US20220292503A1 - Data security enhancement for online transactions involving payment card accounts - Google Patents
Data security enhancement for online transactions involving payment card accounts Download PDFInfo
- Publication number
- US20220292503A1 US20220292503A1 US17/831,279 US202217831279A US2022292503A1 US 20220292503 A1 US20220292503 A1 US 20220292503A1 US 202217831279 A US202217831279 A US 202217831279A US 2022292503 A1 US2022292503 A1 US 2022292503A1
- Authority
- US
- United States
- Prior art keywords
- card information
- merchant
- temporary
- user
- payment card
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000012545 processing Methods 0.000 claims abstract description 14
- 238000000034 method Methods 0.000 claims description 39
- 230000004044 response Effects 0.000 claims description 7
- 238000013475 authorization Methods 0.000 abstract description 19
- 230000008569 process Effects 0.000 description 10
- 238000004891 communication Methods 0.000 description 7
- 230000015654 memory Effects 0.000 description 7
- 230000001413 cellular effect Effects 0.000 description 4
- 238000012790 confirmation Methods 0.000 description 3
- 238000003491 array Methods 0.000 description 2
- 238000012986 modification Methods 0.000 description 2
- 230000004048 modification Effects 0.000 description 2
- VYZAMTAEIAYCRO-UHFFFAOYSA-N Chromium Chemical compound [Cr] VYZAMTAEIAYCRO-UHFFFAOYSA-N 0.000 description 1
- 230000003213 activating effect Effects 0.000 description 1
- 230000004075 alteration Effects 0.000 description 1
- 238000005352 clarification Methods 0.000 description 1
- 230000002708 enhancing effect Effects 0.000 description 1
- 230000006870 function Effects 0.000 description 1
- 238000004519 manufacturing process Methods 0.000 description 1
- 230000007246 mechanism Effects 0.000 description 1
- 230000003287 optical effect Effects 0.000 description 1
- 238000010200 validation analysis Methods 0.000 description 1
- 238000012795 verification Methods 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/08—Payment architectures
- G06Q20/12—Payment architectures specially adapted for electronic shopping systems
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/30—Payment architectures, schemes or protocols characterised by the use of specific devices or networks
- G06Q20/34—Payment architectures, schemes or protocols characterised by the use of specific devices or networks using cards, e.g. integrated circuit [IC] cards or magnetic cards
- G06Q20/351—Virtual cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/40—Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/40—Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
- G06Q20/401—Transaction verification
- G06Q20/4018—Transaction verification using the card verification value [CVV] associated with the card
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/40—Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
- G06Q20/409—Device specific authentication in transaction processing
Definitions
- At least one embodiment of the present invention pertains to electronic commerce, and more particularly, to a technique for enhancing security of sensitive data during online transactions involving payment card accounts.
- a consumer When purchasing goods or services online (e.g., via the Internet), a consumer may be given the option to pay by credit card or other type of payment card (e.g., debit card or gift card). To do so, after adding one or more items to his or her electronic shopping cart and requesting checkout, the consumer typically enters his or her payment card information into a web page generated by a shopping cart application of the merchant. Once the payment card information is entered, the consumer provides a confirmation input that indicates his or her commitment to the transaction and that causes his or her user device to submit payment information to the website of the merchant. The merchant's computer system then requests authorization of the card transaction through a financial system.
- credit card or other type of payment card e.g., debit card or gift card
- One problem with this payment paradigm is that it exposes sensitive information of the consumer, namely, the consumer's payment card information, to various third parties, where it may be vulnerable to misappropriation.
- the payment card information may be inadvertently provided by the consumer to a wrongdoer posing as a legitimate online merchant.
- merchants sometimes store the consumer's card information.
- Different merchants implement vastly differing degrees of data security, such that the consumer's card information may be vulnerable to unauthorized acquisition by hackers once it is in the possession of a merchant.
- FIG. 1 illustrates an example of an environment in which the data security technique can be implemented.
- FIG. 2 illustrates relevant elements of the user device and the payment processing service (PPS) system.
- PPS payment processing service
- FIG. 3 illustrates an example of the message flow between various elements associated with the data security technique.
- FIGS. 4A and 4B illustrate unpopulated and populated states, respectively, of a merchant's payment information webpage.
- FIGS. 6A and 6B illustrate examples of processes performed by the PPS system in the data security technique.
- FIG. 7 illustrates an example of the hardware architecture of a processing system that can be used to implement any of the computing devices referred to herein.
- credit card or other payment card information of a consumer is protected during online payment card based transactions, by enabling a user device of the consumer to request and receive, during an online shopping session, temporary proxy payment card information from a third-party payment processing service (PPS), and by enabling the user device to populate that temporary proxy payment card information into an online transaction web interface of the merchant automatically.
- PPS third-party payment processing service
- this is accomplished by equipping a browser in the user device with a control that, when activated by the consumer, accesses the PPS to obtain the proxy card information populates that information into the online transaction web interface of the merchant automatically.
- the temporary proxy payment card information is associated in the third-party PPS with a real payment card account of the consumer.
- the authorization request gets routed to the PPS via the payment card network, by virtue of the proxy card number, according to the normal authorization request routing process.
- the PPS then uses the consumer's real payment card information to authorize and fund the transaction.
- the PPS is a secure business enterprise and computer system that is highly trusted by the consumer.
- a consumer initially enrolls with the PPS by setting up an account with the PPS, which includes providing his or her real credit card information to the PPS. Enrollment with the PPS may be done via a website of the PPS, by telephone, electronic mail, standard mail, or any other convenient communication channel.
- the consumer further installs a software extension or plug-in associated with the PPS into a conventional web browser (e.g., Microsoft Internet Explorer, Mozilla Firefox or Google Chrome) in a user device used by the consumer.
- the user device may be, for example, a conventional personal computer (PC), such as a desktop computer or laptop computer, or it may be a smartphone, tablet computer, or any other known or convenient processing device.
- PC personal computer
- the extension accesses the PPS (which is implemented at least partially on one or more remote server computers) via a network such as the Internet, to obtain a dynamically generated credit card number, along with corresponding card type information, cardholder name, expiration date and card verification value (CVV); this information collectively is the temporary proxy payment card information (or simply proxy card information).
- the proxy card information can include a valid Visa or Mastercard number, for example, and may be issued by the PPS.
- the PPS browser extension automatically populates the proxy card information into the merchant's website's checkout page (e.g., a web form).
- the PPS is subsequently contacted as the card issuer during the credit card payment authorization process.
- the proxy card information can be associated in the PPS with any other type of real payment card, such as a debit card or a gift card, for example.
- the PPS can maintain validity rules that limit the validity of the proxy card information, such as by time, merchant, transaction amount, number of transactions, or any other criteria. These rules may be specified or selected by the consumer (prior to the transaction), or they may be default rules provided by the PPS.
- the validity rules include at least one validity criterion, which can be or include, for example, a maximum individual or collective transaction amount and/or a maximum number of transactions for which the proxy card information can be used, particular merchant or category of merchant in which the proxy card information can be used, etc.
- the validity criterion further can be or include an expiration date and/or time for the proxy card information, which can be different from the expiration date of the consumer's real payment card.
- the expiration date/time of the proxy card information can also be different from the proxy expiration date provided to the merchant website, i.e., it can be earlier than or later than the proxy expiration date.
- the proxy card expiration date provided to the merchant may be a dummy expiration date that does not reflect the actual expiration date/time of the proxy card information or the expiration date of the consumer's real payment card information.
- the validity rules might specify that the proxy card information can be used only once, or only once per day, or only once per day per merchant, or only for specific merchants or categories of merchants, or only for up to $2,500 per month, or combination of such restrictions.
- the merchant's perspective the consumer is using a normal payment card number (and associated information). From the consumer's perspective, they just enter minimal PPS authentication information (e.g., username and password) once, or at most once per user session. From the PPS's perspective, they receive an authorization request through the proxy card information and then use the consumer's real card information on file to authorize and fund the transaction.
- PPS authentication information e.g., username and password
- the PPS can deactivate all proxy card numbers used at that merchant without having to the deactivate the backing payment cards.
- FIG. 1 illustrates an example of an environment in which the data security technique can be implemented.
- the environment includes at least one user device 1 A or 1 B (collectively user device 1 ) of a consumer, which can be, for example, a mobile device 1 A such as a smartphone or tablet, or a PC 1 B.
- the environment further includes an e-commerce website 2 of a merchant, a computer system 3 of the PPS (hereinafter the PPS system 3 ), and a financial system 4 for processing payment card transactions.
- the PPS system 3 includes a database 5 storing information such as identification information of users enrolled with the PPS, real payment card account information of such users, and an association of that account information with proxy card information for at least some users.
- the financial system 4 can include the merchant's acquiring bank and at least one payment card payment network, such as Visa or MasterCard, and computer systems associated with such entities.
- Each of the aforementioned computer systems can include one or more distinct physical computers and/or other processing devices which, in the case of multiple devices, can be connected to each other through one or more wired and/or wireless networks. All of the aforementioned devices are coupled to each other through an internetwork 6 , which can be or include the Internet and one or more wireless networks (e.g., a WiFi network and/or a cellular telecommunications network).
- the user device 1 and the PPS system 3 are shown in greater detail, according to at least one embodiment.
- the user device 1 includes a browser 21 , which in the illustrated embodiment includes a user-installable extension (plug-in) 22 associated with the PPS.
- the PPS client-side functionality may be implemented, for example, by a bookmarklet (i.e., a browser bookmark containing executable script such as JavaScript).
- the PPS system 3 includes, for each consumer enrolled with the PPS, information 23 identifying the consumer and/or the consumer's user device (hereinafter “user/device information”), real payment card account information 24 of the consumer, and proxy payment card information 25 associated with the consumer. Additionally, the PPS system 3 includes a card information proxying unit 26 and a payment authorization unit 27 .
- the card information proxying unit 26 is responsible for maintaining the association between the consumer's user/device information 23 , real card account information 24 and proxy card account information 25 , and for looking up and providing proxy card account information 25 to the user device 1 when required.
- the payment authorization unit 27 is responsible for determining whether to authorize requested payment card transactions, including applying stored validity rules 28 associated with the proxy card information 25 .
- the PPS plug-in 22 sends information of the consumer to the PPS.
- the PPS plug-in first prompts the consumer to enter his or her identifying information to be used by the PPS to authenticate the consumer, such as a username and password. This information can be input one time and then stored locally in the user device for future use, or it may be input by the consumer for each online transaction or each user session.
- the user/device information may be sent to the PPS system 3 via any known or convenient network or internetwork, such as the Internet.
- the card information proxying unit 26 uses the user/device information to look up the proxy card account information 25 , which it then returns to the PPS plug-in 22 .
- the PPS plug-in 22 then populates the received proxy card account information into the payment information user interface provided by the merchant's website 2 , which may be a web form.
- the receipt of proxy card information and population of that information into the merchant's user interface normally happens within a few seconds (at most), of the consumer activating the PPS browser control.
- the proxy card information may simply be displayed to the user, who then manually copies that information into the merchant's payment information user interface.
- the merchant e-commerce website 2 sends a transaction authorization request to its acquiring bank, which routes the request to the applicable card network (e.g., Visa or MasterCard) based on the proxy payment card number, which then routes the request to the PPS system 3 .
- the payment authorization unit 27 in the PPS system 3 uses the proxy payment card number in the request to look up the applicable validity rules or rules 28 associated with the proxy payment card information and determine whether the transaction request complies with them. If the request does not comply with any applicable validity rule(s) 28 , the authorization request is denied. If the request does comply, then the payment authorization unit 27 looks up the real payment card information 24 of the consumer and uses that information to authorize the transaction, assuming the consumer's real payment card has not expired and has sufficient credit or funds remaining to cover the transaction amount.
- the applicable card network e.g., Visa or MasterCard
- the PPS client-side functionality may be provided by a separate software application or dedicated PPS hardware device that operates in the consumer's user device 1 .
- the PPS can publish an application programming interface (API) for other software vendors, to allow browsers and/or e-commerce software to invoke the PPS functionality.
- API application programming interface
- the user can easily switch back and forth between a browser or e-commerce application and the PPS client-side application/functionality, to request and receive proxy payment card information.
- FIG. 3 illustrates an example of the message flow between various elements associated with this technique, according to some embodiments.
- the consumer When the consumer is requested by a merchant's e-commerce website to enter payment information for a transaction, the consumer enters an appropriate user input 31 associated with PPS functionality, to the user device 1 .
- FIG. 4A shows an example of a merchant's initially empty payment information webpage 44 (e.g., an HTML form or the like).
- the above-mentioned user input 31 can be in the form of the consumer clicking on a “PPS” button 45 or other similar control, displayed (e.g., by the PPS plug-in) on the webpage 44 .
- the user device 1 sends a proxy card information request 32 to the PPS system 3 .
- the request may be sent using any known or convenient protocol(s), including, for example, Hypertext Transport Protocol Secure (HTTPS).
- HTTPS Hypertext Transport Protocol Secure
- any references to sending or transmitting a message, signal, etc. to another device means that the message is sent with the intention that it its information content ultimately be delivered to the recipient device; however, such references do not mean that the message must be sent directly to the recipient device. That is, unless stated otherwise, there can be one or more intermediary entities that receive and forward the message, signal, etc., either as is or in modified form, prior to its delivery to the recipient device.
- This clarification also applies to any references herein to receiving a message, signal, etc. from another device; i.e., direct point-to-point communication is not required unless so stated.
- the PPS system 3 In response to the proxy card information request 32 , the PPS system 3 generates or looks up the proxy payment card information for that user, and returns it to the user device in a proxy card information response 33 .
- the PPS functionality in the user device 1 then automatically populates this information into the payment card information fields 46 (e.g., card type, card number, security code (CVV), expiration date and name on card) in the merchant's payment information webpage 44 .
- the consumer can manually copy that information into the merchant's payment information webpage 44 .
- FIG. 4B An example of the result of this operation is shown in FIG. 4B , which shows the webpage 44 of FIG. 4A after the card information fields 46 have been populated.
- the PPS system 3 can use a different proxy payment card number for each merchant or category of merchants. Additionally, or as an alternative, the PPS system 3 can generate different combinations of proxy CWs and/or proxy expirations dates with the same proxy payment card number, and can use a different combination of such information for each merchant or category of merchant. The use of such combinations provides a greater number of unique permutations of proxy payment card information, thereby reducing the overall exposure to wrongdoers.
- the consumer When the consumer is ready to commit to the transaction, he or she enters an appropriate user input 34 to the user device 1 , for example, by clicking on a “Pay Now” button 47 .
- This causes the user device 1 to send a conventional transaction confirmation message 35 (e.g., using HTTPS or other similar protocol) containing the proxy card information to the merchant's e-commerce website 2 .
- the merchant's e-commerce website 2 then sends a transaction authorization request 36 to the financial system 4 .
- the financial system 4 routes the request in the form of message 37 to the PPS system 3 .
- the PPS system 3 determines whether to authorize the transaction in the manner described above, and sends an authorization response 38 (e.g.
- the financial system 4 forwards the response in the form of message 39 to the merchant's e-commerce website 2 .
- the merchant's e-commerce website 2 then sends an appropriate message 40 confirming or denying the transaction to the user device 1 , which displays 41 the message to the consumer.
- FIG. 5 illustrates an example of a process performed by the consumer's user device 1 , according to some embodiments.
- a browser in the user device accesses the website of an online merchant at step 501 .
- the browser displays a window including a shopping cart page of the merchant, where the window includes a control for the PPS (e.g., “PPS” button 45 ).
- PPS e.g., “PPS” button 45 .
- the PPS functionality in the user device 1 then at step 504 prompts the consumer for and receives PPS authentication information (e.g., username and password), if such information was not previously input by the consumer and stored locally in the user device.
- PPS authentication information e.g., username and password
- the user device 1 sends a message including the consumer's authentication information to the PPS system 3 .
- the user device 1 receives a message containing the proxy card information from the PPS system 3 at step 506 .
- the user device 1 then at step 507 appropriately populates the payment card information fields of the merchant's payment information page with the proxy card information.
- FIGS. 6A and 6B illustrate examples of processes performed by the PPS system 3 , in association with the example of FIG. 5 , according to some embodiments. More specifically, FIG. 6A shows an example of the process for providing proxy card information to the user device 1 .
- the PPS system 3 receives a message including the consumer's authentication information from the user device 1 .
- the PPS system 3 responds by looking up the consumers account information based on the authentication information at step 602 .
- the PPS system 3 at step 603 retrieves the proxy card information associated with consumer's account if that information was previously generated and stored in the PPS system 3 , or generates the proxy card information if it was not previously generated and stored.
- the PPS system 3 then sends a message containing the proxy card information to the user device at step 604 .
- FIG. 6B shows an example of the process by which the PPS system 3 processes a subsequent transaction authorization request.
- the PPS system 3 receives a transaction authorization request containing proxy card information, from the financial system 4 , based on a corresponding authorization request originated by the merchant's e-commerce website 2 .
- the PPS system 3 responds to the authorization request by determining whether the request complies with the validity rule or rules, stored in the PPS system 3 , associated with the proxy card information in the request.
- the rules include one or more of validity criteria for the proxy card information, such as a time limit, merchant identity or category restriction, transaction amount limit, etc., or a combination thereof.
- the PPS system 3 at step 618 sends a message for delivery to the merchant's e-commerce website 2 , indicating that the transaction is denied. If, on the other hand, the request complies with all applicable validity rules (step 613 ), the PPS system 3 at step 614 looks up the real payment card account associated with the proxy card information, and then determines at step 615 whether the transaction can be authorized based on the real payment card account information (e.g., whether the real payment card is not expired and has sufficient credit or funds available to cover the transaction amount).
- the PPS system 3 determines that the transaction can be authorized based on the real payment card account information (step 616 )
- the PPS system 3 sends a message at step 617 for delivery to the merchant's e-commerce website, indicating that the transaction is authorized; otherwise, the process branches to step 618 , where the PPS system 3 sends a message for delivery to the merchant's e-commerce website 2 , indicating that the transaction is denied.
- FIG. 7 illustrates at a high-level an example of the hardware architecture of a processing system that can be used to implement any of the computing devices referred to above, such as the user device 1 , the merchant website 2 , the PPS system 3 , or the financial system 4 .
- any of these devices each can include multiple instances of an architecture such as shown in FIG. 7 (i.e., multiple computers), particularly the server-based systems such as the merchant website 2 , PPS system 3 , and financial system 4 , and such multiple instances can be coupled to each other via a network or multiple networks.
- the architecture 700 includes one or more processors 710 , memory 711 , one or more communication device(s) 712 , one or more input/output (I/O) devices 713 , and one or more mass storage devices 714 , all coupled to each other through an interconnect 715 .
- the interconnect 715 may be or include one or more conductive traces, buses, point-to-point connections, controllers, adapters and/or other conventional connection devices.
- the processor(s) 710 may be or include, for example, one or more general-purpose programmable microprocessors, digital signal processors (DSPs), microcontrollers, application specific integrated circuits (ASICs), programmable gate arrays, or the like, or a combination of such devices.
- the processor(s) 710 control the overall operation of the processing device 700 .
- Memory 711 may be or include one or more physical storage devices, which may be in the form of random access memory (RAM), read-only memory (ROM) (which may be erasable and programmable), flash memory, miniature hard disk drive, or other suitable type of storage device, or a combination of such devices.
- the mass storage device (s) 714 may be or include one or more hard drives, digital versatile disks (DVDs), flash memories, or the like.
- Memory 711 and/or mass storage 714 may store (individually or collectively) data and instructions that configure the processor(s) 710 to execute operations in accordance with the techniques described above.
- the communication devices 712 may be or include, for example, an Ethernet adapter, cable modem, Wi-Fi adapter, cellular transceiver, Bluetooth or Bluetooth Low Energy (BLE) transceiver, or the like, or a combination thereof.
- the I/O devices 713 can include devices such as a display (which may be a touch screen display), audio speaker, keyboard, mouse or other pointing device, microphone, camera, etc. Note that these I/O devices may be unnecessary, however, if the processing device 700 is embodied solely as a server computer.
- the communication devices 712 can be or include, for example, a cellular telecommunications transceiver (e.g., 3G or 4G/LTE), Wi-Fi transceiver, Bluetooth or BLE transceiver, or the like, or a combination thereof.
- the communication devices 712 can be or include, for example, any of the aforementioned types of communication devices, a wired Ethernet adapter, cable modem, DSL modem, or the like, or a combination of such devices.
- ASICs application-specific integrated circuits
- PLDs programmable logic devices
- FPGAs field-programmable gate arrays
- Machine-readable medium includes any mechanism that can store information in a form accessible by a machine (a machine may be, for example, a computer, network device, cellular phone, personal digital assistant (PDA), manufacturing tool, any device with one or more processors, etc.).
- a machine-accessible medium includes recordable/non-recordable media (e.g., read-only memory (ROM); random access memory (RAM); magnetic disk storage media; optical storage media; flash memory devices; etc.), etc.
Landscapes
- Business, Economics & Management (AREA)
- Engineering & Computer Science (AREA)
- Accounting & Taxation (AREA)
- Physics & Mathematics (AREA)
- Strategic Management (AREA)
- General Business, Economics & Management (AREA)
- General Physics & Mathematics (AREA)
- Theoretical Computer Science (AREA)
- Finance (AREA)
- Computer Security & Cryptography (AREA)
- Microelectronics & Electronic Packaging (AREA)
- Computer Networks & Wireless Communication (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
- Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
Abstract
Description
- This application claims priority to and is a continuation of U.S. patent application Ser. No. 14/453,551, filed on Aug. 6, 2014, the entire contents of which are incorporated herein by reference.
- At least one embodiment of the present invention pertains to electronic commerce, and more particularly, to a technique for enhancing security of sensitive data during online transactions involving payment card accounts.
- When purchasing goods or services online (e.g., via the Internet), a consumer may be given the option to pay by credit card or other type of payment card (e.g., debit card or gift card). To do so, after adding one or more items to his or her electronic shopping cart and requesting checkout, the consumer typically enters his or her payment card information into a web page generated by a shopping cart application of the merchant. Once the payment card information is entered, the consumer provides a confirmation input that indicates his or her commitment to the transaction and that causes his or her user device to submit payment information to the website of the merchant. The merchant's computer system then requests authorization of the card transaction through a financial system.
- One problem with this payment paradigm is that it exposes sensitive information of the consumer, namely, the consumer's payment card information, to various third parties, where it may be vulnerable to misappropriation. For example, the payment card information may be inadvertently provided by the consumer to a wrongdoer posing as a legitimate online merchant. Additionally, merchants sometimes store the consumer's card information. Different merchants implement vastly differing degrees of data security, such that the consumer's card information may be vulnerable to unauthorized acquisition by hackers once it is in the possession of a merchant.
- One or more embodiments of the present invention are illustrated by way of example and not limitation in the figures of the accompanying drawings, in which like references indicate similar elements.
-
FIG. 1 illustrates an example of an environment in which the data security technique can be implemented. -
FIG. 2 illustrates relevant elements of the user device and the payment processing service (PPS) system. -
FIG. 3 illustrates an example of the message flow between various elements associated with the data security technique. -
FIGS. 4A and 4B illustrate unpopulated and populated states, respectively, of a merchant's payment information webpage. -
FIG. 5 illustrates an example of the process performed by the consumer's user device in the data security technique. -
FIGS. 6A and 6B illustrate examples of processes performed by the PPS system in the data security technique. -
FIG. 7 illustrates an example of the hardware architecture of a processing system that can be used to implement any of the computing devices referred to herein. - In the technique introduced here, credit card or other payment card information of a consumer (also called the “cardholder” or “user” herein) is protected during online payment card based transactions, by enabling a user device of the consumer to request and receive, during an online shopping session, temporary proxy payment card information from a third-party payment processing service (PPS), and by enabling the user device to populate that temporary proxy payment card information into an online transaction web interface of the merchant automatically. In some embodiments, this is accomplished by equipping a browser in the user device with a control that, when activated by the consumer, accesses the PPS to obtain the proxy card information populates that information into the online transaction web interface of the merchant automatically. The temporary proxy payment card information is associated in the third-party PPS with a real payment card account of the consumer. When the merchant requests authorization for the transaction with the proxy payment card information, the authorization request gets routed to the PPS via the payment card network, by virtue of the proxy card number, according to the normal authorization request routing process. The PPS then uses the consumer's real payment card information to authorize and fund the transaction.
- Hence, the consumer's real payment card information is never exposed to the merchant or to any unauthorized third parties who penetrate the merchant's information systems. Additionally, this technique is completely transparent to the merchant and therefore requires no modifications to the merchant's e-commerce system.
- Consider the following example scenario in which the technique can be applied. The PPS is a secure business enterprise and computer system that is highly trusted by the consumer. A consumer initially enrolls with the PPS by setting up an account with the PPS, which includes providing his or her real credit card information to the PPS. Enrollment with the PPS may be done via a website of the PPS, by telephone, electronic mail, standard mail, or any other convenient communication channel. The consumer further installs a software extension or plug-in associated with the PPS into a conventional web browser (e.g., Microsoft Internet Explorer, Mozilla Firefox or Google Chrome) in a user device used by the consumer. The user device may be, for example, a conventional personal computer (PC), such as a desktop computer or laptop computer, or it may be a smartphone, tablet computer, or any other known or convenient processing device.
- The consumer later visits an electronic commerce (e-commerce) website of a merchant, which may be a merchant with whom the consumer is not familiar and in whom the consumer does not have a high level of trust. The consumer adds one or more items to his or her electronic shopping cart and requests checkout. The consumer then clicks a button to activate the PPS browser extension, by which the consumer can pay securely through the PPS. When activated, the extension accesses the PPS (which is implemented at least partially on one or more remote server computers) via a network such as the Internet, to obtain a dynamically generated credit card number, along with corresponding card type information, cardholder name, expiration date and card verification value (CVV); this information collectively is the temporary proxy payment card information (or simply proxy card information). The proxy card information can include a valid Visa or Mastercard number, for example, and may be issued by the PPS. Once received from the PPS, the PPS browser extension automatically populates the proxy card information into the merchant's website's checkout page (e.g., a web form). The PPS is subsequently contacted as the card issuer during the credit card payment authorization process.
- Note that while the example of a credit card is used herein to facilitate description, the proxy card information can be associated in the PPS with any other type of real payment card, such as a debit card or a gift card, for example.
- The PPS can maintain validity rules that limit the validity of the proxy card information, such as by time, merchant, transaction amount, number of transactions, or any other criteria. These rules may be specified or selected by the consumer (prior to the transaction), or they may be default rules provided by the PPS. The validity rules include at least one validity criterion, which can be or include, for example, a maximum individual or collective transaction amount and/or a maximum number of transactions for which the proxy card information can be used, particular merchant or category of merchant in which the proxy card information can be used, etc. The validity criterion further can be or include an expiration date and/or time for the proxy card information, which can be different from the expiration date of the consumer's real payment card. Furthermore, the expiration date/time of the proxy card information can also be different from the proxy expiration date provided to the merchant website, i.e., it can be earlier than or later than the proxy expiration date. In other words, the proxy card expiration date provided to the merchant may be a dummy expiration date that does not reflect the actual expiration date/time of the proxy card information or the expiration date of the consumer's real payment card information.
- For example, the validity rules might specify that the proxy card information can be used only once, or only once per day, or only once per day per merchant, or only for specific merchants or categories of merchants, or only for up to $2,500 per month, or combination of such restrictions. From the merchant's perspective, the consumer is using a normal payment card number (and associated information). From the consumer's perspective, they just enter minimal PPS authentication information (e.g., username and password) once, or at most once per user session. From the PPS's perspective, they receive an authorization request through the proxy card information and then use the consumer's real card information on file to authorize and fund the transaction.
- If the merchant is the target of a hacking attack directed to its stored card information, all they have of the consumer is a name and card information that has no value, because the information is single-use or very limited use, and the PPS can deactivate all proxy card numbers used at that merchant without having to the deactivate the backing payment cards.
-
FIG. 1 illustrates an example of an environment in which the data security technique can be implemented. The environment includes at least oneuser device 1A or 1B (collectively user device 1) of a consumer, which can be, for example, amobile device 1A such as a smartphone or tablet, or a PC 1B. The environment further includes ane-commerce website 2 of a merchant, acomputer system 3 of the PPS (hereinafter the PPS system 3), and afinancial system 4 for processing payment card transactions. ThePPS system 3 includes adatabase 5 storing information such as identification information of users enrolled with the PPS, real payment card account information of such users, and an association of that account information with proxy card information for at least some users. - Though not shown in
FIG. 1 , thefinancial system 4 can include the merchant's acquiring bank and at least one payment card payment network, such as Visa or MasterCard, and computer systems associated with such entities. Each of the aforementioned computer systems can include one or more distinct physical computers and/or other processing devices which, in the case of multiple devices, can be connected to each other through one or more wired and/or wireless networks. All of the aforementioned devices are coupled to each other through an internetwork 6, which can be or include the Internet and one or more wireless networks (e.g., a WiFi network and/or a cellular telecommunications network). - Referring now to
FIG. 2 , theuser device 1 and thePPS system 3 are shown in greater detail, according to at least one embodiment. As illustrated, theuser device 1 includes abrowser 21, which in the illustrated embodiment includes a user-installable extension (plug-in) 22 associated with the PPS. In the case of a mobile user device, the PPS client-side functionality may be implemented, for example, by a bookmarklet (i.e., a browser bookmark containing executable script such as JavaScript). - The
PPS system 3 includes, for each consumer enrolled with the PPS,information 23 identifying the consumer and/or the consumer's user device (hereinafter “user/device information”), real paymentcard account information 24 of the consumer, and proxypayment card information 25 associated with the consumer. Additionally, thePPS system 3 includes a cardinformation proxying unit 26 and apayment authorization unit 27. The cardinformation proxying unit 26 is responsible for maintaining the association between the consumer's user/device information 23, realcard account information 24 and proxycard account information 25, and for looking up and providing proxycard account information 25 to theuser device 1 when required. Thepayment authorization unit 27 is responsible for determining whether to authorize requested payment card transactions, including applying storedvalidity rules 28 associated with theproxy card information 25. - In some embodiments, the
PPS system 3 may associate a particular consumer with two or more different sets of proxy payment card accounts, all of which may be associated in thePPS system 3 with the same real payment card of the consumer or with two or more different real payment cards of the consumer. In such an embodiment, the particular proxy payment card information to be used for a given transaction can be selected using any of various techniques, such as by user selection on a per-transaction basis, based on selection rules or policies previously specified by the user, or based on default rules or policies. The real payment card or cards associated with a particular consumer in the PPS system 3 (and hence, with a particular set of proxy payment card information) can include one or more credit cards, debit cards, gift cards, or a combination thereof. - In operation, when the consumer activates a known browser control associated with the PPS plug-in 22, the PPS plug-in 22 sends information of the consumer to the PPS. In certain embodiments, the PPS plug-in first prompts the consumer to enter his or her identifying information to be used by the PPS to authenticate the consumer, such as a username and password. This information can be input one time and then stored locally in the user device for future use, or it may be input by the consumer for each online transaction or each user session. The user/device information may be sent to the
PPS system 3 via any known or convenient network or internetwork, such as the Internet. When the user/device information is received by thePPS system 3, the cardinformation proxying unit 26 uses the user/device information to look up the proxycard account information 25, which it then returns to the PPS plug-in 22. The PPS plug-in 22 then populates the received proxy card account information into the payment information user interface provided by the merchant'swebsite 2, which may be a web form. The receipt of proxy card information and population of that information into the merchant's user interface normally happens within a few seconds (at most), of the consumer activating the PPS browser control. In an alternative embodiment, the proxy card information may simply be displayed to the user, who then manually copies that information into the merchant's payment information user interface. - When the user commits to the transaction by providing an appropriate confirmation input, the
merchant e-commerce website 2 sends a transaction authorization request to its acquiring bank, which routes the request to the applicable card network (e.g., Visa or MasterCard) based on the proxy payment card number, which then routes the request to thePPS system 3. Thepayment authorization unit 27 in thePPS system 3 then uses the proxy payment card number in the request to look up the applicable validity rules orrules 28 associated with the proxy payment card information and determine whether the transaction request complies with them. If the request does not comply with any applicable validity rule(s) 28, the authorization request is denied. If the request does comply, then thepayment authorization unit 27 looks up the realpayment card information 24 of the consumer and uses that information to authorize the transaction, assuming the consumer's real payment card has not expired and has sufficient credit or funds remaining to cover the transaction amount. - In some embodiments, instead of implementing this technique with a browser extension on the client side, the PPS client-side functionality may be provided by a separate software application or dedicated PPS hardware device that operates in the consumer's
user device 1. In that scenario, the PPS can publish an application programming interface (API) for other software vendors, to allow browsers and/or e-commerce software to invoke the PPS functionality. In that case, the user can easily switch back and forth between a browser or e-commerce application and the PPS client-side application/functionality, to request and receive proxy payment card information. -
FIG. 3 illustrates an example of the message flow between various elements associated with this technique, according to some embodiments. When the consumer is requested by a merchant's e-commerce website to enter payment information for a transaction, the consumer enters anappropriate user input 31 associated with PPS functionality, to theuser device 1.FIG. 4A shows an example of a merchant's initially empty payment information webpage 44 (e.g., an HTML form or the like). The above-mentioneduser input 31 can be in the form of the consumer clicking on a “PPS”button 45 or other similar control, displayed (e.g., by the PPS plug-in) on thewebpage 44. - In response to
user input 31, theuser device 1 sends a proxycard information request 32 to thePPS system 3. The request may be sent using any known or convenient protocol(s), including, for example, Hypertext Transport Protocol Secure (HTTPS). - Note that in this description, any references to sending or transmitting a message, signal, etc. to another device (recipient device) means that the message is sent with the intention that it its information content ultimately be delivered to the recipient device; however, such references do not mean that the message must be sent directly to the recipient device. That is, unless stated otherwise, there can be one or more intermediary entities that receive and forward the message, signal, etc., either as is or in modified form, prior to its delivery to the recipient device. This clarification also applies to any references herein to receiving a message, signal, etc. from another device; i.e., direct point-to-point communication is not required unless so stated.
- In response to the proxy
card information request 32, thePPS system 3 generates or looks up the proxy payment card information for that user, and returns it to the user device in a proxycard information response 33. The PPS functionality in theuser device 1 then automatically populates this information into the payment card information fields 46 (e.g., card type, card number, security code (CVV), expiration date and name on card) in the merchant'spayment information webpage 44. Alternatively, the consumer can manually copy that information into the merchant'spayment information webpage 44. An example of the result of this operation is shown inFIG. 4B , which shows thewebpage 44 ofFIG. 4A after the card information fields 46 have been populated. - In certain embodiments, to provide additional fraud protection, the
PPS system 3 can use a different proxy payment card number for each merchant or category of merchants. Additionally, or as an alternative, thePPS system 3 can generate different combinations of proxy CWs and/or proxy expirations dates with the same proxy payment card number, and can use a different combination of such information for each merchant or category of merchant. The use of such combinations provides a greater number of unique permutations of proxy payment card information, thereby reducing the overall exposure to wrongdoers. - When the consumer is ready to commit to the transaction, he or she enters an
appropriate user input 34 to theuser device 1, for example, by clicking on a “Pay Now”button 47. This causes theuser device 1 to send a conventional transaction confirmation message 35 (e.g., using HTTPS or other similar protocol) containing the proxy card information to the merchant'se-commerce website 2. The merchant'se-commerce website 2 then sends atransaction authorization request 36 to thefinancial system 4. Thefinancial system 4 routes the request in the form ofmessage 37 to thePPS system 3. ThePPS system 3 determines whether to authorize the transaction in the manner described above, and sends an authorization response 38 (e.g. authorized or declined) to thefinancial system 4, which forwards the response in the form ofmessage 39 to the merchant'se-commerce website 2. The merchant'se-commerce website 2 then sends anappropriate message 40 confirming or denying the transaction to theuser device 1, which displays 41 the message to the consumer. -
FIG. 5 illustrates an example of a process performed by the consumer'suser device 1, according to some embodiments. Initially, in response to a user input, a browser in the user device accesses the website of an online merchant atstep 501. Atstep 502 the browser displays a window including a shopping cart page of the merchant, where the window includes a control for the PPS (e.g., “PPS” button 45). When the consumer activates the PPS control at step 503 (after having added one or more items to his or her shopping cart and requested checkout), the PPS functionality in theuser device 1 then atstep 504 prompts the consumer for and receives PPS authentication information (e.g., username and password), if such information was not previously input by the consumer and stored locally in the user device. Next, atstep 505 theuser device 1 sends a message including the consumer's authentication information to thePPS system 3. Assuming the user is properly authenticated by thePPS system 3, theuser device 1 receives a message containing the proxy card information from thePPS system 3 atstep 506. Theuser device 1 then atstep 507 appropriately populates the payment card information fields of the merchant's payment information page with the proxy card information. -
FIGS. 6A and 6B illustrate examples of processes performed by thePPS system 3, in association with the example ofFIG. 5 , according to some embodiments. More specifically,FIG. 6A shows an example of the process for providing proxy card information to theuser device 1. Initially, atstep 601 thePPS system 3 receives a message including the consumer's authentication information from theuser device 1. ThePPS system 3 responds by looking up the consumers account information based on the authentication information atstep 602. Based on the account information, thePPS system 3 atstep 603 retrieves the proxy card information associated with consumer's account if that information was previously generated and stored in thePPS system 3, or generates the proxy card information if it was not previously generated and stored. ThePPS system 3 then sends a message containing the proxy card information to the user device atstep 604. -
FIG. 6B shows an example of the process by which thePPS system 3 processes a subsequent transaction authorization request. Atstep 611 thePPS system 3 receives a transaction authorization request containing proxy card information, from thefinancial system 4, based on a corresponding authorization request originated by the merchant'se-commerce website 2. Atstep 612 thePPS system 3 responds to the authorization request by determining whether the request complies with the validity rule or rules, stored in thePPS system 3, associated with the proxy card information in the request. As described above, the rules include one or more of validity criteria for the proxy card information, such as a time limit, merchant identity or category restriction, transaction amount limit, etc., or a combination thereof. If the request does not comply with all applicable validity rules (step 613), then thePPS system 3 atstep 618 sends a message for delivery to the merchant'se-commerce website 2, indicating that the transaction is denied. If, on the other hand, the request complies with all applicable validity rules (step 613), thePPS system 3 atstep 614 looks up the real payment card account associated with the proxy card information, and then determines atstep 615 whether the transaction can be authorized based on the real payment card account information (e.g., whether the real payment card is not expired and has sufficient credit or funds available to cover the transaction amount). If thePPS system 3 determines that the transaction can be authorized based on the real payment card account information (step 616), thePPS system 3 sends a message atstep 617 for delivery to the merchant's e-commerce website, indicating that the transaction is authorized; otherwise, the process branches to step 618, where thePPS system 3 sends a message for delivery to the merchant'se-commerce website 2, indicating that the transaction is denied. -
FIG. 7 illustrates at a high-level an example of the hardware architecture of a processing system that can be used to implement any of the computing devices referred to above, such as theuser device 1, themerchant website 2, thePPS system 3, or thefinancial system 4. Note that any of these devices each can include multiple instances of an architecture such as shown inFIG. 7 (i.e., multiple computers), particularly the server-based systems such as themerchant website 2,PPS system 3, andfinancial system 4, and such multiple instances can be coupled to each other via a network or multiple networks. - In the illustrated embodiment, the
architecture 700 includes one ormore processors 710,memory 711, one or more communication device(s) 712, one or more input/output (I/O)devices 713, and one or moremass storage devices 714, all coupled to each other through aninterconnect 715. Theinterconnect 715 may be or include one or more conductive traces, buses, point-to-point connections, controllers, adapters and/or other conventional connection devices. The processor(s) 710 may be or include, for example, one or more general-purpose programmable microprocessors, digital signal processors (DSPs), microcontrollers, application specific integrated circuits (ASICs), programmable gate arrays, or the like, or a combination of such devices. The processor(s) 710 control the overall operation of theprocessing device 700. -
Memory 711 may be or include one or more physical storage devices, which may be in the form of random access memory (RAM), read-only memory (ROM) (which may be erasable and programmable), flash memory, miniature hard disk drive, or other suitable type of storage device, or a combination of such devices. The mass storage device (s) 714 may be or include one or more hard drives, digital versatile disks (DVDs), flash memories, or the like.Memory 711 and/ormass storage 714 may store (individually or collectively) data and instructions that configure the processor(s) 710 to execute operations in accordance with the techniques described above. Thecommunication devices 712 may be or include, for example, an Ethernet adapter, cable modem, Wi-Fi adapter, cellular transceiver, Bluetooth or Bluetooth Low Energy (BLE) transceiver, or the like, or a combination thereof. Depending on the specific nature and purpose of theprocessing device 700, the I/O devices 713 can include devices such as a display (which may be a touch screen display), audio speaker, keyboard, mouse or other pointing device, microphone, camera, etc. Note that these I/O devices may be unnecessary, however, if theprocessing device 700 is embodied solely as a server computer. - In the case of the
user device 1, thecommunication devices 712 can be or include, for example, a cellular telecommunications transceiver (e.g., 3G or 4G/LTE), Wi-Fi transceiver, Bluetooth or BLE transceiver, or the like, or a combination thereof. In the case of thevalidation system 22, thecommunication devices 712 can be or include, for example, any of the aforementioned types of communication devices, a wired Ethernet adapter, cable modem, DSL modem, or the like, or a combination of such devices. - Unless contrary to physical possibility, it is envisioned that (i) the methods/steps described herein may be performed in any sequence and/or in any combination, and that (ii) the components of respective embodiments may be combined in any manner.
- The machine-implemented operations described above can be implemented by programmable circuitry programmed/configured by software and/or firmware, or entirely by special-purpose circuitry, or by a combination of such forms. Such special-purpose circuitry (if any) can be in the form of, for example, one or more application-specific integrated circuits (ASICs), programmable logic devices (PLDs), field-programmable gate arrays (FPGAs), etc.
- Software used to implement the techniques introduced here may be stored on a machine-readable storage medium and may be executed by one or more general-purpose or special-purpose programmable microprocessors. A “machine-readable medium”, as the term is used herein, includes any mechanism that can store information in a form accessible by a machine (a machine may be, for example, a computer, network device, cellular phone, personal digital assistant (PDA), manufacturing tool, any device with one or more processors, etc.). For example, a machine-accessible medium includes recordable/non-recordable media (e.g., read-only memory (ROM); random access memory (RAM); magnetic disk storage media; optical storage media; flash memory devices; etc.), etc.
- Note that any and all of the embodiments described above can be combined with each other, except to the extent that it may be stated otherwise above or to the extent that any such embodiments might be mutually exclusive in function and/or structure.
- Although the present invention has been described with reference to specific exemplary embodiments, it will be recognized that the invention is not limited to the embodiments described, but can be practiced with modification and alteration within the spirit and scope of the appended claims. Accordingly, the specification and drawings are to be regarded in an illustrative sense rather than a restrictive sense.
Claims (20)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US17/831,279 US20220292503A1 (en) | 2014-08-06 | 2022-06-02 | Data security enhancement for online transactions involving payment card accounts |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US14/453,551 US11354673B1 (en) | 2014-08-06 | 2014-08-06 | Data security enhancement for online transactions involving payment card accounts |
US17/831,279 US20220292503A1 (en) | 2014-08-06 | 2022-06-02 | Data security enhancement for online transactions involving payment card accounts |
Related Parent Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US14/453,551 Continuation US11354673B1 (en) | 2014-08-06 | 2014-08-06 | Data security enhancement for online transactions involving payment card accounts |
Publications (1)
Publication Number | Publication Date |
---|---|
US20220292503A1 true US20220292503A1 (en) | 2022-09-15 |
Family
ID=81852286
Family Applications (2)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US14/453,551 Active 2038-03-16 US11354673B1 (en) | 2014-08-06 | 2014-08-06 | Data security enhancement for online transactions involving payment card accounts |
US17/831,279 Pending US20220292503A1 (en) | 2014-08-06 | 2022-06-02 | Data security enhancement for online transactions involving payment card accounts |
Family Applications Before (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US14/453,551 Active 2038-03-16 US11354673B1 (en) | 2014-08-06 | 2014-08-06 | Data security enhancement for online transactions involving payment card accounts |
Country Status (1)
Country | Link |
---|---|
US (2) | US11354673B1 (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20210326818A1 (en) * | 2020-03-09 | 2021-10-21 | Rent-A-Center West, Inc. | System and method for introduction of a transaction mechanism to an e-commerce website without necessitation of multiparty systems integration |
US20220198438A1 (en) * | 2020-12-18 | 2022-06-23 | The Procter & Gamble Company | Secure product provisioning systems and methods for preventing electronic fraud by generation of ephemeral virtual cards for injection from secure proxy accounts into electronic provisioning networks |
Families Citing this family (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US10937025B1 (en) | 2015-01-15 | 2021-03-02 | Wells Fargo Bank, N.A. | Payment services via application programming interface |
US10621658B1 (en) | 2015-01-15 | 2020-04-14 | Wells Fargo Bank, N.A. | Identity verification services with identity score through external entities via application programming interface |
US10990974B1 (en) * | 2015-01-15 | 2021-04-27 | Wells Fargo Bank, N.A. | Identity verification services and user information provision via application programming interface |
US11995619B1 (en) | 2017-12-28 | 2024-05-28 | Wells Fargo Bank, N.A. | Account open interfaces |
US11093912B1 (en) | 2018-12-10 | 2021-08-17 | Wells Fargo Bank, N.A. | Third-party payment interfaces |
US11044246B1 (en) | 2019-06-21 | 2021-06-22 | Wells Fargo Bank, N.A. | Secure communications via third-party systems through frames |
CN114641777A (en) * | 2019-11-04 | 2022-06-17 | 维萨国际服务协会 | Method and system for automatically filling in payment card information in network application program |
US12021861B2 (en) * | 2021-01-04 | 2024-06-25 | Bank Of America Corporation | Identity verification through multisystem cooperation |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20090132417A1 (en) * | 2007-11-15 | 2009-05-21 | Ebay Inc. | System and method for selecting secure card numbers |
US20100089998A1 (en) * | 2008-10-13 | 2010-04-15 | Sandstrom Ronald W | Electronic Transaction Security System and Method |
US20120259768A1 (en) * | 2011-04-05 | 2012-10-11 | Ebay Inc. | System and method for providing proxy accounts |
US20130346314A1 (en) * | 2007-10-02 | 2013-12-26 | American Express Travel Related Services Company Inc. | Dynamic security code push |
Family Cites Families (63)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US2666655A (en) | 1950-08-15 | 1954-01-19 | William H Wolowitz | Identification card or the like |
US3217643A (en) | 1963-11-19 | 1965-11-16 | Plastron Inc | Credit card bearing printable signature indicia |
US3601913A (en) | 1968-07-22 | 1971-08-31 | Fmc Corp | Magnetic transaction card and method in forming the same |
US5221838A (en) | 1990-12-24 | 1993-06-22 | Motorola, Inc. | Electronic wallet |
USD358419S (en) | 1993-03-29 | 1995-05-16 | Runyan Robert M | Credit card with magnifying glass insert |
US6694300B1 (en) | 1997-03-21 | 2004-02-17 | Walker Digital, Llc | Method and apparatus for providing supplementary product sales to a customer at a customer terminal |
US6601049B1 (en) | 1996-05-02 | 2003-07-29 | David L. Cooper | Self-adjusting multi-layer neural network architectures and methods therefor |
USD387802S (en) | 1997-01-29 | 1997-12-16 | Alan Finkelstein | Credit card with magnifying lens |
USD406861S (en) | 1998-06-25 | 1999-03-16 | Retail Royalty Company | Partially transparent card with opaque machine-readable and signature-receiving stripes |
US7593862B2 (en) | 1999-07-07 | 2009-09-22 | Jeffrey W. Mankoff | Delivery, organization, and redemption of virtual offers from the internet, interactive-TV, wireless devices and other electronic means |
USD438563S1 (en) | 1999-09-01 | 2001-03-06 | American Express Travel Related Services Company, Inc. | Transparent card with an opacity gradient |
USD437882S1 (en) | 1999-09-10 | 2001-02-20 | FCC National Bank | Transaction card |
US7742967B1 (en) * | 1999-10-01 | 2010-06-22 | Cardinalcommerce Corporation | Secure and efficient payment processing system |
WO2001031827A2 (en) | 1999-10-27 | 2001-05-03 | Sarit Pomerantz | Asynchronous item transfer facility, system and method |
USD486515S1 (en) | 2003-03-12 | 2004-02-10 | Park Place Entertainment Corporation | Player tracking and rewards card |
USD498788S1 (en) | 2003-04-03 | 2004-11-23 | Capital One Financial Corporation | Data card |
US7433499B2 (en) | 2003-08-22 | 2008-10-07 | Dynasig Corporation | Method and apparatus for capturing and authenticating biometric information from a writing instrument |
US8489452B1 (en) | 2003-09-10 | 2013-07-16 | Target Brands, Inc. | Systems and methods for providing a user incentive program using smart card technology |
US7567936B1 (en) * | 2003-10-14 | 2009-07-28 | Paradox Technical Solutions Llc | Method and apparatus for handling pseudo identities |
CA2503740A1 (en) | 2005-03-11 | 2006-09-11 | Dushyant Sharma | Electronic payment system for financial institutions and companies to receive online payments |
WO2007008686A2 (en) | 2005-07-09 | 2007-01-18 | Deschryver Michelle E | Electronic savings transfers |
JP4855727B2 (en) * | 2005-07-22 | 2012-01-18 | 富士通株式会社 | Biometric authentication device delegation change method, biometric authentication method, and biometric authentication device |
US9069745B2 (en) * | 2007-01-16 | 2015-06-30 | Ebay, Inc. | Electronic form automation |
US20080208688A1 (en) | 2007-02-22 | 2008-08-28 | First Data Corporation | Methods and systems for handling of mobile discount certificates using mobile devices |
US7885878B2 (en) | 2008-05-28 | 2011-02-08 | First Data Corporation | Systems and methods of payment account activation |
USD635186S1 (en) | 2008-06-30 | 2011-03-29 | Jpmorgan Chase Bank, N.A. | Metal transaction device |
US8738922B2 (en) | 2008-09-30 | 2014-05-27 | Stepover Gmbh | Method and device for electronically capturing a handwritten signature and safeguarding biometric data |
USD617378S1 (en) | 2009-02-12 | 2010-06-08 | Jpmorgan Chase Bank, N.A. | Transaction device with a gem-like surface appearance |
USD620975S1 (en) | 2009-02-12 | 2010-08-03 | Jpmorgan Chase Bank, N.A. | Transaction device |
AU2010271242B2 (en) | 2009-07-09 | 2015-01-22 | Cubic Corporation | Transit account management with mobile device messaging |
US20140249904A1 (en) | 2009-09-23 | 2014-09-04 | E2Interactive, Inc. D/B/A E2Interactive, Inc. | Systems and Methods for Managing a Virtual Card Based on Geographical and Balance Information |
US20110099088A1 (en) * | 2009-10-28 | 2011-04-28 | Adgregate Markets, Inc. | Various methods and apparatuses for completing a transaction order through an order proxy system |
US8577399B2 (en) * | 2010-06-15 | 2013-11-05 | Cox Communications, Inc. | Systems and methods for facilitating a commerce transaction over a distribution network |
US20130024371A1 (en) | 2011-02-22 | 2013-01-24 | Prakash Hariramani | Electronic offer optimization and redemption apparatuses, methods and systems |
US20130060626A1 (en) | 2011-03-04 | 2013-03-07 | Tristan Walker | System and method for managing and redeeming offers with a location-based service |
US20120278189A1 (en) | 2011-04-13 | 2012-11-01 | Gmg Lifestyle Entertainment, Inc. | Digital currency card sale, redemption and activation system and method |
EP3605432A1 (en) | 2011-05-10 | 2020-02-05 | Dynamics Inc. | Systems, devices and methods for mobile payment acceptance, mobile authorizations, mobile wallets, and contactless communication mechanisms |
US20120296818A1 (en) | 2011-05-17 | 2012-11-22 | Ebay Inc. | Method for authorizing the activation of a spending card |
SG195079A1 (en) | 2011-06-03 | 2013-12-30 | Visa Int Service Ass | Virtual wallet card selection apparatuses, methods and systems |
US8571982B2 (en) | 2011-07-21 | 2013-10-29 | Bank Of America Corporation | Capacity customization for fraud filtering |
USD665851S1 (en) | 2011-07-21 | 2012-08-21 | Crown Packaging Technology, Inc. | Metal card |
US20130166441A1 (en) | 2011-12-22 | 2013-06-27 | Egor Kobylkin | Instant Disposable Payment Card |
US8880602B2 (en) * | 2012-03-23 | 2014-11-04 | Apple Inc. | Embedding an autograph in an electronic book |
US20140012701A1 (en) | 2012-07-05 | 2014-01-09 | Index Systems, Inc. | Electronic commerce network with mobile transactions |
US20140025451A1 (en) | 2012-07-20 | 2014-01-23 | First Data Corporation | Enhanced transaction processing |
US9639597B2 (en) * | 2012-10-30 | 2017-05-02 | FHOOSH, Inc. | Collecting and classifying user information into dynamically-updated user profiles |
US9747632B2 (en) | 2013-01-13 | 2017-08-29 | Retail Technologies Corporation | Store mobile cloud application system for inventory management and customer order fulfillment and method for retail establishment |
GB2510584A (en) | 2013-02-07 | 2014-08-13 | Paneleven Ltd | Personalising bank and similar cards |
USD767024S1 (en) | 2013-09-10 | 2016-09-20 | Dynamics Inc. | Interactive electronic card with contact connector |
CN104751332A (en) | 2013-12-26 | 2015-07-01 | 腾讯科技(深圳)有限公司 | Information registration method, terminal, server and information registration system |
US9805384B2 (en) | 2014-02-05 | 2017-10-31 | Mastercard International Incorporated | Method and system for payment card linked offer generation |
CN104915835B (en) | 2014-03-13 | 2018-10-02 | 腾讯科技(深圳)有限公司 | Credit accounts creating device, system and method |
US20150278801A1 (en) | 2014-03-26 | 2015-10-01 | Outerwall Inc. | Prepaid card exchange systems and associated methods |
US9477852B1 (en) | 2014-07-24 | 2016-10-25 | Wells Fargo Bank, N.A. | Augmented reality numberless transaction card |
EP3186765A4 (en) | 2014-08-27 | 2018-01-10 | Capital One Financial Corporation | Augmented reality card activation |
US10157397B2 (en) | 2014-12-29 | 2018-12-18 | Comenity Llc | Collecting and analyzing data from a mobile device |
CA2913291A1 (en) | 2015-11-27 | 2017-05-27 | Douglas Gilbertson | System for generating employee confirmation signature pages |
USD813302S1 (en) | 2016-06-08 | 2018-03-20 | Bank Of America Corporation | Card with 2D barcode |
US9741036B1 (en) | 2016-06-30 | 2017-08-22 | Square, Inc. | Provisioning account numbers and cryptographic tokens |
US10748130B2 (en) | 2016-09-30 | 2020-08-18 | Square, Inc. | Sensor-enabled activation of payment instruments |
US10032325B1 (en) | 2016-12-16 | 2018-07-24 | Square, Inc. | Formatted card signature generator |
US10055715B1 (en) | 2017-07-26 | 2018-08-21 | Square, Inc. | Cryptocurrency payment network |
WO2019090236A1 (en) | 2017-11-03 | 2019-05-09 | Pap Investments, Ltd. | Transaction card with embedded premium content |
-
2014
- 2014-08-06 US US14/453,551 patent/US11354673B1/en active Active
-
2022
- 2022-06-02 US US17/831,279 patent/US20220292503A1/en active Pending
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20130346314A1 (en) * | 2007-10-02 | 2013-12-26 | American Express Travel Related Services Company Inc. | Dynamic security code push |
US20090132417A1 (en) * | 2007-11-15 | 2009-05-21 | Ebay Inc. | System and method for selecting secure card numbers |
US20100089998A1 (en) * | 2008-10-13 | 2010-04-15 | Sandstrom Ronald W | Electronic Transaction Security System and Method |
US20120259768A1 (en) * | 2011-04-05 | 2012-10-11 | Ebay Inc. | System and method for providing proxy accounts |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20210326818A1 (en) * | 2020-03-09 | 2021-10-21 | Rent-A-Center West, Inc. | System and method for introduction of a transaction mechanism to an e-commerce website without necessitation of multiparty systems integration |
US20220198438A1 (en) * | 2020-12-18 | 2022-06-23 | The Procter & Gamble Company | Secure product provisioning systems and methods for preventing electronic fraud by generation of ephemeral virtual cards for injection from secure proxy accounts into electronic provisioning networks |
Also Published As
Publication number | Publication date |
---|---|
US11354673B1 (en) | 2022-06-07 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US20220292503A1 (en) | Data security enhancement for online transactions involving payment card accounts | |
US12051056B2 (en) | User authentication using a browser cookie shared between a browser and an application | |
US20240346489A1 (en) | Unified login across applications | |
US11861610B2 (en) | Public ledger authentication system | |
US20220318799A1 (en) | Systems And Methods For Using A Transaction Identifier To Protect Sensitive Credentials | |
US11089003B2 (en) | Browser extension for limited-use secure token payment | |
US11954674B1 (en) | Systems and methods for third party token based authentication | |
US9165291B1 (en) | Payment transaction by email | |
US10432617B2 (en) | One time passcode | |
CN111357001A (en) | Secure e-mail based authentication for account login, account creation, and for password-less transactions | |
US20150339656A1 (en) | Verified purchasing by push notification | |
US11775948B2 (en) | System and method for two-click validation | |
CN115115363A (en) | Adaptive authentication processing | |
US20170270531A1 (en) | Account notifications for required information to complete a financial transaction | |
US20220020023A1 (en) | Systems and methods facilitating account access delegation | |
US20100312704A1 (en) | Method and Apparatus for On Demand Generation, Use and Transfer of Virtual Financial Instruments | |
US11176539B2 (en) | Card storage handler for tracking of card data storage across service provider platforms | |
US20190279196A1 (en) | Systems and methods for digitizing payment card accounts | |
WO2023158420A1 (en) | System, method, and computer program product for secure data distribution |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
STPP | Information on status: patent application and granting procedure in general |
Free format text: DOCKETED NEW CASE - READY FOR EXAMINATION |
|
AS | Assignment |
Owner name: BLOCK, INC., CALIFORNIA Free format text: CHANGE OF NAME;ASSIGNOR:SQUARE, INC.;REEL/FRAME:061202/0838 Effective date: 20211209 Owner name: SQUARE, INC., CALIFORNIA Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:BROCK, ZACHARY;REEL/FRAME:060830/0375 Effective date: 20140929 |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: NON FINAL ACTION MAILED |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: RESPONSE TO NON-FINAL OFFICE ACTION ENTERED AND FORWARDED TO EXAMINER |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: FINAL REJECTION MAILED |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: DOCKETED NEW CASE - READY FOR EXAMINATION |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: NON FINAL ACTION MAILED |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: RESPONSE TO NON-FINAL OFFICE ACTION ENTERED AND FORWARDED TO EXAMINER |