identifier, a MS-ISDN number from a database storing consumer mobile device data;
match the consumer identifier to data stored in a database;
transmit, by utilizing the MS-ISDN number, a challenge/response request to a consumer device;
receive a correct response to the challenge/response request from the consumer device;
generate a unique and non-repudiable AAV token; and
transmit the non-repudiable AAV token to a Proxy Service Manager Server computer.
22. The non-transitory computer readable medium of claim 21, storing further instructions, subsequent to the instructions for receiving the consumer identifier, instructions configured for causing the Authentication Service Manager Server computer to:
fail to match the consumer identifier to data stored in the database; and
transmit an authentication failure message to the Proxy Service Manager Server computer.
US15/936,708 2011-07-15 2018-03-27 Methods and systems for payments assurance Abandoned US20180240115A1 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
US15/936,708 US20180240115A1 (en) 2011-07-15 2018-03-27 Methods and systems for payments assurance

Applications Claiming Priority (3)

Application Number Priority Date Filing Date Title
US201161508325P 2011-07-15 2011-07-15
US13/547,445 US9947010B2 (en) 2011-07-15 2012-07-12 Methods and systems for payments assurance
US15/936,708 US20180240115A1 (en) 2011-07-15 2018-03-27 Methods and systems for payments assurance

Related Parent Applications (1)

Application Number Title Priority Date Filing Date
US13/547,445 Continuation US9947010B2 (en) 2011-07-15 2012-07-12 Methods and systems for payments assurance

Publications (1)

Publication Number Publication Date
US20180240115A1 true US20180240115A1 (en) 2018-08-23

Family

ID=47519485

Family Applications (2)

Application Number Title Priority Date Filing Date
US13/547,445 Active 2035-05-01 US9947010B2 (en) 2011-07-15 2012-07-12 Methods and systems for payments assurance
US15/936,708 Abandoned US20180240115A1 (en) 2011-07-15 2018-03-27 Methods and systems for payments assurance

Family Applications Before (1)

Application Number Title Priority Date Filing Date
US13/547,445 Active 2035-05-01 US9947010B2 (en) 2011-07-15 2012-07-12 Methods and systems for payments assurance

Country Status (3)

Country Link
US (2) US9947010B2 (en)
SG (2) SG10201706477YA (en)
WO (1) WO2013012671A1 (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110557699A (en) * 2019-09-11 2019-12-10 百度在线网络技术(北京)有限公司 intelligent sound box interaction method, device, equipment and storage medium
US11177956B2 (en) * 2018-10-25 2021-11-16 Advanced New Technologies Co., Ltd. Identity authentication, number saving and sending, and number binding method, apparatus and device
WO2022240578A1 (en) * 2021-05-12 2022-11-17 Mastercard International Incorporated Secure channel establishment

Families Citing this family (57)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20050229003A1 (en) 2004-04-09 2005-10-13 Miles Paschini System and method for distributing personal identification numbers over a computer network
US10205721B2 (en) 2002-12-10 2019-02-12 Ewi Holdings, Inc. System and method for distributing personal identification numbers over a computer network
US7131578B2 (en) 2003-05-28 2006-11-07 Ewi Holdings, Inc. System and method for electronic prepaid account replenishment
US11475436B2 (en) 2010-01-08 2022-10-18 Blackhawk Network, Inc. System and method for providing a security code
US11599873B2 (en) 2010-01-08 2023-03-07 Blackhawk Network, Inc. Systems and methods for proxy card and/or wallet redemption card transactions
US7280644B2 (en) 2004-12-07 2007-10-09 Ewi Holdings, Inc. Transaction processing platform for faciliating electronic distribution of plural prepaid services
US10296895B2 (en) 2010-01-08 2019-05-21 Blackhawk Network, Inc. System for processing, activating and redeeming value added prepaid cards
US10037526B2 (en) 2010-01-08 2018-07-31 Blackhawk Network, Inc. System for payment via electronic wallet
MX2012007926A (en) * 2010-01-08 2012-08-03 Blackhawk Network Inc A system for processing, activating and redeeming value added prepaid cards.
EP2601632A4 (en) 2010-08-27 2016-04-27 Blackhawk Network Inc Prepaid card with savings feature
US8538845B2 (en) 2011-06-03 2013-09-17 Mozido, Llc Monetary transaction system
US20120317028A1 (en) * 2011-06-13 2012-12-13 Blackhawk Network, Inc. System, Method, and Apparatus for Creating and Distributing a Transaction Credit
US10438196B2 (en) 2011-11-21 2019-10-08 Mozido, Inc. Using a mobile wallet infrastructure to support multiple mobile wallet providers
US9208488B2 (en) 2011-11-21 2015-12-08 Mozido, Inc. Using a mobile wallet infrastructure to support multiple mobile wallet providers
US9111301B2 (en) 2011-12-13 2015-08-18 Boku, Inc. Activating an account based on an SMS message
US9129320B2 (en) 2012-02-08 2015-09-08 Boku, Inc. Default phone bill charging
US20130211930A1 (en) * 2012-02-14 2013-08-15 Boku, Inc. Transaction authentication with an msisdn at a pos routed through a merchant acquirer computer system
US8630904B2 (en) 2012-02-14 2014-01-14 Boku, Inc. Transaction authentication with a variable-type user-stored account identifier
US20130211931A1 (en) * 2012-02-14 2013-08-15 Boku, Inc. Transaction authentication with a non-pan id and pin
US10395223B2 (en) 2012-03-07 2019-08-27 Early Warning Services, Llc System and method for transferring funds
US11593800B2 (en) 2012-03-07 2023-02-28 Early Warning Services, Llc System and method for transferring funds
US11042870B2 (en) 2012-04-04 2021-06-22 Blackhawk Network, Inc. System and method for using intelligent codes to add a stored-value card to an electronic wallet
US11210648B2 (en) 2012-10-17 2021-12-28 Royal Bank Of Canada Systems, methods, and devices for secure generation and processing of data sets representing pre-funded payments
US11080701B2 (en) 2015-07-02 2021-08-03 Royal Bank Of Canada Secure processing of electronic payments
CA2830260C (en) 2012-10-17 2021-10-12 Royal Bank Of Canada Virtualization and secure processing of data
GB2508015A (en) * 2012-11-19 2014-05-21 Mastercard International Inc Method and apparatus for secure card transactions
CA3171304A1 (en) 2012-11-20 2014-05-30 Blackhawk Network, Inc. Method for using intelligent codes in conjunction with stored-value cards
CN105580038A (en) 2013-07-24 2016-05-11 维萨国际服务协会 Systems and methods for interoperable network token processing
RU2691843C2 (en) 2013-10-11 2019-06-18 Виза Интернэшнл Сервис Ассосиэйшн Network token system
US10007909B2 (en) * 2013-12-02 2018-06-26 Mastercard International Incorporated Method and system for secure transmission of remote notification service messages to mobile devices without secure elements
US9846878B2 (en) * 2014-01-14 2017-12-19 Visa International Service Association Payment account identifier system
US9858572B2 (en) 2014-02-06 2018-01-02 Google Llc Dynamic alteration of track data
US9858360B2 (en) 2014-03-10 2018-01-02 Make It Leo Ltd System and method for controlling manufacturing of an item
WO2015160686A1 (en) * 2014-04-14 2015-10-22 Mastercard International Incorporated Systems, apparatus and methods for improved authentication
US20150324796A1 (en) * 2014-05-09 2015-11-12 TollShare, Inc. Device-based payment authorization
US9690924B2 (en) * 2014-05-15 2017-06-27 Microsoft Technology Licensing, Llc Transparent two-factor authentication via mobile communication device
US9424574B2 (en) 2014-05-16 2016-08-23 Bank Of America Corporation Tokenization of user accounts for direct payment authorization channel
US11023890B2 (en) 2014-06-05 2021-06-01 Visa International Service Association Identification and verification for provisioning mobile application
US20160005042A1 (en) * 2014-07-02 2016-01-07 Mistral Mobile Host card emulation out-of-bound device binding verification
US11295308B1 (en) 2014-10-29 2022-04-05 The Clearing House Payments Company, L.L.C. Secure payment processing
US9461998B2 (en) * 2014-10-31 2016-10-04 Facebook, Inc. Techniques for call-based user verification
CN104599124A (en) * 2015-01-06 2015-05-06 宇龙计算机通信科技(深圳)有限公司 Protection method and device of mobile payment information and mobile payment system
EP3248159A4 (en) 2015-01-19 2018-08-01 Royal Bank Of Canada Secure processing of electronic payments
US11354651B2 (en) 2015-01-19 2022-06-07 Royal Bank Of Canada System and method for location-based token transaction processing
US10410208B2 (en) * 2015-04-24 2019-09-10 Capital One Services, Llc Token identity devices
GB201507047D0 (en) * 2015-04-24 2015-06-10 Visa Europe Ltd Method of retaining transaction context
US10541996B1 (en) 2015-06-15 2020-01-21 National Technology & Engineering Solutions Of Sandia, Llc Methods and systems for authenticating identity
EP3110099B1 (en) * 2015-06-24 2018-10-31 Accenture Global Services Limited Device authentication
US11599879B2 (en) * 2015-07-02 2023-03-07 Royal Bank Of Canada Processing of electronic transactions
US11386410B2 (en) * 2015-07-21 2022-07-12 Early Warning Services, Llc Secure transactions with offline device
US10535047B1 (en) 2015-11-19 2020-01-14 Wells Fargo Bank N.A. Systems and methods for financial operations performed at a contactless ATM
US10706400B1 (en) * 2015-11-19 2020-07-07 Wells Fargo Bank, N.A. Systems and methods for financial operations performed at a contactless ATM
US11250432B2 (en) 2016-04-13 2022-02-15 America Express Travel Related Services Company, Inc. Systems and methods for reducing fraud risk for a primary transaction account
CN108462580B (en) * 2017-02-22 2020-07-07 腾讯科技(深圳)有限公司 Numerical value transferring method and device
US10922673B2 (en) * 2018-02-09 2021-02-16 The Toronto-Dominion Bank Real-time authorization of initiated data exchanges based on tokenized data having limited temporal or geographic validity
SG11202010334XA (en) * 2018-04-24 2020-11-27 Visa Int Service Ass Efficient and secure authentication system
US20200019968A1 (en) * 2018-07-11 2020-01-16 Capital One Services, Llc System and method for authenticating transactions from a mobile device

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5892900A (en) * 1996-08-30 1999-04-06 Intertrust Technologies Corp. Systems and methods for secure transaction management and electronic rights protection
US20070038581A1 (en) * 2005-08-09 2007-02-15 Keresman Michael A Iii Web terminal and bridge that support passing of authentication data to acquirer for payment processing
US20080189186A1 (en) * 2004-08-25 2008-08-07 Choi Jun-Won Authentication and Payment System and Method Using Mobile Communication Terminal
US20110178926A1 (en) * 2010-01-19 2011-07-21 Mike Lindelsee Remote Variable Authentication Processing
US20110251910A1 (en) * 2010-04-13 2011-10-13 James Dimmick Mobile Phone as a Switch
US20120030047A1 (en) * 2010-06-04 2012-02-02 Jacob Fuentes Payment tokenization apparatuses, methods and systems
US20120123940A1 (en) * 2010-11-16 2012-05-17 Killian Patrick L Methods and systems for universal payment account translation
US20130018779A1 (en) * 2011-07-14 2013-01-17 Bank Of America Corporation Alias-based merchant transaction system

Family Cites Families (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6327578B1 (en) * 1998-12-29 2001-12-04 International Business Machines Corporation Four-party credit/debit payment protocol
DE1136961T1 (en) 2000-03-24 2003-05-28 Mobipay International S A System and method for real-time remote payments and transactions using a mobile phone
US8260723B2 (en) * 2000-12-01 2012-09-04 Carrott Richard F Transactional security over a network
WO2003042938A2 (en) * 2001-11-14 2003-05-22 Encorus Technologies Gmbh Payment protocol and data transmission method and data transmission device for conducting payment transactions
US7360694B2 (en) 2003-01-23 2008-04-22 Mastercard International Incorporated System and method for secure telephone and computer transactions using voice authentication
KR20060034228A (en) 2003-06-04 2006-04-21 마스터카드 인터내셔날, 인코포레이티드 Customer authentication in e-commerce transactions
US20070284436A1 (en) * 2006-06-07 2007-12-13 Micah Alexander Gland Credit card payment system
US8812401B2 (en) * 2007-11-20 2014-08-19 Propay Usa Inc. Secure payment capture processes
US20100133335A1 (en) * 2008-11-28 2010-06-03 Hazem Abdel Maguid System and method for mobile payment
US20100312703A1 (en) 2009-06-03 2010-12-09 Ashish Kulpati System and method for providing authentication for card not present transactions using mobile device
WO2011019660A2 (en) * 2009-08-10 2011-02-17 Visa International Service Association Systems and methods for enrolling users in a payment service

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5892900A (en) * 1996-08-30 1999-04-06 Intertrust Technologies Corp. Systems and methods for secure transaction management and electronic rights protection
US20080189186A1 (en) * 2004-08-25 2008-08-07 Choi Jun-Won Authentication and Payment System and Method Using Mobile Communication Terminal
US20070038581A1 (en) * 2005-08-09 2007-02-15 Keresman Michael A Iii Web terminal and bridge that support passing of authentication data to acquirer for payment processing
US20110178926A1 (en) * 2010-01-19 2011-07-21 Mike Lindelsee Remote Variable Authentication Processing
US20110251910A1 (en) * 2010-04-13 2011-10-13 James Dimmick Mobile Phone as a Switch
US20120030047A1 (en) * 2010-06-04 2012-02-02 Jacob Fuentes Payment tokenization apparatuses, methods and systems
US20120123940A1 (en) * 2010-11-16 2012-05-17 Killian Patrick L Methods and systems for universal payment account translation
US20130018779A1 (en) * 2011-07-14 2013-01-17 Bank Of America Corporation Alias-based merchant transaction system

