US20230162185A1 - Systems and methods for instant merchant activation for secured in-person payments at point of sale - Google Patents

Systems and methods for instant merchant activation for secured in-person payments at point of sale Download PDF

Info

Publication number
US20230162185A1
US20230162185A1 US18/101,435 US202318101435A US2023162185A1 US 20230162185 A1 US20230162185 A1 US 20230162185A1 US 202318101435 A US202318101435 A US 202318101435A US 2023162185 A1 US2023162185 A1 US 2023162185A1
Authority
US
United States
Prior art keywords
payment
transaction data
sensitive
request
electronic
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
US18/101,435
Inventor
Sireesh Potireddy
Rich ABERMAN
John R. Canfield
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
WePay Inc
Original Assignee
WePay Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by WePay Inc filed Critical WePay Inc
Priority to US18/101,435 priority Critical patent/US20230162185A1/en
Assigned to WEPAY, INC. reassignment WEPAY, INC. ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: CANFIELD, JOHN R., ABERMAN, Rich, POTIREDDY, SIREESH
Publication of US20230162185A1 publication Critical patent/US20230162185A1/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/02Payment architectures, schemes or protocols involving a neutral party, e.g. certification authority, notary or trusted third party [TTP]
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • G06Q20/3829Payment protocols; Details thereof insuring higher security of transaction involving key management
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/46Multiprogramming arrangements
    • G06F9/54Interprogram communication
    • G06F9/547Remote procedure calls [RPC]; Web services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/02Payment architectures, schemes or protocols involving a neutral party, e.g. certification authority, notary or trusted third party [TTP]
    • G06Q20/027Payment architectures, schemes or protocols involving a neutral party, e.g. certification authority, notary or trusted third party [TTP] involving a payment switch or gateway
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/08Payment architectures
    • G06Q20/20Point-of-sale [POS] network systems
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/30Payment architectures, schemes or protocols characterised by the use of specific devices or networks
    • G06Q20/32Payment architectures, schemes or protocols characterised by the use of specific devices or networks using wireless devices
    • G06Q20/326Payment applications installed on the mobile devices
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/30Payment architectures, schemes or protocols characterised by the use of specific devices or networks
    • G06Q20/34Payment architectures, schemes or protocols characterised by the use of specific devices or networks using cards, e.g. integrated circuit [IC] cards or magnetic cards
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/30Payment architectures, schemes or protocols characterised by the use of specific devices or networks
    • G06Q20/34Payment architectures, schemes or protocols characterised by the use of specific devices or networks using cards, e.g. integrated circuit [IC] cards or magnetic cards
    • G06Q20/352Contactless payments by cards
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/401Transaction verification
    • G06Q20/4016Transaction verification involving fraud or risk level assessment in transaction processing
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/401Transaction verification
    • G06Q20/4018Transaction verification using the card verification value [CVV] associated with the card
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q2220/00Business processing using cryptography

Definitions

  • a payment is a monetary or financial transaction (or simply transaction) that moves money from a source account to a destination account.
  • one common form of payment is credit card payment.
  • a point of sale (POS) or point of purchase (POP) is the time and place of an in-person (vs. online) purchase where a retail payment transaction is completed between a merchant and a customer who makes a payment in exchange for goods or services from the merchant.
  • a POS payment terminal or device is a payment transaction device associated with the merchant, wherein the POS payment terminal accepts a credit card, a debit card, or an EMV® chip card, such as Master, Visa, American Express, or Discover card from the customer and provides information of the card to the card issuer (e.g., credit card company) to process the transaction.
  • a credit card e.g., MasterCard
  • EMV® chip card such as Master, Visa, American Express, or Discover card from the customer and provides information of the card to the card issuer (e.g., credit card company) to process the transaction.
  • POS payment terminals There are various types of POS payment terminals on the market and they all have one thing in common—they need to be certified upfront by the card issuers providing electronic payment processing services to the merchants to make sure that the POS payment terminals can function correctly and comply with the requirements set by the card issuers.
  • the certification process is a rigorous underwriting process including full upfront review of the merchant via testing of the entire chain of electronic payment processing from the POS payment terminal through an acquirer to the card issuer.
  • the certification process typically requires the merchant to first apply for certification of its POS payment terminal by an authorized third party, which handles the certification based on the rules set by EMVCo, a global organization that manages, maintains and enhances the global EMV® standard. Such certification process is often time-consuming. As the number of individual retailers (vs.
  • POS payment terminals are increasing rapidly, they would prefer their POS payment terminals to be activated (“on-board”) and available to use instantly instead of waiting for the lengthy certification.
  • some companies e.g., Square
  • these terminals are limited to their own types only and still need to be certified. It is thus desirable to be able to instantly activate various kinds of existing POS payment terminals on the market without certification while still maintaining secured electronic payment processing via the POS payment terminals.
  • FIG. 1 depicts an example of a diagram of a system to support instant merchant activation for secured in-person payment at a POS of a merchant in accordance with some embodiments.
  • FIG. 2 depicts an example of a flowchart of a process to support instant merchant activation for secured in-person payment at a POS of a merchant in accordance with some embodiments.
  • a new approach is proposed that contemplates systems and methods to support instant merchant activation for secured in-person payment at a point of sale (POS) of a merchant.
  • the payment initiation device is configured to collect both sensitive and non-sensitive portions of electronic payment transaction data for the request and encrypt the sensitive data portion for secured transmission.
  • a payment gateway in the payment transaction process is configured to relay the data to a payment processor for approval by an issuer and transmit only the non-sensitive portion of the data to a payment service engine for risk analysis if the payment request is approved by the issuer.
  • the payment service engine is configured to determine if the payment request is at high risk based on risk analysis of the non-sensitive portion of the data received and notify the payment initiation device and/or the merchant accordingly.
  • the proposed approach By assessing the risk of each payment transaction without accessing sensitive financial information of the customer, the proposed approach enables instant activation of the merchant without weakening the security of the electronic payment transaction process.
  • the merchant can accept payment from its clients immediately via any type of POS payment device available on the market instantly while eliminating the lengthy certification process.
  • the sensitive financial data is encrypted and transmitted over the entire payment transaction process between the POS payment device and the payment processor following the conventional payment processing model, the security and integrity of the electronic payment transaction process is not weakened or compromised.
  • FIG. 1 depicts an example of a diagram of a system 100 to support instant merchant activation for secured in-person payment at a POS of a merchant.
  • the diagrams depict components as functionally separate, such depiction is merely for illustrative purposes. It will be apparent that the components portrayed in this figure can be arbitrarily combined or divided into separate software, firmware and/or hardware components. Furthermore, it will also be apparent that such components, regardless of how they are combined or divided, can execute on the same host or multiple hosts, and wherein the multiple hosts can be connected by one or more networks.
  • the system 100 includes at least a payment initiation device 102 , a payment gateway 104 , a payment processor 106 , and a payment service engine 108 .
  • Each component of the system 100 runs on a computing unit/appliance/host (not shown) located at distributed geographical locations, with software instructions stored in a storage unit such as a non-volatile memory (also referred to as secondary memory) of the host for practicing one or more processes.
  • a storage unit such as a non-volatile memory (also referred to as secondary memory) of the host for practicing one or more processes.
  • a storage unit such as a non-volatile memory (also referred to as secondary memory) of the host for practicing one or more processes.
  • the software instructions are executed, at least a subset of the software instructions is loaded into memory (also referred to as primary memory) by the host, which becomes a special purposed one for practicing the processes.
  • the processes may also be at least partially embodied in the host into which computer program code is loaded and/or executed, such that, the host becomes a special purpose computing unit for practicing the processes.
  • the computer program code segments configure the host to create specific logic circuits.
  • each host running a component of system 100 can be a computing device, a communication device, a storage device, or any computing device capable of running a software component.
  • a computing device can be but is not limited to a laptop PC, a desktop PC, a tablet PC, or an x86 or ARM-based a server running Linux or other operating systems.
  • each host has a communication interface (not shown), which enables the components of the system 100 to communicate with each other and/or client devices 110 following certain communication protocols, such as TCP/IP, http, https, ftp, and sftp protocols, over one or more communication networks (not shown).
  • the communication networks can be but are not limited to, internet, intranet, wide area network (WAN), local area network (LAN), wireless network, Bluetooth, WiFi, and mobile communication network.
  • the physical connections of the network and the communication protocols are well known to those skilled in the art.
  • the payment initiation device 102 associated with a merchant who wishes to accept payments from its customers is configured to enable a customer to initiate an (electronic) payment request (make a payment) for the merchant's products and/or services via his/her financial instrument, which can be but is not limited to, a credit card, a debit card, a prepaid card, an EMV® chip card, or a mobile communication device having a near-field communication (NFC) chip and an app to support mobile payment (e.g., Apple Pay via iPhone).
  • a financial instrument which can be but is not limited to, a credit card, a debit card, a prepaid card, an EMV® chip card, or a mobile communication device having a near-field communication (NFC) chip and an app to support mobile payment (e.g., Apple Pay via iPhone).
  • NFC near-field communication
  • the payment initiation device 102 can be a dedicated/stand-alone POS payment terminal, a pin-pad linked to a POS payment terminal, a potable card reader attached to a mobile communication device, a mobile communication device capable of recognizing the financial instrument, or a device with integrated hardware and software that together accepts the payment request from the customer.
  • the mobile communication device can be but is not limited to, a smart phone, a tablet, an iPhone, ab iPad, a Google's Android device, and/or other types of mobile communication devices.
  • the payment initiation device 102 resides locally with the merchant and/or the customer and communicates remotely with the rest of the system 100 over the communication networks.
  • the payment initiation device 102 upon receiving the payment request initiated by a customer, is configured to collect the electronic payment transaction data from the customer's financial instrument and/or the payment request.
  • the payment transaction data for the payment request can be collected by one of accepting card information manually entered by the customer, reading data stored on a magnetic stripe of a card swiped at the payment initiation device 102 , reading data stored on a chip of a chip card inserted into the payment initiation device 102 , and transmitting data from an NFC chip on a mobile communication device when tapped by the customer.
  • the collected payment transaction data includes a sensitive data portion and a non-sensitive data portion.
  • the non-sensitive data portion includes information that can be used to identify the customer, including but not limited to one or more of name and/or billing address of the customer, non-sensitive part of a unique identifier/number of the financial instrument, e.g., the 1st 6 digits of a credit card (also known as the Issuer BIN) and last 4 digits of the credit card number, type of the financial instrument, brand of the financial instrument, e.g., Master, Visa, American Express, or Discover card, and how the payment transaction data of the financial instrument is collected.
  • the non-sensitive data portion of the payment transaction data further includes details of the payment request, e.g., the amount being requested for approval and a list of the products and/or services purchased, shipping address, and/or details of the merchant, e.g., merchant name or id, and information of the payment initiation device 102 , e.g., device id and location.
  • the sensitive data portion of the payment transaction data includes confidential financial information of the financial instrument, including one or more of full (16 digits) card number, CVV code, expiration date, and other sensitive data stored on the financial instrument. If obtained by an unauthorized third party, the sensitive data portion may be used to initiate another payment request without the customer's knowledge or consent and thus needs to be securely guarded.
  • the payment initiation device 102 is configured to encrypt the sensitive data portion using one or more keys provided by and shared only with the payment processor 106 , wherein the encrypted sensitive data portion can only be decrypted by the payment processor 106 .
  • certified payment initiation devices 102 e.g., certified POS terminals
  • the payment initiation device 102 is then configured to transmit the payment request with both the non-sensitive data portion and the encrypted sensitive data portion of the electronic payment transaction data to the payment processor 106 for payment processing through the payment gateway 104 .
  • the payment gateway 104 located in the payment transaction process between the payment initiation device 102 and the payment processor 106 .
  • the payment gateway 104 can be a stand-alone system, a piece of software such as an SDK embedded within the payment initiation device 102 , or a component embedded within the payment processor 106 .
  • the payment gateway 104 is configured to receive the payment request with both the non-sensitive data portion and the encrypted sensitive data portion transmitted by the payment initiation device 102 .
  • the payment gateway 104 is then configured to relay/transmit/forward both the non-sensitive data portion and the encrypted sensitive data portion with the payment request to the payment processor 106 for payment processing. Note the payment gateway 104 cannot access the encrypted sensitive data portion since the keys used to encrypt and decrypt the sensitive data are shared only between the payment initiation device 102 and the payment processor 106 .
  • the payment processor 106 is configured to decrypt the sensitive data portion of the electronic payment transaction data relayed by the payment gateway 104 using the keys shared only with the payment initiation device 102 and send the payment request with the electronic payment transaction data to an appropriate payment network, e.g., credit card network like Visa, Master Card or a PIN Debit network like STAR, PULSE etc.
  • the payment network then sends the payment request and the electronic payment transaction data to the issuer/issuing bank of the financial instrument of the customer for approval and returns a response to the payment processor 106 as to whether the payment has been approved by the issuer or not, along with any other additional information by the issuer.
  • the payment processor 106 Once the payment processor 106 has received confirmation that the payment request has been approved (or denied) by the issuer, it relays the confirmation and/or the additional information back to the payment initiation device 102 of the merchant via the payment gateway 104 , wherein the payment initiation device 102 will complete the payment transaction process if the payment service engine 108 determines that the payment request is not at high risk as discussed in details below.
  • the payment gateway 104 receives the confirmation from the payment processor 106 that the payment request has been approved by the issuer, the payment gateway 104 is then configured to transmit only the non-sensitive data portion of the electronic payment transaction data to the payment service engine 108 for risk analysis to determine if the payment request should be processed or not by invoking an Application Program Interface (API) call to the payment service engine 108 .
  • the non-sensitive data portion includes details about the transaction, the financial instrument, the customer, the merchant, etc. as discussed above, as well as the response returned by the payment processor 106 for risk analysis.
  • the payment gateway 104 does not have access to and thus does not send the sensitive data portion that includes sensitive data of the financial instrument, such as the full card number, to the payment service engine 108 .
  • the payment service engine 108 is configured to accept and analyze the non-sensitive data portion of the electronic payment transaction data from the payment gateway 104 in real time to determine whether the payment request should be processed or not.
  • the payment service engine 108 is associated with/provided by a third party payment service provider (e.g., WePay), which is a separate payment service entity outside of the conventional payment transaction process between the payment initiation device 102 and the payment processor 106 .
  • the payment service engine 108 is responsible for underwriting the merchant since the certification process of the payment initiation device 102 and/or the merchant has been eliminated.
  • the payment service engine 108 is configured to assess the risk of the payment request in real time by analyzing the non-sensitive data portion of the payment transaction in view of historical payment transaction data of the customer and/or the merchant maintained in a payment database 110 . For a non-limiting example, if the payment service engine 108 determines that the customer information in the non-sensitive data portion matches with a person in the payment database 110 whose payment request has been denied in the past, or the shipping address of the customer matches an address associated with fraud in the payment database 110 , or the amount of the payment request is unusually higher than the historical payment requests for this category of merchant, the payment service engine 108 may determine that the payment request is at high risk and notify the payment gateway 104 and/or the merchant accordingly.
  • the payment gateway 104 If the payment request is approved by the payment service engine 108 , e.g., it is not at high risk and should be processed, the payment gateway 104 returns a successful response to the payment initiation device 102 . If, on the other hand, the payment request is declined by the payment service engine 108 , e.g., it is at high risk, the payment gateway 104 then returns a declined response to the payment initiation device 102 and also cancels the previously approved payment transaction with the payment processor 106 . Upon receiving the response from the payment gateway 104 , the payment initiation device 102 displays the appropriate result, e.g., payment approved or declined, accordingly to the customer and/or the merchant. The payment initiation device 102 or the payment service engine 108 will then settle the transaction amount of the payment request with the bank of the merchant.
  • the payment initiation device 102 or the payment service engine 108 will then settle the transaction amount of the payment request with the bank of the merchant.
  • FIG. 2 depicts an example of a flowchart of a process to support instant merchant activation for secured in-person payment at a POS of a merchant.
  • FIG. 2 depicts functional steps in a particular order for purposes of illustration, the process is not limited to any particular order or arrangement of steps.
  • One skilled in the relevant art will appreciate that the various steps portrayed in this figure could be omitted, rearranged, combined and/or adapted in various ways.
  • the flowchart 200 starts at block 202 , where a payment request for electronic payment initiated by a customer via a financial instrument at a payment initiation device is accepted and electronic payment transaction data for the payment request is collected, wherein the electronic payment transaction data includes a sensitive data portion and a non-sensitive data portion.
  • the flowchart 200 continues to block 204 , where the sensitive data portion is encrypted using one or more keys provided by and shared only with a payment processor and the electronic payment transaction data is transmitted with the payment request through a payment gateway.
  • the flowchart 200 continues to block 206 , where both the sensitive and the non-sensitive data portion of the electronic payment transaction data are accepted and forwarded with the payment request to the payment processor for payment processing.
  • the flowchart 200 continues to block 208 , where the sensitive data portion of the electronic payment transaction data is decrypted using the keys shared only with the payment initiation device and the payment request is sent with the electronic payment transaction data over a payment network to the issuer of the financial instrument for approval.
  • the flowchart 200 continues to block 210 , where only the non-sensitive data portion of the electronic payment transaction data is transmitted to a payment service engine for risk analysis to determine if the payment request should be processed or not once the payment request has been approved by an issuer of the financial instrument.
  • the flowchart 200 ends at block 212 , where the non-sensitive data portion of the electronic payment transaction data is accepted and analyzed in real time to determine whether the payment request should be processed or not.
  • One embodiment may be implemented using a conventional general purpose or a specialized digital computer or microprocessor(s) programmed according to the teachings of the present disclosure, as will be apparent to those skilled in the computer art.
  • Appropriate software coding can readily be prepared by skilled programmers based on the teachings of the present disclosure, as will be apparent to those skilled in the software art.
  • the invention may also be implemented by the preparation of integrated circuits or by interconnecting an appropriate network of conventional component circuits, as will be readily apparent to those skilled in the art.
  • One embodiment includes a computer program product which is a machine readable medium (media) having instructions stored thereon/in which can be used to program one or more hosts to perform any of the features presented herein.
  • the machine readable medium can include, but is not limited to, one or more types of disks including floppy disks, optical discs, DVD, CD-ROMs, micro drive, and magneto-optical disks, ROMs, RAMs, EPROMs, EEPROMs, DRAMs, VRAMs, flash memory devices, magnetic or optical cards, nanosystems (including molecular memory ICs), or any type of media or device suitable for storing instructions and/or data.
  • the present invention includes software for controlling both the hardware of the general purpose/specialized computer or microprocessor, and for enabling the computer or microprocessor to interact with a human viewer or other mechanism utilizing the results of the present invention.
  • software may include, but is not limited to, device drivers, operating systems, execution environments/containers, and applications.

Landscapes

  • Business, Economics & Management (AREA)
  • Engineering & Computer Science (AREA)
  • Accounting & Taxation (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Strategic Management (AREA)
  • General Business, Economics & Management (AREA)
  • Computer Security & Cryptography (AREA)
  • Finance (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Microelectronics & Electronic Packaging (AREA)
  • Software Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
  • Cash Registers Or Receiving Machines (AREA)

Abstract

A new approach is proposed to support instant merchant activation for secured in-person payment at a point of sale (POS) of a merchant. When a customer initiates an in-person payment request at a payment initiation device associated with the merchant, the payment initiation device collects both sensitive and non-sensitive portions of electronic payment transaction data for the request and encrypts the sensitive data portion for secured transmission. A payment gateway in the payment transaction process relays the data and the payment request to a payment processor for approval by an issuer and transmits only the non-sensitive portion of the data to a payment service engine for risk analysis if the payment request is approved by the issuer. The payment service engine determines if the payment request is at high risk based on risk analysis of non-sensitive portion of the data and notifies the payment initiation device and/or merchant accordingly.

Description

    CROSS-REFERENCE TO RELATED APPLICATIONS
  • This application is a continuation of U.S. patent application Ser. No. 16/072,120, filed Jul. 23, 2018, and entitled “Systems and Methods For Instant Merchant Activation for Secured In-Person Payments at Point of Sale,” now U.S. Pat. No. (------) which is a U.S. national stage application under § 371 of International Patent Application No. PCT/US17/566774, filed Oct. 13, 2017, which claims the benefit of U.S. Provisional Patent Application No. 62/540,514, filed Aug. 2, 2017, and entitled “Instant Merchant Activation for Secured In-Person Payments,” each of which is incorporated herein in its respective entirety by reference.
  • BACKGROUND
  • A payment is a monetary or financial transaction (or simply transaction) that moves money from a source account to a destination account. For a non-limiting example, one common form of payment is credit card payment. A point of sale (POS) or point of purchase (POP) is the time and place of an in-person (vs. online) purchase where a retail payment transaction is completed between a merchant and a customer who makes a payment in exchange for goods or services from the merchant. A POS payment terminal or device is a payment transaction device associated with the merchant, wherein the POS payment terminal accepts a credit card, a debit card, or an EMV® chip card, such as Master, Visa, American Express, or Discover card from the customer and provides information of the card to the card issuer (e.g., credit card company) to process the transaction.
  • There are various types of POS payment terminals on the market and they all have one thing in common—they need to be certified upfront by the card issuers providing electronic payment processing services to the merchants to make sure that the POS payment terminals can function correctly and comply with the requirements set by the card issuers. The certification process is a rigorous underwriting process including full upfront review of the merchant via testing of the entire chain of electronic payment processing from the POS payment terminal through an acquirer to the card issuer. The certification process typically requires the merchant to first apply for certification of its POS payment terminal by an authorized third party, which handles the certification based on the rules set by EMVCo, a global organization that manages, maintains and enhances the global EMV® standard. Such certification process is often time-consuming. As the number of individual retailers (vs. traditional retail chain stores) are increasing rapidly, they would prefer their POS payment terminals to be activated (“on-board”) and available to use instantly instead of waiting for the lengthy certification. Although some companies (e.g., Square) have offered their own proprietary POS payment terminals such as card readers to merchants for instant on-board usage, these terminals are limited to their own types only and still need to be certified. It is thus desirable to be able to instantly activate various kinds of existing POS payment terminals on the market without certification while still maintaining secured electronic payment processing via the POS payment terminals.
  • The foregoing examples of the related art and limitations related therewith are intended to be illustrative and not exclusive. Other limitations of the related art will become apparent upon a reading of the specification and a study of the drawings.
  • BRIEF DESCRIPTION OF THE DRAWINGS
  • Aspects of the present disclosure are best understood from the following detailed description when read with the accompanying figures. It is noted that, in accordance with the standard practice in the industry, various features are not drawn to scale. In fact, the dimensions of the various features may be arbitrarily increased or reduced for clarity of discussion.
  • FIG. 1 depicts an example of a diagram of a system to support instant merchant activation for secured in-person payment at a POS of a merchant in accordance with some embodiments.
  • FIG. 2 depicts an example of a flowchart of a process to support instant merchant activation for secured in-person payment at a POS of a merchant in accordance with some embodiments.
  • DETAILED DESCRIPTION OF EMBODIMENTS
  • The following disclosure provides many different embodiments, or examples, for implementing different features of the subject matter. Specific examples of components and arrangements are described below to simplify the present disclosure. These are, of course, merely examples and are not intended to be limiting. In addition, the present disclosure may repeat reference numerals and/or letters in the various examples. This repetition is for the purpose of simplicity and clarity and does not in itself dictate a relationship between the various embodiments and/or configurations discussed.
  • A new approach is proposed that contemplates systems and methods to support instant merchant activation for secured in-person payment at a point of sale (POS) of a merchant. When a customer initiates an in-person payment request at a payment initiation device associated with the merchant, the payment initiation device is configured to collect both sensitive and non-sensitive portions of electronic payment transaction data for the request and encrypt the sensitive data portion for secured transmission. Upon receiving the electronic payment transaction data, a payment gateway in the payment transaction process is configured to relay the data to a payment processor for approval by an issuer and transmit only the non-sensitive portion of the data to a payment service engine for risk analysis if the payment request is approved by the issuer. The payment service engine is configured to determine if the payment request is at high risk based on risk analysis of the non-sensitive portion of the data received and notify the payment initiation device and/or the merchant accordingly.
  • By assessing the risk of each payment transaction without accessing sensitive financial information of the customer, the proposed approach enables instant activation of the merchant without weakening the security of the electronic payment transaction process. Under the proposed approach, the merchant can accept payment from its clients immediately via any type of POS payment device available on the market instantly while eliminating the lengthy certification process. In the meantime, since the sensitive financial data is encrypted and transmitted over the entire payment transaction process between the POS payment device and the payment processor following the conventional payment processing model, the security and integrity of the electronic payment transaction process is not weakened or compromised.
  • FIG. 1 depicts an example of a diagram of a system 100 to support instant merchant activation for secured in-person payment at a POS of a merchant. Although the diagrams depict components as functionally separate, such depiction is merely for illustrative purposes. It will be apparent that the components portrayed in this figure can be arbitrarily combined or divided into separate software, firmware and/or hardware components. Furthermore, it will also be apparent that such components, regardless of how they are combined or divided, can execute on the same host or multiple hosts, and wherein the multiple hosts can be connected by one or more networks.
  • In the example of FIG. 1 , the system 100 includes at least a payment initiation device 102, a payment gateway 104, a payment processor 106, and a payment service engine 108. Each component of the system 100 runs on a computing unit/appliance/host (not shown) located at distributed geographical locations, with software instructions stored in a storage unit such as a non-volatile memory (also referred to as secondary memory) of the host for practicing one or more processes. When the software instructions are executed, at least a subset of the software instructions is loaded into memory (also referred to as primary memory) by the host, which becomes a special purposed one for practicing the processes. The processes may also be at least partially embodied in the host into which computer program code is loaded and/or executed, such that, the host becomes a special purpose computing unit for practicing the processes. When implemented on a general-purpose computing unit, the computer program code segments configure the host to create specific logic circuits.
  • In the example of FIG. 1 , each host running a component of system 100 can be a computing device, a communication device, a storage device, or any computing device capable of running a software component. For non-limiting examples, a computing device can be but is not limited to a laptop PC, a desktop PC, a tablet PC, or an x86 or ARM-based a server running Linux or other operating systems. In some embodiments, each host has a communication interface (not shown), which enables the components of the system 100 to communicate with each other and/or client devices 110 following certain communication protocols, such as TCP/IP, http, https, ftp, and sftp protocols, over one or more communication networks (not shown). The communication networks can be but are not limited to, internet, intranet, wide area network (WAN), local area network (LAN), wireless network, Bluetooth, WiFi, and mobile communication network. The physical connections of the network and the communication protocols are well known to those skilled in the art.
  • In the example of FIG. 1 , the payment initiation device 102 associated with a merchant who wishes to accept payments from its customers is configured to enable a customer to initiate an (electronic) payment request (make a payment) for the merchant's products and/or services via his/her financial instrument, which can be but is not limited to, a credit card, a debit card, a prepaid card, an EMV® chip card, or a mobile communication device having a near-field communication (NFC) chip and an app to support mobile payment (e.g., Apple Pay via iPhone). In some embodiments, the payment initiation device 102 can be a dedicated/stand-alone POS payment terminal, a pin-pad linked to a POS payment terminal, a potable card reader attached to a mobile communication device, a mobile communication device capable of recognizing the financial instrument, or a device with integrated hardware and software that together accepts the payment request from the customer. Here, the mobile communication device can be but is not limited to, a smart phone, a tablet, an iPhone, ab iPad, a Google's Android device, and/or other types of mobile communication devices. In some embodiments, the payment initiation device 102 resides locally with the merchant and/or the customer and communicates remotely with the rest of the system 100 over the communication networks.
  • In some embodiments, upon receiving the payment request initiated by a customer, the payment initiation device 102 is configured to collect the electronic payment transaction data from the customer's financial instrument and/or the payment request. Here, the payment transaction data for the payment request can be collected by one of accepting card information manually entered by the customer, reading data stored on a magnetic stripe of a card swiped at the payment initiation device 102, reading data stored on a chip of a chip card inserted into the payment initiation device 102, and transmitting data from an NFC chip on a mobile communication device when tapped by the customer.
  • In some embodiments, the collected payment transaction data includes a sensitive data portion and a non-sensitive data portion. Here, the non-sensitive data portion includes information that can be used to identify the customer, including but not limited to one or more of name and/or billing address of the customer, non-sensitive part of a unique identifier/number of the financial instrument, e.g., the 1st 6 digits of a credit card (also known as the Issuer BIN) and last 4 digits of the credit card number, type of the financial instrument, brand of the financial instrument, e.g., Master, Visa, American Express, or Discover card, and how the payment transaction data of the financial instrument is collected. In some embodiments, the non-sensitive data portion of the payment transaction data further includes details of the payment request, e.g., the amount being requested for approval and a list of the products and/or services purchased, shipping address, and/or details of the merchant, e.g., merchant name or id, and information of the payment initiation device 102, e.g., device id and location. The sensitive data portion of the payment transaction data, on the other hand, includes confidential financial information of the financial instrument, including one or more of full (16 digits) card number, CVV code, expiration date, and other sensitive data stored on the financial instrument. If obtained by an unauthorized third party, the sensitive data portion may be used to initiate another payment request without the customer's knowledge or consent and thus needs to be securely guarded.
  • In some embodiments, the payment initiation device 102 is configured to encrypt the sensitive data portion using one or more keys provided by and shared only with the payment processor 106, wherein the encrypted sensitive data portion can only be decrypted by the payment processor 106. Note that only certified payment initiation devices 102 (e.g., certified POS terminals) may encrypt the data using the keys, wherein the payment initiation device 102 is injected with the keys either before the merchant receives the payment initiation device 102 or through an initial activation process. The payment initiation device 102 is then configured to transmit the payment request with both the non-sensitive data portion and the encrypted sensitive data portion of the electronic payment transaction data to the payment processor 106 for payment processing through the payment gateway 104.
  • In the example of FIG. 1 , the payment gateway 104 located in the payment transaction process between the payment initiation device 102 and the payment processor 106. Here, the payment gateway 104 can be a stand-alone system, a piece of software such as an SDK embedded within the payment initiation device 102, or a component embedded within the payment processor 106. In some embodiments, the payment gateway 104 is configured to receive the payment request with both the non-sensitive data portion and the encrypted sensitive data portion transmitted by the payment initiation device 102. The payment gateway 104 is then configured to relay/transmit/forward both the non-sensitive data portion and the encrypted sensitive data portion with the payment request to the payment processor 106 for payment processing. Note the payment gateway 104 cannot access the encrypted sensitive data portion since the keys used to encrypt and decrypt the sensitive data are shared only between the payment initiation device 102 and the payment processor 106.
  • In the example of FIG. 1 , the payment processor 106 is configured to decrypt the sensitive data portion of the electronic payment transaction data relayed by the payment gateway 104 using the keys shared only with the payment initiation device 102 and send the payment request with the electronic payment transaction data to an appropriate payment network, e.g., credit card network like Visa, Master Card or a PIN Debit network like STAR, PULSE etc. The payment network then sends the payment request and the electronic payment transaction data to the issuer/issuing bank of the financial instrument of the customer for approval and returns a response to the payment processor 106 as to whether the payment has been approved by the issuer or not, along with any other additional information by the issuer. Once the payment processor 106 has received confirmation that the payment request has been approved (or denied) by the issuer, it relays the confirmation and/or the additional information back to the payment initiation device 102 of the merchant via the payment gateway 104, wherein the payment initiation device 102 will complete the payment transaction process if the payment service engine 108 determines that the payment request is not at high risk as discussed in details below.
  • Once the payment gateway 104 receives the confirmation from the payment processor 106 that the payment request has been approved by the issuer, the payment gateway 104 is then configured to transmit only the non-sensitive data portion of the electronic payment transaction data to the payment service engine 108 for risk analysis to determine if the payment request should be processed or not by invoking an Application Program Interface (API) call to the payment service engine 108. Here, the non-sensitive data portion includes details about the transaction, the financial instrument, the customer, the merchant, etc. as discussed above, as well as the response returned by the payment processor 106 for risk analysis. Note that the payment gateway 104 does not have access to and thus does not send the sensitive data portion that includes sensitive data of the financial instrument, such as the full card number, to the payment service engine 108.
  • In the example of FIG. 1 , the payment service engine 108 is configured to accept and analyze the non-sensitive data portion of the electronic payment transaction data from the payment gateway 104 in real time to determine whether the payment request should be processed or not. In some embodiments, the payment service engine 108 is associated with/provided by a third party payment service provider (e.g., WePay), which is a separate payment service entity outside of the conventional payment transaction process between the payment initiation device 102 and the payment processor 106. In some embodiments, the payment service engine 108 is responsible for underwriting the merchant since the certification process of the payment initiation device 102 and/or the merchant has been eliminated. Specifically, the payment service engine 108 is configured to assess the risk of the payment request in real time by analyzing the non-sensitive data portion of the payment transaction in view of historical payment transaction data of the customer and/or the merchant maintained in a payment database 110. For a non-limiting example, if the payment service engine 108 determines that the customer information in the non-sensitive data portion matches with a person in the payment database 110 whose payment request has been denied in the past, or the shipping address of the customer matches an address associated with fraud in the payment database 110, or the amount of the payment request is unusually higher than the historical payment requests for this category of merchant, the payment service engine 108 may determine that the payment request is at high risk and notify the payment gateway 104 and/or the merchant accordingly.
  • If the payment request is approved by the payment service engine 108, e.g., it is not at high risk and should be processed, the payment gateway 104 returns a successful response to the payment initiation device 102. If, on the other hand, the payment request is declined by the payment service engine 108, e.g., it is at high risk, the payment gateway 104 then returns a declined response to the payment initiation device 102 and also cancels the previously approved payment transaction with the payment processor 106. Upon receiving the response from the payment gateway 104, the payment initiation device 102 displays the appropriate result, e.g., payment approved or declined, accordingly to the customer and/or the merchant. The payment initiation device 102 or the payment service engine 108 will then settle the transaction amount of the payment request with the bank of the merchant.
  • FIG. 2 depicts an example of a flowchart of a process to support instant merchant activation for secured in-person payment at a POS of a merchant. Although this figure depicts functional steps in a particular order for purposes of illustration, the process is not limited to any particular order or arrangement of steps. One skilled in the relevant art will appreciate that the various steps portrayed in this figure could be omitted, rearranged, combined and/or adapted in various ways.
  • In the example of FIG. 2 , the flowchart 200 starts at block 202, where a payment request for electronic payment initiated by a customer via a financial instrument at a payment initiation device is accepted and electronic payment transaction data for the payment request is collected, wherein the electronic payment transaction data includes a sensitive data portion and a non-sensitive data portion. The flowchart 200 continues to block 204, where the sensitive data portion is encrypted using one or more keys provided by and shared only with a payment processor and the electronic payment transaction data is transmitted with the payment request through a payment gateway. The flowchart 200 continues to block 206, where both the sensitive and the non-sensitive data portion of the electronic payment transaction data are accepted and forwarded with the payment request to the payment processor for payment processing. The flowchart 200 continues to block 208, where the sensitive data portion of the electronic payment transaction data is decrypted using the keys shared only with the payment initiation device and the payment request is sent with the electronic payment transaction data over a payment network to the issuer of the financial instrument for approval. The flowchart 200 continues to block 210, where only the non-sensitive data portion of the electronic payment transaction data is transmitted to a payment service engine for risk analysis to determine if the payment request should be processed or not once the payment request has been approved by an issuer of the financial instrument. The flowchart 200 ends at block 212, where the non-sensitive data portion of the electronic payment transaction data is accepted and analyzed in real time to determine whether the payment request should be processed or not.
  • One embodiment may be implemented using a conventional general purpose or a specialized digital computer or microprocessor(s) programmed according to the teachings of the present disclosure, as will be apparent to those skilled in the computer art. Appropriate software coding can readily be prepared by skilled programmers based on the teachings of the present disclosure, as will be apparent to those skilled in the software art. The invention may also be implemented by the preparation of integrated circuits or by interconnecting an appropriate network of conventional component circuits, as will be readily apparent to those skilled in the art.
  • One embodiment includes a computer program product which is a machine readable medium (media) having instructions stored thereon/in which can be used to program one or more hosts to perform any of the features presented herein. The machine readable medium can include, but is not limited to, one or more types of disks including floppy disks, optical discs, DVD, CD-ROMs, micro drive, and magneto-optical disks, ROMs, RAMs, EPROMs, EEPROMs, DRAMs, VRAMs, flash memory devices, magnetic or optical cards, nanosystems (including molecular memory ICs), or any type of media or device suitable for storing instructions and/or data. Stored on any one of the computer readable medium (media), the present invention includes software for controlling both the hardware of the general purpose/specialized computer or microprocessor, and for enabling the computer or microprocessor to interact with a human viewer or other mechanism utilizing the results of the present invention. Such software may include, but is not limited to, device drivers, operating systems, execution environments/containers, and applications.
  • The foregoing description of various embodiments of the claimed subject matter has been provided for the purposes of illustration and description. It is not intended to be exhaustive or to limit the claimed subject matter to the precise forms disclosed. Many modifications and variations will be apparent to the practitioner skilled in the art. Particularly, while the concept “component” is used in the embodiments of the systems and methods described above, it will be evident that such concept can be interchangeably used with equivalent concepts such as, class, method, type, interface, module, object model, and other suitable concepts. Embodiments were chosen and described in order to best describe the principles of the invention and its practical application, thereby enabling others skilled in the relevant art to understand the claimed subject matter, the various embodiments and with various modifications that are suited to the particular use contemplated.

Claims (20)

What is claimed is:
1. A system to support instant merchant activation for secured in-person payment at a point of sale (POS), comprising:
a payment initiation device, which in operation, is configured to:
collect electronic payment transaction data for an electronic payment request, wherein the electronic payment transaction data includes a sensitive data portion and a non-sensitive data portion, and wherein the electronic payment transaction data is associated with a financial instrument;
encrypt the sensitive data portion and transmit the electronic payment transaction data through a payment gateway;
said payment gateway, which in operation, is configured to accept and forward both the sensitive and the non-sensitive data portion of the electronic payment transaction data with the payment request to a payment processor for payment processing;
said payment processor, which in operation, is configured to:
decrypt the sensitive data portion of the electronic payment transaction data;
send the electronic payment transaction data over a payment network to an issuer of the financial instrument for approval;
receive, over the payment network, a confirmation approving the payment request from the issuer of the financial instrument; and
transmit the confirmation approving the payment request;
said payment gateway, which in operation, is further configured to, in response to receiving the confirmation approving the payment request, transmit only the non-sensitive data portion of the electronic payment transaction data to a payment service engine for risk analysis to determine if the payment request should be processed or not;
said payment service engine, which in operation, is configured to:
accept and analyze the non-sensitive data portion of the electronic payment transaction data in real time;
perform a risk analysis comprising analyzing the non-sensitive data based on historical payment transaction data;
determine whether the payment request is or is not at risk based on the risk analysis; and
transmit a notification to the payment initiation device based on the determination, wherein the notification comprises a successful response when the payment request is determined to not be at risk and a declined response when the payment request is determined to be at risk.
2. The system of claim 1, wherein the financial instrument is a credit card, a debit card, a prepaid card, a chip card, or a mobile communication device having a near-field communication (NFC) chip and an app to support mobile payment.
3. The system of claim 1, wherein the payment initiation device is a stand-alone POS payment terminal, a pin-pad linked to a POS payment terminal, a potable card reader attached to a mobile communication device, a mobile communication device capable of recognizing the financial instrument, or a device with integrated hardware and software that together accepts the payment request.
4. The system of claim 3, wherein the payment initiation device is configured to collect the electronic payment transaction data by one of accepting manually entered card information, reading data stored on a magnetic stripe of a card swiped at the payment initiation device, reading data stored on a chip of a chip card inserted into the payment initiation device, and transmitting data from a near-field communication (NFC) chip on a mobile communication device.
5. The system of claim 1, wherein the non-sensitive data portion includes one or more of name and/or billing address, non-sensitive part of a unique identifier/number of the financial instrument, type of the financial instrument, and brand of the financial instrument.
6. The system of claim 5, wherein the non-sensitive data portion further includes details of the payment request including one or more of an amount being requested for approval, a list of products and/or services purchased, name or id of the merchant, and device id and/or location of the payment initiation device.
7. The system of claim 1, wherein the sensitive data portion includes one or more of full card number, CVV code, expiration date, and other sensitive data stored on the financial instrument.
8. The system of claim 1, wherein the payment gateway is a stand-alone system, a piece of software embedded within the payment initiation device, or a component embedded within the payment processor.
9. The system of claim 1, wherein the payment gateway is configured to access only the non-sensitive portion of the electronic payment transaction data.
10. The system of claim 1, wherein the payment gateway is configured to transmit the non-sensitive data portion of the electronic payment transaction data to the payment service engine by invoking an Application Program Interface (API) call to the payment service engine.
11. The system of claim 1, wherein the payment service engine is provided by a third party payment service provider.
12. The system of claim 1, wherein the payment service engine is configured to assess the risk of the payment request in real time by analyzing the non-sensitive data portion of the payment transaction in view of historical payment transaction data.
13. The system of claim 1, wherein the payment service engine is configured to notify the payment initiation device and/or a merchant device of assessment of the risk of the payment request via the payment gateway.
14. A computer-implemented method to support instant merchant activation for secured in-person payment at a point of sale (POS) of a merchant, comprising:
collecting electronic payment transaction data for an electronic payment request, wherein the electronic payment transaction data includes a sensitive data portion and a non-sensitive data portion, and wherein the electronic payment transaction data is associated with a financial instrument;
encrypting the sensitive data portion and transmit the electronic payment transaction data through a payment gateway;
accepting and forwarding both the sensitive and the non-sensitive data portion of the electronic payment transaction data with the payment request to a payment processor for payment processing;
decrypting the sensitive data portion of the electronic payment transaction data;
sending the electronic payment transaction data over a payment network to an issuer of the financial instrument for approval;
receiving, over the payment network, a confirmation approving the payment request from the issuer of the financial instrument; and
transmitting the confirmation approving the payment request;
in response to receiving the confirmation approving the payment request, transmitting only the non-sensitive data portion of the electronic payment transaction data to a payment service engine for risk analysis to determine if the payment request should be processed or not;
accepting and analyzing the non-sensitive data portion of the electronic payment transaction data in real time;
performing a risk analysis comprising analyzing the non-sensitive data based on historical payment transaction data;
determining whether the payment request is or is not at risk based on the risk analysis; and
transmitting a notification to the payment initiation device based on the determination, wherein the notification comprises a successful response when the payment request is determined to not be at risk and a declined response when the payment request is determined to be at risk.
15. The computer-implemented method of claim 14, further comprising collecting the electronic payment transaction data by one of accepting manually entered card information, reading data stored on a magnetic stripe of a card swiped at the payment initiation device, reading data stored on a chip of a chip card inserted into the payment initiation device, and transmitting data from a near-field communication (NFC) chip on a mobile communication device.
16. The computer-implemented method of claim 14, further comprising accessing only the non-sensitive portion of the electronic payment transaction data by the payment gateway.
17. The computer-implemented method of claim 14, further comprising transmitting the non-sensitive data portion of the electronic payment transaction data to the payment service engine by invoking an Application Program Interface (API) call to the payment service engine.
18. The computer-implemented method of claim 14, further comprising assessing the risk of the payment request in real time by analyzing the non-sensitive data portion of the payment transaction in view of historical payment transaction data of the customer and/or the merchant.
19. The computer-implemented method of claim 14, further comprising notifying the payment initiation device and/or a merchant device of assessment of the risk of the payment request via the payment gateway.
20. A non-transitory computer readable storage medium having software instructions stored thereon that when executed cause a system to:
collect electronic payment transaction data for an electronic payment request, wherein the electronic payment transaction data includes a sensitive data portion and a non-sensitive data portion, and wherein the electronic payment transaction data is associated with a financial instrument;
encrypt the sensitive data portion and transmit the electronic payment transaction data through a payment gateway;
accept and forward both the sensitive and the non-sensitive data portion of the electronic payment transaction data with the payment request to a payment processor for payment processing;
decrypt the sensitive data portion of the electronic payment transaction data;
send the electronic payment transaction data over a payment network to an issuer of the financial instrument for approval;
receive, over the payment network, a confirmation approving the payment request from the issuer of the financial instrument; and
transmit the confirmation approving the payment request;
in response to receiving the confirmation approving the payment request, transmit only the non-sensitive data portion of the electronic payment transaction data to a payment service engine for risk analysis to determine if the payment request should be processed or not;
accept and analyze the non-sensitive data portion of the electronic payment transaction data in real time;
perform a risk analysis comprising analyzing the non-sensitive data based on historical payment transaction data;
determine whether the payment request is or is not at risk based on the risk analysis; and
transmit a notification to the payment initiation device based on the determination, wherein the notification comprises a successful response when the payment request is determined to not be at risk and a declined response when the payment request is determined to be at risk.
US18/101,435 2017-08-02 2023-01-25 Systems and methods for instant merchant activation for secured in-person payments at point of sale Pending US20230162185A1 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
US18/101,435 US20230162185A1 (en) 2017-08-02 2023-01-25 Systems and methods for instant merchant activation for secured in-person payments at point of sale

Applications Claiming Priority (4)

Application Number Priority Date Filing Date Title
US201762540514P 2017-08-02 2017-08-02
PCT/US2017/056674 WO2019027488A1 (en) 2017-08-02 2017-10-13 Systems and methods for instant merchant activation for secured in-person payments at point of sale
US201816072120A 2018-07-23 2018-07-23
US18/101,435 US20230162185A1 (en) 2017-08-02 2023-01-25 Systems and methods for instant merchant activation for secured in-person payments at point of sale

Related Parent Applications (2)

Application Number Title Priority Date Filing Date
US16/072,120 Continuation US11593798B2 (en) 2017-08-02 2017-10-13 Systems and methods for instant merchant activation for secured in-person payments at point of sale
PCT/US2017/056674 Continuation WO2019027488A1 (en) 2017-08-02 2017-10-13 Systems and methods for instant merchant activation for secured in-person payments at point of sale

Publications (1)

Publication Number Publication Date
US20230162185A1 true US20230162185A1 (en) 2023-05-25

Family

ID=65234112

Family Applications (2)

Application Number Title Priority Date Filing Date
US16/072,120 Active 2037-11-18 US11593798B2 (en) 2017-08-02 2017-10-13 Systems and methods for instant merchant activation for secured in-person payments at point of sale
US18/101,435 Pending US20230162185A1 (en) 2017-08-02 2023-01-25 Systems and methods for instant merchant activation for secured in-person payments at point of sale

Family Applications Before (1)

Application Number Title Priority Date Filing Date
US16/072,120 Active 2037-11-18 US11593798B2 (en) 2017-08-02 2017-10-13 Systems and methods for instant merchant activation for secured in-person payments at point of sale

Country Status (2)

Country Link
US (2) US11593798B2 (en)
WO (1) WO2019027488A1 (en)

Families Citing this family (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2019027488A1 (en) * 2017-08-02 2019-02-07 Wepay, Inc. Systems and methods for instant merchant activation for secured in-person payments at point of sale
CN111866855B (en) * 2020-07-17 2021-01-08 江苏海全科技有限公司 Intelligent terminal initialization activation method
CN113592508A (en) * 2021-09-29 2021-11-02 深圳市新鹏城网络科技有限公司 Mobile phone payment safety protection system
CN115328681B (en) * 2022-10-12 2023-02-10 珠海乐活公社网络科技有限公司 Material service control method, system and storage medium based on micro-service

Family Cites Families (95)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5826241A (en) * 1994-09-16 1998-10-20 First Virtual Holdings Incorporated Computerized system for making payments and authenticating transactions over the internet
US5826245A (en) * 1995-03-20 1998-10-20 Sandberg-Diment; Erik Providing verification information for a transaction
US6212635B1 (en) * 1997-07-18 2001-04-03 David C. Reardon Network security system allowing access and modification to a security subsystem after initial installation when a master token is in place
US6477578B1 (en) * 1997-12-16 2002-11-05 Hankey Mhoon System and method for conducting secure internet transactions
WO2001008066A1 (en) * 1999-07-26 2001-02-01 Iprivacy Llc Electronic purchase of goods over a communication network including physical delivery while securing private and personal information
US7587363B2 (en) * 2000-11-06 2009-09-08 Jpmorgan Chase Bank, N.A. System and method for optimized funding of electronic transactions
US7107242B1 (en) * 2000-11-21 2006-09-12 Vasil Paul E Electronic transaction security method
US20020116337A1 (en) * 2001-02-20 2002-08-22 Ariel Peled System for anonymous distribution and delivery of digital goods
US7287280B2 (en) * 2002-02-12 2007-10-23 Goldman Sachs & Co. Automated security management
US7228290B2 (en) * 2001-06-29 2007-06-05 Goldman Sachs & Co. Method and system for simulating risk factors in parametric models using risk neutral historical bootstrapping
US20030074298A1 (en) * 2001-07-09 2003-04-17 Wolfgang Daum Information product market system and method
US7386510B2 (en) * 2001-09-07 2008-06-10 First Data Corporation System and method for detecting fraudulent calls
US7472825B2 (en) * 2002-01-11 2009-01-06 Hand Held Products, Inc. Transaction terminal
US7653590B1 (en) * 2002-01-14 2010-01-26 First Data Corporation System and method for overturning of risk evaluation performed by risk model to control financial risk
US20030182194A1 (en) * 2002-02-06 2003-09-25 Mark Choey Method and system of transaction card fraud mitigation utilizing location based services
EP1361526A1 (en) * 2002-05-08 2003-11-12 Accenture Global Services GmbH Electronic data processing system and method of using an electronic processing system for automatically determining a risk indicator value
US7657482B1 (en) * 2002-07-15 2010-02-02 Paymentech, L.P. System and apparatus for transaction fraud processing
US7418600B2 (en) * 2003-03-13 2008-08-26 International Business Machines Corporation Secure database access through partial encryption
US20040215560A1 (en) * 2003-04-25 2004-10-28 Peter Amalraj Integrated payment system and method
US8082210B2 (en) * 2003-04-29 2011-12-20 The Western Union Company Authentication for online money transfers
US20070143230A1 (en) * 2003-06-30 2007-06-21 Selvanathan Narainsamy Transaction verification system
US20050080716A1 (en) 2003-09-25 2005-04-14 Boris Belyi Data validation systems and methods for use in financial transactions
US7660805B2 (en) * 2003-12-23 2010-02-09 Canon Kabushiki Kaisha Method of generating data servers for heterogeneous data sources
US8885894B2 (en) * 2004-06-14 2014-11-11 Michael John Rowen Reduction of transaction fraud through the use of automatic centralized signature/sign verification combined with credit and fraud scoring during real-time payment card authorization processes
US7185805B1 (en) * 2004-08-10 2007-03-06 Transmodus, Inc. Wireless check authorization
US7527195B2 (en) * 2005-04-11 2009-05-05 Bill Me Later, Inc. Method and system for risk management in a transaction
US7556192B2 (en) * 2005-08-04 2009-07-07 Capital One Financial Corp. Systems and methods for decisioning or approving a financial credit account based on a customer's check-writing behavior
US20070100751A1 (en) * 2005-11-01 2007-05-03 Lorenzo Carver Method and system for processing and preventing credit card fraud in simultaneous remote wholesale exchange and local fullfillment of retail transactions by third party retailers
US7860783B2 (en) * 2005-11-07 2010-12-28 Fair Isaac Corporation Account-level fraud detector and associated methods
KR20060003849A (en) 2005-12-27 2006-01-11 위준상 Method and system for price adjustment using barcode for collection of money
KR100787890B1 (en) * 2006-03-06 2007-12-27 주식회사 모빌리언스 System and its method for paying charge of internet item using request of gift in mobile configuration
MX2008012504A (en) * 2006-03-30 2009-05-05 Obopay Inc Mobile person-to-person payment system.
US20070250441A1 (en) * 2006-04-25 2007-10-25 Uc Group Limited Systems and methods for determining regulations governing financial transactions conducted over a network
US8467766B2 (en) * 2006-07-06 2013-06-18 Qualcomm Incorporated Methods and systems for managing payment sources in a mobile environment
US9846866B2 (en) * 2007-02-22 2017-12-19 First Data Corporation Processing of financial transactions using debit networks
US20070282742A1 (en) * 2007-04-27 2007-12-06 Linda Schrupp Method and Apparatus for Payment Processing
US10395264B2 (en) * 2007-04-30 2019-08-27 Visa U.S.A. Inc. Payment account processing which conveys financial transaction data and non financial transaction data
US20130304637A1 (en) * 2007-10-02 2013-11-14 American Express Travel Related Services Company, Inc. Fraud control integrated form filling tool
KR101052791B1 (en) 2008-06-27 2011-07-29 한국정보통신주식회사 POS terminal for information security
US20090327107A1 (en) * 2008-06-30 2009-12-31 Raghav Lal Consumer spending threshold evaluation
US20100180127A1 (en) * 2009-01-14 2010-07-15 Motorola, Inc. Biometric authentication based upon usage history
EP3046062B1 (en) * 2009-01-18 2021-03-10 Gilbarco Inc. Payment processing system for use in a retail environment having segmented architecture
US20100274678A1 (en) * 2009-04-22 2010-10-28 Gofigure Payments, Llc Systems, methods and devices for facilitating mobile payments
US10748146B2 (en) * 2009-06-16 2020-08-18 Heartland Payment Systems, Llc Tamper-resistant secure methods, systems and apparatuses for credit and debit transactions
US8020763B1 (en) * 2009-06-30 2011-09-20 Intuit Inc. Method and system for assessing merchant risk during payment transaction
WO2011119976A2 (en) * 2010-03-26 2011-09-29 Visa International Service Association System and method for early detection of fraudulent transactions
US8453226B2 (en) * 2010-07-16 2013-05-28 Visa International Service Association Token validation for advanced authorization
US20120054101A1 (en) * 2010-09-01 2012-03-01 American Express Travel Related Services Company, Inc. Application program interface based fraud mitigation
US20130013512A1 (en) * 2010-09-01 2013-01-10 American Express Travel Related Services Company, Inc. Software development kit based fraud mitigation
US10360561B2 (en) * 2010-12-14 2019-07-23 Lime Light RM, Inc. System and method for secured communications between a mobile device and a server
US8458069B2 (en) * 2011-03-04 2013-06-04 Brighterion, Inc. Systems and methods for adaptive identification of sources of fraud
US20120284187A1 (en) * 2011-03-15 2012-11-08 Ayman Hammad System and method for processing payment transactions
AU2012242932A1 (en) * 2011-04-11 2013-10-31 Visa International Service Association Interoperable financial transactions via mobile devices
US9280765B2 (en) * 2011-04-11 2016-03-08 Visa International Service Association Multiple tokenization for authentication
US20120296725A1 (en) * 2011-05-17 2012-11-22 Dessert Robert L System and method for managing transactions with a portable computing device
US20130054461A1 (en) * 2011-08-23 2013-02-28 Infosys Limited Methods, systems, and computer-readable media for electronic financial transfers
US20130132281A1 (en) * 2011-11-22 2013-05-23 Xerox Corporation Computer-implemented method for capturing data using provided instructions
US10380565B1 (en) * 2012-01-05 2019-08-13 United Services Automobile Association (Usaa) System and method for storefront bank deposits
US11694171B2 (en) * 2012-02-15 2023-07-04 Ingo Money, Inc. Funds network and method
US8740067B1 (en) * 2012-02-29 2014-06-03 Amazon Technologies, Inc. Secondary verification
GB2506841A (en) * 2012-08-13 2014-04-16 Banctec Ltd Mobile merchant POS processing
US20140164243A1 (en) * 2012-12-07 2014-06-12 Christian Aabye Dynamic Account Identifier With Return Real Account Identifier
US20140337138A1 (en) * 2013-05-08 2014-11-13 Jalpesh K. Chitalia Payment codes for enhanced consumer experience
US20140365366A1 (en) * 2013-06-05 2014-12-11 Apriva, Llc System and device for receiving authentication credentials using a secure remote verification terminal
US11367073B2 (en) * 2013-07-03 2022-06-21 Capital One Services, Llc System and method for fraud control
US20150161597A1 (en) * 2013-12-09 2015-06-11 Kaushik Subramanian Transactions using temporary credential data
US10325263B2 (en) * 2014-02-25 2019-06-18 Wepay, Inc. Systems and methods for providing risk information
WO2015191849A1 (en) * 2014-06-11 2015-12-17 Wepay, Inc. Risk data modeling
EP3204904A1 (en) * 2014-10-06 2017-08-16 Emo Oil Ltd Apparatus, system and method of inhibiting fraudulent payment card transactions
KR101629174B1 (en) 2014-10-13 2016-06-13 주식회사 나이스홀딩스 System and method for providing payment service with authenticating affiliated store
US9858575B2 (en) * 2014-12-16 2018-01-02 At&T Mobility Ii Llc Fraud detection via mobile device location tracking
US9626680B1 (en) * 2015-01-05 2017-04-18 Kimbia, Inc. System and method for detecting malicious payment transaction activity using aggregate views of payment transaction data in a distributed network environment
US11068895B2 (en) * 2015-02-17 2021-07-20 Visa International Service Association Token and cryptogram using transaction specific information
US10878387B2 (en) * 2015-03-23 2020-12-29 Early Warning Services, Llc Real-time determination of funds availability for checks and ACH items
US9367844B1 (en) * 2015-03-25 2016-06-14 Mastercard International Incorporated Method and system for online and physical merchant specific fraud detection system
US11423404B2 (en) * 2015-05-13 2022-08-23 Mastercard International Incorporated System and methods for enhanced approval of a payment transaction
US10084780B2 (en) * 2015-12-15 2018-09-25 Verizon Patent And Licensing Inc. Network-based authentication and security services
US11651341B2 (en) * 2016-01-08 2023-05-16 Worldpay, Llc Multi-platform electronic payment transaction risk profiling
EP3430563B1 (en) * 2016-03-15 2020-09-09 Visa International Service Association Validation cryptogram for interaction
US20170270557A1 (en) * 2016-03-16 2017-09-21 Mastercard International Incorporated Method and system for tokenization of reward data
US20170270527A1 (en) * 2016-03-17 2017-09-21 John Rampton Assessing trust to facilitate blockchain transactions
US10861019B2 (en) * 2016-03-18 2020-12-08 Visa International Service Association Location verification during dynamic data transactions
JP6821708B2 (en) * 2016-06-01 2021-01-27 マスターカード インターナシヨナル インコーポレーテツド Systems and methods for use in supporting network transactions
US10339606B2 (en) * 2016-09-07 2019-07-02 American Express Travel Related Services Company, Inc. Systems and methods for an automatically-updating fraud detection variable
US10762076B1 (en) * 2016-10-14 2020-09-01 Medallia, Inc. Memory efficient database change management
TWI620087B (en) * 2017-02-15 2018-04-01 財團法人資訊工業策進會 Authorization server, authorization method and computer program product thereof
US10333960B2 (en) * 2017-05-03 2019-06-25 Servicenow, Inc. Aggregating network security data for export
US10097663B1 (en) * 2017-05-22 2018-10-09 American Express Travel Related Services Company, Inc. Using integrated code to extract device characteristics for online security
SG10201706018WA (en) * 2017-07-24 2019-02-27 Mastercard International Inc Electronic system and method for determining a credit risk score for an online merchant
WO2019027488A1 (en) * 2017-08-02 2019-02-07 Wepay, Inc. Systems and methods for instant merchant activation for secured in-person payments at point of sale
US10871918B2 (en) * 2017-08-02 2020-12-22 Intuit Inc. Writing composite objects to a data store
US11093925B2 (en) * 2017-09-15 2021-08-17 Mastercard International Incorporated Methods and systems for providing chargeback scoring for network transactions
WO2019060368A1 (en) * 2017-09-19 2019-03-28 Mastercard International Incorporated Systems and methods for onboarding merchants in real-time for payment processing
US11144919B2 (en) * 2019-10-17 2021-10-12 Visa International Service Association System, method, and computer program product for guaranteeing a payment authorization response
US20210398127A1 (en) * 2020-06-18 2021-12-23 XPress Processing, LLC Payment gateway security management

Also Published As

Publication number Publication date
WO2019027488A1 (en) 2019-02-07
US20210174361A1 (en) 2021-06-10
US11593798B2 (en) 2023-02-28

Similar Documents

Publication Publication Date Title
EP3414869B1 (en) Authentication systems and methods using location matching
US20230162185A1 (en) Systems and methods for instant merchant activation for secured in-person payments at point of sale
US9373111B2 (en) Payment card with integrated chip
CA2896755C (en) Systems and methods for providing secure data transmission between networked computing systems
US10366387B2 (en) Digital wallet system and method
US11989750B2 (en) Technologies for enhanced payment transactions
US20190087815A1 (en) Digital enablement services for merchant qr codes
US20160027017A1 (en) Method and system for using dynamic cvv in qr code payments
CA2972020C (en) Flexible electronic payment transaction process
US10796311B2 (en) Authentication using transaction history
US20170109746A1 (en) Method and system for managing payment transactions
US20160275506A1 (en) System and method of contactless mobile payment verification
US20160275511A1 (en) Multi-point authentication for payment transactions
US20160275505A1 (en) Method of receiving payment confirmation in emv contactless mobile payment
Alliance Module 6/P: Smart Card Usage Models—Payments and Financial Transactions
US11250410B2 (en) Computer implemented method and a payment terminal for executing card present transaction dynamically from remote environment
AU2017381404A1 (en) A transaction processing system and method
US20220020002A1 (en) Post payment processing tokenization in merchant payment processing
EP3933735A1 (en) Payment network watching service
US20230342776A1 (en) Combined token and value assessment processing

Legal Events

Date Code Title Description
AS Assignment

Owner name: WEPAY, INC., CALIFORNIA

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:POTIREDDY, SIREESH;ABERMAN, RICH;CANFIELD, JOHN R.;SIGNING DATES FROM 20171012 TO 20171013;REEL/FRAME:062487/0764