WO2009111795A1 - Appareil et procédé pour effectuer des transactions sécurisées à l’aide d’une carte de crédit - Google Patents
Appareil et procédé pour effectuer des transactions sécurisées à l’aide d’une carte de crédit Download PDFInfo
- Publication number
- WO2009111795A1 WO2009111795A1 PCT/US2009/036564 US2009036564W WO2009111795A1 WO 2009111795 A1 WO2009111795 A1 WO 2009111795A1 US 2009036564 W US2009036564 W US 2009036564W WO 2009111795 A1 WO2009111795 A1 WO 2009111795A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- card
- information
- credit card
- credit
- pin
- Prior art date
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/04—Payment circuits
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/02—Payment architectures, schemes or protocols involving a neutral party, e.g. certification authority, notary or trusted third party [TTP]
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/08—Payment architectures
- G06Q20/12—Payment architectures specially adapted for electronic shopping systems
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/08—Payment architectures
- G06Q20/20—Point-of-sale [POS] network systems
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/22—Payment schemes or models
- G06Q20/24—Credit schemes, i.e. "pay after"
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07F—COIN-FREED OR LIKE APPARATUS
- G07F7/00—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus
- G07F7/08—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means
- G07F7/10—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means together with a coded signal, e.g. in the form of personal identification information, like personal identification number [PIN] or biometric data
- G07F7/1025—Identification of user by a PIN code
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07F—COIN-FREED OR LIKE APPARATUS
- G07F7/00—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus
- G07F7/08—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means
- G07F7/12—Card verification
Definitions
- the present invention relates to electronic transactions and, more particularly, to authenticated secure credit card electronic transactions.
- Transactions for various goods and services are predominantly conducted using electronic payment systems instead of conventional currency. Consumers complete such transactions using various types of payments, such as credit cards and check cards.
- a merchant, or service provider retrieves information from the card and transmits the information electronically to the institution issuing the credit card or bank card to obtain approval for the transaction. If sufficient funds exist in the consumer's checking account, or the credit card limit has not been reached, the transaction is approved and funds are deducted from the user's account.
- the issuing entity charges the merchant a transaction fee, which varies depending on the condition of the transaction. For example, different fees are charged for check card transactions depending on the physical presence of the card. Differences exist between transactions using credit cards and check cards. In addition, the fees for credit card purchases also differ depending on whether the card is physically present. This physical presence corresponds to the situation where the customer physically produces the credit card to the merchant for verification of signature and identification. When purchases are made electronically at a virtual merchant location (e.g., website), there is no verification of the card or consumer identification. Consequently, it provides an avenue for hackers to potential utilize unauthorized information. Merchants and credit card issuers suffer significant losses as a result of these unauthorized transactions. The fees charged for transactions are, in part, a reflection of these losses.
- a system for registering a credit card in order to conduct secured transactions.
- the system includes a verified transaction card (such as a bank ATM card) having a Personal Identification Number (PIN), thereby linking it to a user's identity, as well as one or more credit cards that will be registered based on the verified transaction card.
- a secure transaction terminal is used for retrieving information stored on the transaction card and the credit cards. Furthermore, the secure transaction terminal can includes an input portion in order to input, display, and review information.
- a communication device is provided for transmitting and receiving information across one or more networks, and an authentication server is provided for maintaining information associated with registered credit cards. In order to register the credit cards, information is retrieved from the verified transaction card using the secure transaction terminal.
- the PIN associated with the verified transaction card is then input by the user.
- Information from each of the credit cards is associated with the entity which issues the verified transaction card, and associated with the PIN. All of this information is subsequently stored on the authentication server, so that the PIN must be input in order to authenticate transactions with the credit card.
- a computer system containing appropriate hardware and software can be used to retrieve information from the credit card and the verified transaction card.
- the computer system can also be used to transmit/receive information across the network.
- the computer system can be used with other secure data entry systems and methods in order to provide a safe platform for inputting information.
- a method for registering a credit card to conduct secure transactions.
- the method comprises the steps of: retrieving information from a bank card associated with a user bank account; inputting a PIN associated with the bank card; validating the user's identification based, in part, on the bank card and PIN; associating one or more credit cards with the validated user identification; and storing information regarding the one or more credit cards.
- a method of conducting secure transactions comprises the steps of: selecting an item for purchase; retrieving credit card information for purchasing the selected item using a secure transaction terminal; inputting a PIN having a predetermined association with the credit card using the secure transaction terminal; transmitting the credit card information and PlN to an authentication server for verification; transmitting transaction information regarding the purchase to an issuer of the credit card, if the credit card information and PIN are successfully verified by the authentication server; and notifying a merchant providing the item for purchase, if the credit card information and PIN cannot be verified by the authentication server.
- the level of security required to complete the transaction can be increased.
- the need to verify a consumer's identification or signature can be reduced and/or eliminated.
- Fig. 1 is a block diagram illustrating an arrangement for conducting secure credit card transactions according to an exemplary embodiment of the present invention
- Fig. 2 is a flowchart illustrating the steps performed when conducting secure credit card transactions according to one embodiment of the present invention.
- Fig. 3 is a flowchart illustrating the process of registering a credit card for secure transactions.
- a procedure is here, and generally, conceived to be a self-consistent sequence of steps leading to a desired result. These steps are those requiring physical manipulations of physical quantities. Usually, though not necessarily, these quantities take the form of electrical, magnetic, and/or optical signals capable of being stored, transferred, combined, compared and otherwise manipulated. It proves convenient at times, principally for reasons of common usage, to refer to these signals as bits, values, elements, symbols, characters, terms, numbers, or the like. It should be noted, however, that all of these and similar terms are to be associated with the appropriate physical quantities and are merely convenient labels applied to these quantities.
- the manipulations performed are often referred to in terms, such as adding or comparing, which are commonly associated with mental operations performed by a human operator. No such capability of a human operator is necessary, or desirable in most cases, in any of the operations described herein which form part of the present invention; the operations are preferably machine operations, although the operations may also be manual in alternative embodiments.
- Useful machines for performing the operation of the present invention include general purpose digital computers or similar devices.
- the present invention also relates to apparatus for performing these operations.
- This apparatus may be specially constructed for the required purpose or it may include a general purpose computer as selectively activated or reconfigured by a computer program stored in the computer.
- the procedures presented herein are not inherently related to a particular computer or other apparatus.
- Various general purpose machines may be used with programs written in accordance with the teachings herein, or it may prove more convenient to construct more specialized apparatus to perform the required method steps. The required structure for a variety of these machines will appear from the description given.
- the secure transaction system 100 includes a merchant or service provider 114, an authentication server 120, and a credit issuing entity (i.e., credit card issuer) 122.
- a consumer i.e., user
- a consumer 110 is able to physically visit the merchant and shop for various items.
- the consumer 110 can also conduct various transactions at a merchant's virtual storefront using a network, such as the internet.
- the consumer (or user) 110 would utilize a computer 124 (or any appropriate network enabled device such as a mobile phone, PDA, etc.).
- the computer 124 can include common peripherals such as, but not limited to, a display 126, keyboard 128, and mouse 130. [0030]
- Some merchants can also have both a physical store location 114 and a virtual store front that is accessible over the internet.
- consumers 110 have the option of purchasing items and services at the merchant's physical location 114, or using the computer 124 to access the merchant's website and subsequently receiving any items via appropriate shipping methods.
- the consumer 110 will typically browse the aisles of the merchant 114, or pages of the merchant's website using the computer 124, to shop for various items.
- the consumer can select one or more products and/or services to be purchased and proceed to the register or check out location of the merchant 114 (e.g., point of sale).
- the consumer 110 often has the option to purchase products or services using different forms of payment, including cash, check, credit card, etc.
- a consumer (or user) 110 can perform this transaction using a credit card while maintaining a high level of security.
- the consumer 110 presents an appropriate credit card 118 for payment.
- the credit card 118 is swiped through a secure transaction terminal 116 so that the information stored on its magnetic strip can be retrieved.
- a secure transaction terminal 116 the manner in which the information from the credit card 118 is read will vary. For example, some secure transaction terminals require that the credit card be swiped across an opening to read the magnetic information, while others can require insertion of the card into a recessed area.
- the consumer 110 is subsequently required to authenticate the transaction by entering a Personal Identification Number (PIN) associated with the credit card 118 using a key pad on the secure transaction terminal.
- PIN Personal Identification Number
- the PIN entered is used to authenticate the user's identity and the credit card based on a pre-established relationship with the user's bank account. Accordingly, prior to commencing the transaction, it is necessary for the consumer 110 to take appropriate steps to register and establish a link to the credit card 118. Alternatively, or optionally, the consumer 110 can establish this link at the checkout location or point of sale (POS). While the illustrated embodiment of the invention discusses registration of a credit card, it should be noted that any type of financial transaction card can be used.
- the consumer 110 is required to produce a conventional ATM card (not shown) which has been issued by a bank wherein the consumer holds a checking and/or savings account.
- the ATM card is linked to the consumer's identification, and incorporates a four- digit PIN to provide security. Under normal transactions, the consumer 110 would insert the ATM card into an appropriate ATM and input their four-digit PIN. The combination of ATM card and four-digit PIN confirms the user's identity and allows the transaction to proceed. It should be noted that the consumer's identity is already verified through conventional banking procedures. More particularly, prior to being issued the ATM card, the consumer 110 is required to physically visit the bank and produce identification necessary to establish their identity before an account will be opened. Once the user's identity has been verified and the account opened, the bank will separately supply a four-digit PIN to be used in conjunction with the ATM card when conducting transactions at an ATM. [0035]
- the consumer's bank account, ATM card, and PIN are used to authenticate the consumer's identity.
- the user's identity is confirmed.
- the user 110 is allowed to associate one or more credit cards 118 with their identity for conducting secure transactions.
- Each credit card 118 would be swiped so that information can be retrieved and associated with the bank account and stored at the authentication server 120.
- the credit card 118 has been registered. Any secure transactions subsequently conducted by the consumer 110 using a registered credit card 118 would further require input of the user's four digit PIN in order to confirm their identity.
- the combination of the registered credit card 118 and four-digit PIN confirms the consumer's identity and reduces (or eliminates) the need to request identification or signature verification at the merchant's check out.
- a conventional ATM card requires creation of an account with a financial institution and physical (i.e., in person) verification of the account holder's identity. This can be accomplished, for example by the account holder visiting the financial institution and presenting appropriate documents (e.g., license, passport, etc.) to verify their identity.
- appropriate documents e.g., license, passport, etc.
- other electronic transaction cards requiring verification of the card holder's identification prior to issuance can be used in place of the ATM card.
- the consumer 110 can perform such transactions over the internet using a computer 124.
- the present invention is particularly beneficial in such situations, because the merchant 114 is unable to physically request picture identification or signature verification from the consumer 110. This results in a high level of risk that the credit card 118 could have been fraudulently obtained and used to conduct the transaction.
- the consumer 110 can provide information from the credit card 118 together with the four-digit PIN through the computer 124 in order to authenticate their identification and complete the transaction.
- the consumer 1 10 Once the consumer 1 10 has supplied the credit card information (by swiping through the secure transaction terminal 1 16 or inputting the account information using the computer) and four-digit PIN, it is sent to the authentication server 120 over a secure communication channel 140.
- a secure communication channel 140 Such a channel can be in the form of a direct connection line, a virtual private network, the internet, etc., as long as appropriate security and encryption measures are taken.
- the authentication server 120 stores all the credit card and bank account information for the consumers 110. Once the merchant 114 transmits the credit card information and PIN to the authentication server 120, it is able to confirm the user's identity and determine whether the transaction should be allowed to proceed.
- the authentication server 120 can establish a communication link 142 with the credit card issuer 122 (e.g.
- the authentication server can contact the merchant 114 and indicate that the credit card 118 is registered.
- the merchant 114 would subsequently establish a communication link 144 with the credit card issuer 122 in order to supply the transaction information.
- the credit card issuer 122 determines if sufficient funds (or credit) are available, and indicates whether the transaction should be allowed to proceed. This indication can be provided in various ways.
- the credit card issuer 122 can respond to the authentication server 120, indicating that the credit card 118 has sufficient funds to complete the transaction.
- the credit card issuer 122 can supply this indication to the merchant 114 directly by using the transaction information. Once the merchant 114 receives the credit card authorization, the transaction can be accepted or denied.
- Fig. 2 is a flowchart illustrating the steps performed in conducting secure credit card transactions in accordance with one or more embodiments of the present invention.
- the consumer is free to shop at either the merchant location or at a virtual location on the internet.
- the consumer would identify one or more products and/or services that they would like to purchase. This is represented by step S200 wherein the user selects these items.
- the user selects a credit card as the method of payment.
- consumers can pay for such transactions using various means, including cash, check, credit cards, retail store cards, etc.
- the user attempts to purchase the item they are given an opportunity to select a credit card as the payment type.
- step S212 the user is asked for the status of the credit card. Specifically, the merchant inquires whether the credit card is registered for secure transactions or not. If the credit card is not registered, the consumer is given an opportunity to complete the registration process. This is illustrated by directing the user to break point "1", which will be discussed below with respect to Fig. 3. As can be appreciated, the process can optionally be allowed to proceed without prompting the consumer. [0039]
- the consumer is asked to swipe their credit card in order to pay for the transaction at step S214.
- the consumer enters the four-digit PIN associated with the credit card.
- the four-digit PIN and credit card information are transmitted to the authentication server via the network.
- the authentication server validates that credit card at step S220. More particularly, the authentication server confirms whether or not the consumer's credit card has been previously registered and authorized to conduct secure transactions. As previously discussed, such validation can also eliminate the need for the merchant to request identification and/or signature verification to approve the transaction. If the authentication server successfully validates the credit card, then information concerning the transaction is transmitted to the credit card issuer at step S222. Alternatively, the transaction server can notify the merchant, who would in turn contact the credit card issuer. [0040]
- step S224 the vendor is notified at step S224.
- the merchant can optionally provide the consumer with an opportunity to perform an unsecured purchase according to conventional means. If the consumer does not wish to make an unsecured purchase, then the process ends. If the consumer agrees to conduct the unsecured purchase, then the credit card information is obtained at step S238. Control subsequently returns to step S222 where the transaction information is supplied to the credit card company.
- step S230 the credit card company determines whether or not sufficient funds exist on the consumer's credit card account. If sufficient funds exist, then the transaction is authorized at step S232. Alternatively, if sufficient funds do not exist, then the transaction is declined at step S234. The process ends at step S236 with successful purchase of the product and/or service.
- Fig. 3 is a flowchart illustrating the process of registering a credit card for secure transactions.
- the location to which the consumer is directed can vary. If the consumer is present at a physical merchant location, the registration location can correspond to a separate office and/or area where the registration process can take place. Further, in a mall type (e.g., shopping plaza) setting, the registration location can correspond to a kiosk having the necessary hardware (e.g., communication access and secure transaction terminal) for performing the process.
- the transaction is being conducted online, the consumer's PC can be directed to a different webpage wherein the information would be collected. Typically, the consumer would be directed to the authentication server so that information can be verified and stored for subsequent transactions.
- the consumer would be required to swipe their ATM card at step S312. If using a computer, the consumer would simply enter the account and other necessary information from the ATM card using an appropriate input device.
- the consumer enters the four-digit PIN corresponding to the ATM card.
- the authentication server attempts to validate the consumer's identification based on the ATM card and PIN. This is the same type of authentication performed when the consumer uses any conventional ATM to withdraw cash from an existing checking and/or savings account. If the authentication server cannot to validate the credit card, then the merchant is alerted at step S318.
- the registration process would end. [0043]
- the authentication server If the authentication server is capable of validating the consumer's identification, then the user swipes a credit card at step S322.
- the authentication server associates the swiped credit card with the user account at step S324 so that the credit card is now registered to perform secure transactions.
- the consumer is asked if additional credit cards should be registered. If so, then control returns to step S322. Otherwise, control returns to the purchase transaction shown in Fig. 2 at break point "2".
- a conventional computer system would typically include a bus or other communication mechanism for communicating information, and a processor coupled with bus for processing information.
- the computer system also includes a main memory, such as a random access memory (RAM) or other dynamic storage device, coupled to the bus for storing information and instructions to be executed by the processor.
- the main memory also may be used for storing temporary variables or other intermediate information during execution of instructions the processor.
- the computer system further includes a read only memory (ROM) or other static storage device coupled to the bus for storing static information and instructions for the processor.
- ROM read only memory
- a storage device such as a magnetic disk or optical disk, is provided and coupled to the bus for storing information and instructions.
- the computer system may be coupled via the bus to a display, such as a cathode ray tube (CRT) or liquid crystal display (LCD), for displaying information to a computer user.
- a display such as a cathode ray tube (CRT) or liquid crystal display (LCD)
- An input device can be coupled to the bus for communicating information and command selections to the processor.
- cursor control such as a mouse, a trackball, or cursor direction keys for communicating direction information and command selections to the processor and for controlling cursor movement on the display.
- This input device typically has two degrees of freedom in two axes, a first axis (e.g., x) and a second axis (e.g., y), that allows the device to specify positions in a plane.
- the computer system provides the necessary interface and operates in response to the processor executing one or more sequences of one or more instructions contained in the main memory.
- Such instructions may be read into the main memory from another computer-readable medium, such as storage device.
- Execution of the sequences of instructions contained in the main memory causes the processor to perform the process steps described herein.
- processors in a multi-processing arrangement may also be employed to execute the sequences of instructions contained in the main memory.
- hard-wired circuitry may be used in place of or in combination with software instructions to implement the invention.
- embodiments of the invention are not limited to any specific combination of hardware circuitry and software.
- Non-volatile media include, for example, optical or magnetic disks, such as the aforementioned storage device.
- Volatile media include dynamic memory, such as the main memory.
- Transmission media include coaxial cables, copper wire and fiber optics, including the wires that comprise the bus. Transmission media can also take the form of acoustic or light waves, such as those generated during radio frequency (RF) and infrared (IR) data communications, wireless frequencies used to send/receive information using satellite and terrestrial devices, etc.
- RF radio frequency
- IR infrared
- Computer-readable media include, for example, a floppy disk, a flexible disk, hard disk, magnetic tape, any other magnetic medium, a CD-ROM, DVD, any other optical medium, punch cards, paper tape, any other physical medium with patterns of holes, a RAM, a PROM, and EPROM, a FLASH-EPROM, any other memory chip or cartridge, a carrier wave as described hereinafter, or any other medium from which a computer can read.
- Various forms of computer readable media may be involved in carrying one or more sequences of one or more instructions to the processor for execution.
- the instructions may initially be borne on a magnetic disk of a remote computer.
- the remote computer can load the instructions into its dynamic memory and send the instructions over a telephone line using a modem.
- a modem local to the computer system can receive the data on the telephone line and use an infrared transmitter to convert the data to an infrared signal.
- An infrared detector coupled to the bus can receive the data carried in the infrared signal and place the data on the bus.
- the bus carries the data to the main memory, from which the processor retrieves and executes the instructions.
- the instructions received by the main memory may optionally be stored on the storage device either before or after execution by the processor.
- the computer system also includes a communication interface coupled to the bus.
- the communication interface provides a two-way data communication coupling to a network link that is connected to a local network.
- the communication interface may be a local area network (LAN) card to provide a data communication connection to a compatible LAN.
- LAN local area network
- Wireless links may also be implemented.
- the communication interface sends and receives electrical, electromagnetic or optical signals that carry digital data streams representing various types of information.
- the network link typically provides data communication through one or more networks to other data devices.
- the network link may provide a connection through the local network to a host computer or to data equipment operated by an Internet Service Provider (ISP).
- ISP Internet Service Provider
- the ISP in turn provides data communication services through the internet.
- the local network and internet both use electrical, electromagnetic or optical signals that carry digital data streams.
- the signals through the various networks and the signals on the network link and through the communication interface, which carry the digital data to and from the computer system, are exemplary forms of carrier waves transporting the information.
Abstract
La présente invention concerne un procédé et un système permettant d’effectuer des transactions sécurisées à l’aide d’une carte de crédit. Une carte de crédit est enregistrée en l’associant avec un compte bancaire d’utilisateur et avec un code d’identification personnel (PIN). Pendant une transaction, la carte de crédit est utilisée de façon habituelle. On demande ensuite à l’utilisateur le code PIN utilisé lors de l’enregistrement de la carte de crédit. Cette information est validée avant d’envoyer la transaction à l’émetteur de la carte de crédit. La transaction ne peut se concrétiser sans que cette information ne soit validée et aucune information n’est alors transmise à l’émetteur de la carte de crédit.
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US3476608P | 2008-03-07 | 2008-03-07 | |
US61/034,766 | 2008-03-07 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2009111795A1 true WO2009111795A1 (fr) | 2009-09-11 |
Family
ID=41056388
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/US2009/036564 WO2009111795A1 (fr) | 2008-03-07 | 2009-03-09 | Appareil et procédé pour effectuer des transactions sécurisées à l’aide d’une carte de crédit |
Country Status (1)
Country | Link |
---|---|
WO (1) | WO2009111795A1 (fr) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20120136733A1 (en) * | 2010-11-30 | 2012-05-31 | Ncr Corporation | Techniques for secure credit card transactions |
WO2015161235A1 (fr) * | 2014-04-17 | 2015-10-22 | Ruffer James F | Système de paiement électronique sécurisé |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5677955A (en) * | 1995-04-07 | 1997-10-14 | Financial Services Technology Consortium | Electronic funds transfer instruments |
US5883810A (en) * | 1997-09-24 | 1999-03-16 | Microsoft Corporation | Electronic online commerce card with transactionproxy number for online transactions |
US6749114B2 (en) * | 2001-05-15 | 2004-06-15 | Inadam Corporation | Universal authorization card system and method for using same |
-
2009
- 2009-03-09 WO PCT/US2009/036564 patent/WO2009111795A1/fr active Application Filing
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5677955A (en) * | 1995-04-07 | 1997-10-14 | Financial Services Technology Consortium | Electronic funds transfer instruments |
US5883810A (en) * | 1997-09-24 | 1999-03-16 | Microsoft Corporation | Electronic online commerce card with transactionproxy number for online transactions |
US6749114B2 (en) * | 2001-05-15 | 2004-06-15 | Inadam Corporation | Universal authorization card system and method for using same |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20120136733A1 (en) * | 2010-11-30 | 2012-05-31 | Ncr Corporation | Techniques for secure credit card transactions |
WO2015161235A1 (fr) * | 2014-04-17 | 2015-10-22 | Ruffer James F | Système de paiement électronique sécurisé |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US10748147B2 (en) | Adaptive authentication options | |
KR100731905B1 (ko) | 지불 장치와 방법 | |
US10282724B2 (en) | Security system incorporating mobile device | |
US20020038287A1 (en) | EMV card-based identification, authentication, and access control for remote access | |
US20140101055A1 (en) | Systems, methods, and computer program products for managing remote transactions | |
NZ531142A (en) | Virtual credit card terminal and method of transaction | |
US20100211503A1 (en) | Double Verified Transaction Device and Method | |
US8099363B1 (en) | Methods and systems for processing card-not-present financial transactions as card-present financial transactions | |
US11961079B2 (en) | Proof-of-age verification in mobile payments | |
US20060167823A1 (en) | Secure wireless commerce | |
JP2006039729A (ja) | 取引システムおよび取引装置および決済システム | |
JP2013505487A (ja) | 電子財布のための資産価値記憶、転送システム | |
US20180308076A1 (en) | Electronic financial processing system using personal atm terminal and method for processing thereof | |
US20180165679A1 (en) | Method and system for transaction authentication | |
EP4020360A1 (fr) | Échange sécurisé de justificatifs sans contact | |
WO2009111795A1 (fr) | Appareil et procédé pour effectuer des transactions sécurisées à l’aide d’une carte de crédit | |
US11568383B2 (en) | Method and apparatus for a payment network | |
KR20160010042A (ko) | 실시간 계좌 이체, 계좌 추심을 통한 결제 방법, 서버 및 컴퓨터 판독 가능한 기록 매체 | |
US20130290178A1 (en) | System and method for effecting payment to a beneficiary including a real-time authorization of the payment | |
KR20050020422A (ko) | 이동 통신 단말기를 이용한 결제 서비스 제공 방법 및결제 서비스 제공 시스템 | |
JP2002032572A (ja) | 認証システムと認証方法及び決済システム | |
US20210264412A1 (en) | System and method for securing financial transactions | |
US11250410B2 (en) | Computer implemented method and a payment terminal for executing card present transaction dynamically from remote environment | |
DAVITULIANI et al. | CASH AT E-COMMERCE: METHOD FOR DISBURSING CASH TO A CARDHOLDER USING AN E-COMMERCE PLATFORM | |
Wen et al. | Security Features Available on The Best E-Wallet Applications in Malaysia |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 09717734 Country of ref document: EP Kind code of ref document: A1 |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
32PN | Ep: public notification in the ep bulletin as address of the adressee cannot be established |
Free format text: EPO FORM 1205A DATED 28.03.2011 |
|
122 | Ep: pct application non-entry in european phase |
Ref document number: 09717734 Country of ref document: EP Kind code of ref document: A1 |