US20160140566A1 - Secure transmission of payment credentials - Google Patents
Secure transmission of payment credentials Download PDFInfo
- Publication number
- US20160140566A1 US20160140566A1 US13/541,460 US201213541460A US2016140566A1 US 20160140566 A1 US20160140566 A1 US 20160140566A1 US 201213541460 A US201213541460 A US 201213541460A US 2016140566 A1 US2016140566 A1 US 2016140566A1
- Authority
- US
- United States
- Prior art keywords
- cvv
- payment
- encrypted
- client device
- online
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Abandoned
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/08—Payment architectures
- G06Q20/12—Payment architectures specially adapted for electronic shopping systems
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/30—Payment architectures, schemes or protocols characterised by the use of specific devices or networks
- G06Q20/32—Payment architectures, schemes or protocols characterised by the use of specific devices or networks using wireless devices
- G06Q20/322—Aspects of commerce using mobile devices [M-devices]
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/30—Payment architectures, schemes or protocols characterised by the use of specific devices or networks
- G06Q20/36—Payment architectures, schemes or protocols characterised by the use of specific devices or networks using electronic wallets or electronic money safes
- G06Q20/367—Payment architectures, schemes or protocols characterised by the use of specific devices or networks using electronic wallets or electronic money safes involving electronic purses or money safes
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/30—Payment architectures, schemes or protocols characterised by the use of specific devices or networks
- G06Q20/36—Payment architectures, schemes or protocols characterised by the use of specific devices or networks using electronic wallets or electronic money safes
- G06Q20/367—Payment architectures, schemes or protocols characterised by the use of specific devices or networks using electronic wallets or electronic money safes involving electronic purses or money safes
- G06Q20/3674—Payment architectures, schemes or protocols characterised by the use of specific devices or networks using electronic wallets or electronic money safes involving electronic purses or money safes involving authentication
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/40—Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
- G06Q20/401—Transaction verification
- G06Q20/4018—Transaction verification using the card verification value [CVV] associated with the card
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q30/00—Commerce
- G06Q30/06—Buying, selling or leasing transactions
- G06Q30/0601—Electronic shopping [e-shopping]
- G06Q30/0633—Managing shopping lists, e.g. compiling or processing purchase lists
- G06Q30/0635—Managing shopping lists, e.g. compiling or processing purchase lists replenishment orders; recurring orders
-
- H04L67/32—
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/50—Network services
- H04L67/60—Scheduling or organising the servicing of application requests, e.g. requests for application data transmissions using the analysis and optimisation of the required network resources
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/04—Payment circuits
- G06Q20/045—Payment circuits using payment protocols involving tickets
- G06Q20/0457—Payment circuits using payment protocols involving tickets the tickets being sent electronically
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/22—Payment schemes or models
- G06Q20/227—Payment schemes or models characterised in that multiple accounts are available, e.g. to the payer
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/30—Payment architectures, schemes or protocols characterised by the use of specific devices or networks
- G06Q20/36—Payment architectures, schemes or protocols characterised by the use of specific devices or networks using electronic wallets or electronic money safes
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q2220/00—Business processing using cryptography
- G06Q2220/10—Usage protection of distributed data files
Definitions
- the present disclosure relates generally to systems and methods for completing online purchases initiated on client devices, such as mobile devices. More particularly, the present invention provides systems and methods for the secure storage and transmission of payment information using an online electronic wallet.
- verification codes such as CVV information
- a method for secure storage of payment instrument information comprises receiving, at an online electronic wallet system, payment instrument information from a user, storing the payment instrument information, minus a verification code, in the online electronic wallet system, encrypting the verification code with an encryption key, storing the verification code in local storage on one or more client devices, and deleting the verification code and encrypted verification code information from the online electronic wallet server.
- a method for securely transmitting payment instrument information of online transactions initiated on a client device comprises receiving a payment information request from a merchant server at an online electronic wallet system, selecting by the online electronic wallet system the corresponding payment instrument information, retrieving an encrypted verification code stored on a client device corresponding to the payment instrument information, decrypting the verification code with the an encryption key used to encrypt the verification code prior to storage on the local device, re-encrypting the verification code and the remaining payment instrument information using a merchant-specific encryption key, and communicating the requested payment instrument information to the merchant server.
- a method for ensuring optimal receipt flow during an electronic transaction comprises receiving at an online electronic wallet system a request for full payment information from a merchant server, verifying by the online electronic wallet system that the request for payment information includes a copy of the online shopping cart information, generating an electronic receipt from the online shopping cart information, and storing the electronic receipt in a user's online electronic wallet account.
- FIG. 1 is a block diagram depicting an online electronic wallet system according to an exemplary embodiment.
- FIG. 2 is a block flow diagram depicting a method for conducting secure online purchases using an online electronic wallet system according to an exemplary embodiment.
- FIG. 3 is a block flow diagram depicting a method for establishing merchant account information with an online electronic wallet system according to an exemplary embodiment.
- FIG. 4 is a block flow diagram depicting a method for establishing user account information with an online electronic wallet system according to an exemplary embodiment.
- FIG. 5 is a block flow diagram depicting a method for initiating an online purchase using an online electronic wallet system according to an exemplary embodiment.
- FIG. 6 is a block flow diagram depicting a method for processing a request for full payment information from a merchant server according to an exemplary embodiment.
- FIG. 7 is a block flow diagram depicting a method for encrypting payment information stored between an online electronic wallet system according to an exemplary embodiment.
- the present invention is directed to an online electronic wallet system that lets buyers pass their payment information, shipping address, and other personal information stored within the online electronic wallet system to a specific online commerce merchant for use in a specific online transaction. It supports mobile web, mobile native application, and desktop web buy flows.
- An exemplary online electronic wallet system comprises a online wallet API library, an online wallet server, a payment instrument server, and a client-device running a browser application or mobile application for communicating with merchant servers, and having a local storage data structure for storing part of a payment instrument's payment information.
- the online wallet server, payment instrument server, merchant servers, and client devices, collectively “the network devices,” may communicate over a network.
- the online wallet API library comprises a set of APIs associated with corresponding user interfaces (UIs) that allow a user to initiate an online wallet purchase from within a merchant buy flow such as from a merchant checkout web page.
- the online wallet server generates one or more user interfaces allowing the user to select the desired payment information from online wallet accounts stored in the payment instrument server and communicates secure payment information to the merchant server for payment processing.
- a payment instrument server stores one or more payment instruments in an associated online wallet account.
- a “payment instrument” is a form of payment such as a credit card, stored value card (for example, a gift card), or a debit card.
- Each payment instrument comprises corresponding payment information, such as credit card number, expiration date, and verification code.
- the “verification code” represents a portion of complete payment information needed to authorize a payment transaction using a given payment instrument.
- the verification code may be the CVV of a credit card payment instrument, a short numerical code used to verify gift card payment transactions, or a personal identification number, such as personal identification numbers used in direct carrier billing.
- FIG. 1 is a block diagram depicting an online electronic wallet system 100 according to an exemplary embodiment.
- the system 100 includes network devices 105 , 110 , and 120 , that are configured to communicate with one another via one or more networks 115 .
- Each network 115 includes a wired or wireless telecommunication means by which network devices (including devices 105 , 110 , 120 ) can exchange data.
- each network 115 can include a local area network (“LAN”), a wide area network (“WAN”), an intranet, an Internet, a mobile telephone network, or any combination thereof.
- LAN local area network
- WAN wide area network
- intranet an Internet
- Internet a mobile telephone network
- Each network device 105 , 110 , 120 includes a device having a communication module capable of transmitting and receiving data over the network 115 .
- each network device 105 , 110 , 120 can include a server, desktop computer, laptop computer, tablet computer, smart phone, handheld computer, personal digital assistant (“PDA”), or any other wired or wireless, processor-driven device.
- PDA personal digital assistant
- the network devices 105 , 110 , 120 are operated by end-users or consumers, merchants with an online store or web site, and a an online electronic wallet system operator respectively
- the client network devices 105 each include an application module 106 and local storage 108 .
- the application module may be a browser application such as Microsoft Internet Explorer, Firefox, Google Chrome, Safari, or another suitable application for interacting with web page files maintained by the merchant server 110 , online electronic wallet system 120 and/or other network devices.
- the web page files can include text, graphic, images, sound, video, and other multimedia or data files that can be transmitted via the network 115 .
- the web page files can include one or more files in the Hypertext Markup Language (“HTML”).
- the browser application module 106 can receive web page files from the merchant server 110 and/or online electronic wallet system 120 and can display the web page files to end users operating the end user network devices 105 .
- the application module 106 may also comprise a mobile application that resides on a mobile device of the user 105 .
- Local storage 108 can include any local data structure on the client device 105 suitable for storing encrypted information, such as HTML5 local storage.
- the online electronic wallet system (OEWS) 120 comprises a wallet account management module 125 , a verification code encryption module 130 , a payment encryption module 135 , an payment instrument server 140 , a merchant index 145 , a key index 150 , and an online wallet API library 155 .
- the wallet account management module 125 communicates with client devices 105 and merchant servers 110 to register theses network devices with the OEWS 120 and to facilitate requests and receipt of information between the OEWS 120 , the client devices 105 , and merchant servers 110 .
- the wallet account management module 125 manages the registration of user and merchant accounts with the OEWS 120 .
- the wallet account management module 125 may generate web-based user interfaces providing the forms necessary for a user to register for an online electronic wallet account. For example, the wallet account management module 125 can collect basic user identifying information, registration information on one or more mobile devices, and payment information. The user account information is stored in a user account in the payment instrument server 140 .
- the wallet account management module 125 may likewise provide user-interfaces that provide the forms necessary for a merchant to register account information with the OEWS 120 .
- Merchant account information including, but not limited to, merchant name, physical address, billing address, and merchant identifier is stored in the merchant index 145 . Registered merchants provide their own merchant-specific encrypting keys which are stored in the key index 150 .
- the wallet account management module 125 provides the registered merchants with access to the online API library 155 , such as a JavaScript library, comprising the forms and associated UIs required to interface the OEWS 120 with a merchant's purchase flow.
- the verification code encryption module 130 utilizes a storage encryption key to encode a verification code provided by the user.
- the encrypted verification code is then stored in local storage 108 , such as HTML5 storage or separate memory, on the user's client device 105 or devices.
- the verification code encryption module 130 likewise decrypts the encrypted verification code using the storage encryption key when collecting full payment information for communication to a merchant server 110 .
- the storage encryption key used for encrypting and decrypting the verification code is stored in a key index 150 .
- the payment encryption module 135 encrypts full payment information with a merchant-specific encryption key prior to communication of full payment information to a merchant server 120 .
- the OEWS 120 is described in more detail hereinafter with reference to the methods depicted in FIGS. 2-7 .
- the exemplary embodiments discussed in FIGS. 2-7 will refer to a CVV verification code.
- the OWES 120 of the present invention may be adapted for use with other verification codes such as those described above in the preceding paragraphs.
- FIG. 2 is a block flow diagram depicting a method 200 for conducting secure online purchases using the OEWS 120 .
- the method 200 is described with reference to the components in FIG. 1 .
- Method 200 begins with block 205 where a merchant who wishes to provide customers with the ability to pay using the OEWS 120 registers with the system.
- the wallet account management module 125 provides a user interface where the merchant can register basic identifying information such as name and place of business. Block 205 will be described in further detail hereinafter with reference to FIG. 3 .
- FIG. 3 is a block flow diagram depicting an exemplary process 205 for establishing merchant account information in the OEWS 120 .
- the process 205 is described with reference to the components illustrated in FIG. 1 .
- Method 205 begins with block 305 where the OEWS 120 receives merchant registration information from a merchant.
- the wallet account management module 125 creates a merchant account record in the merchant index 145 and assigns the merchant a merchant-specific identifier.
- the merchant registration information includes at least a merchant name and business address as well as any banking or payment processing information needed to direct the payment information to the merchant's payment processor.
- the wallet account management module 125 receives a merchant-specific encryption key from the merchant server 110 .
- the merchant-specific encryption key is associated with the merchant identifier.
- the merchant-specific encryption key may be stored with the merchant account record in the merchant index 145 , or may be stored in a separate encryption key index such as the key index 150 .
- the merchant specific encryption key is a public key of a public/private key pair and used to encrypt a user's full payment instrument information prior to communicating the full payment instrument information to the merchant server as discussed in further detail below regarding FIG. 7 .
- the wallet account management module 125 communicates the merchant identifier and an online wallet API library 155 to the merchant server 110 .
- the online wallet API library comprises the APIs and user interfaces needed to integrate the OEWS into a merchant's existing mobile/desktop web purchase flow.
- the online wallet API may be integrated into native mobile purchase flows, such as integration into a native iOS or Android API.
- the online payment API library allows the merchant to request masked wallet information for user-selected objects from the payment instrument server, which is returned to the merchant for display and logic in their purchase flow with the user. The request may further involve user interaction with a buyer interface generated by the online wallet server to authenticate the user and/or select wallet instruments.
- the payment wallet API library 155 also allows the merchant to send the final order information to an OEWS 120 when the buyer indicates their intent to complete the purchase, and to receive the full details of the buyer's online shopping cart.
- the process for initiating an online transaction using the online wallet API library is discussed in further detail below in reference to FIG. 5 and FIG. 6 .
- Block 210 where a client device 105 establishes an online electronic wallet account by registering with the OEWS 120 .
- Block 210 will be described in further detail hereinafter with reference to FIG. 4 .
- FIG. 4 is a block flow diagram depicting a process 210 for establishing user account information in the OEWS 120 .
- the process 210 is described with reference to the components illustrated in FIG. 1 .
- Process 210 begins with block 405 where the online electronic wallet system 120 receives a user's electronic wallet registration information.
- the wallet account management module 125 creates a user online electronic wallet account record in the payment instrument server 140 and assigns the user a user identifier.
- the online wallet account management module may further register one or more client device identifiers with the user's account.
- the client device identifier may be used in place of, or in addition to, the user identifier to verify that an online transaction has been initiated by a user registered with the OEWS 120 .
- the wallet account management module 125 receives one or more payment instruments for a user's wallet account. All payment instrument information for each payment instrument, except the CVV, is stored by the wallet account management module 125 in the user's account in the payment instrument server 140 .
- the payment instrument information that is stored in a user's account in the payment instrument server 140 is referred to as “partial payment information.”
- the payment instrument server 140 may reside in a physically distinct location from the rest of the OEWS 120 .
- the payment instrument server 140 may be a high security server with limited access privileges separate from those needed to access the rest of the OEWS 120 .
- the verification encryption module 130 uses a storage encryption key to encrypt the CVV information and create an encrypted CVV.
- the storage encrypted key is a public/private key pair.
- the CVV is encrypted with the public key of a public/private key pair, and decrypted with the private key of the public/private key pair.
- the CVV may be encrypted with one or more keys.
- the CVV may be encrypted with a first key type and then encrypted again with a second key type.
- the CVV may be encrypted with a AES key, such as an AES-256 session key, and the AES key in turn may be encrypted with a RSA key.
- the OEWS 120 may utilize a single public/private key pair, multiple public/private key pairs for each defined set of user accounts, or individual public/private key pairs for each individual account.
- the existing public/private key pairs may be regularly rotated for new public/private key pairs according to a defined security protocol.
- the public/private key pairs are stored in the key index 150 .
- a key hint may be stored in the user's account and used to select the appropriate key for later decryption.
- the wallet account management module 125 communicates a an encrypted CVV to the registered client device or devices.
- the communication from the wallet account management module 125 includes instructions directing the storage of the encrypted CVV in a local storage data structure 108 , such as HTML5 local storage, on the client device 105 .
- the client device 105 stores the encrypted CVV in local storage 108 .
- the online wallet API library 155 may further include a storage API or application that is resident on the client device 105 and used to direct storage of the encrypted CVV in the local storage data structure 108 .
- the wallet account management module 125 deletes the unencrypted and encrypted CVV from the OEWS 120 .
- Block 215 where an online purchase is initiated on a client device 105 via interaction with an online merchant web site hosted by the merchant server 110 .
- Block 215 will be described in further detail hereinafter with reference to FIG. 5 .
- FIG. 5 is a block flow diagram depicting a process 215 where an online purchase is initiated using the OEWS 120 .
- the process 215 is described with reference to the components in FIG. 1 .
- Process 215 begins at block 505 , where a user, registered with the OEWS 120 selects an item or items to purchase on an online merchant web site hosted by a merchant server 110 from their client device 105 .
- the items may be placed into an online shopping cart or other suitable item tracking device provided by the merchant server 110 .
- the user communicates to the merchant server 110 , from their client device 105 , an intent to use the OEWS 120 .
- the online API may generate a button for display on the purchase web page of the merchant's web site. Clicking on the button, by the user, communicates to the merchant server 110 that the user intends to use their online electronic wallet account to complete the purchase.
- the merchant server 110 communicates a request for masked payment information to the OEWS 120 comprising at least a user identifier and a transaction identifier.
- a user identifier is not communicated to the merchant server 110 .
- a request function resident in the online API library 155 communicates a request to the client device 105 to communicate the user identifier and a corresponding transaction identifier directly to the OEWS 120 .
- the API library 155 may further comprise a payment request API or application resident on the client device 105 to communicate a request for masked and full payment information.
- masked payment information refers to a portion of payment information, such as the last four digits of a credit card number, sufficient to allow a user to confirm the selected payment instrument, but constituting less than the payment instrument's complete payment information.
- the wallet account management module 125 receives the masked payment information request from the merchant server 110 and the user identifier from the merchant server 110 or client device 105
- the wallet account management module 125 selects the corresponding user payment instrument information and generates the masked payment information based on the user identifier. Where the wallet account management module 125 receives a user identifier and transaction identifier from the client device 105 and a transaction identifier from the merchant server 110 as referenced in block 515 , the wallet account management module 125 may first verify that the transaction identifiers received from the client device 105 and merchant server 110 match before selecting the user's payment information. The extent of the payment instrument information to be provided in the masked payment information can be pre-defined by an operator of the OEWS 120 .
- the wallet account management module 125 communicates the masked payment information and transaction identifier to the merchant server 110 .
- the wallet account management module 125 stores the transaction identifier with the merchant's account information.
- the wallet account management module 125 may further assign a confirmation number to the transaction identifier to confirm a latter request for full payment account information.
- the merchant server 110 communicates the masked payment information to the client device 105 by displaying the masked payment information on the appropriate web page of the merchant's buy flow.
- the online API library 155 further generates a button for confirmation of selected payment information where the user may click to confirm they wish to utilize the selected payment instrument or change the selected payment instrument.
- the merchant server 110 receives confirmation of the payment instrument from the client device 105 . Where a user indicates they wish to change the payment instrument, blocks 510 - 540 are repeated before proceeding to block 545 .
- the merchant server 110 communicates a request for full payment information to the OEWS 120 .
- the request for full payment information comprises at least a merchant identifier, a transaction identifier, a user identifier, a final online shopping cart, listing at least the items to be purchased and the purchase price, and optionally a confirmation identifier if previously assigned by the OEWS 120 as described in block 530 above.
- a request function resident in the online API library 155 will request the client device communicate the user identifier and corresponding transaction identifier directly to the OEWS 120 upon initiation of a request for full payment information by the merchant server 110 .
- the wallet account management module 125 receives the request for full payment information from the merchant server 110 or client device 105 . Block 545 will be described in further detail hereinafter with reference to FIG. 6 .
- FIG. 6 is a block flow diagram depicting a process 545 for processing a request for full payment information from a merchant server 110 .
- the process 545 is described with reference to the components in FIG. 1 .
- the process 545 begins at block 605 , where the wallet account management module 125 receives the request for full payment information from the merchant server 110 .
- the wallet account management module 125 determines if the request for full payment information included the final online shopping cart information for the purchase, or if sufficient information is otherwise available to generate a receipt for the transaction. If not, the process 545 proceeds to block 615 .
- Block 610 can require that the merchant server 110 provide sufficient information to complete a receipt for the transaction.
- the information for the receipt can comprise one or more of product identification, price per product, quantity of each product, tax, total price, merchant identification information, date/time of transaction, or any other suitable information that may be included on a receipt.
- the wallet account management module 125 may obtain portions of the receipt information from the shopping cart information, from other information provided by the merchant, or from other information sources available to the wallet account management module 125 . For example, merchant identification information may be extracted from previous information provided by the merchant server 110 . Additionally, the wallet account management module 125 may obtain the date/time information for the transaction from an internal date and time source. The wallet account management module 125 determines in block 610 whether sufficient information is available from all sources to generate a receipt for the transaction.
- the wallet account management module 125 communicates a request for the online shopping cart information sufficient to generate a receipt for the transaction to the merchant server 110 .
- the payment process will not continue without receipt of the online shopping cart information.
- the wallet account management module 125 will time out the process and cancel the transaction if a response is not received from the merchant server 110 with a defined period of time.
- the wallet account management module 125 generates an electronic receipt from the online shopping cart information and, if needed, other available information.
- the electronic receipt can include a simple copy of the online shopping cart information as received from the merchant, or the information contained in the online shopping cart can be extracted and reformatted in a standardized receipt format defined within the wallet account management module 125 .
- the wallet account management module 125 stores the electronic receipt with the user's account information. The method 545 then proceeds to block 550 of FIG. 5 .
- Block 550 the OEWS 120 encrypts the full payment information for communication to the merchant server 110 .
- Block 550 will be described in further detail hereinafter with reference to FIG. 7 .
- FIG. 7 is a block flow diagram depicting a process 550 for encrypting payment information stored between the OEWS 120 and a client device 105 .
- the process 550 is described with reference to the components in FIG. 1 .
- the process 550 begins at block 705 where the wallet account management module 125 selects the payment instrument information stored in the user's account based on the user identifier included in the request for full payment information received from the merchant server 110 at block 545 of FIG. 5 .
- the wallet account manager 125 then communicates a request for the user's encrypted CVV stored in local storage 108 in the user's mobile device 105 based on the user identifier.
- the wallet account management module 125 receives the encrypted CVV from the client device 105 .
- the verification code encryption module 130 selects the appropriate storage key or keys and decrypts the CVV.
- the payment encryption module 135 takes the payment information selected by the wallet account management module 125 from the user's account in the payment instrument server 140 and the CVV decrypted by the verification code encryption module 130 and re-encrypts the full payment information, including the CVV, using the merchant specific encryption key.
- the payment encryption module 135 selects the appropriate merchant-specific encryption key from the merchant's account using the merchant identifier included in the full payment information request to generate an encrypted full payment information communication.
- the payment encryption module 135 deletes the decrypted and re-encrypted CVV from the OEWS 120 and the method returns to block 220 of FIG. 2 .
- the wallet account management module 125 completes the transaction by communicating the encrypted full payment information package to the merchant server 110 for final payment processing.
- One or more aspects of the exemplary embodiments may include a computer program that embodies the functions described and illustrated herein, wherein the computer program is implemented in a computer system that comprises instructions stored in a machine-readable medium and a processor that executes the instructions.
- the exemplary embodiments should not be construed as limited to any one set of computer program instructions.
- a skilled programmer would be able to write such a computer program to implement an embodiment based on the appended flow charts and associated description in the application text. Therefore, disclosure of a particular set of program code instructions is not considered necessary for an adequate understanding of how to make and use the exemplary embodiments.
- any reference to an act being performed by a computer should not be construed as being performed by a single computer as more than one computer may perform the act.
- the invention can be used with computer hardware and software that performs the methods and processing functions described above.
- the systems, methods, and procedures described herein can be embodied in a programmable computer, computer executable software, or digital circuitry.
- the software can be stored on computer readable media.
- computer readable media can include a floppy disk, RAM, ROM, hard disk, removable media, flash memory, memory stick, optical media, magneto-optical media, CD-ROM, etc.
- Digital circuitry can include integrated circuits, gate arrays, building block logic, field programmable gate arrays (“FPGA”), etc.
Landscapes
- Business, Economics & Management (AREA)
- Accounting & Taxation (AREA)
- Engineering & Computer Science (AREA)
- Finance (AREA)
- Theoretical Computer Science (AREA)
- Strategic Management (AREA)
- Physics & Mathematics (AREA)
- General Business, Economics & Management (AREA)
- General Physics & Mathematics (AREA)
- Computer Networks & Wireless Communication (AREA)
- Computer Security & Cryptography (AREA)
- Development Economics (AREA)
- Economics (AREA)
- Marketing (AREA)
- Signal Processing (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
- Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
Abstract
An online electronic wallet system and method provide secure storage and transmission of payment instrument information for use in completing online purchases initiated from a client device. A payment instrument's verification code is stored in an encrypted form in local storage on a client device and retrieved and re-encrypted along with other payment instrument information stored on the system using a merchant-specific key. An API library is used to integrate the online electronic wallet system with a registered merchant's purchase flow, including the ability to ensure receipt of an electronic receipt prior to communicating payment instrument information to a merchant server.