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
J. Raposo, M. Alvarez, A. Vina, P. Montoto, J. Hidalgo and A. Pan, "A Web agent for automating e-commerce operations," EEE International Conference on E-Commerce, 2003. CEC 2003., Newport Beach, CA, USA, 2003, pp. 16-19, doi: 10.1109/COEC.2003.1210225. (Year: 2003) *
Kennedy, Joe "The Small Business Owner's Manual: Everything You Need to Know to Start Up and Run Your Business," United States, 2005, Red Wheel/Weiser page 264 (Year: 2005) *

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US11177956B2 (en) * 2018-10-25 2021-11-16 Advanced New Technologies Co., Ltd. Identity authentication, number saving and sending, and number binding method, apparatus and device
US20220029809A1 (en) * 2018-10-25 2022-01-27 Advanced New Technologies Co., Ltd. Identity authentication, number saving and sending, and number binding method, apparatus and device
US11677555B2 (en) * 2018-10-25 2023-06-13 Advanced New Technologies Co., Ltd. Identity authentication, number saving and sending, and number binding method, apparatus and device
CN110557699A (en) * 2019-09-11 2019-12-10 百度在线网络技术(北京)有限公司 intelligent sound box interaction method, device, equipment and storage medium
WO2022240578A1 (en) * 2021-05-12 2022-11-17 Mastercard International Incorporated Secure channel establishment

Also Published As

Publication number Publication date
SG10201706477YA (en) 2017-09-28
US9947010B2 (en) 2018-04-17
SG10201605288SA (en) 2016-08-30
WO2013012671A1 (en) 2013-01-24
US20130018793A1 (en) 2013-01-17

Similar Documents

Publication Publication Date Title
US20180240115A1 (en) Methods and systems for payments assurance
US11398910B2 (en) Token provisioning utilizing a secure authentication system
US10748147B2 (en) Adaptive authentication options
US20230385796A1 (en) System and method of tokenizing deposit account numbers for use at payment card acceptance point
US11475445B2 (en) Secure authentication system with token service
US10313321B2 (en) Tokenization of co-network accounts
RU2699686C1 (en) Use of improved card holder authentication token
US10764269B2 (en) Method and system for creating a unique identifier
US10572875B2 (en) Online account authentication service
US7707120B2 (en) Mobile account authentication service
US8317090B2 (en) Methods and systems for performing a financial transaction
US11777934B2 (en) Method and system for token provisioning and processing
AU2016200994A1 (en) Payment channel returning limited use proxy dynamic value
CA2967781C (en) Providing online cardholer authentication services on-behalf-of issuers
US20150039506A1 (en) Methods and systems for providing 3-d secure service on-behalf-of merchants
CA3016858C (en) Tokenization of co-network accounts
US20180316687A1 (en) System and method for generating access credentials
WO2018182901A1 (en) Authentication using transaction history
US20210279734A1 (en) Real time interaction processing system and method
US11423392B1 (en) Systems and methods for information verification using a contactless card
EP3712828A1 (en) Payment token mechanism
US20230231717A1 (en) Domain validations using verification values

Legal Events

Date Code Title Description
STPP Information on status: patent application and granting procedure in general

Free format text: DOCKETED NEW CASE - READY FOR EXAMINATION

STPP Information on status: patent application and granting procedure in general

Free format text: NON FINAL ACTION MAILED

STPP Information on status: patent application and granting procedure in general

Free format text: FINAL REJECTION MAILED

STPP Information on status: patent application and granting procedure in general

Free format text: DOCKETED NEW CASE - READY FOR EXAMINATION

STPP Information on status: patent application and granting procedure in general

Free format text: NON FINAL ACTION MAILED

STPP Information on status: patent application and granting procedure in general

Free format text: RESPONSE TO NON-FINAL OFFICE ACTION ENTERED AND FORWARDED TO EXAMINER

STPP Information on status: patent application and granting procedure in general

Free format text: FINAL REJECTION MAILED

STPP Information on status: patent application and granting procedure in general

Free format text: RESPONSE AFTER FINAL ACTION FORWARDED TO EXAMINER

STPP Information on status: patent application and granting procedure in general

Free format text: ADVISORY ACTION MAILED

STPP Information on status: patent application and granting procedure in general

Free format text: DOCKETED NEW CASE - READY FOR EXAMINATION

STPP Information on status: patent application and granting procedure in general

Free format text: NON FINAL ACTION MAILED

STPP Information on status: patent application and granting procedure in general

Free format text: RESPONSE TO NON-FINAL OFFICE ACTION ENTERED AND FORWARDED TO EXAMINER

STPP Information on status: patent application and granting procedure in general

Free format text: ADVISORY ACTION MAILED

STCB Information on status: application discontinuation

Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION