US20180268408A1 - Configuring Verification Information At Point-of-Sale Devices - Google Patents
Configuring Verification Information At Point-of-Sale Devices Download PDFInfo
- Publication number
- US20180268408A1 US20180268408A1 US15/464,079 US201715464079A US2018268408A1 US 20180268408 A1 US20180268408 A1 US 20180268408A1 US 201715464079 A US201715464079 A US 201715464079A US 2018268408 A1 US2018268408 A1 US 2018268408A1
- Authority
- US
- United States
- Prior art keywords
- payment
- payment instrument
- cvm
- location
- transaction
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Abandoned
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/40—Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
- G06Q20/401—Transaction verification
- G06Q20/4015—Transaction verification using location information
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/40—Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
- G06Q20/401—Transaction verification
- G06Q20/4012—Verifying personal identification numbers [PIN]
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/08—Payment architectures
- G06Q20/20—Point-of-sale [POS] network systems
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/08—Payment architectures
- G06Q20/20—Point-of-sale [POS] network systems
- G06Q20/202—Interconnection or interaction of plural electronic cash registers [ECR] or to host computer, e.g. network details, transfer of information from host to ECR or from ECR to ECR
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/08—Payment architectures
- G06Q20/20—Point-of-sale [POS] network systems
- G06Q20/206—Point-of-sale [POS] network systems comprising security or operator identification provisions, e.g. password entry
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/30—Payment architectures, schemes or protocols characterised by the use of specific devices or networks
- G06Q20/32—Payment architectures, schemes or protocols characterised by the use of specific devices or networks using wireless devices
- G06Q20/322—Aspects of commerce using mobile devices [M-devices]
- G06Q20/3224—Transactions dependent on location of M-devices
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/30—Payment architectures, schemes or protocols characterised by the use of specific devices or networks
- G06Q20/32—Payment architectures, schemes or protocols characterised by the use of specific devices or networks using wireless devices
- G06Q20/326—Payment applications installed on the mobile devices
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/30—Payment architectures, schemes or protocols characterised by the use of specific devices or networks
- G06Q20/34—Payment architectures, schemes or protocols characterised by the use of specific devices or networks using cards, e.g. integrated circuit [IC] cards or magnetic cards
- G06Q20/356—Aspects of software for card payments
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/40—Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
- G06Q20/401—Transaction verification
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/40—Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
- G06Q20/401—Transaction verification
- G06Q20/4016—Transaction verification involving fraud or risk level assessment in transaction processing
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/40—Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
- G06Q20/401—Transaction verification
- G06Q20/4018—Transaction verification using the card verification value [CVV] associated with the card
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/40—Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
- G06Q20/405—Establishing or using transaction specific rules
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/40—Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
- G06Q20/409—Device specific authentication in transaction processing
Definitions
- POS point-of-sale
- mobile POS devices may use these POS devices to engage in transactions with customers at different locations.
- POS point-of-sale
- a taxi driver may use a mobile POS device to charge a passenger for a taxi ride.
- a street vendor may use a mobile POS device to charge a customer for an item purchased from the street vendor.
- a merchant may use a stationary POS device to process a payment transaction at a store. Operators of traditional payment infrastructure, such as card networks and issuing banks, often struggle to adapt to this changing landscape of POS devices.
- FIG. 1 illustrates an example environment that includes a merchant operating a mobile point-of-sale (POS) device to conduct transactions with multiple different customers.
- the POS device dynamically configures verification information to request from the customers that a cardholder verification method (CVM) specifies.
- CVM cardholder verification method
- the POS device, payment server, or an issuing bank may determine, based on a type of payment instrument provided by a customer and risk analysis of the payment instrument, whether to request verification information as specified by a default CVM, configure the CVM or ignore CVM requirement altogether.
- FIGS. 2A and 2B illustrate a flow diagram of a process for determining whether to request verification information as specified by a default CVM or whether to configure the CVM and request verification information in accordance with the reconfigured CVM.
- FIG. 3 illustrates a flow diagram of a process for determining whether to modify a CVM based on an attribute or identifier of a received payment instrument, and requesting first or second verification information depending upon whether or not the order has been modified.
- FIG. 4 illustrates select components of a POS device that a merchant described herein may utilize.
- FIGS. 5A, 5B, and 5C illustrates select components of a POS device that a merchant described herein may utilize.
- Some implementations described herein include techniques and arrangements for dynamically configuring and/or reconfiguring verification information at point-of-sale (POS) devices based on a payment instrument presented at the time of a payment transaction and at a specific location.
- POS point-of-sale
- a customer presenting a credit card while holding a device executing an application of the entity that issued the credit card may not provide a primary or secondary verification.
- a customer presenting a credit card in the absence of a registered mobile device or mobile device executing a registered application with the issuing entity may be asked to provide a primary or secondary verification, for example a PIN or signature, or a PIN followed by signature, based on a risk rating of the transaction.
- a POS device may be programmed to implement a cardholder verification method (CVM) that specifies the POS device to request verification information from a customer engaging in a transaction at the POS device, where the verification information or request for verification information that is specific to the customer, transaction or an attribute of the payment instrument.
- CVM cardholder verification method
- the POS device may initially receive (e.g., via a swipe, a dip, manual entry, etc.) information from a payment instrument (e.g., credit card, bank card, debit card, etc.).
- the POS device may then, with the issuing entity and a payment server, determine whether the POS device can request additional, different or no verification information and, if so, the manner and kind of information to request.
- This additional verification information may comprise a personal identifier number (PIN) associated with the payment instrument, a signature of the cardholder, an answer to a security question associated with the cardholder, biometric information from the cardholder, a combination of any of the above, or even absence of any CVM.
- PIN personal identifier number
- the POS device may process the transaction without CVM and under the condition that the issuing entity will approve the transaction absent CVM.
- various conditions may trigger configuration or reconfiguration of CVM.
- the trigger condition may be based on detection of a registered mobile device at the time of a payment transaction, i.e., if the card holder has registered with the payment server its mobile device and/or associated the mobile device with the payment instrument.
- the trigger condition may be based on detection of a financial application, such as an application that facilitates management of payment transactions using the payment instrument, installed on a device associated with the user or any device at the location where the transaction is taking place.
- the trigger condition instead of relying on presence of a device, the trigger condition may be based on an absence of a registered device or financial or payment application.
- a POS device as described herein may determine, based on one or more attributes of a received payment instrument, specifications or capabilities of the receiving POS device, risk logic implemented by a payment server, and/or the like, whether to request CVM, modify default CVM into a specific CVM, or change the order of CVM for a specific cardholder, payment instrument or transaction. For instance, while the CVM may initially instruct a POS device to request a PIN number from a cardholder, the processor of the issuing entity may determine that the CVM order should be modified such that a signature is requested rather than the PIN. After determining whether to modify the CVM order, the POS device may request verification in accordance with the (potentially modified) order. For instance, the POS device may request first verification information from the user, followed by second verification information if the first verification information does not authorize the transaction, and the like, until the transaction/payment instrument is authorized or each piece of verification information from the CVM has been requested.
- the CVM may initially instruct the POS device to request a specific set of inputs, such as a PIN and signature of the user, however, if the issuing entity detects a payment application executing on a device registered with the user or user's payment instrument and in proximity to the POS device, the issuing entity may generate a CVM specific to the payment instrument, or even relax the requirement of CVM.
- a specific set of inputs such as a PIN and signature of the user
- the POS device detects devices in proximity to itself, for example through sensors, transmitters, receivers, antenna, etc.
- the POS device can also, additionally or optionally, obtain device information, such as device identifier, device type, etc.
- the POS device may be triggered to obtain device information when a user presents a payment instrument for payment of a payment transaction, or otherwise approaches a payment reader or POS device. In this manner, the most proximate communication device to the POS device, in the context of the current payment transaction or payment instrument, can be determined.
- the POS device extracts payment information, such as the payment card number, the verification number, the cardholder identifier such as name, etc., and the device information.
- the POS device sends the payment information, including the cardholder identifier and device information, to the issuing entity, for example through an intermediate entity such as acquirer, processor of card processing network, and the payment processing server.
- the issuing entity based on the payment information or the cardholder identifier, determines whether a device is registered with the cardholder and/or a financial application is installed on the device registered with the cardholder. The issuing entity then contacts or otherwise communicates with the registered device to determine its location.
- the issuing entity has access to the location of the communication device, for example through a previous registration, and does not need to explicitly communicate with the device for location information. Using the location information of the registered device, the issuing entity determines whether the location is the same as the location of the payment transaction (indicated by the POS device, proximate devices, payment instrument or a chip therein) and if the location matches or is otherwise similar, the issuing entity may reconfigure the CVM requirement to be specific to the payment instrument. In one instance, the issuing entity may determine a risk score to be lower than a threshold value and even remove the requirement to request CVM because the issuing entity has enough information to tag the transaction as sufficiently secure.
- the payment server or POS device may reconfigure the CVM as per location determination and comparison made by the issuing entity.
- the CVM may be configured to be a different CVM or no CVM as the case may be.
- the CVM specified by the card network can be applied if the location of the registered device is substantially dissimilar from the location of the devices where the payment transaction is occurring or has occurred. Alternatively, a more stringent CVM or multiple rounds of authentication can be requested to further secure the payment transaction.
- dynamically reconfiguring CVM may result in a more efficient and seamless transaction between a merchant and a customer.
- payment instruments associated with a particular card network might not accept certain verification information when input into a particular type of POS device.
- the card network might not accept PIN numbers entered into a device that does not include a dedicated hardware device for receiving PIN numbers (but that instead includes a touch screen or the like for receiving this information). Therefore, a POS device may determine when it receives a payment instrument associated with this card network and may dynamically reconfigure the CVM after processor of the issuing entity has executed a risk check and determined secondary means to authenticate the transaction (for example, based on location of the payment transaction or historical trends associated with the user, user's payment instrument or even the merchant.
- the issuing entity via the POS device, may reorder the CVM, which may include removing “PIN” as a type of verification information to request and moving “signature” into a first slot in the order.
- the POS device may then request a signature in lieu of a PIN, thus avoiding the situation where a cardholder enters her PIN, learns from the merchant that the PIN has not been accepted, and then is asked to provide a signature.
- the POS device will skip straight to requesting a signature form the cardholder, thus resulting in a quicker transaction that potentially prevents embarrassment to the merchant and/or the cardholder, but without risking the security of the payment transaction.
- the transaction when sent for processing, may include data or a flag that indicates that the issuing entity had approved a modified CVM based on the location of the payment instrument, registration of the user's device, and other such factor.
- the card network can use this data to process the transaction in the absence of CVM typically enforced by the card network.
- the systems and methods described herein improve and simplify authentication that in turn will reduce observed fraud.
- networks either default to less secure forms of authentication (and take the liability) or use alternate hardware (or in the most extreme case cannot accept the transaction). Both of these options are not ideal and also some CVMs may slow down the transaction time or make it less secure.
- the open payment platform described herein is designed to work with all mobile devices, any issuer, and is extensible to other platforms.
- Some implementations describe payment applications to be installed on user phone. As such, the implementations are aligned with longer term industry trends involving use of mobile devices and greater consumer control in the payment process, moving payments to the buyer.
- Such implementations also provide flexibility for any changes as the rule engine may reside in the server or the issuer and move away from the POS terminal.
- Some of the implementations offer dynamic risk controls to allow the issuers to dynamically set and control authentication limits, manage risk, and assign CVMs accordingly.
- the dynamic risk controls are based on one or more attributes, such as merchant attribute, e.g., merchant code, geography, observed fraud, buyer attribute, e.g., credit line, credit balance, and risk profile based on current and/or past transactions, authentication method, e.g., geo-location, biometric input, one time password or text message, etc.
- Some implementations also offer increased engagement with the banking infrastructure thus driving more users to the platform, for example more users engage with the mobile payment applications, which are the main touch point for customers, which in turn increases the propensity for updated contact details and also gives the issuers the opportunity to display other data as part of the transaction, e.g., balance, last time visited, etc.
- the implementations described herein offer options to perform authentication for the payment flow with other terminals that may or may not be connected to the existing payment infrastructure.
- a merchant may include any business engaged in the offering of goods or services for acquisition by buyers. Actions attributed to a merchant may include actions performed by owners, merchants, or other agents of the merchant and thus no distinction is made herein unless specifically discussed.
- a buyer or customer or user may include any entity that acquires goods or services from a merchant, such as by purchasing, renting, leasing, borrowing, licensing, or the like.
- goods and/or services offered by merchants may be referred to as items.
- a merchant and a buyer may interact with each other to conduct a transaction in which the buyer acquires an item from a merchant, and in return, the buyer provides payment to the merchant, for example through a payment instrument issued by an issuing entity.
- a ‘payment transaction’ or simply ‘transaction’ may include a financial transaction for the acquisition of goods and/or services that is conducted between a buyer and a merchant.
- the buyer can provide the amount that is due to the merchant using a payment instrument or a payment proxy for the payment instrument.
- the payment transaction includes transfer of money from one party to another for any number of reasons.
- buyer and merchant parties to the payment transaction, it will be understood that the parties can be a sender and a recipient, a land lord and a renter, a bank and a bank customer, a first friend and a second friend, and so on.
- the term ‘payment card,’ ‘payment instrument,’ or ‘payment object’ refers to a payment mechanism that includes a conventional debit card, a conventional credit card, a prepaid gift card, or the like, a smartcard that has an embedded integrate circuit chip (e.g., Europay-MasterCard-visa (EMV) card), a proxy card, or any card that functions as a combination of any of these mechanisms.
- EMV Europay-MasterCard-visa
- proxy card refers to a card that may or may not bear a card number or an account number that appears to be that of a real credit or debit card account (i.e., it is in the correct format), but where that card/account number is actually only a proxy for the buyer's real card/account number.
- the payment card used in the example above is a specific type of a financial instrument.
- Other types of financial instruments, other than the payment card, can be used to initiate the transfer of funds.
- a financial instrument can be a software instrument or virtual instrument, such as a virtual wallet.
- Other examples of payment card may also include a prepaid card, a gift card, a rewards card, a loyalty points' card, a frequent flyer miles card, a check, cash, or any other kind of payment instrument that holds financial value or provides a promise to pay at a later time.
- Payment card may also include a payment object, such as an electronic device configured to initiate contactless payment transactions, e.g., a key fob, a mobile device (such as a mobile device having an NFC tag).
- the payment object can also be a payment proxy having a syntax of a monetary indicator followed by a string of alphanumeric characters or in general, any identifier that is representative of the buyer or merchant's financial account.
- the payment proxy can be used in the context of and within a webpage as part of the web address, a social networking handle or username, a forum, a messaging application, and so on.
- biometric payment instrument is a type of payment object or financial instrument that is biometrically identifiable and initialized by a biometric characteristic, such as a person's finger (e.g., for fingerprint recognition), face, iris or retina, heartbeat, voice, etc.
- the CVM can include a PIN, signature, or a biometric input, such as a fingerprint or iris scan.
- the payment object reader may be a magnetic stripe card reader, optical scanner, smartcard (card with an embedded IC chip) reader (e.g., an EMV-compliant card reader or NFC enabled reader), radio frequency identification (RFID) reader, or the like, configured to detect and obtain data off any payment object.
- the payment object reader may include hardware implementation, such as slots, magnetic tracks, and rails with one or more sensors or electrical contacts to facilitate detection and acceptance of a payment object.
- the payment object reader may also include a biometric sensor to receive and process biometric characteristics and process them as payment instruments, given that such biometric characteristics are registered with the payment processing system and connected to a financial account.
- the POS terminal can be a hand-held device such as a mobile phone, laptop, tablet computer, and the like, associated with a merchant.
- the POS terminal is a mobile device that is wearable or otherwise connected to or associated with the buyer or merchant, for example, the computing device may be an Apple® watch or a Fitbit®.
- the term ‘payment application’ or ‘financial application’ includes any application configured for management of payment transactions connected to a payment instrument or multiple payment instruments issued by a single entity or multiple entities to a user.
- the financial application can also provide the user with financial information, option to open an account with the issuing entity, dispense physical cash, transfer cash electronically, pay bills, apply for loans, make deposits, obtain assistance from the agent, monitor spending habits, get financial advice, set spending goals, manage transaction and spending limits, and the like.
- the term “payment application” as used here can also refer to or include any messaging application that enables communication between users (e.g., sender and recipient of a message) over a wired or wireless communications network, or devices, for example between an issuing entity and the user's communication device.
- a payment processing system that delivers a communication service to users can employ the messaging application.
- the messaging application can include, for example, a text messaging application for communication between phones (e.g., conventional mobile telephones or smartphones), or a cross-platform instant messaging application for smartphones and phones that use the Internet for communication.
- the message can also be to confirm the location of the user or obtain an approval to extract location of the user.
- this specification may employ text messages as an example, it is to be understood that the technology may employ any of these types of messages.
- the messaging application Upon receiving an indication to send (e.g., after detecting that the user has clicked “Send”), the messaging application transmits a message, e.g., the text message to a messaging application computer system (“messaging application system”).
- the term “pairing” or “associating” refers to a process in which the POS terminal and the payment object reader establish a communication channel with each other using wireless communication protocols, for example, Bluetooth®, Bluetooth Low Energy®, Wi-Fi®, etc.
- the POS terminal and the payment object reader each includes a transceiver capable of transmitting data between them once “paired.”
- the pairing technology described herein can pair a payment object reader to the POS terminal in both real-time and offline modes.
- Bluetooth or Bluetooth Low Energy has been used to describe certain embodiments, other wireless protocols, such as NFC, Wi-Fi, etc., can also be used.
- the term “communication network” may be any type of network known in the art, such as a local area network or a wide area network, such as the Internet, and may include a wireless network, such as a cellular network, a cloud network, a local wireless network, such as Wi-Fi and/or close-range wireless communications, such as Bluetooth and Bluetooth low energy, near field communications (NFC), a wired network, or any other such network, or any combination thereof.
- the network may include both wired and/or wireless communication technologies, including Bluetooth, Bluetooth low energy, Wi-Fi and cellular communication technologies like worldwide interoperability for microwave access (Wi-MAX), 3G, 4G, CDMA, digital subscriber line (DSL), etc., cloud computing technologies, as well as wired or fiber optic technologies.
- the communication network may be a mesh network.
- network devices may be configured to receive and forward communications, which are ultimately destined for a different device.
- These types of networks are generically referred to as “mesh” networks, where network nodes may form a “mesh” of paths for which communications may travel to reach their destination.
- Wireless networks may use beacon transmissions to advertise the network's existence, as well as provide information about the network and capabilities associated with the network.
- Different kinds of beaconing mechanisms may be used, for example, one for infrastructure mode networks (also called basic service set (BSS) networks) and one for ad-hoc mode networks (also called independent basic service set (IBSS) networks).
- BSS basic service set
- IBSS independent basic service set
- APs access points
- APs access points
- APs access points
- APs access points
- APs access points
- BSS beacons infrastructure network beacons
- Components used for such communications can depend at least in part upon the type of network, the environment selected, or both. Protocols for communicating over such networks are well known and are not discussed herein in detail.
- swipe refers to any manner of triggering a payment object reader to read data from a payment object, such as by dipping into, tapping, hovering, bringing in close contact or passing the payment object into or through a payment object reader.
- the use of the terms such as “first,” “second,” “third,” “upper,” “lower,” and the like do not denote any spatial, sequential, or hierarchical order or importance, but are used to distinguish one element from another. It is to be appreciated that the use of the terms “and/or” and “at least one of”, for example, in the cases of “A and/or B” and “at least one of A and B”, is intended to encompass the selection of the first listed option (A) only, or the selection of the second listed option (B) only, or the selection of both options (A and B).
- such phrasing is intended to encompass the selection of the first listed option (A) only, or the selection of the second listed option (B) only, or the selection of the third listed option (C) only, or the selection of the first and the second listed options (A and B) only, or the selection of the first and third listed options (A and C) only, or the selection of the second and third listed options (B and C) only, or the selection of all three options (A and B and C).
- This may be extended, as readily apparent by one of ordinary skill in this and related arts, for as many items listed.
- the computing system can include clients and servers.
- a client and server are generally remote from each other and typically interact through a communication network. The relationship of client and server arises by virtue of computer programs running on the respective computers and having a client-server relationship to each other.
- a server transmits data (e.g., an HTML page) to a client device (e.g., for purposes of displaying data to and receiving user input from a user interacting with the client device).
- data generated at the client device e.g., a result of the user interaction
- any block diagrams, steps, or sub-processes herein represent conceptual views of illustrative systems embodying the principles of the present subject matter.
- any flow charts, flow diagrams, state transition diagrams, pseudo code, and the like represent various processes which may be substantially represented in computer readable medium and so executed by a computer or processor, whether or not such computer or processor is explicitly shown.
- the order in which the methods are described are not intended to be construed as a limitation, and any number of the described method blocks can be deleted, moved, added, subdivided, combined, and/or modified in any order to implement the methods, or an alternative combination or sub-combinations.
- steps, sub-processes or blocks are at times shown as being performed in series, some steps, sub-processes or blocks can instead be performed in parallel, or can be performed at different times as will be recognized by a person of ordinary skill in the art. Further any specific numbers noted herein are only examples; alternative implementations can employ differing values or ranges. Furthermore, the methods can be implemented in any suitable hardware, software, firmware, or combination thereof.
- the payment object readers and POS terminals are shown as including distinct components, this is merely for ease of illustration and not intended as limiting.
- the payment object readers and POS terminals may be identical, similar or distinct.
- the components shown and described for the payment object readers and POS terminals may be implemented as more components or as fewer components and functions described for the components may be redistributed depending on the details of the implementation.
- configuration, structure, and operational characteristics of the payment object readers and/or POS terminals may vary from device to device.
- payment object readers and the POS terminals can each be any appropriate device operable to send and receive data, requests, messages, electronic messages, text messages, alerts, notifications, pop-up messages, push notifications, or other types of information over the one or more networks or directly to each other.
- inventions can be embodied as special-purpose hardware (e.g., circuitry), as programmable circuitry appropriately programmed with software and/or firmware, or as a combination of special-purpose and programmable circuitry.
- embodiments may include a machine-readable medium having stored thereon instructions that may be used to cause one or more processors to perform the methods, variations of the methods, and other operations described here.
- the machine-readable medium may include, but is not limited to, floppy diskettes, optical discs, compact disc read-only memories (CD-ROMs), magneto-optical discs, read-only memories (ROMs), random access memories (RAMs), erasable programmable read-only memories (EPROMs), electrically erasable programmable read-only memories (EEPROMs), application-specific integrated circuits (ASICs), magnetic or optical cards, flash memory, or other type of media/machine-readable medium suitable for storing electronic instructions.
- CD-ROMs compact disc read-only memories
- ROMs read-only memories
- RAMs random access memories
- EPROMs erasable programmable read-only memories
- EEPROMs electrically erasable programmable read-only memories
- ASICs application-specific integrated circuits
- FIG. 1 illustrates an example environment 100 that includes a merchant 102 operating a point-of-sale (POS) device 104 to engage in various transactions with customers 106 - 1 , 106 - 2 , . . . , 106 -N (collectively referred to as customers 106 ) equipped with communication devices 107 - 1 , 107 - 2 , . . . 107 -N (collectively referred to as communication devices 107 ) and payment instruments 116 - 1 , 116 - 2 , . . . 116 -N (collectively referred to as payment instruments 116 ).
- POS point-of-sale
- a merchant 102 may include any business engaged in the offering of goods or services for acquisition by customers. Actions attributed to a merchant 102 may include actions performed by owners, merchants, or other agents of the merchant 102 and thus no distinction is made herein unless specifically discussed.
- a customer 106 may include any entity that acquires goods or services from a merchant 102 , such as by purchasing, renting, leasing, borrowing, licensing, or the like.
- goods and/or services offered by merchants 102 may be referred to as items.
- a merchant 102 and a customer 106 may interact with each other to conduct a transaction in which the customer 106 acquires an item from a merchant 102 , and in return, the customer 106 provides payment to the merchant 102 through a payment instrument 116 .
- the customers 106 may be equipped with payment instruments 116 , such as credit card, debit card, gift card, near-field communication (NFC) based payment instrument, and the like, and communication devices 107 , such as smart phones, tablet computers, laptops, mobile wearable devices like Apple® watch or a Fitbit®, or other mobile data processing apparatus, that may have executing or installed thereon one or more web or mobile applications to support various functionalities.
- the communication devices 107 may be configured to respond to requests from other devices, such as the POS device 104 to provide its exact location, approximate location, or location relative to another device. In some implementations, the communication device 107 may allow other devices to check whether or not the device 107 is within a marked geo-fence.
- the POS device 104 or the communication device 107 may hereinafter also be referred to as the payment device.
- the communication device 107 may also have executing or installed thereon payment applications 111 .
- the payment application 111 can include an interface for the user to select the payment instrument 116 or otherwise track transactions made through the payment instrument 116 .
- multiple payment instruments 116 issued by the same or different issuing entity, can be accessed by a single payment application 111 .
- the payment application 111 can be an instance of the payment instrument, for example a virtual wallet.
- the payment application for example a web or mobile application
- the payment application 111 may be associated with the payment instrument 116 , the device or its identifier, and the entity that has issued the payment instrument, for example, issuer 128 , through the process of registration.
- the registration process may also trigger the user to allow the issuer 128 to obtain and store the device information (e.g., device identifier), environment information (e.g., location of the point of transaction, location of device, or location of the payment instrument, etc.), or the user information (location of the user, user identifier, etc.) indicative of the device.
- the device information e.g., device identifier
- environment information e.g., location of the point of transaction, location of device, or location of the payment instrument, etc.
- the user information location of the user, user identifier, etc.
- the issuer 128 may also store information of the issuer-device relationship in the device. Such information may be correlated with the user data and saved in the issuer 128 .
- the processor of the issuing entity herein referred to as issuer 128 , may include a rule engine (not shown) to map received data from the user or user device with a stored value of the user and device association, for example, to confirm whether a prior relationship exists and based on that, further determine a level of risk associated with the transaction. If the level of risk is lower than a predetermined threshold, for example, as set by the card processing network or the issuer, the issuer 128 can remove the requirement for a CVM as dictated by the card processing network or even change the CVM.
- the issuer 128 can again either apply a stringent or multi-level CVM or even decline the transaction as being too risky. While some embodiments describe confirmation of a user device to be present at the time of payment transaction, this is no way should limit the present subject matter.
- the issuer checks whether a payment application or an identifier is trackable irrespective of where the device is present at the time of payment transaction. For example, the issuer sends a query to the device on record to determine whether it is a legitimate device and subsequently configures the CVM or requirement for CVM. Approval via geo-location (and other forms of location) can be so seamless the buyer does not necessarily need have their phone in hand. Without knowing, the users can have an extremely secure transaction.
- a transaction may include a financial transaction for the acquisition of goods and/or services that is conducted between the customer and the merchant.
- the customer can provide the amount that is due to the merchant using a payment instrument 116 (e.g., a debit card, a credit card, a stored-value or gift card, a check, through an electronic payment application on a device carried by the customer, or the like).
- the merchant 102 can interact with the POS device 104 to process the transaction, such as by inputting (e.g., manually, via a magnetic card reader or an RFID reader, etc.) an identifier associated with the payment instrument 116 .
- a payment instrument 116 of one of the customers 106 may include one or more magnetic strips for providing card and customer information when swiped in a card reader.
- other types of payment cards may be used, such as smart cards having a built-in memory chip that is read by the device 104 when the card is “dipped” into the reader, or tapped onto a surface or in proximity to the surface of the reader having a radiofrequency identification tag, or so forth.
- the attribute of the payment instrument can be an identifier that indicates whether the instrument has a magnetic strip or a chip and information stored thereon.
- the attribute can also be a cost of the payment transaction for which the payment instrument is being authorized, a hardware capability of the POS device, that is whether the POS device is capable of accepting EMV cards, magnetic cards, NFC based instruments, and so on, the location of the payment transaction, and the identity of the entity issuing the payment instrument.
- the POS device 104 may comprise any sort of mobile or non-mobile device that includes an instance of a merchant application that executes on the respective device (as illustrated in FIG. 4 ).
- the merchant application may provide POS functionality to the POS device 104 to enable the merchant 102 (e.g., an owner, merchants, etc.) to accept payments from the customers 106 .
- the POS device 104 may correspond to a store or other place of business of the merchant, and thus, may be a fixed location that typically does not change on a day-to-day basis.
- the POS device 104 may change from time to time, such as in the case that the merchant operates a food truck, is a street vendor, a cab driver, etc., or has an otherwise mobile business, e.g., in the case of merchants who sell items at buyer's homes, places of business, and so forth.
- the POS device 104 may include sensors (not shown), such as accelerometers, microphones, GPS/location sensors, light detection sensors, proximity sensors, gravity detection sensors, magnetic field detection sensors, electrical field detection sensors, vibration sensors, pressure sensors, humidity sensors, and the like, to measure a physical quantity and convert it into a signal that may be used to detect exact, approximate, or relative location of devices from the device 104 .
- the location sensors may be internal and/or external to the device 104 . Exemplary location sensors include, but are not limited to, a cellular radio or modem, a GPS receiver, a Wi-Fi adapter or modem, a BLUETOOTH brand communication service element, a three-dimensional motion sensor, or the like.
- the device 104 can also set up a geo-fence and detects one or more devices that enter and/or exit the geo-fence.
- the location of the device 104 may represent a status (e.g., inside and/or outside the geo-fence) or an actual determination location (e.g., coordinates).
- the device 104 may perform particular actions based on the determined location of the devices relative to the geo-fence.
- the device 104 detects the location and saves the information both on the POS device 104 and the issuer 128 .
- the POS device 104 is also configured to receive a payment instrument or multiple payment instruments to satisfy at least a portion of the cost of the payment transaction. For example, a single payment card or several cards or other payment objects may be used in a single payment transaction. The cost may be split between several cards based on incentives associated with the cards or availability of funds on accounts connected to the cards.
- the POS device 104 can obtain payment transaction information describing the transaction, such as the attribute or identifier of the payment instrument, identity of the customer based on identifier of the payment instrument, identity of the customer based on information in track or records of the payment instrument, an amount of payment received from the customer, the item(s) acquired by the customer, a time, place and date of the transaction, a card network associated with the payment instrument, an issuing bank of the payment instrument, and so forth.
- payment transaction information describing the transaction such as the attribute or identifier of the payment instrument, identity of the customer based on identifier of the payment instrument, identity of the customer based on information in track or records of the payment instrument, an amount of payment received from the customer, the item(s) acquired by the customer, a time, place and date of the transaction, a card network associated with the payment instrument, an issuing bank of the payment instrument, and so forth.
- the POS device 104 can also determine information related to devices surrounding or in proximity to the POS device 104 .
- the sensors such as location sensors, global positioning systems (GPS) units, Wi-Fi Positioning Systems (WPS), etc.
- the sensors can detect surrounding or proximate devices based on location detection protocols, including triangulation triangulation, trilateration, multi-laterations, geo-fence, global or local positioning systems, and by leveraging device profile obtained through the sensors.
- triangulation of data may be by “direct” triangulation, e.g., as where the identity of the buyer device is determined from the point of intersection (or the point of least squares fit) of multiple device profiles.
- triangulation may be “indirect,” as where the identity of the buyer device is determined not only from the device profiles, but also from relative profiles originating from other devices in the proximity or even historical purchases.
- the present subject matter also includes implementations where locations are reported by other buyer devices in a “crowdsourced” manner.
- the POS device 104 can send the transaction information and location information to a payment service 108 over a network 110 , either substantially or contemporaneous to the conducting of the transaction (in the case of online transactions) or later when the device 104 is in the online mode (in the case offline transactions).
- the POS device 104 is configured to work in both offline and online modes.
- the POS device 104 may store one or more characteristics associated with the transaction (i.e., the transaction information), such as a cost of the transaction, a time of day at which the transaction occurred, a day of the week at which the transaction occurred, a location at which the transaction took place, an item that the customer obtained, and a payment instrument used in the transaction.
- the POS device 104 may provide the stored information to the payment service 108 over the network 110 .
- the network 110 may represent any one or more wired or wireless networks, such as a Wi-Fi network, a cellular network, or the like.
- the POS device may send this information to the payment service 108 over the network 110 substantially contemporaneously with the transaction with the customer.
- the payment service 108 may include a processor 118 , a memory 120 having components, such as a payment processing component 122 and a rule engine 123 described later.
- the CVM is static and fixed, i.e., does not vary with the user or payment instrument. By static, the CVM does not change based on the nature of transaction or the type of payment instrument. By fixed, the card network stores the CVM based on the type of card and issuer 128 . The CVM can further include a specific order regardless of risk or other factors.
- the POS device 104 is configured to implement a cardholder verification method (CVM) that specifies verification information (or a modified order of verification information) to request from customers and the circumstances in which to request this information, based on the attribute of the payment transaction and a risk score computed based on the obtained attribute.
- CVM cardholder verification method
- the CVM may indicate that transactions for amounts over a threshold amount (e.g., $50) will only be authorized when verification information—in addition to the information stored by a customer's payment instrument—is provided by the customer.
- This information may include a personal identification number (PIN) associated with the payment instrument, a password with the payment instrument, a signature of the cardholder, or the like.
- PIN personal identification number
- the CVM is saved against each payment instrument at the card processing network 124 .
- the card processing network 124 includes an association of the payment instrument (PI) 116 ( 1 ) with a CVM-1, payment instrument 116 ( n ) with CVM-n, and so on.
- a processor 104 associated with an issuer may have additional insight into the payment instrument, which when compared to the data reported by the POS device 104 at the time of payment transaction can indicate a different CVM or even remove the requirement for CVM, if the risk associated with the transaction is significantly low.
- POS device 104 may be configured (e.g., via the merchant application executed on the device 104 ) to generate instructions that indicate a modification of an order of the CVM based on payment device or payment instrument attributes, such as a card network associated with a payment instrument/device, a brand of the payment instrument/device, an issuing bank of the payment instrument, whether the payment instrument includes a magnetic strip or a memory chip, or the like, or a new CVM altogether.
- FIG. 1 illustrates, at 112 , that the processor of the issuing entity, also referred to as issuer 128 , is configured to implement a first CVM 114 ( 1 ) when the POS device 104 receives a first payment instrument 116 ( 1 ), and a second CVM 114 ( 2 ) when the POS device 104 receives a second payment instrument 116 ( 2 ).
- issuer 128 the processor of the issuing entity
- the issuing entity 128 is configured to implement a first CVM 114 ( 1 ) when the POS device 104 receives a first payment instrument 116 ( 1 ) in the absence of a communication device 107 - 1 , and a second CVM 114 ( 2 ) when the POS device 104 receives a first payment instrument 116 ( 1 ) in the presence of a communication device 107 - 1 executing an instance of a payment application irrespective of the CVM 126 imposed by the card network processor 124 .
- the payment instrument 116 ( 1 ) is tied to device 107 - 1 and such a relationship may have been established when an application 111 associated with the issuing entity 128 was installed by the customer.
- the payment instrument 116 ( 2 ) is associated with device 107 - 2 and such a relationship is also established at the time of registration of an application 111 or another device registration application or the like. Not all devices may be registered and as such the CVM recommended by the card network processor 124 is applied at the POS device 104 .
- the table or database 112 is used for mapping the payment instrument with device identifier, collected, for example at the time of registration, and a device-specific CVM.
- the issuer 128 may also compute a risk score and accordingly, select CVM best suited to the risk levels of the payment transaction.
- the first payment instrument 116 ( 1 ) represents a payment instrument associated with a first card network (e.g., Visa®, MasterCard®, American Express®, Diner's Club®, Discover®, etc.), while the payment instrument 116 ( 2 ) represents a payment instrument associated with a different card network.
- the first order 114 ( 1 ) specifies that the POS device 104 is first to request a PIN from a cardholder (or “customer”) first, and a signature second, and so forth.
- the second order 114 ( 2 ) instructs the POS device 104 requesting a signature first.
- the POS device 104 may send this information to the payment service, which in turn may attempt to authorize the transaction and send a result back to the POS device.
- the example shown at 112 represents a scenario where a card network associated with the payment instrument 114 ( 2 ) does not accept PINs received from the mobile POS device 104 and, therefore, the POS device dynamically modifies the first, default order 114 ( 1 ) of the CVM in response to identifying the card network associated with the second payment instrument 116 ( 2 ).
- FIG. 1 illustrates two different payment instruments and corresponding CVM orders, it is to be appreciated that any other number of payment instruments and corresponding CVM orders may be utilized.
- the payment service 108 may include one or more processors 118 and memory 120 , which may store a payment processing component 122 .
- the payment processing component 122 may function to receive the information regarding a transaction from the POS device 104 and attempt to authorize the payment instrument used to conduct the transaction. The payment processing component 122 may then send an indication of whether the payment instrument has been approved or declined back to the POS device 104 .
- the payment processing component 122 is also configured to process transactions, collect information related to the transaction, parse the information, and encrypt relevant information for the issuing entity 128 .
- the payment processing component 122 also stores the transaction information for post-transaction activities, such as pattern detection and trend analysis on transactions corresponding to the user, merchant or their locations.
- the rule engine 123 is configured to create various kinds of rules for a user, device, merchant, location or a particular transaction.
- the rules can provide access to a variety of operating standards that may be applied to any given transaction between a merchant and a user, such as transaction fee, tax, etc., based on transaction or nature of transaction.
- the rules engine 123 may also apply a risk analysis, for example in real-time, based on anomalies in behavior of the customer or the device associated with the customer.
- the rule engine 123 is configured to detect, based on the information from the communication device 107 and/or identifiers of the payment device or instrument, whether there is a pre-existing relationship between the communication device and the payment instrument or between the communication device and the issuer 128 .
- the rule engine 123 can also be present in the issuer 128 .
- the rule engine 123 can determine a risk level or score associated with the payment transaction based on the pre-existing relationship, where the relationship is established at a time of registration of the payment instrument or the communication device with the payment service or issuer through, for example a payment application.
- the rule engine 123 can also query a device registered with the payment instrument to obtain its location, for example, or other such information to determine whether the devices in proximity to the POS device or in possession of the user compare to the location of the registered device. If the location of the device present at the location of the transaction positively matches, the rule engine 123 determines that the relationship is pre-existing.
- the transaction is processed by electronically transferring funds from a financial account associated with the customer to a financial account associated with the merchant.
- the POS system 104 selects a card processing network 124 .
- the card processing network 124 indicates a CVM associated with the payment instrument.
- the payment service 108 for example through the rule engine 123 , determines whether to apply new CVM, as generated by the issuer 128 , based on a level or risk associated with the transaction.
- the payment server 108 forwards the payment information, including the customer's location information, customer's device information, card type, etc., to the issuer 128 .
- the issuer 128 based on a risk analysis or mapping of the device information to known devices, generates a new CVM, maintains the CVM dictated by the card processing network, or modifies an order of CVM.
- the issuer 128 may have previously collected information from customer devices at the time of registration of the card, through a customer such, the payment processing component 122 may communicate with one or more computing devices of a card network (or “card payment network”), e.g., MasterCard®, VISA®, over the network 110 to conduct financial transactions electronically.
- a card network or “card payment network”
- the card processing network 124 may also The payment processing component 122 can also communicate with one or more computing devices of one or more banks over the network 110 .
- the payment processing component 122 may communicate with an acquiring bank, and/or an issuing bank, and/or a bank maintaining customer accounts for electronic payments.
- An acquiring bank may be a registered member of a card association (e.g., Visa®, MasterCard®), and may be part of a card payment network.
- An issuing bank associated with the processor 128 may issue credit cards to buyers, and may pay acquiring banks for purchases made by cardholders to which the issuing bank has issued a payment card.
- the computing device(s) of an acquiring bank may be included in the card payment network 124 and may communicate with the computing devices of a card-issuing bank to obtain payment.
- the customer may use a debit card instead of a credit card, in which case, the bank computing device(s) of a bank corresponding to the debit card may receive communications regarding a transaction in which the customer is participating.
- FIGS. 2A and 2B illustrate a flow diagram of a process 200 for determining whether to request verification information as specified by a default order of the CVM or whether to reconfigure CVM and request verification information in accordance with the reconfigured CVM.
- the process 200 and other processes described herein are illustrated as collections of blocks in logical flow diagrams, which represent a sequence of operations, some or all of which can be implemented in hardware, software or a combination thereof.
- the blocks may represent computer-executable instructions stored on one or more computer-readable media that, when executed by one or more processors, program the processors to perform the recited operations.
- computer-executable instructions include routines, programs, objects, components, data structures and the like that perform particular functions or implement particular data types.
- An operation 202 represents an example customer 106 ( 1 ) providing a payment instrument 116 to merchant operating a POS device 104 .
- the customer 106 ( 1 ) may provide this payment instrument to the merchant in exchange for an item (e.g., a good or service).
- This payment instrument may comprise a credit card, a debit card, a bank card, a gift card, a check, a virtual payment instrument, or any other type of payment instrument.
- the customer 106 ( 1 ) is equipped with a communication device 107 having installed thereon a payment application 111 .
- the POS device 104 receives the payment instrument and its underlying payment information, which may include the merchant swiping a magnetic strip of the payment instrument, dipping the payment instrument and its chip into the device 104 , manually entering an identifier of the payment instrument, or the like. Additionally, the payment information may include card data that identifies the customer and the merchant. The payment information, in one implementation, also includes device identifier (e.g., device number, operating system, distance of the device from the POS terminal, etc.). In one example, the sensors in the POS terminal determines a geo-fence within which it then detects the proximate devices and optionally, arranges them in order of their distance from itself. While the location is one indicator of relevance of a device to the customer or transaction in process; other indicators can be used either in combination with the location information or alone.
- device identifier e.g., device number, operating system, distance of the device from the POS terminal, etc.
- the POS device 104 determines a card network associated with the payment instrument, from the information provided to the POS device 104 by the payment instrument. For instance, the POS device 104 may determine this automatically based on the merchant swiping the card, dipping the card, manually entering the identifier, or the like. In other instances, the merchant herself may manually specify the card network (or the brand) associated with the payment instrument, such as MasterCard®, Visa®, or the like.
- the card network may have associated with all their cards, a generic CVM, thus enforcing each customer to adhere to the same CVM irrespective of whether or not the customer has proven to be less or more risky.
- the payment information is sent to the processor of the issuing entity at operation 208 .
- the processor of the issuing entity 128 determines whether or not to institute a CVM different from the CVM specified by the card network. The issuing entity can make this determination based on predictive and normative behavioral analysis associated with the nature of purchase or transaction.
- the issuing entity may also determine whether to implement the default order of the CVM or whether to modify the order based on the card network.
- the issuing entity determines whether the device of the user has installed a mobile payment application or an application associated with the issuing entity. For this, the issuing entity detects that by comparing the device identifier from the payment information with a list of device identifiers obtained at the time of registration of devices or applications with the issuing entity. If the issuing entity detects a match, the issuing entity may lower or higher the risk associated with the payment transaction based on previously collected transactional data from the registered devices. Accordingly, the issuing entity can modify the CVM in accordance with the risk levels. However, if the issuing entity does not detect a connection between an existing device identifier and the device identifier of the payment information corresponding to the present transaction, the issuing entity may keep the CVM indicated by the card network.
- the issuing entity in response to an association between the application of the issuing entity and the payment transaction, reconfigures the order of the CVM based on a level of risk. For instance, the issuing entity may determine, from the merchant application stored on the device, whether the CVM should be modified based on which card network was determined.
- the issuing entity sends the applicable CVM to the POS device 104 .
- the CVM is configured based on the risk level associated with the transaction.
- the risk level is inherently based on the association of the user device with the issuing entity.
- the CVM can be configured based on a determination that the location of the user's device is different from the location of the payment transaction or the payment instrument.
- the POS device 104 based on the CVM indicated by the issuing entity or the card processing network, requests verification information from the customer 106 ( 1 ) according to the CVM. For instance, if the CVM indicates a specific order from the issuing entity such that the POS device is it to first request a PIN, then a signature, the CVM is executed. Or, if the CVM indicates a specific order from the issuing entity that the POS device 104 is to request a signature, then the POS device 104 requests a signature of the customer 106 ( 1 ) (e.g., on a touchpad of the POS device 104 ).
- the POS device 104 can implement the CVM recommended by the card processing network.
- An operation 214 represents the customer 106 ( 1 ) receiving the request for verification information.
- FIG. 2B continues the illustration of the process 200 .
- the customer provides the requested verification information to the POS device 104 , such as by entering her PIN, providing a signature, or the like.
- the requested verification information is configured according to the relationship between the customer or customer device and the issuing entity.
- An operation 216 represents the POS device 104 receiving the verification information.
- the verification information may also indicate a verification signature, where the verification signature indicates the verification method requested by the POS device 104 .
- the verification signature may indicate that the requested verification information was pushed by the issuing entity in response to an association between the issuing entity and the customer.
- an operation 218 represents the POS device 104 determining whether or not the payment instrument has been authorized for the current transaction with the customer 106 ( 1 ), based in part on the provided verification information.
- the POS device 104 may provide information regarding the payment instrument (e.g., identifier, expiration date, CVC code, etc.) along with the provided verification information (e.g., PIN, signature, etc.) to the payment service 108 , which in turn attempts to authorize the payment instrument for the transaction.
- the payment instrument e.g., identifier, expiration date, CVC code, etc.
- the provided verification information e.g., PIN, signature, etc.
- an operation 222 represents the POS device 104 requesting verification information according to the CVM order until the transaction is authorized or until each piece of verification information has been requested without an authorization. For instance, if the transaction fails after the customer 106 ( 1 ) provides a PIN, then the POS device may move to the second verification information listed on the CVM order, such as a signature, and may request a signature from the customer 106 ( 1 ). Of course, in some instances the POS device may refrain from requesting additional verification information if a first piece fails (or if the transaction fails a threshold number of times). Further, the POS device 104 may request a certain piece of verification information multiple times (e.g., may request that the user again try to enter the correct PIN in the event that the first attempt fails).
- FIG. 3 illustrates a flow diagram of a 300 process for determining whether to modify a CVM order based on an attribute of a received payment instrument, and requesting first or second verification information depending upon whether or not the order has been modified.
- the process 300 receives a request to authorize a payment instrument at a POS device, the POS device implementing a CVM that specifies of order of verification information to request to a user associated with the payment instrument.
- the process 300 determines an attribute associated with the payment instrument. This attribute may include a card network of the payment instrument, a brand of the payment instrument, an issuing or acquiring bank of the payment instrument, and/or the like.
- the process 300 may determine whether to implement the default CVM specified by the card processing network, or whether to modify the CVM, with this determination being based at least in part on the attribute of the payment instrument. In some instances, this determination is also based at least in part on a cost of the transaction, hardware or other capabilities of the POS device, and the like. For instance, if the POS device includes a touch screen to receive PINs rather than a dedicated hardware device for receiving these PINs, then the POS device may modify the order such that that a signature is listed first within the verification-information order. In another instance, the determination is based on the issuing entity confirming that the device is recognized by the issuing entity, as part of a previous registration.
- the issuing entity may determine the risk level associated with the transaction based on whether or not the issuing entity recognizes the device. Accordingly, the issuing entity may modify the CVM to be more stringent than the one suggested by the card processing network.
- the process 300 includes combining the verification information as per the card processing network and the issuing entity in response to risk associated with the transaction and requesting the
- the process 300 requests first verification information in response to determining to implement the default CVM. That is, the POS device 104 may request the first listed piece of verification information, such as a PIN.
- the process 300 requests second, different verification information in response to determining to a new CVM or a new order of CVM. This second verification information may comprise a signature rather than a PIN in some instances.
- FIG. 4 illustrates select example components of an example POS device 400 according to some implementations.
- the POS device 400 may be any suitable type of computing device, e.g., mobile, semi-mobile, semi-stationary, or stationary. Some examples of the POS device 400 may include tablet computing devices; smart phones and mobile communication devices; laptops, netbooks and other portable computers or semi-portable computers; desktop computing devices, terminal computing devices and other semi-stationary or stationary computing devices; dedicated register devices; wearable computing devices, or other body-mounted computing devices; or other computing devices capable of sending communications and performing the functions according to the techniques described herein.
- the POS device 400 can be a card reader or a server processing payments for the user.
- the POS device 400 includes at least one processor 402 , memory 404 , a display 406 , one or more input/output (I/O) components 408 , one or more network interfaces 410 , at least one card reader 412 , at least one location component 414 , and at least one power source 416 .
- Each processor 402 may itself comprise one or more processors or processing cores.
- the processor 402 can be implemented as one or more microprocessors, microcomputers, microcontrollers, digital signal processors, central processing units, state machines, logic circuitries, and/or any devices that manipulate signals based on operational instructions.
- the processor 402 may be one or more hardware processors and/or logic circuits of any suitable type specifically programmed or configured to execute the algorithms and processes described herein.
- the processor 402 can be configured to fetch and execute computer-readable processor-executable instructions stored in the memory 404 .
- the memory 404 may be an example of tangible non-transitory computer storage media and may include volatile and nonvolatile memory and/or removable and non-removable media implemented in any type of technology for storage of information such as computer-readable processor-executable instructions, data structures, program modules or other data.
- the memory 404 may include, but is not limited to, RAM, ROM, EEPROM, flash memory, solid-state storage, magnetic disk storage, optical storage, and/or other computer-readable media technology.
- the POS device 400 may access external storage, such as RAID storage systems, storage arrays, network attached storage, storage area networks, cloud storage, or any other medium that can be used to store information and that can be accessed by the processor 402 directly or through another computing device or network.
- the memory 404 may be computer storage media able to store instructions, modules or components that may be executed by the processor 402 .
- non-transitory computer-readable media exclude media such as energy, carrier signals, electromagnetic waves, and signals per se.
- the memory 404 may be used to store and maintain any number of functional components that are executable by the processor 402 .
- these functional components comprise instructions or programs that are executable by the processor 402 and that, when executed, implement operational logic for performing the actions and services attributed above to the POS device 400 .
- Functional components of the POS device 400 stored in the memory 404 may include a merchant application 418 , discussed above.
- the merchant application 418 may present an interface on the POS device 400 to enable the merchant to conduct transactions, receive payments, and so forth, as well as communicating with the payment service 102 for processing payments and sending transaction information. Further, the merchant application 418 may present an interface to enable the merchant to manage the merchant's account, and the like.
- the merchant application 418 may also include a module for dynamically modifying an order of a CVM based on attributes of a payment instrument, potentially based on additional factors, as described above with reference to FIGS. 1-3 .
- Additional functional components may include an operating system 420 for controlling and managing various functions of the POS device 400 and for enabling basic user interactions with the POS device 400 .
- the memory 404 may also store transaction data 422 that is received based on the merchant associated with the POS device 400 engaging in various transactions with customers, such as the example customers 106 from FIG. 1 .
- the memory 404 may also store data, data structures and the like, that are used by the functional components.
- this data may include item information that includes information about the items offered by the merchant, which may include images of the items, descriptions of the items, prices of the items, and so forth.
- the memory 404 may also optionally include other functional components and data, which may include programs, drivers, etc., and the data used or generated by the functional components.
- the POS device 400 may include many other logical, programmatic and physical components, of which those described are merely examples that are related to the discussion herein.
- the network interface(s) 410 may include one or more interfaces and hardware components for enabling communication with various other devices over the network or directly.
- network interface(s) 410 may enable communication through one or more of the Internet, cable networks, cellular networks, wireless networks (e.g., Wi-Fi) and wired networks, as well as close-range communications such as Bluetooth®, Bluetooth® low energy, and the like, as additionally enumerated elsewhere herein.
- FIG. 4 further illustrates that the POS device 400 may include the display 406 mentioned above.
- the display 406 may employ any suitable display technology.
- the display 406 may be a liquid crystal display, a plasma display, a light emitting diode display, an OLED (organic light-emitting diode) display, an electronic paper display, or any other suitable type of display able to present digital content thereon.
- the display 406 may have a touch sensor associated with the display 406 to provide a touchscreen display configured to receive touch inputs for enabling interaction with a graphic interface presented on the display 406 . Accordingly, implementations herein are not limited to any particular display technology.
- the POS device 400 may not include the display 406 , and information may be present by other means, such as aurally.
- the I/O components 408 may include speakers, a microphone, a camera, and various user controls (e.g., buttons, a joystick, a keyboard, a keypad, etc.), a haptic output device, and so forth.
- various user controls e.g., buttons, a joystick, a keyboard, a keypad, etc.
- the POS device 400 may include or may be connectable to a payment instrument reader 412 .
- the reader 412 may plug in to a port in the merchant device, such as a microphone/headphone port, a data port, or other suitable port.
- the reader 412 is integral with the entire POS device 400 .
- the reader may include a read head for reading a magnetic strip of a payment card, and further may include encryption technology for encrypting the information read from the magnetic strip.
- numerous other types of card readers may be employed with the POS devices 400 herein, depending on the type and configuration of a particular POS device 400 .
- the method implemented by device includes a method for verifying a payment card at the time of a payment transaction between a merchant and a customer, the method includes receiving, at a point-of-sale (POS) device and from the user, the payment card for satisfying a cost of the payment transaction between the merchant and the customer; receiving, by the POS device, information from the payment card, including information related to a card network processor associated with the received payment card; detecting, by the POS device, a location of the POS device or one or more communication devices, wherein the location indicates a current location of the payment transaction; sending, to a processor of an issuing entity of the payment card and via a payment processing system, the information from the payment card; determining, by the processor of the issuing entity and based on the information from the payment card, if the user has installed an application on at least one registered communication device, the application configured for user management of the payment transaction using the payment card; obtaining, by the processor of the issuing entity, a device identifie
- POS point-of-sa
- the payment processing system further determines a level of risk associated with the payment transaction based at least on the location of the registered device being substantially dissimilar to the location of the POS device or any of the communication devices.
- the configuration is further based at least in part on at least one of hardware associated with the POS device or a capability of the POS device, and wherein the hardware includes a touch screen to receive signature of the user or a dedicated hardware device for receiving personal identification numbers (PINs).
- PINs personal identification numbers
- the method includes receiving, by an entity issuing a payment instrument, a request to authorize the payment instrument at a point-of-sale (POS) device, the entity issuing the payment instrument programmed to selectively implement a dynamic cardholder verification method (CVM) at the POS device, wherein the dynamic CVM is configured based on an identifier associated with the payment transaction; receiving, the identifier associated with the payment transaction, the identifier including information corresponding to the payment instrument and/or one or more communication devices in proximity to the payment instrument; determining, by an entity issuing the payment instrument and based on the identifier, whether at least one of the communication devices is registered with the entity issuing the payment instrument; determining, by the entity issuing the payment instrument, whether to implement a static CVM specified by a card network associated with the payment instrument or whether to apply the dynamic CVM, wherein the dynamic CVM is generated and applied if the communication device is registered with the entity issuing the payment instrument; and requesting, on the POS device, an input in response to the dynamic C
- the identifier also comprises whether the payment instrument includes a magnetic strip storing payment information associated with the payment instrument or a chip storing the payment information associated with the payment instrument.
- the dynamic CVM comprises a specific order of a personal identification number (PIN) or a signature of the user associated with the payment instrument followed by another PIN or a signature.
- the determination of whether to implement or modify the static CVM specified by the card network is further based at least in part on a capability of the POS device or the communication device.
- the method further includes submitting the dynamic CVM and an identifier associated with the payment instrument to a remote entity for authorizing the payment instrument; an indication that the payment instrument has not been authorized; and requesting the static CVM from a user associated with the payment instrument after receiving the indication.
- a payment device in another implementation, includes one or more processors; and one or more computer-readable media storing computer-executable instructions that, when executed by the one or more processors, cause the one or more processors to: obtain an attribute associated with the payment instrument received by the payment device, wherein the payment instrument is used towards satisfying a cost of a payment transaction; obtain information corresponding to at least one communication device in proximity to the payment device or the payment instrument; detect, based on the information of the communication device and the attribute of the payment device, whether there is a pre-existing relationship between the communication device and the payment instrument;
- the pre-existing relationship is established at a time of registration of the payment instrument or the communication device with the payment device issuing the payment instrument.
- the device further includes a rule engine to determine a risk level associated with the payment transaction, based in part on the pre-existing relationship between the communication device and the payment instrument.
- the rule engine is configured to: query a device registered with the payment instrument; compare the location of the registered device with the communication device in proximity to the payment instrument or the payment device; and determine that the relationship is pre-existing based at least on the comparison.
- the attribute comprises whether the payment instrument includes a magnetic strip that stores payment information or a chip that stores the payment information.
- the default verification order is a generic value set by the card network processor for the payment instrument issued by an entity issuing the payment instrument.
- the determining of the CVM is based at least in part on one or more of: (a) specifications of the apparatus; (b) the cost of the payment transaction; (c) a type of the payment instrument; and (d) a brand of the payment instrument.
- the payment device includes a touch-sensitive display to display information regarding the payment transaction and to receive from the customer associated with the payment instrument an input corresponding to the generated CVM.
- the method implemented at least in part by a processor associated with an entity issuing at least one payment instrument, the method comprising: receiving a request to authenticate use of the payment instrument at a point-of-sale (POS) device in response to a payment transaction; obtaining, from a database, an attribute associated with the payment instrument, wherein the attribute indicates a predicted location of a communication device associated with a holder of the payment instrument at a time of the payment transaction, wherein the attribute is set in response to an execution or registration of an application of the entity issuing the payment instrument on a communication device; obtaining, through a location sensor of the POS device, a current location of the payment transaction; determining whether the current location of the payment transaction involving the payment instrument substantially matches the predicted location of the communication device associated with the holder of the payment instrument; and implementing, via the processor, a cardholder verification method (CVM) that specifies a device-specific order of verification information to request for verifying the payment instrument if the current location of the communication device matches the predicted location.
- CVM
- the method includes determining a level of risk associated with the transaction based at least in part on a mapping of the predicted location with the current location; and configuring the device-specific order of verification information in accordance with the level of risk.
- the method includes predicting the location of the communication device by using the attribute to query the communication device.
- the method also includes determining whether to implement a generic order of the CVM specified by a card processing network or modify the generic order of the CVM to a device-specific order of the CVM based at least in part on one or more of: (a) a cost of the payment transaction for which the payment instrument is being authorized; (b) a hardware capability of the POS device; (c) the location of the payment transaction; and (d) the entity issuing the payment instrument.
- FIGS. 5A-C further illustrate exemplary use cases associated with the method and systems described above.
- the user presents the payment card 502 at the payment terminal 504 for a transaction amount over a transaction limit pre-set by the issuer or card network processor.
- the terminal declines the transaction and no further communication is supplied to the payment processor 506 or issuer 510 .
- the payment terminal 504 sends information pertaining to the payment card 502 and/or the transaction, including size of the ticket, to the issuer 510 .
- the issuer 510 then, based on risk analysis of the ticket size with respect to the specific user, may prompt a secondary authentication or decline the charge and prompt another form of payment.
- the issuer 510 performs the risk analysis based on one or more rules stored in the rule engine 508 associated with the payment service 502 or the issuer 510 .
- the new CVM may be authenticated before the normal payment flow.
- the user presents the payment card 502 at the payment terminal 504 .
- the payment terminal 504 sends the request for CVM to the issuer 510 via the payment processing system, or payment service, 506 .
- the issuer 510 compares the payment card identifier embedded in the request with an internal database. If the payment card is identified, the issuer sends a request on the communication device of the user 512 for either a response or an actual CVM, such as a text message or fingerprint response.
- the communication device of the user 512 does not necessarily need to be at the location of the payment transaction, however. As such, the user need not respond to the CVM requested by the issuer contemporaneous to the payment transaction.
- the user presents the payment card 502 at the payment terminal 504 .
- the payment terminal 504 sends the request for CVM to the issuer 510 via the payment processing system, or the payment service, 506 .
- the issuer identifies the user's communication device (either by identifying the device identifier, a mobile payment application, phone number of the user using a certain payment card, or other such identifier).
- the issuer determines the validity of the CVM and confirms that the collected CVM is adequate for authentication and therefore for chargeback and liability purposes. In this manner, the authentication is accepted as part of the messaging or other way to detect communication device.
Landscapes
- Business, Economics & Management (AREA)
- Engineering & Computer Science (AREA)
- Accounting & Taxation (AREA)
- Physics & Mathematics (AREA)
- Strategic Management (AREA)
- General Business, Economics & Management (AREA)
- General Physics & Mathematics (AREA)
- Theoretical Computer Science (AREA)
- Finance (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Development Economics (AREA)
- Economics (AREA)
- Microelectronics & Electronic Packaging (AREA)
- Cash Registers Or Receiving Machines (AREA)
Abstract
Description
- In today's commerce, merchants often utilize an array of different point-of-sale (POS) devices, including mobile POS devices. Merchants may use these POS devices to engage in transactions with customers at different locations. For instance, a taxi driver may use a mobile POS device to charge a passenger for a taxi ride. In another example, a street vendor may use a mobile POS device to charge a customer for an item purchased from the street vendor. In yet another example, a merchant may use a stationary POS device to process a payment transaction at a store. Operators of traditional payment infrastructure, such as card networks and issuing banks, often struggle to adapt to this changing landscape of POS devices.
- The detailed description is set forth with reference to the accompanying figures. In the figures, the left-most digit(s) of a reference number identifies the figure in which the reference number first appears. The use of the same reference numbers in different figures indicates similar or identical items or features.
-
FIG. 1 illustrates an example environment that includes a merchant operating a mobile point-of-sale (POS) device to conduct transactions with multiple different customers. In some instances, the POS device dynamically configures verification information to request from the customers that a cardholder verification method (CVM) specifies. For instance, the POS device, payment server, or an issuing bank may determine, based on a type of payment instrument provided by a customer and risk analysis of the payment instrument, whether to request verification information as specified by a default CVM, configure the CVM or ignore CVM requirement altogether. -
FIGS. 2A and 2B illustrate a flow diagram of a process for determining whether to request verification information as specified by a default CVM or whether to configure the CVM and request verification information in accordance with the reconfigured CVM. -
FIG. 3 illustrates a flow diagram of a process for determining whether to modify a CVM based on an attribute or identifier of a received payment instrument, and requesting first or second verification information depending upon whether or not the order has been modified. -
FIG. 4 illustrates select components of a POS device that a merchant described herein may utilize. -
FIGS. 5A, 5B, and 5C illustrates select components of a POS device that a merchant described herein may utilize. - Some implementations described herein include techniques and arrangements for dynamically configuring and/or reconfiguring verification information at point-of-sale (POS) devices based on a payment instrument presented at the time of a payment transaction and at a specific location.
- In an example scenario, a customer presenting a credit card while holding a device executing an application of the entity that issued the credit card, may not provide a primary or secondary verification. On the other hand, a customer presenting a credit card in the absence of a registered mobile device or mobile device executing a registered application with the issuing entity, may be asked to provide a primary or secondary verification, for example a PIN or signature, or a PIN followed by signature, based on a risk rating of the transaction.
- As described herein, a POS device may be programmed to implement a cardholder verification method (CVM) that specifies the POS device to request verification information from a customer engaging in a transaction at the POS device, where the verification information or request for verification information that is specific to the customer, transaction or an attribute of the payment instrument. For instance, the POS device may initially receive (e.g., via a swipe, a dip, manual entry, etc.) information from a payment instrument (e.g., credit card, bank card, debit card, etc.). The POS device may then, with the issuing entity and a payment server, determine whether the POS device can request additional, different or no verification information and, if so, the manner and kind of information to request. This additional verification information may comprise a personal identifier number (PIN) associated with the payment instrument, a signature of the cardholder, an answer to a security question associated with the cardholder, biometric information from the cardholder, a combination of any of the above, or even absence of any CVM. For example, if the issuing bank determines the risk of the transaction to be lower than a threshold value, the POS device may process the transaction without CVM and under the condition that the issuing entity will approve the transaction absent CVM.
- In one implementation, various conditions may trigger configuration or reconfiguration of CVM. In one example, the trigger condition may be based on detection of a registered mobile device at the time of a payment transaction, i.e., if the card holder has registered with the payment server its mobile device and/or associated the mobile device with the payment instrument. In another example, the trigger condition may be based on detection of a financial application, such as an application that facilitates management of payment transactions using the payment instrument, installed on a device associated with the user or any device at the location where the transaction is taking place. In some implementations, instead of relying on presence of a device, the trigger condition may be based on an absence of a registered device or financial or payment application.
- Before requesting the verification information, however, a POS device as described herein may determine, based on one or more attributes of a received payment instrument, specifications or capabilities of the receiving POS device, risk logic implemented by a payment server, and/or the like, whether to request CVM, modify default CVM into a specific CVM, or change the order of CVM for a specific cardholder, payment instrument or transaction. For instance, while the CVM may initially instruct a POS device to request a PIN number from a cardholder, the processor of the issuing entity may determine that the CVM order should be modified such that a signature is requested rather than the PIN. After determining whether to modify the CVM order, the POS device may request verification in accordance with the (potentially modified) order. For instance, the POS device may request first verification information from the user, followed by second verification information if the first verification information does not authorize the transaction, and the like, until the transaction/payment instrument is authorized or each piece of verification information from the CVM has been requested.
- In another example, the CVM may initially instruct the POS device to request a specific set of inputs, such as a PIN and signature of the user, however, if the issuing entity detects a payment application executing on a device registered with the user or user's payment instrument and in proximity to the POS device, the issuing entity may generate a CVM specific to the payment instrument, or even relax the requirement of CVM.
- In one implementation, the POS device (or a payment card reader) detects devices in proximity to itself, for example through sensors, transmitters, receivers, antenna, etc. The POS device can also, additionally or optionally, obtain device information, such as device identifier, device type, etc. The POS device may be triggered to obtain device information when a user presents a payment instrument for payment of a payment transaction, or otherwise approaches a payment reader or POS device. In this manner, the most proximate communication device to the POS device, in the context of the current payment transaction or payment instrument, can be determined. The POS device extracts payment information, such as the payment card number, the verification number, the cardholder identifier such as name, etc., and the device information. The POS device sends the payment information, including the cardholder identifier and device information, to the issuing entity, for example through an intermediate entity such as acquirer, processor of card processing network, and the payment processing server. The issuing entity, based on the payment information or the cardholder identifier, determines whether a device is registered with the cardholder and/or a financial application is installed on the device registered with the cardholder. The issuing entity then contacts or otherwise communicates with the registered device to determine its location.
- In another example, the issuing entity has access to the location of the communication device, for example through a previous registration, and does not need to explicitly communicate with the device for location information. Using the location information of the registered device, the issuing entity determines whether the location is the same as the location of the payment transaction (indicated by the POS device, proximate devices, payment instrument or a chip therein) and if the location matches or is otherwise similar, the issuing entity may reconfigure the CVM requirement to be specific to the payment instrument. In one instance, the issuing entity may determine a risk score to be lower than a threshold value and even remove the requirement to request CVM because the issuing entity has enough information to tag the transaction as sufficiently secure. In another instance, the payment server or POS device may reconfigure the CVM as per location determination and comparison made by the issuing entity. By configuring the CVM based on previously collected data or historical trends or patterns, such as location information or purchasing habits, merchant type, etc., the user need not provide CVM thereby making the payment transaction experience seamless and frictionless. The CVM is generally specific to the card network however based on the disclosure herein, the CVM can be configured to be a different CVM or no CVM as the case may be.
- In some implementations, if the location of the registered device is substantially dissimilar from the location of the devices where the payment transaction is occurring or has occurred, the CVM specified by the card network can be applied. Alternatively, a more stringent CVM or multiple rounds of authentication can be requested to further secure the payment transaction.
- Thus, dynamically reconfiguring CVM may result in a more efficient and seamless transaction between a merchant and a customer. To provide an example, payment instruments associated with a particular card network might not accept certain verification information when input into a particular type of POS device. For instance, the card network might not accept PIN numbers entered into a device that does not include a dedicated hardware device for receiving PIN numbers (but that instead includes a touch screen or the like for receiving this information). Therefore, a POS device may determine when it receives a payment instrument associated with this card network and may dynamically reconfigure the CVM after processor of the issuing entity has executed a risk check and determined secondary means to authenticate the transaction (for example, based on location of the payment transaction or historical trends associated with the user, user's payment instrument or even the merchant. For instance, knowing that the card network will not accept a PIN entered at the POS device and based on a confirmation that the cardholder is carrying a device previously registered with the issuing entity or a device executing an application associated with the issuing entity, the issuing entity, via the POS device, may reorder the CVM, which may include removing “PIN” as a type of verification information to request and moving “signature” into a first slot in the order. The POS device may then request a signature in lieu of a PIN, thus avoiding the situation where a cardholder enters her PIN, learns from the merchant that the PIN has not been accepted, and then is asked to provide a signature. Instead, the POS device will skip straight to requesting a signature form the cardholder, thus resulting in a quicker transaction that potentially prevents embarrassment to the merchant and/or the cardholder, but without risking the security of the payment transaction. The transaction, when sent for processing, may include data or a flag that indicates that the issuing entity had approved a modified CVM based on the location of the payment instrument, registration of the user's device, and other such factor. The card network can use this data to process the transaction in the absence of CVM typically enforced by the card network.
- Furthermore, the systems and methods described herein improve and simplify authentication that in turn will reduce observed fraud. Currently, without PIN for high ticket transactions, networks either default to less secure forms of authentication (and take the liability) or use alternate hardware (or in the most extreme case cannot accept the transaction). Both of these options are not ideal and also some CVMs may slow down the transaction time or make it less secure. To this end, the open payment platform described herein is designed to work with all mobile devices, any issuer, and is extensible to other platforms. Some implementations describe payment applications to be installed on user phone. As such, the implementations are aligned with longer term industry trends involving use of mobile devices and greater consumer control in the payment process, moving payments to the buyer. Such implementations also provide flexibility for any changes as the rule engine may reside in the server or the issuer and move away from the POS terminal.
- Some of the implementations offer dynamic risk controls to allow the issuers to dynamically set and control authentication limits, manage risk, and assign CVMs accordingly. The dynamic risk controls are based on one or more attributes, such as merchant attribute, e.g., merchant code, geography, observed fraud, buyer attribute, e.g., credit line, credit balance, and risk profile based on current and/or past transactions, authentication method, e.g., geo-location, biometric input, one time password or text message, etc.
- Some implementations also offer increased engagement with the banking infrastructure thus driving more users to the platform, for example more users engage with the mobile payment applications, which are the main touch point for customers, which in turn increases the propensity for updated contact details and also gives the issuers the opportunity to display other data as part of the transaction, e.g., balance, last time visited, etc. The implementations described herein offer options to perform authentication for the payment flow with other terminals that may or may not be connected to the existing payment infrastructure.
- For discussion purposes, some example implementations are described below with reference to the corresponding figures. However, implementations herein are not limited to the particular examples provided, and may be extended to other environments, other system architectures, other types of merchants, and so forth, as will be apparent to those of skill in the art in light of the disclosure herein.
- Various embodiments and implementations of the disclosed custom and/or dynamic authentication technology are now described. The following description provides specific details for a thorough understanding and an enabling description of these implementations. One skilled in the art will understand, however, that the disclosed system and methods may be practiced without many of these details. Additionally, some well-known structures or functions may not be shown or described in detail, so as to avoid unnecessarily obscuring the relevant description of the various implementations. The terminology used in the description presented below is intended to be interpreted in its broadest reasonable manner, even though it is being used in conjunction with a detailed description of certain specific implementations of the disclosed system and methods. Some frequently used terms are now described.
- As used herein, a merchant may include any business engaged in the offering of goods or services for acquisition by buyers. Actions attributed to a merchant may include actions performed by owners, merchants, or other agents of the merchant and thus no distinction is made herein unless specifically discussed. In addition, as used herein, a buyer or customer or user may include any entity that acquires goods or services from a merchant, such as by purchasing, renting, leasing, borrowing, licensing, or the like. Hereinafter, goods and/or services offered by merchants may be referred to as items. Thus, a merchant and a buyer may interact with each other to conduct a transaction in which the buyer acquires an item from a merchant, and in return, the buyer provides payment to the merchant, for example through a payment instrument issued by an issuing entity.
- As used herein, a ‘payment transaction’ or simply ‘transaction’ may include a financial transaction for the acquisition of goods and/or services that is conducted between a buyer and a merchant. For example, when paying for a transaction, the buyer can provide the amount that is due to the merchant using a payment instrument or a payment proxy for the payment instrument. In other cases, the payment transaction includes transfer of money from one party to another for any number of reasons. Thus, while the description refers to as buyer and merchant as parties to the payment transaction, it will be understood that the parties can be a sender and a recipient, a land lord and a renter, a bank and a bank customer, a first friend and a second friend, and so on.
- The term ‘payment card,’ ‘payment instrument,’ or ‘payment object’ refers to a payment mechanism that includes a conventional debit card, a conventional credit card, a prepaid gift card, or the like, a smartcard that has an embedded integrate circuit chip (e.g., Europay-MasterCard-visa (EMV) card), a proxy card, or any card that functions as a combination of any of these mechanisms. The term ‘proxy card’ as used herein refers to a card that may or may not bear a card number or an account number that appears to be that of a real credit or debit card account (i.e., it is in the correct format), but where that card/account number is actually only a proxy for the buyer's real card/account number. Additionally, the payment card used in the example above is a specific type of a financial instrument. Other types of financial instruments, other than the payment card, can be used to initiate the transfer of funds. A financial instrument can be a software instrument or virtual instrument, such as a virtual wallet. Other examples of payment card may also include a prepaid card, a gift card, a rewards card, a loyalty points' card, a frequent flyer miles card, a check, cash, or any other kind of payment instrument that holds financial value or provides a promise to pay at a later time. Payment card may also include a payment object, such as an electronic device configured to initiate contactless payment transactions, e.g., a key fob, a mobile device (such as a mobile device having an NFC tag). And finally, the payment object can also be a payment proxy having a syntax of a monetary indicator followed by a string of alphanumeric characters or in general, any identifier that is representative of the buyer or merchant's financial account. The payment proxy can be used in the context of and within a webpage as part of the web address, a social networking handle or username, a forum, a messaging application, and so on.
- The term ‘biometric payment instrument’ is a type of payment object or financial instrument that is biometrically identifiable and initialized by a biometric characteristic, such as a person's finger (e.g., for fingerprint recognition), face, iris or retina, heartbeat, voice, etc. Accordingly, the CVM can include a PIN, signature, or a biometric input, such as a fingerprint or iris scan.
- The payment object reader may be a magnetic stripe card reader, optical scanner, smartcard (card with an embedded IC chip) reader (e.g., an EMV-compliant card reader or NFC enabled reader), radio frequency identification (RFID) reader, or the like, configured to detect and obtain data off any payment object. Accordingly, the payment object reader may include hardware implementation, such as slots, magnetic tracks, and rails with one or more sensors or electrical contacts to facilitate detection and acceptance of a payment object. Additionally or optionally, the payment object reader may also include a biometric sensor to receive and process biometric characteristics and process them as payment instruments, given that such biometric characteristics are registered with the payment processing system and connected to a financial account.
- In one example, the POS terminal can be a hand-held device such as a mobile phone, laptop, tablet computer, and the like, associated with a merchant. In another example, the POS terminal is a mobile device that is wearable or otherwise connected to or associated with the buyer or merchant, for example, the computing device may be an Apple® watch or a Fitbit®.
- As used herein, the term ‘payment application’ or ‘financial application’ includes any application configured for management of payment transactions connected to a payment instrument or multiple payment instruments issued by a single entity or multiple entities to a user. The financial application can also provide the user with financial information, option to open an account with the issuing entity, dispense physical cash, transfer cash electronically, pay bills, apply for loans, make deposits, obtain assistance from the agent, monitor spending habits, get financial advice, set spending goals, manage transaction and spending limits, and the like. The term “payment application” as used here, can also refer to or include any messaging application that enables communication between users (e.g., sender and recipient of a message) over a wired or wireless communications network, or devices, for example between an issuing entity and the user's communication device. A payment processing system that delivers a communication service to users, e.g., chat capability, can employ the messaging application. The messaging application can include, for example, a text messaging application for communication between phones (e.g., conventional mobile telephones or smartphones), or a cross-platform instant messaging application for smartphones and phones that use the Internet for communication. The message can also be to confirm the location of the user or obtain an approval to extract location of the user. Although this specification may employ text messages as an example, it is to be understood that the technology may employ any of these types of messages. Upon receiving an indication to send (e.g., after detecting that the user has clicked “Send”), the messaging application transmits a message, e.g., the text message to a messaging application computer system (“messaging application system”).
- As used here, the term “pairing” or “associating” refers to a process in which the POS terminal and the payment object reader establish a communication channel with each other using wireless communication protocols, for example, Bluetooth®, Bluetooth Low Energy®, Wi-Fi®, etc. The POS terminal and the payment object reader each includes a transceiver capable of transmitting data between them once “paired.” The pairing technology described herein can pair a payment object reader to the POS terminal in both real-time and offline modes. Furthermore, even though Bluetooth or Bluetooth Low Energy has been used to describe certain embodiments, other wireless protocols, such as NFC, Wi-Fi, etc., can also be used.
- The term “communication network” may be any type of network known in the art, such as a local area network or a wide area network, such as the Internet, and may include a wireless network, such as a cellular network, a cloud network, a local wireless network, such as Wi-Fi and/or close-range wireless communications, such as Bluetooth and Bluetooth low energy, near field communications (NFC), a wired network, or any other such network, or any combination thereof. Accordingly, the network may include both wired and/or wireless communication technologies, including Bluetooth, Bluetooth low energy, Wi-Fi and cellular communication technologies like worldwide interoperability for microwave access (Wi-MAX), 3G, 4G, CDMA, digital subscriber line (DSL), etc., cloud computing technologies, as well as wired or fiber optic technologies. Additionally or alternatively, the communication network may be a mesh network. For example, in a wireless local area network (WLAN), network devices may be configured to receive and forward communications, which are ultimately destined for a different device. These types of networks are generically referred to as “mesh” networks, where network nodes may form a “mesh” of paths for which communications may travel to reach their destination. Wireless networks may use beacon transmissions to advertise the network's existence, as well as provide information about the network and capabilities associated with the network. Different kinds of beaconing mechanisms may be used, for example, one for infrastructure mode networks (also called basic service set (BSS) networks) and one for ad-hoc mode networks (also called independent basic service set (IBSS) networks). In infrastructure networks, access points (APs) are the entities responsible for generating beacons whereas in ad hoc networks, all network nodes (including user stations) participate in the generation of beacons. The ad hoc network beacons (referred to as IBSS beacons) are used to advertise the network (which consists of all the nodes) as a whole while the infrastructure network beacons (referred to as BSS beacons) are generated by an AP and meant to advertise the existence of only that individual AP. Components used for such communications can depend at least in part upon the type of network, the environment selected, or both. Protocols for communicating over such networks are well known and are not discussed herein in detail.
- The term “swipe” here refers to any manner of triggering a payment object reader to read data from a payment object, such as by dipping into, tapping, hovering, bringing in close contact or passing the payment object into or through a payment object reader.
- Reference to an “embodiment” in this document does not limit the described elements to a single embodiment; all described elements may be combined in any embodiment in any number of ways. Furthermore, for the purposes of interpreting this specification, the use of “or” herein means “and/or” unless stated otherwise. The use of “a” or “an” herein means “one or more” unless stated otherwise. The use of “comprise,” “comprises,” “comprising,” “include,” “includes,” and “including” are interchangeable and not intended to be limiting. Also, unless otherwise stated, the use of the terms such as “first,” “second,” “third,” “upper,” “lower,” and the like do not denote any spatial, sequential, or hierarchical order or importance, but are used to distinguish one element from another. It is to be appreciated that the use of the terms “and/or” and “at least one of”, for example, in the cases of “A and/or B” and “at least one of A and B”, is intended to encompass the selection of the first listed option (A) only, or the selection of the second listed option (B) only, or the selection of both options (A and B). As a further example, in the cases of “A, B, and/or C” and “at least one of A, B, and C”, such phrasing is intended to encompass the selection of the first listed option (A) only, or the selection of the second listed option (B) only, or the selection of the third listed option (C) only, or the selection of the first and the second listed options (A and B) only, or the selection of the first and third listed options (A and C) only, or the selection of the second and third listed options (B and C) only, or the selection of all three options (A and B and C). This may be extended, as readily apparent by one of ordinary skill in this and related arts, for as many items listed.
- It will also be appreciated by those skilled in the art that the words during, while, and when as used herein are not exact terms that mean an action takes place instantly upon an initiating action but that there may be some small but reasonable delay, such as a propagation delay, between the initial action and the reaction that is initiated by the initial action. As used in this specification and any claims of this application, the terms “computer”, “server”, “processor”, and “memory” all refer to electronic or other technological devices. These terms exclude people or groups of people. For the purposes of the specification, the terms display or displaying means displaying on an electronic device. As used in this specification and any claims of this application, the terms “computer readable medium” and “computer readable media” are entirely restricted to non-transitory tangible, physical objects that store information in a form that is readable by a computer. These terms exclude any transitory wireless signals, wired download signals, and any other ephemeral signals. The computing system can include clients and servers. A client and server are generally remote from each other and typically interact through a communication network. The relationship of client and server arises by virtue of computer programs running on the respective computers and having a client-server relationship to each other. In some embodiments, a server transmits data (e.g., an HTML page) to a client device (e.g., for purposes of displaying data to and receiving user input from a user interacting with the client device). Data generated at the client device (e.g., a result of the user interaction) can be received from the client device at the server.
- It should also be appreciated by those skilled in the art that any block diagrams, steps, or sub-processes herein represent conceptual views of illustrative systems embodying the principles of the present subject matter. Similarly, it will be appreciated that any flow charts, flow diagrams, state transition diagrams, pseudo code, and the like represent various processes which may be substantially represented in computer readable medium and so executed by a computer or processor, whether or not such computer or processor is explicitly shown. The order in which the methods are described are not intended to be construed as a limitation, and any number of the described method blocks can be deleted, moved, added, subdivided, combined, and/or modified in any order to implement the methods, or an alternative combination or sub-combinations. Also, while steps, sub-processes or blocks are at times shown as being performed in series, some steps, sub-processes or blocks can instead be performed in parallel, or can be performed at different times as will be recognized by a person of ordinary skill in the art. Further any specific numbers noted herein are only examples; alternative implementations can employ differing values or ranges. Furthermore, the methods can be implemented in any suitable hardware, software, firmware, or combination thereof.
- While certain devices, e.g., the payment object readers and POS terminals are shown as including distinct components, this is merely for ease of illustration and not intended as limiting. In various implementations, the payment object readers and POS terminals may be identical, similar or distinct. Moreover, the components shown and described for the payment object readers and POS terminals may be implemented as more components or as fewer components and functions described for the components may be redistributed depending on the details of the implementation. Additionally, in some implementation, there may be several, hundreds, thousands, hundreds of thousands, or more, of the payment object readers and the POS terminals. Further, in some implementations, configuration, structure, and operational characteristics of the payment object readers and/or POS terminals may vary from device to device. In general, payment object readers and the POS terminals can each be any appropriate device operable to send and receive data, requests, messages, electronic messages, text messages, alerts, notifications, pop-up messages, push notifications, or other types of information over the one or more networks or directly to each other.
- The technology introduced here can be embodied as special-purpose hardware (e.g., circuitry), as programmable circuitry appropriately programmed with software and/or firmware, or as a combination of special-purpose and programmable circuitry. Hence, embodiments may include a machine-readable medium having stored thereon instructions that may be used to cause one or more processors to perform the methods, variations of the methods, and other operations described here. The machine-readable medium may include, but is not limited to, floppy diskettes, optical discs, compact disc read-only memories (CD-ROMs), magneto-optical discs, read-only memories (ROMs), random access memories (RAMs), erasable programmable read-only memories (EPROMs), electrically erasable programmable read-only memories (EEPROMs), application-specific integrated circuits (ASICs), magnetic or optical cards, flash memory, or other type of media/machine-readable medium suitable for storing electronic instructions. Various embodiments will now be described in further detail with the help of one or more figures.
- The preceding summary is provided for the purposes of summarizing some exemplary embodiments to provide a basic understanding of aspects of the subject matter described herein. Accordingly, the above-described features are merely examples and should not be construed as limiting in any way. Other features, aspects, and advantages of the subject matter described herein will become apparent from the following description of Figures and Claims.
- Turning now to the figures,
FIG. 1 illustrates anexample environment 100 that includes amerchant 102 operating a point-of-sale (POS)device 104 to engage in various transactions with customers 106-1, 106-2, . . . , 106-N (collectively referred to as customers 106) equipped with communication devices 107-1, 107-2, . . . 107-N (collectively referred to as communication devices 107) and payment instruments 116-1, 116-2, . . . 116-N (collectively referred to as payment instruments 116). - As used herein, a
merchant 102 may include any business engaged in the offering of goods or services for acquisition by customers. Actions attributed to amerchant 102 may include actions performed by owners, merchants, or other agents of themerchant 102 and thus no distinction is made herein unless specifically discussed. In addition, as used herein, acustomer 106 may include any entity that acquires goods or services from amerchant 102, such as by purchasing, renting, leasing, borrowing, licensing, or the like. Hereinafter, goods and/or services offered bymerchants 102 may be referred to as items. Thus, amerchant 102 and acustomer 106 may interact with each other to conduct a transaction in which thecustomer 106 acquires an item from amerchant 102, and in return, thecustomer 106 provides payment to themerchant 102 through apayment instrument 116. - The
customers 106 may be equipped withpayment instruments 116, such as credit card, debit card, gift card, near-field communication (NFC) based payment instrument, and the like, andcommunication devices 107, such as smart phones, tablet computers, laptops, mobile wearable devices like Apple® watch or a Fitbit®, or other mobile data processing apparatus, that may have executing or installed thereon one or more web or mobile applications to support various functionalities. Thecommunication devices 107 may be configured to respond to requests from other devices, such as thePOS device 104 to provide its exact location, approximate location, or location relative to another device. In some implementations, thecommunication device 107 may allow other devices to check whether or not thedevice 107 is within a marked geo-fence. ThePOS device 104 or thecommunication device 107 may hereinafter also be referred to as the payment device. - The
communication device 107 may also have executing or installed thereonpayment applications 111. Thepayment application 111 can include an interface for the user to select thepayment instrument 116 or otherwise track transactions made through thepayment instrument 116. In one implementation,multiple payment instruments 116, issued by the same or different issuing entity, can be accessed by asingle payment application 111. In some implementations, thepayment application 111 can be an instance of the payment instrument, for example a virtual wallet. When the payment application, for example a web or mobile application, is installed on thedevice 107, for example by accessing a download feature followed by an optional registration process, thepayment application 111 may be associated with thepayment instrument 116, the device or its identifier, and the entity that has issued the payment instrument, for example,issuer 128, through the process of registration. The registration process may also trigger the user to allow theissuer 128 to obtain and store the device information (e.g., device identifier), environment information (e.g., location of the point of transaction, location of device, or location of the payment instrument, etc.), or the user information (location of the user, user identifier, etc.) indicative of the device. - Also, in some cases, the
issuer 128 may also store information of the issuer-device relationship in the device. Such information may be correlated with the user data and saved in theissuer 128. The processor of the issuing entity, herein referred to asissuer 128, may include a rule engine (not shown) to map received data from the user or user device with a stored value of the user and device association, for example, to confirm whether a prior relationship exists and based on that, further determine a level of risk associated with the transaction. If the level of risk is lower than a predetermined threshold, for example, as set by the card processing network or the issuer, theissuer 128 can remove the requirement for a CVM as dictated by the card processing network or even change the CVM. Alternatively, if the level of risk is higher or equal to the predetermined threshold, theissuer 128 can again either apply a stringent or multi-level CVM or even decline the transaction as being too risky. While some embodiments describe confirmation of a user device to be present at the time of payment transaction, this is no way should limit the present subject matter. In some implementations, for example, the issuer checks whether a payment application or an identifier is trackable irrespective of where the device is present at the time of payment transaction. For example, the issuer sends a query to the device on record to determine whether it is a legitimate device and subsequently configures the CVM or requirement for CVM. Approval via geo-location (and other forms of location) can be so seamless the buyer does not necessarily need have their phone in hand. Without knowing, the users can have an extremely secure transaction. - As used herein, a transaction may include a financial transaction for the acquisition of goods and/or services that is conducted between the customer and the merchant. For example, when paying for a transaction, the customer can provide the amount that is due to the merchant using a payment instrument 116 (e.g., a debit card, a credit card, a stored-value or gift card, a check, through an electronic payment application on a device carried by the customer, or the like). The
merchant 102 can interact with thePOS device 104 to process the transaction, such as by inputting (e.g., manually, via a magnetic card reader or an RFID reader, etc.) an identifier associated with thepayment instrument 116. For example, apayment instrument 116 of one of thecustomers 106 may include one or more magnetic strips for providing card and customer information when swiped in a card reader. In other examples, other types of payment cards may be used, such as smart cards having a built-in memory chip that is read by thedevice 104 when the card is “dipped” into the reader, or tapped onto a surface or in proximity to the surface of the reader having a radiofrequency identification tag, or so forth. Accordingly, the attribute of the payment instrument can be an identifier that indicates whether the instrument has a magnetic strip or a chip and information stored thereon. The attribute can also be a cost of the payment transaction for which the payment instrument is being authorized, a hardware capability of the POS device, that is whether the POS device is capable of accepting EMV cards, magnetic cards, NFC based instruments, and so on, the location of the payment transaction, and the identity of the entity issuing the payment instrument. - The
POS device 104 may comprise any sort of mobile or non-mobile device that includes an instance of a merchant application that executes on the respective device (as illustrated inFIG. 4 ). The merchant application may provide POS functionality to thePOS device 104 to enable the merchant 102 (e.g., an owner, merchants, etc.) to accept payments from thecustomers 106. In some types of businesses, thePOS device 104 may correspond to a store or other place of business of the merchant, and thus, may be a fixed location that typically does not change on a day-to-day basis. In other types of businesses, however, thePOS device 104 may change from time to time, such as in the case that the merchant operates a food truck, is a street vendor, a cab driver, etc., or has an otherwise mobile business, e.g., in the case of merchants who sell items at buyer's homes, places of business, and so forth. - In some implementations, the
POS device 104 may include sensors (not shown), such as accelerometers, microphones, GPS/location sensors, light detection sensors, proximity sensors, gravity detection sensors, magnetic field detection sensors, electrical field detection sensors, vibration sensors, pressure sensors, humidity sensors, and the like, to measure a physical quantity and convert it into a signal that may be used to detect exact, approximate, or relative location of devices from thedevice 104. The location sensors may be internal and/or external to thedevice 104. Exemplary location sensors include, but are not limited to, a cellular radio or modem, a GPS receiver, a Wi-Fi adapter or modem, a BLUETOOTH brand communication service element, a three-dimensional motion sensor, or the like. In one implementation, thedevice 104 can also set up a geo-fence and detects one or more devices that enter and/or exit the geo-fence. As such, the location of thedevice 104 may represent a status (e.g., inside and/or outside the geo-fence) or an actual determination location (e.g., coordinates). Thedevice 104 may perform particular actions based on the determined location of the devices relative to the geo-fence. In some implementations, thedevice 104 detects the location and saves the information both on thePOS device 104 and theissuer 128. ThePOS device 104 is also configured to receive a payment instrument or multiple payment instruments to satisfy at least a portion of the cost of the payment transaction. For example, a single payment card or several cards or other payment objects may be used in a single payment transaction. The cost may be split between several cards based on incentives associated with the cards or availability of funds on accounts connected to the cards. - During the transaction, the
POS device 104 can obtain payment transaction information describing the transaction, such as the attribute or identifier of the payment instrument, identity of the customer based on identifier of the payment instrument, identity of the customer based on information in track or records of the payment instrument, an amount of payment received from the customer, the item(s) acquired by the customer, a time, place and date of the transaction, a card network associated with the payment instrument, an issuing bank of the payment instrument, and so forth. - In one implementation, the
POS device 104 can also determine information related to devices surrounding or in proximity to thePOS device 104. For example, the sensors, such as location sensors, global positioning systems (GPS) units, Wi-Fi Positioning Systems (WPS), etc., of thePOS device 104 can detect surrounding or proximate devices based on location detection protocols, including triangulation triangulation, trilateration, multi-laterations, geo-fence, global or local positioning systems, and by leveraging device profile obtained through the sensors. According to related aspects of the present subject matter, triangulation of data may be by “direct” triangulation, e.g., as where the identity of the buyer device is determined from the point of intersection (or the point of least squares fit) of multiple device profiles. Alternatively, or in addition, triangulation may be “indirect,” as where the identity of the buyer device is determined not only from the device profiles, but also from relative profiles originating from other devices in the proximity or even historical purchases. The present subject matter also includes implementations where locations are reported by other buyer devices in a “crowdsourced” manner. ThePOS device 104 can send the transaction information and location information to apayment service 108 over anetwork 110, either substantially or contemporaneous to the conducting of the transaction (in the case of online transactions) or later when thedevice 104 is in the online mode (in the case offline transactions). ThePOS device 104 is configured to work in both offline and online modes. - In an offline mode, the
POS device 104 may store one or more characteristics associated with the transaction (i.e., the transaction information), such as a cost of the transaction, a time of day at which the transaction occurred, a day of the week at which the transaction occurred, a location at which the transaction took place, an item that the customer obtained, and a payment instrument used in the transaction. After conducting an offline transaction with one of thecustomers 106, thePOS device 104 may provide the stored information to thepayment service 108 over thenetwork 110. Thenetwork 110 may represent any one or more wired or wireless networks, such as a Wi-Fi network, a cellular network, or the like. In an online transaction, the POS device may send this information to thepayment service 108 over thenetwork 110 substantially contemporaneously with the transaction with the customer. Thepayment service 108 may include aprocessor 118, amemory 120 having components, such as apayment processing component 122 and arule engine 123 described later. - Generally, the CVM is static and fixed, i.e., does not vary with the user or payment instrument. By static, the CVM does not change based on the nature of transaction or the type of payment instrument. By fixed, the card network stores the CVM based on the type of card and
issuer 128. The CVM can further include a specific order regardless of risk or other factors. In some instances, thePOS device 104 is configured to implement a cardholder verification method (CVM) that specifies verification information (or a modified order of verification information) to request from customers and the circumstances in which to request this information, based on the attribute of the payment transaction and a risk score computed based on the obtained attribute. - For instance, the CVM may indicate that transactions for amounts over a threshold amount (e.g., $50) will only be authorized when verification information—in addition to the information stored by a customer's payment instrument—is provided by the customer. This information may include a personal identification number (PIN) associated with the payment instrument, a password with the payment instrument, a signature of the cardholder, or the like. For example, the CVM is saved against each payment instrument at the
card processing network 124. For example, at 109, thecard processing network 124 includes an association of the payment instrument (PI)116(1) with a CVM-1, payment instrument 116(n) with CVM-n, and so on. - However, in certain implementations, a
processor 104 associated with an issuer, may have additional insight into the payment instrument, which when compared to the data reported by thePOS device 104 at the time of payment transaction can indicate a different CVM or even remove the requirement for CVM, if the risk associated with the transaction is significantly low. Furthermore,POS device 104 may be configured (e.g., via the merchant application executed on the device 104) to generate instructions that indicate a modification of an order of the CVM based on payment device or payment instrument attributes, such as a card network associated with a payment instrument/device, a brand of the payment instrument/device, an issuing bank of the payment instrument, whether the payment instrument includes a magnetic strip or a memory chip, or the like, or a new CVM altogether. For instance,FIG. 1 illustrates, at 112, that the processor of the issuing entity, also referred to asissuer 128, is configured to implement a first CVM 114(1) when thePOS device 104 receives a first payment instrument 116(1), and a second CVM 114(2) when thePOS device 104 receives a second payment instrument 116(2). Alternatively, in another implementation, the issuingentity 128 is configured to implement a first CVM 114(1) when thePOS device 104 receives a first payment instrument 116(1) in the absence of a communication device 107-1, and a second CVM 114(2) when thePOS device 104 receives a first payment instrument 116(1) in the presence of a communication device 107-1 executing an instance of a payment application irrespective of theCVM 126 imposed by thecard network processor 124. In the shown example, the payment instrument 116(1) is tied to device 107-1 and such a relationship may have been established when anapplication 111 associated with the issuingentity 128 was installed by the customer. Similarly, the payment instrument 116(2) is associated with device 107-2 and such a relationship is also established at the time of registration of anapplication 111 or another device registration application or the like. Not all devices may be registered and as such the CVM recommended by thecard network processor 124 is applied at thePOS device 104. For devices registered with theissuer 128, the table ordatabase 112 is used for mapping the payment instrument with device identifier, collected, for example at the time of registration, and a device-specific CVM. Theissuer 128 may also compute a risk score and accordingly, select CVM best suited to the risk levels of the payment transaction. - In some instances, the first payment instrument 116(1) represents a payment instrument associated with a first card network (e.g., Visa®, MasterCard®, American Express®, Diner's Club®, Discover®, etc.), while the payment instrument 116(2) represents a payment instrument associated with a different card network. In the example, the first order 114(1) specifies that the
POS device 104 is first to request a PIN from a cardholder (or “customer”) first, and a signature second, and so forth. The second order 114(2), meanwhile, instructs thePOS device 104 requesting a signature first. After requesting and receiving the verification information (e.g., PIN, signatures, etc.), thePOS device 104 may send this information to the payment service, which in turn may attempt to authorize the transaction and send a result back to the POS device. - In some instances, the example shown at 112 represents a scenario where a card network associated with the payment instrument 114(2) does not accept PINs received from the
mobile POS device 104 and, therefore, the POS device dynamically modifies the first, default order 114(1) of the CVM in response to identifying the card network associated with the second payment instrument 116(2). Further, whileFIG. 1 illustrates two different payment instruments and corresponding CVM orders, it is to be appreciated that any other number of payment instruments and corresponding CVM orders may be utilized. - As illustrated, the
payment service 108 may include one ormore processors 118 andmemory 120, which may store apayment processing component 122. Thepayment processing component 122 may function to receive the information regarding a transaction from thePOS device 104 and attempt to authorize the payment instrument used to conduct the transaction. Thepayment processing component 122 may then send an indication of whether the payment instrument has been approved or declined back to thePOS device 104. Thepayment processing component 122 is also configured to process transactions, collect information related to the transaction, parse the information, and encrypt relevant information for theissuing entity 128. Thepayment processing component 122 also stores the transaction information for post-transaction activities, such as pattern detection and trend analysis on transactions corresponding to the user, merchant or their locations. Therule engine 123 is configured to create various kinds of rules for a user, device, merchant, location or a particular transaction. For example, the rules can provide access to a variety of operating standards that may be applied to any given transaction between a merchant and a user, such as transaction fee, tax, etc., based on transaction or nature of transaction. Therules engine 123 may also apply a risk analysis, for example in real-time, based on anomalies in behavior of the customer or the device associated with the customer. In some implementations, therule engine 123 is configured to detect, based on the information from thecommunication device 107 and/or identifiers of the payment device or instrument, whether there is a pre-existing relationship between the communication device and the payment instrument or between the communication device and theissuer 128. Even though therule engine 123 is shown to be in thepayment service 108, therule engine 123 can also be present in theissuer 128. Therule engine 123 can determine a risk level or score associated with the payment transaction based on the pre-existing relationship, where the relationship is established at a time of registration of the payment instrument or the communication device with the payment service or issuer through, for example a payment application. Therule engine 123 can also query a device registered with the payment instrument to obtain its location, for example, or other such information to determine whether the devices in proximity to the POS device or in possession of the user compare to the location of the registered device. If the location of the device present at the location of the transaction positively matches, therule engine 123 determines that the relationship is pre-existing. - Operationally, when a customer and a merchant enter into an electronic payment transaction, the transaction is processed by electronically transferring funds from a financial account associated with the customer to a financial account associated with the merchant. As disclosed in the present subject matter, the
POS system 104, based on the transaction information, selects acard processing network 124. Thecard processing network 124 indicates a CVM associated with the payment instrument. In one example scenario, thepayment service 108, for example through therule engine 123, determines whether to apply new CVM, as generated by theissuer 128, based on a level or risk associated with the transaction. In another example scenario, thepayment server 108 forwards the payment information, including the customer's location information, customer's device information, card type, etc., to theissuer 128. Theissuer 128 based on a risk analysis or mapping of the device information to known devices, generates a new CVM, maintains the CVM dictated by the card processing network, or modifies an order of CVM. Theissuer 128 may have previously collected information from customer devices at the time of registration of the card, through a customer such, thepayment processing component 122 may communicate with one or more computing devices of a card network (or “card payment network”), e.g., MasterCard®, VISA®, over thenetwork 110 to conduct financial transactions electronically. Thecard processing network 124 may also Thepayment processing component 122 can also communicate with one or more computing devices of one or more banks over thenetwork 110. For example, thepayment processing component 122 may communicate with an acquiring bank, and/or an issuing bank, and/or a bank maintaining customer accounts for electronic payments. - An acquiring bank (not shown) may be a registered member of a card association (e.g., Visa®, MasterCard®), and may be part of a card payment network. An issuing bank associated with the
processor 128 may issue credit cards to buyers, and may pay acquiring banks for purchases made by cardholders to which the issuing bank has issued a payment card. Accordingly, in some examples, the computing device(s) of an acquiring bank may be included in thecard payment network 124 and may communicate with the computing devices of a card-issuing bank to obtain payment. Further, in some examples, the customer may use a debit card instead of a credit card, in which case, the bank computing device(s) of a bank corresponding to the debit card may receive communications regarding a transaction in which the customer is participating. Additionally, there may be computing devices of other financial institutions involved in some types of transactions or in alternative system architectures, and thus, the foregoing are merely several examples for discussion purposes. -
FIGS. 2A and 2B illustrate a flow diagram of aprocess 200 for determining whether to request verification information as specified by a default order of the CVM or whether to reconfigure CVM and request verification information in accordance with the reconfigured CVM. Theprocess 200 and other processes described herein are illustrated as collections of blocks in logical flow diagrams, which represent a sequence of operations, some or all of which can be implemented in hardware, software or a combination thereof. In the context of software, the blocks may represent computer-executable instructions stored on one or more computer-readable media that, when executed by one or more processors, program the processors to perform the recited operations. Generally, computer-executable instructions include routines, programs, objects, components, data structures and the like that perform particular functions or implement particular data types. The order in which the blocks are described should not be construed as a limitation. Any number of the described blocks can be combined in any order and/or in parallel to implement the process, or alternative processes, and not all of the blocks need be executed. For discussion purposes, the processes are described with reference to the environments, architectures and systems described in the examples herein, although the processes may be implemented in a wide variety of other environments, architectures and systems. Theprocess 200, and other processes described herein, may be performed by a POS device, a processor of the issuing entity, by a remote payment service (e.g., payment service 108), by another entity, or by a combination thereof. - An
operation 202 represents an example customer 106(1) providing apayment instrument 116 to merchant operating aPOS device 104. For instance, the customer 106(1) may provide this payment instrument to the merchant in exchange for an item (e.g., a good or service). This payment instrument may comprise a credit card, a debit card, a bank card, a gift card, a check, a virtual payment instrument, or any other type of payment instrument. Assume that the customer 106(1) is equipped with acommunication device 107 having installed thereon apayment application 111. - At an
operation 204, thePOS device 104 receives the payment instrument and its underlying payment information, which may include the merchant swiping a magnetic strip of the payment instrument, dipping the payment instrument and its chip into thedevice 104, manually entering an identifier of the payment instrument, or the like. Additionally, the payment information may include card data that identifies the customer and the merchant. The payment information, in one implementation, also includes device identifier (e.g., device number, operating system, distance of the device from the POS terminal, etc.). In one example, the sensors in the POS terminal determines a geo-fence within which it then detects the proximate devices and optionally, arranges them in order of their distance from itself. While the location is one indicator of relevance of a device to the customer or transaction in process; other indicators can be used either in combination with the location information or alone. - At an
operation 206, in this example thePOS device 104 determines a card network associated with the payment instrument, from the information provided to thePOS device 104 by the payment instrument. For instance, thePOS device 104 may determine this automatically based on the merchant swiping the card, dipping the card, manually entering the identifier, or the like. In other instances, the merchant herself may manually specify the card network (or the brand) associated with the payment instrument, such as MasterCard®, Visa®, or the like. The card network may have associated with all their cards, a generic CVM, thus enforcing each customer to adhere to the same CVM irrespective of whether or not the customer has proven to be less or more risky. To this end, in one implementation, the payment information is sent to the processor of the issuing entity atoperation 208. The processor of theissuing entity 128 determines whether or not to institute a CVM different from the CVM specified by the card network. The issuing entity can make this determination based on predictive and normative behavioral analysis associated with the nature of purchase or transaction. - Alternatively or additionally, based on the risk level, the issuing entity may also determine whether to implement the default order of the CVM or whether to modify the order based on the card network.
- At an
operation 210, the issuing entity, based on the payment information, determines whether the device of the user has installed a mobile payment application or an application associated with the issuing entity. For this, the issuing entity detects that by comparing the device identifier from the payment information with a list of device identifiers obtained at the time of registration of devices or applications with the issuing entity. If the issuing entity detects a match, the issuing entity may lower or higher the risk associated with the payment transaction based on previously collected transactional data from the registered devices. Accordingly, the issuing entity can modify the CVM in accordance with the risk levels. However, if the issuing entity does not detect a connection between an existing device identifier and the device identifier of the payment information corresponding to the present transaction, the issuing entity may keep the CVM indicated by the card network. - In one implementation, the issuing entity, in response to an association between the application of the issuing entity and the payment transaction, reconfigures the order of the CVM based on a level of risk. For instance, the issuing entity may determine, from the merchant application stored on the device, whether the CVM should be modified based on which card network was determined.
- At an
operation 211, the issuing entity sends the applicable CVM to thePOS device 104. As described before, the CVM is configured based on the risk level associated with the transaction. In one implementation, the risk level is inherently based on the association of the user device with the issuing entity. In another implementation, the CVM can be configured based on a determination that the location of the user's device is different from the location of the payment transaction or the payment instrument. - In an
operation 212, thePOS device 104, based on the CVM indicated by the issuing entity or the card processing network, requests verification information from the customer 106(1) according to the CVM. For instance, if the CVM indicates a specific order from the issuing entity such that the POS device is it to first request a PIN, then a signature, the CVM is executed. Or, if the CVM indicates a specific order from the issuing entity that thePOS device 104 is to request a signature, then thePOS device 104 requests a signature of the customer 106(1) (e.g., on a touchpad of the POS device 104). Optionally, if the issuing entity is unavailable to establish a connection between the issuing entity and the user or user's device, thePOS device 104 can implement the CVM recommended by the card processing network. Anoperation 214 represents the customer 106(1) receiving the request for verification information. -
FIG. 2B continues the illustration of theprocess 200. At anoperation 215, the customer provides the requested verification information to thePOS device 104, such as by entering her PIN, providing a signature, or the like. The requested verification information is configured according to the relationship between the customer or customer device and the issuing entity. Anoperation 216 represents thePOS device 104 receiving the verification information. The verification information may also indicate a verification signature, where the verification signature indicates the verification method requested by thePOS device 104. Also, the verification signature may indicate that the requested verification information was pushed by the issuing entity in response to an association between the issuing entity and the customer. Next, anoperation 218 represents thePOS device 104 determining whether or not the payment instrument has been authorized for the current transaction with the customer 106(1), based in part on the provided verification information. For instance, thePOS device 104 may provide information regarding the payment instrument (e.g., identifier, expiration date, CVC code, etc.) along with the provided verification information (e.g., PIN, signature, etc.) to thepayment service 108, which in turn attempts to authorize the payment instrument for the transaction. - If the
POS device 104 receives an indication that the payment instrument has been authorized, then at 220 the merchant may provide the item to the customer in some instances. If the transaction fails, however, then anoperation 222 represents thePOS device 104 requesting verification information according to the CVM order until the transaction is authorized or until each piece of verification information has been requested without an authorization. For instance, if the transaction fails after the customer 106(1) provides a PIN, then the POS device may move to the second verification information listed on the CVM order, such as a signature, and may request a signature from the customer 106(1). Of course, in some instances the POS device may refrain from requesting additional verification information if a first piece fails (or if the transaction fails a threshold number of times). Further, thePOS device 104 may request a certain piece of verification information multiple times (e.g., may request that the user again try to enter the correct PIN in the event that the first attempt fails). -
FIG. 3 illustrates a flow diagram of a 300 process for determining whether to modify a CVM order based on an attribute of a received payment instrument, and requesting first or second verification information depending upon whether or not the order has been modified. - At 302, the
process 300 receives a request to authorize a payment instrument at a POS device, the POS device implementing a CVM that specifies of order of verification information to request to a user associated with the payment instrument. At 304, theprocess 300 determines an attribute associated with the payment instrument. This attribute may include a card network of the payment instrument, a brand of the payment instrument, an issuing or acquiring bank of the payment instrument, and/or the like. - At 306, the
process 300 may determine whether to implement the default CVM specified by the card processing network, or whether to modify the CVM, with this determination being based at least in part on the attribute of the payment instrument. In some instances, this determination is also based at least in part on a cost of the transaction, hardware or other capabilities of the POS device, and the like. For instance, if the POS device includes a touch screen to receive PINs rather than a dedicated hardware device for receiving these PINs, then the POS device may modify the order such that that a signature is listed first within the verification-information order. In another instance, the determination is based on the issuing entity confirming that the device is recognized by the issuing entity, as part of a previous registration. For example, the issuing entity may determine the risk level associated with the transaction based on whether or not the issuing entity recognizes the device. Accordingly, the issuing entity may modify the CVM to be more stringent than the one suggested by the card processing network. In some implementations, theprocess 300 includes combining the verification information as per the card processing network and the issuing entity in response to risk associated with the transaction and requesting the - At 308, the
process 300 requests first verification information in response to determining to implement the default CVM. That is, thePOS device 104 may request the first listed piece of verification information, such as a PIN. At 310, meanwhile, theprocess 300 requests second, different verification information in response to determining to a new CVM or a new order of CVM. This second verification information may comprise a signature rather than a PIN in some instances. -
FIG. 4 illustrates select example components of anexample POS device 400 according to some implementations. ThePOS device 400 may be any suitable type of computing device, e.g., mobile, semi-mobile, semi-stationary, or stationary. Some examples of thePOS device 400 may include tablet computing devices; smart phones and mobile communication devices; laptops, netbooks and other portable computers or semi-portable computers; desktop computing devices, terminal computing devices and other semi-stationary or stationary computing devices; dedicated register devices; wearable computing devices, or other body-mounted computing devices; or other computing devices capable of sending communications and performing the functions according to the techniques described herein. In one implementation, thePOS device 400 can be a card reader or a server processing payments for the user. - In the illustrated example, the
POS device 400 includes at least oneprocessor 402,memory 404, adisplay 406, one or more input/output (I/O)components 408, one ormore network interfaces 410, at least onecard reader 412, at least onelocation component 414, and at least onepower source 416. Eachprocessor 402 may itself comprise one or more processors or processing cores. For example, theprocessor 402 can be implemented as one or more microprocessors, microcomputers, microcontrollers, digital signal processors, central processing units, state machines, logic circuitries, and/or any devices that manipulate signals based on operational instructions. In some cases, theprocessor 402 may be one or more hardware processors and/or logic circuits of any suitable type specifically programmed or configured to execute the algorithms and processes described herein. Theprocessor 402 can be configured to fetch and execute computer-readable processor-executable instructions stored in thememory 404. - Depending on the configuration of the
POS device 400, thememory 404 may be an example of tangible non-transitory computer storage media and may include volatile and nonvolatile memory and/or removable and non-removable media implemented in any type of technology for storage of information such as computer-readable processor-executable instructions, data structures, program modules or other data. Thememory 404 may include, but is not limited to, RAM, ROM, EEPROM, flash memory, solid-state storage, magnetic disk storage, optical storage, and/or other computer-readable media technology. Further, in some cases, thePOS device 400 may access external storage, such as RAID storage systems, storage arrays, network attached storage, storage area networks, cloud storage, or any other medium that can be used to store information and that can be accessed by theprocessor 402 directly or through another computing device or network. Accordingly, thememory 404 may be computer storage media able to store instructions, modules or components that may be executed by theprocessor 402. Further, when mentioned, non-transitory computer-readable media exclude media such as energy, carrier signals, electromagnetic waves, and signals per se. - The
memory 404 may be used to store and maintain any number of functional components that are executable by theprocessor 402. In some implementations, these functional components comprise instructions or programs that are executable by theprocessor 402 and that, when executed, implement operational logic for performing the actions and services attributed above to thePOS device 400. Functional components of thePOS device 400 stored in thememory 404 may include amerchant application 418, discussed above. Themerchant application 418 may present an interface on thePOS device 400 to enable the merchant to conduct transactions, receive payments, and so forth, as well as communicating with thepayment service 102 for processing payments and sending transaction information. Further, themerchant application 418 may present an interface to enable the merchant to manage the merchant's account, and the like. Themerchant application 418 may also include a module for dynamically modifying an order of a CVM based on attributes of a payment instrument, potentially based on additional factors, as described above with reference toFIGS. 1-3 . - Additional functional components may include an
operating system 420 for controlling and managing various functions of thePOS device 400 and for enabling basic user interactions with thePOS device 400. Thememory 404 may also storetransaction data 422 that is received based on the merchant associated with thePOS device 400 engaging in various transactions with customers, such as theexample customers 106 fromFIG. 1 . - In addition, the
memory 404 may also store data, data structures and the like, that are used by the functional components. For example, this data may include item information that includes information about the items offered by the merchant, which may include images of the items, descriptions of the items, prices of the items, and so forth. Depending on the type of thePOS device 400, thememory 404 may also optionally include other functional components and data, which may include programs, drivers, etc., and the data used or generated by the functional components. Further, thePOS device 400 may include many other logical, programmatic and physical components, of which those described are merely examples that are related to the discussion herein. - The network interface(s) 410 may include one or more interfaces and hardware components for enabling communication with various other devices over the network or directly. For example, network interface(s) 410 may enable communication through one or more of the Internet, cable networks, cellular networks, wireless networks (e.g., Wi-Fi) and wired networks, as well as close-range communications such as Bluetooth®, Bluetooth® low energy, and the like, as additionally enumerated elsewhere herein.
-
FIG. 4 further illustrates that thePOS device 400 may include thedisplay 406 mentioned above. Depending on the type of computing device used as thePOS device 400, thedisplay 406 may employ any suitable display technology. For example, thedisplay 406 may be a liquid crystal display, a plasma display, a light emitting diode display, an OLED (organic light-emitting diode) display, an electronic paper display, or any other suitable type of display able to present digital content thereon. In some examples, thedisplay 406 may have a touch sensor associated with thedisplay 406 to provide a touchscreen display configured to receive touch inputs for enabling interaction with a graphic interface presented on thedisplay 406. Accordingly, implementations herein are not limited to any particular display technology. Alternatively, in some examples, thePOS device 400 may not include thedisplay 406, and information may be present by other means, such as aurally. - The I/
O components 408, meanwhile, may include speakers, a microphone, a camera, and various user controls (e.g., buttons, a joystick, a keyboard, a keypad, etc.), a haptic output device, and so forth. - In addition, the
POS device 400 may include or may be connectable to apayment instrument reader 412. In some examples, thereader 412 may plug in to a port in the merchant device, such as a microphone/headphone port, a data port, or other suitable port. In other instances, thereader 412 is integral with theentire POS device 400. The reader may include a read head for reading a magnetic strip of a payment card, and further may include encryption technology for encrypting the information read from the magnetic strip. Alternatively, numerous other types of card readers may be employed with thePOS devices 400 herein, depending on the type and configuration of aparticular POS device 400. - The
location component 414 may include a GPS device able to indicate location information, or thelocation component 414 may comprise another other location-based sensor. ThePOS device 400 may also include one or more additional sensors (not shown), such as an accelerometer, gyroscope, compass, proximity sensor, and the like. Additionally, thePOS device 400 may include various other components that are not shown, examples of which include removable storage, a power control unit, and so forth. - In one implementation, the method implemented by device, such as device 400, includes a method for verifying a payment card at the time of a payment transaction between a merchant and a customer, the method includes receiving, at a point-of-sale (POS) device and from the user, the payment card for satisfying a cost of the payment transaction between the merchant and the customer; receiving, by the POS device, information from the payment card, including information related to a card network processor associated with the received payment card; detecting, by the POS device, a location of the POS device or one or more communication devices, wherein the location indicates a current location of the payment transaction; sending, to a processor of an issuing entity of the payment card and via a payment processing system, the information from the payment card; determining, by the processor of the issuing entity and based on the information from the payment card, if the user has installed an application on at least one registered communication device, the application configured for user management of the payment transaction using the payment card; obtaining, by the processor of the issuing entity, a device identifier corresponding to the registered communication device, wherein the device identifier is capable of indicating a location of the registered communication device on which the application is installed, and wherein the device identifier having been generated when the application is installed on the registered communication device; comparing, by the payment processing system, the location of the registered communication device as indicated by the device identifier with the location of the POS device or any of the communication devices at the current location of the payment transaction; if the location of the registered communication device as indicated by the device identifier is substantially similar to the location of the POS device or any of the communication devices at the current place of the payment transaction, configuring a cardholder verification method (CVM) for verifying the payment card received at the POS device irrespective of the CVM for the card network processor associated with the received payment card; and if the location of the registered communication device as indicated by the device identifier is substantially dissimilar to the location of the POS device or any of the communication devices at the current place of the payment transaction, presenting to the user the CVM specified by the card network processor associated with the received payment card. The payment processing system further determines a level of risk associated with the payment transaction based at least on the location of the registered device being substantially dissimilar to the location of the POS device or any of the communication devices. The configuration is further based at least in part on at least one of hardware associated with the POS device or a capability of the POS device, and wherein the hardware includes a touch screen to receive signature of the user or a dedicated hardware device for receiving personal identification numbers (PINs).
- In another implementation, the method includes receiving, by an entity issuing a payment instrument, a request to authorize the payment instrument at a point-of-sale (POS) device, the entity issuing the payment instrument programmed to selectively implement a dynamic cardholder verification method (CVM) at the POS device, wherein the dynamic CVM is configured based on an identifier associated with the payment transaction; receiving, the identifier associated with the payment transaction, the identifier including information corresponding to the payment instrument and/or one or more communication devices in proximity to the payment instrument; determining, by an entity issuing the payment instrument and based on the identifier, whether at least one of the communication devices is registered with the entity issuing the payment instrument; determining, by the entity issuing the payment instrument, whether to implement a static CVM specified by a card network associated with the payment instrument or whether to apply the dynamic CVM, wherein the dynamic CVM is generated and applied if the communication device is registered with the entity issuing the payment instrument; and requesting, on the POS device, an input in response to the dynamic CVM generated by the entity issuing the payment instrument. The identifier comprises a location of the communication device with respect to a location of the payment instrument or the POS device.
- The identifier also comprises whether the payment instrument includes a magnetic strip storing payment information associated with the payment instrument or a chip storing the payment information associated with the payment instrument. The dynamic CVM comprises a specific order of a personal identification number (PIN) or a signature of the user associated with the payment instrument followed by another PIN or a signature.
- The determination of whether to implement or modify the static CVM specified by the card network is further based at least in part on a capability of the POS device or the communication device. The method further includes submitting the dynamic CVM and an identifier associated with the payment instrument to a remote entity for authorizing the payment instrument; an indication that the payment instrument has not been authorized; and requesting the static CVM from a user associated with the payment instrument after receiving the indication.
- In another implementation, a payment device is disclosed. The payment device includes one or more processors; and one or more computer-readable media storing computer-executable instructions that, when executed by the one or more processors, cause the one or more processors to: obtain an attribute associated with the payment instrument received by the payment device, wherein the payment instrument is used towards satisfying a cost of a payment transaction; obtain information corresponding to at least one communication device in proximity to the payment device or the payment instrument; detect, based on the information of the communication device and the attribute of the payment device, whether there is a pre-existing relationship between the communication device and the payment instrument;
- on detecting the pre-existing relationship between the communication device and the payment instrument, generate a verification order different from a default verification order set by a card network processor, where the verification order is presented to a customer of the payment instrument to authorize the payment transaction; and request an input from the customer of the payment instrument according to the generated verification order. The pre-existing relationship is established at a time of registration of the payment instrument or the communication device with the payment device issuing the payment instrument.
- The device further includes a rule engine to determine a risk level associated with the payment transaction, based in part on the pre-existing relationship between the communication device and the payment instrument. The rule engine is configured to: query a device registered with the payment instrument; compare the location of the registered device with the communication device in proximity to the payment instrument or the payment device; and determine that the relationship is pre-existing based at least on the comparison.
- The attribute comprises whether the payment instrument includes a magnetic strip that stores payment information or a chip that stores the payment information. Further, the default verification order is a generic value set by the card network processor for the payment instrument issued by an entity issuing the payment instrument. The determining of the CVM is based at least in part on one or more of: (a) specifications of the apparatus; (b) the cost of the payment transaction; (c) a type of the payment instrument; and (d) a brand of the payment instrument. The payment device includes a touch-sensitive display to display information regarding the payment transaction and to receive from the customer associated with the payment instrument an input corresponding to the generated CVM.
- In one implementation, the method implemented at least in part by a processor associated with an entity issuing at least one payment instrument, the method comprising: receiving a request to authenticate use of the payment instrument at a point-of-sale (POS) device in response to a payment transaction; obtaining, from a database, an attribute associated with the payment instrument, wherein the attribute indicates a predicted location of a communication device associated with a holder of the payment instrument at a time of the payment transaction, wherein the attribute is set in response to an execution or registration of an application of the entity issuing the payment instrument on a communication device; obtaining, through a location sensor of the POS device, a current location of the payment transaction; determining whether the current location of the payment transaction involving the payment instrument substantially matches the predicted location of the communication device associated with the holder of the payment instrument; and implementing, via the processor, a cardholder verification method (CVM) that specifies a device-specific order of verification information to request for verifying the payment instrument if the current location of the communication device matches the predicted location.
- The method includes determining a level of risk associated with the transaction based at least in part on a mapping of the predicted location with the current location; and configuring the device-specific order of verification information in accordance with the level of risk. The method includes predicting the location of the communication device by using the attribute to query the communication device. The method also includes determining whether to implement a generic order of the CVM specified by a card processing network or modify the generic order of the CVM to a device-specific order of the CVM based at least in part on one or more of: (a) a cost of the payment transaction for which the payment instrument is being authorized; (b) a hardware capability of the POS device; (c) the location of the payment transaction; and (d) the entity issuing the payment instrument.
-
FIGS. 5A-C further illustrate exemplary use cases associated with the method and systems described above. For example, in a first exemplary scenario 5A, the user presents thepayment card 502 at thepayment terminal 504 for a transaction amount over a transaction limit pre-set by the issuer or card network processor. Traditionally, the terminal declines the transaction and no further communication is supplied to thepayment processor 506 orissuer 510. In the embodiments described herein, thepayment terminal 504 sends information pertaining to thepayment card 502 and/or the transaction, including size of the ticket, to theissuer 510. Theissuer 510 then, based on risk analysis of the ticket size with respect to the specific user, may prompt a secondary authentication or decline the charge and prompt another form of payment. Theissuer 510 performs the risk analysis based on one or more rules stored in therule engine 508 associated with thepayment service 502 or theissuer 510. - In a second example scenario 5B, the new CVM may be authenticated before the normal payment flow. The user presents the
payment card 502 at thepayment terminal 504. Thepayment terminal 504 sends the request for CVM to theissuer 510 via the payment processing system, or payment service, 506. Theissuer 510 then compares the payment card identifier embedded in the request with an internal database. If the payment card is identified, the issuer sends a request on the communication device of theuser 512 for either a response or an actual CVM, such as a text message or fingerprint response. The communication device of theuser 512 does not necessarily need to be at the location of the payment transaction, however. As such, the user need not respond to the CVM requested by the issuer contemporaneous to the payment transaction. In such cases, the issuer can provisionally authenticate the payment transaction and finalize the transaction after the user has provided the CVM at a later time. The issuer may assign a specific time window within which the issuer allows the user to provide an input to the CVM. The CVM is then submitted directly to theissuer 510 as consumer device cardholder verification method (CDCVM). Theissuer 510 sends the collected CVM to thepayment processing system 506. The payment transaction is then authorized and the item is released to the customer. - In a third example scenario 5C, the user presents the
payment card 502 at thepayment terminal 504. Thepayment terminal 504 sends the request for CVM to theissuer 510 via the payment processing system, or the payment service, 506. In one implementation, the issuer identifies the user's communication device (either by identifying the device identifier, a mobile payment application, phone number of the user using a certain payment card, or other such identifier). The issuer determines the validity of the CVM and confirms that the collected CVM is adequate for authentication and therefore for chargeback and liability purposes. In this manner, the authentication is accepted as part of the messaging or other way to detect communication device. - Although the subject matter has been described in language specific to structural features and/or methodological acts, it is to be understood that the subject matter defined in the appended claims is not necessarily limited to the specific features or acts described. Rather, the specific features and acts are disclosed as example forms of implementing the claims.
Claims (21)
Priority Applications (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US15/464,079 US20180268408A1 (en) | 2017-03-20 | 2017-03-20 | Configuring Verification Information At Point-of-Sale Devices |
PCT/US2018/023392 WO2018175462A1 (en) | 2017-03-20 | 2018-03-20 | Configuring verification information at point-of-sale devices |
US16/799,344 US12387212B2 (en) | 2017-03-20 | 2020-02-24 | Configuring verification information at point-of-sale devices |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US15/464,079 US20180268408A1 (en) | 2017-03-20 | 2017-03-20 | Configuring Verification Information At Point-of-Sale Devices |
Related Child Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US16/799,344 Continuation US12387212B2 (en) | 2017-03-20 | 2020-02-24 | Configuring verification information at point-of-sale devices |
Publications (1)
Publication Number | Publication Date |
---|---|
US20180268408A1 true US20180268408A1 (en) | 2018-09-20 |
Family
ID=62067773
Family Applications (2)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US15/464,079 Abandoned US20180268408A1 (en) | 2017-03-20 | 2017-03-20 | Configuring Verification Information At Point-of-Sale Devices |
US16/799,344 Active 2041-03-08 US12387212B2 (en) | 2017-03-20 | 2020-02-24 | Configuring verification information at point-of-sale devices |
Family Applications After (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US16/799,344 Active 2041-03-08 US12387212B2 (en) | 2017-03-20 | 2020-02-24 | Configuring verification information at point-of-sale devices |
Country Status (2)
Country | Link |
---|---|
US (2) | US20180268408A1 (en) |
WO (1) | WO2018175462A1 (en) |
Cited By (53)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20180012212A1 (en) * | 2016-07-11 | 2018-01-11 | Wunchun Chau | Point of sale terminal with breakaway cable |
US20180287852A1 (en) * | 2017-04-03 | 2018-10-04 | Bank Of America Corporation | Data Transfer, Over Session or Connection, and Between Computing Device and One or More Servers to Determine Third Party Routing Network For User Device |
US20180287927A1 (en) * | 2017-04-03 | 2018-10-04 | Bank Of America Corporation | Data Transfer, Over Session or Connection, and Between Computing Device and Server to Determine Third Party Routing Network in Response to Determining Request to Use a Different Routing Network |
US10163107B1 (en) | 2016-03-31 | 2018-12-25 | Square, Inc. | Technical fallback infrastructure |
US20190251073A1 (en) * | 2018-02-14 | 2019-08-15 | Samsung Electronics Co., Ltd. | Method and interactive device for providing social interaction |
US10515354B1 (en) | 2014-12-05 | 2019-12-24 | Square, Inc. | Discounted card not present rates following failed card present attempts |
US10601934B2 (en) | 2017-04-03 | 2020-03-24 | Bank Of America Corporation | Data transfer, over session or connection, and between computing device and one or more servers for transmitting data to a third party computing device |
US10601718B2 (en) | 2017-04-03 | 2020-03-24 | Bank Of America Corporation | Data transfer, over session or connection, and between computing device and server associated with a routing network for modifying one or more parameters of the routing network |
US10609156B2 (en) | 2017-04-03 | 2020-03-31 | Bank Of America Corporation | Data transfer, over session or connection, and between computing device and server associated with one or more routing networks in response to detecting activity |
US10608918B2 (en) | 2017-04-03 | 2020-03-31 | Bank Of America Corporation | Data transfer, over session or connection, and between computing device and one or more servers to determine likelihood of user device using a routing network |
CN111047341A (en) * | 2018-10-15 | 2020-04-21 | 阿里巴巴集团控股有限公司 | Information processing method and device, server and terminal equipment |
US10716060B2 (en) | 2017-04-03 | 2020-07-14 | Bank Of America Corporation | Data transfer between computing device and user device at different locations and over session or connection to display one or more routing networks to use |
US10755281B1 (en) | 2017-03-31 | 2020-08-25 | Square, Inc. | Payment transaction authentication system and method |
WO2020181162A1 (en) * | 2019-03-07 | 2020-09-10 | Mastercard International Incorporated | User verification for credential device |
US20210049612A1 (en) * | 2018-01-30 | 2021-02-18 | Visa International Service Association | System and Method for Biometric Fallback Authentication |
US20210090062A1 (en) * | 2018-03-07 | 2021-03-25 | Capital One Services, Llc | Secure payment using a network of wearable devices |
US11036838B2 (en) | 2018-12-05 | 2021-06-15 | Bank Of America Corporation | Processing authentication requests to secured information systems using machine-learned user-account behavior profiles |
US11048793B2 (en) | 2018-12-05 | 2021-06-29 | Bank Of America Corporation | Dynamically generating activity prompts to build and refine machine learning authentication models |
US20210234848A1 (en) * | 2018-01-11 | 2021-07-29 | Visa International Service Association | Offline authorization of interactions and controlled tasks |
US11107056B2 (en) | 2013-11-26 | 2021-08-31 | Square, Inc. | Card data output for cardless transactions |
US11113370B2 (en) | 2018-12-05 | 2021-09-07 | Bank Of America Corporation | Processing authentication requests to secured information systems using machine-learned user-account behavior profiles |
US11120109B2 (en) | 2018-12-05 | 2021-09-14 | Bank Of America Corporation | Processing authentication requests to secured information systems based on machine-learned event profiles |
US20210287193A1 (en) * | 2019-05-24 | 2021-09-16 | Tencent Technology (Shenzhen) Company Limited | Payment processing method, electronic device, and computer-readable storage medium |
US11132697B2 (en) * | 2018-06-15 | 2021-09-28 | Wells Fargo Bank, N.A. | Risk detection of false customer information |
US11159510B2 (en) | 2018-12-05 | 2021-10-26 | Bank Of America Corporation | Utilizing federated user identifiers to enable secure information sharing |
US11170354B2 (en) * | 2017-03-16 | 2021-11-09 | Perk Hero Software Inc. | Wireless systems and methods for bill payment |
US11176230B2 (en) | 2018-12-05 | 2021-11-16 | Bank Of America Corporation | Processing authentication requests to secured information systems based on user behavior profiles |
US20210374745A1 (en) * | 2017-10-25 | 2021-12-02 | Capital One Services, Llc | Dynamic modification of a verification method associated with a transaction card |
US20210390546A1 (en) * | 2020-06-15 | 2021-12-16 | Magtek, Inc. | Systems and Methods for Secure Transaction Processing |
US20220067698A1 (en) * | 2017-03-16 | 2022-03-03 | Perk Hero Software Inc. | Wireless payment systems, devices and methods for electronic payment |
US11301844B2 (en) * | 2016-08-12 | 2022-04-12 | Mastercard International Incorporated | Cryptographic authentication and tokenized transactions |
US11410172B2 (en) | 2019-12-31 | 2022-08-09 | Mastercard International Incorporated | Methods and systems for verification of operations of computer terminals and processing networks |
US11514418B2 (en) | 2017-03-19 | 2022-11-29 | Nxp B.V. | Personal point of sale (pPOS) device with a local and/or remote payment kernel that provides for card present e-commerce transaction |
US20220398587A1 (en) * | 2021-06-09 | 2022-12-15 | Capital One Services, Llc | Electronic profile and data security enforcement with user device data and methods of use thereof |
US11593773B1 (en) | 2017-03-31 | 2023-02-28 | Block, Inc. | Payment transaction authentication system and method |
US11620623B2 (en) | 2018-05-31 | 2023-04-04 | Nxp B.V. | Merchant transaction mirroring for personal point of sale (pPOS) for card present e-commerce and in vehicle transaction |
US11831639B2 (en) | 2018-06-06 | 2023-11-28 | Capital One Services, Llc | Systems and methods for using micro accelerations as a biometric identification factor |
US11861589B2 (en) | 2017-04-28 | 2024-01-02 | Block, Inc. | Multi-source transaction processing |
US12045831B2 (en) * | 2019-03-01 | 2024-07-23 | Shopify Inc. | Secure pin entry via mobile device |
US12112313B2 (en) | 2015-07-31 | 2024-10-08 | Wells Fargo Bank, N.A. | Connected payment card systems and methods |
US12174992B1 (en) | 2016-07-01 | 2024-12-24 | Wells Fargo Bank, N.A. | Access control interface for managing entities and permissions |
US12198130B2 (en) | 2016-07-01 | 2025-01-14 | Wells Fargo Bank, N.A. | Access control tower |
US12205121B2 (en) | 2015-03-27 | 2025-01-21 | Wells Fargo Bank, N.A. | Token management system |
US12206674B2 (en) | 2016-07-01 | 2025-01-21 | Wells Fargo Bank, N.A. | Access control tower |
US12217248B1 (en) | 2008-10-31 | 2025-02-04 | Wells Fargo Bank, N.A. | Payment vehicle with on and off function |
US12223091B2 (en) | 2016-07-01 | 2025-02-11 | Wells Fargo Bank, N.A. | Control tower for linking accounts to applications |
US12238112B2 (en) | 2021-01-05 | 2025-02-25 | Wells Fargo Bank, N.A. | Digital account controls portal and protocols for federated and non-federated systems and devices |
US12238051B2 (en) | 2020-09-04 | 2025-02-25 | Wells Fargo Bank, N.A. | Synchronous interfacing with unaffiliated networked systems to alter functionality of sets of electronic assets |
US12299691B2 (en) | 2017-04-25 | 2025-05-13 | Wells Fargo Bank, N.A. | System and method for card control |
US12299657B2 (en) | 2016-07-01 | 2025-05-13 | Wells Fargo Bank, N.A. | Control tower for prospective transactions |
US20250238641A1 (en) * | 2024-01-23 | 2025-07-24 | Bank Of America Corporation | System and method to maintain connectivity with a smart card |
US12373884B2 (en) | 2017-07-06 | 2025-07-29 | Wells Fargo Bank, N.A. | Data control tower |
US12387212B2 (en) | 2017-03-20 | 2025-08-12 | Block, Inc. | Configuring verification information at point-of-sale devices |
Families Citing this family (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US11836727B1 (en) * | 2020-12-04 | 2023-12-05 | Wells Fargo Bank, N.A. | Location based transaction authentication |
US20220270097A1 (en) * | 2021-02-24 | 2022-08-25 | City Hive Inc. | System and method for passive authentication of remote user transactions |
US11790120B2 (en) | 2021-03-26 | 2023-10-17 | Bank Of America Corporation | System and method for encrypting storage mediums with an encryption chip |
EP4287094A1 (en) * | 2022-05-30 | 2023-12-06 | Surfboard Payments AB | Method and system for verifying a payment |
Family Cites Families (142)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US3863050A (en) | 1974-01-07 | 1975-01-28 | Max T Brugger | Automatic credit card validating device |
US4048476A (en) | 1976-04-09 | 1977-09-13 | Ncr Corporation | Card reader |
US5819226A (en) | 1992-09-08 | 1998-10-06 | Hnc Software Inc. | Fraud detection using predictive modeling |
US5859414A (en) | 1995-12-29 | 1999-01-12 | Aironet Wireless Communications, Inc. | Interactive customer information terminal |
US7545816B1 (en) | 1998-04-29 | 2009-06-09 | Ncr Corporation | Transaction processing systems maintenance |
US7263506B2 (en) | 2000-04-06 | 2007-08-28 | Fair Isaac Corporation | Identification and management of fraudulent credit/debit card purchases at merchant ecommerce sites |
US7698217B1 (en) | 2000-04-20 | 2010-04-13 | Christopher Phillips | Masking private billing data by assigning other billing data to use in commerce with businesses |
US7376618B1 (en) | 2000-06-30 | 2008-05-20 | Fair Isaac Corporation | Detecting and measuring risk with predictive models using content mining |
US7457767B1 (en) | 2000-10-05 | 2008-11-25 | International Business Machines Corporation | Pay at the table system |
CA2332656A1 (en) | 2001-01-26 | 2002-07-26 | Certapay Inc. | Online payment transfer and identity management system and method |
JP3809857B2 (en) | 2001-03-15 | 2006-08-16 | インターナショナル・ビジネス・マシーンズ・コーポレーション | Transaction system, transaction terminal, transaction history output device, server, transaction history display method, computer program |
US20090177563A1 (en) | 2001-12-07 | 2009-07-09 | American Express Travel Related Services Company, Inc. | Authorization refresh system and method |
US20040034612A1 (en) | 2002-03-22 | 2004-02-19 | Nick Mathewson | Support vector machines for prediction and classification in supply chain management and other applications |
US8397988B1 (en) | 2002-08-09 | 2013-03-19 | Britesmart Llc | Method and system for securing a transaction using a card generator, a RFID generator, and a challenge response protocol |
US7494055B2 (en) | 2002-09-17 | 2009-02-24 | Vivotech, Inc. | Collaborative negotiation techniques for mobile personal trusted device financial transactions |
US7702577B1 (en) | 2003-11-06 | 2010-04-20 | Jp Morgan Chase Bank, N.A. | System and method for conversion of initial transaction to final transaction |
US7543739B2 (en) | 2003-12-17 | 2009-06-09 | Qsecure, Inc. | Automated payment card fraud detection and location |
US20050071232A1 (en) | 2004-10-19 | 2005-03-31 | Stephanie A. Frater | Credit system for restaurant tables and bars |
US20060151598A1 (en) | 2005-01-13 | 2006-07-13 | Yen-Fu Chen | Categorization based spending control |
US8047908B2 (en) | 2005-03-29 | 2011-11-01 | Igt | Methods and systems for determining and selling wagering game outcomes for a plurality of players |
US7630938B2 (en) | 2005-03-31 | 2009-12-08 | United Parcel Service Of America, Inc. | Flexible billing adjustment system |
CA2648523C (en) | 2005-04-21 | 2018-09-04 | Securedpay Solutions, Inc. | Portable handheld device for wireless order entry and real time payment authorization and related methods |
US9391985B2 (en) | 2005-04-26 | 2016-07-12 | Guy Hefetz | Environment-based two-factor authentication without geo-location |
US7997476B2 (en) | 2005-09-15 | 2011-08-16 | Capital One Financial Corporation | Wireless devices for storing a financial account card and methods for storing card data in a wireless device |
US20070108279A1 (en) | 2005-11-14 | 2007-05-17 | A-Men Technology Corporation | Unfold smart-card card reader |
US8275312B2 (en) | 2005-12-31 | 2012-09-25 | Blaze Mobile, Inc. | Induction triggered transactions using an external NFC device |
US7693767B2 (en) | 2006-03-23 | 2010-04-06 | Oracle International Corporation | Method for generating predictive models for a business problem via supervised learning |
US7788195B1 (en) | 2006-03-24 | 2010-08-31 | Sas Institute Inc. | Computer-implemented predictive model generation systems and methods |
US7818264B2 (en) | 2006-06-19 | 2010-10-19 | Visa U.S.A. Inc. | Track data encryption |
US20080040261A1 (en) | 2006-04-24 | 2008-02-14 | Robert Nix | Systems and methods for implementing financial transactions |
US7962369B2 (en) | 2006-09-29 | 2011-06-14 | Einar Rosenberg | Apparatus and method using near field communications |
US20080208743A1 (en) | 2007-02-22 | 2008-08-28 | First Data Corporation | Transfer of value between mobile devices in a mobile commerce system |
US20090048936A1 (en) | 2007-04-13 | 2009-02-19 | Lerch John W | Method and system for RFID transaction integrity utilizing an EEPROM |
US8121956B2 (en) | 2007-06-25 | 2012-02-21 | Visa U.S.A. Inc. | Cardless challenge systems and methods |
US20090006151A1 (en) | 2007-06-29 | 2009-01-01 | Jay Zarghami | Collection of receipt data from point-of-sale devices |
US20150081557A1 (en) | 2010-09-14 | 2015-03-19 | Craig Patrick Kinfoil | Method of processing payment transactions |
US20090164374A1 (en) | 2007-12-21 | 2009-06-25 | Ebay Inc. | System and Methods for One Time Check Numbers |
US20140258055A1 (en) | 2008-03-13 | 2014-09-11 | Giftya Llc | System and method for a gift tracker |
US20100005013A1 (en) | 2008-07-03 | 2010-01-07 | Retail Decisions, Inc. | Methods and systems for detecting fraudulent transactions in a customer-not-present environment |
US9652023B2 (en) | 2008-07-24 | 2017-05-16 | Intelligent Mechatronic Systems Inc. | Power management system |
US20100057612A1 (en) | 2008-09-03 | 2010-03-04 | Fan Hub Llc | Kiosk based purchasing system |
US20100097946A1 (en) | 2008-10-22 | 2010-04-22 | Nokia Corporation | Optimized data transfer between approaching devices |
AU2009311303B2 (en) | 2008-11-06 | 2015-09-10 | Visa International Service Association | Online challenge-response |
US20100063945A1 (en) | 2008-11-12 | 2010-03-11 | Cowan Jr William Curtis | Systems and Methods Involving Processing of Payments Using Handheld Devices |
US9557889B2 (en) | 2009-01-28 | 2017-01-31 | Headwater Partners I Llc | Service plan design, user interfaces, application programming interfaces, and device management |
US20100248779A1 (en) * | 2009-03-26 | 2010-09-30 | Simon Phillips | Cardholder verification rule applied in payment-enabled mobile telephone |
US7783515B1 (en) | 2009-03-27 | 2010-08-24 | Bank Of America Corporation | Itemized receipt tracking system |
US8600873B2 (en) | 2009-05-28 | 2013-12-03 | Visa International Service Association | Managed real-time transaction fraud analysis and decisioning |
US8745698B1 (en) | 2009-06-09 | 2014-06-03 | Bank Of America Corporation | Dynamic authentication engine |
US20110047075A1 (en) * | 2009-08-19 | 2011-02-24 | Mastercard International Incorporated | Location controls on payment card transactions |
US8412605B2 (en) | 2009-12-01 | 2013-04-02 | Bank Of America Corporation | Comprehensive suspicious activity monitoring and alert system |
US8598977B2 (en) | 2010-04-16 | 2013-12-03 | Tiny Towne International Llc | System and method for driver training in a controlled driving environment |
US20110313871A1 (en) | 2010-05-18 | 2011-12-22 | Laura Greenwood | Apparatus, system, and method for facilitating a payment |
US20120054102A1 (en) | 2010-08-26 | 2012-03-01 | Obopay, Inc. | Method & System for Providing Payments Over A Wireless Connection |
US20120123868A1 (en) | 2010-11-17 | 2012-05-17 | David Brudnicki | System and Method for Physical-World Based Dynamic Contactless Data Emulation in a Portable Communication Device |
US20120173410A1 (en) | 2011-01-03 | 2012-07-05 | Relay Holdings, Llc | System and method for paying citations using sms text messaging |
US8751318B2 (en) | 2011-05-30 | 2014-06-10 | Lg Electronics Inc. | Method for managing and/or controlling store and system for the same |
US20120317013A1 (en) | 2011-06-13 | 2012-12-13 | Ho Ming Luk | Computer-Implemented Systems And Methods For Scoring Stored Enterprise Data |
US8498900B1 (en) | 2011-07-25 | 2013-07-30 | Dash Software, LLC | Bar or restaurant check-in and payment systems and methods of their operation |
US20130073347A1 (en) | 2011-09-21 | 2013-03-21 | Albert Bogaard | Vehicular citation management method and system |
US20130226318A1 (en) | 2011-09-22 | 2013-08-29 | Dariusz Procyk | Process transformation and transitioning apparatuses, methods and systems |
US20130080331A1 (en) | 2011-09-26 | 2013-03-28 | Ebay Inc. | System and Method for Instantaneous Retail Payment |
WO2013048538A1 (en) | 2011-10-01 | 2013-04-04 | Intel Corporation | Cloud based credit card emulation |
EP2579194A1 (en) | 2011-10-04 | 2013-04-10 | Research In Motion Limited | Providing increased ability to perform a transaction based on locale |
US11580562B2 (en) | 2011-10-25 | 2023-02-14 | Alexander Song | Anti-fraud financial transactions system |
US10339525B2 (en) | 2011-10-27 | 2019-07-02 | Boom! Payments, Inc. | Confirming local marketplace transaction consummation for online payment consummation |
DE202012100620U1 (en) | 2011-11-22 | 2012-06-13 | Square, Inc. | System for processing cardless payment transactions |
KR20140121764A (en) | 2012-01-05 | 2014-10-16 | 비자 인터네셔널 서비스 어소시에이션 | Transaction visual capturing apparatuses, methods and systems |
US20130254115A1 (en) | 2012-01-19 | 2013-09-26 | Mastercard International Incorporated | Converged cross-platform electronic wallet |
DE212012000252U1 (en) | 2012-01-30 | 2014-09-24 | Ebay Inc. | Systems for providing application-based payment processes |
US20130218757A1 (en) | 2012-02-16 | 2013-08-22 | Dharani Ramanathan | Payments using a recipient photograph |
US8947239B1 (en) | 2012-03-05 | 2015-02-03 | Fitbit, Inc. | Near field communication system, and method of operating same |
US8500010B1 (en) | 2012-03-15 | 2013-08-06 | Ebay Inc. | Card reader for mobile device |
US9741045B1 (en) | 2012-03-16 | 2017-08-22 | Square, Inc. | Ranking of merchants for cardless payment transactions |
WO2013147904A1 (en) | 2012-03-31 | 2013-10-03 | Intel Corporation | Securely generating time and location bounded virtual transaction cards using mobile wallets without involving third parties or point of sale terminals |
WO2013159110A1 (en) | 2012-04-20 | 2013-10-24 | Conductiv Software, Inc. | Multi-factor mobile transaction authentication |
US9607297B2 (en) | 2012-06-06 | 2017-03-28 | Intuit Inc. | Mobile payment via a virtual peripheral device |
US9818093B1 (en) | 2012-06-14 | 2017-11-14 | Amazon Technologies, Inc. | Third party check-in associations with cloud wallet |
US9262755B2 (en) | 2012-06-20 | 2016-02-16 | Intuit Inc. | Mobile payment system |
US10096020B2 (en) | 2012-08-30 | 2018-10-09 | Worldpay, Llc | Combination payment card and methods thereof |
US8606696B1 (en) | 2012-09-11 | 2013-12-10 | Simplexity, Inc. | Assessing consumer purchase behavior in making a financial contract authorization decision |
US8856894B1 (en) | 2012-11-28 | 2014-10-07 | Consumerinfo.Com, Inc. | Always on authentication |
CA2893040A1 (en) | 2012-11-30 | 2014-06-05 | XRomb Inc. | System and method of processing payment at a point-of-sale terminal using a mobile device |
US20140172551A1 (en) | 2012-12-19 | 2014-06-19 | Sas Institute Inc. | Using Transaction Data and Platform for Mobile Devices |
US8762272B1 (en) | 2012-12-27 | 2014-06-24 | Google Inc. | Management of emails containing payments |
US20140195272A1 (en) | 2013-01-07 | 2014-07-10 | Hassan Sadiq | Systems and methods of gamification for a driving performance product |
US9123036B2 (en) | 2013-03-01 | 2015-09-01 | Looppay, Inc. | Mobile checkout systems and methods |
US9286500B1 (en) | 2013-03-15 | 2016-03-15 | Square, Inc. | Card reader communication method |
US9125180B1 (en) | 2013-03-15 | 2015-09-01 | Google Inc. | Techniques for automatically establishing a long-lasting connection across computing devices configured for short-range wireless communication |
US9633322B1 (en) | 2013-03-15 | 2017-04-25 | Consumerinfo.Com, Inc. | Adjustment of knowledge-based authentication |
US20140279113A1 (en) * | 2013-03-15 | 2014-09-18 | Harish Balasubramanian | System and Method to Reduce Misuse of a Financial Instrument at a Point-of-Sale Location |
GB2513340A (en) | 2013-04-23 | 2014-10-29 | Travelex Ltd | Processing system |
US10592890B2 (en) | 2014-09-03 | 2020-03-17 | Intel Corporation | Methods and arrangements to complete online transactions |
US10217103B2 (en) | 2013-05-16 | 2019-02-26 | Avant-Garde Ip Llc | System, method and article of manufacture to facilitate a financial transaction without unlocking a mobile device |
GB201310084D0 (en) * | 2013-06-06 | 2013-07-17 | Mastercard International Inc | Improvements to electronic authentication systems |
US9125014B2 (en) | 2013-06-09 | 2015-09-01 | Apple Inc. | Location-based ticket books |
US20150041534A1 (en) | 2013-08-07 | 2015-02-12 | 1 Oak Technologies, LLC | Electronic payment transponder |
US9588801B2 (en) | 2013-09-11 | 2017-03-07 | Intel Corporation | Apparatus and method for improved lock elision techniques |
US9396730B2 (en) | 2013-09-30 | 2016-07-19 | Bank Of America Corporation | Customer identification through voice biometrics |
US20150106260A1 (en) | 2013-10-11 | 2015-04-16 | G2 Web Services | System and methods for global boarding of merchants |
US9727866B2 (en) | 2013-10-15 | 2017-08-08 | Intuit Inc. | Methods systems and computer program products for verifying consumer identity during transaction |
US10909539B2 (en) | 2013-10-29 | 2021-02-02 | Visa International Service Association | Enhancements to transaction processing in a secure environment using a merchant computer |
US9799021B1 (en) | 2013-11-26 | 2017-10-24 | Square, Inc. | Tip processing at a point-of-sale system |
US9922322B2 (en) * | 2013-12-19 | 2018-03-20 | Visa International Service Association | Cloud-based transactions with magnetic secure transmission |
US9858572B2 (en) | 2014-02-06 | 2018-01-02 | Google Llc | Dynamic alteration of track data |
US9342717B2 (en) | 2014-02-26 | 2016-05-17 | Ncr Corporation | Tamper detection system and method |
US20150254662A1 (en) * | 2014-03-05 | 2015-09-10 | Mastercard International Incorporated | Verifying transaction context data at wallet service provider |
US9767471B1 (en) | 2014-03-24 | 2017-09-19 | Square, Inc. | Determining recommendations from buyer information |
US9971627B2 (en) | 2014-03-26 | 2018-05-15 | Intel Corporation | Enabling maximum concurrency in a hybrid transactional memory system |
US8990121B1 (en) | 2014-05-08 | 2015-03-24 | Square, Inc. | Establishment of a secure session between a card reader and a mobile device |
US20150332223A1 (en) | 2014-05-19 | 2015-11-19 | Square, Inc. | Transaction information collection for mobile payment experience |
US9852410B1 (en) * | 2014-06-17 | 2017-12-26 | Square, Inc. | Dynamically configuring verification information at point-of-sale devices |
US9589263B2 (en) | 2014-06-27 | 2017-03-07 | Paypal, Inc. | Automatic payment code display system |
US20160012421A1 (en) | 2014-07-11 | 2016-01-14 | Google Inc. | Hands-free transactions using beacon identifiers |
US9166999B1 (en) | 2014-07-25 | 2015-10-20 | Fmr Llc | Security risk aggregation, analysis, and adaptive control |
US9530128B1 (en) | 2014-08-08 | 2016-12-27 | Square, Inc. | Payment instrument verification techniques |
US20160055538A1 (en) | 2014-08-25 | 2016-02-25 | Ebay Inc. | Wireless beacons for reporting of applications in the foreground of a user device interface |
US9436335B1 (en) | 2014-09-30 | 2016-09-06 | Amazon Technologies, Inc. | Input transformative system |
KR102391149B1 (en) | 2014-10-27 | 2022-04-28 | 메타 플랫폼스, 인크. | Facilitating sending and receiving of payments using message-based contextual prompts |
WO2016080952A1 (en) | 2014-11-17 | 2016-05-26 | Empire Technology Development Llc | Mobile device prevention of contactless card attacks |
US9836732B1 (en) | 2014-11-25 | 2017-12-05 | Square, Inc. | Payment handling |
US10515354B1 (en) | 2014-12-05 | 2019-12-24 | Square, Inc. | Discounted card not present rates following failed card present attempts |
US10542380B2 (en) | 2015-01-30 | 2020-01-21 | Bby Solutions, Inc. | Beacon-based media network |
WO2016134400A1 (en) * | 2015-02-27 | 2016-09-01 | Molino David | Multi-function transaction card |
US11481750B2 (en) | 2015-06-30 | 2022-10-25 | Block, Inc. | Pairing a payment object reader with a point-of-sale terminal |
US10643245B2 (en) | 2016-07-15 | 2020-05-05 | NXT-ID, Inc. | Preference-driven advertising systems and methods |
SG10201914040YA (en) | 2015-09-10 | 2020-03-30 | Verrency Holdings Ltd | Proxy device for representing multiple credentials |
US10049349B1 (en) | 2015-09-29 | 2018-08-14 | Square, Inc. | Processing electronic payment transactions in offline-mode |
US20170091765A1 (en) | 2015-09-30 | 2017-03-30 | Bank Of America Corporation | Non-intrusive geo-location determination associated with transaction authorization |
CA3040776A1 (en) | 2015-11-19 | 2017-05-26 | Securter Systems Inc. | Coordinator managed payments |
HK1218492A2 (en) | 2015-12-30 | 2017-02-17 | 演基发展有限公司 | Method for controlling wireless communication between a mobile device and an electronic device |
US10552821B2 (en) | 2016-01-13 | 2020-02-04 | Paypal, Inc. | Dongle device for automatic pairing of payment terminal to mobile computing device |
US20170243224A1 (en) * | 2016-02-18 | 2017-08-24 | Mastercard International Incorporated | Methods and systems for browser-based mobile device and user authentication |
US10163107B1 (en) | 2016-03-31 | 2018-12-25 | Square, Inc. | Technical fallback infrastructure |
US10062078B1 (en) | 2016-06-14 | 2018-08-28 | Square, Inc. | Fraud detection and transaction review |
US10068235B1 (en) | 2016-06-14 | 2018-09-04 | Square, Inc. | Regulating fraud probability models |
US10366378B1 (en) | 2016-06-30 | 2019-07-30 | Square, Inc. | Processing transactions in offline mode |
US9996829B1 (en) | 2016-12-27 | 2018-06-12 | Square, Inc. | System for global point-of-sale capabilities |
US20180268408A1 (en) | 2017-03-20 | 2018-09-20 | Square, Inc. | Configuring Verification Information At Point-of-Sale Devices |
US12020235B2 (en) | 2017-04-28 | 2024-06-25 | Block, Inc. | Multi-source transaction processing |
US9990632B1 (en) * | 2017-10-25 | 2018-06-05 | Capital One Services, Llc | Dynamic modification of a verification method associated with a transaction card |
US20190385160A1 (en) * | 2018-06-19 | 2019-12-19 | Mastercard International Incorporated | System and process for on-the-fly cardholder verification method selection |
-
2017
- 2017-03-20 US US15/464,079 patent/US20180268408A1/en not_active Abandoned
-
2018
- 2018-03-20 WO PCT/US2018/023392 patent/WO2018175462A1/en active Application Filing
-
2020
- 2020-02-24 US US16/799,344 patent/US12387212B2/en active Active
Cited By (87)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US12217248B1 (en) | 2008-10-31 | 2025-02-04 | Wells Fargo Bank, N.A. | Payment vehicle with on and off function |
US11107056B2 (en) | 2013-11-26 | 2021-08-31 | Square, Inc. | Card data output for cardless transactions |
US10515354B1 (en) | 2014-12-05 | 2019-12-24 | Square, Inc. | Discounted card not present rates following failed card present attempts |
US12333551B2 (en) | 2015-03-27 | 2025-06-17 | Wells Fargo Bank, N.A. | Token management system |
US12205121B2 (en) | 2015-03-27 | 2025-01-21 | Wells Fargo Bank, N.A. | Token management system |
US12112313B2 (en) | 2015-07-31 | 2024-10-08 | Wells Fargo Bank, N.A. | Connected payment card systems and methods |
US10163107B1 (en) | 2016-03-31 | 2018-12-25 | Square, Inc. | Technical fallback infrastructure |
US10949858B2 (en) | 2016-03-31 | 2021-03-16 | Square, Inc. | Technical fallback infrastructure |
US12229384B2 (en) | 2016-07-01 | 2025-02-18 | Wells Fargo Bank, N.A. | Access control interface for managing entities and permissions |
US12229385B2 (en) | 2016-07-01 | 2025-02-18 | Wells Fargo Bank, N.A. | Access control interface for managing entities and permissions |
US12248611B2 (en) | 2016-07-01 | 2025-03-11 | Wells Fargo Bank, N.A. | Unlinking applications from accounts |
US12223091B2 (en) | 2016-07-01 | 2025-02-11 | Wells Fargo Bank, N.A. | Control tower for linking accounts to applications |
US12299657B2 (en) | 2016-07-01 | 2025-05-13 | Wells Fargo Bank, N.A. | Control tower for prospective transactions |
US12206674B2 (en) | 2016-07-01 | 2025-01-21 | Wells Fargo Bank, N.A. | Access control tower |
US12314435B2 (en) | 2016-07-01 | 2025-05-27 | Wells Fargo Bank, N.A. | Control tower for defining access permissions based on data type |
US12198130B2 (en) | 2016-07-01 | 2025-01-14 | Wells Fargo Bank, N.A. | Access control tower |
US12321490B2 (en) | 2016-07-01 | 2025-06-03 | Wells Fargo Bank, N.A. | Scrubbing account data accessed via links to applications or devices |
US12197696B2 (en) | 2016-07-01 | 2025-01-14 | Wells Fargo Bank, N.A. | Access control tower |
US12182376B2 (en) | 2016-07-01 | 2024-12-31 | Wells Fargo Bank, N.A. | Control tower restrictions on third party platforms |
US12174992B1 (en) | 2016-07-01 | 2024-12-24 | Wells Fargo Bank, N.A. | Access control interface for managing entities and permissions |
US12333047B2 (en) | 2016-07-01 | 2025-06-17 | Wells Fargo Bank, N.A. | Scrubbing account data accessed via links to applications or devices |
US11062289B2 (en) * | 2016-07-11 | 2021-07-13 | Wunchun Chau | Point of sale terminal with breakaway cable |
US20180012212A1 (en) * | 2016-07-11 | 2018-01-11 | Wunchun Chau | Point of sale terminal with breakaway cable |
US11301844B2 (en) * | 2016-08-12 | 2022-04-12 | Mastercard International Incorporated | Cryptographic authentication and tokenized transactions |
US11170354B2 (en) * | 2017-03-16 | 2021-11-09 | Perk Hero Software Inc. | Wireless systems and methods for bill payment |
US20220067698A1 (en) * | 2017-03-16 | 2022-03-03 | Perk Hero Software Inc. | Wireless payment systems, devices and methods for electronic payment |
US11514418B2 (en) | 2017-03-19 | 2022-11-29 | Nxp B.V. | Personal point of sale (pPOS) device with a local and/or remote payment kernel that provides for card present e-commerce transaction |
US12387212B2 (en) | 2017-03-20 | 2025-08-12 | Block, Inc. | Configuring verification information at point-of-sale devices |
US11593773B1 (en) | 2017-03-31 | 2023-02-28 | Block, Inc. | Payment transaction authentication system and method |
US10755281B1 (en) | 2017-03-31 | 2020-08-25 | Square, Inc. | Payment transaction authentication system and method |
US20180287852A1 (en) * | 2017-04-03 | 2018-10-04 | Bank Of America Corporation | Data Transfer, Over Session or Connection, and Between Computing Device and One or More Servers to Determine Third Party Routing Network For User Device |
US10716060B2 (en) | 2017-04-03 | 2020-07-14 | Bank Of America Corporation | Data transfer between computing device and user device at different locations and over session or connection to display one or more routing networks to use |
US20180287927A1 (en) * | 2017-04-03 | 2018-10-04 | Bank Of America Corporation | Data Transfer, Over Session or Connection, and Between Computing Device and Server to Determine Third Party Routing Network in Response to Determining Request to Use a Different Routing Network |
US10601934B2 (en) | 2017-04-03 | 2020-03-24 | Bank Of America Corporation | Data transfer, over session or connection, and between computing device and one or more servers for transmitting data to a third party computing device |
US10609156B2 (en) | 2017-04-03 | 2020-03-31 | Bank Of America Corporation | Data transfer, over session or connection, and between computing device and server associated with one or more routing networks in response to detecting activity |
US10608918B2 (en) | 2017-04-03 | 2020-03-31 | Bank Of America Corporation | Data transfer, over session or connection, and between computing device and one or more servers to determine likelihood of user device using a routing network |
US10601718B2 (en) | 2017-04-03 | 2020-03-24 | Bank Of America Corporation | Data transfer, over session or connection, and between computing device and server associated with a routing network for modifying one or more parameters of the routing network |
US10798007B2 (en) | 2017-04-03 | 2020-10-06 | Bank Of America Corporation | Data transfer, over session or connection, and between computing device and server associated with a routing network for modifying one or more parameters of the routing network |
US12299691B2 (en) | 2017-04-25 | 2025-05-13 | Wells Fargo Bank, N.A. | System and method for card control |
US12354111B2 (en) | 2017-04-25 | 2025-07-08 | Wells Fargo Bank, N.A. | System and method for card control |
US11861589B2 (en) | 2017-04-28 | 2024-01-02 | Block, Inc. | Multi-source transaction processing |
US12020235B2 (en) | 2017-04-28 | 2024-06-25 | Block, Inc. | Multi-source transaction processing |
US12373884B2 (en) | 2017-07-06 | 2025-07-29 | Wells Fargo Bank, N.A. | Data control tower |
US11625724B2 (en) * | 2017-10-25 | 2023-04-11 | Capital One Services, Llc | Dynamic modification of a verification method associated with a transaction card |
US20210374745A1 (en) * | 2017-10-25 | 2021-12-02 | Capital One Services, Llc | Dynamic modification of a verification method associated with a transaction card |
US11961091B2 (en) | 2017-10-25 | 2024-04-16 | Capital One Services, Llc | Dynamic modification of a verification method associated with a transaction card |
US20210234848A1 (en) * | 2018-01-11 | 2021-07-29 | Visa International Service Association | Offline authorization of interactions and controlled tasks |
US11855971B2 (en) * | 2018-01-11 | 2023-12-26 | Visa International Service Association | Offline authorization of interactions and controlled tasks |
US11587087B2 (en) * | 2018-01-30 | 2023-02-21 | Visa International Service Association | System and method for biometric fallback authentication |
US20230196365A1 (en) * | 2018-01-30 | 2023-06-22 | Visa International Service Association | System and Method for Biometric Fallback Authentication |
US11907950B2 (en) * | 2018-01-30 | 2024-02-20 | Visa International Service Association | System and method for biometric fallback authentication |
US20210049612A1 (en) * | 2018-01-30 | 2021-02-18 | Visa International Service Association | System and Method for Biometric Fallback Authentication |
US20190251073A1 (en) * | 2018-02-14 | 2019-08-15 | Samsung Electronics Co., Ltd. | Method and interactive device for providing social interaction |
US11620630B2 (en) * | 2018-03-07 | 2023-04-04 | Capital One Services, Llc | Secure payment using a network of wearable devices |
US20210090062A1 (en) * | 2018-03-07 | 2021-03-25 | Capital One Services, Llc | Secure payment using a network of wearable devices |
US11620623B2 (en) | 2018-05-31 | 2023-04-04 | Nxp B.V. | Merchant transaction mirroring for personal point of sale (pPOS) for card present e-commerce and in vehicle transaction |
US11831639B2 (en) | 2018-06-06 | 2023-11-28 | Capital One Services, Llc | Systems and methods for using micro accelerations as a biometric identification factor |
US11132697B2 (en) * | 2018-06-15 | 2021-09-28 | Wells Fargo Bank, N.A. | Risk detection of false customer information |
US11842354B1 (en) | 2018-06-15 | 2023-12-12 | Wells Fargo Bank, N.A. | Risk detection of false customer information |
CN111047341A (en) * | 2018-10-15 | 2020-04-21 | 阿里巴巴集团控股有限公司 | Information processing method and device, server and terminal equipment |
US11775623B2 (en) | 2018-12-05 | 2023-10-03 | Bank Of America Corporation | Processing authentication requests to secured information systems using machine-learned user-account behavior profiles |
US11048793B2 (en) | 2018-12-05 | 2021-06-29 | Bank Of America Corporation | Dynamically generating activity prompts to build and refine machine learning authentication models |
US11036838B2 (en) | 2018-12-05 | 2021-06-15 | Bank Of America Corporation | Processing authentication requests to secured information systems using machine-learned user-account behavior profiles |
US11790062B2 (en) | 2018-12-05 | 2023-10-17 | Bank Of America Corporation | Processing authentication requests to secured information systems based on machine-learned user behavior profiles |
US11120109B2 (en) | 2018-12-05 | 2021-09-14 | Bank Of America Corporation | Processing authentication requests to secured information systems based on machine-learned event profiles |
US12355750B2 (en) | 2018-12-05 | 2025-07-08 | Bank Of America Corporation | Utilizing federated user identifiers to enable secure information sharing |
US11113370B2 (en) | 2018-12-05 | 2021-09-07 | Bank Of America Corporation | Processing authentication requests to secured information systems using machine-learned user-account behavior profiles |
US11159510B2 (en) | 2018-12-05 | 2021-10-26 | Bank Of America Corporation | Utilizing federated user identifiers to enable secure information sharing |
US11176230B2 (en) | 2018-12-05 | 2021-11-16 | Bank Of America Corporation | Processing authentication requests to secured information systems based on user behavior profiles |
US11797661B2 (en) | 2018-12-05 | 2023-10-24 | Bank Of America Corporation | Dynamically generating activity prompts to build and refine machine learning authentication models |
US20240338709A1 (en) * | 2019-03-01 | 2024-10-10 | Shopify Inc. | Secure pin entry via mobile device |
US12045831B2 (en) * | 2019-03-01 | 2024-07-23 | Shopify Inc. | Secure pin entry via mobile device |
WO2020181162A1 (en) * | 2019-03-07 | 2020-09-10 | Mastercard International Incorporated | User verification for credential device |
US11392957B2 (en) | 2019-03-07 | 2022-07-19 | Mastercard International Incorporated | User verification for credential device |
US11379849B2 (en) | 2019-03-07 | 2022-07-05 | Mastercard International Incorporated | Security for contactless transactions |
US11922428B2 (en) | 2019-03-07 | 2024-03-05 | Mastercard International Incorporated | Security for contactless transactions |
US20210287193A1 (en) * | 2019-05-24 | 2021-09-16 | Tencent Technology (Shenzhen) Company Limited | Payment processing method, electronic device, and computer-readable storage medium |
US12093910B2 (en) * | 2019-05-24 | 2024-09-17 | Tencent Technology (Shenzhen) Company Limited | Payment processing methods and apparatus |
US11410172B2 (en) | 2019-12-31 | 2022-08-09 | Mastercard International Incorporated | Methods and systems for verification of operations of computer terminals and processing networks |
US20210390546A1 (en) * | 2020-06-15 | 2021-12-16 | Magtek, Inc. | Systems and Methods for Secure Transaction Processing |
US12238051B2 (en) | 2020-09-04 | 2025-02-25 | Wells Fargo Bank, N.A. | Synchronous interfacing with unaffiliated networked systems to alter functionality of sets of electronic assets |
US12238112B2 (en) | 2021-01-05 | 2025-02-25 | Wells Fargo Bank, N.A. | Digital account controls portal and protocols for federated and non-federated systems and devices |
US20220398587A1 (en) * | 2021-06-09 | 2022-12-15 | Capital One Services, Llc | Electronic profile and data security enforcement with user device data and methods of use thereof |
US20240211954A1 (en) * | 2021-06-09 | 2024-06-27 | Capital One Services, Llc | Electronic profile and data security enforcement with user device data and methods of use thereof |
US12314957B2 (en) * | 2021-06-09 | 2025-05-27 | Capital One Services, Llc | Electronic profile and data security enforcement with user device data and methods of use thereof |
US11928684B2 (en) * | 2021-06-09 | 2024-03-12 | Capital One Services, Llc | Electronic profile and data security enforcement with user device data and methods of use thereof |
US20250238641A1 (en) * | 2024-01-23 | 2025-07-24 | Bank Of America Corporation | System and method to maintain connectivity with a smart card |
Also Published As
Publication number | Publication date |
---|---|
US20200250673A1 (en) | 2020-08-06 |
US12387212B2 (en) | 2025-08-12 |
WO2018175462A1 (en) | 2018-09-27 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US12387212B2 (en) | Configuring verification information at point-of-sale devices | |
US10755281B1 (en) | Payment transaction authentication system and method | |
US10991191B2 (en) | Payment application initiated generation of payment instruments | |
US11593773B1 (en) | Payment transaction authentication system and method | |
US20230245099A1 (en) | Third-party access to secure hardware | |
US10366378B1 (en) | Processing transactions in offline mode | |
US11961091B2 (en) | Dynamic modification of a verification method associated with a transaction card | |
US10783517B2 (en) | Third-party access to secure hardware | |
US10878416B2 (en) | Apparatus, method, and computer program product for bus rapid transit ticketing and the like | |
US11120511B2 (en) | System and method for universal card acceptance | |
US11295291B2 (en) | Low battery and digital wallet | |
CA2949366A1 (en) | Apparatus, method, and computer program product for settlement to a merchant's card account using an on-line bill payment platform | |
US20150081554A1 (en) | Systems and Methods for Managing Mobile Account Holder Verification Methods | |
US12293371B2 (en) | Systems and methods for authentication based on personal network | |
JP2019537776A (en) | Fraud detection in portable payment readers | |
AU2018203167A1 (en) | NFC mobile wallet processing systems and methods | |
US10083443B1 (en) | Persistent authentication of a wearable device | |
WO2018125689A1 (en) | Third-party access to secure hardware |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
STPP | Information on status: patent application and granting procedure in general |
Free format text: DOCKETED NEW CASE - READY FOR EXAMINATION |
|
AS | Assignment |
Owner name: SQUARE, INC., CALIFORNIA Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:BOTROS, PAUL ABRAHAM;FITCH, KATE;SIGNING DATES FROM 20170509 TO 20170510;REEL/FRAME:042381/0209 |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: NON FINAL ACTION MAILED |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: RESPONSE TO NON-FINAL OFFICE ACTION ENTERED AND FORWARDED TO EXAMINER |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: NON FINAL ACTION MAILED |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: RESPONSE TO NON-FINAL OFFICE ACTION ENTERED AND FORWARDED TO EXAMINER |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: NON FINAL ACTION MAILED |
|
STCB | Information on status: application discontinuation |
Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION |
|
AS | Assignment |
Owner name: BLOCK, INC., CALIFORNIA Free format text: CHANGE OF NAME;ASSIGNOR:SQUARE, INC.;REEL/FRAME:058646/0154 Effective date: 20211209 |