[go: up one dir, main page]

US20160140566A1 - Secure transmission of payment credentials - Google Patents

Secure transmission of payment credentials Download PDF

Info

Publication number
US20160140566A1
US20160140566A1 US13/541,460 US201213541460A US2016140566A1 US 20160140566 A1 US20160140566 A1 US 20160140566A1 US 201213541460 A US201213541460 A US 201213541460A US 2016140566 A1 US2016140566 A1 US 2016140566A1
Authority
US
United States
Prior art keywords
cvv
payment
encrypted
client device
online
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
US13/541,460
Inventor
David Preston Baker
Stanley N. Marshall, III
Matthew Eric Hiller
Andrew Robert Mitchell
Mohamed Reza Hussein
Chin Pang Tung
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Google LLC
Original Assignee
Google LLC
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Google LLC filed Critical Google LLC
Priority to US13/541,460 priority Critical patent/US20160140566A1/en
Assigned to GOOGLE INC. reassignment GOOGLE INC. ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: HUSSEIN, MOHAMED REZA, MARSHALL, STANLEY N., III, MITCHELL, ANDREW ROBERT, TUNG, CHIN PANG, BAKER, DAVID PRESTON, HILLER, MATTHEW ERIC
Publication of US20160140566A1 publication Critical patent/US20160140566A1/en
Assigned to GOOGLE LLC reassignment GOOGLE LLC CHANGE OF NAME Assignors: GOOGLE INC.
Abandoned legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/08Payment architectures
    • G06Q20/12Payment architectures specially adapted for electronic shopping systems
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/30Payment architectures, schemes or protocols characterised by the use of specific devices or networks
    • G06Q20/32Payment architectures, schemes or protocols characterised by the use of specific devices or networks using wireless devices
    • G06Q20/322Aspects of commerce using mobile devices [M-devices]
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/30Payment architectures, schemes or protocols characterised by the use of specific devices or networks
    • G06Q20/36Payment architectures, schemes or protocols characterised by the use of specific devices or networks using electronic wallets or electronic money safes
    • G06Q20/367Payment architectures, schemes or protocols characterised by the use of specific devices or networks using electronic wallets or electronic money safes involving electronic purses or money safes
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/30Payment architectures, schemes or protocols characterised by the use of specific devices or networks
    • G06Q20/36Payment architectures, schemes or protocols characterised by the use of specific devices or networks using electronic wallets or electronic money safes
    • G06Q20/367Payment architectures, schemes or protocols characterised by the use of specific devices or networks using electronic wallets or electronic money safes involving electronic purses or money safes
    • G06Q20/3674Payment architectures, schemes or protocols characterised by the use of specific devices or networks using electronic wallets or electronic money safes involving electronic purses or money safes involving authentication
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/401Transaction verification
    • G06Q20/4018Transaction verification using the card verification value [CVV] associated with the card
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/06Buying, selling or leasing transactions
    • G06Q30/0601Electronic shopping [e-shopping]
    • G06Q30/0633Managing shopping lists, e.g. compiling or processing purchase lists
    • G06Q30/0635Managing shopping lists, e.g. compiling or processing purchase lists replenishment orders; recurring orders
    • H04L67/32
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/50Network services
    • H04L67/60Scheduling or organising the servicing of application requests, e.g. requests for application data transmissions using the analysis and optimisation of the required network resources
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/04Payment circuits
    • G06Q20/045Payment circuits using payment protocols involving tickets
    • G06Q20/0457Payment circuits using payment protocols involving tickets the tickets being sent electronically
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/22Payment schemes or models
    • G06Q20/227Payment schemes or models characterised in that multiple accounts are available, e.g. to the payer
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/30Payment architectures, schemes or protocols characterised by the use of specific devices or networks
    • G06Q20/36Payment architectures, schemes or protocols characterised by the use of specific devices or networks using electronic wallets or electronic money safes
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q2220/00Business processing using cryptography
    • G06Q2220/10Usage protection of distributed data files

Definitions

  • the present disclosure relates generally to systems and methods for completing online purchases initiated on client devices, such as mobile devices. More particularly, the present invention provides systems and methods for the secure storage and transmission of payment information using an online electronic wallet.
  • verification codes such as CVV information
  • a method for secure storage of payment instrument information comprises receiving, at an online electronic wallet system, payment instrument information from a user, storing the payment instrument information, minus a verification code, in the online electronic wallet system, encrypting the verification code with an encryption key, storing the verification code in local storage on one or more client devices, and deleting the verification code and encrypted verification code information from the online electronic wallet server.
  • a method for securely transmitting payment instrument information of online transactions initiated on a client device comprises receiving a payment information request from a merchant server at an online electronic wallet system, selecting by the online electronic wallet system the corresponding payment instrument information, retrieving an encrypted verification code stored on a client device corresponding to the payment instrument information, decrypting the verification code with the an encryption key used to encrypt the verification code prior to storage on the local device, re-encrypting the verification code and the remaining payment instrument information using a merchant-specific encryption key, and communicating the requested payment instrument information to the merchant server.
  • a method for ensuring optimal receipt flow during an electronic transaction comprises receiving at an online electronic wallet system a request for full payment information from a merchant server, verifying by the online electronic wallet system that the request for payment information includes a copy of the online shopping cart information, generating an electronic receipt from the online shopping cart information, and storing the electronic receipt in a user's online electronic wallet account.
  • FIG. 1 is a block diagram depicting an online electronic wallet system according to an exemplary embodiment.
  • FIG. 2 is a block flow diagram depicting a method for conducting secure online purchases using an online electronic wallet system according to an exemplary embodiment.
  • FIG. 3 is a block flow diagram depicting a method for establishing merchant account information with an online electronic wallet system according to an exemplary embodiment.
  • FIG. 4 is a block flow diagram depicting a method for establishing user account information with an online electronic wallet system according to an exemplary embodiment.
  • FIG. 5 is a block flow diagram depicting a method for initiating an online purchase using an online electronic wallet system according to an exemplary embodiment.
  • FIG. 6 is a block flow diagram depicting a method for processing a request for full payment information from a merchant server according to an exemplary embodiment.
  • FIG. 7 is a block flow diagram depicting a method for encrypting payment information stored between an online electronic wallet system according to an exemplary embodiment.
  • the present invention is directed to an online electronic wallet system that lets buyers pass their payment information, shipping address, and other personal information stored within the online electronic wallet system to a specific online commerce merchant for use in a specific online transaction. It supports mobile web, mobile native application, and desktop web buy flows.
  • An exemplary online electronic wallet system comprises a online wallet API library, an online wallet server, a payment instrument server, and a client-device running a browser application or mobile application for communicating with merchant servers, and having a local storage data structure for storing part of a payment instrument's payment information.
  • the online wallet server, payment instrument server, merchant servers, and client devices, collectively “the network devices,” may communicate over a network.
  • the online wallet API library comprises a set of APIs associated with corresponding user interfaces (UIs) that allow a user to initiate an online wallet purchase from within a merchant buy flow such as from a merchant checkout web page.
  • the online wallet server generates one or more user interfaces allowing the user to select the desired payment information from online wallet accounts stored in the payment instrument server and communicates secure payment information to the merchant server for payment processing.
  • a payment instrument server stores one or more payment instruments in an associated online wallet account.
  • a “payment instrument” is a form of payment such as a credit card, stored value card (for example, a gift card), or a debit card.
  • Each payment instrument comprises corresponding payment information, such as credit card number, expiration date, and verification code.
  • the “verification code” represents a portion of complete payment information needed to authorize a payment transaction using a given payment instrument.
  • the verification code may be the CVV of a credit card payment instrument, a short numerical code used to verify gift card payment transactions, or a personal identification number, such as personal identification numbers used in direct carrier billing.
  • FIG. 1 is a block diagram depicting an online electronic wallet system 100 according to an exemplary embodiment.
  • the system 100 includes network devices 105 , 110 , and 120 , that are configured to communicate with one another via one or more networks 115 .
  • Each network 115 includes a wired or wireless telecommunication means by which network devices (including devices 105 , 110 , 120 ) can exchange data.
  • each network 115 can include a local area network (“LAN”), a wide area network (“WAN”), an intranet, an Internet, a mobile telephone network, or any combination thereof.
  • LAN local area network
  • WAN wide area network
  • intranet an Internet
  • Internet a mobile telephone network
  • Each network device 105 , 110 , 120 includes a device having a communication module capable of transmitting and receiving data over the network 115 .
  • each network device 105 , 110 , 120 can include a server, desktop computer, laptop computer, tablet computer, smart phone, handheld computer, personal digital assistant (“PDA”), or any other wired or wireless, processor-driven device.
  • PDA personal digital assistant
  • the network devices 105 , 110 , 120 are operated by end-users or consumers, merchants with an online store or web site, and a an online electronic wallet system operator respectively
  • the client network devices 105 each include an application module 106 and local storage 108 .
  • the application module may be a browser application such as Microsoft Internet Explorer, Firefox, Google Chrome, Safari, or another suitable application for interacting with web page files maintained by the merchant server 110 , online electronic wallet system 120 and/or other network devices.
  • the web page files can include text, graphic, images, sound, video, and other multimedia or data files that can be transmitted via the network 115 .
  • the web page files can include one or more files in the Hypertext Markup Language (“HTML”).
  • the browser application module 106 can receive web page files from the merchant server 110 and/or online electronic wallet system 120 and can display the web page files to end users operating the end user network devices 105 .
  • the application module 106 may also comprise a mobile application that resides on a mobile device of the user 105 .
  • Local storage 108 can include any local data structure on the client device 105 suitable for storing encrypted information, such as HTML5 local storage.
  • the online electronic wallet system (OEWS) 120 comprises a wallet account management module 125 , a verification code encryption module 130 , a payment encryption module 135 , an payment instrument server 140 , a merchant index 145 , a key index 150 , and an online wallet API library 155 .
  • the wallet account management module 125 communicates with client devices 105 and merchant servers 110 to register theses network devices with the OEWS 120 and to facilitate requests and receipt of information between the OEWS 120 , the client devices 105 , and merchant servers 110 .
  • the wallet account management module 125 manages the registration of user and merchant accounts with the OEWS 120 .
  • the wallet account management module 125 may generate web-based user interfaces providing the forms necessary for a user to register for an online electronic wallet account. For example, the wallet account management module 125 can collect basic user identifying information, registration information on one or more mobile devices, and payment information. The user account information is stored in a user account in the payment instrument server 140 .
  • the wallet account management module 125 may likewise provide user-interfaces that provide the forms necessary for a merchant to register account information with the OEWS 120 .
  • Merchant account information including, but not limited to, merchant name, physical address, billing address, and merchant identifier is stored in the merchant index 145 . Registered merchants provide their own merchant-specific encrypting keys which are stored in the key index 150 .
  • the wallet account management module 125 provides the registered merchants with access to the online API library 155 , such as a JavaScript library, comprising the forms and associated UIs required to interface the OEWS 120 with a merchant's purchase flow.
  • the verification code encryption module 130 utilizes a storage encryption key to encode a verification code provided by the user.
  • the encrypted verification code is then stored in local storage 108 , such as HTML5 storage or separate memory, on the user's client device 105 or devices.
  • the verification code encryption module 130 likewise decrypts the encrypted verification code using the storage encryption key when collecting full payment information for communication to a merchant server 110 .
  • the storage encryption key used for encrypting and decrypting the verification code is stored in a key index 150 .
  • the payment encryption module 135 encrypts full payment information with a merchant-specific encryption key prior to communication of full payment information to a merchant server 120 .
  • the OEWS 120 is described in more detail hereinafter with reference to the methods depicted in FIGS. 2-7 .
  • the exemplary embodiments discussed in FIGS. 2-7 will refer to a CVV verification code.
  • the OWES 120 of the present invention may be adapted for use with other verification codes such as those described above in the preceding paragraphs.
  • FIG. 2 is a block flow diagram depicting a method 200 for conducting secure online purchases using the OEWS 120 .
  • the method 200 is described with reference to the components in FIG. 1 .
  • Method 200 begins with block 205 where a merchant who wishes to provide customers with the ability to pay using the OEWS 120 registers with the system.
  • the wallet account management module 125 provides a user interface where the merchant can register basic identifying information such as name and place of business. Block 205 will be described in further detail hereinafter with reference to FIG. 3 .
  • FIG. 3 is a block flow diagram depicting an exemplary process 205 for establishing merchant account information in the OEWS 120 .
  • the process 205 is described with reference to the components illustrated in FIG. 1 .
  • Method 205 begins with block 305 where the OEWS 120 receives merchant registration information from a merchant.
  • the wallet account management module 125 creates a merchant account record in the merchant index 145 and assigns the merchant a merchant-specific identifier.
  • the merchant registration information includes at least a merchant name and business address as well as any banking or payment processing information needed to direct the payment information to the merchant's payment processor.
  • the wallet account management module 125 receives a merchant-specific encryption key from the merchant server 110 .
  • the merchant-specific encryption key is associated with the merchant identifier.
  • the merchant-specific encryption key may be stored with the merchant account record in the merchant index 145 , or may be stored in a separate encryption key index such as the key index 150 .
  • the merchant specific encryption key is a public key of a public/private key pair and used to encrypt a user's full payment instrument information prior to communicating the full payment instrument information to the merchant server as discussed in further detail below regarding FIG. 7 .
  • the wallet account management module 125 communicates the merchant identifier and an online wallet API library 155 to the merchant server 110 .
  • the online wallet API library comprises the APIs and user interfaces needed to integrate the OEWS into a merchant's existing mobile/desktop web purchase flow.
  • the online wallet API may be integrated into native mobile purchase flows, such as integration into a native iOS or Android API.
  • the online payment API library allows the merchant to request masked wallet information for user-selected objects from the payment instrument server, which is returned to the merchant for display and logic in their purchase flow with the user. The request may further involve user interaction with a buyer interface generated by the online wallet server to authenticate the user and/or select wallet instruments.
  • the payment wallet API library 155 also allows the merchant to send the final order information to an OEWS 120 when the buyer indicates their intent to complete the purchase, and to receive the full details of the buyer's online shopping cart.
  • the process for initiating an online transaction using the online wallet API library is discussed in further detail below in reference to FIG. 5 and FIG. 6 .
  • Block 210 where a client device 105 establishes an online electronic wallet account by registering with the OEWS 120 .
  • Block 210 will be described in further detail hereinafter with reference to FIG. 4 .
  • FIG. 4 is a block flow diagram depicting a process 210 for establishing user account information in the OEWS 120 .
  • the process 210 is described with reference to the components illustrated in FIG. 1 .
  • Process 210 begins with block 405 where the online electronic wallet system 120 receives a user's electronic wallet registration information.
  • the wallet account management module 125 creates a user online electronic wallet account record in the payment instrument server 140 and assigns the user a user identifier.
  • the online wallet account management module may further register one or more client device identifiers with the user's account.
  • the client device identifier may be used in place of, or in addition to, the user identifier to verify that an online transaction has been initiated by a user registered with the OEWS 120 .
  • the wallet account management module 125 receives one or more payment instruments for a user's wallet account. All payment instrument information for each payment instrument, except the CVV, is stored by the wallet account management module 125 in the user's account in the payment instrument server 140 .
  • the payment instrument information that is stored in a user's account in the payment instrument server 140 is referred to as “partial payment information.”
  • the payment instrument server 140 may reside in a physically distinct location from the rest of the OEWS 120 .
  • the payment instrument server 140 may be a high security server with limited access privileges separate from those needed to access the rest of the OEWS 120 .
  • the verification encryption module 130 uses a storage encryption key to encrypt the CVV information and create an encrypted CVV.
  • the storage encrypted key is a public/private key pair.
  • the CVV is encrypted with the public key of a public/private key pair, and decrypted with the private key of the public/private key pair.
  • the CVV may be encrypted with one or more keys.
  • the CVV may be encrypted with a first key type and then encrypted again with a second key type.
  • the CVV may be encrypted with a AES key, such as an AES-256 session key, and the AES key in turn may be encrypted with a RSA key.
  • the OEWS 120 may utilize a single public/private key pair, multiple public/private key pairs for each defined set of user accounts, or individual public/private key pairs for each individual account.
  • the existing public/private key pairs may be regularly rotated for new public/private key pairs according to a defined security protocol.
  • the public/private key pairs are stored in the key index 150 .
  • a key hint may be stored in the user's account and used to select the appropriate key for later decryption.
  • the wallet account management module 125 communicates a an encrypted CVV to the registered client device or devices.
  • the communication from the wallet account management module 125 includes instructions directing the storage of the encrypted CVV in a local storage data structure 108 , such as HTML5 local storage, on the client device 105 .
  • the client device 105 stores the encrypted CVV in local storage 108 .
  • the online wallet API library 155 may further include a storage API or application that is resident on the client device 105 and used to direct storage of the encrypted CVV in the local storage data structure 108 .
  • the wallet account management module 125 deletes the unencrypted and encrypted CVV from the OEWS 120 .
  • Block 215 where an online purchase is initiated on a client device 105 via interaction with an online merchant web site hosted by the merchant server 110 .
  • Block 215 will be described in further detail hereinafter with reference to FIG. 5 .
  • FIG. 5 is a block flow diagram depicting a process 215 where an online purchase is initiated using the OEWS 120 .
  • the process 215 is described with reference to the components in FIG. 1 .
  • Process 215 begins at block 505 , where a user, registered with the OEWS 120 selects an item or items to purchase on an online merchant web site hosted by a merchant server 110 from their client device 105 .
  • the items may be placed into an online shopping cart or other suitable item tracking device provided by the merchant server 110 .
  • the user communicates to the merchant server 110 , from their client device 105 , an intent to use the OEWS 120 .
  • the online API may generate a button for display on the purchase web page of the merchant's web site. Clicking on the button, by the user, communicates to the merchant server 110 that the user intends to use their online electronic wallet account to complete the purchase.
  • the merchant server 110 communicates a request for masked payment information to the OEWS 120 comprising at least a user identifier and a transaction identifier.
  • a user identifier is not communicated to the merchant server 110 .
  • a request function resident in the online API library 155 communicates a request to the client device 105 to communicate the user identifier and a corresponding transaction identifier directly to the OEWS 120 .
  • the API library 155 may further comprise a payment request API or application resident on the client device 105 to communicate a request for masked and full payment information.
  • masked payment information refers to a portion of payment information, such as the last four digits of a credit card number, sufficient to allow a user to confirm the selected payment instrument, but constituting less than the payment instrument's complete payment information.
  • the wallet account management module 125 receives the masked payment information request from the merchant server 110 and the user identifier from the merchant server 110 or client device 105
  • the wallet account management module 125 selects the corresponding user payment instrument information and generates the masked payment information based on the user identifier. Where the wallet account management module 125 receives a user identifier and transaction identifier from the client device 105 and a transaction identifier from the merchant server 110 as referenced in block 515 , the wallet account management module 125 may first verify that the transaction identifiers received from the client device 105 and merchant server 110 match before selecting the user's payment information. The extent of the payment instrument information to be provided in the masked payment information can be pre-defined by an operator of the OEWS 120 .
  • the wallet account management module 125 communicates the masked payment information and transaction identifier to the merchant server 110 .
  • the wallet account management module 125 stores the transaction identifier with the merchant's account information.
  • the wallet account management module 125 may further assign a confirmation number to the transaction identifier to confirm a latter request for full payment account information.
  • the merchant server 110 communicates the masked payment information to the client device 105 by displaying the masked payment information on the appropriate web page of the merchant's buy flow.
  • the online API library 155 further generates a button for confirmation of selected payment information where the user may click to confirm they wish to utilize the selected payment instrument or change the selected payment instrument.
  • the merchant server 110 receives confirmation of the payment instrument from the client device 105 . Where a user indicates they wish to change the payment instrument, blocks 510 - 540 are repeated before proceeding to block 545 .
  • the merchant server 110 communicates a request for full payment information to the OEWS 120 .
  • the request for full payment information comprises at least a merchant identifier, a transaction identifier, a user identifier, a final online shopping cart, listing at least the items to be purchased and the purchase price, and optionally a confirmation identifier if previously assigned by the OEWS 120 as described in block 530 above.
  • a request function resident in the online API library 155 will request the client device communicate the user identifier and corresponding transaction identifier directly to the OEWS 120 upon initiation of a request for full payment information by the merchant server 110 .
  • the wallet account management module 125 receives the request for full payment information from the merchant server 110 or client device 105 . Block 545 will be described in further detail hereinafter with reference to FIG. 6 .
  • FIG. 6 is a block flow diagram depicting a process 545 for processing a request for full payment information from a merchant server 110 .
  • the process 545 is described with reference to the components in FIG. 1 .
  • the process 545 begins at block 605 , where the wallet account management module 125 receives the request for full payment information from the merchant server 110 .
  • the wallet account management module 125 determines if the request for full payment information included the final online shopping cart information for the purchase, or if sufficient information is otherwise available to generate a receipt for the transaction. If not, the process 545 proceeds to block 615 .
  • Block 610 can require that the merchant server 110 provide sufficient information to complete a receipt for the transaction.
  • the information for the receipt can comprise one or more of product identification, price per product, quantity of each product, tax, total price, merchant identification information, date/time of transaction, or any other suitable information that may be included on a receipt.
  • the wallet account management module 125 may obtain portions of the receipt information from the shopping cart information, from other information provided by the merchant, or from other information sources available to the wallet account management module 125 . For example, merchant identification information may be extracted from previous information provided by the merchant server 110 . Additionally, the wallet account management module 125 may obtain the date/time information for the transaction from an internal date and time source. The wallet account management module 125 determines in block 610 whether sufficient information is available from all sources to generate a receipt for the transaction.
  • the wallet account management module 125 communicates a request for the online shopping cart information sufficient to generate a receipt for the transaction to the merchant server 110 .
  • the payment process will not continue without receipt of the online shopping cart information.
  • the wallet account management module 125 will time out the process and cancel the transaction if a response is not received from the merchant server 110 with a defined period of time.
  • the wallet account management module 125 generates an electronic receipt from the online shopping cart information and, if needed, other available information.
  • the electronic receipt can include a simple copy of the online shopping cart information as received from the merchant, or the information contained in the online shopping cart can be extracted and reformatted in a standardized receipt format defined within the wallet account management module 125 .
  • the wallet account management module 125 stores the electronic receipt with the user's account information. The method 545 then proceeds to block 550 of FIG. 5 .
  • Block 550 the OEWS 120 encrypts the full payment information for communication to the merchant server 110 .
  • Block 550 will be described in further detail hereinafter with reference to FIG. 7 .
  • FIG. 7 is a block flow diagram depicting a process 550 for encrypting payment information stored between the OEWS 120 and a client device 105 .
  • the process 550 is described with reference to the components in FIG. 1 .
  • the process 550 begins at block 705 where the wallet account management module 125 selects the payment instrument information stored in the user's account based on the user identifier included in the request for full payment information received from the merchant server 110 at block 545 of FIG. 5 .
  • the wallet account manager 125 then communicates a request for the user's encrypted CVV stored in local storage 108 in the user's mobile device 105 based on the user identifier.
  • the wallet account management module 125 receives the encrypted CVV from the client device 105 .
  • the verification code encryption module 130 selects the appropriate storage key or keys and decrypts the CVV.
  • the payment encryption module 135 takes the payment information selected by the wallet account management module 125 from the user's account in the payment instrument server 140 and the CVV decrypted by the verification code encryption module 130 and re-encrypts the full payment information, including the CVV, using the merchant specific encryption key.
  • the payment encryption module 135 selects the appropriate merchant-specific encryption key from the merchant's account using the merchant identifier included in the full payment information request to generate an encrypted full payment information communication.
  • the payment encryption module 135 deletes the decrypted and re-encrypted CVV from the OEWS 120 and the method returns to block 220 of FIG. 2 .
  • the wallet account management module 125 completes the transaction by communicating the encrypted full payment information package to the merchant server 110 for final payment processing.
  • One or more aspects of the exemplary embodiments may include a computer program that embodies the functions described and illustrated herein, wherein the computer program is implemented in a computer system that comprises instructions stored in a machine-readable medium and a processor that executes the instructions.
  • the exemplary embodiments should not be construed as limited to any one set of computer program instructions.
  • a skilled programmer would be able to write such a computer program to implement an embodiment based on the appended flow charts and associated description in the application text. Therefore, disclosure of a particular set of program code instructions is not considered necessary for an adequate understanding of how to make and use the exemplary embodiments.
  • any reference to an act being performed by a computer should not be construed as being performed by a single computer as more than one computer may perform the act.
  • the invention can be used with computer hardware and software that performs the methods and processing functions described above.
  • the systems, methods, and procedures described herein can be embodied in a programmable computer, computer executable software, or digital circuitry.
  • the software can be stored on computer readable media.
  • computer readable media can include a floppy disk, RAM, ROM, hard disk, removable media, flash memory, memory stick, optical media, magneto-optical media, CD-ROM, etc.
  • Digital circuitry can include integrated circuits, gate arrays, building block logic, field programmable gate arrays (“FPGA”), etc.

Landscapes

  • Business, Economics & Management (AREA)
  • Accounting & Taxation (AREA)
  • Engineering & Computer Science (AREA)
  • Finance (AREA)
  • Theoretical Computer Science (AREA)
  • Strategic Management (AREA)
  • Physics & Mathematics (AREA)
  • General Business, Economics & Management (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Computer Security & Cryptography (AREA)
  • Development Economics (AREA)
  • Economics (AREA)
  • Marketing (AREA)
  • Signal Processing (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)
  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)

Abstract

An online electronic wallet system and method provide secure storage and transmission of payment instrument information for use in completing online purchases initiated from a client device. A payment instrument's verification code is stored in an encrypted form in local storage on a client device and retrieved and re-encrypted along with other payment instrument information stored on the system using a merchant-specific key. An API library is used to integrate the online electronic wallet system with a registered merchant's purchase flow, including the ability to ensure receipt of an electronic receipt prior to communicating payment instrument information to a merchant server.

Description

    RELATED APPLICATIONS
  • This application claims priority to U.S. Provisional Patent Application No. 61/559,140 filed Nov. 13, 2011 and entitled “Online Wallet System.” The entire contents of the above-identified priority application are hereby fully incorporated herein by reference.
  • TECHNICAL FIELD
  • The present disclosure relates generally to systems and methods for completing online purchases initiated on client devices, such as mobile devices. More particularly, the present invention provides systems and methods for the secure storage and transmission of payment information using an online electronic wallet.
  • BACKGROUND
  • An increasing number of purchases are made online In addition, the growth in mobile client devices, such as smart phones and tablet computers, has enabled consumers to make online purchases on the go. However, providing the necessary payment instrument information can be laborious when working from these types of client devices. Accordingly, it is desirable to have a secure payment mechanism that requires minimal data entry on the user's part to complete the online transaction. One way to address this situation is to store a user's payment information in a payment instrument server and to allow the user to select the payment instrument they would like to use to complete an online purchase. However, limitations to this online wallet approach exist. Primarily, regulatory limitations exist regarding how much payment information may be permanently stored on a payment instrument server. For example, current regulations mandate that a consumers card verification value (CVV) may not be stored on third party payment instrument server.
  • Accordingly, a need exists for providing a way to securely store verification codes, such as CVV information, apart from the rest of the payment instrument information, retrieve the verification code information and remaining payment instrument information in response to a user's initiation of an online purchase, and securely communicate the payment instrument information to an online merchant server with minimal data input from the user.
  • In addition, when completing online transactions, it is often the case that the consumer does not receive a final listing of items purchased in their online shopping cart, or online receipt, until after payment instrument information has been provided and processed by the merchant server. In some instances, a merchant server may not provide this information, and in other instances interruptions in communication between the purchaser's device and merchant server can result in the failure to receive a final receipt.
  • Accordingly, a need exists for payment process flows that ensure the purchaser receives an online receipt prior to communicating payment instrument information to a merchant server.
  • SUMMARY
  • In certain exemplary aspects, a method for secure storage of payment instrument information comprises receiving, at an online electronic wallet system, payment instrument information from a user, storing the payment instrument information, minus a verification code, in the online electronic wallet system, encrypting the verification code with an encryption key, storing the verification code in local storage on one or more client devices, and deleting the verification code and encrypted verification code information from the online electronic wallet server.
  • In certain other exemplary aspects, a method for securely transmitting payment instrument information of online transactions initiated on a client device comprises receiving a payment information request from a merchant server at an online electronic wallet system, selecting by the online electronic wallet system the corresponding payment instrument information, retrieving an encrypted verification code stored on a client device corresponding to the payment instrument information, decrypting the verification code with the an encryption key used to encrypt the verification code prior to storage on the local device, re-encrypting the verification code and the remaining payment instrument information using a merchant-specific encryption key, and communicating the requested payment instrument information to the merchant server.
  • In certain other exemplary aspects, a method for ensuring optimal receipt flow during an electronic transaction comprises receiving at an online electronic wallet system a request for full payment information from a merchant server, verifying by the online electronic wallet system that the request for payment information includes a copy of the online shopping cart information, generating an electronic receipt from the online shopping cart information, and storing the electronic receipt in a user's online electronic wallet account.
  • These and other aspects, objects, features, and advantages of the exemplary embodiments will become apparent to those having ordinary skill in the art upon consideration of the following detailed description of illustrated exemplary embodiments, which include the best mode of carrying out the invention as presently perceived.
  • BRIEF DESCRIPTION OF THE DRAWINGS
  • FIG. 1 is a block diagram depicting an online electronic wallet system according to an exemplary embodiment.
  • FIG. 2 is a block flow diagram depicting a method for conducting secure online purchases using an online electronic wallet system according to an exemplary embodiment.
  • FIG. 3 is a block flow diagram depicting a method for establishing merchant account information with an online electronic wallet system according to an exemplary embodiment.
  • FIG. 4 is a block flow diagram depicting a method for establishing user account information with an online electronic wallet system according to an exemplary embodiment.
  • FIG. 5 is a block flow diagram depicting a method for initiating an online purchase using an online electronic wallet system according to an exemplary embodiment.
  • FIG. 6 is a block flow diagram depicting a method for processing a request for full payment information from a merchant server according to an exemplary embodiment.
  • FIG. 7 is a block flow diagram depicting a method for encrypting payment information stored between an online electronic wallet system according to an exemplary embodiment.
  • DETAILED DESCRIPTION OF EXEMPLARY EMBODIMENTS Overview
  • The present invention is directed to an online electronic wallet system that lets buyers pass their payment information, shipping address, and other personal information stored within the online electronic wallet system to a specific online commerce merchant for use in a specific online transaction. It supports mobile web, mobile native application, and desktop web buy flows. An exemplary online electronic wallet system comprises a online wallet API library, an online wallet server, a payment instrument server, and a client-device running a browser application or mobile application for communicating with merchant servers, and having a local storage data structure for storing part of a payment instrument's payment information. The online wallet server, payment instrument server, merchant servers, and client devices, collectively “the network devices,” may communicate over a network. The online wallet API library comprises a set of APIs associated with corresponding user interfaces (UIs) that allow a user to initiate an online wallet purchase from within a merchant buy flow such as from a merchant checkout web page. The online wallet server generates one or more user interfaces allowing the user to select the desired payment information from online wallet accounts stored in the payment instrument server and communicates secure payment information to the merchant server for payment processing. A payment instrument server stores one or more payment instruments in an associated online wallet account. A “payment instrument” is a form of payment such as a credit card, stored value card (for example, a gift card), or a debit card. Each payment instrument comprises corresponding payment information, such as credit card number, expiration date, and verification code. The “verification code” represents a portion of complete payment information needed to authorize a payment transaction using a given payment instrument. For example, the verification code may be the CVV of a credit card payment instrument, a short numerical code used to verify gift card payment transactions, or a personal identification number, such as personal identification numbers used in direct carrier billing.
  • The inventive functionality of the invention will be explained in more detail in the following description, read in conjunction with the figures illustrating the program flow.
  • Turning now to the drawings, in which like numerals indicate like (but not necessarily identical) elements throughout the figures, exemplary embodiments are described in detail.
  • System Architecture
  • FIG. 1 is a block diagram depicting an online electronic wallet system 100 according to an exemplary embodiment. As depicted in FIG. 1, the system 100 includes network devices 105, 110, and 120, that are configured to communicate with one another via one or more networks 115.
  • Each network 115 includes a wired or wireless telecommunication means by which network devices (including devices 105, 110, 120) can exchange data. For example, each network 115 can include a local area network (“LAN”), a wide area network (“WAN”), an intranet, an Internet, a mobile telephone network, or any combination thereof. Throughout the discussion of exemplary embodiments, it should be understood that the terms “data” and “information” are used interchangeably herein to refer to text, images, audio, video, or any other form of information that can exist in a computer-based environment.
  • Each network device 105, 110, 120 includes a device having a communication module capable of transmitting and receiving data over the network 115. For example, each network device 105, 110, 120 can include a server, desktop computer, laptop computer, tablet computer, smart phone, handheld computer, personal digital assistant (“PDA”), or any other wired or wireless, processor-driven device. In the exemplary embodiment depicted in FIG. 1, the network devices 105, 110, 120 are operated by end-users or consumers, merchants with an online store or web site, and a an online electronic wallet system operator respectively
  • The client network devices 105 each include an application module 106 and local storage 108. The application module may be a browser application such as Microsoft Internet Explorer, Firefox, Google Chrome, Safari, or another suitable application for interacting with web page files maintained by the merchant server 110, online electronic wallet system 120 and/or other network devices. The web page files can include text, graphic, images, sound, video, and other multimedia or data files that can be transmitted via the network 115. For example, the web page files can include one or more files in the Hypertext Markup Language (“HTML”). The browser application module 106 can receive web page files from the merchant server 110 and/or online electronic wallet system 120 and can display the web page files to end users operating the end user network devices 105. The application module 106 may also comprise a mobile application that resides on a mobile device of the user 105. Local storage 108 can include any local data structure on the client device 105 suitable for storing encrypted information, such as HTML5 local storage.
  • In one exemplary embodiment, the online electronic wallet system (OEWS) 120 comprises a wallet account management module 125, a verification code encryption module 130, a payment encryption module 135, an payment instrument server 140, a merchant index 145, a key index 150, and an online wallet API library 155. The wallet account management module 125 communicates with client devices 105 and merchant servers 110 to register theses network devices with the OEWS 120 and to facilitate requests and receipt of information between the OEWS 120, the client devices 105, and merchant servers 110. The wallet account management module 125 manages the registration of user and merchant accounts with the OEWS 120. Regarding user account registration, the wallet account management module 125 may generate web-based user interfaces providing the forms necessary for a user to register for an online electronic wallet account. For example, the wallet account management module 125 can collect basic user identifying information, registration information on one or more mobile devices, and payment information. The user account information is stored in a user account in the payment instrument server 140. Regarding merchant account registration, the wallet account management module 125 may likewise provide user-interfaces that provide the forms necessary for a merchant to register account information with the OEWS 120. Merchant account information including, but not limited to, merchant name, physical address, billing address, and merchant identifier is stored in the merchant index 145. Registered merchants provide their own merchant-specific encrypting keys which are stored in the key index 150. In addition, the wallet account management module 125 provides the registered merchants with access to the online API library 155, such as a JavaScript library, comprising the forms and associated UIs required to interface the OEWS 120 with a merchant's purchase flow. The verification code encryption module 130 utilizes a storage encryption key to encode a verification code provided by the user. The encrypted verification code is then stored in local storage 108, such as HTML5 storage or separate memory, on the user's client device 105 or devices. The verification code encryption module 130 likewise decrypts the encrypted verification code using the storage encryption key when collecting full payment information for communication to a merchant server 110. The storage encryption key used for encrypting and decrypting the verification code is stored in a key index 150. The payment encryption module 135 encrypts full payment information with a merchant-specific encryption key prior to communication of full payment information to a merchant server 120.
  • The OEWS 120 is described in more detail hereinafter with reference to the methods depicted in FIGS. 2-7. For ease of reference, the exemplary embodiments discussed in FIGS. 2-7 will refer to a CVV verification code. However, the OWES 120 of the present invention may be adapted for use with other verification codes such as those described above in the preceding paragraphs.
  • System Process
  • FIG. 2 is a block flow diagram depicting a method 200 for conducting secure online purchases using the OEWS 120. The method 200 is described with reference to the components in FIG. 1.
  • Method 200 begins with block 205 where a merchant who wishes to provide customers with the ability to pay using the OEWS 120 registers with the system. The wallet account management module 125 provides a user interface where the merchant can register basic identifying information such as name and place of business. Block 205 will be described in further detail hereinafter with reference to FIG. 3.
  • FIG. 3 is a block flow diagram depicting an exemplary process 205 for establishing merchant account information in the OEWS 120. The process 205 is described with reference to the components illustrated in FIG. 1.
  • Method 205 begins with block 305 where the OEWS 120 receives merchant registration information from a merchant. The wallet account management module 125 creates a merchant account record in the merchant index 145 and assigns the merchant a merchant-specific identifier. The merchant registration information includes at least a merchant name and business address as well as any banking or payment processing information needed to direct the payment information to the merchant's payment processor.
  • At block 310, the wallet account management module 125 receives a merchant-specific encryption key from the merchant server 110.
  • At block 315, the merchant-specific encryption key is associated with the merchant identifier. The merchant-specific encryption key may be stored with the merchant account record in the merchant index 145, or may be stored in a separate encryption key index such as the key index 150. The merchant specific encryption key is a public key of a public/private key pair and used to encrypt a user's full payment instrument information prior to communicating the full payment instrument information to the merchant server as discussed in further detail below regarding FIG. 7.
  • At block 320 the wallet account management module 125 communicates the merchant identifier and an online wallet API library 155 to the merchant server 110. The online wallet API library comprises the APIs and user interfaces needed to integrate the OEWS into a merchant's existing mobile/desktop web purchase flow. Alternatively, the online wallet API may be integrated into native mobile purchase flows, such as integration into a native iOS or Android API. The online payment API library allows the merchant to request masked wallet information for user-selected objects from the payment instrument server, which is returned to the merchant for display and logic in their purchase flow with the user. The request may further involve user interaction with a buyer interface generated by the online wallet server to authenticate the user and/or select wallet instruments. The payment wallet API library 155 also allows the merchant to send the final order information to an OEWS 120 when the buyer indicates their intent to complete the purchase, and to receive the full details of the buyer's online shopping cart. The process for initiating an online transaction using the online wallet API library is discussed in further detail below in reference to FIG. 5 and FIG. 6.
  • Returning to FIG. 2, at block 210 where a client device 105 establishes an online electronic wallet account by registering with the OEWS 120. Block 210 will be described in further detail hereinafter with reference to FIG. 4.
  • FIG. 4 is a block flow diagram depicting a process 210 for establishing user account information in the OEWS 120. The process 210 is described with reference to the components illustrated in FIG. 1.
  • Process 210 begins with block 405 where the online electronic wallet system 120 receives a user's electronic wallet registration information.
  • At block 410, the wallet account management module 125 creates a user online electronic wallet account record in the payment instrument server 140 and assigns the user a user identifier. The online wallet account management module may further register one or more client device identifiers with the user's account. In certain exemplary embodiments, the client device identifier may be used in place of, or in addition to, the user identifier to verify that an online transaction has been initiated by a user registered with the OEWS 120.
  • At block 415, the wallet account management module 125 receives one or more payment instruments for a user's wallet account. All payment instrument information for each payment instrument, except the CVV, is stored by the wallet account management module 125 in the user's account in the payment instrument server 140. As used herein, the payment instrument information that is stored in a user's account in the payment instrument server 140 is referred to as “partial payment information.” In certain exemplary embodiments, the payment instrument server 140 may reside in a physically distinct location from the rest of the OEWS 120. In certain exemplary embodiments, the payment instrument server 140 may be a high security server with limited access privileges separate from those needed to access the rest of the OEWS 120.
  • At block 420, the verification encryption module 130 uses a storage encryption key to encrypt the CVV information and create an encrypted CVV. In certain exemplary embodiments, the storage encrypted key is a public/private key pair. In certain exemplary embodiments, the CVV is encrypted with the public key of a public/private key pair, and decrypted with the private key of the public/private key pair. In one exemplary embodiment, the CVV may be encrypted with one or more keys. For example, the CVV may be encrypted with a first key type and then encrypted again with a second key type. For example, the CVV may be encrypted with a AES key, such as an AES-256 session key, and the AES key in turn may be encrypted with a RSA key. The OEWS 120 may utilize a single public/private key pair, multiple public/private key pairs for each defined set of user accounts, or individual public/private key pairs for each individual account. The existing public/private key pairs may be regularly rotated for new public/private key pairs according to a defined security protocol. The public/private key pairs are stored in the key index 150. In certain exemplary embodiments, a key hint may be stored in the user's account and used to select the appropriate key for later decryption.
  • At block 425, the wallet account management module 125 communicates a an encrypted CVV to the registered client device or devices. The communication from the wallet account management module 125 includes instructions directing the storage of the encrypted CVV in a local storage data structure 108, such as HTML5 local storage, on the client device 105.
  • At block 430, the client device 105 stores the encrypted CVV in local storage 108. In certain exemplary embodiments, the online wallet API library 155 may further include a storage API or application that is resident on the client device 105 and used to direct storage of the encrypted CVV in the local storage data structure 108.
  • At block 435, the wallet account management module 125 deletes the unencrypted and encrypted CVV from the OEWS 120.
  • Returning to FIG. 2, at block 215 where an online purchase is initiated on a client device 105 via interaction with an online merchant web site hosted by the merchant server 110. Block 215 will be described in further detail hereinafter with reference to FIG. 5.
  • FIG. 5 is a block flow diagram depicting a process 215 where an online purchase is initiated using the OEWS 120. The process 215 is described with reference to the components in FIG. 1.
  • Process 215 begins at block 505, where a user, registered with the OEWS 120 selects an item or items to purchase on an online merchant web site hosted by a merchant server 110 from their client device 105. The items may be placed into an online shopping cart or other suitable item tracking device provided by the merchant server 110.
  • At block 510, the user communicates to the merchant server 110, from their client device 105, an intent to use the OEWS 120. In certain exemplary embodiments, the online API may generate a button for display on the purchase web page of the merchant's web site. Clicking on the button, by the user, communicates to the merchant server 110 that the user intends to use their online electronic wallet account to complete the purchase.
  • At block 515, the merchant server 110 communicates a request for masked payment information to the OEWS 120 comprising at least a user identifier and a transaction identifier. In certain exemplary embodiments, a user identifier is not communicated to the merchant server 110. Instead, a request function resident in the online API library 155 communicates a request to the client device 105 to communicate the user identifier and a corresponding transaction identifier directly to the OEWS 120. In certain exemplary embodiments the API library 155 may further comprise a payment request API or application resident on the client device 105 to communicate a request for masked and full payment information. As used herein “masked payment information” refers to a portion of payment information, such as the last four digits of a credit card number, sufficient to allow a user to confirm the selected payment instrument, but constituting less than the payment instrument's complete payment information.
  • At block 520, the wallet account management module 125 receives the masked payment information request from the merchant server 110 and the user identifier from the merchant server 110 or client device 105
  • At block 525, the wallet account management module 125 selects the corresponding user payment instrument information and generates the masked payment information based on the user identifier. Where the wallet account management module 125 receives a user identifier and transaction identifier from the client device 105 and a transaction identifier from the merchant server 110 as referenced in block 515, the wallet account management module 125 may first verify that the transaction identifiers received from the client device 105 and merchant server 110 match before selecting the user's payment information. The extent of the payment instrument information to be provided in the masked payment information can be pre-defined by an operator of the OEWS 120.
  • At block 530, the wallet account management module 125 communicates the masked payment information and transaction identifier to the merchant server 110. The wallet account management module 125 stores the transaction identifier with the merchant's account information. In certain exemplary embodiments, the wallet account management module 125 may further assign a confirmation number to the transaction identifier to confirm a latter request for full payment account information.
  • At block 535, the merchant server 110 communicates the masked payment information to the client device 105 by displaying the masked payment information on the appropriate web page of the merchant's buy flow. In certain exemplary embodiments, the online API library 155 further generates a button for confirmation of selected payment information where the user may click to confirm they wish to utilize the selected payment instrument or change the selected payment instrument.
  • At block 540, the merchant server 110 receives confirmation of the payment instrument from the client device 105. Where a user indicates they wish to change the payment instrument, blocks 510-540 are repeated before proceeding to block 545.
  • At block 545, the merchant server 110 communicates a request for full payment information to the OEWS 120. The request for full payment information comprises at least a merchant identifier, a transaction identifier, a user identifier, a final online shopping cart, listing at least the items to be purchased and the purchase price, and optionally a confirmation identifier if previously assigned by the OEWS 120 as described in block 530 above. As with the masked payment information request, if the user identifier is not communicated directly to the merchant server 110, a request function resident in the online API library 155 will request the client device communicate the user identifier and corresponding transaction identifier directly to the OEWS 120 upon initiation of a request for full payment information by the merchant server 110.
  • At block 545, the wallet account management module 125 receives the request for full payment information from the merchant server 110 or client device 105. Block 545 will be described in further detail hereinafter with reference to FIG. 6.
  • FIG. 6 is a block flow diagram depicting a process 545 for processing a request for full payment information from a merchant server 110. The process 545 is described with reference to the components in FIG. 1.
  • The process 545 begins at block 605, where the wallet account management module 125 receives the request for full payment information from the merchant server 110.
  • At block 610, the wallet account management module 125 determines if the request for full payment information included the final online shopping cart information for the purchase, or if sufficient information is otherwise available to generate a receipt for the transaction. If not, the process 545 proceeds to block 615.
  • Block 610 can require that the merchant server 110 provide sufficient information to complete a receipt for the transaction. In exemplary embodiments, the information for the receipt can comprise one or more of product identification, price per product, quantity of each product, tax, total price, merchant identification information, date/time of transaction, or any other suitable information that may be included on a receipt. The wallet account management module 125 may obtain portions of the receipt information from the shopping cart information, from other information provided by the merchant, or from other information sources available to the wallet account management module 125. For example, merchant identification information may be extracted from previous information provided by the merchant server 110. Additionally, the wallet account management module 125 may obtain the date/time information for the transaction from an internal date and time source. The wallet account management module 125 determines in block 610 whether sufficient information is available from all sources to generate a receipt for the transaction.
  • At block 615, the wallet account management module 125 communicates a request for the online shopping cart information sufficient to generate a receipt for the transaction to the merchant server 110. In an exemplary embodiment, the payment process will not continue without receipt of the online shopping cart information. In certain exemplary embodiments, the wallet account management module 125 will time out the process and cancel the transaction if a response is not received from the merchant server 110 with a defined period of time.
  • Returning to block 610, if the request does include online shopping cart information, or if sufficient information to generate the receipt is otherwise available, then the process 545 proceeds to block 620.
  • At block 620, the wallet account management module 125 generates an electronic receipt from the online shopping cart information and, if needed, other available information. The electronic receipt can include a simple copy of the online shopping cart information as received from the merchant, or the information contained in the online shopping cart can be extracted and reformatted in a standardized receipt format defined within the wallet account management module 125.
  • At block 625, the wallet account management module 125 stores the electronic receipt with the user's account information. The method 545 then proceeds to block 550 of FIG. 5.
  • Returning to FIG. 5 at block 550, the OEWS 120 encrypts the full payment information for communication to the merchant server 110. Block 550 will be described in further detail hereinafter with reference to FIG. 7.
  • FIG. 7 is a block flow diagram depicting a process 550 for encrypting payment information stored between the OEWS 120 and a client device 105. The process 550 is described with reference to the components in FIG. 1.
  • The process 550 begins at block 705 where the wallet account management module 125 selects the payment instrument information stored in the user's account based on the user identifier included in the request for full payment information received from the merchant server 110 at block 545 of FIG. 5.
  • At block 710, the wallet account manager 125 then communicates a request for the user's encrypted CVV stored in local storage 108 in the user's mobile device 105 based on the user identifier.
  • At block 715, the wallet account management module 125 receives the encrypted CVV from the client device 105. The verification code encryption module 130 selects the appropriate storage key or keys and decrypts the CVV.
  • At block 720, the payment encryption module 135 takes the payment information selected by the wallet account management module 125 from the user's account in the payment instrument server 140 and the CVV decrypted by the verification code encryption module 130 and re-encrypts the full payment information, including the CVV, using the merchant specific encryption key. The payment encryption module 135 selects the appropriate merchant-specific encryption key from the merchant's account using the merchant identifier included in the full payment information request to generate an encrypted full payment information communication.
  • At block 725, the payment encryption module 135 deletes the decrypted and re-encrypted CVV from the OEWS 120 and the method returns to block 220 of FIG. 2.
  • Returning to FIG. 2 at block 220, the wallet account management module 125 completes the transaction by communicating the encrypted full payment information package to the merchant server 110 for final payment processing.
  • General
  • One or more aspects of the exemplary embodiments may include a computer program that embodies the functions described and illustrated herein, wherein the computer program is implemented in a computer system that comprises instructions stored in a machine-readable medium and a processor that executes the instructions. However, it should be apparent that there could be many different ways of implementing the exemplary embodiments in computer programming, and the exemplary embodiments should not be construed as limited to any one set of computer program instructions. Further, a skilled programmer would be able to write such a computer program to implement an embodiment based on the appended flow charts and associated description in the application text. Therefore, disclosure of a particular set of program code instructions is not considered necessary for an adequate understanding of how to make and use the exemplary embodiments. Moreover, any reference to an act being performed by a computer should not be construed as being performed by a single computer as more than one computer may perform the act.
  • The exemplary systems, methods, and blocks described in the embodiments presented previously are illustrative, and, in alternative embodiments, certain blocks can be performed in a different order, in parallel with one another, omitted entirely, and/or combined between different exemplary methods, and/or certain additional blocks can be performed, without departing from the scope and spirit of the invention. Accordingly, such alternative embodiments are included in the invention described herein.
  • The invention can be used with computer hardware and software that performs the methods and processing functions described above. As will be appreciated by those having ordinary skill in the art, the systems, methods, and procedures described herein can be embodied in a programmable computer, computer executable software, or digital circuitry. The software can be stored on computer readable media. For example, computer readable media can include a floppy disk, RAM, ROM, hard disk, removable media, flash memory, memory stick, optical media, magneto-optical media, CD-ROM, etc. Digital circuitry can include integrated circuits, gate arrays, building block logic, field programmable gate arrays (“FPGA”), etc.
  • Although specific embodiments of the invention have been described above in detail, the description is merely for purposes of illustration. Various modifications of, and equivalent blocks and components corresponding to, the disclosed aspects of the exemplary embodiments, in addition to those described above, can be made by those having ordinary skill in the art without departing from the spirit and scope of the invention defined in the following claims, the scope of which is to be accorded the broadest interpretation so as to encompass such modifications and equivalent structures.

Claims (23)

1. A computer-implemented method for securely storing and retrieving payment information from multiple devices across a payment network, comprising:
receiving, at an online wallet server, payment instrument information of a registered user, the payment information comprising a payment account number and code verification value (“CVV”), the online wallet server comprising a processor and a memory that stores the payment account number with a user identifier assigned to the registered user;
encrypting, by the online wallet server, the CVV using an encryption key;
communicating, by the online wallet server, a data package to a remote registered user device, the data package comprising the encrypted CVV and a set of computer-executable instructions that when executed by the remote registered user device cause the remote registered user device to store the encrypted CVV in a local data structure on the remote registered user device;
retrieving, by the online wallet server, the encrypted CVV in response to receiving a request for payment information from a merchant server by communicating a request to the registered user device that causes the registered user device to retrieve the encrypted CVV from the local data structure on the remote registered user device and communicate it to the online wallet server.
2. The method of claim 1, wherein the payment instrument is a credit card.
3. The method of claim 1, wherein the online wallet server encrypts the CVV using an encryption key maintained by the computer and not shared with the client device.
4. The method of 1, wherein the CVV is encrypted with a first key, and wherein the online wallet server encrypts the first key with a second key and stores the encrypted first key for later decryption of the encrypted CVV.
5. (canceled)
6. (canceled)
7. (canceled)
8. (canceled)
9. The method of claim 8, wherein the local storage data structure is HTML 5 storage on the client device.
10. (canceled)
11. A computer program product comprising a non-transitory computer-readable medium having computer-readable program code embodied therein for securely transmitting payment information for online transactions initiated via a client device, the computer-readable program code comprising:
computer-readable program code to receive payment instrument information of a registered user, the payment information comprising a payment account number and a code verification value (“CVV”); and
computer-readable program code to communicate over a wireless communication channel a data package to a remote client device of the registered user, the data package comprising an encrypted version of the CVV and computer-readable program code that when executed by the remote client device causes the remote client device to store the CVV in a in a local storage data structure on the remote client device.
12. The computer program product of 11, wherein the payment instrument is a credit card.
13. The computer program product of claim 11, further comprising:
computer-readable program code to communicate a request over a wireless communication channel the remote client device in response to receiving a request for payment information from a merchant server, wherein the request for the encrypted CVV causes the remote client device to retrieve the encrypted CVV from the local data structure and communicate to the online wallet server.
14. (canceled)
15. (canceled)
16. The computer program product of claim 11, wherein the local storage data structure is HTML 5 storage on the client device.
17. (canceled)
18. An online electronic wallet system for securely transmitting payment information for online transactions initiated on a client device, comprising:
a storage device; and
a processor communicatively coupled to the storage device, wherein the processor executes application code instructions that are stored in the storage device to cause the system to:
receive payment instrument information of a registered user, the payment instrument information comprising a payment account number and a code verification value (“CVV”), wherein the payment account number is stored on the storage device;
communicate a data package to a remote client device of the registered user, the data package comprising an encrypted version of the CVV and computer-readable program code that when executed by the remote client device causes the remote client device to store the CVV in a local storage data structure on the remote client device.
19. The online electronic system of claim 17, wherein the processor further executes application code instructions stored in the storage device and that cause the system to:
communicate a request for the encrypted CVV to the remote client device in response to receiving a request for payment information from a merchant server, wherein the request for the encrypted CVV causes the remote client device to retrieve the encrypted CVV from the local data structure and communicate the encrypted CVV to the online wallet server.
20. The system of claim 17, wherein the payment instrument is a credit card.
21. A method for securely storing and retrieving payment information from multiple devices across payment networks, comprising:
providing a storage application to a registered user for installation on a remote registered user device;
receiving, at an online wallet server, payment instrument information of the registered user, the payment information comprising a payment account number and a code verification value (“CVV”), the online wallet server comprising a processor and a memory that stores the payment account number, wherein the microprocessor;
encrypts the CVV using an encryption key; and
communicates a data package to the remote registered user device, the data package consisting of the encrypted CVV and a set of computer-executable instructions that when executed by the remote client device cause the storage application to store the encrypted CVV in a local data structure on the remote registered user device.
22. The method of claim 22, wherein the local storage data structure is HTML 5 storage on the client device.
23. The method of claim 22, wherein the CVV is encrypted with a first key, and wherein the computer encrypts the first key with a second key and stores the encrypted first key for later decryption of the encrypted CVV.
US13/541,460 2011-11-13 2012-07-03 Secure transmission of payment credentials Abandoned US20160140566A1 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
US13/541,460 US20160140566A1 (en) 2011-11-13 2012-07-03 Secure transmission of payment credentials

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US201161559140P 2011-11-13 2011-11-13
US13/541,460 US20160140566A1 (en) 2011-11-13 2012-07-03 Secure transmission of payment credentials

Publications (1)

Publication Number Publication Date
US20160140566A1 true US20160140566A1 (en) 2016-05-19

Family

ID=49681659

Family Applications (3)

Application Number Title Priority Date Filing Date
US13/541,460 Abandoned US20160140566A1 (en) 2011-11-13 2012-07-03 Secure transmission of payment credentials
US13/541,469 Expired - Fee Related US8606720B1 (en) 2011-11-13 2012-07-03 Secure storage of payment information on client devices
US13/541,402 Active 2033-09-22 US9165321B1 (en) 2011-11-13 2012-07-03 Optimistic receipt flow

Family Applications After (2)

Application Number Title Priority Date Filing Date
US13/541,469 Expired - Fee Related US8606720B1 (en) 2011-11-13 2012-07-03 Secure storage of payment information on client devices
US13/541,402 Active 2033-09-22 US9165321B1 (en) 2011-11-13 2012-07-03 Optimistic receipt flow

Country Status (1)

Country Link
US (3) US20160140566A1 (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106651364A (en) * 2017-02-07 2017-05-10 桂林理工大学 Online payment device for authentication through visible light and barcode two-way public-key system
CN107395577A (en) * 2017-07-06 2017-11-24 广东电网有限责任公司信息中心 A kind of large-scale power Enterprise Salary security system
US20180218357A1 (en) * 2017-02-01 2018-08-02 Microsoft Technology Licensing, Llc Export high value material based on ring 1 evidence of ownership
US11120511B2 (en) 2016-07-26 2021-09-14 Samsung Electronics Co., Ltd. System and method for universal card acceptance

Families Citing this family (169)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20140019352A1 (en) 2011-02-22 2014-01-16 Visa International Service Association Multi-purpose virtual card transaction apparatuses, methods and systems
US8762263B2 (en) 2005-09-06 2014-06-24 Visa U.S.A. Inc. System and method for secured account numbers in proximity devices
US8121942B2 (en) 2007-06-25 2012-02-21 Visa U.S.A. Inc. Systems and methods for secure and transparent cardless transactions
US7739169B2 (en) 2007-06-25 2010-06-15 Visa U.S.A. Inc. Restricting access to compromised account information
US7937324B2 (en) 2007-09-13 2011-05-03 Visa U.S.A. Inc. Account permanence
US8219489B2 (en) 2008-07-29 2012-07-10 Visa U.S.A. Inc. Transaction processing using a global unique identifier
AU2009311303B2 (en) 2008-11-06 2015-09-10 Visa International Service Association Online challenge-response
US9715681B2 (en) 2009-04-28 2017-07-25 Visa International Service Association Verification of portable consumer devices
US9105027B2 (en) 2009-05-15 2015-08-11 Visa International Service Association Verification of portable consumer device for secure services
US8602293B2 (en) 2009-05-15 2013-12-10 Visa International Service Association Integration of verification tokens with portable computing devices
US8534564B2 (en) 2009-05-15 2013-09-17 Ayman Hammad Integration of verification tokens with mobile communication devices
US9038886B2 (en) 2009-05-15 2015-05-26 Visa International Service Association Verification of portable consumer devices
US10846683B2 (en) 2009-05-15 2020-11-24 Visa International Service Association Integration of verification tokens with mobile communication devices
US8893967B2 (en) 2009-05-15 2014-11-25 Visa International Service Association Secure Communication of payment information to merchants using a verification token
US7891560B2 (en) 2009-05-15 2011-02-22 Visa International Service Assocation Verification of portable consumer devices
US10140598B2 (en) 2009-05-20 2018-11-27 Visa International Service Association Device including encrypted data for expiration date and verification value creation
US10255591B2 (en) 2009-12-18 2019-04-09 Visa International Service Association Payment channel returning limited use proxy dynamic value
CN105243313B (en) 2010-01-12 2018-12-25 维萨国际服务协会 For the method whenever confirmed to verifying token
US10255601B2 (en) 2010-02-25 2019-04-09 Visa International Service Association Multifactor authentication using a directory server
US9245267B2 (en) 2010-03-03 2016-01-26 Visa International Service Association Portable account number for consumer payment account
US9342832B2 (en) 2010-08-12 2016-05-17 Visa International Service Association Securing external systems with account token substitution
US9691055B2 (en) 2010-12-17 2017-06-27 Google Inc. Digital wallet
US8725644B2 (en) * 2011-01-28 2014-05-13 The Active Network, Inc. Secure online transaction processing
US20120197691A1 (en) * 2011-01-31 2012-08-02 Bank Of America Corporation Mobile wallet payment vehicle preferences
US10586227B2 (en) 2011-02-16 2020-03-10 Visa International Service Association Snap mobile payment apparatuses, methods and systems
WO2012112822A2 (en) 2011-02-16 2012-08-23 Visa International Service Association Snap mobile payment apparatuses, methods and systems
AU2012220669A1 (en) 2011-02-22 2013-05-02 Visa International Service Association Universal electronic payment apparatuses, methods and systems
CN103503010B (en) 2011-03-04 2017-12-29 维萨国际服务协会 Secure Elements Incorporating Payment Capabilities into Computers
WO2012142045A2 (en) 2011-04-11 2012-10-18 Visa International Service Association Multiple tokenization for authentication
US9355393B2 (en) 2011-08-18 2016-05-31 Visa International Service Association Multi-directional wallet connector apparatuses, methods and systems
US9582598B2 (en) 2011-07-05 2017-02-28 Visa International Service Association Hybrid applications utilizing distributed models and views apparatuses, methods and systems
AU2012278963B2 (en) 2011-07-05 2017-02-23 Visa International Service Association Electronic wallet checkout platform apparatuses, methods and systems
US9704155B2 (en) 2011-07-29 2017-07-11 Visa International Service Association Passing payment tokens through an hop/sop
US10825001B2 (en) 2011-08-18 2020-11-03 Visa International Service Association Multi-directional wallet connector apparatuses, methods and systems
US9710807B2 (en) 2011-08-18 2017-07-18 Visa International Service Association Third-party value added wallet features and interfaces apparatuses, methods and systems
US10242358B2 (en) 2011-08-18 2019-03-26 Visa International Service Association Remote decoupled application persistent state apparatuses, methods and systems
US12462245B2 (en) 2011-08-18 2025-11-04 Visa International Service Association Remote decoupled application persistent state apparatuses, methods and systems
US9165294B2 (en) 2011-08-24 2015-10-20 Visa International Service Association Method for using barcodes and mobile devices to conduct payment transactions
US11354723B2 (en) 2011-09-23 2022-06-07 Visa International Service Association Smart shopping cart with E-wallet store injection search
US10223730B2 (en) 2011-09-23 2019-03-05 Visa International Service Association E-wallet store injection search apparatuses, methods and systems
US20130173403A1 (en) * 2012-01-01 2013-07-04 Bank Of America Corporation E-receipt barcode on mobile device that is readable by point of transaction for purchase
EP3770839A1 (en) 2012-01-05 2021-01-27 Visa International Service Association Data protection with translation
US10223710B2 (en) 2013-01-04 2019-03-05 Visa International Service Association Wearable intelligent vision device apparatuses, methods and systems
WO2013113004A1 (en) 2012-01-26 2013-08-01 Visa International Service Association System and method of providing tokenization as a service
AU2013214801B2 (en) 2012-02-02 2018-06-21 Visa International Service Association Multi-source, multi-dimensional, cross-entity, multimedia database platform apparatuses, methods and systems
US10282724B2 (en) 2012-03-06 2019-05-07 Visa International Service Association Security system incorporating mobile device
US10235668B1 (en) 2012-04-25 2019-03-19 Wells Fargo Bank, N.A. System and method for a mobile wallet
US10192217B1 (en) * 2012-04-25 2019-01-29 Wells Fargo Bank, N.A. System and method for receipt tracking in a mobile wallet
US20130297501A1 (en) 2012-05-04 2013-11-07 Justin Monk System and method for local data conversion
US9524501B2 (en) 2012-06-06 2016-12-20 Visa International Service Association Method and system for correlating diverse transaction data
US9672519B2 (en) 2012-06-08 2017-06-06 Fmr Llc Mobile device software radio for securely passing financial information between a customer and a financial services firm
US9928504B2 (en) 2012-06-26 2018-03-27 Google Llc Saving merchant artifacts to a virtual wallet
US9547769B2 (en) 2012-07-03 2017-01-17 Visa International Service Association Data protection hub
US20140019365A1 (en) * 2012-07-12 2014-01-16 Google Inc. Processing payment information for online orders at a local merchant's point of sale via direct payment
US20140025571A1 (en) * 2012-07-23 2014-01-23 Its, Inc. System and method for dual message consumer authentication value-based eft transactions
US9846861B2 (en) 2012-07-25 2017-12-19 Visa International Service Association Upstream and downstream data conversion
US9256871B2 (en) 2012-07-26 2016-02-09 Visa U.S.A. Inc. Configurable payment tokens
US9665722B2 (en) 2012-08-10 2017-05-30 Visa International Service Association Privacy firewall
US9760879B2 (en) 2012-08-30 2017-09-12 Paypal, Inc. Systems, methods, and computer program products for providing an electronic receipt
US10192216B2 (en) 2012-09-11 2019-01-29 Visa International Service Association Cloud-based virtual wallet NFC apparatuses, methods and systems
WO2014066559A1 (en) 2012-10-23 2014-05-01 Visa International Service Association Transaction initiation determination system utilizing transaction data elements
US9177067B2 (en) 2012-11-04 2015-11-03 Walter J. Kawecki, III Systems and methods for enhancing user data derived from digital communications
US9911118B2 (en) 2012-11-21 2018-03-06 Visa International Service Association Device pairing via trusted intermediary
WO2014087381A1 (en) 2012-12-07 2014-06-12 Visa International Service Association A token generating component
US9741051B2 (en) 2013-01-02 2017-08-22 Visa International Service Association Tokenization and third-party interaction
US10740731B2 (en) 2013-01-02 2020-08-11 Visa International Service Association Third party settlement
US11055710B2 (en) 2013-05-02 2021-07-06 Visa International Service Association Systems and methods for verifying and processing transactions using virtual currency
WO2014186635A1 (en) 2013-05-15 2014-11-20 Visa International Service Association Mobile tokenization hub
US10878422B2 (en) 2013-06-17 2020-12-29 Visa International Service Association System and method using merchant token
US20150019417A1 (en) * 2013-06-26 2015-01-15 Google Inc. Updating a digital wallet from financial account issuer
US20150019440A1 (en) * 2013-07-12 2015-01-15 Gongming Yang Encrypted Correction Code to protect the integrity and originality of electronic documentation and secure online payment and online wallet
SG10201800291UA (en) 2013-07-15 2018-02-27 Visa Int Service Ass Secure remote payment transaction processing
RU2681366C2 (en) 2013-07-24 2019-03-06 Виза Интернэшнл Сервис Ассосиэйшн Systems and methods for communicating risk using token assurance data
US10902421B2 (en) 2013-07-26 2021-01-26 Visa International Service Association Provisioning payment credentials to a consumer
US9287935B2 (en) * 2013-08-01 2016-03-15 Blackberry Limited Method and apparatus for anti-eavesdropping in vunerable NFC applications
US10496986B2 (en) 2013-08-08 2019-12-03 Visa International Service Association Multi-network tokenization processing
SG10201801086RA (en) 2013-08-08 2018-03-28 Visa Int Service Ass Methods and systems for provisioning mobile devices with payment credentials
CN113011896B (en) 2013-08-15 2024-04-09 维萨国际服务协会 Secure remote payment transaction processing using secure elements
RU2663476C2 (en) 2013-09-20 2018-08-06 Виза Интернэшнл Сервис Ассосиэйшн Remote payment transactions protected processing, including authentication of consumers
US9978094B2 (en) 2013-10-11 2018-05-22 Visa International Service Association Tokenization revocation list
CN106464492B (en) 2013-10-11 2020-02-07 维萨国际服务协会 network token system
US9706346B2 (en) 2013-10-18 2017-07-11 Apple Inc. Mobile device with applications that use a common place card to display data relating to a location
US10515358B2 (en) 2013-10-18 2019-12-24 Visa International Service Association Contextual transaction token methods and systems
US10489779B2 (en) 2013-10-21 2019-11-26 Visa International Service Association Multi-network token bin routing with defined verification parameters
US10366387B2 (en) 2013-10-29 2019-07-30 Visa International Service Association Digital wallet system and method
US9516487B2 (en) 2013-11-19 2016-12-06 Visa International Service Association Automated account provisioning
US9922322B2 (en) 2013-12-19 2018-03-20 Visa International Service Association Cloud-based transactions with magnetic secure transmission
EP3084701B1 (en) 2013-12-19 2022-05-04 Visa International Service Association Cloud-based transactions methods and systems
EP2889813B1 (en) * 2013-12-27 2017-11-15 Buongiorno S.P.A. Method and system for implementing in-app software development kits
CN104765999B (en) * 2014-01-07 2020-06-30 腾讯科技(深圳)有限公司 Method, terminal and server for processing user resource information
US10433128B2 (en) 2014-01-07 2019-10-01 Visa International Service Association Methods and systems for provisioning multiple devices
US9846878B2 (en) 2014-01-14 2017-12-19 Visa International Service Association Payment account identifier system
US12469021B2 (en) 2014-02-18 2025-11-11 Visa International Service Association Limited-use keys and cryptograms
US10026087B2 (en) 2014-04-08 2018-07-17 Visa International Service Association Data passed in an interaction
US9942043B2 (en) 2014-04-23 2018-04-10 Visa International Service Association Token security on a communication device
SG11201608973TA (en) 2014-05-01 2016-11-29 Visa Int Service Ass Data verification using access device
WO2015171625A1 (en) 2014-05-05 2015-11-12 Visa International Service Association System and method for token domain control
CN104428803A (en) * 2014-05-07 2015-03-18 华为技术有限公司 Payment method and apparatus and payment element processing method and apparatus
US10467689B2 (en) 2014-05-20 2019-11-05 Paypal, Inc. Unified payment account establishment and incorporation in a main payment account
AU2015264124B2 (en) 2014-05-21 2019-05-09 Visa International Service Association Offline authentication
US11023890B2 (en) 2014-06-05 2021-06-01 Visa International Service Association Identification and verification for provisioning mobile application
US9123054B1 (en) * 2014-07-17 2015-09-01 Mastercard International Incorporated Method and system for maintaining privacy in scoring of consumer spending behavior
US9780953B2 (en) 2014-07-23 2017-10-03 Visa International Service Association Systems and methods for secure detokenization
US10484345B2 (en) 2014-07-31 2019-11-19 Visa International Service Association System and method for identity verification across mobile applications
US9775029B2 (en) 2014-08-22 2017-09-26 Visa International Service Association Embedding cloud-based functionalities in a communication device
US10140615B2 (en) 2014-09-22 2018-11-27 Visa International Service Association Secure mobile device credential provisioning using risk decision non-overrides
BR112017005824A2 (en) 2014-09-26 2017-12-12 Visa Int Service Ass method and mobile device.
US11257074B2 (en) 2014-09-29 2022-02-22 Visa International Service Association Transaction risk based token
US10015147B2 (en) 2014-10-22 2018-07-03 Visa International Service Association Token enrollment system and method
GB201419016D0 (en) 2014-10-24 2014-12-10 Visa Europe Ltd Transaction Messaging
WO2016068871A1 (en) * 2014-10-28 2016-05-06 Total System Services, Inc. Automated payment information update with vendors
US10325261B2 (en) 2014-11-25 2019-06-18 Visa International Service Association Systems communications with non-sensitive identifiers
WO2016086154A1 (en) 2014-11-26 2016-06-02 Visa International Service Association Tokenization request via access device
US10257185B2 (en) 2014-12-12 2019-04-09 Visa International Service Association Automated access data provisioning
CN107005563B (en) 2014-12-12 2021-03-30 维萨国际服务协会 Supply platform for machine-to-machine installations
US10187363B2 (en) 2014-12-31 2019-01-22 Visa International Service Association Hybrid integration of software development kit with secure execution environment
DE102015000220A1 (en) * 2015-01-08 2016-07-14 Giesecke & Devrient Gmbh A method for securely operating a computer unit, software application, and computer unit
US10096009B2 (en) 2015-01-20 2018-10-09 Visa International Service Association Secure payment processing using authorization request
US11250391B2 (en) 2015-01-30 2022-02-15 Visa International Service Association Token check offline
US11176554B2 (en) 2015-02-03 2021-11-16 Visa International Service Association Validation identity tokens for transactions
US10977657B2 (en) 2015-02-09 2021-04-13 Visa International Service Association Token processing utilizing multiple authorizations
US11526885B2 (en) 2015-03-04 2022-12-13 Trusona, Inc. Systems and methods for user identification using graphical barcode and payment card authentication read data
CN107408244B (en) * 2015-03-06 2021-12-31 万事达卡国际股份有限公司 Secure mobile remote payment
US10164996B2 (en) 2015-03-12 2018-12-25 Visa International Service Association Methods and systems for providing a low value token buffer
CA2977427A1 (en) 2015-04-10 2016-10-13 Visa International Service Association Browser integration with cryptogram
US9998978B2 (en) 2015-04-16 2018-06-12 Visa International Service Association Systems and methods for processing dormant virtual access devices
US10922629B2 (en) * 2015-04-21 2021-02-16 Signature Access Limited Methods for managing remote access to a physical location and systems thereof
US10552834B2 (en) 2015-04-30 2020-02-04 Visa International Service Association Tokenization capable authentication framework
US10169746B2 (en) * 2015-05-05 2019-01-01 Mastercard International Incorporated Methods, systems, and computer readable media for integrating payments
WO2017066792A1 (en) 2015-10-15 2017-04-20 Visa International Service Association Instant token issuance system
GB2557108A (en) * 2015-11-17 2018-06-13 Gelliner Ltd Payment confirmation system and method
EP3910908B1 (en) 2015-12-04 2024-04-17 Visa International Service Association Unique code for token verification
US10243958B2 (en) 2016-01-07 2019-03-26 Visa International Service Association Systems and methods for device push provisoning
AU2017214412A1 (en) 2016-02-01 2018-06-28 Visa International Service Association Systems and methods for code display and use
US11501288B2 (en) 2016-02-09 2022-11-15 Visa International Service Association Resource provider account token provisioning and processing
US10044710B2 (en) 2016-02-22 2018-08-07 Bpip Limited Liability Company Device and method for validating a user using an intelligent voice print
US10523434B1 (en) * 2016-03-04 2019-12-31 Amazon Technologies, Inc. Data storage key rotation
JP7013385B2 (en) * 2016-03-29 2022-01-31 トゥルソナ,インコーポレイテッド Systems and methods for identifying users using graphical barcodes and payment card authentication read data
US10313321B2 (en) 2016-04-07 2019-06-04 Visa International Service Association Tokenization of co-network accounts
WO2017184121A1 (en) 2016-04-19 2017-10-26 Visa International Service Association Systems and methods for performing push transactions
US11250424B2 (en) 2016-05-19 2022-02-15 Visa International Service Association Systems and methods for creating subtokens using primary tokens
CN109196834B (en) 2016-06-03 2021-08-17 维萨国际服务协会 Sub-token management system for connected devices
US11068899B2 (en) 2016-06-17 2021-07-20 Visa International Service Association Token aggregation for multi-party transactions
CA3021357A1 (en) 2016-06-24 2017-12-28 Visa International Service Association Unique token authentication cryptogram
SG10202110839VA (en) 2016-07-11 2021-11-29 Visa Int Service Ass Encryption key exchange process using access device
CA3026224A1 (en) 2016-07-19 2018-01-25 Visa International Service Association Method of distributing tokens and managing token relationships
US10949838B1 (en) 2016-08-23 2021-03-16 Wells Fargo Bank, N.A. Mobile wallet registration via ATM
US10509779B2 (en) 2016-09-14 2019-12-17 Visa International Service Association Self-cleaning token vault
US20180150832A1 (en) * 2016-11-25 2018-05-31 Royal Bank Of Canada System, process and device for e-commerce transactions
CN110036386B (en) 2016-11-28 2023-08-22 维萨国际服务协会 Access identifier supplied to application program
KR20180098069A (en) * 2017-02-24 2018-09-03 삼성전자주식회사 Agency settlement system, server and controlling method thereof
US10915899B2 (en) 2017-03-17 2021-02-09 Visa International Service Association Replacing token on a multi-token user device
WO2018187455A1 (en) * 2017-04-05 2018-10-11 Visa International Service Association System and method for electronic receipt services
US10902418B2 (en) 2017-05-02 2021-01-26 Visa International Service Association System and method using interaction token
US11494765B2 (en) 2017-05-11 2022-11-08 Visa International Service Association Secure remote transaction system using mobile devices
US10491389B2 (en) 2017-07-14 2019-11-26 Visa International Service Association Token provisioning utilizing a secure authentication system
EP3762844A4 (en) 2018-03-07 2021-04-21 Visa International Service Association SECURE REMOTE TOKEN RELEASE WITH ONLINE AUTHENTICATION
US11256789B2 (en) 2018-06-18 2022-02-22 Visa International Service Association Recurring token transactions
AU2019290223A1 (en) 2018-06-22 2021-01-28 Visa International Service Association Secure remote transaction framework using dynamic secure checkout element
SG11202101587SA (en) 2018-08-22 2021-03-30 Visa Int Service Ass Method and system for token provisioning and processing
US11551208B2 (en) 2018-10-04 2023-01-10 Verifone, Inc. Systems and methods for point-to-point encryption compliance
CN112805737A (en) 2018-10-08 2021-05-14 维萨国际服务协会 Techniques for token proximity transactions
WO2020102484A1 (en) 2018-11-14 2020-05-22 Visa International Service Association Cloud token provisioning of multiple tokens
WO2020236135A1 (en) 2019-05-17 2020-11-26 Visa International Service Association Virtual access credential interaction system and method
CN110417740B (en) * 2019-06-27 2021-10-15 腾讯科技(深圳)有限公司 User data processing method, intelligent terminal, server and storage medium
US11676198B2 (en) * 2019-07-30 2023-06-13 Skipify, Inc. Computer-implemented methods of completing an online transaction that is performed via a user computing device and a merchant website running on a merchant computing device
US20210312120A1 (en) * 2020-04-05 2021-10-07 Skipify, Inc. Automated generation of a template for a shoppable electronic message
US12141800B2 (en) 2021-02-12 2024-11-12 Visa International Service Association Interaction account tokenization system and method
CN112990927B (en) * 2021-04-27 2024-03-08 中国工商银行股份有限公司 Payment verification method, system, device, computer system and storage medium

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5163098A (en) * 1990-09-06 1992-11-10 Dahbura Abbud S System for preventing fraudulent use of credit card
US20100150352A1 (en) * 2008-12-15 2010-06-17 Ebay, Inc. Secure self managed data (ssmd)

Family Cites Families (104)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5371797A (en) * 1993-01-19 1994-12-06 Bellsouth Corporation Secure electronic funds transfer from telephone or unsecured terminal
US5815657A (en) * 1996-04-26 1998-09-29 Verifone, Inc. System, method and article of manufacture for network electronic authorization utilizing an authorization instrument
US6101482A (en) 1997-09-15 2000-08-08 International Business Machines Corporation Universal web shopping cart and method of on-line transaction processing
US6925444B1 (en) * 1998-09-08 2005-08-02 Hewlett-Packard Development Company, L.P. System and method for creating and sharing purchasing lists on a network
US6609113B1 (en) 1999-05-03 2003-08-19 The Chase Manhattan Bank Method and system for processing internet payments using the electronic funds transfer network
US20010051902A1 (en) 1999-06-28 2001-12-13 Messner Marc A. Method for performing secure internet transactions
US7953671B2 (en) 1999-08-31 2011-05-31 American Express Travel Related Services Company, Inc. Methods and apparatus for conducting electronic transactions
US7343351B1 (en) 1999-08-31 2008-03-11 American Express Travel Related Services Company, Inc. Methods and apparatus for conducting electronic transactions
PL356106A1 (en) 1999-11-30 2004-06-14 Citibank, N.A. System and method for performing an electronic transaction using a transaction proxy with an electronic wallet
WO2001050429A1 (en) 2000-01-05 2001-07-12 American Express Travel Related Services Company, Inc. Smartcard internet authorization system
AU3058101A (en) 2000-02-04 2001-08-14 Matsushita Electric Industrial Co., Ltd. Information terminal
WO2001061659A1 (en) 2000-02-16 2001-08-23 Mastercard International Incorporated System and method for conducting electronic commerce with a remote wallet server
US6965880B2 (en) 2000-03-30 2005-11-15 Fujitsu Limited Transaction number management method in network commodity sales
CA2305249A1 (en) * 2000-04-14 2001-10-14 Branko Sarcanin Virtual safe
WO2001097087A1 (en) * 2000-06-14 2001-12-20 Arjun Nayyar Client-based shopping cart
GB2364482B (en) 2000-06-30 2002-10-09 Motorola Inc Server-based electronic wallet system
US20040260657A1 (en) 2000-07-18 2004-12-23 John Cockerham System and method for user-controlled on-line transactions
US20020038287A1 (en) * 2000-08-30 2002-03-28 Jean-Marc Villaret EMV card-based identification, authentication, and access control for remote access
CA2329895A1 (en) 2000-09-19 2002-03-19 Soft Tracks Enterprises Ltd. Merchant wallet server
GB0024302D0 (en) 2000-10-04 2000-11-15 Webtrend Ltd A method of conducting transactions using a distributed computer network such as the internet
US7318049B2 (en) * 2000-11-17 2008-01-08 Gregory Fx Iannacci System and method for an automated benefit recognition, acquisition, value exchange, and transaction settlement system using multivariable linear and nonlinear modeling
US6931382B2 (en) 2001-01-24 2005-08-16 Cdck Corporation Payment instrument authorization technique
GB0110893D0 (en) * 2001-05-03 2001-06-27 Gems Dev Organisation The Ltd Transaction management systems
US20020179704A1 (en) 2001-06-05 2002-12-05 Ncr Corporation Enhanced digital wallet
US7996324B2 (en) * 2001-07-10 2011-08-09 American Express Travel Related Services Company, Inc. Systems and methods for managing multiple accounts on a RF transaction device using secondary identification indicia
US6904569B1 (en) 2001-07-26 2005-06-07 Gateway, Inc. Link-level browser instance control
US20030110133A1 (en) 2001-12-07 2003-06-12 Maritzen L. Michael Automated digital rights management and payment system with embedded content
US7159180B2 (en) 2001-12-14 2007-01-02 America Online, Inc. Proxy platform integration system
GB2390180A (en) 2002-03-19 2003-12-31 Ncr Int Inc Financial agent
GB2387253B (en) * 2002-04-03 2004-02-18 Swivel Technologies Ltd System and method for secure credit and debit card transactions
EP1535217A4 (en) * 2002-06-11 2006-06-21 First Data Corp Value processing network and methods
US8473355B2 (en) 2002-12-06 2013-06-25 Facebook, Inc. System and method for electronic wallet conversion
US20040165009A1 (en) 2003-02-20 2004-08-26 International Business Machines Corporation Expansion of interactive user interface components
US7996268B2 (en) 2003-03-03 2011-08-09 Poltorak Alexander I Apparatus and method for an electronic telephone wallet
US20040243501A1 (en) 2003-05-29 2004-12-02 Regal Press, Inc. System and method for automated data processing
US20040249712A1 (en) 2003-06-06 2004-12-09 Brown Sean D. System, method and computer program product for presenting, redeeming and managing incentives
US7440997B2 (en) 2003-06-13 2008-10-21 Microsoft Corporation Mechanism for supporting browser navigation while preserving important application return states
US20060166740A1 (en) 2004-03-08 2006-07-27 Joaquin Sufuentes Method and system for identifying, matching and transacting information among portable devices within radio frequency proximity
US7356606B2 (en) 2004-03-12 2008-04-08 Kagi Corporation Dynamic web storefront technology
US8135803B2 (en) 2004-08-23 2012-03-13 Ianywhere Solutions, Inc. Method, system, and computer program product for offline advertisement servicing and cycling
US20060173974A1 (en) 2005-02-02 2006-08-03 Victor Tang System and method for providing mobile access to personal media
US20080270253A1 (en) 2005-02-14 2008-10-30 Smarttrust Ab Method for Performing an Electronic Transaction
US20060219774A1 (en) 2005-03-30 2006-10-05 Benco David S Network support for credit card receipt reconciliation
US8041646B2 (en) * 2005-06-15 2011-10-18 E. E. System Corporation Method and system for real time online debit transactions
US7958543B2 (en) 2005-07-12 2011-06-07 Microsoft Corporation Account synchronization for common identity in an unmanaged network
US20070106564A1 (en) 2005-11-04 2007-05-10 Utiba Pte Ltd. Mobile phone as a point of sale (POS) device
US8606251B2 (en) 2005-12-22 2013-12-10 Sony Corporation Mobile terminals, methods and computer program products incorporating podcast link activation control
US20070245882A1 (en) 2006-04-04 2007-10-25 Odenwald Michael J Interactive computerized digital media management system and method
US7818264B2 (en) * 2006-06-19 2010-10-19 Visa U.S.A. Inc. Track data encryption
US8019811B1 (en) 2006-04-06 2011-09-13 Versata Development Group, Inc. Application state server-side cache for a state-based client-server application
US20070283268A1 (en) 2006-06-06 2007-12-06 Berger Adam L Advertising delivery
US20070294292A1 (en) 2006-06-14 2007-12-20 Microsoft Corporation Advertising transfer and playback on portable devices
US7512567B2 (en) 2006-06-29 2009-03-31 Yt Acquisition Corporation Method and system for providing biometric authentication at a point-of-sale via a mobile device
EP1978477A3 (en) 2006-07-06 2011-03-02 Firethorn Holdings, LLC Methods and systems for making a payment via a stored value card in a mobile environment
US20080017704A1 (en) 2006-07-24 2008-01-24 First Data Corporation Contactless Electronic Wallet Payment Device
US20080147546A1 (en) 2006-09-19 2008-06-19 Walter Weichselbaumer Wireless device electronic wallet transaction validation
US20080208681A1 (en) 2006-09-28 2008-08-28 Ayman Hammad Payment using a mobile device
US8769275B2 (en) 2006-10-17 2014-07-01 Verifone, Inc. Batch settlement transactions system and method
US8336770B2 (en) * 2006-10-26 2012-12-25 Mastercard International, Inc. Method and apparatus for wireless authorization
US8793184B2 (en) 2007-02-12 2014-07-29 Visa U.S.A. Inc. Mobile payment services
US8117089B2 (en) * 2007-02-13 2012-02-14 Claudia Juliana Minsky System for segmentation by product category of product images within a shopping cart
US8566239B2 (en) 2007-02-22 2013-10-22 First Data Corporation Mobile commerce systems and methods
US20080208762A1 (en) 2007-02-22 2008-08-28 First Data Corporation Payments using a mobile commerce device
US20080208742A1 (en) 2007-02-22 2008-08-28 First Data Corporation Provisioning of a device for mobile commerce
US8073460B1 (en) 2007-03-08 2011-12-06 Amazon Technologies, Inc. System and method for providing advertisement based on mobile device travel patterns
WO2008119168A1 (en) 2007-04-03 2008-10-09 Cpni Inc. A system and method for merchant discovery and transfer of payment data
US9524502B2 (en) 2007-06-20 2016-12-20 Qualcomm Incorporated Management of dynamic electronic coupons
US20080318559A1 (en) 2007-06-22 2008-12-25 Porco Gino M System and method of mobile device advertising
US20090063312A1 (en) 2007-08-28 2009-03-05 Hurst Douglas J Method and System for Processing Secure Wireless Payment Transactions and for Providing a Virtual Terminal for Merchant Processing of Such Transactions
US8126806B1 (en) 2007-12-03 2012-02-28 Sprint Communications Company L.P. Method for launching an electronic wallet
US8655718B2 (en) 2007-12-18 2014-02-18 Yahoo! Inc. Methods for augmenting user-generated content using a monetizable feature
US20090170483A1 (en) 2007-12-28 2009-07-02 General Electric Company System and method for transmitting information using a mobile phone
US7922082B2 (en) * 2008-01-04 2011-04-12 M2 International Ltd. Dynamic card validation value
US9947002B2 (en) 2008-02-15 2018-04-17 First Data Corporation Secure authorization of contactless transaction
US20090234751A1 (en) 2008-03-14 2009-09-17 Eric Chan Electronic wallet for a wireless mobile device
US8060413B2 (en) 2008-03-14 2011-11-15 Research In Motion Limited System and method for making electronic payments from a wireless mobile device
JP5462242B2 (en) 2008-04-04 2014-04-02 グーグル・インコーポレーテッド Dynamic selection and distribution of content
CA2639008A1 (en) 2008-08-18 2010-02-18 Kamaljit Deol Brar Actionable cards, related content and social marketing
CN102187353A (en) 2008-09-05 2011-09-14 吉弗坦戈公司 Systems and methods for authentication of a virtual stored value card
US20100082485A1 (en) 2008-09-30 2010-04-01 Apple Inc. Portable point of purchase devices and methods
US8965811B2 (en) 2008-10-04 2015-02-24 Mastercard International Incorporated Methods and systems for using physical payment cards in secure E-commerce transactions
US20100114731A1 (en) 2008-10-30 2010-05-06 Kingston Tamara S ELECTRONIC WALLET ("eWallet")
US20100125495A1 (en) 2008-11-17 2010-05-20 Smith Steven M System and method of providing a mobile wallet at a mobile telephone
US20100125510A1 (en) 2008-11-17 2010-05-20 Smith Steven M System and method of conducting transactions using a mobile wallet system
US20100131347A1 (en) 2008-11-24 2010-05-27 Research In Motion Limited Electronic payment system using mobile wireless communications device and associated methods
US20100145751A1 (en) 2008-12-10 2010-06-10 Charles Franklin Berry Validation method and system
US9373122B2 (en) 2008-12-18 2016-06-21 Iii Holdings 1, Llc Methods, apparatus and computer program products for securely accessing account data
US20100169182A1 (en) 2008-12-30 2010-07-01 Masih Madani Mobile payment method and system using the same
US9536238B2 (en) 2008-12-31 2017-01-03 Peter Garrett Hand-held electronics device for aggregation of and management of personal electronic data
US20100217682A1 (en) 2009-02-26 2010-08-26 Research In Motion Limited System and method for capturing user inputs in electronic forms
EP2406759A4 (en) 2009-03-03 2014-04-02 Equifax Inc Systems and methods for using verified information cards in a communications network
US8595098B2 (en) 2009-03-18 2013-11-26 Network Merchants, Inc. Transmission of sensitive customer information during electronic-based transactions
WO2010110625A2 (en) 2009-03-26 2010-09-30 Park Jung Chual E-wallet service method and system based on an idle screen application
CA2665961C (en) 2009-05-12 2013-01-22 Diversinet Corp. Method and system for delivering a command to a mobile device
US20110087595A1 (en) 2009-10-09 2011-04-14 Paul Sabella Method and system for facilitating commercial purchases
US20110208575A1 (en) 2010-02-23 2011-08-25 Yahoo! Inc. System and method for generating interactive advertisements
US8346229B2 (en) 2010-02-26 2013-01-01 Research In Motion Limited Scheduling and delivering ad meetings
WO2011140427A2 (en) * 2010-05-07 2011-11-10 Google Inc. Caching electronic document resources in a client device having an electronic resource database
US9558481B2 (en) 2010-09-28 2017-01-31 Barclays Bank Plc Secure account provisioning
US10121133B2 (en) 2010-10-13 2018-11-06 Walmart Apollo, Llc Method for self-checkout with a mobile device
US20120253985A1 (en) 2010-11-08 2012-10-04 Kwift SAS Method and system for extraction and accumulation of shopping data
US20120267432A1 (en) 2010-11-12 2012-10-25 Kuttuva Avinash Secure payments with global mobile virtual wallet
US20120158654A1 (en) 2010-12-17 2012-06-21 Google Inc. Receipt storage in a digital wallet
US20120203695A1 (en) 2011-02-09 2012-08-09 American Express Travel Related Services Company, Inc. Systems and methods for facilitating secure transactions

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5163098A (en) * 1990-09-06 1992-11-10 Dahbura Abbud S System for preventing fraudulent use of credit card
US20100150352A1 (en) * 2008-12-15 2010-06-17 Ebay, Inc. Secure self managed data (ssmd)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US11120511B2 (en) 2016-07-26 2021-09-14 Samsung Electronics Co., Ltd. System and method for universal card acceptance
US20180218357A1 (en) * 2017-02-01 2018-08-02 Microsoft Technology Licensing, Llc Export high value material based on ring 1 evidence of ownership
CN106651364A (en) * 2017-02-07 2017-05-10 桂林理工大学 Online payment device for authentication through visible light and barcode two-way public-key system
CN107395577A (en) * 2017-07-06 2017-11-24 广东电网有限责任公司信息中心 A kind of large-scale power Enterprise Salary security system

Also Published As

Publication number Publication date
US9165321B1 (en) 2015-10-20
US8606720B1 (en) 2013-12-10

Similar Documents

Publication Publication Date Title
US8606720B1 (en) Secure storage of payment information on client devices
US20250061447A1 (en) Method for securing sensitive data
JP7429398B2 (en) System and method for online payment processing using secure inline frames
JP7189769B2 (en) Authentication system and method using location matching
CN107087432B (en) System and method for storing data encrypted by remote server
JP6703510B2 (en) Method and system for generating an advanced storage key without a secure element in a mobile device
US11361317B2 (en) Validating a customer in an electronic transaction
WO2021142032A1 (en) System and method for transferring currency using blockchainid50000116284555 ia body 2021-01-28 filing no.:10
US20150363774A1 (en) Methods and systems for permissions management with enhanced security
US20140019365A1 (en) Processing payment information for online orders at a local merchant's point of sale via direct payment
WO2020046855A1 (en) Secured end-to-end communication for remote payment verification
CN114186985A (en) Multidimensional barcode mobile payment method and payment server
US20160321650A1 (en) Online transactions
US20200273037A1 (en) Payment-system-based user authentication and information access system and methods
CN112970234B (en) Account assertion
US12069182B2 (en) Checkout with MAC
JP6844828B1 (en) Information processing method, information processing device, information processing program and recording medium
US20190139045A1 (en) Securing Multi-Part Network Transactions with Automated Multi-Phase Network Traversal
TWI786388B (en) Electronic voucher and method for automatic processing the same
AU2014202432A1 (en) Payment Transaction Techniques

Legal Events

Date Code Title Description
AS Assignment

Owner name: GOOGLE INC., CALIFORNIA

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:BAKER, DAVID PRESTON;MARSHALL, STANLEY N., III;HILLER, MATTHEW ERIC;AND OTHERS;SIGNING DATES FROM 20120628 TO 20120629;REEL/FRAME:028517/0708

AS Assignment

Owner name: GOOGLE LLC, CALIFORNIA

Free format text: CHANGE OF NAME;ASSIGNOR:GOOGLE INC.;REEL/FRAME:044129/0001

Effective date: 20170929

STCB Information on status: application discontinuation

Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION