[go: up one dir, main page]

US20180268408A1 - Configuring Verification Information At Point-of-Sale Devices - Google Patents

Configuring Verification Information At Point-of-Sale Devices Download PDF

Info

Publication number
US20180268408A1
US20180268408A1 US15/464,079 US201715464079A US2018268408A1 US 20180268408 A1 US20180268408 A1 US 20180268408A1 US 201715464079 A US201715464079 A US 201715464079A US 2018268408 A1 US2018268408 A1 US 2018268408A1
Authority
US
United States
Prior art keywords
payment
payment instrument
cvm
location
transaction
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
US15/464,079
Inventor
Paul Abraham Botros
Kate Fitch
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Block Inc
Original Assignee
Square Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Square Inc filed Critical Square Inc
Priority to US15/464,079 priority Critical patent/US20180268408A1/en
Assigned to SQUARE, INC. reassignment SQUARE, INC. ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: FITCH, KATE, BOTROS, PAUL ABRAHAM
Priority to PCT/US2018/023392 priority patent/WO2018175462A1/en
Publication of US20180268408A1 publication Critical patent/US20180268408A1/en
Priority to US16/799,344 priority patent/US12387212B2/en
Assigned to BLOCK, INC. reassignment BLOCK, INC. CHANGE OF NAME (SEE DOCUMENT FOR DETAILS). Assignors: SQUARE, INC.
Abandoned legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/401Transaction verification
    • G06Q20/4015Transaction verification using location information
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/401Transaction verification
    • G06Q20/4012Verifying personal identification numbers [PIN]
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/08Payment architectures
    • G06Q20/20Point-of-sale [POS] network systems
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/08Payment architectures
    • G06Q20/20Point-of-sale [POS] network systems
    • G06Q20/202Interconnection or interaction of plural electronic cash registers [ECR] or to host computer, e.g. network details, transfer of information from host to ECR or from ECR to ECR
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/08Payment architectures
    • G06Q20/20Point-of-sale [POS] network systems
    • G06Q20/206Point-of-sale [POS] network systems comprising security or operator identification provisions, e.g. password entry
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/30Payment architectures, schemes or protocols characterised by the use of specific devices or networks
    • G06Q20/32Payment architectures, schemes or protocols characterised by the use of specific devices or networks using wireless devices
    • G06Q20/322Aspects of commerce using mobile devices [M-devices]
    • G06Q20/3224Transactions dependent on location of M-devices
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/30Payment architectures, schemes or protocols characterised by the use of specific devices or networks
    • G06Q20/32Payment architectures, schemes or protocols characterised by the use of specific devices or networks using wireless devices
    • G06Q20/326Payment applications installed on the mobile devices
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/30Payment architectures, schemes or protocols characterised by the use of specific devices or networks
    • G06Q20/34Payment architectures, schemes or protocols characterised by the use of specific devices or networks using cards, e.g. integrated circuit [IC] cards or magnetic cards
    • G06Q20/356Aspects of software for card payments
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/401Transaction verification
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/401Transaction verification
    • G06Q20/4016Transaction verification involving fraud or risk level assessment in transaction processing
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/401Transaction verification
    • G06Q20/4018Transaction verification using the card verification value [CVV] associated with the card
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/405Establishing or using transaction specific rules
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/409Device specific authentication in transaction processing

Definitions

  • POS point-of-sale
  • mobile POS devices may use these POS devices to engage in transactions with customers at different locations.
  • POS point-of-sale
  • a taxi driver may use a mobile POS device to charge a passenger for a taxi ride.
  • a street vendor may use a mobile POS device to charge a customer for an item purchased from the street vendor.
  • a merchant may use a stationary POS device to process a payment transaction at a store. Operators of traditional payment infrastructure, such as card networks and issuing banks, often struggle to adapt to this changing landscape of POS devices.
  • FIG. 1 illustrates an example environment that includes a merchant operating a mobile point-of-sale (POS) device to conduct transactions with multiple different customers.
  • the POS device dynamically configures verification information to request from the customers that a cardholder verification method (CVM) specifies.
  • CVM cardholder verification method
  • the POS device, payment server, or an issuing bank may determine, based on a type of payment instrument provided by a customer and risk analysis of the payment instrument, whether to request verification information as specified by a default CVM, configure the CVM or ignore CVM requirement altogether.
  • FIGS. 2A and 2B illustrate a flow diagram of a process for determining whether to request verification information as specified by a default CVM or whether to configure the CVM and request verification information in accordance with the reconfigured CVM.
  • FIG. 3 illustrates a flow diagram of a process for determining whether to modify a CVM based on an attribute or identifier of a received payment instrument, and requesting first or second verification information depending upon whether or not the order has been modified.
  • FIG. 4 illustrates select components of a POS device that a merchant described herein may utilize.
  • FIGS. 5A, 5B, and 5C illustrates select components of a POS device that a merchant described herein may utilize.
  • Some implementations described herein include techniques and arrangements for dynamically configuring and/or reconfiguring verification information at point-of-sale (POS) devices based on a payment instrument presented at the time of a payment transaction and at a specific location.
  • POS point-of-sale
  • a customer presenting a credit card while holding a device executing an application of the entity that issued the credit card may not provide a primary or secondary verification.
  • a customer presenting a credit card in the absence of a registered mobile device or mobile device executing a registered application with the issuing entity may be asked to provide a primary or secondary verification, for example a PIN or signature, or a PIN followed by signature, based on a risk rating of the transaction.
  • a POS device may be programmed to implement a cardholder verification method (CVM) that specifies the POS device to request verification information from a customer engaging in a transaction at the POS device, where the verification information or request for verification information that is specific to the customer, transaction or an attribute of the payment instrument.
  • CVM cardholder verification method
  • the POS device may initially receive (e.g., via a swipe, a dip, manual entry, etc.) information from a payment instrument (e.g., credit card, bank card, debit card, etc.).
  • the POS device may then, with the issuing entity and a payment server, determine whether the POS device can request additional, different or no verification information and, if so, the manner and kind of information to request.
  • This additional verification information may comprise a personal identifier number (PIN) associated with the payment instrument, a signature of the cardholder, an answer to a security question associated with the cardholder, biometric information from the cardholder, a combination of any of the above, or even absence of any CVM.
  • PIN personal identifier number
  • the POS device may process the transaction without CVM and under the condition that the issuing entity will approve the transaction absent CVM.
  • various conditions may trigger configuration or reconfiguration of CVM.
  • the trigger condition may be based on detection of a registered mobile device at the time of a payment transaction, i.e., if the card holder has registered with the payment server its mobile device and/or associated the mobile device with the payment instrument.
  • the trigger condition may be based on detection of a financial application, such as an application that facilitates management of payment transactions using the payment instrument, installed on a device associated with the user or any device at the location where the transaction is taking place.
  • the trigger condition instead of relying on presence of a device, the trigger condition may be based on an absence of a registered device or financial or payment application.
  • a POS device as described herein may determine, based on one or more attributes of a received payment instrument, specifications or capabilities of the receiving POS device, risk logic implemented by a payment server, and/or the like, whether to request CVM, modify default CVM into a specific CVM, or change the order of CVM for a specific cardholder, payment instrument or transaction. For instance, while the CVM may initially instruct a POS device to request a PIN number from a cardholder, the processor of the issuing entity may determine that the CVM order should be modified such that a signature is requested rather than the PIN. After determining whether to modify the CVM order, the POS device may request verification in accordance with the (potentially modified) order. For instance, the POS device may request first verification information from the user, followed by second verification information if the first verification information does not authorize the transaction, and the like, until the transaction/payment instrument is authorized or each piece of verification information from the CVM has been requested.
  • the CVM may initially instruct the POS device to request a specific set of inputs, such as a PIN and signature of the user, however, if the issuing entity detects a payment application executing on a device registered with the user or user's payment instrument and in proximity to the POS device, the issuing entity may generate a CVM specific to the payment instrument, or even relax the requirement of CVM.
  • a specific set of inputs such as a PIN and signature of the user
  • the POS device detects devices in proximity to itself, for example through sensors, transmitters, receivers, antenna, etc.
  • the POS device can also, additionally or optionally, obtain device information, such as device identifier, device type, etc.
  • the POS device may be triggered to obtain device information when a user presents a payment instrument for payment of a payment transaction, or otherwise approaches a payment reader or POS device. In this manner, the most proximate communication device to the POS device, in the context of the current payment transaction or payment instrument, can be determined.
  • the POS device extracts payment information, such as the payment card number, the verification number, the cardholder identifier such as name, etc., and the device information.
  • the POS device sends the payment information, including the cardholder identifier and device information, to the issuing entity, for example through an intermediate entity such as acquirer, processor of card processing network, and the payment processing server.
  • the issuing entity based on the payment information or the cardholder identifier, determines whether a device is registered with the cardholder and/or a financial application is installed on the device registered with the cardholder. The issuing entity then contacts or otherwise communicates with the registered device to determine its location.
  • the issuing entity has access to the location of the communication device, for example through a previous registration, and does not need to explicitly communicate with the device for location information. Using the location information of the registered device, the issuing entity determines whether the location is the same as the location of the payment transaction (indicated by the POS device, proximate devices, payment instrument or a chip therein) and if the location matches or is otherwise similar, the issuing entity may reconfigure the CVM requirement to be specific to the payment instrument. In one instance, the issuing entity may determine a risk score to be lower than a threshold value and even remove the requirement to request CVM because the issuing entity has enough information to tag the transaction as sufficiently secure.
  • the payment server or POS device may reconfigure the CVM as per location determination and comparison made by the issuing entity.
  • the CVM may be configured to be a different CVM or no CVM as the case may be.
  • the CVM specified by the card network can be applied if the location of the registered device is substantially dissimilar from the location of the devices where the payment transaction is occurring or has occurred. Alternatively, a more stringent CVM or multiple rounds of authentication can be requested to further secure the payment transaction.
  • dynamically reconfiguring CVM may result in a more efficient and seamless transaction between a merchant and a customer.
  • payment instruments associated with a particular card network might not accept certain verification information when input into a particular type of POS device.
  • the card network might not accept PIN numbers entered into a device that does not include a dedicated hardware device for receiving PIN numbers (but that instead includes a touch screen or the like for receiving this information). Therefore, a POS device may determine when it receives a payment instrument associated with this card network and may dynamically reconfigure the CVM after processor of the issuing entity has executed a risk check and determined secondary means to authenticate the transaction (for example, based on location of the payment transaction or historical trends associated with the user, user's payment instrument or even the merchant.
  • the issuing entity via the POS device, may reorder the CVM, which may include removing “PIN” as a type of verification information to request and moving “signature” into a first slot in the order.
  • the POS device may then request a signature in lieu of a PIN, thus avoiding the situation where a cardholder enters her PIN, learns from the merchant that the PIN has not been accepted, and then is asked to provide a signature.
  • the POS device will skip straight to requesting a signature form the cardholder, thus resulting in a quicker transaction that potentially prevents embarrassment to the merchant and/or the cardholder, but without risking the security of the payment transaction.
  • the transaction when sent for processing, may include data or a flag that indicates that the issuing entity had approved a modified CVM based on the location of the payment instrument, registration of the user's device, and other such factor.
  • the card network can use this data to process the transaction in the absence of CVM typically enforced by the card network.
  • the systems and methods described herein improve and simplify authentication that in turn will reduce observed fraud.
  • networks either default to less secure forms of authentication (and take the liability) or use alternate hardware (or in the most extreme case cannot accept the transaction). Both of these options are not ideal and also some CVMs may slow down the transaction time or make it less secure.
  • the open payment platform described herein is designed to work with all mobile devices, any issuer, and is extensible to other platforms.
  • Some implementations describe payment applications to be installed on user phone. As such, the implementations are aligned with longer term industry trends involving use of mobile devices and greater consumer control in the payment process, moving payments to the buyer.
  • Such implementations also provide flexibility for any changes as the rule engine may reside in the server or the issuer and move away from the POS terminal.
  • Some of the implementations offer dynamic risk controls to allow the issuers to dynamically set and control authentication limits, manage risk, and assign CVMs accordingly.
  • the dynamic risk controls are based on one or more attributes, such as merchant attribute, e.g., merchant code, geography, observed fraud, buyer attribute, e.g., credit line, credit balance, and risk profile based on current and/or past transactions, authentication method, e.g., geo-location, biometric input, one time password or text message, etc.
  • Some implementations also offer increased engagement with the banking infrastructure thus driving more users to the platform, for example more users engage with the mobile payment applications, which are the main touch point for customers, which in turn increases the propensity for updated contact details and also gives the issuers the opportunity to display other data as part of the transaction, e.g., balance, last time visited, etc.
  • the implementations described herein offer options to perform authentication for the payment flow with other terminals that may or may not be connected to the existing payment infrastructure.
  • a merchant may include any business engaged in the offering of goods or services for acquisition by buyers. Actions attributed to a merchant may include actions performed by owners, merchants, or other agents of the merchant and thus no distinction is made herein unless specifically discussed.
  • a buyer or customer or user may include any entity that acquires goods or services from a merchant, such as by purchasing, renting, leasing, borrowing, licensing, or the like.
  • goods and/or services offered by merchants may be referred to as items.
  • a merchant and a buyer may interact with each other to conduct a transaction in which the buyer acquires an item from a merchant, and in return, the buyer provides payment to the merchant, for example through a payment instrument issued by an issuing entity.
  • a ‘payment transaction’ or simply ‘transaction’ may include a financial transaction for the acquisition of goods and/or services that is conducted between a buyer and a merchant.
  • the buyer can provide the amount that is due to the merchant using a payment instrument or a payment proxy for the payment instrument.
  • the payment transaction includes transfer of money from one party to another for any number of reasons.
  • buyer and merchant parties to the payment transaction, it will be understood that the parties can be a sender and a recipient, a land lord and a renter, a bank and a bank customer, a first friend and a second friend, and so on.
  • the term ‘payment card,’ ‘payment instrument,’ or ‘payment object’ refers to a payment mechanism that includes a conventional debit card, a conventional credit card, a prepaid gift card, or the like, a smartcard that has an embedded integrate circuit chip (e.g., Europay-MasterCard-visa (EMV) card), a proxy card, or any card that functions as a combination of any of these mechanisms.
  • EMV Europay-MasterCard-visa
  • proxy card refers to a card that may or may not bear a card number or an account number that appears to be that of a real credit or debit card account (i.e., it is in the correct format), but where that card/account number is actually only a proxy for the buyer's real card/account number.
  • the payment card used in the example above is a specific type of a financial instrument.
  • Other types of financial instruments, other than the payment card, can be used to initiate the transfer of funds.
  • a financial instrument can be a software instrument or virtual instrument, such as a virtual wallet.
  • Other examples of payment card may also include a prepaid card, a gift card, a rewards card, a loyalty points' card, a frequent flyer miles card, a check, cash, or any other kind of payment instrument that holds financial value or provides a promise to pay at a later time.
  • Payment card may also include a payment object, such as an electronic device configured to initiate contactless payment transactions, e.g., a key fob, a mobile device (such as a mobile device having an NFC tag).
  • the payment object can also be a payment proxy having a syntax of a monetary indicator followed by a string of alphanumeric characters or in general, any identifier that is representative of the buyer or merchant's financial account.
  • the payment proxy can be used in the context of and within a webpage as part of the web address, a social networking handle or username, a forum, a messaging application, and so on.
  • biometric payment instrument is a type of payment object or financial instrument that is biometrically identifiable and initialized by a biometric characteristic, such as a person's finger (e.g., for fingerprint recognition), face, iris or retina, heartbeat, voice, etc.
  • the CVM can include a PIN, signature, or a biometric input, such as a fingerprint or iris scan.
  • the payment object reader may be a magnetic stripe card reader, optical scanner, smartcard (card with an embedded IC chip) reader (e.g., an EMV-compliant card reader or NFC enabled reader), radio frequency identification (RFID) reader, or the like, configured to detect and obtain data off any payment object.
  • the payment object reader may include hardware implementation, such as slots, magnetic tracks, and rails with one or more sensors or electrical contacts to facilitate detection and acceptance of a payment object.
  • the payment object reader may also include a biometric sensor to receive and process biometric characteristics and process them as payment instruments, given that such biometric characteristics are registered with the payment processing system and connected to a financial account.
  • the POS terminal can be a hand-held device such as a mobile phone, laptop, tablet computer, and the like, associated with a merchant.
  • the POS terminal is a mobile device that is wearable or otherwise connected to or associated with the buyer or merchant, for example, the computing device may be an Apple® watch or a Fitbit®.
  • the term ‘payment application’ or ‘financial application’ includes any application configured for management of payment transactions connected to a payment instrument or multiple payment instruments issued by a single entity or multiple entities to a user.
  • the financial application can also provide the user with financial information, option to open an account with the issuing entity, dispense physical cash, transfer cash electronically, pay bills, apply for loans, make deposits, obtain assistance from the agent, monitor spending habits, get financial advice, set spending goals, manage transaction and spending limits, and the like.
  • the term “payment application” as used here can also refer to or include any messaging application that enables communication between users (e.g., sender and recipient of a message) over a wired or wireless communications network, or devices, for example between an issuing entity and the user's communication device.
  • a payment processing system that delivers a communication service to users can employ the messaging application.
  • the messaging application can include, for example, a text messaging application for communication between phones (e.g., conventional mobile telephones or smartphones), or a cross-platform instant messaging application for smartphones and phones that use the Internet for communication.
  • the message can also be to confirm the location of the user or obtain an approval to extract location of the user.
  • this specification may employ text messages as an example, it is to be understood that the technology may employ any of these types of messages.
  • the messaging application Upon receiving an indication to send (e.g., after detecting that the user has clicked “Send”), the messaging application transmits a message, e.g., the text message to a messaging application computer system (“messaging application system”).
  • the term “pairing” or “associating” refers to a process in which the POS terminal and the payment object reader establish a communication channel with each other using wireless communication protocols, for example, Bluetooth®, Bluetooth Low Energy®, Wi-Fi®, etc.
  • the POS terminal and the payment object reader each includes a transceiver capable of transmitting data between them once “paired.”
  • the pairing technology described herein can pair a payment object reader to the POS terminal in both real-time and offline modes.
  • Bluetooth or Bluetooth Low Energy has been used to describe certain embodiments, other wireless protocols, such as NFC, Wi-Fi, etc., can also be used.
  • the term “communication network” may be any type of network known in the art, such as a local area network or a wide area network, such as the Internet, and may include a wireless network, such as a cellular network, a cloud network, a local wireless network, such as Wi-Fi and/or close-range wireless communications, such as Bluetooth and Bluetooth low energy, near field communications (NFC), a wired network, or any other such network, or any combination thereof.
  • the network may include both wired and/or wireless communication technologies, including Bluetooth, Bluetooth low energy, Wi-Fi and cellular communication technologies like worldwide interoperability for microwave access (Wi-MAX), 3G, 4G, CDMA, digital subscriber line (DSL), etc., cloud computing technologies, as well as wired or fiber optic technologies.
  • the communication network may be a mesh network.
  • network devices may be configured to receive and forward communications, which are ultimately destined for a different device.
  • These types of networks are generically referred to as “mesh” networks, where network nodes may form a “mesh” of paths for which communications may travel to reach their destination.
  • Wireless networks may use beacon transmissions to advertise the network's existence, as well as provide information about the network and capabilities associated with the network.
  • Different kinds of beaconing mechanisms may be used, for example, one for infrastructure mode networks (also called basic service set (BSS) networks) and one for ad-hoc mode networks (also called independent basic service set (IBSS) networks).
  • BSS basic service set
  • IBSS independent basic service set
  • APs access points
  • APs access points
  • APs access points
  • APs access points
  • APs access points
  • BSS beacons infrastructure network beacons
  • Components used for such communications can depend at least in part upon the type of network, the environment selected, or both. Protocols for communicating over such networks are well known and are not discussed herein in detail.
  • swipe refers to any manner of triggering a payment object reader to read data from a payment object, such as by dipping into, tapping, hovering, bringing in close contact or passing the payment object into or through a payment object reader.
  • the use of the terms such as “first,” “second,” “third,” “upper,” “lower,” and the like do not denote any spatial, sequential, or hierarchical order or importance, but are used to distinguish one element from another. It is to be appreciated that the use of the terms “and/or” and “at least one of”, for example, in the cases of “A and/or B” and “at least one of A and B”, is intended to encompass the selection of the first listed option (A) only, or the selection of the second listed option (B) only, or the selection of both options (A and B).
  • such phrasing is intended to encompass the selection of the first listed option (A) only, or the selection of the second listed option (B) only, or the selection of the third listed option (C) only, or the selection of the first and the second listed options (A and B) only, or the selection of the first and third listed options (A and C) only, or the selection of the second and third listed options (B and C) only, or the selection of all three options (A and B and C).
  • This may be extended, as readily apparent by one of ordinary skill in this and related arts, for as many items listed.
  • the computing system can include clients and servers.
  • a client and server are generally remote from each other and typically interact through a communication network. The relationship of client and server arises by virtue of computer programs running on the respective computers and having a client-server relationship to each other.
  • a server transmits data (e.g., an HTML page) to a client device (e.g., for purposes of displaying data to and receiving user input from a user interacting with the client device).
  • data generated at the client device e.g., a result of the user interaction
  • any block diagrams, steps, or sub-processes herein represent conceptual views of illustrative systems embodying the principles of the present subject matter.
  • any flow charts, flow diagrams, state transition diagrams, pseudo code, and the like represent various processes which may be substantially represented in computer readable medium and so executed by a computer or processor, whether or not such computer or processor is explicitly shown.
  • the order in which the methods are described are not intended to be construed as a limitation, and any number of the described method blocks can be deleted, moved, added, subdivided, combined, and/or modified in any order to implement the methods, or an alternative combination or sub-combinations.
  • steps, sub-processes or blocks are at times shown as being performed in series, some steps, sub-processes or blocks can instead be performed in parallel, or can be performed at different times as will be recognized by a person of ordinary skill in the art. Further any specific numbers noted herein are only examples; alternative implementations can employ differing values or ranges. Furthermore, the methods can be implemented in any suitable hardware, software, firmware, or combination thereof.
  • the payment object readers and POS terminals are shown as including distinct components, this is merely for ease of illustration and not intended as limiting.
  • the payment object readers and POS terminals may be identical, similar or distinct.
  • the components shown and described for the payment object readers and POS terminals may be implemented as more components or as fewer components and functions described for the components may be redistributed depending on the details of the implementation.
  • configuration, structure, and operational characteristics of the payment object readers and/or POS terminals may vary from device to device.
  • payment object readers and the POS terminals can each be any appropriate device operable to send and receive data, requests, messages, electronic messages, text messages, alerts, notifications, pop-up messages, push notifications, or other types of information over the one or more networks or directly to each other.
  • inventions can be embodied as special-purpose hardware (e.g., circuitry), as programmable circuitry appropriately programmed with software and/or firmware, or as a combination of special-purpose and programmable circuitry.
  • embodiments may include a machine-readable medium having stored thereon instructions that may be used to cause one or more processors to perform the methods, variations of the methods, and other operations described here.
  • the machine-readable medium may include, but is not limited to, floppy diskettes, optical discs, compact disc read-only memories (CD-ROMs), magneto-optical discs, read-only memories (ROMs), random access memories (RAMs), erasable programmable read-only memories (EPROMs), electrically erasable programmable read-only memories (EEPROMs), application-specific integrated circuits (ASICs), magnetic or optical cards, flash memory, or other type of media/machine-readable medium suitable for storing electronic instructions.
  • CD-ROMs compact disc read-only memories
  • ROMs read-only memories
  • RAMs random access memories
  • EPROMs erasable programmable read-only memories
  • EEPROMs electrically erasable programmable read-only memories
  • ASICs application-specific integrated circuits
  • FIG. 1 illustrates an example environment 100 that includes a merchant 102 operating a point-of-sale (POS) device 104 to engage in various transactions with customers 106 - 1 , 106 - 2 , . . . , 106 -N (collectively referred to as customers 106 ) equipped with communication devices 107 - 1 , 107 - 2 , . . . 107 -N (collectively referred to as communication devices 107 ) and payment instruments 116 - 1 , 116 - 2 , . . . 116 -N (collectively referred to as payment instruments 116 ).
  • POS point-of-sale
  • a merchant 102 may include any business engaged in the offering of goods or services for acquisition by customers. Actions attributed to a merchant 102 may include actions performed by owners, merchants, or other agents of the merchant 102 and thus no distinction is made herein unless specifically discussed.
  • a customer 106 may include any entity that acquires goods or services from a merchant 102 , such as by purchasing, renting, leasing, borrowing, licensing, or the like.
  • goods and/or services offered by merchants 102 may be referred to as items.
  • a merchant 102 and a customer 106 may interact with each other to conduct a transaction in which the customer 106 acquires an item from a merchant 102 , and in return, the customer 106 provides payment to the merchant 102 through a payment instrument 116 .
  • the customers 106 may be equipped with payment instruments 116 , such as credit card, debit card, gift card, near-field communication (NFC) based payment instrument, and the like, and communication devices 107 , such as smart phones, tablet computers, laptops, mobile wearable devices like Apple® watch or a Fitbit®, or other mobile data processing apparatus, that may have executing or installed thereon one or more web or mobile applications to support various functionalities.
  • the communication devices 107 may be configured to respond to requests from other devices, such as the POS device 104 to provide its exact location, approximate location, or location relative to another device. In some implementations, the communication device 107 may allow other devices to check whether or not the device 107 is within a marked geo-fence.
  • the POS device 104 or the communication device 107 may hereinafter also be referred to as the payment device.
  • the communication device 107 may also have executing or installed thereon payment applications 111 .
  • the payment application 111 can include an interface for the user to select the payment instrument 116 or otherwise track transactions made through the payment instrument 116 .
  • multiple payment instruments 116 issued by the same or different issuing entity, can be accessed by a single payment application 111 .
  • the payment application 111 can be an instance of the payment instrument, for example a virtual wallet.
  • the payment application for example a web or mobile application
  • the payment application 111 may be associated with the payment instrument 116 , the device or its identifier, and the entity that has issued the payment instrument, for example, issuer 128 , through the process of registration.
  • the registration process may also trigger the user to allow the issuer 128 to obtain and store the device information (e.g., device identifier), environment information (e.g., location of the point of transaction, location of device, or location of the payment instrument, etc.), or the user information (location of the user, user identifier, etc.) indicative of the device.
  • the device information e.g., device identifier
  • environment information e.g., location of the point of transaction, location of device, or location of the payment instrument, etc.
  • the user information location of the user, user identifier, etc.
  • the issuer 128 may also store information of the issuer-device relationship in the device. Such information may be correlated with the user data and saved in the issuer 128 .
  • the processor of the issuing entity herein referred to as issuer 128 , may include a rule engine (not shown) to map received data from the user or user device with a stored value of the user and device association, for example, to confirm whether a prior relationship exists and based on that, further determine a level of risk associated with the transaction. If the level of risk is lower than a predetermined threshold, for example, as set by the card processing network or the issuer, the issuer 128 can remove the requirement for a CVM as dictated by the card processing network or even change the CVM.
  • the issuer 128 can again either apply a stringent or multi-level CVM or even decline the transaction as being too risky. While some embodiments describe confirmation of a user device to be present at the time of payment transaction, this is no way should limit the present subject matter.
  • the issuer checks whether a payment application or an identifier is trackable irrespective of where the device is present at the time of payment transaction. For example, the issuer sends a query to the device on record to determine whether it is a legitimate device and subsequently configures the CVM or requirement for CVM. Approval via geo-location (and other forms of location) can be so seamless the buyer does not necessarily need have their phone in hand. Without knowing, the users can have an extremely secure transaction.
  • a transaction may include a financial transaction for the acquisition of goods and/or services that is conducted between the customer and the merchant.
  • the customer can provide the amount that is due to the merchant using a payment instrument 116 (e.g., a debit card, a credit card, a stored-value or gift card, a check, through an electronic payment application on a device carried by the customer, or the like).
  • the merchant 102 can interact with the POS device 104 to process the transaction, such as by inputting (e.g., manually, via a magnetic card reader or an RFID reader, etc.) an identifier associated with the payment instrument 116 .
  • a payment instrument 116 of one of the customers 106 may include one or more magnetic strips for providing card and customer information when swiped in a card reader.
  • other types of payment cards may be used, such as smart cards having a built-in memory chip that is read by the device 104 when the card is “dipped” into the reader, or tapped onto a surface or in proximity to the surface of the reader having a radiofrequency identification tag, or so forth.
  • the attribute of the payment instrument can be an identifier that indicates whether the instrument has a magnetic strip or a chip and information stored thereon.
  • the attribute can also be a cost of the payment transaction for which the payment instrument is being authorized, a hardware capability of the POS device, that is whether the POS device is capable of accepting EMV cards, magnetic cards, NFC based instruments, and so on, the location of the payment transaction, and the identity of the entity issuing the payment instrument.
  • the POS device 104 may comprise any sort of mobile or non-mobile device that includes an instance of a merchant application that executes on the respective device (as illustrated in FIG. 4 ).
  • the merchant application may provide POS functionality to the POS device 104 to enable the merchant 102 (e.g., an owner, merchants, etc.) to accept payments from the customers 106 .
  • the POS device 104 may correspond to a store or other place of business of the merchant, and thus, may be a fixed location that typically does not change on a day-to-day basis.
  • the POS device 104 may change from time to time, such as in the case that the merchant operates a food truck, is a street vendor, a cab driver, etc., or has an otherwise mobile business, e.g., in the case of merchants who sell items at buyer's homes, places of business, and so forth.
  • the POS device 104 may include sensors (not shown), such as accelerometers, microphones, GPS/location sensors, light detection sensors, proximity sensors, gravity detection sensors, magnetic field detection sensors, electrical field detection sensors, vibration sensors, pressure sensors, humidity sensors, and the like, to measure a physical quantity and convert it into a signal that may be used to detect exact, approximate, or relative location of devices from the device 104 .
  • the location sensors may be internal and/or external to the device 104 . Exemplary location sensors include, but are not limited to, a cellular radio or modem, a GPS receiver, a Wi-Fi adapter or modem, a BLUETOOTH brand communication service element, a three-dimensional motion sensor, or the like.
  • the device 104 can also set up a geo-fence and detects one or more devices that enter and/or exit the geo-fence.
  • the location of the device 104 may represent a status (e.g., inside and/or outside the geo-fence) or an actual determination location (e.g., coordinates).
  • the device 104 may perform particular actions based on the determined location of the devices relative to the geo-fence.
  • the device 104 detects the location and saves the information both on the POS device 104 and the issuer 128 .
  • the POS device 104 is also configured to receive a payment instrument or multiple payment instruments to satisfy at least a portion of the cost of the payment transaction. For example, a single payment card or several cards or other payment objects may be used in a single payment transaction. The cost may be split between several cards based on incentives associated with the cards or availability of funds on accounts connected to the cards.
  • the POS device 104 can obtain payment transaction information describing the transaction, such as the attribute or identifier of the payment instrument, identity of the customer based on identifier of the payment instrument, identity of the customer based on information in track or records of the payment instrument, an amount of payment received from the customer, the item(s) acquired by the customer, a time, place and date of the transaction, a card network associated with the payment instrument, an issuing bank of the payment instrument, and so forth.
  • payment transaction information describing the transaction such as the attribute or identifier of the payment instrument, identity of the customer based on identifier of the payment instrument, identity of the customer based on information in track or records of the payment instrument, an amount of payment received from the customer, the item(s) acquired by the customer, a time, place and date of the transaction, a card network associated with the payment instrument, an issuing bank of the payment instrument, and so forth.
  • the POS device 104 can also determine information related to devices surrounding or in proximity to the POS device 104 .
  • the sensors such as location sensors, global positioning systems (GPS) units, Wi-Fi Positioning Systems (WPS), etc.
  • the sensors can detect surrounding or proximate devices based on location detection protocols, including triangulation triangulation, trilateration, multi-laterations, geo-fence, global or local positioning systems, and by leveraging device profile obtained through the sensors.
  • triangulation of data may be by “direct” triangulation, e.g., as where the identity of the buyer device is determined from the point of intersection (or the point of least squares fit) of multiple device profiles.
  • triangulation may be “indirect,” as where the identity of the buyer device is determined not only from the device profiles, but also from relative profiles originating from other devices in the proximity or even historical purchases.
  • the present subject matter also includes implementations where locations are reported by other buyer devices in a “crowdsourced” manner.
  • the POS device 104 can send the transaction information and location information to a payment service 108 over a network 110 , either substantially or contemporaneous to the conducting of the transaction (in the case of online transactions) or later when the device 104 is in the online mode (in the case offline transactions).
  • the POS device 104 is configured to work in both offline and online modes.
  • the POS device 104 may store one or more characteristics associated with the transaction (i.e., the transaction information), such as a cost of the transaction, a time of day at which the transaction occurred, a day of the week at which the transaction occurred, a location at which the transaction took place, an item that the customer obtained, and a payment instrument used in the transaction.
  • the POS device 104 may provide the stored information to the payment service 108 over the network 110 .
  • the network 110 may represent any one or more wired or wireless networks, such as a Wi-Fi network, a cellular network, or the like.
  • the POS device may send this information to the payment service 108 over the network 110 substantially contemporaneously with the transaction with the customer.
  • the payment service 108 may include a processor 118 , a memory 120 having components, such as a payment processing component 122 and a rule engine 123 described later.
  • the CVM is static and fixed, i.e., does not vary with the user or payment instrument. By static, the CVM does not change based on the nature of transaction or the type of payment instrument. By fixed, the card network stores the CVM based on the type of card and issuer 128 . The CVM can further include a specific order regardless of risk or other factors.
  • the POS device 104 is configured to implement a cardholder verification method (CVM) that specifies verification information (or a modified order of verification information) to request from customers and the circumstances in which to request this information, based on the attribute of the payment transaction and a risk score computed based on the obtained attribute.
  • CVM cardholder verification method
  • the CVM may indicate that transactions for amounts over a threshold amount (e.g., $50) will only be authorized when verification information—in addition to the information stored by a customer's payment instrument—is provided by the customer.
  • This information may include a personal identification number (PIN) associated with the payment instrument, a password with the payment instrument, a signature of the cardholder, or the like.
  • PIN personal identification number
  • the CVM is saved against each payment instrument at the card processing network 124 .
  • the card processing network 124 includes an association of the payment instrument (PI) 116 ( 1 ) with a CVM-1, payment instrument 116 ( n ) with CVM-n, and so on.
  • a processor 104 associated with an issuer may have additional insight into the payment instrument, which when compared to the data reported by the POS device 104 at the time of payment transaction can indicate a different CVM or even remove the requirement for CVM, if the risk associated with the transaction is significantly low.
  • POS device 104 may be configured (e.g., via the merchant application executed on the device 104 ) to generate instructions that indicate a modification of an order of the CVM based on payment device or payment instrument attributes, such as a card network associated with a payment instrument/device, a brand of the payment instrument/device, an issuing bank of the payment instrument, whether the payment instrument includes a magnetic strip or a memory chip, or the like, or a new CVM altogether.
  • FIG. 1 illustrates, at 112 , that the processor of the issuing entity, also referred to as issuer 128 , is configured to implement a first CVM 114 ( 1 ) when the POS device 104 receives a first payment instrument 116 ( 1 ), and a second CVM 114 ( 2 ) when the POS device 104 receives a second payment instrument 116 ( 2 ).
  • issuer 128 the processor of the issuing entity
  • the issuing entity 128 is configured to implement a first CVM 114 ( 1 ) when the POS device 104 receives a first payment instrument 116 ( 1 ) in the absence of a communication device 107 - 1 , and a second CVM 114 ( 2 ) when the POS device 104 receives a first payment instrument 116 ( 1 ) in the presence of a communication device 107 - 1 executing an instance of a payment application irrespective of the CVM 126 imposed by the card network processor 124 .
  • the payment instrument 116 ( 1 ) is tied to device 107 - 1 and such a relationship may have been established when an application 111 associated with the issuing entity 128 was installed by the customer.
  • the payment instrument 116 ( 2 ) is associated with device 107 - 2 and such a relationship is also established at the time of registration of an application 111 or another device registration application or the like. Not all devices may be registered and as such the CVM recommended by the card network processor 124 is applied at the POS device 104 .
  • the table or database 112 is used for mapping the payment instrument with device identifier, collected, for example at the time of registration, and a device-specific CVM.
  • the issuer 128 may also compute a risk score and accordingly, select CVM best suited to the risk levels of the payment transaction.
  • the first payment instrument 116 ( 1 ) represents a payment instrument associated with a first card network (e.g., Visa®, MasterCard®, American Express®, Diner's Club®, Discover®, etc.), while the payment instrument 116 ( 2 ) represents a payment instrument associated with a different card network.
  • the first order 114 ( 1 ) specifies that the POS device 104 is first to request a PIN from a cardholder (or “customer”) first, and a signature second, and so forth.
  • the second order 114 ( 2 ) instructs the POS device 104 requesting a signature first.
  • the POS device 104 may send this information to the payment service, which in turn may attempt to authorize the transaction and send a result back to the POS device.
  • the example shown at 112 represents a scenario where a card network associated with the payment instrument 114 ( 2 ) does not accept PINs received from the mobile POS device 104 and, therefore, the POS device dynamically modifies the first, default order 114 ( 1 ) of the CVM in response to identifying the card network associated with the second payment instrument 116 ( 2 ).
  • FIG. 1 illustrates two different payment instruments and corresponding CVM orders, it is to be appreciated that any other number of payment instruments and corresponding CVM orders may be utilized.
  • the payment service 108 may include one or more processors 118 and memory 120 , which may store a payment processing component 122 .
  • the payment processing component 122 may function to receive the information regarding a transaction from the POS device 104 and attempt to authorize the payment instrument used to conduct the transaction. The payment processing component 122 may then send an indication of whether the payment instrument has been approved or declined back to the POS device 104 .
  • the payment processing component 122 is also configured to process transactions, collect information related to the transaction, parse the information, and encrypt relevant information for the issuing entity 128 .
  • the payment processing component 122 also stores the transaction information for post-transaction activities, such as pattern detection and trend analysis on transactions corresponding to the user, merchant or their locations.
  • the rule engine 123 is configured to create various kinds of rules for a user, device, merchant, location or a particular transaction.
  • the rules can provide access to a variety of operating standards that may be applied to any given transaction between a merchant and a user, such as transaction fee, tax, etc., based on transaction or nature of transaction.
  • the rules engine 123 may also apply a risk analysis, for example in real-time, based on anomalies in behavior of the customer or the device associated with the customer.
  • the rule engine 123 is configured to detect, based on the information from the communication device 107 and/or identifiers of the payment device or instrument, whether there is a pre-existing relationship between the communication device and the payment instrument or between the communication device and the issuer 128 .
  • the rule engine 123 can also be present in the issuer 128 .
  • the rule engine 123 can determine a risk level or score associated with the payment transaction based on the pre-existing relationship, where the relationship is established at a time of registration of the payment instrument or the communication device with the payment service or issuer through, for example a payment application.
  • the rule engine 123 can also query a device registered with the payment instrument to obtain its location, for example, or other such information to determine whether the devices in proximity to the POS device or in possession of the user compare to the location of the registered device. If the location of the device present at the location of the transaction positively matches, the rule engine 123 determines that the relationship is pre-existing.
  • the transaction is processed by electronically transferring funds from a financial account associated with the customer to a financial account associated with the merchant.
  • the POS system 104 selects a card processing network 124 .
  • the card processing network 124 indicates a CVM associated with the payment instrument.
  • the payment service 108 for example through the rule engine 123 , determines whether to apply new CVM, as generated by the issuer 128 , based on a level or risk associated with the transaction.
  • the payment server 108 forwards the payment information, including the customer's location information, customer's device information, card type, etc., to the issuer 128 .
  • the issuer 128 based on a risk analysis or mapping of the device information to known devices, generates a new CVM, maintains the CVM dictated by the card processing network, or modifies an order of CVM.
  • the issuer 128 may have previously collected information from customer devices at the time of registration of the card, through a customer such, the payment processing component 122 may communicate with one or more computing devices of a card network (or “card payment network”), e.g., MasterCard®, VISA®, over the network 110 to conduct financial transactions electronically.
  • a card network or “card payment network”
  • the card processing network 124 may also The payment processing component 122 can also communicate with one or more computing devices of one or more banks over the network 110 .
  • the payment processing component 122 may communicate with an acquiring bank, and/or an issuing bank, and/or a bank maintaining customer accounts for electronic payments.
  • An acquiring bank may be a registered member of a card association (e.g., Visa®, MasterCard®), and may be part of a card payment network.
  • An issuing bank associated with the processor 128 may issue credit cards to buyers, and may pay acquiring banks for purchases made by cardholders to which the issuing bank has issued a payment card.
  • the computing device(s) of an acquiring bank may be included in the card payment network 124 and may communicate with the computing devices of a card-issuing bank to obtain payment.
  • the customer may use a debit card instead of a credit card, in which case, the bank computing device(s) of a bank corresponding to the debit card may receive communications regarding a transaction in which the customer is participating.
  • FIGS. 2A and 2B illustrate a flow diagram of a process 200 for determining whether to request verification information as specified by a default order of the CVM or whether to reconfigure CVM and request verification information in accordance with the reconfigured CVM.
  • the process 200 and other processes described herein are illustrated as collections of blocks in logical flow diagrams, which represent a sequence of operations, some or all of which can be implemented in hardware, software or a combination thereof.
  • the blocks may represent computer-executable instructions stored on one or more computer-readable media that, when executed by one or more processors, program the processors to perform the recited operations.
  • computer-executable instructions include routines, programs, objects, components, data structures and the like that perform particular functions or implement particular data types.
  • An operation 202 represents an example customer 106 ( 1 ) providing a payment instrument 116 to merchant operating a POS device 104 .
  • the customer 106 ( 1 ) may provide this payment instrument to the merchant in exchange for an item (e.g., a good or service).
  • This payment instrument may comprise a credit card, a debit card, a bank card, a gift card, a check, a virtual payment instrument, or any other type of payment instrument.
  • the customer 106 ( 1 ) is equipped with a communication device 107 having installed thereon a payment application 111 .
  • the POS device 104 receives the payment instrument and its underlying payment information, which may include the merchant swiping a magnetic strip of the payment instrument, dipping the payment instrument and its chip into the device 104 , manually entering an identifier of the payment instrument, or the like. Additionally, the payment information may include card data that identifies the customer and the merchant. The payment information, in one implementation, also includes device identifier (e.g., device number, operating system, distance of the device from the POS terminal, etc.). In one example, the sensors in the POS terminal determines a geo-fence within which it then detects the proximate devices and optionally, arranges them in order of their distance from itself. While the location is one indicator of relevance of a device to the customer or transaction in process; other indicators can be used either in combination with the location information or alone.
  • device identifier e.g., device number, operating system, distance of the device from the POS terminal, etc.
  • the POS device 104 determines a card network associated with the payment instrument, from the information provided to the POS device 104 by the payment instrument. For instance, the POS device 104 may determine this automatically based on the merchant swiping the card, dipping the card, manually entering the identifier, or the like. In other instances, the merchant herself may manually specify the card network (or the brand) associated with the payment instrument, such as MasterCard®, Visa®, or the like.
  • the card network may have associated with all their cards, a generic CVM, thus enforcing each customer to adhere to the same CVM irrespective of whether or not the customer has proven to be less or more risky.
  • the payment information is sent to the processor of the issuing entity at operation 208 .
  • the processor of the issuing entity 128 determines whether or not to institute a CVM different from the CVM specified by the card network. The issuing entity can make this determination based on predictive and normative behavioral analysis associated with the nature of purchase or transaction.
  • the issuing entity may also determine whether to implement the default order of the CVM or whether to modify the order based on the card network.
  • the issuing entity determines whether the device of the user has installed a mobile payment application or an application associated with the issuing entity. For this, the issuing entity detects that by comparing the device identifier from the payment information with a list of device identifiers obtained at the time of registration of devices or applications with the issuing entity. If the issuing entity detects a match, the issuing entity may lower or higher the risk associated with the payment transaction based on previously collected transactional data from the registered devices. Accordingly, the issuing entity can modify the CVM in accordance with the risk levels. However, if the issuing entity does not detect a connection between an existing device identifier and the device identifier of the payment information corresponding to the present transaction, the issuing entity may keep the CVM indicated by the card network.
  • the issuing entity in response to an association between the application of the issuing entity and the payment transaction, reconfigures the order of the CVM based on a level of risk. For instance, the issuing entity may determine, from the merchant application stored on the device, whether the CVM should be modified based on which card network was determined.
  • the issuing entity sends the applicable CVM to the POS device 104 .
  • the CVM is configured based on the risk level associated with the transaction.
  • the risk level is inherently based on the association of the user device with the issuing entity.
  • the CVM can be configured based on a determination that the location of the user's device is different from the location of the payment transaction or the payment instrument.
  • the POS device 104 based on the CVM indicated by the issuing entity or the card processing network, requests verification information from the customer 106 ( 1 ) according to the CVM. For instance, if the CVM indicates a specific order from the issuing entity such that the POS device is it to first request a PIN, then a signature, the CVM is executed. Or, if the CVM indicates a specific order from the issuing entity that the POS device 104 is to request a signature, then the POS device 104 requests a signature of the customer 106 ( 1 ) (e.g., on a touchpad of the POS device 104 ).
  • the POS device 104 can implement the CVM recommended by the card processing network.
  • An operation 214 represents the customer 106 ( 1 ) receiving the request for verification information.
  • FIG. 2B continues the illustration of the process 200 .
  • the customer provides the requested verification information to the POS device 104 , such as by entering her PIN, providing a signature, or the like.
  • the requested verification information is configured according to the relationship between the customer or customer device and the issuing entity.
  • An operation 216 represents the POS device 104 receiving the verification information.
  • the verification information may also indicate a verification signature, where the verification signature indicates the verification method requested by the POS device 104 .
  • the verification signature may indicate that the requested verification information was pushed by the issuing entity in response to an association between the issuing entity and the customer.
  • an operation 218 represents the POS device 104 determining whether or not the payment instrument has been authorized for the current transaction with the customer 106 ( 1 ), based in part on the provided verification information.
  • the POS device 104 may provide information regarding the payment instrument (e.g., identifier, expiration date, CVC code, etc.) along with the provided verification information (e.g., PIN, signature, etc.) to the payment service 108 , which in turn attempts to authorize the payment instrument for the transaction.
  • the payment instrument e.g., identifier, expiration date, CVC code, etc.
  • the provided verification information e.g., PIN, signature, etc.
  • an operation 222 represents the POS device 104 requesting verification information according to the CVM order until the transaction is authorized or until each piece of verification information has been requested without an authorization. For instance, if the transaction fails after the customer 106 ( 1 ) provides a PIN, then the POS device may move to the second verification information listed on the CVM order, such as a signature, and may request a signature from the customer 106 ( 1 ). Of course, in some instances the POS device may refrain from requesting additional verification information if a first piece fails (or if the transaction fails a threshold number of times). Further, the POS device 104 may request a certain piece of verification information multiple times (e.g., may request that the user again try to enter the correct PIN in the event that the first attempt fails).
  • FIG. 3 illustrates a flow diagram of a 300 process for determining whether to modify a CVM order based on an attribute of a received payment instrument, and requesting first or second verification information depending upon whether or not the order has been modified.
  • the process 300 receives a request to authorize a payment instrument at a POS device, the POS device implementing a CVM that specifies of order of verification information to request to a user associated with the payment instrument.
  • the process 300 determines an attribute associated with the payment instrument. This attribute may include a card network of the payment instrument, a brand of the payment instrument, an issuing or acquiring bank of the payment instrument, and/or the like.
  • the process 300 may determine whether to implement the default CVM specified by the card processing network, or whether to modify the CVM, with this determination being based at least in part on the attribute of the payment instrument. In some instances, this determination is also based at least in part on a cost of the transaction, hardware or other capabilities of the POS device, and the like. For instance, if the POS device includes a touch screen to receive PINs rather than a dedicated hardware device for receiving these PINs, then the POS device may modify the order such that that a signature is listed first within the verification-information order. In another instance, the determination is based on the issuing entity confirming that the device is recognized by the issuing entity, as part of a previous registration.
  • the issuing entity may determine the risk level associated with the transaction based on whether or not the issuing entity recognizes the device. Accordingly, the issuing entity may modify the CVM to be more stringent than the one suggested by the card processing network.
  • the process 300 includes combining the verification information as per the card processing network and the issuing entity in response to risk associated with the transaction and requesting the
  • the process 300 requests first verification information in response to determining to implement the default CVM. That is, the POS device 104 may request the first listed piece of verification information, such as a PIN.
  • the process 300 requests second, different verification information in response to determining to a new CVM or a new order of CVM. This second verification information may comprise a signature rather than a PIN in some instances.
  • FIG. 4 illustrates select example components of an example POS device 400 according to some implementations.
  • the POS device 400 may be any suitable type of computing device, e.g., mobile, semi-mobile, semi-stationary, or stationary. Some examples of the POS device 400 may include tablet computing devices; smart phones and mobile communication devices; laptops, netbooks and other portable computers or semi-portable computers; desktop computing devices, terminal computing devices and other semi-stationary or stationary computing devices; dedicated register devices; wearable computing devices, or other body-mounted computing devices; or other computing devices capable of sending communications and performing the functions according to the techniques described herein.
  • the POS device 400 can be a card reader or a server processing payments for the user.
  • the POS device 400 includes at least one processor 402 , memory 404 , a display 406 , one or more input/output (I/O) components 408 , one or more network interfaces 410 , at least one card reader 412 , at least one location component 414 , and at least one power source 416 .
  • Each processor 402 may itself comprise one or more processors or processing cores.
  • the processor 402 can be implemented as one or more microprocessors, microcomputers, microcontrollers, digital signal processors, central processing units, state machines, logic circuitries, and/or any devices that manipulate signals based on operational instructions.
  • the processor 402 may be one or more hardware processors and/or logic circuits of any suitable type specifically programmed or configured to execute the algorithms and processes described herein.
  • the processor 402 can be configured to fetch and execute computer-readable processor-executable instructions stored in the memory 404 .
  • the memory 404 may be an example of tangible non-transitory computer storage media and may include volatile and nonvolatile memory and/or removable and non-removable media implemented in any type of technology for storage of information such as computer-readable processor-executable instructions, data structures, program modules or other data.
  • the memory 404 may include, but is not limited to, RAM, ROM, EEPROM, flash memory, solid-state storage, magnetic disk storage, optical storage, and/or other computer-readable media technology.
  • the POS device 400 may access external storage, such as RAID storage systems, storage arrays, network attached storage, storage area networks, cloud storage, or any other medium that can be used to store information and that can be accessed by the processor 402 directly or through another computing device or network.
  • the memory 404 may be computer storage media able to store instructions, modules or components that may be executed by the processor 402 .
  • non-transitory computer-readable media exclude media such as energy, carrier signals, electromagnetic waves, and signals per se.
  • the memory 404 may be used to store and maintain any number of functional components that are executable by the processor 402 .
  • these functional components comprise instructions or programs that are executable by the processor 402 and that, when executed, implement operational logic for performing the actions and services attributed above to the POS device 400 .
  • Functional components of the POS device 400 stored in the memory 404 may include a merchant application 418 , discussed above.
  • the merchant application 418 may present an interface on the POS device 400 to enable the merchant to conduct transactions, receive payments, and so forth, as well as communicating with the payment service 102 for processing payments and sending transaction information. Further, the merchant application 418 may present an interface to enable the merchant to manage the merchant's account, and the like.
  • the merchant application 418 may also include a module for dynamically modifying an order of a CVM based on attributes of a payment instrument, potentially based on additional factors, as described above with reference to FIGS. 1-3 .
  • Additional functional components may include an operating system 420 for controlling and managing various functions of the POS device 400 and for enabling basic user interactions with the POS device 400 .
  • the memory 404 may also store transaction data 422 that is received based on the merchant associated with the POS device 400 engaging in various transactions with customers, such as the example customers 106 from FIG. 1 .
  • the memory 404 may also store data, data structures and the like, that are used by the functional components.
  • this data may include item information that includes information about the items offered by the merchant, which may include images of the items, descriptions of the items, prices of the items, and so forth.
  • the memory 404 may also optionally include other functional components and data, which may include programs, drivers, etc., and the data used or generated by the functional components.
  • the POS device 400 may include many other logical, programmatic and physical components, of which those described are merely examples that are related to the discussion herein.
  • the network interface(s) 410 may include one or more interfaces and hardware components for enabling communication with various other devices over the network or directly.
  • network interface(s) 410 may enable communication through one or more of the Internet, cable networks, cellular networks, wireless networks (e.g., Wi-Fi) and wired networks, as well as close-range communications such as Bluetooth®, Bluetooth® low energy, and the like, as additionally enumerated elsewhere herein.
  • FIG. 4 further illustrates that the POS device 400 may include the display 406 mentioned above.
  • the display 406 may employ any suitable display technology.
  • the display 406 may be a liquid crystal display, a plasma display, a light emitting diode display, an OLED (organic light-emitting diode) display, an electronic paper display, or any other suitable type of display able to present digital content thereon.
  • the display 406 may have a touch sensor associated with the display 406 to provide a touchscreen display configured to receive touch inputs for enabling interaction with a graphic interface presented on the display 406 . Accordingly, implementations herein are not limited to any particular display technology.
  • the POS device 400 may not include the display 406 , and information may be present by other means, such as aurally.
  • the I/O components 408 may include speakers, a microphone, a camera, and various user controls (e.g., buttons, a joystick, a keyboard, a keypad, etc.), a haptic output device, and so forth.
  • various user controls e.g., buttons, a joystick, a keyboard, a keypad, etc.
  • the POS device 400 may include or may be connectable to a payment instrument reader 412 .
  • the reader 412 may plug in to a port in the merchant device, such as a microphone/headphone port, a data port, or other suitable port.
  • the reader 412 is integral with the entire POS device 400 .
  • the reader may include a read head for reading a magnetic strip of a payment card, and further may include encryption technology for encrypting the information read from the magnetic strip.
  • numerous other types of card readers may be employed with the POS devices 400 herein, depending on the type and configuration of a particular POS device 400 .
  • the method implemented by device includes a method for verifying a payment card at the time of a payment transaction between a merchant and a customer, the method includes receiving, at a point-of-sale (POS) device and from the user, the payment card for satisfying a cost of the payment transaction between the merchant and the customer; receiving, by the POS device, information from the payment card, including information related to a card network processor associated with the received payment card; detecting, by the POS device, a location of the POS device or one or more communication devices, wherein the location indicates a current location of the payment transaction; sending, to a processor of an issuing entity of the payment card and via a payment processing system, the information from the payment card; determining, by the processor of the issuing entity and based on the information from the payment card, if the user has installed an application on at least one registered communication device, the application configured for user management of the payment transaction using the payment card; obtaining, by the processor of the issuing entity, a device identifie
  • POS point-of-sa
  • the payment processing system further determines a level of risk associated with the payment transaction based at least on the location of the registered device being substantially dissimilar to the location of the POS device or any of the communication devices.
  • the configuration is further based at least in part on at least one of hardware associated with the POS device or a capability of the POS device, and wherein the hardware includes a touch screen to receive signature of the user or a dedicated hardware device for receiving personal identification numbers (PINs).
  • PINs personal identification numbers
  • the method includes receiving, by an entity issuing a payment instrument, a request to authorize the payment instrument at a point-of-sale (POS) device, the entity issuing the payment instrument programmed to selectively implement a dynamic cardholder verification method (CVM) at the POS device, wherein the dynamic CVM is configured based on an identifier associated with the payment transaction; receiving, the identifier associated with the payment transaction, the identifier including information corresponding to the payment instrument and/or one or more communication devices in proximity to the payment instrument; determining, by an entity issuing the payment instrument and based on the identifier, whether at least one of the communication devices is registered with the entity issuing the payment instrument; determining, by the entity issuing the payment instrument, whether to implement a static CVM specified by a card network associated with the payment instrument or whether to apply the dynamic CVM, wherein the dynamic CVM is generated and applied if the communication device is registered with the entity issuing the payment instrument; and requesting, on the POS device, an input in response to the dynamic C
  • the identifier also comprises whether the payment instrument includes a magnetic strip storing payment information associated with the payment instrument or a chip storing the payment information associated with the payment instrument.
  • the dynamic CVM comprises a specific order of a personal identification number (PIN) or a signature of the user associated with the payment instrument followed by another PIN or a signature.
  • the determination of whether to implement or modify the static CVM specified by the card network is further based at least in part on a capability of the POS device or the communication device.
  • the method further includes submitting the dynamic CVM and an identifier associated with the payment instrument to a remote entity for authorizing the payment instrument; an indication that the payment instrument has not been authorized; and requesting the static CVM from a user associated with the payment instrument after receiving the indication.
  • a payment device in another implementation, includes one or more processors; and one or more computer-readable media storing computer-executable instructions that, when executed by the one or more processors, cause the one or more processors to: obtain an attribute associated with the payment instrument received by the payment device, wherein the payment instrument is used towards satisfying a cost of a payment transaction; obtain information corresponding to at least one communication device in proximity to the payment device or the payment instrument; detect, based on the information of the communication device and the attribute of the payment device, whether there is a pre-existing relationship between the communication device and the payment instrument;
  • the pre-existing relationship is established at a time of registration of the payment instrument or the communication device with the payment device issuing the payment instrument.
  • the device further includes a rule engine to determine a risk level associated with the payment transaction, based in part on the pre-existing relationship between the communication device and the payment instrument.
  • the rule engine is configured to: query a device registered with the payment instrument; compare the location of the registered device with the communication device in proximity to the payment instrument or the payment device; and determine that the relationship is pre-existing based at least on the comparison.
  • the attribute comprises whether the payment instrument includes a magnetic strip that stores payment information or a chip that stores the payment information.
  • the default verification order is a generic value set by the card network processor for the payment instrument issued by an entity issuing the payment instrument.
  • the determining of the CVM is based at least in part on one or more of: (a) specifications of the apparatus; (b) the cost of the payment transaction; (c) a type of the payment instrument; and (d) a brand of the payment instrument.
  • the payment device includes a touch-sensitive display to display information regarding the payment transaction and to receive from the customer associated with the payment instrument an input corresponding to the generated CVM.
  • the method implemented at least in part by a processor associated with an entity issuing at least one payment instrument, the method comprising: receiving a request to authenticate use of the payment instrument at a point-of-sale (POS) device in response to a payment transaction; obtaining, from a database, an attribute associated with the payment instrument, wherein the attribute indicates a predicted location of a communication device associated with a holder of the payment instrument at a time of the payment transaction, wherein the attribute is set in response to an execution or registration of an application of the entity issuing the payment instrument on a communication device; obtaining, through a location sensor of the POS device, a current location of the payment transaction; determining whether the current location of the payment transaction involving the payment instrument substantially matches the predicted location of the communication device associated with the holder of the payment instrument; and implementing, via the processor, a cardholder verification method (CVM) that specifies a device-specific order of verification information to request for verifying the payment instrument if the current location of the communication device matches the predicted location.
  • CVM
  • the method includes determining a level of risk associated with the transaction based at least in part on a mapping of the predicted location with the current location; and configuring the device-specific order of verification information in accordance with the level of risk.
  • the method includes predicting the location of the communication device by using the attribute to query the communication device.
  • the method also includes determining whether to implement a generic order of the CVM specified by a card processing network or modify the generic order of the CVM to a device-specific order of the CVM based at least in part on one or more of: (a) a cost of the payment transaction for which the payment instrument is being authorized; (b) a hardware capability of the POS device; (c) the location of the payment transaction; and (d) the entity issuing the payment instrument.
  • FIGS. 5A-C further illustrate exemplary use cases associated with the method and systems described above.
  • the user presents the payment card 502 at the payment terminal 504 for a transaction amount over a transaction limit pre-set by the issuer or card network processor.
  • the terminal declines the transaction and no further communication is supplied to the payment processor 506 or issuer 510 .
  • the payment terminal 504 sends information pertaining to the payment card 502 and/or the transaction, including size of the ticket, to the issuer 510 .
  • the issuer 510 then, based on risk analysis of the ticket size with respect to the specific user, may prompt a secondary authentication or decline the charge and prompt another form of payment.
  • the issuer 510 performs the risk analysis based on one or more rules stored in the rule engine 508 associated with the payment service 502 or the issuer 510 .
  • the new CVM may be authenticated before the normal payment flow.
  • the user presents the payment card 502 at the payment terminal 504 .
  • the payment terminal 504 sends the request for CVM to the issuer 510 via the payment processing system, or payment service, 506 .
  • the issuer 510 compares the payment card identifier embedded in the request with an internal database. If the payment card is identified, the issuer sends a request on the communication device of the user 512 for either a response or an actual CVM, such as a text message or fingerprint response.
  • the communication device of the user 512 does not necessarily need to be at the location of the payment transaction, however. As such, the user need not respond to the CVM requested by the issuer contemporaneous to the payment transaction.
  • the user presents the payment card 502 at the payment terminal 504 .
  • the payment terminal 504 sends the request for CVM to the issuer 510 via the payment processing system, or the payment service, 506 .
  • the issuer identifies the user's communication device (either by identifying the device identifier, a mobile payment application, phone number of the user using a certain payment card, or other such identifier).
  • the issuer determines the validity of the CVM and confirms that the collected CVM is adequate for authentication and therefore for chargeback and liability purposes. In this manner, the authentication is accepted as part of the messaging or other way to detect communication device.

Landscapes

  • Business, Economics & Management (AREA)
  • Engineering & Computer Science (AREA)
  • Accounting & Taxation (AREA)
  • Physics & Mathematics (AREA)
  • Strategic Management (AREA)
  • General Business, Economics & Management (AREA)
  • General Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Finance (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Development Economics (AREA)
  • Economics (AREA)
  • Microelectronics & Electronic Packaging (AREA)
  • Cash Registers Or Receiving Machines (AREA)

Abstract

Techniques and arrangements for dynamically modifying a cardholder verification method (CVM) implemented at a point-of-sale (POS) device. In some instances, the techniques instruct a POS device to determine an attribute associated with a received payment instrument and determine, based on this information and via the issuing entity, whether to implement a default or static CVM or whether to apply a modified or dynamic CVM such that the POS device requests different verification information than if the POS device did not modify the CVM. The modified or dynamic CVM may be implemented if a customer's device, present at the location of the payment transaction, has installed thereon an application of the entity that has issued the payment instrument.

Description

    BACKGROUND
  • In today's commerce, merchants often utilize an array of different point-of-sale (POS) devices, including mobile POS devices. Merchants may use these POS devices to engage in transactions with customers at different locations. For instance, a taxi driver may use a mobile POS device to charge a passenger for a taxi ride. In another example, a street vendor may use a mobile POS device to charge a customer for an item purchased from the street vendor. In yet another example, a merchant may use a stationary POS device to process a payment transaction at a store. Operators of traditional payment infrastructure, such as card networks and issuing banks, often struggle to adapt to this changing landscape of POS devices.
  • BRIEF DESCRIPTION OF THE DRAWINGS
  • The detailed description is set forth with reference to the accompanying figures. In the figures, the left-most digit(s) of a reference number identifies the figure in which the reference number first appears. The use of the same reference numbers in different figures indicates similar or identical items or features.
  • FIG. 1 illustrates an example environment that includes a merchant operating a mobile point-of-sale (POS) device to conduct transactions with multiple different customers. In some instances, the POS device dynamically configures verification information to request from the customers that a cardholder verification method (CVM) specifies. For instance, the POS device, payment server, or an issuing bank may determine, based on a type of payment instrument provided by a customer and risk analysis of the payment instrument, whether to request verification information as specified by a default CVM, configure the CVM or ignore CVM requirement altogether.
  • FIGS. 2A and 2B illustrate a flow diagram of a process for determining whether to request verification information as specified by a default CVM or whether to configure the CVM and request verification information in accordance with the reconfigured CVM.
  • FIG. 3 illustrates a flow diagram of a process for determining whether to modify a CVM based on an attribute or identifier of a received payment instrument, and requesting first or second verification information depending upon whether or not the order has been modified.
  • FIG. 4 illustrates select components of a POS device that a merchant described herein may utilize.
  • FIGS. 5A, 5B, and 5C illustrates select components of a POS device that a merchant described herein may utilize.
  • DETAILED DESCRIPTION
  • Some implementations described herein include techniques and arrangements for dynamically configuring and/or reconfiguring verification information at point-of-sale (POS) devices based on a payment instrument presented at the time of a payment transaction and at a specific location.
  • In an example scenario, a customer presenting a credit card while holding a device executing an application of the entity that issued the credit card, may not provide a primary or secondary verification. On the other hand, a customer presenting a credit card in the absence of a registered mobile device or mobile device executing a registered application with the issuing entity, may be asked to provide a primary or secondary verification, for example a PIN or signature, or a PIN followed by signature, based on a risk rating of the transaction.
  • As described herein, a POS device may be programmed to implement a cardholder verification method (CVM) that specifies the POS device to request verification information from a customer engaging in a transaction at the POS device, where the verification information or request for verification information that is specific to the customer, transaction or an attribute of the payment instrument. For instance, the POS device may initially receive (e.g., via a swipe, a dip, manual entry, etc.) information from a payment instrument (e.g., credit card, bank card, debit card, etc.). The POS device may then, with the issuing entity and a payment server, determine whether the POS device can request additional, different or no verification information and, if so, the manner and kind of information to request. This additional verification information may comprise a personal identifier number (PIN) associated with the payment instrument, a signature of the cardholder, an answer to a security question associated with the cardholder, biometric information from the cardholder, a combination of any of the above, or even absence of any CVM. For example, if the issuing bank determines the risk of the transaction to be lower than a threshold value, the POS device may process the transaction without CVM and under the condition that the issuing entity will approve the transaction absent CVM.
  • In one implementation, various conditions may trigger configuration or reconfiguration of CVM. In one example, the trigger condition may be based on detection of a registered mobile device at the time of a payment transaction, i.e., if the card holder has registered with the payment server its mobile device and/or associated the mobile device with the payment instrument. In another example, the trigger condition may be based on detection of a financial application, such as an application that facilitates management of payment transactions using the payment instrument, installed on a device associated with the user or any device at the location where the transaction is taking place. In some implementations, instead of relying on presence of a device, the trigger condition may be based on an absence of a registered device or financial or payment application.
  • Before requesting the verification information, however, a POS device as described herein may determine, based on one or more attributes of a received payment instrument, specifications or capabilities of the receiving POS device, risk logic implemented by a payment server, and/or the like, whether to request CVM, modify default CVM into a specific CVM, or change the order of CVM for a specific cardholder, payment instrument or transaction. For instance, while the CVM may initially instruct a POS device to request a PIN number from a cardholder, the processor of the issuing entity may determine that the CVM order should be modified such that a signature is requested rather than the PIN. After determining whether to modify the CVM order, the POS device may request verification in accordance with the (potentially modified) order. For instance, the POS device may request first verification information from the user, followed by second verification information if the first verification information does not authorize the transaction, and the like, until the transaction/payment instrument is authorized or each piece of verification information from the CVM has been requested.
  • In another example, the CVM may initially instruct the POS device to request a specific set of inputs, such as a PIN and signature of the user, however, if the issuing entity detects a payment application executing on a device registered with the user or user's payment instrument and in proximity to the POS device, the issuing entity may generate a CVM specific to the payment instrument, or even relax the requirement of CVM.
  • In one implementation, the POS device (or a payment card reader) detects devices in proximity to itself, for example through sensors, transmitters, receivers, antenna, etc. The POS device can also, additionally or optionally, obtain device information, such as device identifier, device type, etc. The POS device may be triggered to obtain device information when a user presents a payment instrument for payment of a payment transaction, or otherwise approaches a payment reader or POS device. In this manner, the most proximate communication device to the POS device, in the context of the current payment transaction or payment instrument, can be determined. The POS device extracts payment information, such as the payment card number, the verification number, the cardholder identifier such as name, etc., and the device information. The POS device sends the payment information, including the cardholder identifier and device information, to the issuing entity, for example through an intermediate entity such as acquirer, processor of card processing network, and the payment processing server. The issuing entity, based on the payment information or the cardholder identifier, determines whether a device is registered with the cardholder and/or a financial application is installed on the device registered with the cardholder. The issuing entity then contacts or otherwise communicates with the registered device to determine its location.
  • In another example, the issuing entity has access to the location of the communication device, for example through a previous registration, and does not need to explicitly communicate with the device for location information. Using the location information of the registered device, the issuing entity determines whether the location is the same as the location of the payment transaction (indicated by the POS device, proximate devices, payment instrument or a chip therein) and if the location matches or is otherwise similar, the issuing entity may reconfigure the CVM requirement to be specific to the payment instrument. In one instance, the issuing entity may determine a risk score to be lower than a threshold value and even remove the requirement to request CVM because the issuing entity has enough information to tag the transaction as sufficiently secure. In another instance, the payment server or POS device may reconfigure the CVM as per location determination and comparison made by the issuing entity. By configuring the CVM based on previously collected data or historical trends or patterns, such as location information or purchasing habits, merchant type, etc., the user need not provide CVM thereby making the payment transaction experience seamless and frictionless. The CVM is generally specific to the card network however based on the disclosure herein, the CVM can be configured to be a different CVM or no CVM as the case may be.
  • In some implementations, if the location of the registered device is substantially dissimilar from the location of the devices where the payment transaction is occurring or has occurred, the CVM specified by the card network can be applied. Alternatively, a more stringent CVM or multiple rounds of authentication can be requested to further secure the payment transaction.
  • Thus, dynamically reconfiguring CVM may result in a more efficient and seamless transaction between a merchant and a customer. To provide an example, payment instruments associated with a particular card network might not accept certain verification information when input into a particular type of POS device. For instance, the card network might not accept PIN numbers entered into a device that does not include a dedicated hardware device for receiving PIN numbers (but that instead includes a touch screen or the like for receiving this information). Therefore, a POS device may determine when it receives a payment instrument associated with this card network and may dynamically reconfigure the CVM after processor of the issuing entity has executed a risk check and determined secondary means to authenticate the transaction (for example, based on location of the payment transaction or historical trends associated with the user, user's payment instrument or even the merchant. For instance, knowing that the card network will not accept a PIN entered at the POS device and based on a confirmation that the cardholder is carrying a device previously registered with the issuing entity or a device executing an application associated with the issuing entity, the issuing entity, via the POS device, may reorder the CVM, which may include removing “PIN” as a type of verification information to request and moving “signature” into a first slot in the order. The POS device may then request a signature in lieu of a PIN, thus avoiding the situation where a cardholder enters her PIN, learns from the merchant that the PIN has not been accepted, and then is asked to provide a signature. Instead, the POS device will skip straight to requesting a signature form the cardholder, thus resulting in a quicker transaction that potentially prevents embarrassment to the merchant and/or the cardholder, but without risking the security of the payment transaction. The transaction, when sent for processing, may include data or a flag that indicates that the issuing entity had approved a modified CVM based on the location of the payment instrument, registration of the user's device, and other such factor. The card network can use this data to process the transaction in the absence of CVM typically enforced by the card network.
  • Furthermore, the systems and methods described herein improve and simplify authentication that in turn will reduce observed fraud. Currently, without PIN for high ticket transactions, networks either default to less secure forms of authentication (and take the liability) or use alternate hardware (or in the most extreme case cannot accept the transaction). Both of these options are not ideal and also some CVMs may slow down the transaction time or make it less secure. To this end, the open payment platform described herein is designed to work with all mobile devices, any issuer, and is extensible to other platforms. Some implementations describe payment applications to be installed on user phone. As such, the implementations are aligned with longer term industry trends involving use of mobile devices and greater consumer control in the payment process, moving payments to the buyer. Such implementations also provide flexibility for any changes as the rule engine may reside in the server or the issuer and move away from the POS terminal.
  • Some of the implementations offer dynamic risk controls to allow the issuers to dynamically set and control authentication limits, manage risk, and assign CVMs accordingly. The dynamic risk controls are based on one or more attributes, such as merchant attribute, e.g., merchant code, geography, observed fraud, buyer attribute, e.g., credit line, credit balance, and risk profile based on current and/or past transactions, authentication method, e.g., geo-location, biometric input, one time password or text message, etc.
  • Some implementations also offer increased engagement with the banking infrastructure thus driving more users to the platform, for example more users engage with the mobile payment applications, which are the main touch point for customers, which in turn increases the propensity for updated contact details and also gives the issuers the opportunity to display other data as part of the transaction, e.g., balance, last time visited, etc. The implementations described herein offer options to perform authentication for the payment flow with other terminals that may or may not be connected to the existing payment infrastructure.
  • For discussion purposes, some example implementations are described below with reference to the corresponding figures. However, implementations herein are not limited to the particular examples provided, and may be extended to other environments, other system architectures, other types of merchants, and so forth, as will be apparent to those of skill in the art in light of the disclosure herein.
  • Various embodiments and implementations of the disclosed custom and/or dynamic authentication technology are now described. The following description provides specific details for a thorough understanding and an enabling description of these implementations. One skilled in the art will understand, however, that the disclosed system and methods may be practiced without many of these details. Additionally, some well-known structures or functions may not be shown or described in detail, so as to avoid unnecessarily obscuring the relevant description of the various implementations. The terminology used in the description presented below is intended to be interpreted in its broadest reasonable manner, even though it is being used in conjunction with a detailed description of certain specific implementations of the disclosed system and methods. Some frequently used terms are now described.
  • As used herein, a merchant may include any business engaged in the offering of goods or services for acquisition by buyers. Actions attributed to a merchant may include actions performed by owners, merchants, or other agents of the merchant and thus no distinction is made herein unless specifically discussed. In addition, as used herein, a buyer or customer or user may include any entity that acquires goods or services from a merchant, such as by purchasing, renting, leasing, borrowing, licensing, or the like. Hereinafter, goods and/or services offered by merchants may be referred to as items. Thus, a merchant and a buyer may interact with each other to conduct a transaction in which the buyer acquires an item from a merchant, and in return, the buyer provides payment to the merchant, for example through a payment instrument issued by an issuing entity.
  • As used herein, a ‘payment transaction’ or simply ‘transaction’ may include a financial transaction for the acquisition of goods and/or services that is conducted between a buyer and a merchant. For example, when paying for a transaction, the buyer can provide the amount that is due to the merchant using a payment instrument or a payment proxy for the payment instrument. In other cases, the payment transaction includes transfer of money from one party to another for any number of reasons. Thus, while the description refers to as buyer and merchant as parties to the payment transaction, it will be understood that the parties can be a sender and a recipient, a land lord and a renter, a bank and a bank customer, a first friend and a second friend, and so on.
  • The term ‘payment card,’ ‘payment instrument,’ or ‘payment object’ refers to a payment mechanism that includes a conventional debit card, a conventional credit card, a prepaid gift card, or the like, a smartcard that has an embedded integrate circuit chip (e.g., Europay-MasterCard-visa (EMV) card), a proxy card, or any card that functions as a combination of any of these mechanisms. The term ‘proxy card’ as used herein refers to a card that may or may not bear a card number or an account number that appears to be that of a real credit or debit card account (i.e., it is in the correct format), but where that card/account number is actually only a proxy for the buyer's real card/account number. Additionally, the payment card used in the example above is a specific type of a financial instrument. Other types of financial instruments, other than the payment card, can be used to initiate the transfer of funds. A financial instrument can be a software instrument or virtual instrument, such as a virtual wallet. Other examples of payment card may also include a prepaid card, a gift card, a rewards card, a loyalty points' card, a frequent flyer miles card, a check, cash, or any other kind of payment instrument that holds financial value or provides a promise to pay at a later time. Payment card may also include a payment object, such as an electronic device configured to initiate contactless payment transactions, e.g., a key fob, a mobile device (such as a mobile device having an NFC tag). And finally, the payment object can also be a payment proxy having a syntax of a monetary indicator followed by a string of alphanumeric characters or in general, any identifier that is representative of the buyer or merchant's financial account. The payment proxy can be used in the context of and within a webpage as part of the web address, a social networking handle or username, a forum, a messaging application, and so on.
  • The term ‘biometric payment instrument’ is a type of payment object or financial instrument that is biometrically identifiable and initialized by a biometric characteristic, such as a person's finger (e.g., for fingerprint recognition), face, iris or retina, heartbeat, voice, etc. Accordingly, the CVM can include a PIN, signature, or a biometric input, such as a fingerprint or iris scan.
  • The payment object reader may be a magnetic stripe card reader, optical scanner, smartcard (card with an embedded IC chip) reader (e.g., an EMV-compliant card reader or NFC enabled reader), radio frequency identification (RFID) reader, or the like, configured to detect and obtain data off any payment object. Accordingly, the payment object reader may include hardware implementation, such as slots, magnetic tracks, and rails with one or more sensors or electrical contacts to facilitate detection and acceptance of a payment object. Additionally or optionally, the payment object reader may also include a biometric sensor to receive and process biometric characteristics and process them as payment instruments, given that such biometric characteristics are registered with the payment processing system and connected to a financial account.
  • In one example, the POS terminal can be a hand-held device such as a mobile phone, laptop, tablet computer, and the like, associated with a merchant. In another example, the POS terminal is a mobile device that is wearable or otherwise connected to or associated with the buyer or merchant, for example, the computing device may be an Apple® watch or a Fitbit®.
  • As used herein, the term ‘payment application’ or ‘financial application’ includes any application configured for management of payment transactions connected to a payment instrument or multiple payment instruments issued by a single entity or multiple entities to a user. The financial application can also provide the user with financial information, option to open an account with the issuing entity, dispense physical cash, transfer cash electronically, pay bills, apply for loans, make deposits, obtain assistance from the agent, monitor spending habits, get financial advice, set spending goals, manage transaction and spending limits, and the like. The term “payment application” as used here, can also refer to or include any messaging application that enables communication between users (e.g., sender and recipient of a message) over a wired or wireless communications network, or devices, for example between an issuing entity and the user's communication device. A payment processing system that delivers a communication service to users, e.g., chat capability, can employ the messaging application. The messaging application can include, for example, a text messaging application for communication between phones (e.g., conventional mobile telephones or smartphones), or a cross-platform instant messaging application for smartphones and phones that use the Internet for communication. The message can also be to confirm the location of the user or obtain an approval to extract location of the user. Although this specification may employ text messages as an example, it is to be understood that the technology may employ any of these types of messages. Upon receiving an indication to send (e.g., after detecting that the user has clicked “Send”), the messaging application transmits a message, e.g., the text message to a messaging application computer system (“messaging application system”).
  • As used here, the term “pairing” or “associating” refers to a process in which the POS terminal and the payment object reader establish a communication channel with each other using wireless communication protocols, for example, Bluetooth®, Bluetooth Low Energy®, Wi-Fi®, etc. The POS terminal and the payment object reader each includes a transceiver capable of transmitting data between them once “paired.” The pairing technology described herein can pair a payment object reader to the POS terminal in both real-time and offline modes. Furthermore, even though Bluetooth or Bluetooth Low Energy has been used to describe certain embodiments, other wireless protocols, such as NFC, Wi-Fi, etc., can also be used.
  • The term “communication network” may be any type of network known in the art, such as a local area network or a wide area network, such as the Internet, and may include a wireless network, such as a cellular network, a cloud network, a local wireless network, such as Wi-Fi and/or close-range wireless communications, such as Bluetooth and Bluetooth low energy, near field communications (NFC), a wired network, or any other such network, or any combination thereof. Accordingly, the network may include both wired and/or wireless communication technologies, including Bluetooth, Bluetooth low energy, Wi-Fi and cellular communication technologies like worldwide interoperability for microwave access (Wi-MAX), 3G, 4G, CDMA, digital subscriber line (DSL), etc., cloud computing technologies, as well as wired or fiber optic technologies. Additionally or alternatively, the communication network may be a mesh network. For example, in a wireless local area network (WLAN), network devices may be configured to receive and forward communications, which are ultimately destined for a different device. These types of networks are generically referred to as “mesh” networks, where network nodes may form a “mesh” of paths for which communications may travel to reach their destination. Wireless networks may use beacon transmissions to advertise the network's existence, as well as provide information about the network and capabilities associated with the network. Different kinds of beaconing mechanisms may be used, for example, one for infrastructure mode networks (also called basic service set (BSS) networks) and one for ad-hoc mode networks (also called independent basic service set (IBSS) networks). In infrastructure networks, access points (APs) are the entities responsible for generating beacons whereas in ad hoc networks, all network nodes (including user stations) participate in the generation of beacons. The ad hoc network beacons (referred to as IBSS beacons) are used to advertise the network (which consists of all the nodes) as a whole while the infrastructure network beacons (referred to as BSS beacons) are generated by an AP and meant to advertise the existence of only that individual AP. Components used for such communications can depend at least in part upon the type of network, the environment selected, or both. Protocols for communicating over such networks are well known and are not discussed herein in detail.
  • The term “swipe” here refers to any manner of triggering a payment object reader to read data from a payment object, such as by dipping into, tapping, hovering, bringing in close contact or passing the payment object into or through a payment object reader.
  • Reference to an “embodiment” in this document does not limit the described elements to a single embodiment; all described elements may be combined in any embodiment in any number of ways. Furthermore, for the purposes of interpreting this specification, the use of “or” herein means “and/or” unless stated otherwise. The use of “a” or “an” herein means “one or more” unless stated otherwise. The use of “comprise,” “comprises,” “comprising,” “include,” “includes,” and “including” are interchangeable and not intended to be limiting. Also, unless otherwise stated, the use of the terms such as “first,” “second,” “third,” “upper,” “lower,” and the like do not denote any spatial, sequential, or hierarchical order or importance, but are used to distinguish one element from another. It is to be appreciated that the use of the terms “and/or” and “at least one of”, for example, in the cases of “A and/or B” and “at least one of A and B”, is intended to encompass the selection of the first listed option (A) only, or the selection of the second listed option (B) only, or the selection of both options (A and B). As a further example, in the cases of “A, B, and/or C” and “at least one of A, B, and C”, such phrasing is intended to encompass the selection of the first listed option (A) only, or the selection of the second listed option (B) only, or the selection of the third listed option (C) only, or the selection of the first and the second listed options (A and B) only, or the selection of the first and third listed options (A and C) only, or the selection of the second and third listed options (B and C) only, or the selection of all three options (A and B and C). This may be extended, as readily apparent by one of ordinary skill in this and related arts, for as many items listed.
  • It will also be appreciated by those skilled in the art that the words during, while, and when as used herein are not exact terms that mean an action takes place instantly upon an initiating action but that there may be some small but reasonable delay, such as a propagation delay, between the initial action and the reaction that is initiated by the initial action. As used in this specification and any claims of this application, the terms “computer”, “server”, “processor”, and “memory” all refer to electronic or other technological devices. These terms exclude people or groups of people. For the purposes of the specification, the terms display or displaying means displaying on an electronic device. As used in this specification and any claims of this application, the terms “computer readable medium” and “computer readable media” are entirely restricted to non-transitory tangible, physical objects that store information in a form that is readable by a computer. These terms exclude any transitory wireless signals, wired download signals, and any other ephemeral signals. The computing system can include clients and servers. A client and server are generally remote from each other and typically interact through a communication network. The relationship of client and server arises by virtue of computer programs running on the respective computers and having a client-server relationship to each other. In some embodiments, a server transmits data (e.g., an HTML page) to a client device (e.g., for purposes of displaying data to and receiving user input from a user interacting with the client device). Data generated at the client device (e.g., a result of the user interaction) can be received from the client device at the server.
  • It should also be appreciated by those skilled in the art that any block diagrams, steps, or sub-processes herein represent conceptual views of illustrative systems embodying the principles of the present subject matter. Similarly, it will be appreciated that any flow charts, flow diagrams, state transition diagrams, pseudo code, and the like represent various processes which may be substantially represented in computer readable medium and so executed by a computer or processor, whether or not such computer or processor is explicitly shown. The order in which the methods are described are not intended to be construed as a limitation, and any number of the described method blocks can be deleted, moved, added, subdivided, combined, and/or modified in any order to implement the methods, or an alternative combination or sub-combinations. Also, while steps, sub-processes or blocks are at times shown as being performed in series, some steps, sub-processes or blocks can instead be performed in parallel, or can be performed at different times as will be recognized by a person of ordinary skill in the art. Further any specific numbers noted herein are only examples; alternative implementations can employ differing values or ranges. Furthermore, the methods can be implemented in any suitable hardware, software, firmware, or combination thereof.
  • While certain devices, e.g., the payment object readers and POS terminals are shown as including distinct components, this is merely for ease of illustration and not intended as limiting. In various implementations, the payment object readers and POS terminals may be identical, similar or distinct. Moreover, the components shown and described for the payment object readers and POS terminals may be implemented as more components or as fewer components and functions described for the components may be redistributed depending on the details of the implementation. Additionally, in some implementation, there may be several, hundreds, thousands, hundreds of thousands, or more, of the payment object readers and the POS terminals. Further, in some implementations, configuration, structure, and operational characteristics of the payment object readers and/or POS terminals may vary from device to device. In general, payment object readers and the POS terminals can each be any appropriate device operable to send and receive data, requests, messages, electronic messages, text messages, alerts, notifications, pop-up messages, push notifications, or other types of information over the one or more networks or directly to each other.
  • The technology introduced here can be embodied as special-purpose hardware (e.g., circuitry), as programmable circuitry appropriately programmed with software and/or firmware, or as a combination of special-purpose and programmable circuitry. Hence, embodiments may include a machine-readable medium having stored thereon instructions that may be used to cause one or more processors to perform the methods, variations of the methods, and other operations described here. The machine-readable medium may include, but is not limited to, floppy diskettes, optical discs, compact disc read-only memories (CD-ROMs), magneto-optical discs, read-only memories (ROMs), random access memories (RAMs), erasable programmable read-only memories (EPROMs), electrically erasable programmable read-only memories (EEPROMs), application-specific integrated circuits (ASICs), magnetic or optical cards, flash memory, or other type of media/machine-readable medium suitable for storing electronic instructions. Various embodiments will now be described in further detail with the help of one or more figures.
  • The preceding summary is provided for the purposes of summarizing some exemplary embodiments to provide a basic understanding of aspects of the subject matter described herein. Accordingly, the above-described features are merely examples and should not be construed as limiting in any way. Other features, aspects, and advantages of the subject matter described herein will become apparent from the following description of Figures and Claims.
  • Turning now to the figures, FIG. 1 illustrates an example environment 100 that includes a merchant 102 operating a point-of-sale (POS) device 104 to engage in various transactions with customers 106-1, 106-2, . . . , 106-N (collectively referred to as customers 106) equipped with communication devices 107-1, 107-2, . . . 107-N (collectively referred to as communication devices 107) and payment instruments 116-1, 116-2, . . . 116-N (collectively referred to as payment instruments 116).
  • As used herein, a merchant 102 may include any business engaged in the offering of goods or services for acquisition by customers. Actions attributed to a merchant 102 may include actions performed by owners, merchants, or other agents of the merchant 102 and thus no distinction is made herein unless specifically discussed. In addition, as used herein, a customer 106 may include any entity that acquires goods or services from a merchant 102, such as by purchasing, renting, leasing, borrowing, licensing, or the like. Hereinafter, goods and/or services offered by merchants 102 may be referred to as items. Thus, a merchant 102 and a customer 106 may interact with each other to conduct a transaction in which the customer 106 acquires an item from a merchant 102, and in return, the customer 106 provides payment to the merchant 102 through a payment instrument 116.
  • The customers 106 may be equipped with payment instruments 116, such as credit card, debit card, gift card, near-field communication (NFC) based payment instrument, and the like, and communication devices 107, such as smart phones, tablet computers, laptops, mobile wearable devices like Apple® watch or a Fitbit®, or other mobile data processing apparatus, that may have executing or installed thereon one or more web or mobile applications to support various functionalities. The communication devices 107 may be configured to respond to requests from other devices, such as the POS device 104 to provide its exact location, approximate location, or location relative to another device. In some implementations, the communication device 107 may allow other devices to check whether or not the device 107 is within a marked geo-fence. The POS device 104 or the communication device 107 may hereinafter also be referred to as the payment device.
  • The communication device 107 may also have executing or installed thereon payment applications 111. The payment application 111 can include an interface for the user to select the payment instrument 116 or otherwise track transactions made through the payment instrument 116. In one implementation, multiple payment instruments 116, issued by the same or different issuing entity, can be accessed by a single payment application 111. In some implementations, the payment application 111 can be an instance of the payment instrument, for example a virtual wallet. When the payment application, for example a web or mobile application, is installed on the device 107, for example by accessing a download feature followed by an optional registration process, the payment application 111 may be associated with the payment instrument 116, the device or its identifier, and the entity that has issued the payment instrument, for example, issuer 128, through the process of registration. The registration process may also trigger the user to allow the issuer 128 to obtain and store the device information (e.g., device identifier), environment information (e.g., location of the point of transaction, location of device, or location of the payment instrument, etc.), or the user information (location of the user, user identifier, etc.) indicative of the device.
  • Also, in some cases, the issuer 128 may also store information of the issuer-device relationship in the device. Such information may be correlated with the user data and saved in the issuer 128. The processor of the issuing entity, herein referred to as issuer 128, may include a rule engine (not shown) to map received data from the user or user device with a stored value of the user and device association, for example, to confirm whether a prior relationship exists and based on that, further determine a level of risk associated with the transaction. If the level of risk is lower than a predetermined threshold, for example, as set by the card processing network or the issuer, the issuer 128 can remove the requirement for a CVM as dictated by the card processing network or even change the CVM. Alternatively, if the level of risk is higher or equal to the predetermined threshold, the issuer 128 can again either apply a stringent or multi-level CVM or even decline the transaction as being too risky. While some embodiments describe confirmation of a user device to be present at the time of payment transaction, this is no way should limit the present subject matter. In some implementations, for example, the issuer checks whether a payment application or an identifier is trackable irrespective of where the device is present at the time of payment transaction. For example, the issuer sends a query to the device on record to determine whether it is a legitimate device and subsequently configures the CVM or requirement for CVM. Approval via geo-location (and other forms of location) can be so seamless the buyer does not necessarily need have their phone in hand. Without knowing, the users can have an extremely secure transaction.
  • As used herein, a transaction may include a financial transaction for the acquisition of goods and/or services that is conducted between the customer and the merchant. For example, when paying for a transaction, the customer can provide the amount that is due to the merchant using a payment instrument 116 (e.g., a debit card, a credit card, a stored-value or gift card, a check, through an electronic payment application on a device carried by the customer, or the like). The merchant 102 can interact with the POS device 104 to process the transaction, such as by inputting (e.g., manually, via a magnetic card reader or an RFID reader, etc.) an identifier associated with the payment instrument 116. For example, a payment instrument 116 of one of the customers 106 may include one or more magnetic strips for providing card and customer information when swiped in a card reader. In other examples, other types of payment cards may be used, such as smart cards having a built-in memory chip that is read by the device 104 when the card is “dipped” into the reader, or tapped onto a surface or in proximity to the surface of the reader having a radiofrequency identification tag, or so forth. Accordingly, the attribute of the payment instrument can be an identifier that indicates whether the instrument has a magnetic strip or a chip and information stored thereon. The attribute can also be a cost of the payment transaction for which the payment instrument is being authorized, a hardware capability of the POS device, that is whether the POS device is capable of accepting EMV cards, magnetic cards, NFC based instruments, and so on, the location of the payment transaction, and the identity of the entity issuing the payment instrument.
  • The POS device 104 may comprise any sort of mobile or non-mobile device that includes an instance of a merchant application that executes on the respective device (as illustrated in FIG. 4). The merchant application may provide POS functionality to the POS device 104 to enable the merchant 102 (e.g., an owner, merchants, etc.) to accept payments from the customers 106. In some types of businesses, the POS device 104 may correspond to a store or other place of business of the merchant, and thus, may be a fixed location that typically does not change on a day-to-day basis. In other types of businesses, however, the POS device 104 may change from time to time, such as in the case that the merchant operates a food truck, is a street vendor, a cab driver, etc., or has an otherwise mobile business, e.g., in the case of merchants who sell items at buyer's homes, places of business, and so forth.
  • In some implementations, the POS device 104 may include sensors (not shown), such as accelerometers, microphones, GPS/location sensors, light detection sensors, proximity sensors, gravity detection sensors, magnetic field detection sensors, electrical field detection sensors, vibration sensors, pressure sensors, humidity sensors, and the like, to measure a physical quantity and convert it into a signal that may be used to detect exact, approximate, or relative location of devices from the device 104. The location sensors may be internal and/or external to the device 104. Exemplary location sensors include, but are not limited to, a cellular radio or modem, a GPS receiver, a Wi-Fi adapter or modem, a BLUETOOTH brand communication service element, a three-dimensional motion sensor, or the like. In one implementation, the device 104 can also set up a geo-fence and detects one or more devices that enter and/or exit the geo-fence. As such, the location of the device 104 may represent a status (e.g., inside and/or outside the geo-fence) or an actual determination location (e.g., coordinates). The device 104 may perform particular actions based on the determined location of the devices relative to the geo-fence. In some implementations, the device 104 detects the location and saves the information both on the POS device 104 and the issuer 128. The POS device 104 is also configured to receive a payment instrument or multiple payment instruments to satisfy at least a portion of the cost of the payment transaction. For example, a single payment card or several cards or other payment objects may be used in a single payment transaction. The cost may be split between several cards based on incentives associated with the cards or availability of funds on accounts connected to the cards.
  • During the transaction, the POS device 104 can obtain payment transaction information describing the transaction, such as the attribute or identifier of the payment instrument, identity of the customer based on identifier of the payment instrument, identity of the customer based on information in track or records of the payment instrument, an amount of payment received from the customer, the item(s) acquired by the customer, a time, place and date of the transaction, a card network associated with the payment instrument, an issuing bank of the payment instrument, and so forth.
  • In one implementation, the POS device 104 can also determine information related to devices surrounding or in proximity to the POS device 104. For example, the sensors, such as location sensors, global positioning systems (GPS) units, Wi-Fi Positioning Systems (WPS), etc., of the POS device 104 can detect surrounding or proximate devices based on location detection protocols, including triangulation triangulation, trilateration, multi-laterations, geo-fence, global or local positioning systems, and by leveraging device profile obtained through the sensors. According to related aspects of the present subject matter, triangulation of data may be by “direct” triangulation, e.g., as where the identity of the buyer device is determined from the point of intersection (or the point of least squares fit) of multiple device profiles. Alternatively, or in addition, triangulation may be “indirect,” as where the identity of the buyer device is determined not only from the device profiles, but also from relative profiles originating from other devices in the proximity or even historical purchases. The present subject matter also includes implementations where locations are reported by other buyer devices in a “crowdsourced” manner. The POS device 104 can send the transaction information and location information to a payment service 108 over a network 110, either substantially or contemporaneous to the conducting of the transaction (in the case of online transactions) or later when the device 104 is in the online mode (in the case offline transactions). The POS device 104 is configured to work in both offline and online modes.
  • In an offline mode, the POS device 104 may store one or more characteristics associated with the transaction (i.e., the transaction information), such as a cost of the transaction, a time of day at which the transaction occurred, a day of the week at which the transaction occurred, a location at which the transaction took place, an item that the customer obtained, and a payment instrument used in the transaction. After conducting an offline transaction with one of the customers 106, the POS device 104 may provide the stored information to the payment service 108 over the network 110. The network 110 may represent any one or more wired or wireless networks, such as a Wi-Fi network, a cellular network, or the like. In an online transaction, the POS device may send this information to the payment service 108 over the network 110 substantially contemporaneously with the transaction with the customer. The payment service 108 may include a processor 118, a memory 120 having components, such as a payment processing component 122 and a rule engine 123 described later.
  • Generally, the CVM is static and fixed, i.e., does not vary with the user or payment instrument. By static, the CVM does not change based on the nature of transaction or the type of payment instrument. By fixed, the card network stores the CVM based on the type of card and issuer 128. The CVM can further include a specific order regardless of risk or other factors. In some instances, the POS device 104 is configured to implement a cardholder verification method (CVM) that specifies verification information (or a modified order of verification information) to request from customers and the circumstances in which to request this information, based on the attribute of the payment transaction and a risk score computed based on the obtained attribute.
  • For instance, the CVM may indicate that transactions for amounts over a threshold amount (e.g., $50) will only be authorized when verification information—in addition to the information stored by a customer's payment instrument—is provided by the customer. This information may include a personal identification number (PIN) associated with the payment instrument, a password with the payment instrument, a signature of the cardholder, or the like. For example, the CVM is saved against each payment instrument at the card processing network 124. For example, at 109, the card processing network 124 includes an association of the payment instrument (PI)116(1) with a CVM-1, payment instrument 116(n) with CVM-n, and so on.
  • However, in certain implementations, a processor 104 associated with an issuer, may have additional insight into the payment instrument, which when compared to the data reported by the POS device 104 at the time of payment transaction can indicate a different CVM or even remove the requirement for CVM, if the risk associated with the transaction is significantly low. Furthermore, POS device 104 may be configured (e.g., via the merchant application executed on the device 104) to generate instructions that indicate a modification of an order of the CVM based on payment device or payment instrument attributes, such as a card network associated with a payment instrument/device, a brand of the payment instrument/device, an issuing bank of the payment instrument, whether the payment instrument includes a magnetic strip or a memory chip, or the like, or a new CVM altogether. For instance, FIG. 1 illustrates, at 112, that the processor of the issuing entity, also referred to as issuer 128, is configured to implement a first CVM 114(1) when the POS device 104 receives a first payment instrument 116(1), and a second CVM 114(2) when the POS device 104 receives a second payment instrument 116(2). Alternatively, in another implementation, the issuing entity 128 is configured to implement a first CVM 114(1) when the POS device 104 receives a first payment instrument 116(1) in the absence of a communication device 107-1, and a second CVM 114(2) when the POS device 104 receives a first payment instrument 116(1) in the presence of a communication device 107-1 executing an instance of a payment application irrespective of the CVM 126 imposed by the card network processor 124. In the shown example, the payment instrument 116(1) is tied to device 107-1 and such a relationship may have been established when an application 111 associated with the issuing entity 128 was installed by the customer. Similarly, the payment instrument 116(2) is associated with device 107-2 and such a relationship is also established at the time of registration of an application 111 or another device registration application or the like. Not all devices may be registered and as such the CVM recommended by the card network processor 124 is applied at the POS device 104. For devices registered with the issuer 128, the table or database 112 is used for mapping the payment instrument with device identifier, collected, for example at the time of registration, and a device-specific CVM. The issuer 128 may also compute a risk score and accordingly, select CVM best suited to the risk levels of the payment transaction.
  • In some instances, the first payment instrument 116(1) represents a payment instrument associated with a first card network (e.g., Visa®, MasterCard®, American Express®, Diner's Club®, Discover®, etc.), while the payment instrument 116(2) represents a payment instrument associated with a different card network. In the example, the first order 114(1) specifies that the POS device 104 is first to request a PIN from a cardholder (or “customer”) first, and a signature second, and so forth. The second order 114(2), meanwhile, instructs the POS device 104 requesting a signature first. After requesting and receiving the verification information (e.g., PIN, signatures, etc.), the POS device 104 may send this information to the payment service, which in turn may attempt to authorize the transaction and send a result back to the POS device.
  • In some instances, the example shown at 112 represents a scenario where a card network associated with the payment instrument 114(2) does not accept PINs received from the mobile POS device 104 and, therefore, the POS device dynamically modifies the first, default order 114(1) of the CVM in response to identifying the card network associated with the second payment instrument 116(2). Further, while FIG. 1 illustrates two different payment instruments and corresponding CVM orders, it is to be appreciated that any other number of payment instruments and corresponding CVM orders may be utilized.
  • As illustrated, the payment service 108 may include one or more processors 118 and memory 120, which may store a payment processing component 122. The payment processing component 122 may function to receive the information regarding a transaction from the POS device 104 and attempt to authorize the payment instrument used to conduct the transaction. The payment processing component 122 may then send an indication of whether the payment instrument has been approved or declined back to the POS device 104. The payment processing component 122 is also configured to process transactions, collect information related to the transaction, parse the information, and encrypt relevant information for the issuing entity 128. The payment processing component 122 also stores the transaction information for post-transaction activities, such as pattern detection and trend analysis on transactions corresponding to the user, merchant or their locations. The rule engine 123 is configured to create various kinds of rules for a user, device, merchant, location or a particular transaction. For example, the rules can provide access to a variety of operating standards that may be applied to any given transaction between a merchant and a user, such as transaction fee, tax, etc., based on transaction or nature of transaction. The rules engine 123 may also apply a risk analysis, for example in real-time, based on anomalies in behavior of the customer or the device associated with the customer. In some implementations, the rule engine 123 is configured to detect, based on the information from the communication device 107 and/or identifiers of the payment device or instrument, whether there is a pre-existing relationship between the communication device and the payment instrument or between the communication device and the issuer 128. Even though the rule engine 123 is shown to be in the payment service 108, the rule engine 123 can also be present in the issuer 128. The rule engine 123 can determine a risk level or score associated with the payment transaction based on the pre-existing relationship, where the relationship is established at a time of registration of the payment instrument or the communication device with the payment service or issuer through, for example a payment application. The rule engine 123 can also query a device registered with the payment instrument to obtain its location, for example, or other such information to determine whether the devices in proximity to the POS device or in possession of the user compare to the location of the registered device. If the location of the device present at the location of the transaction positively matches, the rule engine 123 determines that the relationship is pre-existing.
  • Operationally, when a customer and a merchant enter into an electronic payment transaction, the transaction is processed by electronically transferring funds from a financial account associated with the customer to a financial account associated with the merchant. As disclosed in the present subject matter, the POS system 104, based on the transaction information, selects a card processing network 124. The card processing network 124 indicates a CVM associated with the payment instrument. In one example scenario, the payment service 108, for example through the rule engine 123, determines whether to apply new CVM, as generated by the issuer 128, based on a level or risk associated with the transaction. In another example scenario, the payment server 108 forwards the payment information, including the customer's location information, customer's device information, card type, etc., to the issuer 128. The issuer 128 based on a risk analysis or mapping of the device information to known devices, generates a new CVM, maintains the CVM dictated by the card processing network, or modifies an order of CVM. The issuer 128 may have previously collected information from customer devices at the time of registration of the card, through a customer such, the payment processing component 122 may communicate with one or more computing devices of a card network (or “card payment network”), e.g., MasterCard®, VISA®, over the network 110 to conduct financial transactions electronically. The card processing network 124 may also The payment processing component 122 can also communicate with one or more computing devices of one or more banks over the network 110. For example, the payment processing component 122 may communicate with an acquiring bank, and/or an issuing bank, and/or a bank maintaining customer accounts for electronic payments.
  • An acquiring bank (not shown) may be a registered member of a card association (e.g., Visa®, MasterCard®), and may be part of a card payment network. An issuing bank associated with the processor 128 may issue credit cards to buyers, and may pay acquiring banks for purchases made by cardholders to which the issuing bank has issued a payment card. Accordingly, in some examples, the computing device(s) of an acquiring bank may be included in the card payment network 124 and may communicate with the computing devices of a card-issuing bank to obtain payment. Further, in some examples, the customer may use a debit card instead of a credit card, in which case, the bank computing device(s) of a bank corresponding to the debit card may receive communications regarding a transaction in which the customer is participating. Additionally, there may be computing devices of other financial institutions involved in some types of transactions or in alternative system architectures, and thus, the foregoing are merely several examples for discussion purposes.
  • FIGS. 2A and 2B illustrate a flow diagram of a process 200 for determining whether to request verification information as specified by a default order of the CVM or whether to reconfigure CVM and request verification information in accordance with the reconfigured CVM. The process 200 and other processes described herein are illustrated as collections of blocks in logical flow diagrams, which represent a sequence of operations, some or all of which can be implemented in hardware, software or a combination thereof. In the context of software, the blocks may represent computer-executable instructions stored on one or more computer-readable media that, when executed by one or more processors, program the processors to perform the recited operations. Generally, computer-executable instructions include routines, programs, objects, components, data structures and the like that perform particular functions or implement particular data types. The order in which the blocks are described should not be construed as a limitation. Any number of the described blocks can be combined in any order and/or in parallel to implement the process, or alternative processes, and not all of the blocks need be executed. For discussion purposes, the processes are described with reference to the environments, architectures and systems described in the examples herein, although the processes may be implemented in a wide variety of other environments, architectures and systems. The process 200, and other processes described herein, may be performed by a POS device, a processor of the issuing entity, by a remote payment service (e.g., payment service 108), by another entity, or by a combination thereof.
  • An operation 202 represents an example customer 106(1) providing a payment instrument 116 to merchant operating a POS device 104. For instance, the customer 106(1) may provide this payment instrument to the merchant in exchange for an item (e.g., a good or service). This payment instrument may comprise a credit card, a debit card, a bank card, a gift card, a check, a virtual payment instrument, or any other type of payment instrument. Assume that the customer 106(1) is equipped with a communication device 107 having installed thereon a payment application 111.
  • At an operation 204, the POS device 104 receives the payment instrument and its underlying payment information, which may include the merchant swiping a magnetic strip of the payment instrument, dipping the payment instrument and its chip into the device 104, manually entering an identifier of the payment instrument, or the like. Additionally, the payment information may include card data that identifies the customer and the merchant. The payment information, in one implementation, also includes device identifier (e.g., device number, operating system, distance of the device from the POS terminal, etc.). In one example, the sensors in the POS terminal determines a geo-fence within which it then detects the proximate devices and optionally, arranges them in order of their distance from itself. While the location is one indicator of relevance of a device to the customer or transaction in process; other indicators can be used either in combination with the location information or alone.
  • At an operation 206, in this example the POS device 104 determines a card network associated with the payment instrument, from the information provided to the POS device 104 by the payment instrument. For instance, the POS device 104 may determine this automatically based on the merchant swiping the card, dipping the card, manually entering the identifier, or the like. In other instances, the merchant herself may manually specify the card network (or the brand) associated with the payment instrument, such as MasterCard®, Visa®, or the like. The card network may have associated with all their cards, a generic CVM, thus enforcing each customer to adhere to the same CVM irrespective of whether or not the customer has proven to be less or more risky. To this end, in one implementation, the payment information is sent to the processor of the issuing entity at operation 208. The processor of the issuing entity 128 determines whether or not to institute a CVM different from the CVM specified by the card network. The issuing entity can make this determination based on predictive and normative behavioral analysis associated with the nature of purchase or transaction.
  • Alternatively or additionally, based on the risk level, the issuing entity may also determine whether to implement the default order of the CVM or whether to modify the order based on the card network.
  • At an operation 210, the issuing entity, based on the payment information, determines whether the device of the user has installed a mobile payment application or an application associated with the issuing entity. For this, the issuing entity detects that by comparing the device identifier from the payment information with a list of device identifiers obtained at the time of registration of devices or applications with the issuing entity. If the issuing entity detects a match, the issuing entity may lower or higher the risk associated with the payment transaction based on previously collected transactional data from the registered devices. Accordingly, the issuing entity can modify the CVM in accordance with the risk levels. However, if the issuing entity does not detect a connection between an existing device identifier and the device identifier of the payment information corresponding to the present transaction, the issuing entity may keep the CVM indicated by the card network.
  • In one implementation, the issuing entity, in response to an association between the application of the issuing entity and the payment transaction, reconfigures the order of the CVM based on a level of risk. For instance, the issuing entity may determine, from the merchant application stored on the device, whether the CVM should be modified based on which card network was determined.
  • At an operation 211, the issuing entity sends the applicable CVM to the POS device 104. As described before, the CVM is configured based on the risk level associated with the transaction. In one implementation, the risk level is inherently based on the association of the user device with the issuing entity. In another implementation, the CVM can be configured based on a determination that the location of the user's device is different from the location of the payment transaction or the payment instrument.
  • In an operation 212, the POS device 104, based on the CVM indicated by the issuing entity or the card processing network, requests verification information from the customer 106(1) according to the CVM. For instance, if the CVM indicates a specific order from the issuing entity such that the POS device is it to first request a PIN, then a signature, the CVM is executed. Or, if the CVM indicates a specific order from the issuing entity that the POS device 104 is to request a signature, then the POS device 104 requests a signature of the customer 106(1) (e.g., on a touchpad of the POS device 104). Optionally, if the issuing entity is unavailable to establish a connection between the issuing entity and the user or user's device, the POS device 104 can implement the CVM recommended by the card processing network. An operation 214 represents the customer 106(1) receiving the request for verification information.
  • FIG. 2B continues the illustration of the process 200. At an operation 215, the customer provides the requested verification information to the POS device 104, such as by entering her PIN, providing a signature, or the like. The requested verification information is configured according to the relationship between the customer or customer device and the issuing entity. An operation 216 represents the POS device 104 receiving the verification information. The verification information may also indicate a verification signature, where the verification signature indicates the verification method requested by the POS device 104. Also, the verification signature may indicate that the requested verification information was pushed by the issuing entity in response to an association between the issuing entity and the customer. Next, an operation 218 represents the POS device 104 determining whether or not the payment instrument has been authorized for the current transaction with the customer 106(1), based in part on the provided verification information. For instance, the POS device 104 may provide information regarding the payment instrument (e.g., identifier, expiration date, CVC code, etc.) along with the provided verification information (e.g., PIN, signature, etc.) to the payment service 108, which in turn attempts to authorize the payment instrument for the transaction.
  • If the POS device 104 receives an indication that the payment instrument has been authorized, then at 220 the merchant may provide the item to the customer in some instances. If the transaction fails, however, then an operation 222 represents the POS device 104 requesting verification information according to the CVM order until the transaction is authorized or until each piece of verification information has been requested without an authorization. For instance, if the transaction fails after the customer 106(1) provides a PIN, then the POS device may move to the second verification information listed on the CVM order, such as a signature, and may request a signature from the customer 106(1). Of course, in some instances the POS device may refrain from requesting additional verification information if a first piece fails (or if the transaction fails a threshold number of times). Further, the POS device 104 may request a certain piece of verification information multiple times (e.g., may request that the user again try to enter the correct PIN in the event that the first attempt fails).
  • FIG. 3 illustrates a flow diagram of a 300 process for determining whether to modify a CVM order based on an attribute of a received payment instrument, and requesting first or second verification information depending upon whether or not the order has been modified.
  • At 302, the process 300 receives a request to authorize a payment instrument at a POS device, the POS device implementing a CVM that specifies of order of verification information to request to a user associated with the payment instrument. At 304, the process 300 determines an attribute associated with the payment instrument. This attribute may include a card network of the payment instrument, a brand of the payment instrument, an issuing or acquiring bank of the payment instrument, and/or the like.
  • At 306, the process 300 may determine whether to implement the default CVM specified by the card processing network, or whether to modify the CVM, with this determination being based at least in part on the attribute of the payment instrument. In some instances, this determination is also based at least in part on a cost of the transaction, hardware or other capabilities of the POS device, and the like. For instance, if the POS device includes a touch screen to receive PINs rather than a dedicated hardware device for receiving these PINs, then the POS device may modify the order such that that a signature is listed first within the verification-information order. In another instance, the determination is based on the issuing entity confirming that the device is recognized by the issuing entity, as part of a previous registration. For example, the issuing entity may determine the risk level associated with the transaction based on whether or not the issuing entity recognizes the device. Accordingly, the issuing entity may modify the CVM to be more stringent than the one suggested by the card processing network. In some implementations, the process 300 includes combining the verification information as per the card processing network and the issuing entity in response to risk associated with the transaction and requesting the
  • At 308, the process 300 requests first verification information in response to determining to implement the default CVM. That is, the POS device 104 may request the first listed piece of verification information, such as a PIN. At 310, meanwhile, the process 300 requests second, different verification information in response to determining to a new CVM or a new order of CVM. This second verification information may comprise a signature rather than a PIN in some instances.
  • FIG. 4 illustrates select example components of an example POS device 400 according to some implementations. The POS device 400 may be any suitable type of computing device, e.g., mobile, semi-mobile, semi-stationary, or stationary. Some examples of the POS device 400 may include tablet computing devices; smart phones and mobile communication devices; laptops, netbooks and other portable computers or semi-portable computers; desktop computing devices, terminal computing devices and other semi-stationary or stationary computing devices; dedicated register devices; wearable computing devices, or other body-mounted computing devices; or other computing devices capable of sending communications and performing the functions according to the techniques described herein. In one implementation, the POS device 400 can be a card reader or a server processing payments for the user.
  • In the illustrated example, the POS device 400 includes at least one processor 402, memory 404, a display 406, one or more input/output (I/O) components 408, one or more network interfaces 410, at least one card reader 412, at least one location component 414, and at least one power source 416. Each processor 402 may itself comprise one or more processors or processing cores. For example, the processor 402 can be implemented as one or more microprocessors, microcomputers, microcontrollers, digital signal processors, central processing units, state machines, logic circuitries, and/or any devices that manipulate signals based on operational instructions. In some cases, the processor 402 may be one or more hardware processors and/or logic circuits of any suitable type specifically programmed or configured to execute the algorithms and processes described herein. The processor 402 can be configured to fetch and execute computer-readable processor-executable instructions stored in the memory 404.
  • Depending on the configuration of the POS device 400, the memory 404 may be an example of tangible non-transitory computer storage media and may include volatile and nonvolatile memory and/or removable and non-removable media implemented in any type of technology for storage of information such as computer-readable processor-executable instructions, data structures, program modules or other data. The memory 404 may include, but is not limited to, RAM, ROM, EEPROM, flash memory, solid-state storage, magnetic disk storage, optical storage, and/or other computer-readable media technology. Further, in some cases, the POS device 400 may access external storage, such as RAID storage systems, storage arrays, network attached storage, storage area networks, cloud storage, or any other medium that can be used to store information and that can be accessed by the processor 402 directly or through another computing device or network. Accordingly, the memory 404 may be computer storage media able to store instructions, modules or components that may be executed by the processor 402. Further, when mentioned, non-transitory computer-readable media exclude media such as energy, carrier signals, electromagnetic waves, and signals per se.
  • The memory 404 may be used to store and maintain any number of functional components that are executable by the processor 402. In some implementations, these functional components comprise instructions or programs that are executable by the processor 402 and that, when executed, implement operational logic for performing the actions and services attributed above to the POS device 400. Functional components of the POS device 400 stored in the memory 404 may include a merchant application 418, discussed above. The merchant application 418 may present an interface on the POS device 400 to enable the merchant to conduct transactions, receive payments, and so forth, as well as communicating with the payment service 102 for processing payments and sending transaction information. Further, the merchant application 418 may present an interface to enable the merchant to manage the merchant's account, and the like. The merchant application 418 may also include a module for dynamically modifying an order of a CVM based on attributes of a payment instrument, potentially based on additional factors, as described above with reference to FIGS. 1-3.
  • Additional functional components may include an operating system 420 for controlling and managing various functions of the POS device 400 and for enabling basic user interactions with the POS device 400. The memory 404 may also store transaction data 422 that is received based on the merchant associated with the POS device 400 engaging in various transactions with customers, such as the example customers 106 from FIG. 1.
  • In addition, the memory 404 may also store data, data structures and the like, that are used by the functional components. For example, this data may include item information that includes information about the items offered by the merchant, which may include images of the items, descriptions of the items, prices of the items, and so forth. Depending on the type of the POS device 400, the memory 404 may also optionally include other functional components and data, which may include programs, drivers, etc., and the data used or generated by the functional components. Further, the POS device 400 may include many other logical, programmatic and physical components, of which those described are merely examples that are related to the discussion herein.
  • The network interface(s) 410 may include one or more interfaces and hardware components for enabling communication with various other devices over the network or directly. For example, network interface(s) 410 may enable communication through one or more of the Internet, cable networks, cellular networks, wireless networks (e.g., Wi-Fi) and wired networks, as well as close-range communications such as Bluetooth®, Bluetooth® low energy, and the like, as additionally enumerated elsewhere herein.
  • FIG. 4 further illustrates that the POS device 400 may include the display 406 mentioned above. Depending on the type of computing device used as the POS device 400, the display 406 may employ any suitable display technology. For example, the display 406 may be a liquid crystal display, a plasma display, a light emitting diode display, an OLED (organic light-emitting diode) display, an electronic paper display, or any other suitable type of display able to present digital content thereon. In some examples, the display 406 may have a touch sensor associated with the display 406 to provide a touchscreen display configured to receive touch inputs for enabling interaction with a graphic interface presented on the display 406. Accordingly, implementations herein are not limited to any particular display technology. Alternatively, in some examples, the POS device 400 may not include the display 406, and information may be present by other means, such as aurally.
  • The I/O components 408, meanwhile, may include speakers, a microphone, a camera, and various user controls (e.g., buttons, a joystick, a keyboard, a keypad, etc.), a haptic output device, and so forth.
  • In addition, the POS device 400 may include or may be connectable to a payment instrument reader 412. In some examples, the reader 412 may plug in to a port in the merchant device, such as a microphone/headphone port, a data port, or other suitable port. In other instances, the reader 412 is integral with the entire POS device 400. The reader may include a read head for reading a magnetic strip of a payment card, and further may include encryption technology for encrypting the information read from the magnetic strip. Alternatively, numerous other types of card readers may be employed with the POS devices 400 herein, depending on the type and configuration of a particular POS device 400.
  • The location component 414 may include a GPS device able to indicate location information, or the location component 414 may comprise another other location-based sensor. The POS device 400 may also include one or more additional sensors (not shown), such as an accelerometer, gyroscope, compass, proximity sensor, and the like. Additionally, the POS device 400 may include various other components that are not shown, examples of which include removable storage, a power control unit, and so forth.
  • In one implementation, the method implemented by device, such as device 400, includes a method for verifying a payment card at the time of a payment transaction between a merchant and a customer, the method includes receiving, at a point-of-sale (POS) device and from the user, the payment card for satisfying a cost of the payment transaction between the merchant and the customer; receiving, by the POS device, information from the payment card, including information related to a card network processor associated with the received payment card; detecting, by the POS device, a location of the POS device or one or more communication devices, wherein the location indicates a current location of the payment transaction; sending, to a processor of an issuing entity of the payment card and via a payment processing system, the information from the payment card; determining, by the processor of the issuing entity and based on the information from the payment card, if the user has installed an application on at least one registered communication device, the application configured for user management of the payment transaction using the payment card; obtaining, by the processor of the issuing entity, a device identifier corresponding to the registered communication device, wherein the device identifier is capable of indicating a location of the registered communication device on which the application is installed, and wherein the device identifier having been generated when the application is installed on the registered communication device; comparing, by the payment processing system, the location of the registered communication device as indicated by the device identifier with the location of the POS device or any of the communication devices at the current location of the payment transaction; if the location of the registered communication device as indicated by the device identifier is substantially similar to the location of the POS device or any of the communication devices at the current place of the payment transaction, configuring a cardholder verification method (CVM) for verifying the payment card received at the POS device irrespective of the CVM for the card network processor associated with the received payment card; and if the location of the registered communication device as indicated by the device identifier is substantially dissimilar to the location of the POS device or any of the communication devices at the current place of the payment transaction, presenting to the user the CVM specified by the card network processor associated with the received payment card. The payment processing system further determines a level of risk associated with the payment transaction based at least on the location of the registered device being substantially dissimilar to the location of the POS device or any of the communication devices. The configuration is further based at least in part on at least one of hardware associated with the POS device or a capability of the POS device, and wherein the hardware includes a touch screen to receive signature of the user or a dedicated hardware device for receiving personal identification numbers (PINs).
  • In another implementation, the method includes receiving, by an entity issuing a payment instrument, a request to authorize the payment instrument at a point-of-sale (POS) device, the entity issuing the payment instrument programmed to selectively implement a dynamic cardholder verification method (CVM) at the POS device, wherein the dynamic CVM is configured based on an identifier associated with the payment transaction; receiving, the identifier associated with the payment transaction, the identifier including information corresponding to the payment instrument and/or one or more communication devices in proximity to the payment instrument; determining, by an entity issuing the payment instrument and based on the identifier, whether at least one of the communication devices is registered with the entity issuing the payment instrument; determining, by the entity issuing the payment instrument, whether to implement a static CVM specified by a card network associated with the payment instrument or whether to apply the dynamic CVM, wherein the dynamic CVM is generated and applied if the communication device is registered with the entity issuing the payment instrument; and requesting, on the POS device, an input in response to the dynamic CVM generated by the entity issuing the payment instrument. The identifier comprises a location of the communication device with respect to a location of the payment instrument or the POS device.
  • The identifier also comprises whether the payment instrument includes a magnetic strip storing payment information associated with the payment instrument or a chip storing the payment information associated with the payment instrument. The dynamic CVM comprises a specific order of a personal identification number (PIN) or a signature of the user associated with the payment instrument followed by another PIN or a signature.
  • The determination of whether to implement or modify the static CVM specified by the card network is further based at least in part on a capability of the POS device or the communication device. The method further includes submitting the dynamic CVM and an identifier associated with the payment instrument to a remote entity for authorizing the payment instrument; an indication that the payment instrument has not been authorized; and requesting the static CVM from a user associated with the payment instrument after receiving the indication.
  • In another implementation, a payment device is disclosed. The payment device includes one or more processors; and one or more computer-readable media storing computer-executable instructions that, when executed by the one or more processors, cause the one or more processors to: obtain an attribute associated with the payment instrument received by the payment device, wherein the payment instrument is used towards satisfying a cost of a payment transaction; obtain information corresponding to at least one communication device in proximity to the payment device or the payment instrument; detect, based on the information of the communication device and the attribute of the payment device, whether there is a pre-existing relationship between the communication device and the payment instrument;
  • on detecting the pre-existing relationship between the communication device and the payment instrument, generate a verification order different from a default verification order set by a card network processor, where the verification order is presented to a customer of the payment instrument to authorize the payment transaction; and request an input from the customer of the payment instrument according to the generated verification order. The pre-existing relationship is established at a time of registration of the payment instrument or the communication device with the payment device issuing the payment instrument.
  • The device further includes a rule engine to determine a risk level associated with the payment transaction, based in part on the pre-existing relationship between the communication device and the payment instrument. The rule engine is configured to: query a device registered with the payment instrument; compare the location of the registered device with the communication device in proximity to the payment instrument or the payment device; and determine that the relationship is pre-existing based at least on the comparison.
  • The attribute comprises whether the payment instrument includes a magnetic strip that stores payment information or a chip that stores the payment information. Further, the default verification order is a generic value set by the card network processor for the payment instrument issued by an entity issuing the payment instrument. The determining of the CVM is based at least in part on one or more of: (a) specifications of the apparatus; (b) the cost of the payment transaction; (c) a type of the payment instrument; and (d) a brand of the payment instrument. The payment device includes a touch-sensitive display to display information regarding the payment transaction and to receive from the customer associated with the payment instrument an input corresponding to the generated CVM.
  • In one implementation, the method implemented at least in part by a processor associated with an entity issuing at least one payment instrument, the method comprising: receiving a request to authenticate use of the payment instrument at a point-of-sale (POS) device in response to a payment transaction; obtaining, from a database, an attribute associated with the payment instrument, wherein the attribute indicates a predicted location of a communication device associated with a holder of the payment instrument at a time of the payment transaction, wherein the attribute is set in response to an execution or registration of an application of the entity issuing the payment instrument on a communication device; obtaining, through a location sensor of the POS device, a current location of the payment transaction; determining whether the current location of the payment transaction involving the payment instrument substantially matches the predicted location of the communication device associated with the holder of the payment instrument; and implementing, via the processor, a cardholder verification method (CVM) that specifies a device-specific order of verification information to request for verifying the payment instrument if the current location of the communication device matches the predicted location.
  • The method includes determining a level of risk associated with the transaction based at least in part on a mapping of the predicted location with the current location; and configuring the device-specific order of verification information in accordance with the level of risk. The method includes predicting the location of the communication device by using the attribute to query the communication device. The method also includes determining whether to implement a generic order of the CVM specified by a card processing network or modify the generic order of the CVM to a device-specific order of the CVM based at least in part on one or more of: (a) a cost of the payment transaction for which the payment instrument is being authorized; (b) a hardware capability of the POS device; (c) the location of the payment transaction; and (d) the entity issuing the payment instrument.
  • FIGS. 5A-C further illustrate exemplary use cases associated with the method and systems described above. For example, in a first exemplary scenario 5A, the user presents the payment card 502 at the payment terminal 504 for a transaction amount over a transaction limit pre-set by the issuer or card network processor. Traditionally, the terminal declines the transaction and no further communication is supplied to the payment processor 506 or issuer 510. In the embodiments described herein, the payment terminal 504 sends information pertaining to the payment card 502 and/or the transaction, including size of the ticket, to the issuer 510. The issuer 510 then, based on risk analysis of the ticket size with respect to the specific user, may prompt a secondary authentication or decline the charge and prompt another form of payment. The issuer 510 performs the risk analysis based on one or more rules stored in the rule engine 508 associated with the payment service 502 or the issuer 510.
  • In a second example scenario 5B, the new CVM may be authenticated before the normal payment flow. The user presents the payment card 502 at the payment terminal 504. The payment terminal 504 sends the request for CVM to the issuer 510 via the payment processing system, or payment service, 506. The issuer 510 then compares the payment card identifier embedded in the request with an internal database. If the payment card is identified, the issuer sends a request on the communication device of the user 512 for either a response or an actual CVM, such as a text message or fingerprint response. The communication device of the user 512 does not necessarily need to be at the location of the payment transaction, however. As such, the user need not respond to the CVM requested by the issuer contemporaneous to the payment transaction. In such cases, the issuer can provisionally authenticate the payment transaction and finalize the transaction after the user has provided the CVM at a later time. The issuer may assign a specific time window within which the issuer allows the user to provide an input to the CVM. The CVM is then submitted directly to the issuer 510 as consumer device cardholder verification method (CDCVM). The issuer 510 sends the collected CVM to the payment processing system 506. The payment transaction is then authorized and the item is released to the customer.
  • In a third example scenario 5C, the user presents the payment card 502 at the payment terminal 504. The payment terminal 504 sends the request for CVM to the issuer 510 via the payment processing system, or the payment service, 506. In one implementation, the issuer identifies the user's communication device (either by identifying the device identifier, a mobile payment application, phone number of the user using a certain payment card, or other such identifier). The issuer determines the validity of the CVM and confirms that the collected CVM is adequate for authentication and therefore for chargeback and liability purposes. In this manner, the authentication is accepted as part of the messaging or other way to detect communication device.
  • Although the subject matter has been described in language specific to structural features and/or methodological acts, it is to be understood that the subject matter defined in the appended claims is not necessarily limited to the specific features or acts described. Rather, the specific features and acts are disclosed as example forms of implementing the claims.

Claims (21)

What is claimed is:
1. A method for verifying a payment card at the time of a payment transaction between a merchant and a customer, the method comprising:
receiving, at a point-of-sale (POS) device and from the user, the payment card for satisfying a cost of the payment transaction between the merchant and the customer;
receiving, by the POS device, information from the payment card, including information related to a card network processor associated with the received payment card;
detecting, by the POS device, a location of the POS device or one or more communication devices, wherein the location indicates a current location of the payment transaction;
sending, to a processor of an issuing entity of the payment card and via a payment processing system, the information from the payment card;
determining, by the processor of the issuing entity and based on the information from the payment card, if the user has installed an application on at least one registered communication device, the application configured for user management of the payment transaction using the payment card;
obtaining, by the processor of the issuing entity, a device identifier corresponding to the registered communication device, wherein the device identifier is capable of indicating a location of the registered communication device on which the application is installed, and wherein the device identifier having been generated when the application is installed on the registered communication device;
comparing, by the payment processing system, the location of the registered communication device as indicated by the device identifier with the location of the POS device or any of the communication devices at the current location of the payment transaction;
if the location of the registered communication device as indicated by the device identifier is substantially similar to the location of the POS device or any of the communication devices at the current place of the payment transaction, configuring a cardholder verification method (CVM) for verifying the payment card received at the POS device irrespective of the CVM for the card network processor associated with the received payment card; and
if the location of the registered communication device as indicated by the device identifier is substantially dissimilar to the location of the POS device or any of the communication devices at the current place of the payment transaction, presenting to the user the CVM specified by the card network processor associated with the received payment card.
2. The method as recited in claim 1, wherein the payment processing system further determines a level of risk associated with the payment transaction based at least on the location of the registered device being substantially dissimilar to the location of the POS device or any of the communication devices.
3. The method as recited in claim 1, wherein the configuring is further based at least in part on at least one of hardware associated with the POS device or a capability of the POS device, and wherein the hardware includes a touch screen to receive signature of the user or a dedicated hardware device for receiving personal identification numbers (PINs).
4. One or more computer-readable media storing computer-executable instructions that, when executed on one or more processors, cause the one or more processors to perform acts comprising:
receiving, by an entity issuing a payment instrument, a request to authorize the payment instrument at a point-of-sale (POS) device, the entity issuing the payment instrument programmed to selectively implement a dynamic cardholder verification method (CVM) at the POS device, wherein the dynamic CVM is configured based on an identifier associated with the payment transaction;
receiving, the identifier associated with the payment transaction, the identifier including information corresponding to the payment instrument and/or one or more communication devices in proximity to the payment instrument;
determining, by an entity issuing the payment instrument and based on the identifier, whether at least one of the communication devices is registered with the entity issuing the payment instrument;
determining, by the entity issuing the payment instrument, whether to implement a static CVM specified by a card network associated with the payment instrument or whether to apply the dynamic CVM, wherein the dynamic CVM is generated and applied if the communication device is registered with the entity issuing the payment instrument; and
requesting, on the POS device, an input in response to the dynamic CVM generated by the entity issuing the payment instrument.
5. The one or more computer-readable media as recited in claim 4, wherein the identifier comprises a location of the communication device with respect to a location of the payment instrument or the POS device.
6. The one or more computer-readable media as recited in claim 4, wherein the identifier comprises whether the payment instrument includes a magnetic strip storing payment information associated with the payment instrument or a chip storing the payment information associated with the payment instrument.
7. The one or more computer-readable media as recited in claim 4, wherein the dynamic CVM comprises a specific order of a personal identification number (PIN) or a signature of the user associated with the payment instrument followed by another PIN or a signature.
8. The one or more computer-readable media as recited in claim 4, wherein the determining whether to implement or modify the static CVM specified by the card network is further based at least in part on a capability of the POS device or the communication device.
9. The one or more computer-readable media as recited in claim 4, the acts further comprising:
submitting the dynamic CVM and an identifier associated with the payment instrument to a remote entity for authorizing the payment instrument;
receiving an indication that the payment instrument has not been authorized; and
requesting the static CVM from a user associated with the payment instrument after receiving the indication.
10. A payment device comprising:
one or more processors; and
one or more computer-readable media storing computer-executable instructions that, when executed by the one or more processors, cause the one or more processors to:
obtain an attribute associated with the payment instrument received by the payment device, wherein the payment instrument is used towards satisfying a cost of a payment transaction;
obtain information corresponding to at least one communication device associated with the payment device or the payment instrument;
detect, based on the information of the communication device and the attribute of the payment device, whether there is a pre-existing relationship between the communication device and the payment instrument;
on detecting the pre-existing relationship between the communication device and the payment instrument, generate a verification order different from a default verification order set by a card network processor, wherein the verification order is presented to a customer of the payment instrument to authorize the payment transaction; and
request an input from the customer of the payment instrument according to the generated verification order.
11. The payment device as recited in claim 10, wherein the pre-existing relationship is established at a time of registration of the payment instrument or the communication device with the payment device issuing the payment instrument.
12. The payment device as recited in claim 10, further includes a rule engine to determine a risk level associated with the payment transaction, based in part on the pre-existing relationship between the communication device and the payment instrument,
13. The payment device as recited in claim 12, wherein the rule engine is configured to:
query a device registered with the payment instrument;
compare the location of the registered device with the communication device in proximity to the payment instrument or the payment device; and
determine that the relationship is pre-existing based at least on the comparison.
14. The payment device as recited in claim 10, wherein the attribute comprises whether the payment instrument includes a magnetic strip that stores payment information or a chip that stores the payment information.
15. The payment device as recited in claim 10, wherein the default verification order is a generic value set by the card network processor for the payment instrument issued by an entity issuing the payment instrument.
16. The payment device as recited in claim 10, wherein the determining of the CVM is based at least in part on one or more of: (a) specifications of the apparatus; (b) the cost of the payment transaction; (c) a type of the payment instrument; and (d) a brand of the payment instrument.
17. The payment device as recited in claim 10, further comprising a touch-sensitive display to display information regarding the payment transaction and to receive from the customer associated with the payment instrument an input corresponding to the generated CVM.
18. A method implemented at least in part by a processor associated with an entity issuing at least one payment instrument, the method comprising:
receiving a request to authenticate use of the payment instrument at a point-of-sale (POS) device in response to a payment transaction;
obtaining, from a database, an attribute associated with the payment instrument, wherein the attribute indicates a predicted location of a communication device associated with a holder of the payment instrument at a time of the payment transaction, wherein the attribute is set in response to an execution or registration of an application of the entity issuing the payment instrument on a communication device;
obtaining, through a location sensor of the POS device, a current location of the payment transaction;
determining whether the current location of the payment transaction involving the payment instrument substantially matches the predicted location of the communication device associated with the holder of the payment instrument; and
implementing, via the processor, a cardholder verification method (CVM) that specifies a device-specific order of verification information to request for verifying the payment instrument if the current location of the communication device matches the predicted location.
19. The method as recited in claim 18, further comprising:
determining a level of risk associated with the transaction based at least in part on a mapping of the predicted location with the current location; and
configuring the device-specific order of verification information in accordance with the level of risk.
20. The method as recited in claim 18, further includes predicting the location of the communication device by using the attribute to query the communication device.
21. The method as recited in claim 18, further includes determining whether to implement a generic order of the CVM specified by a card processing network or modify the generic order of the CVM to a device-specific order of the CVM based at least in part on one or more of: (a) a cost of the payment transaction for which the payment instrument is being authorized; (b) a hardware capability of the POS device; (c) the location of the payment transaction; and (d) the entity issuing the payment instrument.
US15/464,079 2017-03-20 2017-03-20 Configuring Verification Information At Point-of-Sale Devices Abandoned US20180268408A1 (en)

Priority Applications (3)

Application Number Priority Date Filing Date Title
US15/464,079 US20180268408A1 (en) 2017-03-20 2017-03-20 Configuring Verification Information At Point-of-Sale Devices
PCT/US2018/023392 WO2018175462A1 (en) 2017-03-20 2018-03-20 Configuring verification information at point-of-sale devices
US16/799,344 US12387212B2 (en) 2017-03-20 2020-02-24 Configuring verification information at point-of-sale devices

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
US15/464,079 US20180268408A1 (en) 2017-03-20 2017-03-20 Configuring Verification Information At Point-of-Sale Devices

Related Child Applications (1)

Application Number Title Priority Date Filing Date
US16/799,344 Continuation US12387212B2 (en) 2017-03-20 2020-02-24 Configuring verification information at point-of-sale devices

Publications (1)

Publication Number Publication Date
US20180268408A1 true US20180268408A1 (en) 2018-09-20

Family

ID=62067773

Family Applications (2)

Application Number Title Priority Date Filing Date
US15/464,079 Abandoned US20180268408A1 (en) 2017-03-20 2017-03-20 Configuring Verification Information At Point-of-Sale Devices
US16/799,344 Active 2041-03-08 US12387212B2 (en) 2017-03-20 2020-02-24 Configuring verification information at point-of-sale devices

Family Applications After (1)

Application Number Title Priority Date Filing Date
US16/799,344 Active 2041-03-08 US12387212B2 (en) 2017-03-20 2020-02-24 Configuring verification information at point-of-sale devices

Country Status (2)

Country Link
US (2) US20180268408A1 (en)
WO (1) WO2018175462A1 (en)

Cited By (53)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20180012212A1 (en) * 2016-07-11 2018-01-11 Wunchun Chau Point of sale terminal with breakaway cable
US20180287852A1 (en) * 2017-04-03 2018-10-04 Bank Of America Corporation Data Transfer, Over Session or Connection, and Between Computing Device and One or More Servers to Determine Third Party Routing Network For User Device
US20180287927A1 (en) * 2017-04-03 2018-10-04 Bank Of America Corporation Data Transfer, Over Session or Connection, and Between Computing Device and Server to Determine Third Party Routing Network in Response to Determining Request to Use a Different Routing Network
US10163107B1 (en) 2016-03-31 2018-12-25 Square, Inc. Technical fallback infrastructure
US20190251073A1 (en) * 2018-02-14 2019-08-15 Samsung Electronics Co., Ltd. Method and interactive device for providing social interaction
US10515354B1 (en) 2014-12-05 2019-12-24 Square, Inc. Discounted card not present rates following failed card present attempts
US10601934B2 (en) 2017-04-03 2020-03-24 Bank Of America Corporation Data transfer, over session or connection, and between computing device and one or more servers for transmitting data to a third party computing device
US10601718B2 (en) 2017-04-03 2020-03-24 Bank Of America Corporation Data transfer, over session or connection, and between computing device and server associated with a routing network for modifying one or more parameters of the routing network
US10609156B2 (en) 2017-04-03 2020-03-31 Bank Of America Corporation Data transfer, over session or connection, and between computing device and server associated with one or more routing networks in response to detecting activity
US10608918B2 (en) 2017-04-03 2020-03-31 Bank Of America Corporation Data transfer, over session or connection, and between computing device and one or more servers to determine likelihood of user device using a routing network
CN111047341A (en) * 2018-10-15 2020-04-21 阿里巴巴集团控股有限公司 Information processing method and device, server and terminal equipment
US10716060B2 (en) 2017-04-03 2020-07-14 Bank Of America Corporation Data transfer between computing device and user device at different locations and over session or connection to display one or more routing networks to use
US10755281B1 (en) 2017-03-31 2020-08-25 Square, Inc. Payment transaction authentication system and method
WO2020181162A1 (en) * 2019-03-07 2020-09-10 Mastercard International Incorporated User verification for credential device
US20210049612A1 (en) * 2018-01-30 2021-02-18 Visa International Service Association System and Method for Biometric Fallback Authentication
US20210090062A1 (en) * 2018-03-07 2021-03-25 Capital One Services, Llc Secure payment using a network of wearable devices
US11036838B2 (en) 2018-12-05 2021-06-15 Bank Of America Corporation Processing authentication requests to secured information systems using machine-learned user-account behavior profiles
US11048793B2 (en) 2018-12-05 2021-06-29 Bank Of America Corporation Dynamically generating activity prompts to build and refine machine learning authentication models
US20210234848A1 (en) * 2018-01-11 2021-07-29 Visa International Service Association Offline authorization of interactions and controlled tasks
US11107056B2 (en) 2013-11-26 2021-08-31 Square, Inc. Card data output for cardless transactions
US11113370B2 (en) 2018-12-05 2021-09-07 Bank Of America Corporation Processing authentication requests to secured information systems using machine-learned user-account behavior profiles
US11120109B2 (en) 2018-12-05 2021-09-14 Bank Of America Corporation Processing authentication requests to secured information systems based on machine-learned event profiles
US20210287193A1 (en) * 2019-05-24 2021-09-16 Tencent Technology (Shenzhen) Company Limited Payment processing method, electronic device, and computer-readable storage medium
US11132697B2 (en) * 2018-06-15 2021-09-28 Wells Fargo Bank, N.A. Risk detection of false customer information
US11159510B2 (en) 2018-12-05 2021-10-26 Bank Of America Corporation Utilizing federated user identifiers to enable secure information sharing
US11170354B2 (en) * 2017-03-16 2021-11-09 Perk Hero Software Inc. Wireless systems and methods for bill payment
US11176230B2 (en) 2018-12-05 2021-11-16 Bank Of America Corporation Processing authentication requests to secured information systems based on user behavior profiles
US20210374745A1 (en) * 2017-10-25 2021-12-02 Capital One Services, Llc Dynamic modification of a verification method associated with a transaction card
US20210390546A1 (en) * 2020-06-15 2021-12-16 Magtek, Inc. Systems and Methods for Secure Transaction Processing
US20220067698A1 (en) * 2017-03-16 2022-03-03 Perk Hero Software Inc. Wireless payment systems, devices and methods for electronic payment
US11301844B2 (en) * 2016-08-12 2022-04-12 Mastercard International Incorporated Cryptographic authentication and tokenized transactions
US11410172B2 (en) 2019-12-31 2022-08-09 Mastercard International Incorporated Methods and systems for verification of operations of computer terminals and processing networks
US11514418B2 (en) 2017-03-19 2022-11-29 Nxp B.V. Personal point of sale (pPOS) device with a local and/or remote payment kernel that provides for card present e-commerce transaction
US20220398587A1 (en) * 2021-06-09 2022-12-15 Capital One Services, Llc Electronic profile and data security enforcement with user device data and methods of use thereof
US11593773B1 (en) 2017-03-31 2023-02-28 Block, Inc. Payment transaction authentication system and method
US11620623B2 (en) 2018-05-31 2023-04-04 Nxp B.V. Merchant transaction mirroring for personal point of sale (pPOS) for card present e-commerce and in vehicle transaction
US11831639B2 (en) 2018-06-06 2023-11-28 Capital One Services, Llc Systems and methods for using micro accelerations as a biometric identification factor
US11861589B2 (en) 2017-04-28 2024-01-02 Block, Inc. Multi-source transaction processing
US12045831B2 (en) * 2019-03-01 2024-07-23 Shopify Inc. Secure pin entry via mobile device
US12112313B2 (en) 2015-07-31 2024-10-08 Wells Fargo Bank, N.A. Connected payment card systems and methods
US12174992B1 (en) 2016-07-01 2024-12-24 Wells Fargo Bank, N.A. Access control interface for managing entities and permissions
US12198130B2 (en) 2016-07-01 2025-01-14 Wells Fargo Bank, N.A. Access control tower
US12205121B2 (en) 2015-03-27 2025-01-21 Wells Fargo Bank, N.A. Token management system
US12206674B2 (en) 2016-07-01 2025-01-21 Wells Fargo Bank, N.A. Access control tower
US12217248B1 (en) 2008-10-31 2025-02-04 Wells Fargo Bank, N.A. Payment vehicle with on and off function
US12223091B2 (en) 2016-07-01 2025-02-11 Wells Fargo Bank, N.A. Control tower for linking accounts to applications
US12238112B2 (en) 2021-01-05 2025-02-25 Wells Fargo Bank, N.A. Digital account controls portal and protocols for federated and non-federated systems and devices
US12238051B2 (en) 2020-09-04 2025-02-25 Wells Fargo Bank, N.A. Synchronous interfacing with unaffiliated networked systems to alter functionality of sets of electronic assets
US12299691B2 (en) 2017-04-25 2025-05-13 Wells Fargo Bank, N.A. System and method for card control
US12299657B2 (en) 2016-07-01 2025-05-13 Wells Fargo Bank, N.A. Control tower for prospective transactions
US20250238641A1 (en) * 2024-01-23 2025-07-24 Bank Of America Corporation System and method to maintain connectivity with a smart card
US12373884B2 (en) 2017-07-06 2025-07-29 Wells Fargo Bank, N.A. Data control tower
US12387212B2 (en) 2017-03-20 2025-08-12 Block, Inc. Configuring verification information at point-of-sale devices

Families Citing this family (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US11836727B1 (en) * 2020-12-04 2023-12-05 Wells Fargo Bank, N.A. Location based transaction authentication
US20220270097A1 (en) * 2021-02-24 2022-08-25 City Hive Inc. System and method for passive authentication of remote user transactions
US11790120B2 (en) 2021-03-26 2023-10-17 Bank Of America Corporation System and method for encrypting storage mediums with an encryption chip
EP4287094A1 (en) * 2022-05-30 2023-12-06 Surfboard Payments AB Method and system for verifying a payment

Family Cites Families (142)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US3863050A (en) 1974-01-07 1975-01-28 Max T Brugger Automatic credit card validating device
US4048476A (en) 1976-04-09 1977-09-13 Ncr Corporation Card reader
US5819226A (en) 1992-09-08 1998-10-06 Hnc Software Inc. Fraud detection using predictive modeling
US5859414A (en) 1995-12-29 1999-01-12 Aironet Wireless Communications, Inc. Interactive customer information terminal
US7545816B1 (en) 1998-04-29 2009-06-09 Ncr Corporation Transaction processing systems maintenance
US7263506B2 (en) 2000-04-06 2007-08-28 Fair Isaac Corporation Identification and management of fraudulent credit/debit card purchases at merchant ecommerce sites
US7698217B1 (en) 2000-04-20 2010-04-13 Christopher Phillips Masking private billing data by assigning other billing data to use in commerce with businesses
US7376618B1 (en) 2000-06-30 2008-05-20 Fair Isaac Corporation Detecting and measuring risk with predictive models using content mining
US7457767B1 (en) 2000-10-05 2008-11-25 International Business Machines Corporation Pay at the table system
CA2332656A1 (en) 2001-01-26 2002-07-26 Certapay Inc. Online payment transfer and identity management system and method
JP3809857B2 (en) 2001-03-15 2006-08-16 インターナショナル・ビジネス・マシーンズ・コーポレーション Transaction system, transaction terminal, transaction history output device, server, transaction history display method, computer program
US20090177563A1 (en) 2001-12-07 2009-07-09 American Express Travel Related Services Company, Inc. Authorization refresh system and method
US20040034612A1 (en) 2002-03-22 2004-02-19 Nick Mathewson Support vector machines for prediction and classification in supply chain management and other applications
US8397988B1 (en) 2002-08-09 2013-03-19 Britesmart Llc Method and system for securing a transaction using a card generator, a RFID generator, and a challenge response protocol
US7494055B2 (en) 2002-09-17 2009-02-24 Vivotech, Inc. Collaborative negotiation techniques for mobile personal trusted device financial transactions
US7702577B1 (en) 2003-11-06 2010-04-20 Jp Morgan Chase Bank, N.A. System and method for conversion of initial transaction to final transaction
US7543739B2 (en) 2003-12-17 2009-06-09 Qsecure, Inc. Automated payment card fraud detection and location
US20050071232A1 (en) 2004-10-19 2005-03-31 Stephanie A. Frater Credit system for restaurant tables and bars
US20060151598A1 (en) 2005-01-13 2006-07-13 Yen-Fu Chen Categorization based spending control
US8047908B2 (en) 2005-03-29 2011-11-01 Igt Methods and systems for determining and selling wagering game outcomes for a plurality of players
US7630938B2 (en) 2005-03-31 2009-12-08 United Parcel Service Of America, Inc. Flexible billing adjustment system
CA2648523C (en) 2005-04-21 2018-09-04 Securedpay Solutions, Inc. Portable handheld device for wireless order entry and real time payment authorization and related methods
US9391985B2 (en) 2005-04-26 2016-07-12 Guy Hefetz Environment-based two-factor authentication without geo-location
US7997476B2 (en) 2005-09-15 2011-08-16 Capital One Financial Corporation Wireless devices for storing a financial account card and methods for storing card data in a wireless device
US20070108279A1 (en) 2005-11-14 2007-05-17 A-Men Technology Corporation Unfold smart-card card reader
US8275312B2 (en) 2005-12-31 2012-09-25 Blaze Mobile, Inc. Induction triggered transactions using an external NFC device
US7693767B2 (en) 2006-03-23 2010-04-06 Oracle International Corporation Method for generating predictive models for a business problem via supervised learning
US7788195B1 (en) 2006-03-24 2010-08-31 Sas Institute Inc. Computer-implemented predictive model generation systems and methods
US7818264B2 (en) 2006-06-19 2010-10-19 Visa U.S.A. Inc. Track data encryption
US20080040261A1 (en) 2006-04-24 2008-02-14 Robert Nix Systems and methods for implementing financial transactions
US7962369B2 (en) 2006-09-29 2011-06-14 Einar Rosenberg Apparatus and method using near field communications
US20080208743A1 (en) 2007-02-22 2008-08-28 First Data Corporation Transfer of value between mobile devices in a mobile commerce system
US20090048936A1 (en) 2007-04-13 2009-02-19 Lerch John W Method and system for RFID transaction integrity utilizing an EEPROM
US8121956B2 (en) 2007-06-25 2012-02-21 Visa U.S.A. Inc. Cardless challenge systems and methods
US20090006151A1 (en) 2007-06-29 2009-01-01 Jay Zarghami Collection of receipt data from point-of-sale devices
US20150081557A1 (en) 2010-09-14 2015-03-19 Craig Patrick Kinfoil Method of processing payment transactions
US20090164374A1 (en) 2007-12-21 2009-06-25 Ebay Inc. System and Methods for One Time Check Numbers
US20140258055A1 (en) 2008-03-13 2014-09-11 Giftya Llc System and method for a gift tracker
US20100005013A1 (en) 2008-07-03 2010-01-07 Retail Decisions, Inc. Methods and systems for detecting fraudulent transactions in a customer-not-present environment
US9652023B2 (en) 2008-07-24 2017-05-16 Intelligent Mechatronic Systems Inc. Power management system
US20100057612A1 (en) 2008-09-03 2010-03-04 Fan Hub Llc Kiosk based purchasing system
US20100097946A1 (en) 2008-10-22 2010-04-22 Nokia Corporation Optimized data transfer between approaching devices
AU2009311303B2 (en) 2008-11-06 2015-09-10 Visa International Service Association Online challenge-response
US20100063945A1 (en) 2008-11-12 2010-03-11 Cowan Jr William Curtis Systems and Methods Involving Processing of Payments Using Handheld Devices
US9557889B2 (en) 2009-01-28 2017-01-31 Headwater Partners I Llc Service plan design, user interfaces, application programming interfaces, and device management
US20100248779A1 (en) * 2009-03-26 2010-09-30 Simon Phillips Cardholder verification rule applied in payment-enabled mobile telephone
US7783515B1 (en) 2009-03-27 2010-08-24 Bank Of America Corporation Itemized receipt tracking system
US8600873B2 (en) 2009-05-28 2013-12-03 Visa International Service Association Managed real-time transaction fraud analysis and decisioning
US8745698B1 (en) 2009-06-09 2014-06-03 Bank Of America Corporation Dynamic authentication engine
US20110047075A1 (en) * 2009-08-19 2011-02-24 Mastercard International Incorporated Location controls on payment card transactions
US8412605B2 (en) 2009-12-01 2013-04-02 Bank Of America Corporation Comprehensive suspicious activity monitoring and alert system
US8598977B2 (en) 2010-04-16 2013-12-03 Tiny Towne International Llc System and method for driver training in a controlled driving environment
US20110313871A1 (en) 2010-05-18 2011-12-22 Laura Greenwood Apparatus, system, and method for facilitating a payment
US20120054102A1 (en) 2010-08-26 2012-03-01 Obopay, Inc. Method & System for Providing Payments Over A Wireless Connection
US20120123868A1 (en) 2010-11-17 2012-05-17 David Brudnicki System and Method for Physical-World Based Dynamic Contactless Data Emulation in a Portable Communication Device
US20120173410A1 (en) 2011-01-03 2012-07-05 Relay Holdings, Llc System and method for paying citations using sms text messaging
US8751318B2 (en) 2011-05-30 2014-06-10 Lg Electronics Inc. Method for managing and/or controlling store and system for the same
US20120317013A1 (en) 2011-06-13 2012-12-13 Ho Ming Luk Computer-Implemented Systems And Methods For Scoring Stored Enterprise Data
US8498900B1 (en) 2011-07-25 2013-07-30 Dash Software, LLC Bar or restaurant check-in and payment systems and methods of their operation
US20130073347A1 (en) 2011-09-21 2013-03-21 Albert Bogaard Vehicular citation management method and system
US20130226318A1 (en) 2011-09-22 2013-08-29 Dariusz Procyk Process transformation and transitioning apparatuses, methods and systems
US20130080331A1 (en) 2011-09-26 2013-03-28 Ebay Inc. System and Method for Instantaneous Retail Payment
WO2013048538A1 (en) 2011-10-01 2013-04-04 Intel Corporation Cloud based credit card emulation
EP2579194A1 (en) 2011-10-04 2013-04-10 Research In Motion Limited Providing increased ability to perform a transaction based on locale
US11580562B2 (en) 2011-10-25 2023-02-14 Alexander Song Anti-fraud financial transactions system
US10339525B2 (en) 2011-10-27 2019-07-02 Boom! Payments, Inc. Confirming local marketplace transaction consummation for online payment consummation
DE202012100620U1 (en) 2011-11-22 2012-06-13 Square, Inc. System for processing cardless payment transactions
KR20140121764A (en) 2012-01-05 2014-10-16 비자 인터네셔널 서비스 어소시에이션 Transaction visual capturing apparatuses, methods and systems
US20130254115A1 (en) 2012-01-19 2013-09-26 Mastercard International Incorporated Converged cross-platform electronic wallet
DE212012000252U1 (en) 2012-01-30 2014-09-24 Ebay Inc. Systems for providing application-based payment processes
US20130218757A1 (en) 2012-02-16 2013-08-22 Dharani Ramanathan Payments using a recipient photograph
US8947239B1 (en) 2012-03-05 2015-02-03 Fitbit, Inc. Near field communication system, and method of operating same
US8500010B1 (en) 2012-03-15 2013-08-06 Ebay Inc. Card reader for mobile device
US9741045B1 (en) 2012-03-16 2017-08-22 Square, Inc. Ranking of merchants for cardless payment transactions
WO2013147904A1 (en) 2012-03-31 2013-10-03 Intel Corporation Securely generating time and location bounded virtual transaction cards using mobile wallets without involving third parties or point of sale terminals
WO2013159110A1 (en) 2012-04-20 2013-10-24 Conductiv Software, Inc. Multi-factor mobile transaction authentication
US9607297B2 (en) 2012-06-06 2017-03-28 Intuit Inc. Mobile payment via a virtual peripheral device
US9818093B1 (en) 2012-06-14 2017-11-14 Amazon Technologies, Inc. Third party check-in associations with cloud wallet
US9262755B2 (en) 2012-06-20 2016-02-16 Intuit Inc. Mobile payment system
US10096020B2 (en) 2012-08-30 2018-10-09 Worldpay, Llc Combination payment card and methods thereof
US8606696B1 (en) 2012-09-11 2013-12-10 Simplexity, Inc. Assessing consumer purchase behavior in making a financial contract authorization decision
US8856894B1 (en) 2012-11-28 2014-10-07 Consumerinfo.Com, Inc. Always on authentication
CA2893040A1 (en) 2012-11-30 2014-06-05 XRomb Inc. System and method of processing payment at a point-of-sale terminal using a mobile device
US20140172551A1 (en) 2012-12-19 2014-06-19 Sas Institute Inc. Using Transaction Data and Platform for Mobile Devices
US8762272B1 (en) 2012-12-27 2014-06-24 Google Inc. Management of emails containing payments
US20140195272A1 (en) 2013-01-07 2014-07-10 Hassan Sadiq Systems and methods of gamification for a driving performance product
US9123036B2 (en) 2013-03-01 2015-09-01 Looppay, Inc. Mobile checkout systems and methods
US9286500B1 (en) 2013-03-15 2016-03-15 Square, Inc. Card reader communication method
US9125180B1 (en) 2013-03-15 2015-09-01 Google Inc. Techniques for automatically establishing a long-lasting connection across computing devices configured for short-range wireless communication
US9633322B1 (en) 2013-03-15 2017-04-25 Consumerinfo.Com, Inc. Adjustment of knowledge-based authentication
US20140279113A1 (en) * 2013-03-15 2014-09-18 Harish Balasubramanian System and Method to Reduce Misuse of a Financial Instrument at a Point-of-Sale Location
GB2513340A (en) 2013-04-23 2014-10-29 Travelex Ltd Processing system
US10592890B2 (en) 2014-09-03 2020-03-17 Intel Corporation Methods and arrangements to complete online transactions
US10217103B2 (en) 2013-05-16 2019-02-26 Avant-Garde Ip Llc System, method and article of manufacture to facilitate a financial transaction without unlocking a mobile device
GB201310084D0 (en) * 2013-06-06 2013-07-17 Mastercard International Inc Improvements to electronic authentication systems
US9125014B2 (en) 2013-06-09 2015-09-01 Apple Inc. Location-based ticket books
US20150041534A1 (en) 2013-08-07 2015-02-12 1 Oak Technologies, LLC Electronic payment transponder
US9588801B2 (en) 2013-09-11 2017-03-07 Intel Corporation Apparatus and method for improved lock elision techniques
US9396730B2 (en) 2013-09-30 2016-07-19 Bank Of America Corporation Customer identification through voice biometrics
US20150106260A1 (en) 2013-10-11 2015-04-16 G2 Web Services System and methods for global boarding of merchants
US9727866B2 (en) 2013-10-15 2017-08-08 Intuit Inc. Methods systems and computer program products for verifying consumer identity during transaction
US10909539B2 (en) 2013-10-29 2021-02-02 Visa International Service Association Enhancements to transaction processing in a secure environment using a merchant computer
US9799021B1 (en) 2013-11-26 2017-10-24 Square, Inc. Tip processing at a point-of-sale system
US9922322B2 (en) * 2013-12-19 2018-03-20 Visa International Service Association Cloud-based transactions with magnetic secure transmission
US9858572B2 (en) 2014-02-06 2018-01-02 Google Llc Dynamic alteration of track data
US9342717B2 (en) 2014-02-26 2016-05-17 Ncr Corporation Tamper detection system and method
US20150254662A1 (en) * 2014-03-05 2015-09-10 Mastercard International Incorporated Verifying transaction context data at wallet service provider
US9767471B1 (en) 2014-03-24 2017-09-19 Square, Inc. Determining recommendations from buyer information
US9971627B2 (en) 2014-03-26 2018-05-15 Intel Corporation Enabling maximum concurrency in a hybrid transactional memory system
US8990121B1 (en) 2014-05-08 2015-03-24 Square, Inc. Establishment of a secure session between a card reader and a mobile device
US20150332223A1 (en) 2014-05-19 2015-11-19 Square, Inc. Transaction information collection for mobile payment experience
US9852410B1 (en) * 2014-06-17 2017-12-26 Square, Inc. Dynamically configuring verification information at point-of-sale devices
US9589263B2 (en) 2014-06-27 2017-03-07 Paypal, Inc. Automatic payment code display system
US20160012421A1 (en) 2014-07-11 2016-01-14 Google Inc. Hands-free transactions using beacon identifiers
US9166999B1 (en) 2014-07-25 2015-10-20 Fmr Llc Security risk aggregation, analysis, and adaptive control
US9530128B1 (en) 2014-08-08 2016-12-27 Square, Inc. Payment instrument verification techniques
US20160055538A1 (en) 2014-08-25 2016-02-25 Ebay Inc. Wireless beacons for reporting of applications in the foreground of a user device interface
US9436335B1 (en) 2014-09-30 2016-09-06 Amazon Technologies, Inc. Input transformative system
KR102391149B1 (en) 2014-10-27 2022-04-28 메타 플랫폼스, 인크. Facilitating sending and receiving of payments using message-based contextual prompts
WO2016080952A1 (en) 2014-11-17 2016-05-26 Empire Technology Development Llc Mobile device prevention of contactless card attacks
US9836732B1 (en) 2014-11-25 2017-12-05 Square, Inc. Payment handling
US10515354B1 (en) 2014-12-05 2019-12-24 Square, Inc. Discounted card not present rates following failed card present attempts
US10542380B2 (en) 2015-01-30 2020-01-21 Bby Solutions, Inc. Beacon-based media network
WO2016134400A1 (en) * 2015-02-27 2016-09-01 Molino David Multi-function transaction card
US11481750B2 (en) 2015-06-30 2022-10-25 Block, Inc. Pairing a payment object reader with a point-of-sale terminal
US10643245B2 (en) 2016-07-15 2020-05-05 NXT-ID, Inc. Preference-driven advertising systems and methods
SG10201914040YA (en) 2015-09-10 2020-03-30 Verrency Holdings Ltd Proxy device for representing multiple credentials
US10049349B1 (en) 2015-09-29 2018-08-14 Square, Inc. Processing electronic payment transactions in offline-mode
US20170091765A1 (en) 2015-09-30 2017-03-30 Bank Of America Corporation Non-intrusive geo-location determination associated with transaction authorization
CA3040776A1 (en) 2015-11-19 2017-05-26 Securter Systems Inc. Coordinator managed payments
HK1218492A2 (en) 2015-12-30 2017-02-17 演基发展有限公司 Method for controlling wireless communication between a mobile device and an electronic device
US10552821B2 (en) 2016-01-13 2020-02-04 Paypal, Inc. Dongle device for automatic pairing of payment terminal to mobile computing device
US20170243224A1 (en) * 2016-02-18 2017-08-24 Mastercard International Incorporated Methods and systems for browser-based mobile device and user authentication
US10163107B1 (en) 2016-03-31 2018-12-25 Square, Inc. Technical fallback infrastructure
US10062078B1 (en) 2016-06-14 2018-08-28 Square, Inc. Fraud detection and transaction review
US10068235B1 (en) 2016-06-14 2018-09-04 Square, Inc. Regulating fraud probability models
US10366378B1 (en) 2016-06-30 2019-07-30 Square, Inc. Processing transactions in offline mode
US9996829B1 (en) 2016-12-27 2018-06-12 Square, Inc. System for global point-of-sale capabilities
US20180268408A1 (en) 2017-03-20 2018-09-20 Square, Inc. Configuring Verification Information At Point-of-Sale Devices
US12020235B2 (en) 2017-04-28 2024-06-25 Block, Inc. Multi-source transaction processing
US9990632B1 (en) * 2017-10-25 2018-06-05 Capital One Services, Llc Dynamic modification of a verification method associated with a transaction card
US20190385160A1 (en) * 2018-06-19 2019-12-19 Mastercard International Incorporated System and process for on-the-fly cardholder verification method selection

Cited By (87)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US12217248B1 (en) 2008-10-31 2025-02-04 Wells Fargo Bank, N.A. Payment vehicle with on and off function
US11107056B2 (en) 2013-11-26 2021-08-31 Square, Inc. Card data output for cardless transactions
US10515354B1 (en) 2014-12-05 2019-12-24 Square, Inc. Discounted card not present rates following failed card present attempts
US12333551B2 (en) 2015-03-27 2025-06-17 Wells Fargo Bank, N.A. Token management system
US12205121B2 (en) 2015-03-27 2025-01-21 Wells Fargo Bank, N.A. Token management system
US12112313B2 (en) 2015-07-31 2024-10-08 Wells Fargo Bank, N.A. Connected payment card systems and methods
US10163107B1 (en) 2016-03-31 2018-12-25 Square, Inc. Technical fallback infrastructure
US10949858B2 (en) 2016-03-31 2021-03-16 Square, Inc. Technical fallback infrastructure
US12229384B2 (en) 2016-07-01 2025-02-18 Wells Fargo Bank, N.A. Access control interface for managing entities and permissions
US12229385B2 (en) 2016-07-01 2025-02-18 Wells Fargo Bank, N.A. Access control interface for managing entities and permissions
US12248611B2 (en) 2016-07-01 2025-03-11 Wells Fargo Bank, N.A. Unlinking applications from accounts
US12223091B2 (en) 2016-07-01 2025-02-11 Wells Fargo Bank, N.A. Control tower for linking accounts to applications
US12299657B2 (en) 2016-07-01 2025-05-13 Wells Fargo Bank, N.A. Control tower for prospective transactions
US12206674B2 (en) 2016-07-01 2025-01-21 Wells Fargo Bank, N.A. Access control tower
US12314435B2 (en) 2016-07-01 2025-05-27 Wells Fargo Bank, N.A. Control tower for defining access permissions based on data type
US12198130B2 (en) 2016-07-01 2025-01-14 Wells Fargo Bank, N.A. Access control tower
US12321490B2 (en) 2016-07-01 2025-06-03 Wells Fargo Bank, N.A. Scrubbing account data accessed via links to applications or devices
US12197696B2 (en) 2016-07-01 2025-01-14 Wells Fargo Bank, N.A. Access control tower
US12182376B2 (en) 2016-07-01 2024-12-31 Wells Fargo Bank, N.A. Control tower restrictions on third party platforms
US12174992B1 (en) 2016-07-01 2024-12-24 Wells Fargo Bank, N.A. Access control interface for managing entities and permissions
US12333047B2 (en) 2016-07-01 2025-06-17 Wells Fargo Bank, N.A. Scrubbing account data accessed via links to applications or devices
US11062289B2 (en) * 2016-07-11 2021-07-13 Wunchun Chau Point of sale terminal with breakaway cable
US20180012212A1 (en) * 2016-07-11 2018-01-11 Wunchun Chau Point of sale terminal with breakaway cable
US11301844B2 (en) * 2016-08-12 2022-04-12 Mastercard International Incorporated Cryptographic authentication and tokenized transactions
US11170354B2 (en) * 2017-03-16 2021-11-09 Perk Hero Software Inc. Wireless systems and methods for bill payment
US20220067698A1 (en) * 2017-03-16 2022-03-03 Perk Hero Software Inc. Wireless payment systems, devices and methods for electronic payment
US11514418B2 (en) 2017-03-19 2022-11-29 Nxp B.V. Personal point of sale (pPOS) device with a local and/or remote payment kernel that provides for card present e-commerce transaction
US12387212B2 (en) 2017-03-20 2025-08-12 Block, Inc. Configuring verification information at point-of-sale devices
US11593773B1 (en) 2017-03-31 2023-02-28 Block, Inc. Payment transaction authentication system and method
US10755281B1 (en) 2017-03-31 2020-08-25 Square, Inc. Payment transaction authentication system and method
US20180287852A1 (en) * 2017-04-03 2018-10-04 Bank Of America Corporation Data Transfer, Over Session or Connection, and Between Computing Device and One or More Servers to Determine Third Party Routing Network For User Device
US10716060B2 (en) 2017-04-03 2020-07-14 Bank Of America Corporation Data transfer between computing device and user device at different locations and over session or connection to display one or more routing networks to use
US20180287927A1 (en) * 2017-04-03 2018-10-04 Bank Of America Corporation Data Transfer, Over Session or Connection, and Between Computing Device and Server to Determine Third Party Routing Network in Response to Determining Request to Use a Different Routing Network
US10601934B2 (en) 2017-04-03 2020-03-24 Bank Of America Corporation Data transfer, over session or connection, and between computing device and one or more servers for transmitting data to a third party computing device
US10609156B2 (en) 2017-04-03 2020-03-31 Bank Of America Corporation Data transfer, over session or connection, and between computing device and server associated with one or more routing networks in response to detecting activity
US10608918B2 (en) 2017-04-03 2020-03-31 Bank Of America Corporation Data transfer, over session or connection, and between computing device and one or more servers to determine likelihood of user device using a routing network
US10601718B2 (en) 2017-04-03 2020-03-24 Bank Of America Corporation Data transfer, over session or connection, and between computing device and server associated with a routing network for modifying one or more parameters of the routing network
US10798007B2 (en) 2017-04-03 2020-10-06 Bank Of America Corporation Data transfer, over session or connection, and between computing device and server associated with a routing network for modifying one or more parameters of the routing network
US12299691B2 (en) 2017-04-25 2025-05-13 Wells Fargo Bank, N.A. System and method for card control
US12354111B2 (en) 2017-04-25 2025-07-08 Wells Fargo Bank, N.A. System and method for card control
US11861589B2 (en) 2017-04-28 2024-01-02 Block, Inc. Multi-source transaction processing
US12020235B2 (en) 2017-04-28 2024-06-25 Block, Inc. Multi-source transaction processing
US12373884B2 (en) 2017-07-06 2025-07-29 Wells Fargo Bank, N.A. Data control tower
US11625724B2 (en) * 2017-10-25 2023-04-11 Capital One Services, Llc Dynamic modification of a verification method associated with a transaction card
US20210374745A1 (en) * 2017-10-25 2021-12-02 Capital One Services, Llc Dynamic modification of a verification method associated with a transaction card
US11961091B2 (en) 2017-10-25 2024-04-16 Capital One Services, Llc Dynamic modification of a verification method associated with a transaction card
US20210234848A1 (en) * 2018-01-11 2021-07-29 Visa International Service Association Offline authorization of interactions and controlled tasks
US11855971B2 (en) * 2018-01-11 2023-12-26 Visa International Service Association Offline authorization of interactions and controlled tasks
US11587087B2 (en) * 2018-01-30 2023-02-21 Visa International Service Association System and method for biometric fallback authentication
US20230196365A1 (en) * 2018-01-30 2023-06-22 Visa International Service Association System and Method for Biometric Fallback Authentication
US11907950B2 (en) * 2018-01-30 2024-02-20 Visa International Service Association System and method for biometric fallback authentication
US20210049612A1 (en) * 2018-01-30 2021-02-18 Visa International Service Association System and Method for Biometric Fallback Authentication
US20190251073A1 (en) * 2018-02-14 2019-08-15 Samsung Electronics Co., Ltd. Method and interactive device for providing social interaction
US11620630B2 (en) * 2018-03-07 2023-04-04 Capital One Services, Llc Secure payment using a network of wearable devices
US20210090062A1 (en) * 2018-03-07 2021-03-25 Capital One Services, Llc Secure payment using a network of wearable devices
US11620623B2 (en) 2018-05-31 2023-04-04 Nxp B.V. Merchant transaction mirroring for personal point of sale (pPOS) for card present e-commerce and in vehicle transaction
US11831639B2 (en) 2018-06-06 2023-11-28 Capital One Services, Llc Systems and methods for using micro accelerations as a biometric identification factor
US11132697B2 (en) * 2018-06-15 2021-09-28 Wells Fargo Bank, N.A. Risk detection of false customer information
US11842354B1 (en) 2018-06-15 2023-12-12 Wells Fargo Bank, N.A. Risk detection of false customer information
CN111047341A (en) * 2018-10-15 2020-04-21 阿里巴巴集团控股有限公司 Information processing method and device, server and terminal equipment
US11775623B2 (en) 2018-12-05 2023-10-03 Bank Of America Corporation Processing authentication requests to secured information systems using machine-learned user-account behavior profiles
US11048793B2 (en) 2018-12-05 2021-06-29 Bank Of America Corporation Dynamically generating activity prompts to build and refine machine learning authentication models
US11036838B2 (en) 2018-12-05 2021-06-15 Bank Of America Corporation Processing authentication requests to secured information systems using machine-learned user-account behavior profiles
US11790062B2 (en) 2018-12-05 2023-10-17 Bank Of America Corporation Processing authentication requests to secured information systems based on machine-learned user behavior profiles
US11120109B2 (en) 2018-12-05 2021-09-14 Bank Of America Corporation Processing authentication requests to secured information systems based on machine-learned event profiles
US12355750B2 (en) 2018-12-05 2025-07-08 Bank Of America Corporation Utilizing federated user identifiers to enable secure information sharing
US11113370B2 (en) 2018-12-05 2021-09-07 Bank Of America Corporation Processing authentication requests to secured information systems using machine-learned user-account behavior profiles
US11159510B2 (en) 2018-12-05 2021-10-26 Bank Of America Corporation Utilizing federated user identifiers to enable secure information sharing
US11176230B2 (en) 2018-12-05 2021-11-16 Bank Of America Corporation Processing authentication requests to secured information systems based on user behavior profiles
US11797661B2 (en) 2018-12-05 2023-10-24 Bank Of America Corporation Dynamically generating activity prompts to build and refine machine learning authentication models
US20240338709A1 (en) * 2019-03-01 2024-10-10 Shopify Inc. Secure pin entry via mobile device
US12045831B2 (en) * 2019-03-01 2024-07-23 Shopify Inc. Secure pin entry via mobile device
WO2020181162A1 (en) * 2019-03-07 2020-09-10 Mastercard International Incorporated User verification for credential device
US11392957B2 (en) 2019-03-07 2022-07-19 Mastercard International Incorporated User verification for credential device
US11379849B2 (en) 2019-03-07 2022-07-05 Mastercard International Incorporated Security for contactless transactions
US11922428B2 (en) 2019-03-07 2024-03-05 Mastercard International Incorporated Security for contactless transactions
US20210287193A1 (en) * 2019-05-24 2021-09-16 Tencent Technology (Shenzhen) Company Limited Payment processing method, electronic device, and computer-readable storage medium
US12093910B2 (en) * 2019-05-24 2024-09-17 Tencent Technology (Shenzhen) Company Limited Payment processing methods and apparatus
US11410172B2 (en) 2019-12-31 2022-08-09 Mastercard International Incorporated Methods and systems for verification of operations of computer terminals and processing networks
US20210390546A1 (en) * 2020-06-15 2021-12-16 Magtek, Inc. Systems and Methods for Secure Transaction Processing
US12238051B2 (en) 2020-09-04 2025-02-25 Wells Fargo Bank, N.A. Synchronous interfacing with unaffiliated networked systems to alter functionality of sets of electronic assets
US12238112B2 (en) 2021-01-05 2025-02-25 Wells Fargo Bank, N.A. Digital account controls portal and protocols for federated and non-federated systems and devices
US20220398587A1 (en) * 2021-06-09 2022-12-15 Capital One Services, Llc Electronic profile and data security enforcement with user device data and methods of use thereof
US20240211954A1 (en) * 2021-06-09 2024-06-27 Capital One Services, Llc Electronic profile and data security enforcement with user device data and methods of use thereof
US12314957B2 (en) * 2021-06-09 2025-05-27 Capital One Services, Llc Electronic profile and data security enforcement with user device data and methods of use thereof
US11928684B2 (en) * 2021-06-09 2024-03-12 Capital One Services, Llc Electronic profile and data security enforcement with user device data and methods of use thereof
US20250238641A1 (en) * 2024-01-23 2025-07-24 Bank Of America Corporation System and method to maintain connectivity with a smart card

Also Published As

Publication number Publication date
US20200250673A1 (en) 2020-08-06
US12387212B2 (en) 2025-08-12
WO2018175462A1 (en) 2018-09-27

Similar Documents

Publication Publication Date Title
US12387212B2 (en) Configuring verification information at point-of-sale devices
US10755281B1 (en) Payment transaction authentication system and method
US10991191B2 (en) Payment application initiated generation of payment instruments
US11593773B1 (en) Payment transaction authentication system and method
US20230245099A1 (en) Third-party access to secure hardware
US10366378B1 (en) Processing transactions in offline mode
US11961091B2 (en) Dynamic modification of a verification method associated with a transaction card
US10783517B2 (en) Third-party access to secure hardware
US10878416B2 (en) Apparatus, method, and computer program product for bus rapid transit ticketing and the like
US11120511B2 (en) System and method for universal card acceptance
US11295291B2 (en) Low battery and digital wallet
CA2949366A1 (en) Apparatus, method, and computer program product for settlement to a merchant's card account using an on-line bill payment platform
US20150081554A1 (en) Systems and Methods for Managing Mobile Account Holder Verification Methods
US12293371B2 (en) Systems and methods for authentication based on personal network
JP2019537776A (en) Fraud detection in portable payment readers
AU2018203167A1 (en) NFC mobile wallet processing systems and methods
US10083443B1 (en) Persistent authentication of a wearable device
WO2018125689A1 (en) Third-party access to secure hardware

Legal Events

Date Code Title Description
STPP Information on status: patent application and granting procedure in general

Free format text: DOCKETED NEW CASE - READY FOR EXAMINATION

AS Assignment

Owner name: SQUARE, INC., CALIFORNIA

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:BOTROS, PAUL ABRAHAM;FITCH, KATE;SIGNING DATES FROM 20170509 TO 20170510;REEL/FRAME:042381/0209

STPP Information on status: patent application and granting procedure in general

Free format text: NON FINAL ACTION MAILED

STPP Information on status: patent application and granting procedure in general

Free format text: RESPONSE TO NON-FINAL OFFICE ACTION ENTERED AND FORWARDED TO EXAMINER

STPP Information on status: patent application and granting procedure in general

Free format text: NON FINAL ACTION MAILED

STPP Information on status: patent application and granting procedure in general

Free format text: RESPONSE TO NON-FINAL OFFICE ACTION ENTERED AND FORWARDED TO EXAMINER

STPP Information on status: patent application and granting procedure in general

Free format text: NON FINAL ACTION MAILED

STCB Information on status: application discontinuation

Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION

AS Assignment

Owner name: BLOCK, INC., CALIFORNIA

Free format text: CHANGE OF NAME;ASSIGNOR:SQUARE, INC.;REEL/FRAME:058646/0154

Effective date: 20211209