Description
- This application claims priority to U.S. Provisional Patent Application No. 61/559,140 filed Nov. 13, 2011 and entitled “Online Wallet System.” The entire contents of the above-identified priority application are hereby fully incorporated herein by reference.
- The present disclosure relates generally to systems and methods for completing online purchases initiated on client devices, such as mobile devices. More particularly, the present invention provides systems and methods for the secure storage and transmission of payment information using an online electronic wallet.
- An increasing number of purchases are made online In addition, the growth in mobile client devices, such as smart phones and tablet computers, has enabled consumers to make online purchases on the go. However, providing the necessary payment instrument information can be laborious when working from these types of client devices. Accordingly, it is desirable to have a secure payment mechanism that requires minimal data entry on the user's part to complete the online transaction. One way to address this situation is to store a user's payment information in a payment instrument server and to allow the user to select the payment instrument they would like to use to complete an online purchase. However, limitations to this online wallet approach exist. Primarily, regulatory limitations exist regarding how much payment information may be permanently stored on a payment instrument server. For example, current regulations mandate that a consumers card verification value (CVV) may not be stored on third party payment instrument server.
- Accordingly, a need exists for providing a way to securely store verification codes, such as CVV information, apart from the rest of the payment instrument information, retrieve the verification code information and remaining payment instrument information in response to a user's initiation of an online purchase, and securely communicate the payment instrument information to an online merchant server with minimal data input from the user.
- In addition, when completing online transactions, it is often the case that the consumer does not receive a final listing of items purchased in their online shopping cart, or online receipt, until after payment instrument information has been provided and processed by the merchant server. In some instances, a merchant server may not provide this information, and in other instances interruptions in communication between the purchaser's device and merchant server can result in the failure to receive a final receipt.
- Accordingly, a need exists for payment process flows that ensure the purchaser receives an online receipt prior to communicating payment instrument information to a merchant server.
- In certain exemplary aspects, a method for secure storage of payment instrument information comprises receiving, at an online electronic wallet system, payment instrument information from a user, storing the payment instrument information, minus a verification code, in the online electronic wallet system, encrypting the verification code with an encryption key, storing the verification code in local storage on one or more client devices, and deleting the verification code and encrypted verification code information from the online electronic wallet server.
- In certain other exemplary aspects, a method for securely transmitting payment instrument information of online transactions initiated on a client device comprises receiving a payment information request from a merchant server at an online electronic wallet system, selecting by the online electronic wallet system the corresponding payment instrument information, retrieving an encrypted verification code stored on a client device corresponding to the payment instrument information, decrypting the verification code with the an encryption key used to encrypt the verification code prior to storage on the local device, re-encrypting the verification code and the remaining payment instrument information using a merchant-specific encryption key, and communicating the requested payment instrument information to the merchant server.
- In certain other exemplary aspects, a method for ensuring optimal receipt flow during an electronic transaction comprises receiving at an online electronic wallet system a request for full payment information from a merchant server, verifying by the online electronic wallet system that the request for payment information includes a copy of the online shopping cart information, generating an electronic receipt from the online shopping cart information, and storing the electronic receipt in a user's online electronic wallet account.
- These and other aspects, objects, features, and advantages of the exemplary embodiments will become apparent to those having ordinary skill in the art upon consideration of the following detailed description of illustrated exemplary embodiments, which include the best mode of carrying out the invention as presently perceived.
-
FIG. 1 is a block diagram depicting an online electronic wallet system according to an exemplary embodiment. -
FIG. 2 is a block flow diagram depicting a method for conducting secure online purchases using an online electronic wallet system according to an exemplary embodiment. -
FIG. 3 is a block flow diagram depicting a method for establishing merchant account information with an online electronic wallet system according to an exemplary embodiment. -
FIG. 4 is a block flow diagram depicting a method for establishing user account information with an online electronic wallet system according to an exemplary embodiment. -
FIG. 5 is a block flow diagram depicting a method for initiating an online purchase using an online electronic wallet system according to an exemplary embodiment. -
FIG. 6 is a block flow diagram depicting a method for processing a request for full payment information from a merchant server according to an exemplary embodiment. -
FIG. 7 is a block flow diagram depicting a method for encrypting payment information stored between an online electronic wallet system according to an exemplary embodiment. - The present invention is directed to an online electronic wallet system that lets buyers pass their payment information, shipping address, and other personal information stored within the online electronic wallet system to a specific online commerce merchant for use in a specific online transaction. It supports mobile web, mobile native application, and desktop web buy flows. An exemplary online electronic wallet system comprises a online wallet API library, an online wallet server, a payment instrument server, and a client-device running a browser application or mobile application for communicating with merchant servers, and having a local storage data structure for storing part of a payment instrument's payment information. The online wallet server, payment instrument server, merchant servers, and client devices, collectively “the network devices,” may communicate over a network. The online wallet API library comprises a set of APIs associated with corresponding user interfaces (UIs) that allow a user to initiate an online wallet purchase from within a merchant buy flow such as from a merchant checkout web page. The online wallet server generates one or more user interfaces allowing the user to select the desired payment information from online wallet accounts stored in the payment instrument server and communicates secure payment information to the merchant server for payment processing. A payment instrument server stores one or more payment instruments in an associated online wallet account. A “payment instrument” is a form of payment such as a credit card, stored value card (for example, a gift card), or a debit card. Each payment instrument comprises corresponding payment information, such as credit card number, expiration date, and verification code. The “verification code” represents a portion of complete payment information needed to authorize a payment transaction using a given payment instrument. For example, the verification code may be the CVV of a credit card payment instrument, a short numerical code used to verify gift card payment transactions, or a personal identification number, such as personal identification numbers used in direct carrier billing.
- The inventive functionality of the invention will be explained in more detail in the following description, read in conjunction with the figures illustrating the program flow.
- Turning now to the drawings, in which like numerals indicate like (but not necessarily identical) elements throughout the figures, exemplary embodiments are described in detail.
-
FIG. 1 is a block diagram depicting an onlineelectronic wallet system 100 according to an exemplary embodiment. As depicted inFIG. 1 , thesystem 100 includes 105, 110, and 120, that are configured to communicate with one another via one ornetwork devices more networks 115. - Each
network 115 includes a wired or wireless telecommunication means by which network devices (including 105, 110, 120) can exchange data. For example, eachdevices network 115 can include a local area network (“LAN”), a wide area network (“WAN”), an intranet, an Internet, a mobile telephone network, or any combination thereof. Throughout the discussion of exemplary embodiments, it should be understood that the terms “data” and “information” are used interchangeably herein to refer to text, images, audio, video, or any other form of information that can exist in a computer-based environment. - Each
105, 110, 120 includes a device having a communication module capable of transmitting and receiving data over thenetwork device network 115. For example, each 105, 110, 120 can include a server, desktop computer, laptop computer, tablet computer, smart phone, handheld computer, personal digital assistant (“PDA”), or any other wired or wireless, processor-driven device. In the exemplary embodiment depicted innetwork device FIG. 1 , the 105, 110, 120 are operated by end-users or consumers, merchants with an online store or web site, and a an online electronic wallet system operator respectivelynetwork devices - The
client network devices 105 each include anapplication module 106 andlocal storage 108. The application module may be a browser application such as Microsoft Internet Explorer, Firefox, Google Chrome, Safari, or another suitable application for interacting with web page files maintained by themerchant server 110, onlineelectronic wallet system 120 and/or other network devices. The web page files can include text, graphic, images, sound, video, and other multimedia or data files that can be transmitted via thenetwork 115. For example, the web page files can include one or more files in the Hypertext Markup Language (“HTML”). Thebrowser application module 106 can receive web page files from themerchant server 110 and/or onlineelectronic wallet system 120 and can display the web page files to end users operating the enduser network devices 105. Theapplication module 106 may also comprise a mobile application that resides on a mobile device of theuser 105.Local storage 108 can include any local data structure on theclient device 105 suitable for storing encrypted information, such as HTML5 local storage. - In one exemplary embodiment, the online electronic wallet system (OEWS) 120 comprises a wallet
account management module 125, a verificationcode encryption module 130, apayment encryption module 135, anpayment instrument server 140, amerchant index 145, akey index 150, and an onlinewallet API library 155. The walletaccount management module 125 communicates withclient devices 105 andmerchant servers 110 to register theses network devices with the OEWS 120 and to facilitate requests and receipt of information between the OEWS 120, theclient devices 105, andmerchant servers 110. The walletaccount management module 125 manages the registration of user and merchant accounts with the OEWS 120. Regarding user account registration, the walletaccount management module 125 may generate web-based user interfaces providing the forms necessary for a user to register for an online electronic wallet account. For example, the walletaccount management module 125 can collect basic user identifying information, registration information on one or more mobile devices, and payment information. The user account information is stored in a user account in thepayment instrument server 140. Regarding merchant account registration, the walletaccount management module 125 may likewise provide user-interfaces that provide the forms necessary for a merchant to register account information with theOEWS 120. Merchant account information including, but not limited to, merchant name, physical address, billing address, and merchant identifier is stored in themerchant index 145. Registered merchants provide their own merchant-specific encrypting keys which are stored in thekey index 150. In addition, the walletaccount management module 125 provides the registered merchants with access to theonline API library 155, such as a JavaScript library, comprising the forms and associated UIs required to interface theOEWS 120 with a merchant's purchase flow. The verificationcode encryption module 130 utilizes a storage encryption key to encode a verification code provided by the user. The encrypted verification code is then stored inlocal storage 108, such as HTML5 storage or separate memory, on the user'sclient device 105 or devices. The verificationcode encryption module 130 likewise decrypts the encrypted verification code using the storage encryption key when collecting full payment information for communication to amerchant server 110. The storage encryption key used for encrypting and decrypting the verification code is stored in akey index 150. Thepayment encryption module 135 encrypts full payment information with a merchant-specific encryption key prior to communication of full payment information to amerchant server 120. - The
OEWS 120 is described in more detail hereinafter with reference to the methods depicted inFIGS. 2-7 . For ease of reference, the exemplary embodiments discussed inFIGS. 2-7 will refer to a CVV verification code. However, the OWES 120 of the present invention may be adapted for use with other verification codes such as those described above in the preceding paragraphs. -
FIG. 2 is a block flow diagram depicting amethod 200 for conducting secure online purchases using theOEWS 120. Themethod 200 is described with reference to the components inFIG. 1 . -
Method 200 begins withblock 205 where a merchant who wishes to provide customers with the ability to pay using theOEWS 120 registers with the system. The walletaccount management module 125 provides a user interface where the merchant can register basic identifying information such as name and place of business.Block 205 will be described in further detail hereinafter with reference toFIG. 3 . -
FIG. 3 is a block flow diagram depicting anexemplary process 205 for establishing merchant account information in theOEWS 120. Theprocess 205 is described with reference to the components illustrated inFIG. 1 . -
Method 205 begins withblock 305 where theOEWS 120 receives merchant registration information from a merchant. The walletaccount management module 125 creates a merchant account record in themerchant index 145 and assigns the merchant a merchant-specific identifier. The merchant registration information includes at least a merchant name and business address as well as any banking or payment processing information needed to direct the payment information to the merchant's payment processor. - At
block 310, the walletaccount management module 125 receives a merchant-specific encryption key from themerchant server 110. - At
block 315, the merchant-specific encryption key is associated with the merchant identifier. The merchant-specific encryption key may be stored with the merchant account record in themerchant index 145, or may be stored in a separate encryption key index such as thekey index 150. The merchant specific encryption key is a public key of a public/private key pair and used to encrypt a user's full payment instrument information prior to communicating the full payment instrument information to the merchant server as discussed in further detail below regardingFIG. 7 . - At
block 320 the walletaccount management module 125 communicates the merchant identifier and an onlinewallet API library 155 to themerchant server 110. The online wallet API library comprises the APIs and user interfaces needed to integrate the OEWS into a merchant's existing mobile/desktop web purchase flow. Alternatively, the online wallet API may be integrated into native mobile purchase flows, such as integration into a native iOS or Android API. The online payment API library allows the merchant to request masked wallet information for user-selected objects from the payment instrument server, which is returned to the merchant for display and logic in their purchase flow with the user. The request may further involve user interaction with a buyer interface generated by the online wallet server to authenticate the user and/or select wallet instruments. The paymentwallet API library 155 also allows the merchant to send the final order information to anOEWS 120 when the buyer indicates their intent to complete the purchase, and to receive the full details of the buyer's online shopping cart. The process for initiating an online transaction using the online wallet API library is discussed in further detail below in reference toFIG. 5 andFIG. 6 . - Returning to
FIG. 2 , atblock 210 where aclient device 105 establishes an online electronic wallet account by registering with theOEWS 120.Block 210 will be described in further detail hereinafter with reference toFIG. 4 . -
FIG. 4 is a block flow diagram depicting aprocess 210 for establishing user account information in theOEWS 120. Theprocess 210 is described with reference to the components illustrated inFIG. 1 . -
Process 210 begins withblock 405 where the onlineelectronic wallet system 120 receives a user's electronic wallet registration information. - At
block 410, the walletaccount management module 125 creates a user online electronic wallet account record in thepayment instrument server 140 and assigns the user a user identifier. The online wallet account management module may further register one or more client device identifiers with the user's account. In certain exemplary embodiments, the client device identifier may be used in place of, or in addition to, the user identifier to verify that an online transaction has been initiated by a user registered with theOEWS 120. - At
block 415, the walletaccount management module 125 receives one or more payment instruments for a user's wallet account. All payment instrument information for each payment instrument, except the CVV, is stored by the walletaccount management module 125 in the user's account in thepayment instrument server 140. As used herein, the payment instrument information that is stored in a user's account in thepayment instrument server 140 is referred to as “partial payment information.” In certain exemplary embodiments, thepayment instrument server 140 may reside in a physically distinct location from the rest of theOEWS 120. In certain exemplary embodiments, thepayment instrument server 140 may be a high security server with limited access privileges separate from those needed to access the rest of theOEWS 120. - At
block 420, theverification encryption module 130 uses a storage encryption key to encrypt the CVV information and create an encrypted CVV. In certain exemplary embodiments, the storage encrypted key is a public/private key pair. In certain exemplary embodiments, the CVV is encrypted with the public key of a public/private key pair, and decrypted with the private key of the public/private key pair. In one exemplary embodiment, the CVV may be encrypted with one or more keys. For example, the CVV may be encrypted with a first key type and then encrypted again with a second key type. For example, the CVV may be encrypted with a AES key, such as an AES-256 session key, and the AES key in turn may be encrypted with a RSA key. TheOEWS 120 may utilize a single public/private key pair, multiple public/private key pairs for each defined set of user accounts, or individual public/private key pairs for each individual account. The existing public/private key pairs may be regularly rotated for new public/private key pairs according to a defined security protocol. The public/private key pairs are stored in thekey index 150. In certain exemplary embodiments, a key hint may be stored in the user's account and used to select the appropriate key for later decryption. - At
block 425, the walletaccount management module 125 communicates a an encrypted CVV to the registered client device or devices. The communication from the walletaccount management module 125 includes instructions directing the storage of the encrypted CVV in a localstorage data structure 108, such as HTML5 local storage, on theclient device 105. - At
block 430, theclient device 105 stores the encrypted CVV inlocal storage 108. In certain exemplary embodiments, the onlinewallet API library 155 may further include a storage API or application that is resident on theclient device 105 and used to direct storage of the encrypted CVV in the localstorage data structure 108. - At
block 435, the walletaccount management module 125 deletes the unencrypted and encrypted CVV from theOEWS 120. - Returning to
FIG. 2 , atblock 215 where an online purchase is initiated on aclient device 105 via interaction with an online merchant web site hosted by themerchant server 110.Block 215 will be described in further detail hereinafter with reference toFIG. 5 . -
FIG. 5 is a block flow diagram depicting aprocess 215 where an online purchase is initiated using theOEWS 120. Theprocess 215 is described with reference to the components inFIG. 1 . -
Process 215 begins atblock 505, where a user, registered with theOEWS 120 selects an item or items to purchase on an online merchant web site hosted by amerchant server 110 from theirclient device 105. The items may be placed into an online shopping cart or other suitable item tracking device provided by themerchant server 110. - At
block 510, the user communicates to themerchant server 110, from theirclient device 105, an intent to use theOEWS 120. In certain exemplary embodiments, the online API may generate a button for display on the purchase web page of the merchant's web site. Clicking on the button, by the user, communicates to themerchant server 110 that the user intends to use their online electronic wallet account to complete the purchase. - At
block 515, themerchant server 110 communicates a request for masked payment information to theOEWS 120 comprising at least a user identifier and a transaction identifier. In certain exemplary embodiments, a user identifier is not communicated to themerchant server 110. Instead, a request function resident in theonline API library 155 communicates a request to theclient device 105 to communicate the user identifier and a corresponding transaction identifier directly to theOEWS 120. In certain exemplary embodiments theAPI library 155 may further comprise a payment request API or application resident on theclient device 105 to communicate a request for masked and full payment information. As used herein “masked payment information” refers to a portion of payment information, such as the last four digits of a credit card number, sufficient to allow a user to confirm the selected payment instrument, but constituting less than the payment instrument's complete payment information. - At
block 520, the walletaccount management module 125 receives the masked payment information request from themerchant server 110 and the user identifier from themerchant server 110 orclient device 105 - At
block 525, the walletaccount management module 125 selects the corresponding user payment instrument information and generates the masked payment information based on the user identifier. Where the walletaccount management module 125 receives a user identifier and transaction identifier from theclient device 105 and a transaction identifier from themerchant server 110 as referenced inblock 515, the walletaccount management module 125 may first verify that the transaction identifiers received from theclient device 105 andmerchant server 110 match before selecting the user's payment information. The extent of the payment instrument information to be provided in the masked payment information can be pre-defined by an operator of theOEWS 120. - At
block 530, the walletaccount management module 125 communicates the masked payment information and transaction identifier to themerchant server 110. The walletaccount management module 125 stores the transaction identifier with the merchant's account information. In certain exemplary embodiments, the walletaccount management module 125 may further assign a confirmation number to the transaction identifier to confirm a latter request for full payment account information. - At
block 535, themerchant server 110 communicates the masked payment information to theclient device 105 by displaying the masked payment information on the appropriate web page of the merchant's buy flow. In certain exemplary embodiments, theonline API library 155 further generates a button for confirmation of selected payment information where the user may click to confirm they wish to utilize the selected payment instrument or change the selected payment instrument. - At
block 540, themerchant server 110 receives confirmation of the payment instrument from theclient device 105. Where a user indicates they wish to change the payment instrument, blocks 510-540 are repeated before proceeding to block 545. - At
block 545, themerchant server 110 communicates a request for full payment information to theOEWS 120. The request for full payment information comprises at least a merchant identifier, a transaction identifier, a user identifier, a final online shopping cart, listing at least the items to be purchased and the purchase price, and optionally a confirmation identifier if previously assigned by theOEWS 120 as described inblock 530 above. As with the masked payment information request, if the user identifier is not communicated directly to themerchant server 110, a request function resident in theonline API library 155 will request the client device communicate the user identifier and corresponding transaction identifier directly to theOEWS 120 upon initiation of a request for full payment information by themerchant server 110. - At
block 545, the walletaccount management module 125 receives the request for full payment information from themerchant server 110 orclient device 105.Block 545 will be described in further detail hereinafter with reference toFIG. 6 . -
FIG. 6 is a block flow diagram depicting aprocess 545 for processing a request for full payment information from amerchant server 110. Theprocess 545 is described with reference to the components inFIG. 1 . - The
process 545 begins atblock 605, where the walletaccount management module 125 receives the request for full payment information from themerchant server 110. - At
block 610, the walletaccount management module 125 determines if the request for full payment information included the final online shopping cart information for the purchase, or if sufficient information is otherwise available to generate a receipt for the transaction. If not, theprocess 545 proceeds to block 615. - Block 610 can require that the
merchant server 110 provide sufficient information to complete a receipt for the transaction. In exemplary embodiments, the information for the receipt can comprise one or more of product identification, price per product, quantity of each product, tax, total price, merchant identification information, date/time of transaction, or any other suitable information that may be included on a receipt. The walletaccount management module 125 may obtain portions of the receipt information from the shopping cart information, from other information provided by the merchant, or from other information sources available to the walletaccount management module 125. For example, merchant identification information may be extracted from previous information provided by themerchant server 110. Additionally, the walletaccount management module 125 may obtain the date/time information for the transaction from an internal date and time source. The walletaccount management module 125 determines inblock 610 whether sufficient information is available from all sources to generate a receipt for the transaction. - At
block 615, the walletaccount management module 125 communicates a request for the online shopping cart information sufficient to generate a receipt for the transaction to themerchant server 110. In an exemplary embodiment, the payment process will not continue without receipt of the online shopping cart information. In certain exemplary embodiments, the walletaccount management module 125 will time out the process and cancel the transaction if a response is not received from themerchant server 110 with a defined period of time. - Returning to block 610, if the request does include online shopping cart information, or if sufficient information to generate the receipt is otherwise available, then the
process 545 proceeds to block 620. - At
block 620, the walletaccount management module 125 generates an electronic receipt from the online shopping cart information and, if needed, other available information. The electronic receipt can include a simple copy of the online shopping cart information as received from the merchant, or the information contained in the online shopping cart can be extracted and reformatted in a standardized receipt format defined within the walletaccount management module 125. - At
block 625, the walletaccount management module 125 stores the electronic receipt with the user's account information. Themethod 545 then proceeds to block 550 ofFIG. 5 . - Returning to
FIG. 5 atblock 550, theOEWS 120 encrypts the full payment information for communication to themerchant server 110.Block 550 will be described in further detail hereinafter with reference toFIG. 7 . -
FIG. 7 is a block flow diagram depicting aprocess 550 for encrypting payment information stored between theOEWS 120 and aclient device 105. Theprocess 550 is described with reference to the components inFIG. 1 . - The
process 550 begins atblock 705 where the walletaccount management module 125 selects the payment instrument information stored in the user's account based on the user identifier included in the request for full payment information received from themerchant server 110 atblock 545 ofFIG. 5 . - At
block 710, thewallet account manager 125 then communicates a request for the user's encrypted CVV stored inlocal storage 108 in the user'smobile device 105 based on the user identifier. - At
block 715, the walletaccount management module 125 receives the encrypted CVV from theclient device 105. The verificationcode encryption module 130 selects the appropriate storage key or keys and decrypts the CVV. - At
block 720, thepayment encryption module 135 takes the payment information selected by the walletaccount management module 125 from the user's account in thepayment instrument server 140 and the CVV decrypted by the verificationcode encryption module 130 and re-encrypts the full payment information, including the CVV, using the merchant specific encryption key. Thepayment encryption module 135 selects the appropriate merchant-specific encryption key from the merchant's account using the merchant identifier included in the full payment information request to generate an encrypted full payment information communication. - At
block 725, thepayment encryption module 135 deletes the decrypted and re-encrypted CVV from theOEWS 120 and the method returns to block 220 ofFIG. 2 . - Returning to
FIG. 2 atblock 220, the walletaccount management module 125 completes the transaction by communicating the encrypted full payment information package to themerchant server 110 for final payment processing. - One or more aspects of the exemplary embodiments may include a computer program that embodies the functions described and illustrated herein, wherein the computer program is implemented in a computer system that comprises instructions stored in a machine-readable medium and a processor that executes the instructions. However, it should be apparent that there could be many different ways of implementing the exemplary embodiments in computer programming, and the exemplary embodiments should not be construed as limited to any one set of computer program instructions. Further, a skilled programmer would be able to write such a computer program to implement an embodiment based on the appended flow charts and associated description in the application text. Therefore, disclosure of a particular set of program code instructions is not considered necessary for an adequate understanding of how to make and use the exemplary embodiments. Moreover, any reference to an act being performed by a computer should not be construed as being performed by a single computer as more than one computer may perform the act.
- The exemplary systems, methods, and blocks described in the embodiments presented previously are illustrative, and, in alternative embodiments, certain blocks can be performed in a different order, in parallel with one another, omitted entirely, and/or combined between different exemplary methods, and/or certain additional blocks can be performed, without departing from the scope and spirit of the invention. Accordingly, such alternative embodiments are included in the invention described herein.
- The invention can be used with computer hardware and software that performs the methods and processing functions described above. As will be appreciated by those having ordinary skill in the art, the systems, methods, and procedures described herein can be embodied in a programmable computer, computer executable software, or digital circuitry. The software can be stored on computer readable media. For example, computer readable media can include a floppy disk, RAM, ROM, hard disk, removable media, flash memory, memory stick, optical media, magneto-optical media, CD-ROM, etc. Digital circuitry can include integrated circuits, gate arrays, building block logic, field programmable gate arrays (“FPGA”), etc.
- Although specific embodiments of the invention have been described above in detail, the description is merely for purposes of illustration. Various modifications of, and equivalent blocks and components corresponding to, the disclosed aspects of the exemplary embodiments, in addition to those described above, can be made by those having ordinary skill in the art without departing from the spirit and scope of the invention defined in the following claims, the scope of which is to be accorded the broadest interpretation so as to encompass such modifications and equivalent structures.
Claims (23)
1. A computer-implemented method for securely storing and retrieving payment information from multiple devices across a payment network, comprising:
receiving, at an online wallet server, payment instrument information of a registered user, the payment information comprising a payment account number and code verification value (“CVV”), the online wallet server comprising a processor and a memory that stores the payment account number with a user identifier assigned to the registered user;
encrypting, by the online wallet server, the CVV using an encryption key;
communicating, by the online wallet server, a data package to a remote registered user device, the data package comprising the encrypted CVV and a set of computer-executable instructions that when executed by the remote registered user device cause the remote registered user device to store the encrypted CVV in a local data structure on the remote registered user device;
retrieving, by the online wallet server, the encrypted CVV in response to receiving a request for payment information from a merchant server by communicating a request to the registered user device that causes the registered user device to retrieve the encrypted CVV from the local data structure on the remote registered user device and communicate it to the online wallet server.
2. The method of claim 1 , wherein the payment instrument is a credit card.
3. The method of claim 1 , wherein the online wallet server encrypts the CVV using an encryption key maintained by the computer and not shared with the client device.
4. The method of 1, wherein the CVV is encrypted with a first key, and wherein the online wallet server encrypts the first key with a second key and stores the encrypted first key for later decryption of the encrypted CVV.
5. (canceled)
6. (canceled)
7. (canceled)
8. (canceled)
9. The method of claim 8 , wherein the local storage data structure is HTML 5 storage on the client device.
10. (canceled)
11. A computer program product comprising a non-transitory computer-readable medium having computer-readable program code embodied therein for securely transmitting payment information for online transactions initiated via a client device, the computer-readable program code comprising:
computer-readable program code to receive payment instrument information of a registered user, the payment information comprising a payment account number and a code verification value (“CVV”); and
computer-readable program code to communicate over a wireless communication channel a data package to a remote client device of the registered user, the data package comprising an encrypted version of the CVV and computer-readable program code that when executed by the remote client device causes the remote client device to store the CVV in a in a local storage data structure on the remote client device.
12. The computer program product of 11, wherein the payment instrument is a credit card.
13. The computer program product of claim 11 , further comprising:
computer-readable program code to communicate a request over a wireless communication channel the remote client device in response to receiving a request for payment information from a merchant server, wherein the request for the encrypted CVV causes the remote client device to retrieve the encrypted CVV from the local data structure and communicate to the online wallet server.
14. (canceled)
15. (canceled)
16. The computer program product of claim 11 , wherein the local storage data structure is HTML 5 storage on the client device.
17. (canceled)
18. An online electronic wallet system for securely transmitting payment information for online transactions initiated on a client device, comprising:
a storage device; and
a processor communicatively coupled to the storage device, wherein the processor executes application code instructions that are stored in the storage device to cause the system to:
receive payment instrument information of a registered user, the payment instrument information comprising a payment account number and a code verification value (“CVV”), wherein the payment account number is stored on the storage device;
communicate a data package to a remote client device of the registered user, the data package comprising an encrypted version of the CVV and computer-readable program code that when executed by the remote client device causes the remote client device to store the CVV in a local storage data structure on the remote client device.
19. The online electronic system of claim 17 , wherein the processor further executes application code instructions stored in the storage device and that cause the system to:
communicate a request for the encrypted CVV to the remote client device in response to receiving a request for payment information from a merchant server, wherein the request for the encrypted CVV causes the remote client device to retrieve the encrypted CVV from the local data structure and communicate the encrypted CVV to the online wallet server.
20. The system of claim 17 , wherein the payment instrument is a credit card.
21. A method for securely storing and retrieving payment information from multiple devices across payment networks, comprising:
providing a storage application to a registered user for installation on a remote registered user device;
receiving, at an online wallet server, payment instrument information of the registered user, the payment information comprising a payment account number and a code verification value (“CVV”), the online wallet server comprising a processor and a memory that stores the payment account number, wherein the microprocessor;
encrypts the CVV using an encryption key; and
communicates a data package to the remote registered user device, the data package consisting of the encrypted CVV and a set of computer-executable instructions that when executed by the remote client device cause the storage application to store the encrypted CVV in a local data structure on the remote registered user device.
22. The method of claim 22 , wherein the local storage data structure is HTML 5 storage on the client device.
23. The method of claim 22 , wherein the CVV is encrypted with a first key, and wherein the computer encrypts the first key with a second key and stores the encrypted first key for later decryption of the encrypted CVV.
Priority Applications (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| US13/541,460 US20160140566A1 (en) | 2011-11-13 | 2012-07-03 | Secure transmission of payment credentials |
Applications Claiming Priority (2)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| US201161559140P | 2011-11-13 | 2011-11-13 | |
| US13/541,460 US20160140566A1 (en) | 2011-11-13 | 2012-07-03 | Secure transmission of payment credentials |
Publications (1)
| Publication Number | Publication Date |
|---|---|
| US20160140566A1 true US20160140566A1 (en) | 2016-05-19 |
Family
ID=49681659
Family Applications (3)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| US13/541,460 Abandoned US20160140566A1 (en) | 2011-11-13 | 2012-07-03 | Secure transmission of payment credentials |
| US13/541,469 Expired - Fee Related US8606720B1 (en) | 2011-11-13 | 2012-07-03 | Secure storage of payment information on client devices |
| US13/541,402 Active 2033-09-22 US9165321B1 (en) | 2011-11-13 | 2012-07-03 | Optimistic receipt flow |
Family Applications After (2)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| US13/541,469 Expired - Fee Related US8606720B1 (en) | 2011-11-13 | 2012-07-03 | Secure storage of payment information on client devices |
| US13/541,402 Active 2033-09-22 US9165321B1 (en) | 2011-11-13 | 2012-07-03 | Optimistic receipt flow |
Country Status (1)
| Country | Link |
|---|---|
| US (3) | US20160140566A1 (en) |
Cited By (4)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN106651364A (en) * | 2017-02-07 | 2017-05-10 | 桂林理工大学 | Online payment device for authentication through visible light and barcode two-way public-key system |
| CN107395577A (en) * | 2017-07-06 | 2017-11-24 | 广东电网有限责任公司信息中心 | A kind of large-scale power Enterprise Salary security system |
| US20180218357A1 (en) * | 2017-02-01 | 2018-08-02 | Microsoft Technology Licensing, Llc | Export high value material based on ring 1 evidence of ownership |
| US11120511B2 (en) | 2016-07-26 | 2021-09-14 | Samsung Electronics Co., Ltd. | System and method for universal card acceptance |
Families Citing this family (169)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US20140019352A1 (en) | 2011-02-22 | 2014-01-16 | Visa International Service Association | Multi-purpose virtual card transaction apparatuses, methods and systems |
| US8762263B2 (en) | 2005-09-06 | 2014-06-24 | Visa U.S.A. Inc. | System and method for secured account numbers in proximity devices |
| US8121942B2 (en) | 2007-06-25 | 2012-02-21 | Visa U.S.A. Inc. | Systems and methods for secure and transparent cardless transactions |
| US7739169B2 (en) | 2007-06-25 | 2010-06-15 | Visa U.S.A. Inc. | Restricting access to compromised account information |
| US7937324B2 (en) | 2007-09-13 | 2011-05-03 | Visa U.S.A. Inc. | Account permanence |
| US8219489B2 (en) | 2008-07-29 | 2012-07-10 | Visa U.S.A. Inc. | Transaction processing using a global unique identifier |
| AU2009311303B2 (en) | 2008-11-06 | 2015-09-10 | Visa International Service Association | Online challenge-response |
| US9715681B2 (en) | 2009-04-28 | 2017-07-25 | Visa International Service Association | Verification of portable consumer devices |
| US9105027B2 (en) | 2009-05-15 | 2015-08-11 | Visa International Service Association | Verification of portable consumer device for secure services |
| US8602293B2 (en) | 2009-05-15 | 2013-12-10 | Visa International Service Association | Integration of verification tokens with portable computing devices |
| US8534564B2 (en) | 2009-05-15 | 2013-09-17 | Ayman Hammad | Integration of verification tokens with mobile communication devices |
| US9038886B2 (en) | 2009-05-15 | 2015-05-26 | Visa International Service Association | Verification of portable consumer devices |
| US10846683B2 (en) | 2009-05-15 | 2020-11-24 | Visa International Service Association | Integration of verification tokens with mobile communication devices |
| US8893967B2 (en) | 2009-05-15 | 2014-11-25 | Visa International Service Association | Secure Communication of payment information to merchants using a verification token |
| US7891560B2 (en) | 2009-05-15 | 2011-02-22 | Visa International Service Assocation | Verification of portable consumer devices |
| US10140598B2 (en) | 2009-05-20 | 2018-11-27 | Visa International Service Association | Device including encrypted data for expiration date and verification value creation |
| US10255591B2 (en) | 2009-12-18 | 2019-04-09 | Visa International Service Association | Payment channel returning limited use proxy dynamic value |
| CN105243313B (en) | 2010-01-12 | 2018-12-25 | 维萨国际服务协会 | For the method whenever confirmed to verifying token |
| US10255601B2 (en) | 2010-02-25 | 2019-04-09 | Visa International Service Association | Multifactor authentication using a directory server |
| US9245267B2 (en) | 2010-03-03 | 2016-01-26 | Visa International Service Association | Portable account number for consumer payment account |
| US9342832B2 (en) | 2010-08-12 | 2016-05-17 | Visa International Service Association | Securing external systems with account token substitution |
| US9691055B2 (en) | 2010-12-17 | 2017-06-27 | Google Inc. | Digital wallet |
| US8725644B2 (en) * | 2011-01-28 | 2014-05-13 | The Active Network, Inc. | Secure online transaction processing |
| US20120197691A1 (en) * | 2011-01-31 | 2012-08-02 | Bank Of America Corporation | Mobile wallet payment vehicle preferences |
| US10586227B2 (en) | 2011-02-16 | 2020-03-10 | Visa International Service Association | Snap mobile payment apparatuses, methods and systems |
| WO2012112822A2 (en) | 2011-02-16 | 2012-08-23 | Visa International Service Association | Snap mobile payment apparatuses, methods and systems |
| AU2012220669A1 (en) | 2011-02-22 | 2013-05-02 | Visa International Service Association | Universal electronic payment apparatuses, methods and systems |
| CN103503010B (en) | 2011-03-04 | 2017-12-29 | 维萨国际服务协会 | Secure Elements Incorporating Payment Capabilities into Computers |
| WO2012142045A2 (en) | 2011-04-11 | 2012-10-18 | Visa International Service Association | Multiple tokenization for authentication |
| US9355393B2 (en) | 2011-08-18 | 2016-05-31 | Visa International Service Association | Multi-directional wallet connector apparatuses, methods and systems |
| US9582598B2 (en) | 2011-07-05 | 2017-02-28 | Visa International Service Association | Hybrid applications utilizing distributed models and views apparatuses, methods and systems |
| AU2012278963B2 (en) | 2011-07-05 | 2017-02-23 | Visa International Service Association | Electronic wallet checkout platform apparatuses, methods and systems |
| US9704155B2 (en) | 2011-07-29 | 2017-07-11 | Visa International Service Association | Passing payment tokens through an hop/sop |
| US10825001B2 (en) | 2011-08-18 | 2020-11-03 | Visa International Service Association | Multi-directional wallet connector apparatuses, methods and systems |
| US9710807B2 (en) | 2011-08-18 | 2017-07-18 | Visa International Service Association | Third-party value added wallet features and interfaces apparatuses, methods and systems |
| US10242358B2 (en) | 2011-08-18 | 2019-03-26 | Visa International Service Association | Remote decoupled application persistent state apparatuses, methods and systems |
| US12462245B2 (en) | 2011-08-18 | 2025-11-04 | Visa International Service Association | Remote decoupled application persistent state apparatuses, methods and systems |
| US9165294B2 (en) | 2011-08-24 | 2015-10-20 | Visa International Service Association | Method for using barcodes and mobile devices to conduct payment transactions |
| US11354723B2 (en) | 2011-09-23 | 2022-06-07 | Visa International Service Association | Smart shopping cart with E-wallet store injection search |
| US10223730B2 (en) | 2011-09-23 | 2019-03-05 | Visa International Service Association | E-wallet store injection search apparatuses, methods and systems |
| US20130173403A1 (en) * | 2012-01-01 | 2013-07-04 | Bank Of America Corporation | E-receipt barcode on mobile device that is readable by point of transaction for purchase |
| EP3770839A1 (en) | 2012-01-05 | 2021-01-27 | Visa International Service Association | Data protection with translation |
| US10223710B2 (en) | 2013-01-04 | 2019-03-05 | Visa International Service Association | Wearable intelligent vision device apparatuses, methods and systems |
| WO2013113004A1 (en) | 2012-01-26 | 2013-08-01 | Visa International Service Association | System and method of providing tokenization as a service |
| AU2013214801B2 (en) | 2012-02-02 | 2018-06-21 | Visa International Service Association | Multi-source, multi-dimensional, cross-entity, multimedia database platform apparatuses, methods and systems |
| US10282724B2 (en) | 2012-03-06 | 2019-05-07 | Visa International Service Association | Security system incorporating mobile device |
| US10235668B1 (en) | 2012-04-25 | 2019-03-19 | Wells Fargo Bank, N.A. | System and method for a mobile wallet |
| US10192217B1 (en) * | 2012-04-25 | 2019-01-29 | Wells Fargo Bank, N.A. | System and method for receipt tracking in a mobile wallet |
| US20130297501A1 (en) | 2012-05-04 | 2013-11-07 | Justin Monk | System and method for local data conversion |
| US9524501B2 (en) | 2012-06-06 | 2016-12-20 | Visa International Service Association | Method and system for correlating diverse transaction data |
| US9672519B2 (en) | 2012-06-08 | 2017-06-06 | Fmr Llc | Mobile device software radio for securely passing financial information between a customer and a financial services firm |
| US9928504B2 (en) | 2012-06-26 | 2018-03-27 | Google Llc | Saving merchant artifacts to a virtual wallet |
| US9547769B2 (en) | 2012-07-03 | 2017-01-17 | Visa International Service Association | Data protection hub |
| US20140019365A1 (en) * | 2012-07-12 | 2014-01-16 | Google Inc. | Processing payment information for online orders at a local merchant's point of sale via direct payment |
| US20140025571A1 (en) * | 2012-07-23 | 2014-01-23 | Its, Inc. | System and method for dual message consumer authentication value-based eft transactions |
| US9846861B2 (en) | 2012-07-25 | 2017-12-19 | Visa International Service Association | Upstream and downstream data conversion |
| US9256871B2 (en) | 2012-07-26 | 2016-02-09 | Visa U.S.A. Inc. | Configurable payment tokens |
| US9665722B2 (en) | 2012-08-10 | 2017-05-30 | Visa International Service Association | Privacy firewall |
| US9760879B2 (en) | 2012-08-30 | 2017-09-12 | Paypal, Inc. | Systems, methods, and computer program products for providing an electronic receipt |
| US10192216B2 (en) | 2012-09-11 | 2019-01-29 | Visa International Service Association | Cloud-based virtual wallet NFC apparatuses, methods and systems |
| WO2014066559A1 (en) | 2012-10-23 | 2014-05-01 | Visa International Service Association | Transaction initiation determination system utilizing transaction data elements |
| US9177067B2 (en) | 2012-11-04 | 2015-11-03 | Walter J. Kawecki, III | Systems and methods for enhancing user data derived from digital communications |
| US9911118B2 (en) | 2012-11-21 | 2018-03-06 | Visa International Service Association | Device pairing via trusted intermediary |
| WO2014087381A1 (en) | 2012-12-07 | 2014-06-12 | Visa International Service Association | A token generating component |
| US9741051B2 (en) | 2013-01-02 | 2017-08-22 | Visa International Service Association | Tokenization and third-party interaction |
| US10740731B2 (en) | 2013-01-02 | 2020-08-11 | Visa International Service Association | Third party settlement |
| US11055710B2 (en) | 2013-05-02 | 2021-07-06 | Visa International Service Association | Systems and methods for verifying and processing transactions using virtual currency |
| WO2014186635A1 (en) | 2013-05-15 | 2014-11-20 | Visa International Service Association | Mobile tokenization hub |
| US10878422B2 (en) | 2013-06-17 | 2020-12-29 | Visa International Service Association | System and method using merchant token |
| US20150019417A1 (en) * | 2013-06-26 | 2015-01-15 | Google Inc. | Updating a digital wallet from financial account issuer |
| US20150019440A1 (en) * | 2013-07-12 | 2015-01-15 | Gongming Yang | Encrypted Correction Code to protect the integrity and originality of electronic documentation and secure online payment and online wallet |
| SG10201800291UA (en) | 2013-07-15 | 2018-02-27 | Visa Int Service Ass | Secure remote payment transaction processing |
| RU2681366C2 (en) | 2013-07-24 | 2019-03-06 | Виза Интернэшнл Сервис Ассосиэйшн | Systems and methods for communicating risk using token assurance data |
| US10902421B2 (en) | 2013-07-26 | 2021-01-26 | Visa International Service Association | Provisioning payment credentials to a consumer |
| US9287935B2 (en) * | 2013-08-01 | 2016-03-15 | Blackberry Limited | Method and apparatus for anti-eavesdropping in vunerable NFC applications |
| US10496986B2 (en) | 2013-08-08 | 2019-12-03 | Visa International Service Association | Multi-network tokenization processing |
| SG10201801086RA (en) | 2013-08-08 | 2018-03-28 | Visa Int Service Ass | Methods and systems for provisioning mobile devices with payment credentials |
| CN113011896B (en) | 2013-08-15 | 2024-04-09 | 维萨国际服务协会 | Secure remote payment transaction processing using secure elements |
| RU2663476C2 (en) | 2013-09-20 | 2018-08-06 | Виза Интернэшнл Сервис Ассосиэйшн | Remote payment transactions protected processing, including authentication of consumers |
| US9978094B2 (en) | 2013-10-11 | 2018-05-22 | Visa International Service Association | Tokenization revocation list |
| CN106464492B (en) | 2013-10-11 | 2020-02-07 | 维萨国际服务协会 | network token system |
| US9706346B2 (en) | 2013-10-18 | 2017-07-11 | Apple Inc. | Mobile device with applications that use a common place card to display data relating to a location |
| US10515358B2 (en) | 2013-10-18 | 2019-12-24 | Visa International Service Association | Contextual transaction token methods and systems |
| US10489779B2 (en) | 2013-10-21 | 2019-11-26 | Visa International Service Association | Multi-network token bin routing with defined verification parameters |
| US10366387B2 (en) | 2013-10-29 | 2019-07-30 | Visa International Service Association | Digital wallet system and method |
| US9516487B2 (en) | 2013-11-19 | 2016-12-06 | Visa International Service Association | Automated account provisioning |
| US9922322B2 (en) | 2013-12-19 | 2018-03-20 | Visa International Service Association | Cloud-based transactions with magnetic secure transmission |
| EP3084701B1 (en) | 2013-12-19 | 2022-05-04 | Visa International Service Association | Cloud-based transactions methods and systems |
| EP2889813B1 (en) * | 2013-12-27 | 2017-11-15 | Buongiorno S.P.A. | Method and system for implementing in-app software development kits |
| CN104765999B (en) * | 2014-01-07 | 2020-06-30 | 腾讯科技(深圳)有限公司 | Method, terminal and server for processing user resource information |
| US10433128B2 (en) | 2014-01-07 | 2019-10-01 | Visa International Service Association | Methods and systems for provisioning multiple devices |
| US9846878B2 (en) | 2014-01-14 | 2017-12-19 | Visa International Service Association | Payment account identifier system |
| US12469021B2 (en) | 2014-02-18 | 2025-11-11 | Visa International Service Association | Limited-use keys and cryptograms |
| US10026087B2 (en) | 2014-04-08 | 2018-07-17 | Visa International Service Association | Data passed in an interaction |
| US9942043B2 (en) | 2014-04-23 | 2018-04-10 | Visa International Service Association | Token security on a communication device |
| SG11201608973TA (en) | 2014-05-01 | 2016-11-29 | Visa Int Service Ass | Data verification using access device |
| WO2015171625A1 (en) | 2014-05-05 | 2015-11-12 | Visa International Service Association | System and method for token domain control |
| CN104428803A (en) * | 2014-05-07 | 2015-03-18 | 华为技术有限公司 | Payment method and apparatus and payment element processing method and apparatus |
| US10467689B2 (en) | 2014-05-20 | 2019-11-05 | Paypal, Inc. | Unified payment account establishment and incorporation in a main payment account |
| AU2015264124B2 (en) | 2014-05-21 | 2019-05-09 | Visa International Service Association | Offline authentication |
| US11023890B2 (en) | 2014-06-05 | 2021-06-01 | Visa International Service Association | Identification and verification for provisioning mobile application |
| US9123054B1 (en) * | 2014-07-17 | 2015-09-01 | Mastercard International Incorporated | Method and system for maintaining privacy in scoring of consumer spending behavior |
| US9780953B2 (en) | 2014-07-23 | 2017-10-03 | Visa International Service Association | Systems and methods for secure detokenization |
| US10484345B2 (en) | 2014-07-31 | 2019-11-19 | Visa International Service Association | System and method for identity verification across mobile applications |
| US9775029B2 (en) | 2014-08-22 | 2017-09-26 | Visa International Service Association | Embedding cloud-based functionalities in a communication device |
| US10140615B2 (en) | 2014-09-22 | 2018-11-27 | Visa International Service Association | Secure mobile device credential provisioning using risk decision non-overrides |
| BR112017005824A2 (en) | 2014-09-26 | 2017-12-12 | Visa Int Service Ass | method and mobile device. |
| US11257074B2 (en) | 2014-09-29 | 2022-02-22 | Visa International Service Association | Transaction risk based token |
| US10015147B2 (en) | 2014-10-22 | 2018-07-03 | Visa International Service Association | Token enrollment system and method |
| GB201419016D0 (en) | 2014-10-24 | 2014-12-10 | Visa Europe Ltd | Transaction Messaging |
| WO2016068871A1 (en) * | 2014-10-28 | 2016-05-06 | Total System Services, Inc. | Automated payment information update with vendors |
| US10325261B2 (en) | 2014-11-25 | 2019-06-18 | Visa International Service Association | Systems communications with non-sensitive identifiers |
| WO2016086154A1 (en) | 2014-11-26 | 2016-06-02 | Visa International Service Association | Tokenization request via access device |
| US10257185B2 (en) | 2014-12-12 | 2019-04-09 | Visa International Service Association | Automated access data provisioning |
| CN107005563B (en) | 2014-12-12 | 2021-03-30 | 维萨国际服务协会 | Supply platform for machine-to-machine installations |
| US10187363B2 (en) | 2014-12-31 | 2019-01-22 | Visa International Service Association | Hybrid integration of software development kit with secure execution environment |
| DE102015000220A1 (en) * | 2015-01-08 | 2016-07-14 | Giesecke & Devrient Gmbh | A method for securely operating a computer unit, software application, and computer unit |
| US10096009B2 (en) | 2015-01-20 | 2018-10-09 | Visa International Service Association | Secure payment processing using authorization request |
| US11250391B2 (en) | 2015-01-30 | 2022-02-15 | Visa International Service Association | Token check offline |
| US11176554B2 (en) | 2015-02-03 | 2021-11-16 | Visa International Service Association | Validation identity tokens for transactions |
| US10977657B2 (en) | 2015-02-09 | 2021-04-13 | Visa International Service Association | Token processing utilizing multiple authorizations |
| US11526885B2 (en) | 2015-03-04 | 2022-12-13 | Trusona, Inc. | Systems and methods for user identification using graphical barcode and payment card authentication read data |
| CN107408244B (en) * | 2015-03-06 | 2021-12-31 | 万事达卡国际股份有限公司 | Secure mobile remote payment |
| US10164996B2 (en) | 2015-03-12 | 2018-12-25 | Visa International Service Association | Methods and systems for providing a low value token buffer |
| CA2977427A1 (en) | 2015-04-10 | 2016-10-13 | Visa International Service Association | Browser integration with cryptogram |
| US9998978B2 (en) | 2015-04-16 | 2018-06-12 | Visa International Service Association | Systems and methods for processing dormant virtual access devices |
| US10922629B2 (en) * | 2015-04-21 | 2021-02-16 | Signature Access Limited | Methods for managing remote access to a physical location and systems thereof |
| US10552834B2 (en) | 2015-04-30 | 2020-02-04 | Visa International Service Association | Tokenization capable authentication framework |
| US10169746B2 (en) * | 2015-05-05 | 2019-01-01 | Mastercard International Incorporated | Methods, systems, and computer readable media for integrating payments |
| WO2017066792A1 (en) | 2015-10-15 | 2017-04-20 | Visa International Service Association | Instant token issuance system |
| GB2557108A (en) * | 2015-11-17 | 2018-06-13 | Gelliner Ltd | Payment confirmation system and method |
| EP3910908B1 (en) | 2015-12-04 | 2024-04-17 | Visa International Service Association | Unique code for token verification |
| US10243958B2 (en) | 2016-01-07 | 2019-03-26 | Visa International Service Association | Systems and methods for device push provisoning |
| AU2017214412A1 (en) | 2016-02-01 | 2018-06-28 | Visa International Service Association | Systems and methods for code display and use |
| US11501288B2 (en) | 2016-02-09 | 2022-11-15 | Visa International Service Association | Resource provider account token provisioning and processing |
| US10044710B2 (en) | 2016-02-22 | 2018-08-07 | Bpip Limited Liability Company | Device and method for validating a user using an intelligent voice print |
| US10523434B1 (en) * | 2016-03-04 | 2019-12-31 | Amazon Technologies, Inc. | Data storage key rotation |
| JP7013385B2 (en) * | 2016-03-29 | 2022-01-31 | トゥルソナ,インコーポレイテッド | Systems and methods for identifying users using graphical barcodes and payment card authentication read data |
| US10313321B2 (en) | 2016-04-07 | 2019-06-04 | Visa International Service Association | Tokenization of co-network accounts |
| WO2017184121A1 (en) | 2016-04-19 | 2017-10-26 | Visa International Service Association | Systems and methods for performing push transactions |
| US11250424B2 (en) | 2016-05-19 | 2022-02-15 | Visa International Service Association | Systems and methods for creating subtokens using primary tokens |
| CN109196834B (en) | 2016-06-03 | 2021-08-17 | 维萨国际服务协会 | Sub-token management system for connected devices |
| US11068899B2 (en) | 2016-06-17 | 2021-07-20 | Visa International Service Association | Token aggregation for multi-party transactions |
| CA3021357A1 (en) | 2016-06-24 | 2017-12-28 | Visa International Service Association | Unique token authentication cryptogram |
| SG10202110839VA (en) | 2016-07-11 | 2021-11-29 | Visa Int Service Ass | Encryption key exchange process using access device |
| CA3026224A1 (en) | 2016-07-19 | 2018-01-25 | Visa International Service Association | Method of distributing tokens and managing token relationships |
| US10949838B1 (en) | 2016-08-23 | 2021-03-16 | Wells Fargo Bank, N.A. | Mobile wallet registration via ATM |
| US10509779B2 (en) | 2016-09-14 | 2019-12-17 | Visa International Service Association | Self-cleaning token vault |
| US20180150832A1 (en) * | 2016-11-25 | 2018-05-31 | Royal Bank Of Canada | System, process and device for e-commerce transactions |
| CN110036386B (en) | 2016-11-28 | 2023-08-22 | 维萨国际服务协会 | Access identifier supplied to application program |
| KR20180098069A (en) * | 2017-02-24 | 2018-09-03 | 삼성전자주식회사 | Agency settlement system, server and controlling method thereof |
| US10915899B2 (en) | 2017-03-17 | 2021-02-09 | Visa International Service Association | Replacing token on a multi-token user device |
| WO2018187455A1 (en) * | 2017-04-05 | 2018-10-11 | Visa International Service Association | System and method for electronic receipt services |
| US10902418B2 (en) | 2017-05-02 | 2021-01-26 | Visa International Service Association | System and method using interaction token |
| US11494765B2 (en) | 2017-05-11 | 2022-11-08 | Visa International Service Association | Secure remote transaction system using mobile devices |
| US10491389B2 (en) | 2017-07-14 | 2019-11-26 | Visa International Service Association | Token provisioning utilizing a secure authentication system |
| EP3762844A4 (en) | 2018-03-07 | 2021-04-21 | Visa International Service Association | SECURE REMOTE TOKEN RELEASE WITH ONLINE AUTHENTICATION |
| US11256789B2 (en) | 2018-06-18 | 2022-02-22 | Visa International Service Association | Recurring token transactions |
| AU2019290223A1 (en) | 2018-06-22 | 2021-01-28 | Visa International Service Association | Secure remote transaction framework using dynamic secure checkout element |
| SG11202101587SA (en) | 2018-08-22 | 2021-03-30 | Visa Int Service Ass | Method and system for token provisioning and processing |
| US11551208B2 (en) | 2018-10-04 | 2023-01-10 | Verifone, Inc. | Systems and methods for point-to-point encryption compliance |
| CN112805737A (en) | 2018-10-08 | 2021-05-14 | 维萨国际服务协会 | Techniques for token proximity transactions |
| WO2020102484A1 (en) | 2018-11-14 | 2020-05-22 | Visa International Service Association | Cloud token provisioning of multiple tokens |
| WO2020236135A1 (en) | 2019-05-17 | 2020-11-26 | Visa International Service Association | Virtual access credential interaction system and method |
| CN110417740B (en) * | 2019-06-27 | 2021-10-15 | 腾讯科技(深圳)有限公司 | User data processing method, intelligent terminal, server and storage medium |
| US11676198B2 (en) * | 2019-07-30 | 2023-06-13 | Skipify, Inc. | Computer-implemented methods of completing an online transaction that is performed via a user computing device and a merchant website running on a merchant computing device |
| US20210312120A1 (en) * | 2020-04-05 | 2021-10-07 | Skipify, Inc. | Automated generation of a template for a shoppable electronic message |
| US12141800B2 (en) | 2021-02-12 | 2024-11-12 | Visa International Service Association | Interaction account tokenization system and method |
| CN112990927B (en) * | 2021-04-27 | 2024-03-08 | 中国工商银行股份有限公司 | Payment verification method, system, device, computer system and storage medium |
Citations (2)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US5163098A (en) * | 1990-09-06 | 1992-11-10 | Dahbura Abbud S | System for preventing fraudulent use of credit card |
| US20100150352A1 (en) * | 2008-12-15 | 2010-06-17 | Ebay, Inc. | Secure self managed data (ssmd) |
Family Cites Families (104)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US5371797A (en) * | 1993-01-19 | 1994-12-06 | Bellsouth Corporation | Secure electronic funds transfer from telephone or unsecured terminal |
| US5815657A (en) * | 1996-04-26 | 1998-09-29 | Verifone, Inc. | System, method and article of manufacture for network electronic authorization utilizing an authorization instrument |
| US6101482A (en) | 1997-09-15 | 2000-08-08 | International Business Machines Corporation | Universal web shopping cart and method of on-line transaction processing |
| US6925444B1 (en) * | 1998-09-08 | 2005-08-02 | Hewlett-Packard Development Company, L.P. | System and method for creating and sharing purchasing lists on a network |
| US6609113B1 (en) | 1999-05-03 | 2003-08-19 | The Chase Manhattan Bank | Method and system for processing internet payments using the electronic funds transfer network |
| US20010051902A1 (en) | 1999-06-28 | 2001-12-13 | Messner Marc A. | Method for performing secure internet transactions |
| US7953671B2 (en) | 1999-08-31 | 2011-05-31 | American Express Travel Related Services Company, Inc. | Methods and apparatus for conducting electronic transactions |
| US7343351B1 (en) | 1999-08-31 | 2008-03-11 | American Express Travel Related Services Company, Inc. | Methods and apparatus for conducting electronic transactions |
| PL356106A1 (en) | 1999-11-30 | 2004-06-14 | Citibank, N.A. | System and method for performing an electronic transaction using a transaction proxy with an electronic wallet |
| WO2001050429A1 (en) | 2000-01-05 | 2001-07-12 | American Express Travel Related Services Company, Inc. | Smartcard internet authorization system |
| AU3058101A (en) | 2000-02-04 | 2001-08-14 | Matsushita Electric Industrial Co., Ltd. | Information terminal |
| WO2001061659A1 (en) | 2000-02-16 | 2001-08-23 | Mastercard International Incorporated | System and method for conducting electronic commerce with a remote wallet server |
| US6965880B2 (en) | 2000-03-30 | 2005-11-15 | Fujitsu Limited | Transaction number management method in network commodity sales |
| CA2305249A1 (en) * | 2000-04-14 | 2001-10-14 | Branko Sarcanin | Virtual safe |
| WO2001097087A1 (en) * | 2000-06-14 | 2001-12-20 | Arjun Nayyar | Client-based shopping cart |
| GB2364482B (en) | 2000-06-30 | 2002-10-09 | Motorola Inc | Server-based electronic wallet system |
| US20040260657A1 (en) | 2000-07-18 | 2004-12-23 | John Cockerham | System and method for user-controlled on-line transactions |
| US20020038287A1 (en) * | 2000-08-30 | 2002-03-28 | Jean-Marc Villaret | EMV card-based identification, authentication, and access control for remote access |
| CA2329895A1 (en) | 2000-09-19 | 2002-03-19 | Soft Tracks Enterprises Ltd. | Merchant wallet server |
| GB0024302D0 (en) | 2000-10-04 | 2000-11-15 | Webtrend Ltd | A method of conducting transactions using a distributed computer network such as the internet |
| US7318049B2 (en) * | 2000-11-17 | 2008-01-08 | Gregory Fx Iannacci | System and method for an automated benefit recognition, acquisition, value exchange, and transaction settlement system using multivariable linear and nonlinear modeling |
| US6931382B2 (en) | 2001-01-24 | 2005-08-16 | Cdck Corporation | Payment instrument authorization technique |
| GB0110893D0 (en) * | 2001-05-03 | 2001-06-27 | Gems Dev Organisation The Ltd | Transaction management systems |
| US20020179704A1 (en) | 2001-06-05 | 2002-12-05 | Ncr Corporation | Enhanced digital wallet |
| US7996324B2 (en) * | 2001-07-10 | 2011-08-09 | American Express Travel Related Services Company, Inc. | Systems and methods for managing multiple accounts on a RF transaction device using secondary identification indicia |
| US6904569B1 (en) | 2001-07-26 | 2005-06-07 | Gateway, Inc. | Link-level browser instance control |
| US20030110133A1 (en) | 2001-12-07 | 2003-06-12 | Maritzen L. Michael | Automated digital rights management and payment system with embedded content |
| US7159180B2 (en) | 2001-12-14 | 2007-01-02 | America Online, Inc. | Proxy platform integration system |
| GB2390180A (en) | 2002-03-19 | 2003-12-31 | Ncr Int Inc | Financial agent |
| GB2387253B (en) * | 2002-04-03 | 2004-02-18 | Swivel Technologies Ltd | System and method for secure credit and debit card transactions |
| EP1535217A4 (en) * | 2002-06-11 | 2006-06-21 | First Data Corp | Value processing network and methods |
| US8473355B2 (en) | 2002-12-06 | 2013-06-25 | Facebook, Inc. | System and method for electronic wallet conversion |
| US20040165009A1 (en) | 2003-02-20 | 2004-08-26 | International Business Machines Corporation | Expansion of interactive user interface components |
| US7996268B2 (en) | 2003-03-03 | 2011-08-09 | Poltorak Alexander I | Apparatus and method for an electronic telephone wallet |
| US20040243501A1 (en) | 2003-05-29 | 2004-12-02 | Regal Press, Inc. | System and method for automated data processing |
| US20040249712A1 (en) | 2003-06-06 | 2004-12-09 | Brown Sean D. | System, method and computer program product for presenting, redeeming and managing incentives |
| US7440997B2 (en) | 2003-06-13 | 2008-10-21 | Microsoft Corporation | Mechanism for supporting browser navigation while preserving important application return states |
| US20060166740A1 (en) | 2004-03-08 | 2006-07-27 | Joaquin Sufuentes | Method and system for identifying, matching and transacting information among portable devices within radio frequency proximity |
| US7356606B2 (en) | 2004-03-12 | 2008-04-08 | Kagi Corporation | Dynamic web storefront technology |
| US8135803B2 (en) | 2004-08-23 | 2012-03-13 | Ianywhere Solutions, Inc. | Method, system, and computer program product for offline advertisement servicing and cycling |
| US20060173974A1 (en) | 2005-02-02 | 2006-08-03 | Victor Tang | System and method for providing mobile access to personal media |
| US20080270253A1 (en) | 2005-02-14 | 2008-10-30 | Smarttrust Ab | Method for Performing an Electronic Transaction |
| US20060219774A1 (en) | 2005-03-30 | 2006-10-05 | Benco David S | Network support for credit card receipt reconciliation |
| US8041646B2 (en) * | 2005-06-15 | 2011-10-18 | E. E. System Corporation | Method and system for real time online debit transactions |
| US7958543B2 (en) | 2005-07-12 | 2011-06-07 | Microsoft Corporation | Account synchronization for common identity in an unmanaged network |
| US20070106564A1 (en) | 2005-11-04 | 2007-05-10 | Utiba Pte Ltd. | Mobile phone as a point of sale (POS) device |
| US8606251B2 (en) | 2005-12-22 | 2013-12-10 | Sony Corporation | Mobile terminals, methods and computer program products incorporating podcast link activation control |
| US20070245882A1 (en) | 2006-04-04 | 2007-10-25 | Odenwald Michael J | Interactive computerized digital media management system and method |
| US7818264B2 (en) * | 2006-06-19 | 2010-10-19 | Visa U.S.A. Inc. | Track data encryption |
| US8019811B1 (en) | 2006-04-06 | 2011-09-13 | Versata Development Group, Inc. | Application state server-side cache for a state-based client-server application |
| US20070283268A1 (en) | 2006-06-06 | 2007-12-06 | Berger Adam L | Advertising delivery |
| US20070294292A1 (en) | 2006-06-14 | 2007-12-20 | Microsoft Corporation | Advertising transfer and playback on portable devices |
| US7512567B2 (en) | 2006-06-29 | 2009-03-31 | Yt Acquisition Corporation | Method and system for providing biometric authentication at a point-of-sale via a mobile device |
| EP1978477A3 (en) | 2006-07-06 | 2011-03-02 | Firethorn Holdings, LLC | Methods and systems for making a payment via a stored value card in a mobile environment |
| US20080017704A1 (en) | 2006-07-24 | 2008-01-24 | First Data Corporation | Contactless Electronic Wallet Payment Device |
| US20080147546A1 (en) | 2006-09-19 | 2008-06-19 | Walter Weichselbaumer | Wireless device electronic wallet transaction validation |
| US20080208681A1 (en) | 2006-09-28 | 2008-08-28 | Ayman Hammad | Payment using a mobile device |
| US8769275B2 (en) | 2006-10-17 | 2014-07-01 | Verifone, Inc. | Batch settlement transactions system and method |
| US8336770B2 (en) * | 2006-10-26 | 2012-12-25 | Mastercard International, Inc. | Method and apparatus for wireless authorization |
| US8793184B2 (en) | 2007-02-12 | 2014-07-29 | Visa U.S.A. Inc. | Mobile payment services |
| US8117089B2 (en) * | 2007-02-13 | 2012-02-14 | Claudia Juliana Minsky | System for segmentation by product category of product images within a shopping cart |
| US8566239B2 (en) | 2007-02-22 | 2013-10-22 | First Data Corporation | Mobile commerce systems and methods |
| US20080208762A1 (en) | 2007-02-22 | 2008-08-28 | First Data Corporation | Payments using a mobile commerce device |
| US20080208742A1 (en) | 2007-02-22 | 2008-08-28 | First Data Corporation | Provisioning of a device for mobile commerce |
| US8073460B1 (en) | 2007-03-08 | 2011-12-06 | Amazon Technologies, Inc. | System and method for providing advertisement based on mobile device travel patterns |
| WO2008119168A1 (en) | 2007-04-03 | 2008-10-09 | Cpni Inc. | A system and method for merchant discovery and transfer of payment data |
| US9524502B2 (en) | 2007-06-20 | 2016-12-20 | Qualcomm Incorporated | Management of dynamic electronic coupons |
| US20080318559A1 (en) | 2007-06-22 | 2008-12-25 | Porco Gino M | System and method of mobile device advertising |
| US20090063312A1 (en) | 2007-08-28 | 2009-03-05 | Hurst Douglas J | Method and System for Processing Secure Wireless Payment Transactions and for Providing a Virtual Terminal for Merchant Processing of Such Transactions |
| US8126806B1 (en) | 2007-12-03 | 2012-02-28 | Sprint Communications Company L.P. | Method for launching an electronic wallet |
| US8655718B2 (en) | 2007-12-18 | 2014-02-18 | Yahoo! Inc. | Methods for augmenting user-generated content using a monetizable feature |
| US20090170483A1 (en) | 2007-12-28 | 2009-07-02 | General Electric Company | System and method for transmitting information using a mobile phone |
| US7922082B2 (en) * | 2008-01-04 | 2011-04-12 | M2 International Ltd. | Dynamic card validation value |
| US9947002B2 (en) | 2008-02-15 | 2018-04-17 | First Data Corporation | Secure authorization of contactless transaction |
| US20090234751A1 (en) | 2008-03-14 | 2009-09-17 | Eric Chan | Electronic wallet for a wireless mobile device |
| US8060413B2 (en) | 2008-03-14 | 2011-11-15 | Research In Motion Limited | System and method for making electronic payments from a wireless mobile device |
| JP5462242B2 (en) | 2008-04-04 | 2014-04-02 | グーグル・インコーポレーテッド | Dynamic selection and distribution of content |
| CA2639008A1 (en) | 2008-08-18 | 2010-02-18 | Kamaljit Deol Brar | Actionable cards, related content and social marketing |
| CN102187353A (en) | 2008-09-05 | 2011-09-14 | 吉弗坦戈公司 | Systems and methods for authentication of a virtual stored value card |
| US20100082485A1 (en) | 2008-09-30 | 2010-04-01 | Apple Inc. | Portable point of purchase devices and methods |
| US8965811B2 (en) | 2008-10-04 | 2015-02-24 | Mastercard International Incorporated | Methods and systems for using physical payment cards in secure E-commerce transactions |
| US20100114731A1 (en) | 2008-10-30 | 2010-05-06 | Kingston Tamara S | ELECTRONIC WALLET ("eWallet") |
| US20100125495A1 (en) | 2008-11-17 | 2010-05-20 | Smith Steven M | System and method of providing a mobile wallet at a mobile telephone |
| US20100125510A1 (en) | 2008-11-17 | 2010-05-20 | Smith Steven M | System and method of conducting transactions using a mobile wallet system |
| US20100131347A1 (en) | 2008-11-24 | 2010-05-27 | Research In Motion Limited | Electronic payment system using mobile wireless communications device and associated methods |
| US20100145751A1 (en) | 2008-12-10 | 2010-06-10 | Charles Franklin Berry | Validation method and system |
| US9373122B2 (en) | 2008-12-18 | 2016-06-21 | Iii Holdings 1, Llc | Methods, apparatus and computer program products for securely accessing account data |
| US20100169182A1 (en) | 2008-12-30 | 2010-07-01 | Masih Madani | Mobile payment method and system using the same |
| US9536238B2 (en) | 2008-12-31 | 2017-01-03 | Peter Garrett | Hand-held electronics device for aggregation of and management of personal electronic data |
| US20100217682A1 (en) | 2009-02-26 | 2010-08-26 | Research In Motion Limited | System and method for capturing user inputs in electronic forms |
| EP2406759A4 (en) | 2009-03-03 | 2014-04-02 | Equifax Inc | Systems and methods for using verified information cards in a communications network |
| US8595098B2 (en) | 2009-03-18 | 2013-11-26 | Network Merchants, Inc. | Transmission of sensitive customer information during electronic-based transactions |
| WO2010110625A2 (en) | 2009-03-26 | 2010-09-30 | Park Jung Chual | E-wallet service method and system based on an idle screen application |
| CA2665961C (en) | 2009-05-12 | 2013-01-22 | Diversinet Corp. | Method and system for delivering a command to a mobile device |
| US20110087595A1 (en) | 2009-10-09 | 2011-04-14 | Paul Sabella | Method and system for facilitating commercial purchases |
| US20110208575A1 (en) | 2010-02-23 | 2011-08-25 | Yahoo! Inc. | System and method for generating interactive advertisements |
| US8346229B2 (en) | 2010-02-26 | 2013-01-01 | Research In Motion Limited | Scheduling and delivering ad meetings |
| WO2011140427A2 (en) * | 2010-05-07 | 2011-11-10 | Google Inc. | Caching electronic document resources in a client device having an electronic resource database |
| US9558481B2 (en) | 2010-09-28 | 2017-01-31 | Barclays Bank Plc | Secure account provisioning |
| US10121133B2 (en) | 2010-10-13 | 2018-11-06 | Walmart Apollo, Llc | Method for self-checkout with a mobile device |
| US20120253985A1 (en) | 2010-11-08 | 2012-10-04 | Kwift SAS | Method and system for extraction and accumulation of shopping data |
| US20120267432A1 (en) | 2010-11-12 | 2012-10-25 | Kuttuva Avinash | Secure payments with global mobile virtual wallet |
| US20120158654A1 (en) | 2010-12-17 | 2012-06-21 | Google Inc. | Receipt storage in a digital wallet |
| US20120203695A1 (en) | 2011-02-09 | 2012-08-09 | American Express Travel Related Services Company, Inc. | Systems and methods for facilitating secure transactions |
-
2012
- 2012-07-03 US US13/541,460 patent/US20160140566A1/en not_active Abandoned
- 2012-07-03 US US13/541,469 patent/US8606720B1/en not_active Expired - Fee Related
- 2012-07-03 US US13/541,402 patent/US9165321B1/en active Active
Patent Citations (2)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US5163098A (en) * | 1990-09-06 | 1992-11-10 | Dahbura Abbud S | System for preventing fraudulent use of credit card |
| US20100150352A1 (en) * | 2008-12-15 | 2010-06-17 | Ebay, Inc. | Secure self managed data (ssmd) |
Cited By (4)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US11120511B2 (en) | 2016-07-26 | 2021-09-14 | Samsung Electronics Co., Ltd. | System and method for universal card acceptance |
| US20180218357A1 (en) * | 2017-02-01 | 2018-08-02 | Microsoft Technology Licensing, Llc | Export high value material based on ring 1 evidence of ownership |
| CN106651364A (en) * | 2017-02-07 | 2017-05-10 | 桂林理工大学 | Online payment device for authentication through visible light and barcode two-way public-key system |
| CN107395577A (en) * | 2017-07-06 | 2017-11-24 | 广东电网有限责任公司信息中心 | A kind of large-scale power Enterprise Salary security system |
Also Published As
| Publication number | Publication date |
|---|---|
| US9165321B1 (en) | 2015-10-20 |
| US8606720B1 (en) | 2013-12-10 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| US8606720B1 (en) | Secure storage of payment information on client devices | |
| US20250061447A1 (en) | Method for securing sensitive data | |
| JP7429398B2 (en) | System and method for online payment processing using secure inline frames | |
| JP7189769B2 (en) | Authentication system and method using location matching | |
| CN107087432B (en) | System and method for storing data encrypted by remote server | |
| JP6703510B2 (en) | Method and system for generating an advanced storage key without a secure element in a mobile device | |
| US11361317B2 (en) | Validating a customer in an electronic transaction | |
| WO2021142032A1 (en) | System and method for transferring currency using blockchainid50000116284555 ia body 2021-01-28 filing no.:10 | |
| US20150363774A1 (en) | Methods and systems for permissions management with enhanced security | |
| US20140019365A1 (en) | Processing payment information for online orders at a local merchant's point of sale via direct payment | |
| WO2020046855A1 (en) | Secured end-to-end communication for remote payment verification | |
| CN114186985A (en) | Multidimensional barcode mobile payment method and payment server | |
| US20160321650A1 (en) | Online transactions | |
| US20200273037A1 (en) | Payment-system-based user authentication and information access system and methods | |
| CN112970234B (en) | Account assertion | |
| US12069182B2 (en) | Checkout with MAC | |
| JP6844828B1 (en) | Information processing method, information processing device, information processing program and recording medium | |
| US20190139045A1 (en) | Securing Multi-Part Network Transactions with Automated Multi-Phase Network Traversal | |
| TWI786388B (en) | Electronic voucher and method for automatic processing the same | |
| AU2014202432A1 (en) | Payment Transaction Techniques |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| AS | Assignment |
Owner name: GOOGLE INC., CALIFORNIA Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:BAKER, DAVID PRESTON;MARSHALL, STANLEY N., III;HILLER, MATTHEW ERIC;AND OTHERS;SIGNING DATES FROM 20120628 TO 20120629;REEL/FRAME:028517/0708 |
|
| AS | Assignment |
Owner name: GOOGLE LLC, CALIFORNIA Free format text: CHANGE OF NAME;ASSIGNOR:GOOGLE INC.;REEL/FRAME:044129/0001 Effective date: 20170929 |
|
| STCB | Information on status: application discontinuation |
Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION |