US20200234301A1 - Passive cardholder verification method in mobile device - Google Patents
Passive cardholder verification method in mobile device Download PDFInfo
- Publication number
- US20200234301A1 US20200234301A1 US16/841,830 US202016841830A US2020234301A1 US 20200234301 A1 US20200234301 A1 US 20200234301A1 US 202016841830 A US202016841830 A US 202016841830A US 2020234301 A1 US2020234301 A1 US 2020234301A1
- Authority
- US
- United States
- Prior art keywords
- cvm
- mobile device
- user
- processor
- smartphone
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Abandoned
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/40—Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
- G06Q20/401—Transaction verification
- G06Q20/4012—Verifying personal identification numbers [PIN]
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/08—Payment architectures
- G06Q20/20—Point-of-sale [POS] network systems
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/30—Payment architectures, schemes or protocols characterised by the use of specific devices or networks
- G06Q20/32—Payment architectures, schemes or protocols characterised by the use of specific devices or networks using wireless devices
- G06Q20/322—Aspects of commerce using mobile devices [M-devices]
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/30—Payment architectures, schemes or protocols characterised by the use of specific devices or networks
- G06Q20/32—Payment architectures, schemes or protocols characterised by the use of specific devices or networks using wireless devices
- G06Q20/327—Short range or proximity payments by means of M-devices
- G06Q20/3278—RFID or NFC payments by means of M-devices
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/40—Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
- G06Q20/401—Transaction verification
- G06Q20/4014—Identity check for transactions
- G06Q20/40145—Biometric identity checks
Definitions
- Payment cards such as credit cards and debit cards are in widespread use. In some environments, payment cards in the form of magnetic stripe cards prevail in terms of popularity. In other environments, it is more common to use so-called “contactless” payment cards.
- contactless payment cards the payment card account number is stored in an integrated circuit (IC) within the card, and is read by short-range radio communication between the card and the contactless reader component of a point of sale (POS) terminal.
- POS point of sale
- NFC near field communication
- These mobile devices may utilize a secure element (SE) to store the payment card account number and associated data, keys and Personal Identification Number (PIN) to enable the consumer to perform a payment transaction using the NFC short-range radio communications provided by the mobile device and the contactless reader component of a POS terminal.
- SE secure element
- PIN Personal Identification Number
- CVM cardholder verification method
- FIG. 1 is a block diagram that illustrates a system in which the present disclosure may be applied.
- FIG. 2 is a block diagram that illustrates an example embodiment of a payment-enabled smartphone provided in accordance with aspects of the present disclosure.
- FIG. 2A is a diagram that shows some details of the system of FIG. 1 , as provided in accordance with some embodiments.
- FIGS. 3-5 are flow charts that illustrate processes that may be performed by or in connection with the smartphone of FIG. 2 according to aspects of the present disclosure.
- a payment-enabled mobile device applies one or more “passive” CVM processes on an ongoing basis to provide a primary or supplemental assurance that the payment-enabled mobile device remains in the possession of the authorized user.
- CVM processes there may be an automated facial recognition of the user via a forward-facing camera on the payment-enabled mobile device and/or a voice recognition algorithm applied to the user's utterances during telephone calls using the device and/or an analysis of the user's gait while walking, as detected via one or more motion sensing components of the device.
- the passive CVM process may occur in background to other processes implemented by the device, such that the user is not even aware that the passive CVM process is occurring.
- passive/background CVM processing may be deployed in conjunction with selective requirements for active CVM compliance as part of a risk management strategy that may achieve a superior balance of user convenience with achievement of the risk management goals of payment card account issuers.
- FIG. 1 is a block diagram that illustrates a payment system 100 in which teachings of the present disclosure may be applied.
- the payment system 100 includes a payment-enabled smartphone 102 .
- the smartphone 102 may be operable as a mobile telephone, while also being able to perform functions of a payment device and also embodying passive CVM functionality as provided in accordance with aspects of the present disclosure and as described below. Further details of the smartphone 102 are described below in conjunction with FIGS. 2-5 .
- the payment system 100 further includes a proximity reader component 104 associated with a POS terminal 106 .
- the proximity reader component 104 and the POS terminal 106 may be substantially or entirely conventional.
- both the proximity reader component 104 and the smartphone 102 may include capabilities for NFC communication, so that those two devices may engage in communication with each other in accordance with the NFC standard.
- one or more other methods of communication may take place between the smartphone 102 and the proximity reader component 104 instead of or in addition to NFC communication; such communications may result in the mobile device transacting with a reader component 104 through the internet.
- communication between the smartphone 102 and the proximity reader component 104 may be initiated by the user (not shown) tapping the smartphone 102 on an appropriate location on the housing (not separately shown) of the proximity reader component 104 .
- the proximity reader component 104 and the POS terminal 106 may be located at the premises of a retail store and operated by a sales associate of the retailer for the purpose of processing retail transactions.
- the smartphone 102 is shown in FIG. 1 to be interacting with the proximity reader component 104 and the POS terminal 106 for the purpose of executing such a transaction.
- a computer 108 operated by an acquirer is also shown as part of the system 100 in FIG. 1 .
- the acquirer computer 108 may operate in a conventional manner to receive an authorization request for the transaction from the POS terminal 106 .
- the acquirer computer 108 may route the authorization request via a payment network 110 to the server computer 112 operated by the issuer of a payment card account that is available for access by the smartphone 102 .
- the authorization response generated by the payment card issuer server computer 112 may be routed back to the POS terminal 106 via the payment network 110 and the acquirer computer 108 .
- the payment network 110 may be entirely or substantially conventional; one example of a suitable payment network is the well-known Banknet system operated by MasterCard International Incorporated, which is the assignee hereof.
- the payment card issuer server computer 112 may be conventional and may be operated by or on behalf of a financial institution (“FI”; not separately shown) that issues payment card accounts to individual users.
- the payment card issuer server computer 112 may perform conventional functions, such as (a) receiving and responding to requests for authorization of payment card account transactions to be charged to payment card accounts issued by the FI; and (b) tracking and storing transactions and maintaining account records.
- the POS terminal 106 and the payment card issuer server computer 112 may be conventional in some embodiments, in other embodiments one or more of those devices may be programmed to receive passive CVM information provided by the payment-enabled smartphone 102 , and to use the passive CVM information as a factor in a risk based decision (RBD) as to whether the transaction should be allowed to occur.
- RDB risk based decision
- the purchase transaction may be completed at the point of sale.
- the payment network 110 may facilitate a subsequent clearing process that results in a charge to the user's payment card account issued by the issuing FI and a credit to the bank account (at the acquiring FI) that belongs to the merchant that operates the POS terminal 106 .
- a remote payment credential server 120 that may be available in some embodiments for over-the-air interaction with the payment-enabled smartphone 102 .
- the payment credential server 120 may aid in realizing a cloud-based implementation of aspects of the present disclosure. Communication between the payment-enabled smartphone 102 and the remote server may take place via the over-the-air communication channel indicated by reference numeral 122 .
- the passive CVM functionality of the smartphone 102 may depend at least in part on a biometric signal received by the smartphone 102 from another device.
- a biometric signal received by the smartphone 102 from another device.
- a separate device may be, for example, a wearable device (reference numeral 124 in FIG. 1 ) that is worn by a user of the smartphone 102 and that may be, for example, a wristwatch/wristband heartbeat monitor.
- the smartphone 102 may be in communication with the biometric wearable device 124 via a short-range wireless communication channel 126 (Bluetooth, e.g.).
- Bluetooth Bluetooth
- the components of the payment system 100 as depicted in FIG. 1 are only those that are needed for processing a single transaction.
- a typical practical embodiment of the payment system 100 may process many purchase transactions (including simultaneous transactions) and may include a considerable number of payment card issuers and their computers, a considerable number of acquirers and their computers, and numerous merchants and their POS terminals and associated proximity reader components.
- the system may also include a very large number of payment card account holders, who carry payment-enabled mobile devices (such as the smartphone 102 described herein) and/or payment cards (including contactless payment cards and/or magnetic stripe cards). If cloud-based HCE is employed, there may be more than one remote server 120 that supports such functionality.
- the smartphone 102 is operable as a conventional mobile telephone for communication—both voice and data—over a conventional mobile telecommunications network, which is not depicted in the drawing.
- the smartphone 102 may be in communication from time to time in a conventional manner with a mobile network operator (“MNO”—also not shown).
- MNO mobile network operator
- An over-the air communication channel (like the channel 122 shown in FIG. 1 ) between the smartphone 102 and the payment card issuer server computer 112 (or a related computer) may be established from time to time for purposes such as personalization, set up, etc. with respect to the smartphone 102 .
- FIG. 2 is a block diagram that illustrates an example embodiment of the payment-enabled smartphone 102 shown in FIG. 1 and provided in accordance with aspects of the present disclosure.
- the smartphone 102 may be conventional in its hardware aspects.
- the smartphone 102 may resemble, in most or all of its hardware aspects and many of its functions, a conventional “iPhone” marketed by Apple Inc., or one of the numerous smartphone models that run the “Android” operating system.
- the smartphone 102 may include a conventional housing (indicated by dashed line 202 in FIG. 2 ) that contains and/or supports the other components of the smartphone 102 .
- the housing 202 may be shaped and sized to be held in a user's hand, and may for example exhibit the type of form factor that is common with the current generation of smartphones.
- the smartphone 102 further includes conventional control circuitry 204 , for controlling over-all operation of the smartphone 102 .
- the control circuitry 204 may include a conventional processor of the type designed to be the “brains” of a smartphone.
- Other components of the smartphone 102 which are in communication with and/or controlled by the control circuitry 204 , include: (a) one or more memory devices 206 (e.g., program and working memory, etc.); (b) a conventional SIM (subscriber identification module) card 208 ; and (c) a conventional touchscreen 212 which serves as the primary input/output device for the smartphone 102 , and which thus receives input information from the user and displays output information to the user.
- the smartphone 102 may also include a few physically-actuatable switches/controls (not shown), such as an on/off/reset switch, a menu button, a “back” button, a volume control switch, etc.
- the smartphone 102 may include two cameras (reference numeral 213 ), including one camera (not separately shown) that faces towards the user at times when the user is viewing the touchscreen 212 .
- the latter camera will hereinafter be referred to as the forward-facing camera 213 .
- the components of the smartphone 102 may include one or more accelerometers 214 .
- the smartphone 102 also includes conventional receive/transmit circuitry 216 that is also in communication with and/or controlled by the control circuitry 204 .
- the receive/transmit circuitry 216 is coupled to an antenna 218 and provides the communication channel(s) by which the smartphone 102 communicates via the mobile telephone communication network (not shown).
- the receive/transmit circuitry 216 may operate both to receive and transmit voice signals, in addition to performing data communication functions.
- the smartphone 102 further includes a conventional microphone 220 , coupled to the receive/transmit circuitry 216 .
- the microphone 220 is for receiving voice input from the user.
- a loudspeaker 222 is included to provide sound output to the user, and is coupled to the receive/transmit circuitry 216 .
- the receive/transmit circuitry 216 may operate in a conventional fashion to transmit, via the antenna 218 , voice signals generated by the microphone 220 , and to reproduce, via the loudspeaker 222 , voice signals received via the antenna 218 .
- the receive/transmit circuitry 216 may also handle transmission and reception of text messages and other data communications via the antenna 218 .
- voice signals input by the user via the microphone 220 may be supplied in digital form to the control circuitry 202 or other processing capability of the smartphone 202 to allow for analysis of the voice signals by the smartphone 102 .
- the smartphone 102 may also include circuitry 224 that is partly or wholly dedicated to implementing the NFC communications circuitry functionality of the smartphone 102 .
- the smartphone 102 may further include a loop antenna 226 , coupled to the NFC circuitry 224 .
- the NFC circuitry 224 may partially overlap with the control circuitry 204 for the smartphone 102 .
- the NFC circuitry 224 is associated with, and may also overlap with, a secure element 228 , or the NFC circuitry could be omitted in embodiments that do not utilize NFC. While secure elements have been proposed for incorporation with some payment-enabled smartphones, there have been other proposals that provide a desirable secure processing environment without a physically separate element. Accordingly, the secure element 228 is shown in phantom, as an optional component of the smartphone 102 .
- secure element is well known to those who are skilled in the art, and typically refers to a device that may include a small processor and volatile and nonvolatile memory (not separately shown) that are secured from tampering and/or reprogramming by suitable measures.
- the secure element 228 may be provided as part of the SIM card 208 .
- the secure element 228 may be constituted by an integrated circuit card separate from the SIM card 208 but possibly having the same form factor as the SIM card 208 .
- the secure element 228 may be conventional in its hardware aspects but may be programmed in accordance with aspects of the present disclosure in a manner to be described below.
- secure element is not intended to be limited to devices that are IC-based, but rather may also include any secure execution environment in a mobile device, and may include software based secure execution environments running on the main mobile device processor.
- the main control circuitry may be programmed to execute the payment processing functionality in full or in part with access from the smartphone 102 to the payment credential server 120 .
- one or more aspects of a conventional secure element may be implemented on the main processor of the smartphone 102 .
- the known technique of host card emulation (HCE) may be employed.
- the payment functionality may reside in a Trusted Execution Environment (TEE).
- TEE Trusted Execution Environment
- FIG. 2A is a diagram that shows some details of the payment-enabled smartphone 102 , and/or the payment credential server 120 , as provided in accordance with some embodiments.
- FIG. 2A shows a payment application processor 250 , which may be implemented in whole or in part by one or more of the secure element 228 (if present), the main processor/control circuit 204 , and/or the payment credential server 120 .
- the payment application processor 250 may run a payment application 252 .
- the payment application 252 may program the payment application processor 250 to implement CVM functionality in accordance with teachings of this disclosure and as described below in connection with FIGS. 3-5 .
- the payment application processor 250 may also store one or more payment credentials 254 , such as one or more primary account numbers (PANs) and/or payment tokens that represent or point to one or more payment card accounts issued to the user of the smartphone 102 , as well as associated information such as encryption keys.
- PANs primary account numbers
- P tokens that represent or point to one or more payment card accounts issued to the user of the smartphone 102 , as well as associated information such as encryption keys.
- the payment application processor 250 may store one or more accumulators 256 that are utilized by the payment application 252 in applying risk management strategies that involve an “active” CVM process (i.e., a CVM process in which the user is prompted to provide an input such as a PIN).
- an “active” CVM process i.e., a CVM process in which the user is prompted to provide an input such as a PIN.
- the payment application processor 250 may store one or more accumulators 258 that are utilized by the payment application 252 in applying risk management strategies that involve a passive CVM process in accordance with teachings of this disclosure.
- FIGS. 4A / 4 B and 5 will describe the payment application's use of and interaction with the accumulators 256 and 258 .
- FIG. 3 is a flow chart that illustrates, at a high level, a process performed in the smartphone 102 in connection with set-up of the device and loading of required data, programs and settings.
- the smartphone 102 is subjected to a personalization process.
- the concept of personalization is well known to those who are skilled in the art, and may typically entail downloading, e.g., a payment application and one or more payment credentials.
- the payment application may include passive CVM functionality as described herein, and the personalization may also include setting of parameters suitable for use in a risk management strategy or strategies that utilize passive CVM in accordance with teachings of this disclosure.
- the smartphone 102 determines whether the user has indicated that he/she opts in for use of passive CVM.
- the user may do so, for example, in response to a proposal from the user's payment card account issuer.
- a proposal may convey to the user certain advantages (e.g., enhanced convenience, and/or access to certain mobile payment capabilities) that will accrue to him or her by agreeing to enable passive CVM processing in the smartphone 102 .
- the user may communicate his/her intention to opt in via a suitable interaction with the user interface of the smartphone 102 .
- operating parameters of the smartphone 102 are set in such a manner as to facilitate passive CVM processing in accordance with one or more examples as described below.
- an operating parameter may be set such that the forward-facing camera 213 remains constantly enabled as long as the smartphone is on; or alternatively, for as long as the touchscreen 212 is on. In this way, it can be relatively assured that the forward-facing camera is operative when an image of the user's face is available for capture to permit facial recognition processing.
- an operating parameter for of the smartphone 102 may be set such that the accelerometers are continuously enabled while the smartphone is turned on. This may facilitate availability of the supply of data from the accelerometers to allow for analysis of the user's walking gait a substantial proportion of the time when the user is actually walking around with the smartphone 102 in his/her possession.
- the operating parameters/settings for the smartphone 102 may be set at 306 so as to keep the necessary components of the device available to supply input data for passive CVM processing.
- the smartphone 102 may collect reference data required for subsequent passive CVM processing. For example, the user may be prompted to take a “selfie” (photo of his/her own face) to serve as a reference image for facial recognition processing that would verify subsequent images of the user's face.
- the smartphone 102 may automatically collect and/or analyze the first N minutes of speech input into the microphone 220 during phone calls utilizing the smartphone during the period after personalization (block 302 ) has occurred. From this analysis, the smartphone 102 may extract voice characteristic parameters in a conventional manner to provide a reference profile for the user's voice.
- the smartphone 102 may capture and/or analyze accelerometer output data for the first M minutes of motion patterns consistent with walking motion in the period after personalization. This analysis may be done in such a manner as to produce a reference profile for identifying the user's walking gait.
- the smartphone 102 may also collect other reference data as needed to support other types of passive CVM processing utilized by the smartphone 102 .
- the smartphone 102 may utilize one or more passive CVM processes as an exclusive manner of establishing that the user is authorized to use the smartphone 102 for payment purposes.
- passive CVM processing may constitute a portion of a risk management approach that also utilizes active CVM (e.g., PIN entry and verification) at some times or in some situations.
- active CVM e.g., PIN entry and verification
- passive CVM processing may be used as a complement to active CVM. For example, in an example embodiment illustrated in FIGS. 4A, 4B and 5 , relatively high value transactions may all require successful PIN entry, but a number of relatively small transactions may be allowed without PIN entry as long as a passive CVM process appears to indicate that the smartphone 102 remains in the authorized user's possession.
- the current evaluation by the smartphone 102 as to whether passive CVM is satisfied may be used as one input to a relatively complex RBD (risk based decision) process.
- the RBD process may be carried out at one or more of (a) the smartphone itself; (b) the point of sale; or (c) the payment card account issuer. Other factors in the RBD process may include, for example, type of merchant, location, time of day, amount of transaction, recent transaction history, etc.
- FIGS. 4A, 4B and 5 the above-mentioned CVM accumulators 256 and 258 ( FIG. 2A ) are used to track how many and/or what cumulative monetary amount of transactions has occurred since the most recent successful active or passive CVM process, as the case may be.
- the process steps shown in FIGS. 4A / 4 B and 5 may in some embodiments be performed in the secure element 228 , if present. In other embodiments, as suggested above, at least a portion of the processing logic may be performed in the main processor (control circuitry 204 ) of the smartphone 102 or in the payment credential server 120 .
- FIGS. 4A and 4B together form a flow chart of a process that uses both active and passive CVM for risk management, while FIG. 5 shows some additional details of the process of FIGS. 4A / 4 B.
- Block 402 in FIG. 4A represents setting limits for one or more of the CVM accumulators.
- the limits define, for each accumulator, what accumulator value triggers a requirement for a successful CVM process.
- the limits may be set, for example, during personalization (block 302 , FIG. 3 ).
- the smartphone 102 may determine whether an active CVM process has been successfully completed. For example, to make this determination, the smartphone 102 may prompt the user to enter a PIN and the smartphone (or other system component) may determine whether the PIN as entered is correct. If there is a positive determination at 404 (i.e., successful active CVM has occurred), then the process may advance from decision block 404 to block 406 . At block 406 , the smartphone 102 may reset all of the accumulators for both active and passive CVM processes. If a transaction is currently pending, block 406 may also include allowing the transaction to be completed.
- decision block 408 may follow in the absence of a successful active CVM.
- the smartphone 102 may determine whether the current status of the passive CVM process is indicative of the smartphone being in the possession of the authorized user. If so, then block 410 may follow decision block 408 in the process flow.
- the smartphone 102 may reset (i.e., clear) the accumulators that are relevant to requiring successful passive CVM. If a transaction is currently pending, block 410 may also include allowing the transaction to be completed.
- block 411 may follow decision block 408 .
- the current status of the process is that no successful CVM has occurred. If a transaction that requires CVM is currently pending, the transaction will not be permitted to go forward.
- a decision block 412 may follow block 410 of FIG. 4A to complete a loop comprising decision blocks 404 , 408 and 412 . In the absence of a positive determination at one of those decision blocks, the process may, in effect, idle (perhaps as one thread among many), without the CVM accumulators being reset.
- the smartphone 102 may determine whether the user is attempting to engage in a payment transaction using the smartphone. (From prior discussion, it will be appreciated that an attempt to engage in a transaction may involve tapping the smartphone 102 on the proximity reader 104 ( FIG. 1 ).) If a positive determination is made at block 412 in FIG. 4B (i.e., if the smartphone 102 determines that a transaction is being attempted), then the process flow may advance from decision block 412 to decision block 414 in FIG. 4B .
- the smartphone 102 may determine whether the attempted transaction is for a monetary amount that is above a threshold.
- the threshold may be such as to demarcate between transactions for which successful active CVM will always be required and transactions that will sometimes be allowed without active CVM.
- the risk management strategy may set the threshold at a level such as USD 50.00 or 25.00 or the like, with transactions below the threshold being deemed “low value” transactions.
- the risk management strategy may hold that a certain number of “low value” transactions (and/or a certain cumulative amount of “low value” transactions) may occur before requiring active CVM.
- the risk management strategy may further hold that a smaller number (and/or a lower cumulative amount) of “low value” transactions may be permitted in the absence of passive CVM having been satisfied. It will be understood that the accumulator limits set at 402 may have been set to implement such a risk management strategy.
- the process flow may advance from decision block 414 to block 416 in FIG. 4B .
- the smartphone may require compliance with active CVM and may prompt the user accordingly (e.g., by indicating that he/she should enter his/her PIN). From block 416 , the process flow may loop to decision block 404 in FIG. 4A .
- decision block 418 is concerned with comparing one of more of the active CVM accumulators with the relevant limit(s) established at 402 .
- the process flow would follow the “no” branch (i.e., the outcome is not below the established limit(s)) such that the process flow loops to block 416 , as described above (resulting in a requirement for an active CVM).
- decision block 420 is concerned with comparing one or more of the passive CVM accumulators with the relevant limit(s) for those accumulators as established at 402 .
- the process flow would follow the “no” branch such that the process flow may advance from decision block 420 to block 421 .
- the process logic may require that a CVM—either active or passive—be performed. The process may then loop from block 421 to decision blocks 404 ( FIG. 4A ), 408 , etc.
- the process flow may advance from decision block 420 to block 422 .
- the current transaction is allowed to proceed (i.e., without requiring a CVM), and the accumulators for the active and passive CVMs are incremented to reflect the current transaction.
- the process then may loop from block 422 to the loop of decision blocks 404 , 408 , 412 ( FIG. 4A ).
- the process flow logic expressed in FIGS. 4A and 4B would have the following consequences: For transactions above the “low value” threshold, active CVM would always be required. As long as passive CVM is successfully maintained, a certain number and/or cumulative amount of low value transactions would be permitted before an active CVM was required to be performed. If passive CVM success is not present, then only a smaller number and/or cumulative value of low value transactions would be permitted before requiring an active CVM to be performed. With this arrangement, for example, the payment card account issuer has the opportunity to set its risk management strategy with greater granularity than would be possible if the payment-enabled smartphone 102 did not have the passive CVM capability as described in this disclosure.
- FIGS. 4A and 4B can be partially summarized as follows: (A) Two transaction-number limits are established, with one of the limits lower than the other; (B) An active CVM requirement is applied when the lower limit is exceeded, unless a passive CVM condition has been satisfied; (C) When the higher limit is exceeded, the active CVM requirement is applied even if the passive CVM condition has been satisfied.
- transaction-number limit should be understood to include either or both of a limit on a number of transactions and a limit on a cumulative amount of transactions.
- passive CVM techniques include: (a) facial recognition analysis (e.g., via one or more images of the user's face captured by the forward facing camera on the smartphone 102 ); (b) user walking gait analysis, based on data provided from accelerometers that are components of the smartphone 102 ; (c) voice recognition analysis, based on spoken input by the user into the microphone component of the smartphone 102 ; (d) user gesture analysis based on interaction by the user with the touchscreen component of the smartphone 102 ; (e) analysis of the user's heartbeat (e.g., based on data wirelessly transmitted to the smartphone 102 from a wearable heartbeat sensor, such as a wristwatch/wristband—reference numeral 124 , FIG. 1 —worn by the user); and (f) the user's pattern of usage of application programs on the smartphone 102 .
- This list of possible passive CVM techniques is
- the passive CVM strategy employed in the smartphone 102 may rely on a combination of any two or more of such individual passive CVM techniques. Based on ongoing results of the various passive CVM analyses, the smartphone 102 may calculate a running passive CVM score, and may determine whether or not a passive CVM condition is satisfied based on the current value of the CVM score.
- FIG. 5 is a flow chart that illustrates an example process that the smartphone 102 may perform in connection with determining whether passive CVM has successfully occurred. As such, the process of FIG. 5 may be considered an example of supplemental details relative to the determination made at decision block 408 in FIG. 4A .
- the smartphone 102 may determine whether an activity relevant to passive CVM monitoring is currently occurring.
- an activity may include user interaction with the touchscreen, which may make it possible for the forward-facing camera 213 to capture an image of the user's face and/or which may provide input data to a gesture analysis process.
- an activity may include output from the accelerometers that is consistent with the smartphone 102 being carried by someone who is walking. Data output from the accelerometers at such times may be a suitable input for gait analysis.
- another suitable activity for possible passive CVM processing may be a telephone call via the smartphone 102 .
- the voice input by the user via the smartphone's microphone may be a suitable input for voice recognition analysis.
- Other suitable activity may occur simply when the smartphone is present within range to receive wirelessly-transmitted data signals from a heartbeat sensor that is worn by the user.
- any interaction by the user with applications on the smartphone 102 may provide input data for an analysis by the smartphone 102 of the user's application usage patterns.
- block 504 may follow decision block 502 .
- the smartphone 102 may proceed with an analysis of the input data made available via the relevant activity, and may compare the results of the analysis with reference data that was previously stored in the smartphone 102 . As a result of the analysis and comparison, the smartphone 102 may update a passive CVM score that constitutes an evaluation of the likelihood that the smartphone 102 is currently in the possession of the authorized user.
- a decision block 506 may follow block 504 .
- the smartphone 102 determines whether the current level of the passive CVM score indicates that it is reasonable to conclude that the smartphone 102 is in the authorized user's possession. If so, then block 508 may follow.
- the smartphone 102 may set a flag that indicates that passive CVM is currently satisfied, and also may reset a timer that is relevant to passive CVM. The process flow may then loop back from block 508 to decision block 502 .
- the process flow may proceed via the “no” branch from decision block 506 to decision block 510 .
- the smartphone 102 determines whether a time-out period has elapsed as to the passive-CVM-satisfied status. If the time-out has occurred, then the process flow may advance from decision block 510 to block 512 .
- the smartphone 102 may clear the flag that indicates that passive CVM has been satisfied. (It will be appreciated that the state of this flag may in some embodiments indicate the outcome of the determination at decision block 408 in FIG. 4A .)
- decision block 502 if a negative determination is made at that decision block (i.e., if no activity is occurring that is relevant to CVM processing), then the process flow may advance from decision block 502 to decision block 510 . Also, if a negative determination is made in decision block 510 (i.e., if passive-CVM-satisfied status has not timed-out), then the process flow may loop from decision block 510 to decision block 502 . It will be appreciated that the decision blocks 502 and 510 may thus form an idle loop (possibly among other processing threads in the smartphone 102 ) so long as no passive-CVM-relevant activity is occurring and the status time-out has not occurred.
- passive CVM processing may go on virtually continuously, so long as relevant activity (i.e., activity that provides meaningful data for passive CVM processing) is occurring. However, this need not necessarily be the case.
- passive CVM processing may occur only when triggered by certain events, such as: (a) the user waking up the smartphone 102 ; (b) the user opening a wallet application on the smartphone 102 ; (c) the user interacting with a payment application on the smartphone 102 ; (d) the smartphone 102 detecting that it has been carried into a retail store; etc.
- passive CVM processing may be turned off/inhibited for a predetermined timed period after a successful completion of an active CVM and/or for a certain number of low value transactions after a successful completion of an active CVM
- the resetting of accumulators relevant to passive CVM may occur upon one or more of an online authorization (i.e., confirmation of a PIN or prompted biometric at the issuer server); successful completion of an active (local) CVM; successful completion of a passive CVM; and completion of both an active (local) CVM and a passive CVM.
- an online authorization i.e., confirmation of a PIN or prompted biometric at the issuer server
- the smartphone 102 may transmit hashes and/or details of passively obtained biometric readings to the remote server 120 .
- Software that provides the passive CVM functionality described herein may be included in the above-mentioned payment application 252 ( FIG. 2A ) and/or may be stored in one or more other program memory components of the smartphone 102 and may program one or more processing components of the smartphone 102 .
- the term “computer” should be understood to encompass a single computer or two or more computers in communication with each other.
- processor should be understood to encompass a single processor or two or more processors in communication with each other.
- memory should be understood to encompass a single memory or storage device or two or more memories or storage devices.
- the term “payment card system account” includes a credit card account, a deposit account that the account holder may access using a debit card, a prepaid card account, or any other type of account from which payment transactions may be consummated.
- the terms “payment card system account” and “payment card account” are used interchangeably herein.
- the term “payment card account number” includes a number that identifies a payment card system account or a number carried by a payment card, or a number that is used to route a transaction in a payment system that handles debit card and/or credit card transactions.
- the term “payment card” includes a credit card, debit card, prepaid card, or other type of payment instrument, whether an actual physical card or virtual.
- the term “payment card system” refers to a system for handling purchase transactions and related transactions.
- An example of such a system is the one operated by MasterCard International Incorporated, the assignee of the present disclosure.
- the term “payment card system” may be limited to systems in which member financial institutions issue payment card accounts to individuals, businesses and/or other organizations.
Landscapes
- Business, Economics & Management (AREA)
- Engineering & Computer Science (AREA)
- Accounting & Taxation (AREA)
- Physics & Mathematics (AREA)
- Strategic Management (AREA)
- General Business, Economics & Management (AREA)
- General Physics & Mathematics (AREA)
- Theoretical Computer Science (AREA)
- Finance (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Telephone Function (AREA)
- Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
Abstract
In a payment-enabled smartphone, a customer verification method (CVM) may be performed without prompting the user to provide any input. An outcome of the resulting passive CVM process may be an input to a risk based decision process performed by the smartphone, by a point of sale terminal and/or by an issuer of a payment card account accessed via the payment-enabled smartphone. The risk based decision process may determine whether a payment transaction is approved or declined.
Description
- This application is a continuation application of U.S. patent application Ser. No. 16/454,414 filed on Jun. 27, 2019, which is a continuation application of U.S. patent application Ser. No. 14/276,071 filed on May 13, 2014 (issued as U.S. Pat. No. 10,380,588), which applications are incorporated herein by reference.
- Payment cards such as credit cards and debit cards are in widespread use. In some environments, payment cards in the form of magnetic stripe cards prevail in terms of popularity. In other environments, it is more common to use so-called “contactless” payment cards. With contactless payment cards, the payment card account number is stored in an integrated circuit (IC) within the card, and is read by short-range radio communication between the card and the contactless reader component of a point of sale (POS) terminal. With enhancements that have occurred to mobile phones, including smartphones, the capability has been added to perform NFC (near field communication) communications to enable so-called “contactless” payment cards to be digitized into these consumer devices. These mobile devices may utilize a secure element (SE) to store the payment card account number and associated data, keys and Personal Identification Number (PIN) to enable the consumer to perform a payment transaction using the NFC short-range radio communications provided by the mobile device and the contactless reader component of a POS terminal.
- For many payment transactions utilizing payment-enabled mobile phones, it is customary to require “two factor” security—that is, the user must not only present a physical credential (the mobile phone), but in addition a procedure must be followed to verify that the individual presenting the credential is authorized to do so. This additional required procedure is sometimes referred to in the payment card industry as a “cardholder verification method”, or “CVM”. A widely used CVM prompts the user to enter a “PIN”, i.e., a “personal identification number”; for example this may be done via the user interface of the mobile phone. If the PIN, as entered by the user, is determined to be correct, either on-device, locally, or at a remote server, then the CVM requirement is considered to have been satisfied. There have also been many proposals for CVM requirements in which the user submits biometric information via the mobile phone.
- The present inventors have now recognized that there are opportunities to increase the convenience and/or the sophistication of CVM processes for payment-enabled mobile phones and other mobile devices.
- Features and advantages of some embodiments of the present disclosure, and the manner in which the same are accomplished, will become more readily apparent upon consideration of the following detailed description of the disclosure taken in conjunction with the accompanying drawings, which illustrate preferred and exemplary embodiments and which are not necessarily drawn to scale, wherein:
-
FIG. 1 is a block diagram that illustrates a system in which the present disclosure may be applied. -
FIG. 2 is a block diagram that illustrates an example embodiment of a payment-enabled smartphone provided in accordance with aspects of the present disclosure. -
FIG. 2A is a diagram that shows some details of the system ofFIG. 1 , as provided in accordance with some embodiments. -
FIGS. 3-5 are flow charts that illustrate processes that may be performed by or in connection with the smartphone ofFIG. 2 according to aspects of the present disclosure. - In general, and for the purpose of introducing concepts of embodiments of the present disclosure, a payment-enabled mobile device applies one or more “passive” CVM processes on an ongoing basis to provide a primary or supplemental assurance that the payment-enabled mobile device remains in the possession of the authorized user. The term “passive”, in this context and in the ensuing discussion and appended claims, shall be understood to mean that the user is not prompted to submit input to the CVM process. Among other possible CVM processes that may occur in accordance of teachings of this disclosure, there may be an automated facial recognition of the user via a forward-facing camera on the payment-enabled mobile device and/or a voice recognition algorithm applied to the user's utterances during telephone calls using the device and/or an analysis of the user's gait while walking, as detected via one or more motion sensing components of the device. The passive CVM process may occur in background to other processes implemented by the device, such that the user is not even aware that the passive CVM process is occurring.
- In some embodiments, passive/background CVM processing may be deployed in conjunction with selective requirements for active CVM compliance as part of a risk management strategy that may achieve a superior balance of user convenience with achievement of the risk management goals of payment card account issuers.
-
FIG. 1 is a block diagram that illustrates a payment system 100 in which teachings of the present disclosure may be applied. - The payment system 100 includes a payment-enabled
smartphone 102. Thesmartphone 102 may be operable as a mobile telephone, while also being able to perform functions of a payment device and also embodying passive CVM functionality as provided in accordance with aspects of the present disclosure and as described below. Further details of thesmartphone 102 are described below in conjunction withFIGS. 2-5 . - The payment system 100 further includes a
proximity reader component 104 associated with aPOS terminal 106. Theproximity reader component 104 and thePOS terminal 106 may be substantially or entirely conventional. In some embodiments, both theproximity reader component 104 and thesmartphone 102 may include capabilities for NFC communication, so that those two devices may engage in communication with each other in accordance with the NFC standard. In other embodiments, one or more other methods of communication may take place between thesmartphone 102 and theproximity reader component 104 instead of or in addition to NFC communication; such communications may result in the mobile device transacting with areader component 104 through the internet. As is well known, communication between thesmartphone 102 and theproximity reader component 104 may be initiated by the user (not shown) tapping thesmartphone 102 on an appropriate location on the housing (not separately shown) of theproximity reader component 104. - The
proximity reader component 104 and thePOS terminal 106 may be located at the premises of a retail store and operated by a sales associate of the retailer for the purpose of processing retail transactions. Thesmartphone 102 is shown inFIG. 1 to be interacting with theproximity reader component 104 and thePOS terminal 106 for the purpose of executing such a transaction. - A
computer 108 operated by an acquirer (acquiring financial institution) is also shown as part of the system 100 inFIG. 1 . Theacquirer computer 108 may operate in a conventional manner to receive an authorization request for the transaction from thePOS terminal 106. Theacquirer computer 108 may route the authorization request via apayment network 110 to theserver computer 112 operated by the issuer of a payment card account that is available for access by thesmartphone 102. Also in a conventional manner, the authorization response generated by the payment cardissuer server computer 112 may be routed back to thePOS terminal 106 via thepayment network 110 and theacquirer computer 108. - The
payment network 110 may be entirely or substantially conventional; one example of a suitable payment network is the well-known Banknet system operated by MasterCard International Incorporated, which is the assignee hereof. - The payment card
issuer server computer 112 may be conventional and may be operated by or on behalf of a financial institution (“FI”; not separately shown) that issues payment card accounts to individual users. For example, the payment cardissuer server computer 112 may perform conventional functions, such as (a) receiving and responding to requests for authorization of payment card account transactions to be charged to payment card accounts issued by the FI; and (b) tracking and storing transactions and maintaining account records. - Although the
POS terminal 106 and the payment cardissuer server computer 112 may be conventional in some embodiments, in other embodiments one or more of those devices may be programmed to receive passive CVM information provided by the payment-enabledsmartphone 102, and to use the passive CVM information as a factor in a risk based decision (RBD) as to whether the transaction should be allowed to occur. - Those who are skilled in the art will appreciate that, assuming the authorization response indicates that all is in order, the purchase transaction may be completed at the point of sale. Moreover, the
payment network 110 may facilitate a subsequent clearing process that results in a charge to the user's payment card account issued by the issuing FI and a credit to the bank account (at the acquiring FI) that belongs to the merchant that operates thePOS terminal 106. - Also shown in
FIG. 1 is a remotepayment credential server 120 that may be available in some embodiments for over-the-air interaction with the payment-enabledsmartphone 102. As will be further discussed below, thepayment credential server 120 may aid in realizing a cloud-based implementation of aspects of the present disclosure. Communication between the payment-enabledsmartphone 102 and the remote server may take place via the over-the-air communication channel indicated byreference numeral 122. - As discussed in more detail below, in some embodiments the passive CVM functionality of the
smartphone 102 may depend at least in part on a biometric signal received by thesmartphone 102 from another device. Such a separate device may be, for example, a wearable device (reference numeral 124 inFIG. 1 ) that is worn by a user of thesmartphone 102 and that may be, for example, a wristwatch/wristband heartbeat monitor. Thesmartphone 102 may be in communication with the biometricwearable device 124 via a short-range wireless communication channel 126 (Bluetooth, e.g.). - The components of the payment system 100 as depicted in
FIG. 1 are only those that are needed for processing a single transaction. A typical practical embodiment of the payment system 100 may process many purchase transactions (including simultaneous transactions) and may include a considerable number of payment card issuers and their computers, a considerable number of acquirers and their computers, and numerous merchants and their POS terminals and associated proximity reader components. The system may also include a very large number of payment card account holders, who carry payment-enabled mobile devices (such as thesmartphone 102 described herein) and/or payment cards (including contactless payment cards and/or magnetic stripe cards). If cloud-based HCE is employed, there may be more than oneremote server 120 that supports such functionality. - It should also be understood that the
smartphone 102 is operable as a conventional mobile telephone for communication—both voice and data—over a conventional mobile telecommunications network, which is not depicted in the drawing. Thus, thesmartphone 102 may be in communication from time to time in a conventional manner with a mobile network operator (“MNO”—also not shown). An over-the air communication channel (like thechannel 122 shown inFIG. 1 ) between thesmartphone 102 and the payment card issuer server computer 112 (or a related computer) may be established from time to time for purposes such as personalization, set up, etc. with respect to thesmartphone 102. -
FIG. 2 is a block diagram that illustrates an example embodiment of the payment-enabledsmartphone 102 shown inFIG. 1 and provided in accordance with aspects of the present disclosure. Thesmartphone 102 may be conventional in its hardware aspects. For example, thesmartphone 102 may resemble, in most or all of its hardware aspects and many of its functions, a conventional “iPhone” marketed by Apple Inc., or one of the numerous smartphone models that run the “Android” operating system. - The
smartphone 102 may include a conventional housing (indicated by dashedline 202 inFIG. 2 ) that contains and/or supports the other components of thesmartphone 102. Thehousing 202 may be shaped and sized to be held in a user's hand, and may for example exhibit the type of form factor that is common with the current generation of smartphones. - The
smartphone 102 further includesconventional control circuitry 204, for controlling over-all operation of thesmartphone 102. For example, thecontrol circuitry 204 may include a conventional processor of the type designed to be the “brains” of a smartphone. - Other components of the
smartphone 102, which are in communication with and/or controlled by thecontrol circuitry 204, include: (a) one or more memory devices 206 (e.g., program and working memory, etc.); (b) a conventional SIM (subscriber identification module)card 208; and (c) aconventional touchscreen 212 which serves as the primary input/output device for thesmartphone 102, and which thus receives input information from the user and displays output information to the user. As is the case with many models of smartphones, in some embodiments thesmartphone 102 may also include a few physically-actuatable switches/controls (not shown), such as an on/off/reset switch, a menu button, a “back” button, a volume control switch, etc. - In some embodiments of the
smartphone 102, as has become conventional, its components may include two cameras (reference numeral 213), including one camera (not separately shown) that faces towards the user at times when the user is viewing thetouchscreen 212. The latter camera will hereinafter be referred to as the forward-facingcamera 213. - Furthermore, as is also conventional, the components of the
smartphone 102 may include one ormore accelerometers 214. - The
smartphone 102 also includes conventional receive/transmitcircuitry 216 that is also in communication with and/or controlled by thecontrol circuitry 204. The receive/transmitcircuitry 216 is coupled to anantenna 218 and provides the communication channel(s) by which thesmartphone 102 communicates via the mobile telephone communication network (not shown). The receive/transmitcircuitry 216 may operate both to receive and transmit voice signals, in addition to performing data communication functions. - The
smartphone 102 further includes aconventional microphone 220, coupled to the receive/transmitcircuitry 216. Of course, themicrophone 220 is for receiving voice input from the user. In addition, aloudspeaker 222 is included to provide sound output to the user, and is coupled to the receive/transmitcircuitry 216. - The receive/transmit
circuitry 216 may operate in a conventional fashion to transmit, via theantenna 218, voice signals generated by themicrophone 220, and to reproduce, via theloudspeaker 222, voice signals received via theantenna 218. The receive/transmitcircuitry 216 may also handle transmission and reception of text messages and other data communications via theantenna 218. - In some embodiments, via a connection that is not explicitly shown, voice signals input by the user via the
microphone 220 may be supplied in digital form to thecontrol circuitry 202 or other processing capability of thesmartphone 202 to allow for analysis of the voice signals by thesmartphone 102. - The
smartphone 102 may also includecircuitry 224 that is partly or wholly dedicated to implementing the NFC communications circuitry functionality of thesmartphone 102. Thesmartphone 102 may further include aloop antenna 226, coupled to theNFC circuitry 224. In some embodiments, theNFC circuitry 224 may partially overlap with thecontrol circuitry 204 for thesmartphone 102. - In some embodiments, the
NFC circuitry 224 is associated with, and may also overlap with, asecure element 228, or the NFC circuitry could be omitted in embodiments that do not utilize NFC. While secure elements have been proposed for incorporation with some payment-enabled smartphones, there have been other proposals that provide a desirable secure processing environment without a physically separate element. Accordingly, thesecure element 228 is shown in phantom, as an optional component of thesmartphone 102. - The term “secure element” is well known to those who are skilled in the art, and typically refers to a device that may include a small processor and volatile and nonvolatile memory (not separately shown) that are secured from tampering and/or reprogramming by suitable measures. In some embodiments, the
secure element 228 may be provided as part of theSIM card 208. In other embodiments, thesecure element 228 may be constituted by an integrated circuit card separate from theSIM card 208 but possibly having the same form factor as theSIM card 208. In some embodiments of thesmartphone 102, thesecure element 228 may be conventional in its hardware aspects but may be programmed in accordance with aspects of the present disclosure in a manner to be described below. (It should be noted that the term “secure element” is not intended to be limited to devices that are IC-based, but rather may also include any secure execution environment in a mobile device, and may include software based secure execution environments running on the main mobile device processor.) As an alternative to providing a physically-separate secure element, in some embodiments of thesmartphone 102 the main control circuitry may be programmed to execute the payment processing functionality in full or in part with access from thesmartphone 102 to thepayment credential server 120. As another alternative, one or more aspects of a conventional secure element may be implemented on the main processor of thesmartphone 102. For example, in some embodiments the known technique of host card emulation (HCE) may be employed. In further embodiments, the payment functionality may reside in a Trusted Execution Environment (TEE). Hereinafter, when functionality is ascribed to thesecure element 228, it should be borne in mind that at least some of such functionality may alternatively reside in the main processor of thesmartphone 102, the smartphone's TEE, and/or in thepayment credential server 120. -
FIG. 2A is a diagram that shows some details of the payment-enabledsmartphone 102, and/or thepayment credential server 120, as provided in accordance with some embodiments.FIG. 2A shows apayment application processor 250, which may be implemented in whole or in part by one or more of the secure element 228 (if present), the main processor/control circuit 204, and/or thepayment credential server 120. Thepayment application processor 250 may run apayment application 252. In some of its aspects, thepayment application 252 may program thepayment application processor 250 to implement CVM functionality in accordance with teachings of this disclosure and as described below in connection withFIGS. 3-5 . - The
payment application processor 250 may also store one ormore payment credentials 254, such as one or more primary account numbers (PANs) and/or payment tokens that represent or point to one or more payment card accounts issued to the user of thesmartphone 102, as well as associated information such as encryption keys. - Still further, the
payment application processor 250 may store one ormore accumulators 256 that are utilized by thepayment application 252 in applying risk management strategies that involve an “active” CVM process (i.e., a CVM process in which the user is prompted to provide an input such as a PIN). - In addition, the
payment application processor 250 may store one ormore accumulators 258 that are utilized by thepayment application 252 in applying risk management strategies that involve a passive CVM process in accordance with teachings of this disclosure. - The ensuing discussion of
FIGS. 4A /4B and 5 will describe the payment application's use of and interaction with theaccumulators -
FIG. 3 is a flow chart that illustrates, at a high level, a process performed in thesmartphone 102 in connection with set-up of the device and loading of required data, programs and settings. - At 302 in
FIG. 3 , thesmartphone 102 is subjected to a personalization process. The concept of personalization is well known to those who are skilled in the art, and may typically entail downloading, e.g., a payment application and one or more payment credentials. In the case of thesmartphone 102 as disclosed herein, the payment application may include passive CVM functionality as described herein, and the personalization may also include setting of parameters suitable for use in a risk management strategy or strategies that utilize passive CVM in accordance with teachings of this disclosure. - At
decision block 304, thesmartphone 102 determines whether the user has indicated that he/she opts in for use of passive CVM. The user may do so, for example, in response to a proposal from the user's payment card account issuer. Such a proposal may convey to the user certain advantages (e.g., enhanced convenience, and/or access to certain mobile payment capabilities) that will accrue to him or her by agreeing to enable passive CVM processing in thesmartphone 102. The user may communicate his/her intention to opt in via a suitable interaction with the user interface of thesmartphone 102. - If the
smartphone 102 makes a positive determination at decision block 304 (i.e., if thesmartphone 102 determines that the user has opted in to enable passive CVM processing), then block 306 may followdecision block 304. Atblock 306, operating parameters of thesmartphone 102 are set in such a manner as to facilitate passive CVM processing in accordance with one or more examples as described below. For example, an operating parameter may be set such that the forward-facingcamera 213 remains constantly enabled as long as the smartphone is on; or alternatively, for as long as thetouchscreen 212 is on. In this way, it can be relatively assured that the forward-facing camera is operative when an image of the user's face is available for capture to permit facial recognition processing. - Similarly, an operating parameter for of the
smartphone 102 may be set such that the accelerometers are continuously enabled while the smartphone is turned on. This may facilitate availability of the supply of data from the accelerometers to allow for analysis of the user's walking gait a substantial proportion of the time when the user is actually walking around with thesmartphone 102 in his/her possession. - In general, then, the operating parameters/settings for the
smartphone 102 may be set at 306 so as to keep the necessary components of the device available to supply input data for passive CVM processing. - In
block 308, thesmartphone 102 may collect reference data required for subsequent passive CVM processing. For example, the user may be prompted to take a “selfie” (photo of his/her own face) to serve as a reference image for facial recognition processing that would verify subsequent images of the user's face. As another example, relative to a voice recognition CVM process, thesmartphone 102 may automatically collect and/or analyze the first N minutes of speech input into themicrophone 220 during phone calls utilizing the smartphone during the period after personalization (block 302) has occurred. From this analysis, thesmartphone 102 may extract voice characteristic parameters in a conventional manner to provide a reference profile for the user's voice. - As another example, in regard to a gait analysis process, the
smartphone 102 may capture and/or analyze accelerometer output data for the first M minutes of motion patterns consistent with walking motion in the period after personalization. This analysis may be done in such a manner as to produce a reference profile for identifying the user's walking gait. - The
smartphone 102 may also collect other reference data as needed to support other types of passive CVM processing utilized by thesmartphone 102. - In some embodiments, the
smartphone 102 may utilize one or more passive CVM processes as an exclusive manner of establishing that the user is authorized to use thesmartphone 102 for payment purposes. In other embodiments, however, passive CVM processing may constitute a portion of a risk management approach that also utilizes active CVM (e.g., PIN entry and verification) at some times or in some situations. In some embodiments, passive CVM processing may be used as a complement to active CVM. For example, in an example embodiment illustrated inFIGS. 4A, 4B and 5 , relatively high value transactions may all require successful PIN entry, but a number of relatively small transactions may be allowed without PIN entry as long as a passive CVM process appears to indicate that thesmartphone 102 remains in the authorized user's possession. In still other embodiments, the current evaluation by thesmartphone 102 as to whether passive CVM is satisfied may be used as one input to a relatively complex RBD (risk based decision) process. The RBD process may be carried out at one or more of (a) the smartphone itself; (b) the point of sale; or (c) the payment card account issuer. Other factors in the RBD process may include, for example, type of merchant, location, time of day, amount of transaction, recent transaction history, etc. - In the process of
FIGS. 4A, 4B and 5 , the above-mentionedCVM accumulators 256 and 258 (FIG. 2A ) are used to track how many and/or what cumulative monetary amount of transactions has occurred since the most recent successful active or passive CVM process, as the case may be. The process steps shown inFIGS. 4A /4B and 5 may in some embodiments be performed in thesecure element 228, if present. In other embodiments, as suggested above, at least a portion of the processing logic may be performed in the main processor (control circuitry 204) of thesmartphone 102 or in thepayment credential server 120.FIGS. 4A and 4B together form a flow chart of a process that uses both active and passive CVM for risk management, whileFIG. 5 shows some additional details of the process ofFIGS. 4A /4B. -
Block 402 inFIG. 4A represents setting limits for one or more of the CVM accumulators. The limits define, for each accumulator, what accumulator value triggers a requirement for a successful CVM process. The limits may be set, for example, during personalization (block 302,FIG. 3 ). - At
decision block 404 inFIG. 4A , thesmartphone 102 may determine whether an active CVM process has been successfully completed. For example, to make this determination, thesmartphone 102 may prompt the user to enter a PIN and the smartphone (or other system component) may determine whether the PIN as entered is correct. If there is a positive determination at 404 (i.e., successful active CVM has occurred), then the process may advance fromdecision block 404 to block 406. Atblock 406, thesmartphone 102 may reset all of the accumulators for both active and passive CVM processes. If a transaction is currently pending, block 406 may also include allowing the transaction to be completed. - In some embodiments of the process flow,
decision block 408 may follow in the absence of a successful active CVM. Atdecision block 408, thesmartphone 102 may determine whether the current status of the passive CVM process is indicative of the smartphone being in the possession of the authorized user. If so, then block 410 may followdecision block 408 in the process flow. Atblock 410, thesmartphone 102 may reset (i.e., clear) the accumulators that are relevant to requiring successful passive CVM. If a transaction is currently pending, block 410 may also include allowing the transaction to be completed. - Considering again
decision block 408, in the absence of a successful passive CVM, block 411 may followdecision block 408. Atblock 411, the current status of the process is that no successful CVM has occurred. If a transaction that requires CVM is currently pending, the transaction will not be permitted to go forward. - A decision block 412 (
FIG. 4B ) may follow block 410 ofFIG. 4A to complete a loop comprising decision blocks 404, 408 and 412. In the absence of a positive determination at one of those decision blocks, the process may, in effect, idle (perhaps as one thread among many), without the CVM accumulators being reset. Atdecision block 412, thesmartphone 102 may determine whether the user is attempting to engage in a payment transaction using the smartphone. (From prior discussion, it will be appreciated that an attempt to engage in a transaction may involve tapping thesmartphone 102 on the proximity reader 104 (FIG. 1 ).) If a positive determination is made atblock 412 inFIG. 4B (i.e., if thesmartphone 102 determines that a transaction is being attempted), then the process flow may advance fromdecision block 412 to decision block 414 inFIG. 4B . - At decision block 414, the
smartphone 102 may determine whether the attempted transaction is for a monetary amount that is above a threshold. In particular the threshold may be such as to demarcate between transactions for which successful active CVM will always be required and transactions that will sometimes be allowed without active CVM. In some embodiments, for example, the risk management strategy may set the threshold at a level such as USD 50.00 or 25.00 or the like, with transactions below the threshold being deemed “low value” transactions. The risk management strategy may hold that a certain number of “low value” transactions (and/or a certain cumulative amount of “low value” transactions) may occur before requiring active CVM. The risk management strategy may further hold that a smaller number (and/or a lower cumulative amount) of “low value” transactions may be permitted in the absence of passive CVM having been satisfied. It will be understood that the accumulator limits set at 402 may have been set to implement such a risk management strategy. - Continuing to refer to
FIG. 4B , if a positive determination is made at decision block 414 (i.e., if it is determined that the transaction amount is above the “low value” threshold), then the process flow may advance from decision block 414 to block 416 inFIG. 4B . Atblock 416, the smartphone may require compliance with active CVM and may prompt the user accordingly (e.g., by indicating that he/she should enter his/her PIN). Fromblock 416, the process flow may loop to decision block 404 inFIG. 4A . - Considering decision block 414 (
FIG. 4B ) again, if a negative determination is made at that decision block (i.e., if the transaction does not exceed the relevant threshold, and therefore is in the “low value” category), then the process flow may advance from decision block 414 todecision block 418.Decision block 418 is concerned with comparing one of more of the active CVM accumulators with the relevant limit(s) established at 402. In some embodiments, if the current transaction would cause the accumulator value(s) to exceed the relevant limit(s), then the process flow would follow the “no” branch (i.e., the outcome is not below the established limit(s)) such that the process flow loops to block 416, as described above (resulting in a requirement for an active CVM). - On the other hand, if—even with the new transaction amount—the active CVM accumulator(s) would remain below the relevant limit(s), then the process flow may advance from
decision block 418 todecision block 420.Decision block 420 is concerned with comparing one or more of the passive CVM accumulators with the relevant limit(s) for those accumulators as established at 402. In some embodiments, if the current transaction would cause the passive CVM accumulator value(s) to exceed the relevant limit(s) then the process flow would follow the “no” branch such that the process flow may advance fromdecision block 420 to block 421. Atblock 421 the process logic may require that a CVM—either active or passive—be performed. The process may then loop fromblock 421 to decision blocks 404 (FIG. 4A ), 408, etc. - However, if—even with the new transaction amount—the passive CVM accumulator would remain below the relevant limit(s), then the process flow may advance from
decision block 420 to block 422. Atblock 422, the current transaction is allowed to proceed (i.e., without requiring a CVM), and the accumulators for the active and passive CVMs are incremented to reflect the current transaction. The process then may loop fromblock 422 to the loop of decision blocks 404, 408, 412 (FIG. 4A ). - Assuming that the limit(s) applicable to the passive CVM accumulator(s) is (are) set lower than the limit(s) applicable to the active CVM accumulator(s), the process flow logic expressed in
FIGS. 4A and 4B would have the following consequences: For transactions above the “low value” threshold, active CVM would always be required. As long as passive CVM is successfully maintained, a certain number and/or cumulative amount of low value transactions would be permitted before an active CVM was required to be performed. If passive CVM success is not present, then only a smaller number and/or cumulative value of low value transactions would be permitted before requiring an active CVM to be performed. With this arrangement, for example, the payment card account issuer has the opportunity to set its risk management strategy with greater granularity than would be possible if the payment-enabledsmartphone 102 did not have the passive CVM capability as described in this disclosure. - From another point of view, a process such as that illustrated in
FIGS. 4A and 4B can be partially summarized as follows: (A) Two transaction-number limits are established, with one of the limits lower than the other; (B) An active CVM requirement is applied when the lower limit is exceeded, unless a passive CVM condition has been satisfied; (C) When the higher limit is exceeded, the active CVM requirement is applied even if the passive CVM condition has been satisfied. - In the above discussion and in the appended claims, the term “transaction-number limit” should be understood to include either or both of a limit on a number of transactions and a limit on a cumulative amount of transactions.
- Details of passive CVM techniques according to some embodiments will now be discussed. In some embodiments, only a single passive CVM technique is employed. Examples of such a passive CVM technique include: (a) facial recognition analysis (e.g., via one or more images of the user's face captured by the forward facing camera on the smartphone 102); (b) user walking gait analysis, based on data provided from accelerometers that are components of the
smartphone 102; (c) voice recognition analysis, based on spoken input by the user into the microphone component of thesmartphone 102; (d) user gesture analysis based on interaction by the user with the touchscreen component of thesmartphone 102; (e) analysis of the user's heartbeat (e.g., based on data wirelessly transmitted to thesmartphone 102 from a wearable heartbeat sensor, such as a wristwatch/wristband—reference numeral 124,FIG. 1 —worn by the user); and (f) the user's pattern of usage of application programs on thesmartphone 102. This list of possible passive CVM techniques is not intended to be exhaustive. - In some embodiments, the passive CVM strategy employed in the
smartphone 102 may rely on a combination of any two or more of such individual passive CVM techniques. Based on ongoing results of the various passive CVM analyses, thesmartphone 102 may calculate a running passive CVM score, and may determine whether or not a passive CVM condition is satisfied based on the current value of the CVM score. -
FIG. 5 is a flow chart that illustrates an example process that thesmartphone 102 may perform in connection with determining whether passive CVM has successfully occurred. As such, the process ofFIG. 5 may be considered an example of supplemental details relative to the determination made atdecision block 408 inFIG. 4A . - Referring now to
FIG. 5 , adecision block 502 is shown. Atdecision block 502, thesmartphone 102 may determine whether an activity relevant to passive CVM monitoring is currently occurring. For example, such an activity may include user interaction with the touchscreen, which may make it possible for the forward-facingcamera 213 to capture an image of the user's face and/or which may provide input data to a gesture analysis process. As another example, such an activity may include output from the accelerometers that is consistent with thesmartphone 102 being carried by someone who is walking. Data output from the accelerometers at such times may be a suitable input for gait analysis. - Further, another suitable activity for possible passive CVM processing may be a telephone call via the
smartphone 102. In connection with a phone call, the voice input by the user via the smartphone's microphone may be a suitable input for voice recognition analysis. Other suitable activity may occur simply when the smartphone is present within range to receive wirelessly-transmitted data signals from a heartbeat sensor that is worn by the user. Still further, any interaction by the user with applications on thesmartphone 102 may provide input data for an analysis by thesmartphone 102 of the user's application usage patterns. - If the
smartphone 102 makes a positive determination at decision block 502 (i.e., if thesmartphone 102 determines that activity is occurring that is relevant to one or more passive CVM techniques implemented in the smartphone 102), then block 504 may followdecision block 502. Atblock 504, thesmartphone 102 may proceed with an analysis of the input data made available via the relevant activity, and may compare the results of the analysis with reference data that was previously stored in thesmartphone 102. As a result of the analysis and comparison, thesmartphone 102 may update a passive CVM score that constitutes an evaluation of the likelihood that thesmartphone 102 is currently in the possession of the authorized user. - A
decision block 506 may follow block 504. Atdecision block 506, thesmartphone 102 determines whether the current level of the passive CVM score indicates that it is reasonable to conclude that thesmartphone 102 is in the authorized user's possession. If so, then block 508 may follow. Atblock 508, thesmartphone 102 may set a flag that indicates that passive CVM is currently satisfied, and also may reset a timer that is relevant to passive CVM. The process flow may then loop back fromblock 508 todecision block 502. - Considering again decision block, if a negative determination is made (i.e., if the
smartphone 102 determines that the current level of the passive CVM score is not sufficient to indicate that thesmartphone 102 is in the authorized user's possession), then the process flow may proceed via the “no” branch fromdecision block 506 todecision block 510. Atdecision block 510, thesmartphone 102 determines whether a time-out period has elapsed as to the passive-CVM-satisfied status. If the time-out has occurred, then the process flow may advance fromdecision block 510 to block 512. Atblock 512, thesmartphone 102 may clear the flag that indicates that passive CVM has been satisfied. (It will be appreciated that the state of this flag may in some embodiments indicate the outcome of the determination atdecision block 408 inFIG. 4A .) - Referring again to
FIG. 5 , and considering decision block 502 again, if a negative determination is made at that decision block (i.e., if no activity is occurring that is relevant to CVM processing), then the process flow may advance fromdecision block 502 todecision block 510. Also, if a negative determination is made in decision block 510 (i.e., if passive-CVM-satisfied status has not timed-out), then the process flow may loop fromdecision block 510 todecision block 502. It will be appreciated that the decision blocks 502 and 510 may thus form an idle loop (possibly among other processing threads in the smartphone 102) so long as no passive-CVM-relevant activity is occurring and the status time-out has not occurred. - The process flow as illustrated in
FIG. 5 suggests that passive CVM processing may go on virtually continuously, so long as relevant activity (i.e., activity that provides meaningful data for passive CVM processing) is occurring. However, this need not necessarily be the case. For example, passive CVM processing may occur only when triggered by certain events, such as: (a) the user waking up thesmartphone 102; (b) the user opening a wallet application on thesmartphone 102; (c) the user interacting with a payment application on thesmartphone 102; (d) thesmartphone 102 detecting that it has been carried into a retail store; etc. In some embodiments, passive CVM processing may be turned off/inhibited for a predetermined timed period after a successful completion of an active CVM and/or for a certain number of low value transactions after a successful completion of an active CVM - In some embodiments, the resetting of accumulators relevant to passive CVM may occur upon one or more of an online authorization (i.e., confirmation of a PIN or prompted biometric at the issuer server); successful completion of an active (local) CVM; successful completion of a passive CVM; and completion of both an active (local) CVM and a passive CVM.
- From previous discussion it will be understood that at least some of the analysis, etc., required for passive CVM may take place “in the cloud”, i.e., at the
remote server 120 shown inFIG. 1 , based on data transmitted thereto from thesmartphone 102. However, even when this is the case, the phrase “performing passive CVM in a mobile device” should still be deemed to apply, provided that at least some of the input data for the passive CVM process is collected and/or generated in thesmartphone 102. In some embodiments with passive CVM processing at least partially occurring “in the cloud”, thesmartphone 102 may transmit hashes and/or details of passively obtained biometric readings to theremote server 120. - Aspects of the disclosure have been described above in the context of a smartphone. However, the principles of the present disclosure are equally applicable to other types of mobile devices, including tablet computers.
- Software that provides the passive CVM functionality described herein may be included in the above-mentioned payment application 252 (
FIG. 2A ) and/or may be stored in one or more other program memory components of thesmartphone 102 and may program one or more processing components of thesmartphone 102. - As used herein and in the appended claims, the term “computer” should be understood to encompass a single computer or two or more computers in communication with each other.
- As used herein and in the appended claims, the term “processor” should be understood to encompass a single processor or two or more processors in communication with each other.
- As used herein and in the appended claims, the term “memory” should be understood to encompass a single memory or storage device or two or more memories or storage devices.
- The flow charts and descriptions thereof herein should not be understood to prescribe a fixed order of performing the method steps described therein. Rather the method steps may be performed in any order that is practicable.
- As used herein and in the appended claims, the term “payment card system account” includes a credit card account, a deposit account that the account holder may access using a debit card, a prepaid card account, or any other type of account from which payment transactions may be consummated. The terms “payment card system account” and “payment card account” are used interchangeably herein. The term “payment card account number” includes a number that identifies a payment card system account or a number carried by a payment card, or a number that is used to route a transaction in a payment system that handles debit card and/or credit card transactions. The term “payment card” includes a credit card, debit card, prepaid card, or other type of payment instrument, whether an actual physical card or virtual.
- As used herein and in the appended claims, the term “payment card system” refers to a system for handling purchase transactions and related transactions. An example of such a system is the one operated by MasterCard International Incorporated, the assignee of the present disclosure. In some embodiments, the term “payment card system” may be limited to systems in which member financial institutions issue payment card accounts to individuals, businesses and/or other organizations.
- Although the present disclosure has been described in connection with specific exemplary embodiments, it should be understood that various changes, substitutions, and alterations apparent to those skilled in the art can be made to the disclosed embodiments without departing from the spirit and scope of the disclosure as set forth in the appended claims.
Claims (20)
1. A mobile device, comprising:
a processor;
a memory in communication with the processor; and
a radio receiver receiving CVM (cardholder verification method) data from an electronic device worn by a user who is carrying the mobile device, the electronic device different from the mobile device, the radio receiver in communication with the processor;
the memory storing program instructions, the processor operative with the program instructions to perform functions as follows:
receiving the CVM data from the radio receiver, the CVM data indicative of at least one characteristic and/or attribute of the user;
initiating a CVM data evaluation process using the received CVM data as an input, the CVM data evaluation process being initiated, performed and completed without the user being or having been prompted to submit input for CVM processing; and
providing a result of the CVM data evaluation process.
2. The mobile device of claim 1 , wherein the at least one characteristic and/or attribute of the user is the user's heartbeat.
3. The mobile device of claim 1 , wherein the processor is further operative with the program instructions to reset a CVM accumulator in response to successful completion of the CVM data evaluation process.
4. The mobile device of claim 3 , further comprising a secure element in communication with the processor, and wherein the CVM accumulator is implemented in the secure element.
5. The mobile device of claim 3 , wherein the CVM accumulator is maintained in a server computer that is remote from the mobile device.
6. The mobile device of claim 1 , further comprising a secure element in communication with the processor;
wherein:
a payment application runs in the secure element; and
at least one payment credential is stored in the secure element.
7. The mobile device of claim 1 , wherein the program instructions include a payment application for controlling said processor.
8. The mobile device of claim 1 , wherein the processor is operative with the program instructions to interact with a remote server in connection with the CVM data evaluation process.
9. The mobile device of claim 1 , wherein the CVM data evaluation process includes heartbeat analysis.
10. The mobile device of claim 1 , wherein the mobile device is a smartphone.
11. A mobile device, comprising:
a processor;
a memory in communication with the processor; and
a radio receiver receiving CVM (cardholder verification method) data from an electronic device worn by a user who is carrying the mobile device, the electronic device different from the mobile device, the radio receiver in communication with the processor;
the memory storing program instructions, the processor operative with the program instructions to perform functions as follows:
receiving the CVM data from the radio receiver, the CVM data indicative of at least one characteristic and/or attribute of the user;
initiating a CVM data evaluation process using the received CVM data as an input, the CVM data evaluation process being initiated, performed and completed without the user being or having been prompted to submit input for CVM processing;
providing a result of the CVM data evaluation process; and
setting a passive CVM flag in response to the result of the CVM data evaluation process;
wherein:
the memory stores a first accumulator, the first accumulator for counting up to a number of payment transactions permitted to be performed using the mobile device at a time when the passive CVM flag is set and without requiring entry of a PIN (personal identification number) by the user of the mobile device; and
the memory stores a second accumulator in the mobile device, the second accumulator for counting up to a number of payment transactions permitted to be performed using the mobile device at a time when the passive CVM flag is not set.
12. The mobile device of claim 11 , wherein the at least one characteristic and/or attribute of the user is the user's heartbeat.
13. The mobile device of claim 11 , further comprising a secure element in communication with the processor;
wherein:
a payment application runs in the secure element; and
at least one payment credential is stored in the secure element.
14. The mobile device of claim 11 , wherein the program instructions include a payment application for controlling said processor.
15. The mobile device of claim 11 , wherein the processor is operative with the program instructions to interact with a remote server in connection with the CVM data evaluation process.
16. The mobile device of claim 11 , wherein the CVM data evaluation process includes heartbeat analysis.
17. The mobile device of claim 11 , wherein the mobile device is a smartphone.
18. A mobile device, comprising:
a processor;
a memory in communication with the processor; and
a radio receiver receiving CVM (cardholder verification method) data from an electronic device worn by a user who is carrying the mobile device, the electronic device different from the mobile device, the radio receiver in communication with the processor;
the memory storing program instructions, the processor operative with the program instructions to perform functions as follows:
receiving the CVM data from the radio receiver, the CVM data indicative of at least one characteristic and/or attribute of the user;
initiating a CVM data evaluation process using the received CVM data as an input, the CVM data evaluation process being initiated, performed and completed without the user being or having been prompted to submit input for CVM processing; and
providing a result of the CVM data evaluation process;
said initiating of the CVM data evaluation process being in response to at least one of: (a) the mobile device transitioning from a sleep state to a waking state; (b) the user opening a wallet application on the mobile device; (c) the user interacting with a payment application on the mobile device; and (d) the mobile device detecting that it has been carried into a retail store.
19. The mobile device of claim 18 , further comprising a secure element in communication with the processor;
wherein:
a payment application runs in the secure element; and
at least one payment credential is stored in the secure element.
20. The mobile device of claim 18 , wherein the program instructions include a payment application for controlling said processor.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US16/841,830 US20200234301A1 (en) | 2014-05-13 | 2020-04-07 | Passive cardholder verification method in mobile device |
Applications Claiming Priority (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US14/276,071 US10380588B2 (en) | 2014-05-13 | 2014-05-13 | Passive cardholder verification method in mobile device |
US16/454,414 US10650377B2 (en) | 2014-05-13 | 2019-06-27 | Passive cardholder verification method in mobile device |
US16/841,830 US20200234301A1 (en) | 2014-05-13 | 2020-04-07 | Passive cardholder verification method in mobile device |
Related Parent Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US16/454,414 Continuation US10650377B2 (en) | 2014-05-13 | 2019-06-27 | Passive cardholder verification method in mobile device |
Publications (1)
Publication Number | Publication Date |
---|---|
US20200234301A1 true US20200234301A1 (en) | 2020-07-23 |
Family
ID=54480602
Family Applications (3)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US14/276,071 Active 2036-11-06 US10380588B2 (en) | 2014-05-13 | 2014-05-13 | Passive cardholder verification method in mobile device |
US16/454,414 Active US10650377B2 (en) | 2014-05-13 | 2019-06-27 | Passive cardholder verification method in mobile device |
US16/841,830 Abandoned US20200234301A1 (en) | 2014-05-13 | 2020-04-07 | Passive cardholder verification method in mobile device |
Family Applications Before (2)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US14/276,071 Active 2036-11-06 US10380588B2 (en) | 2014-05-13 | 2014-05-13 | Passive cardholder verification method in mobile device |
US16/454,414 Active US10650377B2 (en) | 2014-05-13 | 2019-06-27 | Passive cardholder verification method in mobile device |
Country Status (2)
Country | Link |
---|---|
US (3) | US10380588B2 (en) |
WO (1) | WO2015175645A1 (en) |
Families Citing this family (17)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20150348046A1 (en) | 2014-05-27 | 2015-12-03 | Derbywire Inc. | Systems and Methods for Performing Secure Commercial Transactions |
JP6292595B2 (en) * | 2014-06-03 | 2018-03-14 | ホアウェイ・テクノロジーズ・カンパニー・リミテッド | Route setting method and terminal device |
AU2016298372B2 (en) * | 2015-07-30 | 2022-01-06 | Visa International Service Association | System and method for conducting transactions using biometric verification |
EP3139329A1 (en) * | 2015-09-03 | 2017-03-08 | Mobile Elements Corp | Contactless mobile payment system |
CN105654286A (en) * | 2015-12-29 | 2016-06-08 | 宇龙计算机通信科技(深圳)有限公司 | Payment method, payment device and wearable device |
US11734678B2 (en) * | 2016-01-25 | 2023-08-22 | Apple Inc. | Document importation into secure element |
US20170337541A1 (en) * | 2016-05-20 | 2017-11-23 | Mastercard International Incorporated | Enhanced user experience for low value transactions |
US10872320B2 (en) | 2016-07-29 | 2020-12-22 | Square, Inc. | Reprogrammable point-of-sale transaction flows |
US10692055B2 (en) | 2016-07-29 | 2020-06-23 | Square, Inc. | Reprogrammable point-of-sale transaction flows |
CN106792453A (en) * | 2016-12-19 | 2017-05-31 | 北京智充科技有限公司 | A kind of access right control method suitable for NFC device |
CN106845994A (en) * | 2016-12-21 | 2017-06-13 | 浙江海洋大学 | A kind of intelligent mobile terminal safe payment method |
US20180336561A1 (en) * | 2017-05-17 | 2018-11-22 | Mastercard International Incorporated | Spend-profile based transaction value limits for pin-less contactless payment-card authorizations |
EP3642776A1 (en) * | 2017-06-23 | 2020-04-29 | Saffe Ltd | Facial biometrics card emulation for in-store payment authorization |
US11823198B1 (en) | 2019-02-18 | 2023-11-21 | Wells Fargo Bank, N.A. | Contextually escalated authentication by system directed customization of user supplied image |
CN110866748B (en) * | 2019-10-25 | 2021-08-20 | 网联清算有限公司 | Payment Processing System and Method |
CN113409035A (en) * | 2020-11-17 | 2021-09-17 | 葛云霞 | Face recognition analysis method applied to block chain payment and big data platform |
US20230388793A1 (en) * | 2022-05-27 | 2023-11-30 | Icashe, Inc. | Secure mobile transaction apparatus and method |
Family Cites Families (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20100248779A1 (en) * | 2009-03-26 | 2010-09-30 | Simon Phillips | Cardholder verification rule applied in payment-enabled mobile telephone |
US9240005B2 (en) * | 2009-11-06 | 2016-01-19 | Mastercard International, Incorporated | Methods for risk management in payment-enabled mobile device |
US10043180B2 (en) | 2010-09-30 | 2018-08-07 | The Western Union Company | System and method for secure transactions at a mobile device |
US20120197796A1 (en) | 2011-01-31 | 2012-08-02 | Nathan Dent | Cash dispensing at atm |
MA38422A1 (en) * | 2013-02-22 | 2016-04-29 | Mastercard International Inc | Systems, apparatus and methods for prepaid mobile companion card |
-
2014
- 2014-05-13 US US14/276,071 patent/US10380588B2/en active Active
-
2015
- 2015-05-13 WO PCT/US2015/030539 patent/WO2015175645A1/en active Application Filing
-
2019
- 2019-06-27 US US16/454,414 patent/US10650377B2/en active Active
-
2020
- 2020-04-07 US US16/841,830 patent/US20200234301A1/en not_active Abandoned
Also Published As
Publication number | Publication date |
---|---|
WO2015175645A1 (en) | 2015-11-19 |
US20190318357A1 (en) | 2019-10-17 |
US20150332271A1 (en) | 2015-11-19 |
US10380588B2 (en) | 2019-08-13 |
US10650377B2 (en) | 2020-05-12 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US10650377B2 (en) | Passive cardholder verification method in mobile device | |
CN107665426B (en) | Method and electronic device for payment using biometric authentication | |
US12165128B2 (en) | Camera activation and image processing for transaction verification | |
CN112184239B (en) | Secure payment method, apparatus, device and readable medium | |
KR102693434B1 (en) | Electronic apparatus providing electronic payment and operating method thereof | |
CN107278313B (en) | Payment means operation support method and electronic device for supporting the same | |
US10115103B2 (en) | Mobile secure element based shared cardholder verification | |
US11810099B2 (en) | One use wearable | |
US20200042979A1 (en) | Ic card-based transaction processing and credit payment authorization method, device, and system | |
US20150269582A1 (en) | Credit Card Point of Service Payment Authorization System | |
CA3011426C (en) | Access control bypass on mobile for mass transit | |
US20160092876A1 (en) | On-device shared cardholder verification | |
US20230206210A1 (en) | Secure payment using a network of wearable devices | |
US10083443B1 (en) | Persistent authentication of a wearable device | |
CN108805581B (en) | Electronic card safety payment system and method thereof | |
US20170337541A1 (en) | Enhanced user experience for low value transactions | |
US12093925B1 (en) | Smart payment card, and computing systems and methods for configuring smart payment card and processing transactions involving smart payment card | |
KR102639361B1 (en) | System for providing financial transaction service associated with metaverse environment and method for operation thereof | |
CA2944084C (en) | Provisioning of secure application | |
EP3264355A1 (en) | Electronic device and operation method therefor |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AS | Assignment |
Owner name: MASTERCARD INTERNATIONAL INCORPORATED, NEW YORK Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:COLLINS, SIMON;MADDOCKS, IAN;SIGNING DATES FROM 20140508 TO 20140512;REEL/FRAME:052328/0816 |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: NON FINAL ACTION MAILED |
|
STCB | Information on status: application discontinuation |
Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION |