USRE44513E1 - Method and apparatus for performing a credit based transaction between a user of a wireless communications device and a provider of a product or service - Google Patents

Method and apparatus for performing a credit based transaction between a user of a wireless communications device and a provider of a product or service Download PDF

Info

Publication number
USRE44513E1
USRE44513E1 US12/614,264 US61426409A USRE44513E US RE44513 E1 USRE44513 E1 US RE44513E1 US 61426409 A US61426409 A US 61426409A US RE44513 E USRE44513 E US RE44513E
Authority
US
United States
Prior art keywords
transaction
consumer
information
credit card
wireless communication
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Lifetime, expires
Application number
US12/614,264
Inventor
Ryan J. Nobrega
Vinod V. Valloppillil
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Unwired Planet LLC
Unwired Planet IP Manager LLC
Original Assignee
Unwired Planet Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Unwired Planet Inc filed Critical Unwired Planet Inc
Priority to US12/614,264 priority Critical patent/USRE44513E1/en
Assigned to UNWIRED PLANET, INC. reassignment UNWIRED PLANET, INC. MERGER (SEE DOCUMENT FOR DETAILS). Assignors: OPENWAVE SYSTEMS INC.
Assigned to UNWIRED PLANET IP MANAGER, LLC reassignment UNWIRED PLANET IP MANAGER, LLC ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: UNWIRED PLANET, INC.
Assigned to UNWIRED PLANET, LLC reassignment UNWIRED PLANET, LLC ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: UNWIRED PLANET IP MANAGER, LLC
Application granted granted Critical
Publication of USRE44513E1 publication Critical patent/USRE44513E1/en
Adjusted expiration legal-status Critical
Expired - Lifetime legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/02Payment architectures, schemes or protocols involving a neutral party, e.g. certification authority, notary or trusted third party [TTP]
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/04Payment circuits
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/04Payment circuits
    • G06Q20/047Payment circuits using payment protocols involving electronic receipts
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/08Payment architectures
    • G06Q20/10Payment architectures specially adapted for electronic funds transfer [EFT] systems; specially adapted for home banking systems
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/08Payment architectures
    • G06Q20/10Payment architectures specially adapted for electronic funds transfer [EFT] systems; specially adapted for home banking systems
    • G06Q20/102Bill distribution or payments
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/22Payment schemes or models
    • G06Q20/24Credit schemes, i.e. "pay after"
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/30Payment architectures, schemes or protocols characterised by the use of specific devices or networks
    • G06Q20/32Payment architectures, schemes or protocols characterised by the use of specific devices or networks using wireless devices
    • G06Q20/322Aspects of commerce using mobile devices [M-devices]
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/30Payment architectures, schemes or protocols characterised by the use of specific devices or networks
    • G06Q20/32Payment architectures, schemes or protocols characterised by the use of specific devices or networks using wireless devices
    • G06Q20/322Aspects of commerce using mobile devices [M-devices]
    • G06Q20/3224Transactions dependent on location of M-devices
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/30Payment architectures, schemes or protocols characterised by the use of specific devices or networks
    • G06Q20/32Payment architectures, schemes or protocols characterised by the use of specific devices or networks using wireless devices
    • G06Q20/326Payment applications installed on the mobile devices
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/30Payment architectures, schemes or protocols characterised by the use of specific devices or networks
    • G06Q20/32Payment architectures, schemes or protocols characterised by the use of specific devices or networks using wireless devices
    • G06Q20/327Short range or proximity payments by means of M-devices
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists

Definitions

  • the present invention pertains to the use of wireless communication devices in executing credit card transactions. More particularly, the present invention relates to using wireless communication devices in executing credit card transactions in a manner which reduces the risk of fraudulent transactions.
  • the parties potentially affected by credit card fraud include the consumer (the credit card holder), the provider of goods or services (the “merchant”), the issuer (the bank which issued the credit card), the acquirer (the bank which directly interfaces with the merchant for purposes of processing a credit card transaction; often the same entity as the issuer), and the clearing network (e.g., MasterCard or Visa). These parties may be exposed to fraud in any of several ways. First, a criminal posing as a credit card account holder may make fraudulent purchases on a stolen credit card account number. Currently, the point of origin for most of the fraud risk associated with a credit card is at the transition where the credit card is delivered from the issuer to the consumer.
  • signatures may be forged, enabling a criminal to impersonate a legitimate credit card account holder.
  • the transaction can be completed even if the merchant fails to check the signature or back up identification of the consumer.
  • an acquirer must trust the information it receives from the merchant. Consequently, a criminals posing as a merchant may run transactions on a stolen credit card number.
  • a criminal working for a legitimate merchant may falsify the amount of the legitimate purchase.
  • the transaction can also be completed even if the consumer does not verify that the transaction is for the correct amount, enabling a criminal to run a fraudulent transaction amount.
  • a consumer may repudiate a valid transaction. In the online scenario in particular, is very difficult to prove that the consumer approved the transaction.
  • a new credit card payment system should work within, and preferably improve upon, existing risk tolerance levels and other constraints associated with more conventional credit card transactions.
  • a new credit card payment system should not require significant added hardware or changes to existing merchant credit card authorization/clearing procedures, or require significant effort or training for merchants and consumers.
  • the present invention includes a method and apparatus for facilitating a credit based transaction between a consumer and a provider of a product or service.
  • the method comprises a telecommunications carrier providing telecommunications services to users of wireless communications devices on a wireless communications network, including the consumer, and validating the credit card transaction between the consumer and the provider.
  • the carrier may receive a portion of the revenue associated with credit card transactions.
  • a method and apparatus for facilitating a credit based transaction between a consumer and a provider of a product or service includes storing credit account information of the consumer within a trusted domain which excludes the consumer and the provider.
  • the credit account information is used to validate the transaction between the consumer and the provider, such that the stored credit account information is not sent outside the trusted domain at any time in relation to the transaction.
  • the method may be performed by a wireless telecommunications carrier, which may receive a portion of the revenue associated with credit card transactions.
  • FIG. 1 is a block diagram illustrating the entities and the environment associated with performing a credit card transaction using a wireless device in accordance with the present invention
  • FIG. 2 illustrates the environment of FIG. 1 in greater detail, according to one embodiment
  • FIGS. 3A and 3B collectively form a flow diagram showing the overall process of performing a credit card transaction in accordance with the present invention
  • FIGS. 4A and 4B collectively form a flow diagram to showing in greater detail the validation process performed by the commerce platform, according to a first embodiment
  • FIGS. 5A and 5B collectively form a flow diagram showing in greater detail the validation process performed by the commerce platform, according to a second embodiment.
  • FIGS. 6A through 6E show a series of screens which may be displayed on a cellular telephone or the like during a credit card based transaction in accordance with the present invention.
  • a method and apparatus for performing a credit card transaction between a merchant and a consumer using a wireless communications device are described.
  • a “merchant” is defined herein to mean a provider of goods and/or services. Note that in this description, references to “one embodiment” or “an embodiment” mean that the feature being referred to is included in at least one embodiment of the present invention. Further, separate references to “one embodiment” in this description do not necessarily refer to the same embodiment; however, neither are such embodiments mutually exclusive, unless so stated and except as will be readily apparent to those skilled in the art.
  • the techniques described herein provide a new modality of credit card payment that can benefit all parties involved in a credit card transaction.
  • the described techniques help to substantially reduce the risk of fraud associated with credit card transactions and, accordingly, to reduce the costs associated with credit card transactions.
  • the described techniques are amenable to quick and widespread acceptance in the marketplace, since they require little or no additional hardware, no significant changes to merchant authorization and clearing procedures, and little or no effort or training of merchants and consumers.
  • wireless carrier a wireless telecommunications network operator
  • a wireless carrier has the capability to identify a cellular telephone (or other wireless device) and its user as part of providing its telecommunications services.
  • the carrier can: 1) authenticate and account holder's identity independently and redundantly to existing credit card purchase processes; 2) require that proposed credit card purchases only be executed if they are agreed to by the true credit card account holder; and 3) validate that the wireless device involved in a proposed credit card transaction is located in the same geographic area as the proposed transaction.
  • a wireless carrier may also receive a portion of the revenue associated with the credit card transactions it validates.
  • This remuneration may be provided through a business arrangement for providing the validation services.
  • the credit card issued to the consumer may be the wireless carrier's co-branded Visa, Mastercard, etc. Accordingly, a percentage of the transaction amount, which typically would have been allocated entirely to the issuer, might now go to the wireless carrier.
  • This approach is a significant departure from the risk/revenue allocation model associated with conventional credit card transactions.
  • the validation process described herein does not have to be performed by a wireless carrier and could be performed by many other types of entity or enterprise.
  • an entity such as a wireless carrier maintains, owns and/or operates a commerce platform within a “trusted domain”.
  • the commerce platform stores the consumer's credit card account information and other personal information on the consumer, for purposes of validating the identity of the consumer.
  • the merchant's point of sale (POS) terminal sends transaction information to the acquirer at the time of purchase. Based on this information, the acquirer recognizes the transaction type and responds by routing the transaction information to the commerce platform.
  • the commerce platform may receive, for example, a personal identification number (PIN) or the like, input by the consumer at the wireless device, which the commerce platform may use in association with the stored information to verify the identity of the consumer.
  • PIN personal identification number
  • a wireless carrier also has other ways of validating user identity for a credit card transaction besides using a PIN, such as based on its knowledge about the legitimacy of the wireless device being used and correlations between the wireless device and the issued card.
  • the commerce platform passes the consumer's account information (credit card number, expiration date, etc.) to the acquirer, which is also located within the trusted domain.
  • the acquirer forwards the information to a clearing network within the trusted domain.
  • the acquirer When the transaction clears, the acquirer notifies the commerce platform and signals the merchant's point of sale (POS) terminal to generate a conventional paper receipt confirming the transaction.
  • the commerce platform stores a digital receipt of the transaction, which the consumer may access online using the wireless device or any other computing device having online access capability.
  • the commerce platform may also signal the wireless device to output a confirmation message to the consumer.
  • a new credit card payment system must work within existing constraints associated with processing merchant credit transactions. Some of these constraints are related to attitude in the marketplace; that is, they are a consequence of the decades of entrenched merchant behavior and hardware equipment in the field. Others are economic and related to the structure of the credit card economy. For example, one factor which affects any potential solution is the desirability of leveraging the credit card value chain. A large part of the reason credit cards have the presence they enjoy today is that there are potentially five players in every transaction (consumer, merchant, acquirer, clearing network, and issuer), each of whom has incentive to widen the network and make transactions viable. In particular, the acquiring bank representing the merchant provides a point interface into potentially thousands of downstream merchants. Creating solutions and processes that target the acquiring bank simultaneously provides them with incentive and reduces system-wide deployment hurdles.
  • Another factor is the desirability of integrating current merchant authorization and clearing procedures.
  • the credit card networks have invested enormous amounts of time and effort in educating merchants about the complex process of recognizing credit card revenue.
  • POS terminals in particular have a large, deeply entrenched role in merchant procedures.
  • the POS terminal is the primary (if not exclusive) accounting system for the company.
  • a third factor is authentication and risk management.
  • the credit industry is one of the most sophisticated consumers of risk management technologies in the world. Fine-grained actuarial tables precisely outline the costs of credit transactions across various channels (e.g., mail order vs. in-person transaction).
  • a system must not exceed current industry tolerances for risk and, ideally, should reduce risk.
  • a system whose risk can be managed within current risk modeling parameters is preferred.
  • a new credit card payment system should be easily deployable and should require little effort by, and education of, merchants and consumers.
  • Another potential solution is the “merchant electronic storefront”.
  • the cellular phone would interact with a website belonging to a merchant (or perhaps a group of merchants) and electronically transact with this electronic storefront.
  • a benefit of this approach is that it does not require new hardware at the merchant's location.
  • a disadvantage is that it creates an entirely new authorization/clearing system for merchants.
  • Most merchants currently do not have an electronic commerce (“e-commerce”) infrastructure, and those that do typically handle product fulfillment, support, etc. in a manner completely separate from their physical-world efforts.
  • e-commerce electronic commerce
  • the solution provided herein (as henceforth described in greater detail) overcomes these disadvantages.
  • the solution provided herein offers additional risk-reducing opportunities which make it an attractive solution to all risk-bearing parties involved in a credit card transaction.
  • Sensitive user information can be entirely secured within the trusted domain, in contrast with conventional credit card transactions.
  • the techniques described herein offer, in a single solution (if so implemented), the following risk-reducing features, all of which no previous single solution provides: paper receipt; digital receipt; opportunity for ink signature (if desired); digital signature; digital verification of signature; verification of consumer identity; ability to use “hidden” credit card data; and, independent initiation, verification, and approval of the transaction by the merchant and the consumer.
  • particular embodiments of the techniques described herein need not incorporate all of these features/benefits and do not have to do so to provide value.
  • the techniques of the present invention integrate easily and relatively seamlessly with current merchant processes, while requiring little or no additional hardware. Merchants are thereby enabled to retain their existing processes and equipment while deriving the benefit of accepting payments through a new modality.
  • FIG. 1 illustrates the entities and the environment associated with performing a credit card transaction using a wireless device, in accordance with the present invention.
  • the consumer uses a wireless communication device 1 during the credit card transaction.
  • the wireless device 1 may be, for example, a cellular telephone, as is sometimes assumed in this description to facilitate explanation. It will be recognized, however, that the wireless device 1 could alternatively be essentially any other type of wireless communication device, such as a personal digital assistant (PDA), a two-way pager, or the like. It may be assumed that the wireless device 1 includes browser software (sometimes referred to as a minibrowser or microbrowser in a hand-held wireless device).
  • browser software sometimes referred to as a minibrowser or microbrowser in a hand-held wireless device.
  • the wireless device 1 communicates with a commerce platform (CP) 2 , which is located within a “trusted domain” 3 , via a secure channel.
  • Information on the consumer is stored in the commerce platform 2 in a secure manner, and provided to the acquirer 4 , which is also located within the trusted domain 3 , when the identity of the consumer has been verified.
  • the trusted domain 3 is a domain in which the consumer is credit card account information and other confidential/personal information of the consumer is maintained.
  • the trusted domain 3 excludes the merchant and the consumer.
  • the credit card account information and other personal information of the consumer is never allowed to leave the trusted domain 3 during, or in connection with, the transaction.
  • transaction information is entered into the merchant's POS terminal 5 .
  • the merchant's POS terminal 5 interfaces directly with the acquirer 4 .
  • the merchant's POS terminal sends transaction information to the acquirer.
  • this process is typically initiated by swiping the consumer's credit card through a magnetic stripe reader in the merchant's POS terminal. Otherwise, the credit card number may be simply typed into a numeric keypad on the POS terminal.
  • the information transmitted to the acquirer normally includes the consumer's credit card number, expiration date, amount of the transaction, an identifier of the merchant, and an identifier of the acquirer.
  • the acquirer routes this information to a clearing network (e.g., MasterCard or Visa), which determines whether the transaction is authorized based on, among other things, the amount of credit currently available to the consumer.
  • a clearing network e.g., MasterCard or Visa
  • the acquirer If the transaction is authorized by the clearing network, the acquirer signals this fact to merchant's POS terminal, which prints a paper receipt of the transaction. The receipt is then signed by the consumer to complete the transaction. (Not shown in FIG. 1 is the issuer of the credit card.)
  • a credit card transaction in accordance with the present invention uses independent actions of both the consumer (using a wireless device) and the merchant (normally using a POS terminal). That is, the merchant and the consumer independently initiate, verify and approve transaction. Whereas previously the merchant would be in complete control of the transaction once the consumer had communicated the credit card information, the consumer is now involved in the initiation and approval of the transaction.
  • the merchant's point of sale POS terminal 5 sends transaction information to the acquirer 4 in a manner that is essentially the same as done today. However, the information sent to the acquirer 4 by the merchant's POS terminal does not include the consumer's credit card information, because that information is never provided to the merchant. Based on the information it receives from the POS terminal 5 , the acquirer 4 recognizes that the transaction is of a predetermined type, i.e., a transaction is to be processed using a wireless device, as opposed to a conventional credit card transaction. Upon recognizing this fact, the acquirer 4 responds by routing the received transaction information to the commerce platform 2 over a dedicated, secure channel 7 between these two parties. All communications between the acquirer and the commerce platform, as described further below, are encrypted and carried out over the dedicated, secure channel 7 .
  • the commerce platform 2 receives a PIN input by the consumer at the wireless device 1 and uses the PIN and stored information associated with the consumer to verify the identity of the consumer.
  • the consumer's PIN is encrypted and non-retrievable.
  • the PIN does not have to consist of purely numeric characters; a PIN can be a combination of alphabetic characters and numerals, or even purely alphabetic characters.
  • the commerce platform 2 passes the consumer's account information (e.g., credit card number and expiration date) to the acquirer 4 .
  • the acquirer 4 then forwards the information to the clearing network (CN) 6 within the trusted domain 3 .
  • CN clearing network
  • the acquirer 4 When the transaction clears, the acquirer 4 notifies the commerce platform 2 of this fact and signals the merchant's POS terminal 5 to generate a conventional paper receipt confirming the transaction. Concurrently with this action by the acquirer 4 , the commerce platform 2 stores a digital receipt of the transaction and signals the wireless device 1 to output a confirmation message to the consumer. The consumer may access his stored digital receipts online using the wireless device or any other computing device having online access capability, using for example a Web site interface.
  • the commerce platform 2 may be implemented in one or more conventional computer systems, such as one or more personal computers (PCs) and/or workstations.
  • PCs personal computers
  • workstations such computer systems may be coupled to each other on a network, such as a local area network (LAN), wide area network (WAN), or even over the Internet if a secure communication link is used.
  • LAN local area network
  • WAN wide area network
  • the commerce platform 2 also provides the consumer with a personalized, password-protected portal to a shopping software application, which the consumer accesses using the wireless device, to initiate the credit card transaction. Note that the consumer can also potentially access this portal using any other type of computer system with online capability.
  • the commerce platform 2 may be maintained and operated by the wireless carrier which provides telecommunications services to the wireless device 1 involved in the credit card transaction. Accordingly, the wireless carrier may receive a portion of the revenue associated with the transactions it validates, in exchange for accepting a portion of the risk/liability. Note, however, that many of the operations of the commerce platform 2 described herein do not have to be performed by a wireless carrier; essentially any other entity or enterprise could perform such operations. Hence, a commerce platform 2 such as described herein can potentially be maintained and operated by any entity or enterprise. It will be understood that references in this description to the commerce platform being maintained, owned and/or operated by a wireless carrier are for purposes of explanation only.
  • a wireless carrier is in a position to add significant value to a credit card payment system, by virtue of its unique relationship with users of wireless devices. Therefore, it may be desirable that the commerce platform be operated by a wireless carrier. Nonetheless, a wireless carrier may perform validation procedures such as described herein without necessarily using a commerce platform exactly as described herein.
  • aspects of the present invention can be applied without securing the credit card account information of the consumer within a trusted domain.
  • a commerce platform such as described herein may be used to facilitate a credit card transaction using a wireless device, even though the credit card information may be provided by the consumer directly to the merchant (i.e., in the traditional manner). In that case, the commerce platform still serves to “link” the independent actions of the merchant and the actions of the consumer for purposes of carrying out the transaction.
  • FIG. 2 illustrates the environment of FIG. 1 in greater detail, according to one embodiment. It will be recognized that various other embodiments are possible.
  • the cellular phone 1 communicates with the commerce platform 2 via a wireless communications (e.g., cellular telephone) network 21 and a gateway server 22 .
  • the gateway server 22 connects the wireless network 21 to the commerce platform 2 .
  • a primary function of the gateway server 22 is to provide a connection between the wireless network 21 and the Internet 23 .
  • This interface allows wireless devices such as cellular phones to access the World Wide Web, send and receive electronic mail (e-mail), etc.
  • the gateway server 22 may be implemented as one or more conventional PCs and/or workstations. To provide the aforementioned functions, the gateway server 22 may include and execute software such as the UP.Link WAP Server Suite, available from Openwave Systems, Inc. of Redwood City, Calif.
  • the cellular telephone 1 may communicate with the wireless network 21 using, for example, Wireless Access Protocol (WAP).
  • WAP Wireless Access Protocol
  • the wireless network 21 may communicate with the gateway server 22 using, for example, the Signaling System 7 (SS7) protocol.
  • SS7 Signaling System 7
  • the gateway server may communicate with other devices on the Internet using, for example Internet protocol (IP) and/or Hypertext Transfer Protocol (HTTP).
  • IP Internet protocol
  • HTTP Hypertext Transfer Protocol
  • the commerce platform may communicate with the gateway server using the same or similar protocols.
  • the connection between the commerce platform and the gateway server may be a direct connection or a connection via a network (e.g. a LAN).
  • the commerce platform 2 includes software 24 and a database 25 which contains credit card account information, PINs, and other personal information of multiple credit card holders (consumers). If the commerce platform 2 is operated by the wireless carrier (i.e., the operator of wireless network), the information in the database 25 may be limited to the aforementioned information for only the cardholders who subscribe to the wireless carrier's services.
  • the software 24 within the commerce platform 2 enables it to perform the identity verification operations described above.
  • the software 24 within the commerce platform 2 includes a portal built on top of the MyPhone system, available from Openwave Systems, Inc.
  • the MyPhone system provides a mobile portal platform and a suite of value-added communication applications and personal information management (PIM) applications that enable development of next generation universal access Internet portals.
  • the portal provides the consumer with access to an e-commerce (shopping) software application, which may also reside and/or execute in the commerce platform 2 .
  • the merchant's POS terminal 5 communicates with the acquirer 4 through a standard dial-up connection through, for example, the public switched telephone network (PSTN) 26 .
  • PSTN public switched telephone network
  • the commerce platform 2 communicates with the acquirer 4 over a secure, dedicated channel 7 .
  • the secure, dedicated channel 7 may be a virtual private network (VPN) connection on and otherwise nonsecure public network, such as the Internet 23 .
  • VPN virtual private network
  • FIGS. 3A and 3B illustrate one embodiment of such a process.
  • the consumer initially presents merchandise for payment at a checkout location at the merchant's place of business.
  • the merchant inputs information into a conventional transaction recording device, such as a bar code scanner, cash register, or notepad.
  • a conventional transaction recording device such as a bar code scanner, cash register, or notepad.
  • the merchant asks the consumer for the method of payment, the consumer informs the merchant the merchandise will be paid for using the consumer's phone. Note that the consumer does not present a credit card or communicate his credit card number to the merchant at this time or at any other time during the transaction.
  • the merchant's POS terminal sends transaction information to the acquirer.
  • this transmitted information can vary from embodiment to embodiment, as discussed below. However, this information normally includes some type of indicator which allows the acquirer to identify this transaction as one which will be performed using the consumer's phone.
  • the acquirer identifies the transaction type based on the information received from the merchant, and responds by passing the transaction amount, a unique identifier of the merchant (MerchantID), a unique identifier of the merchant's POS terminal (TerminalID), and the merchant's name (Merchant Name) to the commerce platform over the secure, dedicated channel.
  • the Merchant Name may be stored at the acquirer such that it can be looked up if the MerchantID is provided.
  • the commerce platform stores the transaction information and validates the transaction by verifying the consumer's identity, in a manner described below. (If the commerce platform is unable to validate the transaction, it sends an appropriate denial-of-transaction message to the consumer's phone, where the message is displayed to the user.)
  • the commerce platform Assuming the transaction is validated, at block 306 , the commerce platform generates and sends to the acquirer a transaction request on behalf of the merchant and the consumer.
  • the transaction request includes the stored transaction information and the consumer's credit card account number and expiration date.
  • the transaction request also includes a unique identifier of the acquirer, which is used for routing purposes to specify which acquiring organization should receive the transaction request. Because all relevant transactional data is now known to the commerce platform, the transaction appears from the acquirer's point of view essentially like any standard transaction initiated at a POS using a traditional credit card.
  • the acquirer receives the transaction request and, as with any other transaction request, initiates the approval process through the clearing network.
  • the commerce platform may send a message to the cellular phone to cause the phone to display a message to the consumer indicating that the transaction is pending, such as the message shown in FIG. 6D .
  • the acquirer passes information indicating the transaction has been cleared, including an approval authorization number and amount, to the commerce platform. Because the acquirer has previously identified this transaction as a phone based transaction, and the transaction was initiated over the secure channel by the commerce platform, the acquirer recognizes that the verified transaction information must be forwarded to the commerce platform.
  • the commerce platform receives this information, it stores a digital receipt of the transaction in association with the identity of this consumer/portal user at block 309 . As noted, this digital receipt can then be accessed by the consumer using the browser on the cellular phone or any other computer system.
  • the commerce platform sends, via the wireless network, a message confirming completion of the transaction to the consumer's phone, where the confirmation message is displayed to the consumer.
  • An example of the confirmation message is shown in FIG. 6E .
  • the acquirer sends a signal to the merchant's POS terminal, including the approval authorization number and amount, indicating that the transaction has cleared and instructing it to generate a paper receipt.
  • the merchant's POS terminal prints the paper receipt, which is delivered to the consumer.
  • FIGS. 4A and 4B collectively show in greater detail the validation process (block 305 ) performed by the commerce platform, according to one embodiment.
  • the transaction type identifier may be input by the merchant in place of a credit card number.
  • the transaction may look something like the following when viewing the display of the merchant's POS terminals:
  • the following additional data is sent automatically by the POS terminal: MerchantID, TerminalID, TransactionType, and Amount.
  • the acquirer forwards the received information to the commerce platform.
  • the commerce platform receives the transaction information from the acquirer at block 401 and stores it along with a unique identifier of the acquirer (AcquirerID) and the date and time at which the information is received.
  • the commerce platform then generates a unique session ID at block 402 .
  • the session ID will be used by the consumer to identify the transaction that is desired.
  • the commerce platform sends the session ID to the acquirer.
  • the acquirer passes the session ID to the merchant's POS terminal at block 404 .
  • the session ID is then communicated to the consumer at block 405 .
  • the session ID can alternatively be communicated directly from the merchant's equipment to the wireless device, using a technology such as Blue Tooth, IR, or contactless chips.
  • the method of delivery may depend upon the complexity of the session ID. For instance, if the session ID is a simple integer (such as “0321”) it may be effectively communicated orally by the merchant. However, if the session ID is more complex (such as “0321-45678”), it may be more effectively conveyed to the consumer via a digital display.
  • the generation of the session ID and its presentation to the consumer offers the opportunity to “close the loop” and identify the consumer. This is accomplished by providing a phone application to the user, via the commerce platform, which allows the user to associate himself with the newly acquired session ID.
  • the consumer uses the phone's browser at block 406 to navigate to a known shopping application, via the above-mentioned portal.
  • the user will be prompted to enter any username and password.
  • the consumer inputs his PIN (as shown in FIG. 613 ) and the session ID into the cellular phone at block 407 , which information is transmitted to the commerce platform at block 408 .
  • the user might enter a pre-defined “buy from merchant” section of the portal and be prompted to enter the PIN and session ID.
  • the processing flow through this application may be as follows: 1) start the phone's minibrowser; 2) log in to the portal with username and password (this establishes the user/consumer's identity); 3) navigate through various menu selections to shopping application; 4) enter PIN; and 5) enter session ID. This information is then passed to the commerce platform over a secure channel.
  • the commerce platform receives this information at block 409 , and uses it to verify the consumer's identity at block 410 .
  • the commerce platform verifies the consumer's identify by both authenticating the consumer against the portal itself and then by verifying the consumer's PIN. (If the consumer's identity cannot be verified, the commerce platform sends an appropriate denial-of-transaction message to the cellular phone, where it is displayed to the consumer.)
  • the commerce platform uses the session ID received from the cellular phone to look up the transaction information which it previously received from the acquirer and stored.
  • the session ID is the key to “closing the loop”, since it is the only piece of information that is known to all parties involved.
  • the previously stored time/date of the session ID is also evaluated at this time to ensure the session ID is still valid. (If the commerce platform is unable to locate the storage transaction information, it sends an appropriate denial of transaction message to the cellular phone, where the message is displayed to the consumer.)
  • the commerce platform sends to the cellular phone information indicating the details of the transaction (e.g. Merchant Name, Amount, etc.) and a prompt for the consumer either to accept or to decline the proposed transaction, where this information and prompt is displayed to the consumer.
  • FIG. 6A An example of what might be displayed to the consumer on the cellular phone is shown in FIG. 6A .
  • stored along with the credit card number in the consumer's profile can also be an encrypted token that further identifies the consumer, the credit card number and type being used, and/or the authenticity of the request to the acquirer.
  • This information may not be necessary given the nature of the transaction however (it is used in a physical credit card to prove that the card was present at the time of transaction. Since the physical “credit card” is now replaced by an interactive device in the form of a wireless device, the consumer can independently verify the transaction using his PIN and by interacting with the confirmation dialogue).
  • FIGS. 5A and 5B collectively show in greater detail the validation process (block 305 ) performed by the commerce platform, according to a second embodiment.
  • the consumer communicates a unique ID to the merchant at block 301 A, to initiate the transaction.
  • the unique ID is used to identify the transaction as a phone based transaction and may be, for example, the consumer's cellular telephone number.
  • the unique ID can alternatively be communicated directly from the wireless device to the merchant's equipment, using a technology such as Blue Tooth, IR, or contactless chips, or by scanning a bar code on the wireless device.
  • the merchant inputs the consumer's unique ID into the POS terminal, substituting the unique ID for a credit card number.
  • the merchant's POS terminal sends the transaction information with the unique ID to the acquirer.
  • the acquirer then identifies the transaction type as being a phone based transaction based on the unique ID, and passes the unique ID, the Amount, MerchantID, TerminalID, and Merchant Name to the commerce platform. If the commerce platform is operated by a wireless carrier, the acquirer also maps the unique ID to the appropriate wireless carrier (i.e., the appropriate commerce platform) for the consumer's cellular phone in block 304 A.
  • the validation process begins with block 501 in FIG. 5A . It is assumed for this embodiment that the commerce platform is owned and/or operated by the wireless carrier associated with the consumer's cellular phone.
  • the commerce platform identifies the user account associated with the unique ID.
  • the commerce platform verifies that the phone involved in the transaction is in the same geographic area as the merchant. This can be done using standard location technology in cellular telephones and cellular telephone networks. Note that the cellular phone automatically transmits its unique identifier (handset ID) to the wireless carrier when it is turned on. If the verification of block 502 fails, an appropriate message is sent to the cellular phone, for display to the user.
  • handset ID unique identifier
  • the commerce platform sends the transaction details and a prompt to accept or decline the transaction to the phone associated with the identified user account, where the message is displayed to the user. Assuming the consumer accepts the transaction (using appropriate input to the cellular phone) at block 504 , the consumer will next be prompted to enter his PIN at block 505 . After the consumer inputs his PIN into the phone at block 506 , the phone transmits the PIN to the commerce platform at block 507 . At block 508 , the commerce platform uses the PIN to verify the user's identity against previously established accounts.
  • the commerce platform then causes the consumer's phone to prompt the consumer to indicate the method of payment at block 509 .
  • An example of such a prompt is shown in FIG. 6C .
  • the consumer selects the method of payment at block 510 , and the method of payment selection is transmitted to the commerce platform at block 511 .
  • the verification process is complete, and the process flow returns to the main process, where processing continues from block 307 in FIG. 3A .
  • TTL time to live
  • the credit card information of the consumer may be isolated within a trusted domain.
  • the process of verifying the identity of the consumer may be done in a traditional manner, such that the commerce platform plays a more limited role.
  • identification of the consumer may be accomplished using a simple identification card issued to the consumer by an authorized entity (e.g., the government). In that case, the commerce platform still serves to link the independent actions of the consumer and the merchant to a particular proposed transaction.
  • the consumer may be issued a credit card that references an existing portal account maintained by the commerce platform for cellular phone-based authorization.
  • a transaction initiated by the merchant would then remain at the acquirer for a predefined TTL and await possible confirmation by the consumer by cellular phone.
  • a discount could be applied to the transaction if the consumer confirms by telephone before the TTL expires, as a consequence of the reduced risk. Otherwise, the transaction could be completed as a traditional credit card transaction.

Landscapes

  • Business, Economics & Management (AREA)
  • Accounting & Taxation (AREA)
  • Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Business, Economics & Management (AREA)
  • General Physics & Mathematics (AREA)
  • Strategic Management (AREA)
  • Theoretical Computer Science (AREA)
  • Finance (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Computer Security & Cryptography (AREA)
  • Development Economics (AREA)
  • Economics (AREA)
  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)

Abstract

A wireless telecommunications carrier operates a commerce platform in a trusted domain, which may store sensitive information associated with a consumer. During a credit card based transaction, a merchant's POS terminal sends transaction information to an acquirer. The acquirer recognizes the transaction type and responds by routing the transaction information to the commerce platform. The commerce platform validates the transaction by verifying the identity of the user. When the transaction is validated, the commerce platform notifies the acquirer, which initiates a clearing process. When the transaction clears, the acquirer notifies the commerce platform and signals the merchant's POS terminal to output a paper receipt. The commerce platform stores a digital receipt of the transaction and signals the wireless device to output a confirmation message to the consumer. The consumer's credit card number and other sensitive information may be restricted to the trusted domain, which excludes the merchant.A computer system at a commerce platform receives first data packets containing transaction information that includes consumer telephone numbers from a plurality of merchants. The computer system then transmits, over a packet-based wireless network and to a carrier provider gateway, second data packets destined for wireless devices indicated by the consumer telephone numbers, the second data packets containing information for prompting consumers to confirm transaction details corresponding to the received transaction information. The computer system then receives, over the packet-based wireless network, third data packets origination from the wireless devices, the third data packets containing a confirmation of the transaction details responsive to the prompting. In response to the confirmation, the computer system accesses consumer profile data to obtain consumer account information and then transmits the obtained consumer account information and the confirmed transaction details to a clearing network, using packet-based data, to complete the financial transactions.

Description

This application claims the benefit of U.S. Provisional Patent Application No. 60/238,760, filed on Oct. 6, 2000, and entitled, “Using the Phone for POS Transactions”, which is incorporated herein by reference.
More than one reissue applications have been filed for the reissue of U.S. Pat. No. 7,292,996. The reissue applications are application Ser. No. 12/614,264 (the present application) and application Ser. No. 12/614,258 both filed concurrently on Nov. 6, 2009. The present reissue application is a divisional reissue application of U.S. Pat. No. 7,292,996. Application Ser. No. 13/314,027 filed on Dec. 7, 2011 is a divisional of application Ser. No. 12/614,258.
FIELD OF THE INVENTION
The present invention pertains to the use of wireless communication devices in executing credit card transactions. More particularly, the present invention relates to using wireless communication devices in executing credit card transactions in a manner which reduces the risk of fraudulent transactions.
BACKGROUND OF THE INVENTION
Consumers have grown accustomed to using credit cards to purchase goods and services. Although credit cards provide significant advantages and convenience over cash transactions, various costs are associated with credit card transactions. A major factor in determining the cost of a credit card transaction is risk, and particularly, the risk of fraud. These costs may be imposed upon merchants and consumers in the form of use charges, annual fees, and/or higher interest rates.
There are several different ways in which a consumer can purchase goods or services using a credit card, each of which has a certain amount of fraud risk associated with it. In the traditional credit card transaction, the consumer (the credit card holder) is present at the merchant's (provider of goods or services) place of business and physically presents the card to the merchant when paying for the goods or services. The consumer physically signs a paper receipt confirming the transaction. Another common type of credit card transaction type is mail order or telephone order. In this scenario, nothing is physically signed by the consumer, and the credit card is not physically present at the merchant. Consequently, this type of a credit card transaction generally involves a greater risk of fraud than an in-person transaction. Another type of credit card transaction which recently has become much more common is the online (Internet) purchase. In this case as well, nothing is physically signed by the consumer, and the credit card is not physically present at the merchant. Although substantial progress has been made in the areas of data encryption and Internet security in general, this method of payment is still viewed by many as involving the greatest risk of all the types of credit card transactions.
The parties potentially affected by credit card fraud include the consumer (the credit card holder), the provider of goods or services (the “merchant”), the issuer (the bank which issued the credit card), the acquirer (the bank which directly interfaces with the merchant for purposes of processing a credit card transaction; often the same entity as the issuer), and the clearing network (e.g., MasterCard or Visa). These parties may be exposed to fraud in any of several ways. First, a criminal posing as a credit card account holder may make fraudulent purchases on a stolen credit card account number. Currently, the point of origin for most of the fraud risk associated with a credit card is at the transition where the credit card is delivered from the issuer to the consumer. In addition, signatures may be forged, enabling a criminal to impersonate a legitimate credit card account holder. The transaction can be completed even if the merchant fails to check the signature or back up identification of the consumer. Furthermore, an acquirer must trust the information it receives from the merchant. Consequently, a criminals posing as a merchant may run transactions on a stolen credit card number. Also, a criminal working for a legitimate merchant may falsify the amount of the legitimate purchase. The transaction can also be completed even if the consumer does not verify that the transaction is for the correct amount, enabling a criminal to run a fraudulent transaction amount. In addition, a consumer may repudiate a valid transaction. In the online scenario in particular, is very difficult to prove that the consumer approved the transaction.
Credit card fraud creates expense for credit card networks, their banks, and consumers. Reducing the incidence of fraud in credit card transactions will help to save money and, in turn, to reduce use charges for merchants and consumers and enable new credit card services. A new credit card payment system, therefore, should work within, and preferably improve upon, existing risk tolerance levels and other constraints associated with more conventional credit card transactions.
Furthermore, a new credit card payment system should not require significant added hardware or changes to existing merchant credit card authorization/clearing procedures, or require significant effort or training for merchants and consumers.
SUMMARY OF THE INVENTION
The present invention includes a method and apparatus for facilitating a credit based transaction between a consumer and a provider of a product or service. The method comprises a telecommunications carrier providing telecommunications services to users of wireless communications devices on a wireless communications network, including the consumer, and validating the credit card transaction between the consumer and the provider. The carrier may receive a portion of the revenue associated with credit card transactions.
In another aspect of the present invention, a method and apparatus for facilitating a credit based transaction between a consumer and a provider of a product or service includes storing credit account information of the consumer within a trusted domain which excludes the consumer and the provider. The credit account information is used to validate the transaction between the consumer and the provider, such that the stored credit account information is not sent outside the trusted domain at any time in relation to the transaction. The method may be performed by a wireless telecommunications carrier, which may receive a portion of the revenue associated with credit card transactions.
Other features of the present invention will be apparent from the accompanying drawings and from the detailed description which follows.
BRIEF DESCRIPTION OF THE DRAWINGS
The present invention is illustrated by way of example and not limitation in the figures of the accompanying drawings, in which like references indicate similar elements and in which:
FIG. 1 is a block diagram illustrating the entities and the environment associated with performing a credit card transaction using a wireless device in accordance with the present invention;
FIG. 2 illustrates the environment of FIG. 1 in greater detail, according to one embodiment;
FIGS. 3A and 3B collectively form a flow diagram showing the overall process of performing a credit card transaction in accordance with the present invention;
FIGS. 4A and 4B collectively form a flow diagram to showing in greater detail the validation process performed by the commerce platform, according to a first embodiment;
FIGS. 5A and 5B collectively form a flow diagram showing in greater detail the validation process performed by the commerce platform, according to a second embodiment; and
FIGS. 6A through 6E show a series of screens which may be displayed on a cellular telephone or the like during a credit card based transaction in accordance with the present invention.
DETAILED DESCRIPTION
A method and apparatus for performing a credit card transaction between a merchant and a consumer using a wireless communications device are described. A “merchant” is defined herein to mean a provider of goods and/or services. Note that in this description, references to “one embodiment” or “an embodiment” mean that the feature being referred to is included in at least one embodiment of the present invention. Further, separate references to “one embodiment” in this description do not necessarily refer to the same embodiment; however, neither are such embodiments mutually exclusive, unless so stated and except as will be readily apparent to those skilled in the art.
The techniques described herein provide a new modality of credit card payment that can benefit all parties involved in a credit card transaction. The described techniques help to substantially reduce the risk of fraud associated with credit card transactions and, accordingly, to reduce the costs associated with credit card transactions. In addition, the described techniques are amenable to quick and widespread acceptance in the marketplace, since they require little or no additional hardware, no significant changes to merchant authorization and clearing procedures, and little or no effort or training of merchants and consumers.
As described in greater detail below, the techniques provided herein enable a wireless telecommunications network operator (“wireless carrier”) to validate the identities of credit card users who use wireless devices such as cellular telephones (and who therefore subscribe to the carrier's service), and to ensure that the credit card users approve the transactions and receive receipts for the transactions. A wireless carrier has the capability to identify a cellular telephone (or other wireless device) and its user as part of providing its telecommunications services. Therefore, when a credit card transaction is conducted in part by using the wireless device on the carrier's network, the carrier can: 1) authenticate and account holder's identity independently and redundantly to existing credit card purchase processes; 2) require that proposed credit card purchases only be executed if they are agreed to by the true credit card account holder; and 3) validate that the wireless device involved in a proposed credit card transaction is located in the same geographic area as the proposed transaction.
For performing this validation process and thereby accepting a portion of the associated risk/liability, a wireless carrier may also receive a portion of the revenue associated with the credit card transactions it validates. This remuneration may be provided through a business arrangement for providing the validation services. For example, the credit card issued to the consumer may be the wireless carrier's co-branded Visa, Mastercard, etc. Accordingly, a percentage of the transaction amount, which typically would have been allocated entirely to the issuer, might now go to the wireless carrier. This approach is a significant departure from the risk/revenue allocation model associated with conventional credit card transactions. Of course, it will be recognized that the validation process described herein does not have to be performed by a wireless carrier and could be performed by many other types of entity or enterprise.
To accomplish the above-mentioned tasks, as described in greater detail below, an entity such as a wireless carrier maintains, owns and/or operates a commerce platform within a “trusted domain”. In certain embodiments, the commerce platform stores the consumer's credit card account information and other personal information on the consumer, for purposes of validating the identity of the consumer. The merchant's point of sale (POS) terminal sends transaction information to the acquirer at the time of purchase. Based on this information, the acquirer recognizes the transaction type and responds by routing the transaction information to the commerce platform. The commerce platform may receive, for example, a personal identification number (PIN) or the like, input by the consumer at the wireless device, which the commerce platform may use in association with the stored information to verify the identity of the consumer. Note that a wireless carrier also has other ways of validating user identity for a credit card transaction besides using a PIN, such as based on its knowledge about the legitimacy of the wireless device being used and correlations between the wireless device and the issued card.
When the consumer's identity is validated, the commerce platform passes the consumer's account information (credit card number, expiration date, etc.) to the acquirer, which is also located within the trusted domain. The acquirer forwards the information to a clearing network within the trusted domain.
When the transaction clears, the acquirer notifies the commerce platform and signals the merchant's point of sale (POS) terminal to generate a conventional paper receipt confirming the transaction. In response, the commerce platform stores a digital receipt of the transaction, which the consumer may access online using the wireless device or any other computing device having online access capability. The commerce platform may also signal the wireless device to output a confirmation message to the consumer.
To be viable, a new credit card payment system must work within existing constraints associated with processing merchant credit transactions. Some of these constraints are related to attitude in the marketplace; that is, they are a consequence of the decades of entrenched merchant behavior and hardware equipment in the field. Others are economic and related to the structure of the credit card economy. For example, one factor which affects any potential solution is the desirability of leveraging the credit card value chain. A large part of the reason credit cards have the presence they enjoy today is that there are potentially five players in every transaction (consumer, merchant, acquirer, clearing network, and issuer), each of whom has incentive to widen the network and make transactions viable. In particular, the acquiring bank representing the merchant provides a point interface into potentially thousands of downstream merchants. Creating solutions and processes that target the acquiring bank simultaneously provides them with incentive and reduces system-wide deployment hurdles.
Another factor is the desirability of integrating current merchant authorization and clearing procedures. The credit card networks have invested enormous amounts of time and effort in educating merchants about the complex process of recognizing credit card revenue. POS terminals in particular have a large, deeply entrenched role in merchant procedures. For many retail merchants, the POS terminal is the primary (if not exclusive) accounting system for the company. A third factor is authentication and risk management. The credit industry is one of the most sophisticated consumers of risk management technologies in the world. Fine-grained actuarial tables precisely outline the costs of credit transactions across various channels (e.g., mail order vs. in-person transaction).
To gain acceptance, therefore, a system must not exceed current industry tolerances for risk and, ideally, should reduce risk. A system whose risk can be managed within current risk modeling parameters is preferred. In addition, a new credit card payment system should be easily deployable and should require little effort by, and education of, merchants and consumers.
One potential solution is the Local Proximity approach. In this approach, a cellular phone converses with the merchant's POS using short-range wireless technologies such as Blue Tooth, infrared (IR), or contactless chips. A benefit of this approach is that it would work with current merchant systems for authorization and clearing of transactions. A disadvantage, however, is that it would require introduction of new hardware to merchants that wish to participate.
Another potential solution is the “merchant electronic storefront”. In this approach, the cellular phone would interact with a website belonging to a merchant (or perhaps a group of merchants) and electronically transact with this electronic storefront. A benefit of this approach is that it does not require new hardware at the merchant's location. A disadvantage is that it creates an entirely new authorization/clearing system for merchants. Most merchants currently do not have an electronic commerce (“e-commerce”) infrastructure, and those that do typically handle product fulfillment, support, etc. in a manner completely separate from their physical-world efforts.
Yet another potential solution is the “merchant mall”. This is a permutation of the above approach, in which a third party (such as the acquiring bank) handles the construction of the merchant storefront and centrally manages it. While this solution solves the problem of storefront deployment, it does not solve the problem of integrating authorization and fulfillment.
The solution provided herein (as henceforth described in greater detail) overcomes these disadvantages. The solution provided herein offers additional risk-reducing opportunities which make it an attractive solution to all risk-bearing parties involved in a credit card transaction. Sensitive user information can be entirely secured within the trusted domain, in contrast with conventional credit card transactions. The techniques described herein offer, in a single solution (if so implemented), the following risk-reducing features, all of which no previous single solution provides: paper receipt; digital receipt; opportunity for ink signature (if desired); digital signature; digital verification of signature; verification of consumer identity; ability to use “hidden” credit card data; and, independent initiation, verification, and approval of the transaction by the merchant and the consumer. Of course, particular embodiments of the techniques described herein need not incorporate all of these features/benefits and do not have to do so to provide value.
The techniques of the present invention integrate easily and relatively seamlessly with current merchant processes, while requiring little or no additional hardware. Merchants are thereby enabled to retain their existing processes and equipment while deriving the benefit of accepting payments through a new modality.
Refer now to FIG. 1, which illustrates the entities and the environment associated with performing a credit card transaction using a wireless device, in accordance with the present invention. The consumer uses a wireless communication device 1 during the credit card transaction. The wireless device 1 may be, for example, a cellular telephone, as is sometimes assumed in this description to facilitate explanation. It will be recognized, however, that the wireless device 1 could alternatively be essentially any other type of wireless communication device, such as a personal digital assistant (PDA), a two-way pager, or the like. It may be assumed that the wireless device 1 includes browser software (sometimes referred to as a minibrowser or microbrowser in a hand-held wireless device). The wireless device 1 communicates with a commerce platform (CP) 2, which is located within a “trusted domain” 3, via a secure channel. Information on the consumer is stored in the commerce platform 2 in a secure manner, and provided to the acquirer 4, which is also located within the trusted domain 3, when the identity of the consumer has been verified. The trusted domain 3 is a domain in which the consumer is credit card account information and other confidential/personal information of the consumer is maintained. The trusted domain 3 excludes the merchant and the consumer. In certain embodiments, the credit card account information and other personal information of the consumer is never allowed to leave the trusted domain 3 during, or in connection with, the transaction. At the merchant's place of business, transaction information is entered into the merchant's POS terminal 5. The merchant's POS terminal 5 interfaces directly with the acquirer 4.
During a traditional credit card transaction, the merchant's POS terminal sends transaction information to the acquirer. During an in-person credit card transaction, this process is typically initiated by swiping the consumer's credit card through a magnetic stripe reader in the merchant's POS terminal. Otherwise, the credit card number may be simply typed into a numeric keypad on the POS terminal. The information transmitted to the acquirer normally includes the consumer's credit card number, expiration date, amount of the transaction, an identifier of the merchant, and an identifier of the acquirer. The acquirer routes this information to a clearing network (e.g., MasterCard or Visa), which determines whether the transaction is authorized based on, among other things, the amount of credit currently available to the consumer. If the transaction is authorized by the clearing network, the acquirer signals this fact to merchant's POS terminal, which prints a paper receipt of the transaction. The receipt is then signed by the consumer to complete the transaction. (Not shown in FIG. 1 is the issuer of the credit card.)
In contrast, a credit card transaction in accordance with the present invention uses independent actions of both the consumer (using a wireless device) and the merchant (normally using a POS terminal). That is, the merchant and the consumer independently initiate, verify and approve transaction. Whereas previously the merchant would be in complete control of the transaction once the consumer had communicated the credit card information, the consumer is now involved in the initiation and approval of the transaction.
The merchant's point of sale POS terminal 5 sends transaction information to the acquirer 4 in a manner that is essentially the same as done today. However, the information sent to the acquirer 4 by the merchant's POS terminal does not include the consumer's credit card information, because that information is never provided to the merchant. Based on the information it receives from the POS terminal 5, the acquirer 4 recognizes that the transaction is of a predetermined type, i.e., a transaction is to be processed using a wireless device, as opposed to a conventional credit card transaction. Upon recognizing this fact, the acquirer 4 responds by routing the received transaction information to the commerce platform 2 over a dedicated, secure channel 7 between these two parties. All communications between the acquirer and the commerce platform, as described further below, are encrypted and carried out over the dedicated, secure channel 7.
Concurrently, in one embodiment, the commerce platform 2 receives a PIN input by the consumer at the wireless device 1 and uses the PIN and stored information associated with the consumer to verify the identity of the consumer. The consumer's PIN is encrypted and non-retrievable. The PIN does not have to consist of purely numeric characters; a PIN can be a combination of alphabetic characters and numerals, or even purely alphabetic characters. When the consumer's identity is verified, the commerce platform 2 passes the consumer's account information (e.g., credit card number and expiration date) to the acquirer 4. The acquirer 4 then forwards the information to the clearing network (CN) 6 within the trusted domain 3. When the transaction clears, the acquirer 4 notifies the commerce platform 2 of this fact and signals the merchant's POS terminal 5 to generate a conventional paper receipt confirming the transaction. Concurrently with this action by the acquirer 4, the commerce platform 2 stores a digital receipt of the transaction and signals the wireless device 1 to output a confirmation message to the consumer. The consumer may access his stored digital receipts online using the wireless device or any other computing device having online access capability, using for example a Web site interface.
The commerce platform 2 may be implemented in one or more conventional computer systems, such as one or more personal computers (PCs) and/or workstations. In an embodiment in which the commerce platform 2 is formed by multiple computer systems, such computer systems may be coupled to each other on a network, such as a local area network (LAN), wide area network (WAN), or even over the Internet if a secure communication link is used.
In one embodiment, the commerce platform 2 also provides the consumer with a personalized, password-protected portal to a shopping software application, which the consumer accesses using the wireless device, to initiate the credit card transaction. Note that the consumer can also potentially access this portal using any other type of computer system with online capability.
As noted, the commerce platform 2 may be maintained and operated by the wireless carrier which provides telecommunications services to the wireless device 1 involved in the credit card transaction. Accordingly, the wireless carrier may receive a portion of the revenue associated with the transactions it validates, in exchange for accepting a portion of the risk/liability. Note, however, that many of the operations of the commerce platform 2 described herein do not have to be performed by a wireless carrier; essentially any other entity or enterprise could perform such operations. Hence, a commerce platform 2 such as described herein can potentially be maintained and operated by any entity or enterprise. It will be understood that references in this description to the commerce platform being maintained, owned and/or operated by a wireless carrier are for purposes of explanation only.
On the other hand, a wireless carrier is in a position to add significant value to a credit card payment system, by virtue of its unique relationship with users of wireless devices. Therefore, it may be desirable that the commerce platform be operated by a wireless carrier. Nonetheless, a wireless carrier may perform validation procedures such as described herein without necessarily using a commerce platform exactly as described herein.
In addition, note that aspects of the present invention can be applied without securing the credit card account information of the consumer within a trusted domain. For example, a commerce platform such as described herein may be used to facilitate a credit card transaction using a wireless device, even though the credit card information may be provided by the consumer directly to the merchant (i.e., in the traditional manner). In that case, the commerce platform still serves to “link” the independent actions of the merchant and the actions of the consumer for purposes of carrying out the transaction.
FIG. 2 illustrates the environment of FIG. 1 in greater detail, according to one embodiment. It will be recognized that various other embodiments are possible. As shown, the cellular phone 1 communicates with the commerce platform 2 via a wireless communications (e.g., cellular telephone) network 21 and a gateway server 22. The gateway server 22 connects the wireless network 21 to the commerce platform 2.
In one embodiment, a primary function of the gateway server 22 is to provide a connection between the wireless network 21 and the Internet 23. This interface allows wireless devices such as cellular phones to access the World Wide Web, send and receive electronic mail (e-mail), etc. The gateway server 22 may be implemented as one or more conventional PCs and/or workstations. To provide the aforementioned functions, the gateway server 22 may include and execute software such as the UP.Link WAP Server Suite, available from Openwave Systems, Inc. of Redwood City, Calif.
The cellular telephone 1 may communicate with the wireless network 21 using, for example, Wireless Access Protocol (WAP). The wireless network 21 may communicate with the gateway server 22 using, for example, the Signaling System 7 (SS7) protocol. The gateway server may communicate with other devices on the Internet using, for example Internet protocol (IP) and/or Hypertext Transfer Protocol (HTTP). The commerce platform may communicate with the gateway server using the same or similar protocols. The connection between the commerce platform and the gateway server may be a direct connection or a connection via a network (e.g. a LAN).
The commerce platform 2 includes software 24 and a database 25 which contains credit card account information, PINs, and other personal information of multiple credit card holders (consumers). If the commerce platform 2 is operated by the wireless carrier (i.e., the operator of wireless network), the information in the database 25 may be limited to the aforementioned information for only the cardholders who subscribe to the wireless carrier's services. The software 24 within the commerce platform 2 enables it to perform the identity verification operations described above. In one embodiment, the software 24 within the commerce platform 2 includes a portal built on top of the MyPhone system, available from Openwave Systems, Inc. The MyPhone system provides a mobile portal platform and a suite of value-added communication applications and personal information management (PIM) applications that enable development of next generation universal access Internet portals. The portal provides the consumer with access to an e-commerce (shopping) software application, which may also reside and/or execute in the commerce platform 2.
The merchant's POS terminal 5 communicates with the acquirer 4 through a standard dial-up connection through, for example, the public switched telephone network (PSTN) 26. The commerce platform 2 communicates with the acquirer 4 over a secure, dedicated channel 7. The secure, dedicated channel 7 may be a virtual private network (VPN) connection on and otherwise nonsecure public network, such as the Internet 23.
The overall process of performing a credit card transaction according to the present invention is now further described with reference to FIGS. 3A and 3B, which illustrate one embodiment of such a process. At processing block 301, the consumer initially presents merchandise for payment at a checkout location at the merchant's place of business. At block 302, the merchant inputs information into a conventional transaction recording device, such as a bar code scanner, cash register, or notepad. When the merchant asks the consumer for the method of payment, the consumer informs the merchant the merchandise will be paid for using the consumer's phone. Note that the consumer does not present a credit card or communicate his credit card number to the merchant at this time or at any other time during the transaction. Next, at block 303, the merchant's POS terminal sends transaction information to the acquirer. The contents of this transmitted information can vary from embodiment to embodiment, as discussed below. However, this information normally includes some type of indicator which allows the acquirer to identify this transaction as one which will be performed using the consumer's phone. Next, at block 304, the acquirer identifies the transaction type based on the information received from the merchant, and responds by passing the transaction amount, a unique identifier of the merchant (MerchantID), a unique identifier of the merchant's POS terminal (TerminalID), and the merchant's name (Merchant Name) to the commerce platform over the secure, dedicated channel. The Merchant Name may be stored at the acquirer such that it can be looked up if the MerchantID is provided.
Next, at block 305, the commerce platform stores the transaction information and validates the transaction by verifying the consumer's identity, in a manner described below. (If the commerce platform is unable to validate the transaction, it sends an appropriate denial-of-transaction message to the consumer's phone, where the message is displayed to the user.)
Assuming the transaction is validated, at block 306, the commerce platform generates and sends to the acquirer a transaction request on behalf of the merchant and the consumer. The transaction request includes the stored transaction information and the consumer's credit card account number and expiration date. The transaction request also includes a unique identifier of the acquirer, which is used for routing purposes to specify which acquiring organization should receive the transaction request. Because all relevant transactional data is now known to the commerce platform, the transaction appears from the acquirer's point of view essentially like any standard transaction initiated at a POS using a traditional credit card.
At block 307, the acquirer receives the transaction request and, as with any other transaction request, initiates the approval process through the clearing network. While the transaction is being processed, the commerce platform may send a message to the cellular phone to cause the phone to display a message to the consumer indicating that the transaction is pending, such as the message shown in FIG. 6D.
Assuming the transaction is approved by the clearing network, then at block 308, the acquirer passes information indicating the transaction has been cleared, including an approval authorization number and amount, to the commerce platform. Because the acquirer has previously identified this transaction as a phone based transaction, and the transaction was initiated over the secure channel by the commerce platform, the acquirer recognizes that the verified transaction information must be forwarded to the commerce platform. When the commerce platform receives this information, it stores a digital receipt of the transaction in association with the identity of this consumer/portal user at block 309. As noted, this digital receipt can then be accessed by the consumer using the browser on the cellular phone or any other computer system. At block 310, the commerce platform sends, via the wireless network, a message confirming completion of the transaction to the consumer's phone, where the confirmation message is displayed to the consumer. An example of the confirmation message is shown in FIG. 6E. In addition, as in a conventional credit card transaction, at block 311 the acquirer sends a signal to the merchant's POS terminal, including the approval authorization number and amount, indicating that the transaction has cleared and instructing it to generate a paper receipt. At block 312, the merchant's POS terminal prints the paper receipt, which is delivered to the consumer.
The process is complete at this point. Note that in contrast with a conventional in-person credit card transaction, the consumer's physical (pen and ink) signature is not required. Note, however, that the opportunity for the merchant to obtain the consumer's physical signature is still present, since a paper receipt is printed. Therefore, the merchant can obtain a physical signature if desired. However, with this technique, a physical signature would likely provide little or no added value.
FIGS. 4A and 4B collectively show in greater detail the validation process (block 305) performed by the commerce platform, according to one embodiment. In this embodiment, the merchant enters a pre-defined transaction type identifier (e.g., “type=phone”) into the POS terminal to signify that: 1) the consumer's identity has not yet been identified/verified; and 2) a wireless application will be used to provide and/or verify identity and transaction data. The transaction type identifier may be input by the merchant in place of a credit card number. The transaction may look something like the following when viewing the display of the merchant's POS terminals:
    • POS: “Slide Card or Enter Card #”
    • MERCHANT input: 2211 (code specifying no card available; phone transaction)
    • POS: “Enter Amount”
    • Merchant input: $102.10
Along with the transaction information manually entered by the merchant, the following additional data is sent automatically by the POS terminal: MerchantID, TerminalID, TransactionType, and Amount.
As noted above, upon receiving information from the POS terminal and recognizing the transaction type, the acquirer forwards the received information to the commerce platform. Referring now to FIG. 4A, the commerce platform receives the transaction information from the acquirer at block 401 and stores it along with a unique identifier of the acquirer (AcquirerID) and the date and time at which the information is received. The commerce platform then generates a unique session ID at block 402. The session ID will be used by the consumer to identify the transaction that is desired. At block 403 the commerce platform sends the session ID to the acquirer. The acquirer then passes the session ID to the merchant's POS terminal at block 404. The session ID is then communicated to the consumer at block 405. This can be done by the POS terminal, an ancillary terminal-type device with a larger/more presentable display, and/or verbally by the merchant. The session ID can alternatively be communicated directly from the merchant's equipment to the wireless device, using a technology such as Blue Tooth, IR, or contactless chips. The method of delivery may depend upon the complexity of the session ID. For instance, if the session ID is a simple integer (such as “0321”) it may be effectively communicated orally by the merchant. However, if the session ID is more complex (such as “0321-45678”), it may be more effectively conveyed to the consumer via a digital display.
The generation of the session ID and its presentation to the consumer offers the opportunity to “close the loop” and identify the consumer. This is accomplished by providing a phone application to the user, via the commerce platform, which allows the user to associate himself with the newly acquired session ID. Hence, the consumer uses the phone's browser at block 406 to navigate to a known shopping application, via the above-mentioned portal. To access the portal, the user will be prompted to enter any username and password. When prompted, the consumer inputs his PIN (as shown in FIG. 613) and the session ID into the cellular phone at block 407, which information is transmitted to the commerce platform at block 408.
For example, the user might enter a pre-defined “buy from merchant” section of the portal and be prompted to enter the PIN and session ID. The processing flow through this application may be as follows: 1) start the phone's minibrowser; 2) log in to the portal with username and password (this establishes the user/consumer's identity); 3) navigate through various menu selections to shopping application; 4) enter PIN; and 5) enter session ID. This information is then passed to the commerce platform over a secure channel.
The commerce platform receives this information at block 409, and uses it to verify the consumer's identity at block 410. The commerce platform verifies the consumer's identify by both authenticating the consumer against the portal itself and then by verifying the consumer's PIN. (If the consumer's identity cannot be verified, the commerce platform sends an appropriate denial-of-transaction message to the cellular phone, where it is displayed to the consumer.) At block 411, the commerce platform uses the session ID received from the cellular phone to look up the transaction information which it previously received from the acquirer and stored. The session ID is the key to “closing the loop”, since it is the only piece of information that is known to all parties involved. The previously stored time/date of the session ID is also evaluated at this time to ensure the session ID is still valid. (If the commerce platform is unable to locate the storage transaction information, it sends an appropriate denial of transaction message to the cellular phone, where the message is displayed to the consumer.) At block 412, the commerce platform sends to the cellular phone information indicating the details of the transaction (e.g. Merchant Name, Amount, etc.) and a prompt for the consumer either to accept or to decline the proposed transaction, where this information and prompt is displayed to the consumer. An example of what might be displayed to the consumer on the cellular phone is shown in FIG. 6A.
Assuming the consumer accepts the transaction and provides an input to the cellular phone indicating such acceptance, and acceptance signal is transmitted from the cellular phone to the commerce platform. At this point, the verification process is complete, and the process flow returns to the main process, where processing continues from block 307 in FIG. 3A.
In the commerce platform, stored along with the credit card number in the consumer's profile can also be an encrypted token that further identifies the consumer, the credit card number and type being used, and/or the authenticity of the request to the acquirer. This information may not be necessary given the nature of the transaction however (it is used in a physical credit card to prove that the card was present at the time of transaction. Since the physical “credit card” is now replaced by an interactive device in the form of a wireless device, the consumer can independently verify the transaction using his PIN and by interacting with the confirmation dialogue).
FIGS. 5A and 5B collectively show in greater detail the validation process (block 305) performed by the commerce platform, according to a second embodiment. Note that strictly speaking, blocks 301A through 304A can be considered separate from the validation process but are nonetheless included in FIG. 5A for clarity. In this embodiment, the consumer communicates a unique ID to the merchant at block 301A, to initiate the transaction. The unique ID is used to identify the transaction as a phone based transaction and may be, for example, the consumer's cellular telephone number. The unique ID can alternatively be communicated directly from the wireless device to the merchant's equipment, using a technology such as Blue Tooth, IR, or contactless chips, or by scanning a bar code on the wireless device. At block 302A, the merchant inputs the consumer's unique ID into the POS terminal, substituting the unique ID for a credit card number. At block 303A, the merchant's POS terminal sends the transaction information with the unique ID to the acquirer. At block 304A, the acquirer then identifies the transaction type as being a phone based transaction based on the unique ID, and passes the unique ID, the Amount, MerchantID, TerminalID, and Merchant Name to the commerce platform. If the commerce platform is operated by a wireless carrier, the acquirer also maps the unique ID to the appropriate wireless carrier (i.e., the appropriate commerce platform) for the consumer's cellular phone in block 304A.
The validation process (block 305) then begins with block 501 in FIG. 5A. It is assumed for this embodiment that the commerce platform is owned and/or operated by the wireless carrier associated with the consumer's cellular phone. At block 501, the commerce platform identifies the user account associated with the unique ID. At block 502, the commerce platform verifies that the phone involved in the transaction is in the same geographic area as the merchant. This can be done using standard location technology in cellular telephones and cellular telephone networks. Note that the cellular phone automatically transmits its unique identifier (handset ID) to the wireless carrier when it is turned on. If the verification of block 502 fails, an appropriate message is sent to the cellular phone, for display to the user. At block 503, the commerce platform sends the transaction details and a prompt to accept or decline the transaction to the phone associated with the identified user account, where the message is displayed to the user. Assuming the consumer accepts the transaction (using appropriate input to the cellular phone) at block 504, the consumer will next be prompted to enter his PIN at block 505. After the consumer inputs his PIN into the phone at block 506, the phone transmits the PIN to the commerce platform at block 507. At block 508, the commerce platform uses the PIN to verify the user's identity against previously established accounts. (If verification fails, an appropriate message is sent to the phone, where it is displayed to the consumer.) The commerce platform then causes the consumer's phone to prompt the consumer to indicate the method of payment at block 509. An example of such a prompt is shown in FIG. 6C. The consumer selects the method of payment at block 510, and the method of payment selection is transmitted to the commerce platform at block 511. At this point, the verification process is complete, and the process flow returns to the main process, where processing continues from block 307 in FIG. 3A. Note that, as in the previously described embodiment, there may be a time to live (TTL) associated with each transaction, which the commerce platform evaluates.
Of course, there are many possible permutations of the above-described embodiments, which may fall within the scope of the present invention. As noted above, it is not essential that the credit card information of the consumer be isolated within a trusted domain. The process of verifying the identity of the consumer may be done in a traditional manner, such that the commerce platform plays a more limited role. As one example, identification of the consumer may be accomplished using a simple identification card issued to the consumer by an authorized entity (e.g., the government). In that case, the commerce platform still serves to link the independent actions of the consumer and the merchant to a particular proposed transaction.
As another example, the consumer may be issued a credit card that references an existing portal account maintained by the commerce platform for cellular phone-based authorization. A transaction initiated by the merchant would then remain at the acquirer for a predefined TTL and await possible confirmation by the consumer by cellular phone. In this scenario, a discount could be applied to the transaction if the consumer confirms by telephone before the TTL expires, as a consequence of the reduced risk. Otherwise, the transaction could be completed as a traditional credit card transaction.
Thus, a method and apparatus for performing a credit card transaction between a merchant and a consumer using a wireless communications device have been described. Although the present invention has been described with reference to specific exemplary embodiments, it will be evident that various modifications and changes may be made to these embodiments without departing from the broader spirit and scope of the invention as set forth in the claims. Accordingly, the specification and drawings are to be regarded in an illustrative sense rather than a restrictive sense.

Claims (33)

What is claimed is:
1. A method of facilitating a credit card transaction between a consumer using a wireless communication device and a provider of a product or service, the method comprising:
in a commerce platform implemented as one or more computer systems operated by a single business entity,
storing personal information of the consumer, including a credit card number of a credit card issued to the consumer;
receiving information for requesting the transaction from a remote entity;
sending information on the transaction to the wireless communication device;
receiving a signal from the wireless communication device indicating acceptance of the transaction;
receiving a personal identification code from the wireless communication device;
using the received personal identification code and the stored personal information on the consumer to verify the identity of the consumer;
verifying that the wireless communication device is in the same geographic area as the provider;
in response to verifying the identity of the consumer and verifying that the wireless communication device is in geographic proximity to the provider, sending to a remote entity other than said single business entity a transaction request including information on the transaction and the credit card number, for initiation of a transaction approval process.
2. A method as recited in claim 1, wherein said storing personal information of the consumer comprises storing personal information of the consumer in a database within a trusted domain, the trusted domain excluding the consumer and the provider.
3. A method as recited in claim 2, wherein the stored personal information of the consumer is not permitted to pass outside the trusted domain at any time during performance of said method.
4. A method as recited in claim 1, further comprising:
receiving a signal indicating the transaction has been approved; and
in response to receiving the signal indicating the transaction has been approved,
storing a digital receipt of the transaction, and
sending a signal to the wireless communication device to cause the wireless communication device to output a message confirming completion of the transaction.
5. A method as recited in claim 1, further comprising providing telecommunications services to users of a plurality of wireless communications devices on a wireless communications network, including storing user account information for each of the plurality of users, including said consumer.
6. A method as recited in claim 5, further comprising, prior to sending information on the transaction to the wireless communication device:
receiving a unique identifier of the wireless communication device from a remote entity; and
identifying the wireless communication device and an associated user account based on the unique identifier.
7. A method of facilitating a credit transaction between a consumer and a provider of a product or service, the method comprising:
receiving information associated with the credit transaction from a remote terminal operated by the provider;
determining whether the credit transaction involves use of a personal mobile telecommunication device;
should the credit transaction be determined not to involve use of a personal mobile telecommunication device, then initiating a transaction approval process by transmitting at least a portion of the received information to a clearing network for approval of the transaction;
should the credit transaction be determined to involve use of a personal mobile telecommunication device, then
transmitting the received information to a remote validation entity other than the clearing network over a secure channel, to enable validation of the credit transaction by the remote validation entity, and
upon receiving an indication that the credit transaction has been validated by the remote validation entity, initiating a credit transaction approval process by transmitting at least a portion of the information to the clearing network for approval of the credit transaction.
8. A method as recited in claim 7, wherein the information received from the remote terminal does not include a credit card number if the transaction involves use of a personal mobile telecommunication device, such that the information transmitted to the remote validation entity does not include a credit card number, and such that the remote validation entity validates the transaction without requiring the consumer or the provider to communicate a credit card number in connection with the transaction.
9. A method as recited in claim 8, wherein the information received from the remote terminal includes a credit card number if the transaction does not involve use of a personal mobile telecommunication device.
10. A method as recited in claim 7, wherein said determining whether the transaction involves use of a personal mobile telecommunication device comprises determining whether the transaction is of the predetermined type based on the information received from the remote terminal.
11. A method as recited in claim 10, wherein said determining whether the transaction involves use of a personal mobile telecommunication device comprises determining whether the received information includes a predetermined code.
12. A method as recited in claim 10, wherein the information received from the remote terminal may include a credit card number, and wherein said determining whether the transaction involves use of a personal mobile telecommunication device comprises determining whether the information received from the remote terminal includes a predetermined code in place of a credit card number.
13. A method of a telecommunications carrier facilitating a credit card transaction between a consumer using a wireless communication device and a provider of a product or service, the method comprising:
providing telecommunications services to users of a plurality of wireless communications devices on a wireless communications network, including storing user account information for each of the plurality of users, the plurality of users including said consumer;
storing personal information of the consumer in a database within a trusted domain, the trusted domain excluding the consumer and the provider, the personal information including a credit card number of a credit card issued to the consumer;
receiving information for requesting the transaction from a remote entity, the information for requesting the transaction including a unique identifier of the wireless communication device, an amount of the transaction, and a provider identifier;
storing the information for requesting the transaction;
identifying the wireless communication device and an associated user account based on the unique identifier;
verifying that the wireless communication device is in the same geographic area as the provider;
sending information on the transaction to the wireless communication device via a wireless network;
receiving a signal from the wireless communication device indicating acceptance of the transaction by the consumer;
receiving a personal identification code from the wireless communication device via the wireless communications network;
using the received personal identification code and the stored personal information on the consumer to verify the identity of the consumer, and
if the identity of the consumer is verified, sending to a remote entity a transaction request including information on the transaction and the credit card number, for initiation of a transaction approval process, wherein the credit card information of the consumer is not permitted to pass outside the trusted domain;
receiving a signal indicating the transaction has been approved; and
in response to receiving the signal indicating the transaction has been approved,
storing a digital receipt of the transaction, and
sending a signal to the wireless communication device over the wireless communication network to cause the wireless communication device to output a message confirming completion of the transaction.
14. A method as recited in claim 13, wherein the stored personal information of the consumer is not permitted to pass outside the trusted domain at any time during performance of said method.
15. A method of facilitating a credit card transaction between a consumer and a provider of a product or service, the method comprising:
providing a computer-implemented portal, through which the consumer can remotely access a commerce application;
storing personal information of the consumer in a database within a trusted domain, the trusted domain excluding the consumer and the provider, the personal information including a credit card number of a credit card issued to the consumer;
receiving, from a remote entity within the trusted domain, information for requesting the transaction, including an amount of the transaction and a provider identifier;
storing the information for requesting the transaction;
generating a session identifier corresponding to the transaction in response to receiving the information for requesting the transaction;
associating the session identifier with the stored information for requesting the transaction;
sending the session identifier to a remote entity, for subsequent communication to the consumer;
receiving a confidential personal identification code and a user-input session identifier from a wireless communication device via a wireless communications network;
using the received personal identification code, the user-input session identifier, and the stored personal information of the consumer to attempt to validate the transaction, including
using the personal identification code and the stored personal information to verify the identity of the consumer, and
using the user-input session identifier to look up the stored information for requesting the transaction and to associate the consumer with the transaction;
if the transaction is successfully validated, then sending information on the transaction to the wireless communication device over the wireless network, to cause the wireless communication device to output a prompt to accept or decline the transaction;
receiving a signal from the wireless communication device indicating acceptance of the transaction;
in response to receiving the signal indicating acceptance of the transaction, sending to the remote entity a transaction request including information on the transaction and the credit card number, for initiation of a transaction approval process by a clearing network, without sending the credit card information outside the trusted domain;
receiving a signal indicating the transaction has been approved by the clearing network; and
in response to receiving the signal indicating the transaction has been approved by the clearing network,
storing a digital receipt of the transaction in association with the identity of the consumer; and
sending a signal to the wireless communication device over the wireless communication network to cause the wireless communication device to output a message confirming completion of the transaction.
16. A method as recited in claim 15, wherein the credit card number is not permitted to pass outside the trusted domain at any time during the transaction.
17. A method as recited in claim 15, wherein said receiving information for requesting the transaction comprises receiving the information for requesting the transaction via a secure channel.
18. A method as recited in claim 15, wherein the stored digital receipt is remotely accessible to the consumer.
19. A method as recited in claim 18, wherein the stored digital receipt is remotely accessible to the consumer via said portal.
20. A processing system to facilitate credit card transaction between a plurality of consumers using wireless communication devices and a plurality of providers of products or services, the processing system comprising:
a database of personal information of the consumers, including, for each of the consumers, a credit card number of a credit card issued to said consumer;
a processor; and
a memory containing instructions for execution by the processor to control the processing system to receive information for requesting a transaction from a remote entity;
send information on the transaction to one of the wireless communication devices;
receive a signal from the wireless communication device indicating acceptance of the transaction;
receive a personal identification code from the wireless communication device;
use the received personal identification code and the stored personal information on the consumer to verify the identity of the consumer,
verifying that the wireless communication device is in the same geographic area as the provider;
in response to verifying the identity of the consumer and verifying that the wireless communication device is in geographic proximity to the provider, send to a remote entity a transaction request including information on the transaction and the credit card number, for initiation of a transaction approval process.
21. A processing system as recited in claim 20, wherein the database of personal information of the consumers is stored within a trusted domain, the trusted domain excluding the consumer and the provider.
22. A processing system as recited in claim 21, wherein the stored personal information of the consumer is not permitted to pass outside the trusted domain at any time during performance of said method.
23. A processing system as recited in claim 20, wherein the processing system is operated by a telecommunications carrier providing wireless communications services to the plurality of consumers.
24. A processing system as recited in claim 20, wherein the processing system is further configured to provide a computer-implemented portal, through which the consumer can remotely access a commerce application using the wireless communications device.
25. A processing system as recited in claim 20, wherein the processing system is further configured to:
receive a signal indicating the transaction has been approved; and
in response to receiving the signal indicating the transaction has been approved,
store a digital receipt of the transaction, and
send a signal to the wireless communication device to cause the wireless communication device to output a message confirming completion of the transaction.
26. A method for implementing financial transactions, the method comprising:
receiving, from a plurality of merchants, first data packets containing transaction information that includes consumer telephone numbers at a commerce platform that comprises at least one computer system;
transmitting, over a packet-based wireless network and to a carrier provider gateway, second data packets destined for wireless devices indicated by the consumer telephone numbers from the commerce platform, the second data packets containing information for prompting consumers to confirm transaction details corresponding to the received transaction information;
receiving, over the packet-based wireless network, third data packets originating from the wireless devices at the commerce platform, the third data packets containing a confirmation of the transaction details that is responsive to the prompting;
for, and in response to, the confirmed transaction details, accessing consumer profile data to obtain consumer account information at the commerce platform; and
transmitting from the commerce platform to a clearing network, using packet-based data, the obtained consumer account information and the confirmed transaction details to complete the financial transactions.
27. A computer system having one or more processors and memory for storing one or more programs, wherein the one or more programs, when executed by the one or more processors, cause the computer system to:
receive, from a plurality of merchants, first data packets containing transaction information that includes consumer telephone numbers at the computer system;
transmit, over a packet-based wireless network and to a carrier provider gateway, second data packets destined for wireless devices indicated by the consumer telephone numbers from the computer system, the second data packets containing information for prompting consumers to confirm transaction details corresponding to the received transaction information;
receive, over the packet-based wireless network, third data packets originating from the wireless devices at the computer system, the third data packets containing a confirmation of the transaction details that is responsive to the prompting;
for, and in response to, the confirmed transaction details, accessing consumer profile data to obtain consumer account information at the computer system; and
transmitting from the computer system to a clearing network, using packet-based data, the obtained consumer account information and the confirmed transaction details to complete the financial transactions.
28. A method comprising:
at a computer system having one or more processors and memory:
receiving, from a plurality of merchants, transaction data for a plurality of transactions, the transaction data including consumer identification;
identifying the plurality of transactions as different transaction types based on information included in the transaction data, wherein the different transaction types include at least a credit card transaction type and a wireless carrier transaction type;
sending, using a packet-based data communication, the received transaction data for transactions identified as the wireless carrier transaction type to a wireless carrier;
receiving, using the packet-based data communication, credit card information for consumers associated with the consumer identification from the wireless carrier; and
forwarding, using packet-based data, the credit card information and the transaction data to a clearing network.
29. A computer system having one or more processors and memory for storing one or more programs, wherein the one or more programs, when executed by the one or more processors, cause the computer system to:
receive, from a plurality of merchants, transaction data for a plurality of transactions, the transaction data including consumer identification;
identify the plurality of transactions as different transaction types based on information included in the transaction data, wherein the different transaction types include at least a credit card transaction type and a wireless carrier transaction type;
send, using a packet-based data communication, the received transaction data for transactions identified as the wireless carrier transaction type to a wireless carrier, the transaction data including consumer identification;
receive, using the packet-based data communication, credit card information for consumers associated with the consumer identification from the wireless carrier; and
forward, using packet-based data, the credit card information and the transaction data to a clearing network.
30. The method of claim 26, wherein the first data packets are transmitted from the plurality of merchants through one or more computer systems, each computer system associated with a respective financial institution, to the commerce platform.
31. The computer system of claim 27, wherein the first data packets are transmitted from the plurality of merchants through one or more computer systems, each computer system associated with a respective financial institution, to the computer system.
32. The method of claim 28, wherein the first data packets are transmitted from the plurality of merchants through one or more computer systems, each computer system associated with a respective financial institution, to the computer system.
33. The computer system of claim 29, wherein the first data packets are transmitted from the plurality of merchants through one or more computer systems, each computer system associated with a respective financial institution, to the computer system.
US12/614,264 2000-10-06 2009-11-06 Method and apparatus for performing a credit based transaction between a user of a wireless communications device and a provider of a product or service Expired - Lifetime USRE44513E1 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
US12/614,264 USRE44513E1 (en) 2000-10-06 2009-11-06 Method and apparatus for performing a credit based transaction between a user of a wireless communications device and a provider of a product or service

Applications Claiming Priority (3)

Application Number Priority Date Filing Date Title
US23876000P 2000-10-06 2000-10-06
US09/759,627 US7292996B2 (en) 2000-10-06 2001-01-12 Method and apparatus for performing a credit based transaction between a user of a wireless communications device and a provider of a product or service
US12/614,264 USRE44513E1 (en) 2000-10-06 2009-11-06 Method and apparatus for performing a credit based transaction between a user of a wireless communications device and a provider of a product or service

Related Parent Applications (1)

Application Number Title Priority Date Filing Date
US09/759,627 Reissue US7292996B2 (en) 2000-10-06 2001-01-12 Method and apparatus for performing a credit based transaction between a user of a wireless communications device and a provider of a product or service

Publications (1)

Publication Number Publication Date
USRE44513E1 true USRE44513E1 (en) 2013-10-01

Family

ID=26931923

Family Applications (2)

Application Number Title Priority Date Filing Date
US09/759,627 Expired - Lifetime US7292996B2 (en) 2000-10-06 2001-01-12 Method and apparatus for performing a credit based transaction between a user of a wireless communications device and a provider of a product or service
US12/614,264 Expired - Lifetime USRE44513E1 (en) 2000-10-06 2009-11-06 Method and apparatus for performing a credit based transaction between a user of a wireless communications device and a provider of a product or service

Family Applications Before (1)

Application Number Title Priority Date Filing Date
US09/759,627 Expired - Lifetime US7292996B2 (en) 2000-10-06 2001-01-12 Method and apparatus for performing a credit based transaction between a user of a wireless communications device and a provider of a product or service

Country Status (4)

Country Link
US (2) US7292996B2 (en)
EP (1) EP1407431A2 (en)
AU (1) AU2001291261A1 (en)
WO (1) WO2002029739A2 (en)

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20120179528A1 (en) * 2000-10-06 2012-07-12 Ortiz Luis M Third-party provider method and system
WO2015057538A1 (en) * 2013-10-14 2015-04-23 Equifax Inc. Providing identification information to mobile commerce applications
WO2016004354A1 (en) * 2014-07-02 2016-01-07 Freeman Michael H Receiving, sending and managing electronic approvals and receipts invention
US10863359B2 (en) 2017-06-29 2020-12-08 Equifax Inc. Third-party authorization support for interactive computing environment functions
US11449630B2 (en) 2017-12-14 2022-09-20 Equifax Inc. Embedded third-party application programming interface to prevent transmission of sensitive data
US11463450B2 (en) 2017-04-13 2022-10-04 Equifax Inc. Location-based detection of unauthorized use of interactive computing environment functions
US11574299B2 (en) 2013-10-14 2023-02-07 Equifax Inc. Providing identification information during an interaction with an interactive computing environment

Families Citing this family (170)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7889052B2 (en) 2001-07-10 2011-02-15 Xatra Fund Mx, Llc Authorizing payment subsequent to RF transactions
CA2412184C (en) * 2000-07-10 2015-04-07 Paypal, Inc. System and method for verifying a financial instrument
US20020087478A1 (en) * 2001-01-03 2002-07-04 Hudd Neil P. Wireless financial transactions
US20020091633A1 (en) * 2001-01-10 2002-07-11 Integrated Data Communications Facility and method for cellular data communication between merchants and credit processing agencies
CA2439144A1 (en) * 2001-02-23 2002-09-06 United States Postal Service Systems and methods for dispensing postage stamps
US7587196B2 (en) * 2001-03-29 2009-09-08 Telefonaktiebolaget Lm Ericsson (Publ) Wireless point of sale transaction
US20020143634A1 (en) * 2001-03-30 2002-10-03 Kumar K. Anand Wireless payment system
US7725427B2 (en) 2001-05-25 2010-05-25 Fred Bishop Recurrent billing maintenance with radio frequency payment devices
US7705732B2 (en) 2001-07-10 2010-04-27 Fred Bishop Authenticating an RF transaction using a transaction counter
US8284025B2 (en) 2001-07-10 2012-10-09 Xatra Fund Mx, Llc Method and system for auditory recognition biometrics on a FOB
US8548927B2 (en) 2001-07-10 2013-10-01 Xatra Fund Mx, Llc Biometric registration for facilitating an RF transaction
US9454752B2 (en) 2001-07-10 2016-09-27 Chartoleaux Kg Limited Liability Company Reload protocol at a transaction processing entity
US9031880B2 (en) * 2001-07-10 2015-05-12 Iii Holdings 1, Llc Systems and methods for non-traditional payment using biometric data
US7668750B2 (en) 2001-07-10 2010-02-23 David S Bonalle Securing RF transactions using a transactions counter
US20040236699A1 (en) 2001-07-10 2004-11-25 American Express Travel Related Services Company, Inc. Method and system for hand geometry recognition biometrics on a fob
US7543738B1 (en) * 2001-07-10 2009-06-09 American Express Travel Related Services Company, Inc. System and method for secure transactions manageable by a transaction account provider
US9024719B1 (en) 2001-07-10 2015-05-05 Xatra Fund Mx, Llc RF transaction system and method for storing user personal data
US7735725B1 (en) 2001-07-10 2010-06-15 Fred Bishop Processing an RF transaction using a routing number
US8001054B1 (en) 2001-07-10 2011-08-16 American Express Travel Related Services Company, Inc. System and method for generating an unpredictable number using a seeded algorithm
US7054430B2 (en) 2001-08-23 2006-05-30 Paymentone Corporation Method and apparatus to validate a subscriber line
US7865446B2 (en) * 2001-12-11 2011-01-04 International Businesss Machines Corporation Method for secure electronic commercial transaction on-line processing
US6755342B1 (en) * 2001-12-31 2004-06-29 Bellsouth Intellectual Property Corporation Credit card validation for an interactive wireless network
DE10208637A1 (en) * 2002-02-28 2003-10-02 Ali Hassan Al-Khaja Process for processing transactions using wireless devices
US20030212601A1 (en) * 2002-05-09 2003-11-13 Ivan Silva Credit card SMS portal transmission system and process
US7822688B2 (en) * 2002-08-08 2010-10-26 Fujitsu Limited Wireless wallet
US7349871B2 (en) * 2002-08-08 2008-03-25 Fujitsu Limited Methods for purchasing of goods and services
US20040107170A1 (en) * 2002-08-08 2004-06-03 Fujitsu Limited Apparatuses for purchasing of goods and services
US7784684B2 (en) * 2002-08-08 2010-08-31 Fujitsu Limited Wireless computer wallet for physical point of sale (POS) transactions
US7353382B2 (en) 2002-08-08 2008-04-01 Fujitsu Limited Security framework and protocol for universal pervasive transactions
US7606560B2 (en) * 2002-08-08 2009-10-20 Fujitsu Limited Authentication services using mobile device
US7801826B2 (en) * 2002-08-08 2010-09-21 Fujitsu Limited Framework and system for purchasing of goods and services
US6805287B2 (en) 2002-09-12 2004-10-19 American Express Travel Related Services Company, Inc. System and method for converting a stored value card to a credit card
US7493284B2 (en) * 2002-12-19 2009-02-17 International Business Machines Corporation Using visual images transferred from wireless computing device display screens
ES2262945T3 (en) * 2003-02-21 2006-12-01 Swisscom Mobile Ag PROCEDURE AND SYSTEM TO BLOCK AND UNLOCK A FINANCIAL ACCOUNT ASSOCIATED WITH A SIM CARD.
MXPA05012304A (en) * 2003-05-12 2006-07-03 Briza Technologies Inc Credit card sms portal transmission system and process.
FI20030948A0 (en) * 2003-06-26 2003-06-26 Nokia Corp Method and Device Arrangement for Implementing a Prepaid Interface and a Prepaid Terminal and a Cellular Network Terminal Utilizing the Method
US20050071673A1 (en) * 2003-08-25 2005-03-31 Saito William H. Method and system for secure authentication using mobile electronic devices
US20050048951A1 (en) * 2003-08-25 2005-03-03 Saito William H. Method and system for alternative access using mobile electronic devices
WO2005055162A1 (en) * 2003-11-26 2005-06-16 Splat Thief, Incorporated User self-authentication system and method for remote credit card verification
US7877605B2 (en) * 2004-02-06 2011-01-25 Fujitsu Limited Opinion registering application for a universal pervasive transaction framework
US7318550B2 (en) 2004-07-01 2008-01-15 American Express Travel Related Services Company, Inc. Biometric safeguard method for use with a smartcard
US7314164B2 (en) * 2004-07-01 2008-01-01 American Express Travel Related Services Company, Inc. System for biometric security using a smartcard
US7014107B2 (en) * 2004-07-20 2006-03-21 Irek Singer Wireless payment processing system
US7520430B1 (en) * 2004-11-04 2009-04-21 Acumera, Inc. Multiservice merchant gateway
WO2006052815A2 (en) * 2004-11-08 2006-05-18 Duroturf International Inc. Purchase card system and method therefor
EP1849132A4 (en) 2005-01-28 2010-05-19 Cardinalcommerce Corp System and method for conversion between internet and non-internet base transactions
CN101365868B (en) * 2005-03-09 2015-03-04 扎杰克优质发动机股份有限公司 Internal combustion engine and method with improved combustion
US7357310B2 (en) 2005-03-11 2008-04-15 Gerry Calabrese Mobile phone charge card notification and authorization method
US20060233332A1 (en) * 2005-03-24 2006-10-19 Toms Alvin D Credit worthiness rating method
US20060218407A1 (en) * 2005-03-24 2006-09-28 Toms Alvin D Method of confirming the identity of a person
US7533047B2 (en) * 2005-05-03 2009-05-12 International Business Machines Corporation Method and system for securing card payment transactions using a mobile communication device
US9213992B2 (en) * 2005-07-08 2015-12-15 Microsoft Technology Licensing, Llc Secure online transactions using a trusted digital identity
US20070094715A1 (en) * 2005-10-20 2007-04-26 Microsoft Corporation Two-factor authentication using a remote control device
US7647624B2 (en) * 2005-11-30 2010-01-12 Novell, Inc. Techniques for preserving and managing identities in an audit log
US8145914B2 (en) * 2005-12-15 2012-03-27 Microsoft Corporation Client-side CAPTCHA ceremony for user verification
US7600675B2 (en) * 2005-12-28 2009-10-13 Compucredit Intellectual Property Holdings Corp. Ii Method for providing financial instruments to customers of a service provider
US8352323B2 (en) * 2007-11-30 2013-01-08 Blaze Mobile, Inc. Conducting an online payment transaction using an NFC enabled mobile communication device
EP1984889A2 (en) * 2006-02-08 2008-10-29 Imagineer Software, Inc. Secure digital content management using mutating identifiers
US20070244831A1 (en) * 2006-04-18 2007-10-18 Kuo James Shaw-Han System and method for secure online transaction
US8307307B2 (en) * 2006-05-25 2012-11-06 Research In Motion Limited Method for prompting user confirmation
US7734252B2 (en) * 2006-08-17 2010-06-08 Eagle River Holdings Llc System and method for wireless transactions
WO2008072255A2 (en) * 2006-11-05 2008-06-19 Siddharth Narendra Geol An intelligent value added service system
US20080126258A1 (en) * 2006-11-27 2008-05-29 Qualcomm Incorporated Authentication of e-commerce transactions using a wireless telecommunications device
US7637425B2 (en) * 2006-11-28 2009-12-29 Motorola, Inc. Method and system for wireless and credit card transactions
US8566240B2 (en) * 2007-01-16 2013-10-22 E2Interactive, Inc. Systems and methods for the payment of customer bills utilizing payment platform of biller
US7810134B2 (en) * 2007-01-22 2010-10-05 First Data Corporation Authentication system for financial transactions
US20080208762A1 (en) * 2007-02-22 2008-08-28 First Data Corporation Payments using a mobile commerce device
US20080207234A1 (en) 2007-02-22 2008-08-28 First Data Corporation Marketing messages in mobile commerce
US10102518B2 (en) * 2007-02-22 2018-10-16 First Data Corporation Enrollment and registration of a device in a mobile commerce system
US20080208688A1 (en) * 2007-02-22 2008-08-28 First Data Corporation Methods and systems for handling of mobile discount certificates using mobile devices
US8566239B2 (en) 2007-02-22 2013-10-22 First Data Corporation Mobile commerce systems and methods
US20080208743A1 (en) * 2007-02-22 2008-08-28 First Data Corporation Transfer of value between mobile devices in a mobile commerce system
US8548908B2 (en) * 2007-04-11 2013-10-01 First Data Corporation Mobile commerce infrastructure systems and methods
US20080255940A1 (en) * 2007-04-12 2008-10-16 Perreault Bruno D Method and apparatus for reward calculation and disbursement
US7979316B2 (en) * 2007-04-27 2011-07-12 American Express Travel Related Services Company, Inc. System and method for facilitating mobile commerce
WO2008148180A1 (en) * 2007-06-04 2008-12-11 Bce Inc. Methods and systems for validating online transactions using location information
US8768778B2 (en) 2007-06-29 2014-07-01 Boku, Inc. Effecting an electronic payment
WO2009070860A1 (en) * 2007-12-05 2009-06-11 Bce Inc. Methods and computer-readable media for facilitating forensic investigations of online transactions
US20090172033A1 (en) * 2007-12-28 2009-07-02 Bce Inc. Methods, systems and computer-readable media for facilitating forensic investigations of online activities
US8635132B1 (en) * 2008-04-14 2014-01-21 United Services Automobile Associatiion (USAA) Self-service real-time financial advice
US20090281943A1 (en) * 2008-05-07 2009-11-12 Yoggerst A John Systems and Methods for Collecting Bonds and Fines for Warrants and Traffic Tickets
GB0809383D0 (en) 2008-05-23 2008-07-02 Vidicom Ltd Customer to supplier funds transfer
GB0809381D0 (en) * 2008-05-23 2008-07-02 Vidicom Ltd Funds transfer electronically
US20090307141A1 (en) * 2008-06-06 2009-12-10 Telefonaktiebolaget Lm Ericsson (Publ) Secure Card Services
US8478692B2 (en) 2008-06-26 2013-07-02 Visa International Service Association Systems and methods for geographic location notifications of payment transactions
US9542687B2 (en) 2008-06-26 2017-01-10 Visa International Service Association Systems and methods for visual representation of offers
CN101625779A (en) * 2008-07-11 2010-01-13 深圳富泰宏精密工业有限公司 Mobile terminal and credit card consumption method through same
TWI503767B (en) * 2008-08-01 2015-10-11 Chiun Mai Comm Systems Inc Mobile device and method for using credit card for payment
US8396455B2 (en) 2008-09-25 2013-03-12 Visa International Service Association Systems and methods for sorting alert and offer messages on a mobile device
US20100131347A1 (en) * 2008-11-24 2010-05-27 Research In Motion Limited Electronic payment system using mobile wireless communications device and associated methods
US9652761B2 (en) 2009-01-23 2017-05-16 Boku, Inc. Systems and methods to facilitate electronic payments
US8041639B2 (en) * 2009-01-23 2011-10-18 Vidicom Limited Systems and methods to facilitate online transactions
US8548426B2 (en) * 2009-02-20 2013-10-01 Boku, Inc. Systems and methods to approve electronic payments
US9990623B2 (en) 2009-03-02 2018-06-05 Boku, Inc. Systems and methods to provide information
US8700530B2 (en) 2009-03-10 2014-04-15 Boku, Inc. Systems and methods to process user initiated transactions
US8224727B2 (en) 2009-05-27 2012-07-17 Boku, Inc. Systems and methods to process transactions based on social networking
US8160943B2 (en) * 2009-03-27 2012-04-17 Boku, Inc. Systems and methods to process transactions based on social networking
US8131258B2 (en) * 2009-04-20 2012-03-06 Boku, Inc. Systems and methods to process transaction requests
US9715681B2 (en) 2009-04-28 2017-07-25 Visa International Service Association Verification of portable consumer devices
US8534564B2 (en) 2009-05-15 2013-09-17 Ayman Hammad Integration of verification tokens with mobile communication devices
US8602293B2 (en) 2009-05-15 2013-12-10 Visa International Service Association Integration of verification tokens with portable computing devices
US9038886B2 (en) 2009-05-15 2015-05-26 Visa International Service Association Verification of portable consumer devices
US8893967B2 (en) * 2009-05-15 2014-11-25 Visa International Service Association Secure Communication of payment information to merchants using a verification token
US9105027B2 (en) 2009-05-15 2015-08-11 Visa International Service Association Verification of portable consumer device for secure services
US10846683B2 (en) 2009-05-15 2020-11-24 Visa International Service Association Integration of verification tokens with mobile communication devices
US9595028B2 (en) 2009-06-08 2017-03-14 Boku, Inc. Systems and methods to add funds to an account via a mobile communication device
US9697510B2 (en) * 2009-07-23 2017-07-04 Boku, Inc. Systems and methods to facilitate retail transactions
US9519892B2 (en) 2009-08-04 2016-12-13 Boku, Inc. Systems and methods to accelerate transactions
US20110047075A1 (en) * 2009-08-19 2011-02-24 Mastercard International Incorporated Location controls on payment card transactions
US8660911B2 (en) * 2009-09-23 2014-02-25 Boku, Inc. Systems and methods to facilitate online transactions
US8224709B2 (en) 2009-10-01 2012-07-17 Boku, Inc. Systems and methods for pre-defined purchases on a mobile communication device
GB2475301A (en) * 2009-11-13 2011-05-18 Secure Electrans Ltd Payment Authentication System and Processing Method
CA2684434A1 (en) * 2009-11-16 2010-01-25 Mundip S. Bhinder Seamlessly capturing transactional data at the merchant's point of sale environment and creating electronic receipts, all in real-time
US20110125610A1 (en) * 2009-11-20 2011-05-26 Boku, Inc. Systems and Methods to Automate the Initiation of Transactions via Mobile Devices
US8412626B2 (en) * 2009-12-10 2013-04-02 Boku, Inc. Systems and methods to secure transactions via mobile devices
WO2011084648A2 (en) 2009-12-16 2011-07-14 Giftango Corporation Systems and methods for generating a virtual value item for a promotional campaign
DE102009060946A1 (en) * 2009-12-23 2011-06-30 Doering, Wolfram, 13469 Method for electronic communication of banking orders and communication system for carrying out the method
US8566188B2 (en) 2010-01-13 2013-10-22 Boku, Inc. Systems and methods to route messages to facilitate online transactions
US20110184823A1 (en) * 2010-01-28 2011-07-28 Simon Phillips Incentive program for point-of-sale operators
US8219542B2 (en) * 2010-03-25 2012-07-10 Boku, Inc. Systems and methods to provide access control via mobile phones
US8583504B2 (en) 2010-03-29 2013-11-12 Boku, Inc. Systems and methods to provide offers on mobile devices
US8355987B2 (en) 2010-05-06 2013-01-15 Boku, Inc. Systems and methods to manage information
US10068287B2 (en) 2010-06-11 2018-09-04 David A. Nelsen Systems and methods to manage and control use of a virtual card
US20130185166A1 (en) * 2010-07-20 2013-07-18 Moqom Limited Cardholder mobile device positioning system and method
AU2011289300B2 (en) 2010-08-11 2014-11-13 Boku, Inc. Systems and methods to identify carrier information for transmission of premium messages
US9031869B2 (en) 2010-10-13 2015-05-12 Gift Card Impressions, LLC Method and system for generating a teaser video associated with a personalized gift
US9483786B2 (en) 2011-10-13 2016-11-01 Gift Card Impressions, LLC Gift card ordering system and method
US8699994B2 (en) 2010-12-16 2014-04-15 Boku, Inc. Systems and methods to selectively authenticate via mobile communications
US8412155B2 (en) 2010-12-20 2013-04-02 Boku, Inc. Systems and methods to accelerate transactions based on predictions
TWI588761B (en) 2010-12-28 2017-06-21 li-he Yao Wireless secure transaction payment system and its method
US8583496B2 (en) 2010-12-29 2013-11-12 Boku, Inc. Systems and methods to process payments via account identifiers and phone numbers
US8700524B2 (en) 2011-01-04 2014-04-15 Boku, Inc. Systems and methods to restrict payment transactions
EP2681701A4 (en) 2011-03-04 2014-08-20 Visa Int Service Ass Integration of payment capability into secure elements of computers
US8543087B2 (en) 2011-04-26 2013-09-24 Boku, Inc. Systems and methods to facilitate repeated purchases
US9191217B2 (en) 2011-04-28 2015-11-17 Boku, Inc. Systems and methods to process donations
US9830622B1 (en) 2011-04-28 2017-11-28 Boku, Inc. Systems and methods to process donations
US10949844B2 (en) * 2011-05-09 2021-03-16 Intuit Inc. Processing electronic payment involving mobile communication device
US20120296720A1 (en) * 2011-05-17 2012-11-22 Maritz Holdings Inc. Mobile rewards redemption system and method
US8825512B2 (en) * 2011-08-10 2014-09-02 Verizon Patent And Licensing, Inc. Persistent network-based electronic transaction services
US20130103584A1 (en) * 2011-10-25 2013-04-25 Paymintz, Inc. Payment service that provides option to authenticate with external authentication service
US10417677B2 (en) 2012-01-30 2019-09-17 Gift Card Impressions, LLC Group video generating system
US10282724B2 (en) 2012-03-06 2019-05-07 Visa International Service Association Security system incorporating mobile device
US9576279B2 (en) * 2012-06-05 2017-02-21 Autoscribe Corporation System and method for registering financial accounts
US20150186885A1 (en) * 2012-07-17 2015-07-02 Innoviti Embedded Solutions Pvt. Ltd. Method and a system for facilitating credit based transactions
US20140108247A1 (en) 2012-10-17 2014-04-17 Groupon, Inc. Peer-To-Peer Payment Processing
US10235692B2 (en) 2012-10-17 2019-03-19 Groupon, Inc. Consumer presence based deal offers
US20140229375A1 (en) 2013-02-11 2014-08-14 Groupon, Inc. Consumer device payment token management
US11219288B2 (en) 2013-02-15 2022-01-11 E2Interactive, Inc. Gift card box with slanted tray and slit
US9565911B2 (en) 2013-02-15 2017-02-14 Gift Card Impressions, LLC Gift card presentation devices
US9576286B1 (en) 2013-03-11 2017-02-21 Groupon, Inc. Consumer device based point-of-sale
US9852409B2 (en) 2013-03-11 2017-12-26 Groupon, Inc. Consumer device based point-of-sale
US10482511B1 (en) * 2013-03-12 2019-11-19 Groupon, Inc. Employee profile for customer assignment, analytics and payments
US10217107B2 (en) 2013-05-02 2019-02-26 Gift Card Impressions, LLC Stored value card kiosk system and method
US20140358794A1 (en) * 2013-06-04 2014-12-04 Ncr Corporation Techniques for credit card processing
FR3008518B1 (en) * 2013-07-11 2017-03-24 Compagnie Ind Et Financiere Dingenierie Ingenico Method of realization, terminal and corresponding computer program.
US9928493B2 (en) 2013-09-27 2018-03-27 Groupon, Inc. Systems and methods for providing consumer facing point-of-sale interfaces
FR3017733B1 (en) * 2014-02-14 2017-08-25 Bancontact-Mistercash Nv/Sa SECURE TRANSACTION USING A MOBILE DEVICE
US10262346B2 (en) 2014-04-30 2019-04-16 Gift Card Impressions, Inc. System and method for a merchant onsite personalization gifting platform
US10496988B2 (en) 2014-06-23 2019-12-03 The Toronto-Dominion Bank Systems and methods for authenticating user identities in networked computer systems
US9569776B2 (en) 2014-11-12 2017-02-14 BenedorTSE LLC Secure authorizations using independent communications and different one-time-use encryption keys for each party to a transaction
US9558492B2 (en) 2014-11-12 2017-01-31 Benedoretse Llc Secure authorizations using independent communications and different one-time-use encryption keys for each party to a transaction
US9558493B2 (en) 2014-11-12 2017-01-31 BenedorTSE LLC Secure authorizations using independent communications and different one-time-use encryption keys for each party to a transaction
US10614457B2 (en) 2014-11-12 2020-04-07 BenedorTSE LLC Secure authorizations using independent communications and different one-time-use encryption keys for each party to a transaction
US11620628B2 (en) 2015-06-30 2023-04-04 Mastercard International Incorporated Method and system for fraud control based on geolocation
US10332090B2 (en) 2015-08-27 2019-06-25 Acumera, Inc. Providing secure remote access to a device at a merchant location
FR3041132B1 (en) * 2015-09-11 2021-01-15 Ingenico Group DATA TRANSMISSION PROCESS, CORRESPONDING COMPUTER DEVICES AND PROGRAMS
WO2017089923A1 (en) * 2015-11-26 2017-06-01 Motiveprime Consumer Electronics Pvt Ltd Systems and methods for credit based payment using unique hardware identifier
US20170221067A1 (en) * 2016-01-29 2017-08-03 International Business Machines Corporation Secure electronic transaction
US10954049B2 (en) 2017-12-12 2021-03-23 E2Interactive, Inc. Viscous liquid vessel for gifting
US12020309B2 (en) 2018-05-18 2024-06-25 E2Interactive, Inc. Augmented reality gifting on a mobile device

Citations (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP0532231A2 (en) 1991-09-13 1993-03-17 AT&T Corp. Service provision authentication protocol
US5343529A (en) 1993-09-28 1994-08-30 Milton Goldfine Transaction authentication using a centrally generated transaction identifier
WO1996013814A1 (en) 1994-10-28 1996-05-09 Behruz Vazvan Real time tele-payment system
EP0745961A2 (en) 1995-05-31 1996-12-04 AT&T IPM Corp. Transaction authorization and alert system
US5668876A (en) 1994-06-24 1997-09-16 Telefonaktiebolaget Lm Ericsson User authentication method and apparatus
US5724423A (en) 1995-09-18 1998-03-03 Telefonaktiebolaget Lm Ericsson Method and apparatus for user authentication
WO1999023617A2 (en) 1997-11-04 1999-05-14 Gilles Kremer Method for transmitting data and implementing server
US5915022A (en) * 1996-05-30 1999-06-22 Robinson; Rodney Aaron Method and apparatus for creating and using an encrypted digital receipt for electronic transactions
US5991749A (en) * 1996-09-11 1999-11-23 Morrill, Jr.; Paul H. Wireless telephony for collecting tolls, conducting financial transactions, and authorizing other activities
US6188994B1 (en) * 1995-07-07 2001-02-13 Netcraft Corporation Internet billing method
US6490443B1 (en) 1999-09-02 2002-12-03 Automated Business Companies Communication and proximity authorization systems
US20030065805A1 (en) 2000-06-29 2003-04-03 Barnes Melvin L. System, method, and computer program product for providing location based services and mobile e-commerce
US6609113B1 (en) * 1999-05-03 2003-08-19 The Chase Manhattan Bank Method and system for processing internet payments using the electronic funds transfer network
US6664922B1 (en) 1997-08-28 2003-12-16 At Road, Inc. Method for distributing location-relevant information using a network
US6868391B1 (en) * 1997-04-15 2005-03-15 Telefonaktiebolaget Lm Ericsson (Publ) Tele/datacommunications payment method and apparatus

Patent Citations (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP0532231A2 (en) 1991-09-13 1993-03-17 AT&T Corp. Service provision authentication protocol
US5343529A (en) 1993-09-28 1994-08-30 Milton Goldfine Transaction authentication using a centrally generated transaction identifier
US5668876A (en) 1994-06-24 1997-09-16 Telefonaktiebolaget Lm Ericsson User authentication method and apparatus
WO1996013814A1 (en) 1994-10-28 1996-05-09 Behruz Vazvan Real time tele-payment system
EP0745961A2 (en) 1995-05-31 1996-12-04 AT&T IPM Corp. Transaction authorization and alert system
US6188994B1 (en) * 1995-07-07 2001-02-13 Netcraft Corporation Internet billing method
US5724423A (en) 1995-09-18 1998-03-03 Telefonaktiebolaget Lm Ericsson Method and apparatus for user authentication
US5915022A (en) * 1996-05-30 1999-06-22 Robinson; Rodney Aaron Method and apparatus for creating and using an encrypted digital receipt for electronic transactions
US5991749A (en) * 1996-09-11 1999-11-23 Morrill, Jr.; Paul H. Wireless telephony for collecting tolls, conducting financial transactions, and authorizing other activities
US6868391B1 (en) * 1997-04-15 2005-03-15 Telefonaktiebolaget Lm Ericsson (Publ) Tele/datacommunications payment method and apparatus
US6664922B1 (en) 1997-08-28 2003-12-16 At Road, Inc. Method for distributing location-relevant information using a network
WO1999023617A2 (en) 1997-11-04 1999-05-14 Gilles Kremer Method for transmitting data and implementing server
US6609113B1 (en) * 1999-05-03 2003-08-19 The Chase Manhattan Bank Method and system for processing internet payments using the electronic funds transfer network
US6490443B1 (en) 1999-09-02 2002-12-03 Automated Business Companies Communication and proximity authorization systems
US20030065805A1 (en) 2000-06-29 2003-04-03 Barnes Melvin L. System, method, and computer program product for providing location based services and mobile e-commerce

Non-Patent Citations (11)

* Cited by examiner, † Cited by third party
Title
"Aether Systems and MICROS Form Alliance To Develop Wireless Technology Applications for the Hospitality Industry", Owings Mills, MD and Columbia, MD, Jul. 27, 2000, 2 pgs.
Ameritech Unplugs the Original Baby Bell Cobrand Card. Credit Card News. Chicago, May 1, 1998. (3 pages).
Drysdale, Ian, "Electronic Payments Forum, " Meeting of the Electronic Payments Forum, New http://www.epf.net/PrevMtngs/Sep00/Sep00Meeting.html, 24 pgs.
Drysdale, Ian, "New Way to Pay", Dec. 25, 2000, Interactive Week, http://zdnet.com/intweek/stories/news/0,4164,2668862,00.html, 5 pgs.
Fabozzi, Frank J., ed. Handbook of Structured Financial Products. 1998. John Wiley & Sons, Inc. (4 pages).
Goldman, Jacob M., "E-Commerce Goes Mobile", Oct. 2000, downloaded from http://epf.net/PrevMtngs/Sep00/Sep00Meeting.html, 28 pgs.
Lucas, Peter, Why Some Want to Spank the Baby Bells. Credit Card Management. New York, Apr. 1992. vol. 5, Iss. 1., p. 70. (6 pages).
Muller, Nancy, American Express Introduces New Corporate Service with MCI. PR Newswire, Nov. 19, 1992, 3pgs.
US West Hopes to Ring Up New Business with a Cobranded Card. Credit Card News. Chicago, May 1, 1993. Iss. 26. (2 pgs.).
Wankmueller, John, "MasterCard Mobile Commerce, WAP and Other Standards,"Meeting of Electronic Payments Forum, New York, NY, Sep. 13, 2000, downloaded from http://www.epf.net/PrevMtngs/Sep00/Sep00Meeting.html, 29 pgs.
Young, Alan, "e-Citi Wireless Financial Services", Meeting of the Electronic Payments Forum, New York, NY, Sep. 13, 2000, downloaded from http://www.epf.net/PrevMtngs/Sep00/Sep00Meeting.html, 32 pgs.

Cited By (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9747608B2 (en) * 2000-10-06 2017-08-29 Rateze Remote Mgmt Llc Third-party provider method and system
US20180047034A1 (en) * 2000-10-06 2018-02-15 Rateze Remote Mgmt. L.L.C. Third-party provider method and system
US20120179528A1 (en) * 2000-10-06 2012-07-12 Ortiz Luis M Third-party provider method and system
US10783529B2 (en) * 2000-10-06 2020-09-22 Rateze Remote Mgmt Llc Third-party provider method and system
US11443316B2 (en) 2013-10-14 2022-09-13 Equifax Inc. Providing identification information to mobile commerce applications
WO2015057538A1 (en) * 2013-10-14 2015-04-23 Equifax Inc. Providing identification information to mobile commerce applications
US11574299B2 (en) 2013-10-14 2023-02-07 Equifax Inc. Providing identification information during an interaction with an interactive computing environment
US10115102B2 (en) 2013-10-14 2018-10-30 Equifax Inc. Providing identification information to mobile commerce applications
US10332214B2 (en) 2014-07-02 2019-06-25 Michael H. Freeman Receiving, sending and managing electronic approvals and receipt invention
US11145003B2 (en) 2014-07-02 2021-10-12 Michael H. Freeman Receiving, sending and managing electronic approvals and receipts invention
WO2016004354A1 (en) * 2014-07-02 2016-01-07 Freeman Michael H Receiving, sending and managing electronic approvals and receipts invention
US11463450B2 (en) 2017-04-13 2022-10-04 Equifax Inc. Location-based detection of unauthorized use of interactive computing environment functions
US10863359B2 (en) 2017-06-29 2020-12-08 Equifax Inc. Third-party authorization support for interactive computing environment functions
US11449630B2 (en) 2017-12-14 2022-09-20 Equifax Inc. Embedded third-party application programming interface to prevent transmission of sensitive data

Also Published As

Publication number Publication date
WO2002029739A3 (en) 2004-01-08
US7292996B2 (en) 2007-11-06
AU2001291261A1 (en) 2002-04-15
WO2002029739A2 (en) 2002-04-11
US20020107791A1 (en) 2002-08-08
EP1407431A2 (en) 2004-04-14

Similar Documents

Publication Publication Date Title
USRE44513E1 (en) Method and apparatus for performing a credit based transaction between a user of a wireless communications device and a provider of a product or service
US10796313B2 (en) Method and system for facilitating online payments based on an established payment agreement
US7571141B2 (en) Method and system for facilitating payment transactions using access devices
US8229855B2 (en) Method and system for facilitating payment transactions using access devices
US9530125B2 (en) Method and system for secure mobile payment transactions
JP5638046B2 (en) Method and system for authorizing purchases made on a computer network
US8116734B2 (en) Party identification in a wireless network
US7366703B2 (en) Smartcard internet authorization system
US20170011400A1 (en) Friendly Funding Source
US20030154139A1 (en) Secure m-commerce transactions through legacy POS systems
KR20100123895A (en) Ghosting payment account data in a mobile telephone payment transation system

Legal Events

Date Code Title Description
AS Assignment

Owner name: UNWIRED PLANET, INC., CALIFORNIA

Free format text: MERGER;ASSIGNOR:OPENWAVE SYSTEMS INC.;REEL/FRAME:028447/0940

Effective date: 20120427

AS Assignment

Owner name: UNWIRED PLANET, LLC, NEVADA

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:UNWIRED PLANET IP MANAGER, LLC;REEL/FRAME:031030/0115

Effective date: 20130213

Owner name: UNWIRED PLANET IP MANAGER, LLC, NEVADA

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:UNWIRED PLANET, INC.;REEL/FRAME:031030/0081

Effective date: 20130213

FEPP Fee payment procedure

Free format text: PAYOR NUMBER ASSIGNED (ORIGINAL EVENT CODE: ASPN); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY

CC Certificate of correction
CC Certificate of correction
FPAY Fee payment

Year of fee payment: 8

FEPP Fee payment procedure

Free format text: MAINTENANCE FEE REMINDER MAILED (ORIGINAL EVENT CODE: REM.); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY

FEPP Fee payment procedure

Free format text: 11.5 YR SURCHARGE- LATE PMT W/IN 6 MO, LARGE ENTITY (ORIGINAL EVENT CODE: M1556); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY

MAFP Maintenance fee payment

Free format text: PAYMENT OF MAINTENANCE FEE, 12TH YEAR, LARGE ENTITY (ORIGINAL EVENT CODE: M1553); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY

Year of fee payment: 12