WO2001065397A1 - Procede et systeme servant a passer une commande au moyen d'une carte de credit - Google Patents
Procede et systeme servant a passer une commande au moyen d'une carte de credit Download PDFInfo
- Publication number
- WO2001065397A1 WO2001065397A1 PCT/US2000/005248 US0005248W WO0165397A1 WO 2001065397 A1 WO2001065397 A1 WO 2001065397A1 US 0005248 W US0005248 W US 0005248W WO 0165397 A1 WO0165397 A1 WO 0165397A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- credit card
- encrypted
- data element
- merchant
- buyer
- Prior art date
Links
Classifications
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07F—COIN-FREED OR LIKE APPARATUS
- G07F7/00—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus
- G07F7/08—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/02—Payment architectures, schemes or protocols involving a neutral party, e.g. certification authority, notary or trusted third party [TTP]
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/04—Payment circuits
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/385—Payment protocols; Details thereof using an alias or single-use codes
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q30/00—Commerce
- G06Q30/06—Buying, selling or leasing transactions
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07F—COIN-FREED OR LIKE APPARATUS
- G07F7/00—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus
- G07F7/08—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means
- G07F7/12—Card verification
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07F—COIN-FREED OR LIKE APPARATUS
- G07F7/00—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus
- G07F7/08—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means
- G07F7/12—Card verification
- G07F7/122—Online card verification
Definitions
- the present invention relates to improving security of placing purchase orders over a publicly accessible communications network, especially the Internet.
- the Internet is a network designed to be open and accessible by everyone and has developed as a seemingly ideal medium for all kinds of financial transactions. Ubiquitous access makes it very attractive for consumer-to-business and business-to-business, both domestic and international, transactions. There are many benefits to shopping online, from access to products that might not otherwise be available in the local area to search engines that will find the lowest price for specific items. But the very same accessibility opens up opportunities for unauthorized card uses on the Internet.
- Credit card fraud can generally be classified into two categories. The first one has to do with someone obtaining valid credit card details and using them to purchase goods or services without being authorized by the rightful cardholder. The second category includes fraudulent activity by the rightful cardholder, who first obtains goods or services using his card only to later dispute the charge. Both fraud categories add a significant burden on the online merchant, because all Internet transactions are performed without the merchant having physical access to the customer's card. If the merchant cannot prove that he was properly authorized to charge the card by presenting a card imprint (or magnetic stripe information obtained by physically swiping the card) and a signature, he is most likely in a position where he has to accept a "charge -back", i.e. the bank debiting the merchant's account for the amount in question plus an additional charge-back fee. The merchant not only forgoes the sale, but he may also be left with no merchandise, if he shipped the order already.
- charge -back i.e. the bank debiting the merchant's account for the amount
- Legislation recently passed allows for export of 128-bit software, so that most e-commerce sites will now be accessed using strong 128-bit encryption.
- This secure access provides a channel between the consumer's computer and the merchant's server.
- the information is sent in encrypted format, and therefore the risk of someone obtaining the information and decrypting it is extremely small. So small, that many experts think it is safer to sent your credit card over SSL than to give it to the waiter in the restaurant in the real world. While many merchants understand the worry of consumers about sending credit card details over the Internet, most of them do not address it in the right way. Instead of explaining the security of SSL, they often provide an option to store the credit card information once and assign a username/password to the customer, so that the customer never has to enter his card information again.
- Some merchants may provide this service primarily to establish a relationship with the consumer. Additionally, there is only a limited number of usernames/passwords available: While early adopters may be able to register identical usernames at multiple sites, most consumers will have to remember many different usernames and associate them with the right merchant.
- credit card information Once credit card information has been transmitted to the merchant's server, it is used to authorize the purchase. After receiving the authorization/denial code, the information could be filed off-line for records keeping purposes only. Most of times, however, the information is stored online (encrypted or un-encrypted) to be available for the consumer's next purchase.
- This practice leads to another source of fraud: hacking into the merchant's server and obtaining credit card information together with other valuable data, i.e., name and address.
- Merchants may claim to take precautions to protect credit card data from being stolen from their servers. But since merchants themselves retrieve card information from their servers every time the customer makes a purchase, it is very possible to obtain that card data. Another way of getting valid credit card information is to generate it.
- Cards are not completely random. In fact, many of the digits are determined by card type, card issuing bank, and country of issuance. This allows hackers to pre-set certain card number digits and to generate the remaining digits using software available on the Internet. This method, however, rarely works, as many of the generated card numbers are not active.
- the present invention provides a method and system for placing a purchase order by using a credit or debit card in such way that potential financial losses arising out of unauthorized use of credit/debit cards are reduced.
- a card verifying authority allows potential buyers to become users of the invention. Credit card holders register their credit/debit cards by providing essential information required for a complete purchase order, including but not limited to card number, expiration date, shipping address, preferred shipping method, telephone contact information.
- the verifying authority does not store the credit card number, but only a fingerprint thereof obtained by performing a one-way encryption function.
- Registration links are established among the user, merchants, an acquiring bank, a card issuer, and the card verifying authority.
- the acquiring bank can also be the card issuer.
- the relationships among these entities are similar to those supporting credit card purchases via conventional telephone ordering.
- the invention affords protection to the user, in connection with commercial transactions over, e.g., the Internet, through three aspects of the invention which are considered novel relative to conventional purchasing procedures for consumer goods.
- the card verifying authority provides a first form of protection, in that merchants are not required to store any buyer information on their systems.
- the user transmits his credit card number to the merchant at the time of purchase, the merchant submits the credit card information to the card verifying authority and obtains further information required to complete the purchase order (e.g., shipping address) from the card verifying authority.
- the card verifying authority does not need to have access to the unencrypted credit card information at any time and therefore affords to store only a footprint or image of the credit card information after applying a one-way encryption function (such as MD-5 which is generally available).
- the merchant may submit either the unencrypted card number or the encrypted footprint or image to the card verifying authority in order to obtain further purchase order information.
- the card verifying authority may apply this method of data identification not only for credit card numbers, but also for other information (e.g., pass phrase). Moreover, in one embodiment there is no need to store unencrypted information anywhere.
- a second form of protection which may be an alternative to or additive with the first form of protection
- the details provided by the card verifying authority are considered unchangeable without additional verification efforts. Even if a credit card is stolen and used by a buyer who is not a registered user, for purchasing goods, the shipping information could not be easily changed, and goods would be delivered to the rightful card owner's address where they could be easily traced.
- the user can register his preferred computer system for shopping with the card verifying authority and indicate a pass phrase for credit card transactions initiated from a different computer system (e.g., public computer terminal at airports). If a particular use of a credit card is not originating from a preferred computer system, which the merchant can determine by checking with the card verifying authority, then the card user will be required to enter an additional pass phrase to confirm his identity. Again, the pass phrase entered will be verified by the card verifying authority with the pass phrase on record.
- a different computer system e.g., public computer terminal at airports
- a key feature of the invention is the unique association of encrypted information with unencrypted information pertaining to the proper user of a valid credit card or similar financial instrument.
- the encrypted information is utilized as much as possible where otherwise sensitive information would be stored or transmitted. Even if a stranger obtains a part of this combination of information, it is insufficient for the stranger to complete many of the most common forms of fraudulent transactions.
- the invention is a method for a buyer to make a purchase from a merchant using a valid credit card issued to the buyer. Before making a purchase, the buyer transmits the valid credit card number and at least one other personal information data element to a verifying authority.
- the verifying authority registers the valid card number as an encrypted output number of a one-way encryption function and associates the additional data element with the encrypted number, and stores the encrypted number and associated data element in a database with encrypted numbers and associated data elements of other registrants.
- the buyer initiates a purchase order by providing a credit card number and a personal information data element to the merchant.
- the merchant transmits the credit card number and data element received from the buyer, to the verifying authority.
- the verifying authority encrypts the credit card number received from the merchant, confirms whether the encrypted number and data element from the merchant matches an encrypted number and associated data element in the database, and informs the merchant of whether a match was made, thereby verifying that the buyer is authorized to use the valid credit card number. Equivalently, the merchant could receive the credit card number as encrypted by the user, and transmit the encrypted number to the verifying authority.
- the invention is a system wherein a merchant verifies that a buyer is authorized to make a credit card purchase of goods or services by transmitting a credit card number and another data element received from the buyer at the time of purchase to a verifying authority over a digital communications network.
- the verifying authority includes a database of a multiplicity of sets of associated data, each set comprising a valid credit card number in encrypted form and at least another data element. The multiplicity of sets have been registered with the verifying authority by a respective multiplicity of potential buyers.
- Computer hardware and software define means for comparing a credit card number or encrypted credit card number and another data element transmitted by the merchant in the course of a credit card transaction with a buyer, against the registered encrypted numbers and associated data elements, and means for informing the merchant whether a match was made, thereby verifying that the buyer is authorized to use the valid credit card number.
- the present invention is particularly well suited for incorporation into the type of credit card transaction verification system and method as are described in International Application PCT/US99/20693, entitled “Detection of Unauthorized Use of Payment Instruments Over Commercial Network Systems", the disclosure of which is hereby incorporated by reference.
- the present invention can be implemented using similar system and application programming and communications software and hardware.
- Fig. 1 is an overview of the minimum components of the inventive system
- Fig. 2 shows how the card holder can register his card by having the card information encrypted by the verifying authority
- Fig. 3 shows what information is preferably encrypted
- Fig. 4 shows an alternative embodiment whereby the card holder can register his card information by applying the encryption function before sensitive information is transmitted to the verifying authority;
- Fig. 5 shows a simple purchase authorization process in another embodiment whereby sensitive information is encrypted by the purchaser before transmission to the merchant.
- a verifying authority 100 is accessible to a large pool of buyers 200 who desire to make purchases from a large pool of merchants 300, via a public or private communications network 400, preferably a global communications network such as the Internet.
- Such purchase transactions according to the invention require communications between a particular buyer from among the pool of buyers 200 and the authority 100; between the particular buyer and a particular merchant; and between the particular merchant and the authority 100.
- the particular means of communication need not be the same (e.g., one may be on a public network and another on a private network).
- the remainder of this description will focus on the invention as implemented between a particular buyer 200 and a particular merchant 300, but it should be appreciated that when the system is fully operational, it includes one authority 100 and a multiplicity of buyers and merchants.
- the authority can be an independent entity which handles one or more types of credit cards, or an agency affiliated with one card issuer or an acquiring bank.
- Figure 2 shows the simplest form of the invention, whereby a particular one of the potential buyers 200 who possesses a valid credit card is deemed a user of the invention 500 who first registers the card with the verifying authority 100 via the network 400.
- the credit card number and at least one additional personal information element of data are transmitted to the authority 100, where at least the credit card number is subjected to an encryption function 510.
- an encryption function 510 typically, the name, expiration date, and mailing address are not encrypted.
- the information as received by the authority is confirmed to the user via logic 520. Also, the user can at a later time change the registration, via logic 520.
- the information associated with the user (after encryption) is stored in a database 110, 530 at the authority 100.
- the original form of the encrypted information is not stored in the database.
- the user initiates a purchase transaction when he transmits his credit card number (and usually other information such as expiration date) to the merchant 300 at the time of purchase.
- the merchant submits the credit card number and other information to the card verifying authority 100 and obtains further information required to complete the purchase order (e.g., shipping address) from the card verifying authority.
- the card verifying authority does not need to have access to the unencrypted credit card information at any time.
- the card verifying authority may apply this method of data identification not only for credit card numbers, but also for other information (e.g., pass phrase).
- the particular merchant is among the plurality of merchants who have also registered with the authority 100.
- the registered merchants have been given the encryption function so that after receiving the original number from the user making a purchase, the merchant transmits the encrypted number and expiration date to the verifying authority.
- the user 500 can apply the encryption function 510 before transmission via the network 400 to register with the verifying authority 100.
- Figure 5 illustrates yet another embodiment of the process by which a purchase order is handled according to the invention.
- the user 600 submits the encrypted card number 510 and expiration date via the network 400, to a particular merchant 610.
- the merchant 300 merely forwards the encrypted information to the verifying authority 100.
- the merchant must have the original credit card number so that he can transmit it to his acquiring bank and the bank can transmit the information to the user's card issuing bank.
- another possible implementation would include such banks having access to the encryption function such that processing can be made on that basis.
- the authority 100 attempts to match the encrypted information with the information stored in the database 110.
- the authority registers the card number as an encrypted output number of a one-way encryption function and associates at least one additional personal data element with the encrypted number, and stores the encrypted number and associated data element in a database with encrypted numbers and associated data elements of other registrants.
- a credit limit for a particular purchase or a sequence of purchases within a given time period is registered and is checked by the authority during the verification logic 620, 630, and 640.
- the authority 100 then communicates to the merchant 300, whether the transaction is approved or denied.
- Registration can be over the network 400, by postal service or by facsimile transmission. Each registrant would pay a registration fee and optionally an annual service fee. Alternatively, if the verifying authority is affiliated with a card issuer or an acquiring bank, the credit card holder may be automatically registered at no apparent charge, upon issuance of the card.
- the number and type of personal information data elements can vary considerably, but as shown in Figure 3, options include a personal ID corresponding to the authorized user's personal computer or other digital signal generating device, and pass phrase or other such code, which can be used for verification if an authorized user initiates a purchase transaction from another computer. These can be encrypted to the same extent as the credit card number.
- Sensitive information may be handled in at least three ways. Encryption can be made by the card holder, whereby only encrypted information travels on the network; the merchant can encrypt the sensitive information; or the sensitive information can be encrypted by the verifying authority. Preferably, the merchant does not store any credit card information.
Landscapes
- Business, Economics & Management (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Accounting & Taxation (AREA)
- Engineering & Computer Science (AREA)
- General Business, Economics & Management (AREA)
- Strategic Management (AREA)
- Theoretical Computer Science (AREA)
- Finance (AREA)
- Computer Security & Cryptography (AREA)
- Development Economics (AREA)
- Economics (AREA)
- Marketing (AREA)
- Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
- Storage Device Security (AREA)
Abstract
Système d'enregistrement des données de cartes de crédit ou de débit qui consiste, pour leurs détenteurs, à transmettre les renseignements de base nécessaires pour passer une commande (530) dans sa totalité, ces renseignements ne se limitant pas uniquement à l'indication de données telles que le numéro de la carte, sa date d'expiration, l'adresse d'expédition, le mode d'expédition préféré, le contact téléphonique (fig. 2). L'autorité vérificatrice ne mémorise pas le numéro de carte de crédit, mais uniquement son empreinte obtenue au moyen d'une fonction de codage unidirectionnel (510). L'utilisateur transmet le numéro de sa carte de crédit au commerçant au moment de l'achat et le commerçant soumet les renseignements concernant la carte de crédit à l'autorité vérificatrice, ce qui lui permet d'obtenir le reste des renseignements nécessaires à l'exécution de la commande (par exemple, adresse d'expédition) de la part de cette autorité. L'invention est caractérisée par l'association originale de renseignements codés avec des renseignements non codés appartenant à l'utilisateur d'une carte de crédit valide ou d'un autre moyen de paiement. On utilise les renseignements codés dans la mesure du possible, au lieu de mémoriser ou de transmettre d'autres renseignements sensibles.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
PCT/US2000/005248 WO2001065397A1 (fr) | 2000-03-01 | 2000-03-01 | Procede et systeme servant a passer une commande au moyen d'une carte de credit |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
PCT/US2000/005248 WO2001065397A1 (fr) | 2000-03-01 | 2000-03-01 | Procede et systeme servant a passer une commande au moyen d'une carte de credit |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2001065397A1 true WO2001065397A1 (fr) | 2001-09-07 |
Family
ID=21741104
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/US2000/005248 WO2001065397A1 (fr) | 2000-03-01 | 2000-03-01 | Procede et systeme servant a passer une commande au moyen d'une carte de credit |
Country Status (1)
Country | Link |
---|---|
WO (1) | WO2001065397A1 (fr) |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP1457929A2 (fr) * | 2003-01-31 | 2004-09-15 | Neopost Industrie Sa | Système et procédé de traitement d'articles postaux |
EP1632091A2 (fr) * | 2003-05-12 | 2006-03-08 | Gtech Rhode Island Corporation | Procede et systeme d'authentification |
US20150348209A1 (en) * | 2014-06-02 | 2015-12-03 | Mastercard International Incorporated | Method and system for linking forensic data with purchase behavior |
US20200151717A1 (en) * | 2010-03-30 | 2020-05-14 | Visa International Service Association | Event access with data field encryption for validation and access control |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JPH10171897A (ja) * | 1996-12-06 | 1998-06-26 | Nitsutsuu Syst Kk | Icカードを利用した電子マネーシステム |
US5870723A (en) * | 1994-11-28 | 1999-02-09 | Pare, Jr.; David Ferrin | Tokenless biometric transaction authorization method and system |
US5883810A (en) * | 1997-09-24 | 1999-03-16 | Microsoft Corporation | Electronic online commerce card with transactionproxy number for online transactions |
-
2000
- 2000-03-01 WO PCT/US2000/005248 patent/WO2001065397A1/fr active Application Filing
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5870723A (en) * | 1994-11-28 | 1999-02-09 | Pare, Jr.; David Ferrin | Tokenless biometric transaction authorization method and system |
JPH10171897A (ja) * | 1996-12-06 | 1998-06-26 | Nitsutsuu Syst Kk | Icカードを利用した電子マネーシステム |
US5883810A (en) * | 1997-09-24 | 1999-03-16 | Microsoft Corporation | Electronic online commerce card with transactionproxy number for online transactions |
Non-Patent Citations (1)
Title |
---|
"Debit issuers and merchants await an internet security solution", DEBIT CARD NEWS,, vol. 3, no. 2, pages 1 - 4, P7+, DIALOG WEB COPY, XP002929765 * |
Cited By (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP1457929A2 (fr) * | 2003-01-31 | 2004-09-15 | Neopost Industrie Sa | Système et procédé de traitement d'articles postaux |
EP1457929A3 (fr) * | 2003-01-31 | 2006-09-13 | Neopost Industrie Sa | Système et procédé de traitement d'articles postaux |
EP1632091A2 (fr) * | 2003-05-12 | 2006-03-08 | Gtech Rhode Island Corporation | Procede et systeme d'authentification |
EP1632091A4 (fr) * | 2003-05-12 | 2006-07-26 | Gtech Corp | Procede et systeme d'authentification |
US7749080B2 (en) | 2003-05-12 | 2010-07-06 | Gtech Rhode Island Corporation | Method and system for authentication |
US20200151717A1 (en) * | 2010-03-30 | 2020-05-14 | Visa International Service Association | Event access with data field encryption for validation and access control |
US20150348209A1 (en) * | 2014-06-02 | 2015-12-03 | Mastercard International Incorporated | Method and system for linking forensic data with purchase behavior |
US10074141B2 (en) * | 2014-06-02 | 2018-09-11 | Mastercard International Incorporated | Method and system for linking forensic data with purchase behavior |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US7003501B2 (en) | Method for preventing fraudulent use of credit cards and credit card information, and for preventing unauthorized access to restricted physical and virtual sites | |
EP1497947B1 (fr) | Service d'authentification de compte mobile | |
US6915279B2 (en) | System and method for conducting secure payment transactions | |
US7983987B2 (en) | System and method for conducting secure payment transaction | |
US8108266B2 (en) | Methods for providing secure eCommerce transactions | |
US6269348B1 (en) | Tokenless biometric electronic debit and credit transactions | |
US20060190412A1 (en) | Method and system for preventing fraudulent use of credit cards and credit card information, and for preventing unauthorized access to restricted physical and virtual sites | |
US20030130955A1 (en) | Secure transaction systems | |
US20020128977A1 (en) | Microchip-enabled online transaction system | |
US20070170247A1 (en) | Payment card authentication system and method | |
US20070198410A1 (en) | Credit fraud prevention systems and methods | |
US7849005B2 (en) | Electronic funds transfer method | |
US20020194080A1 (en) | Internet cash card | |
KR20010102261A (ko) | 신용카드 시스템 및 방법 | |
WO2001069549A1 (fr) | Procede et dispositif d'autorisation de paiement | |
US20020032662A1 (en) | System and method for servicing secure credit/debit card transactions | |
WO2005089228A2 (fr) | Systeme de debit par internet | |
JP2004500671A (ja) | コンピューターネットワークを介して安全な支払いを実行する改良方法及びシステム | |
JP5093957B2 (ja) | コンピュータネットワーク上で安全な支払いを行うための向上した方法及びシステム | |
US20020123935A1 (en) | Secure commerce system and method | |
WO2001065397A1 (fr) | Procede et systeme servant a passer une commande au moyen d'une carte de credit | |
JP2002063525A (ja) | 生体情報による本人確認を利用した製品販売方法 | |
KR20010100748A (ko) | 사용자 번호가 자동으로 갱신되는 인증/결제 카드 및 이를이용한 인증/결제 시스템 및 그 방법 | |
AU2002254513B2 (en) | System and method for conducting secure payment transactions | |
WO2011058376A1 (fr) | Système d'authentification de paiement et procédé de traitement |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AK | Designated states |
Kind code of ref document: A1 Designated state(s): CA IL JP US |
|
AL | Designated countries for regional patents |
Kind code of ref document: A1 Designated state(s): AT BE CH CY DE DK ES FI FR GB GR IE IT LU MC NL PT SE |
|
121 | Ep: the epo has been informed by wipo that ep was designated in this application | ||
122 | Ep: pct application non-entry in european phase |