WO2001061662A2 - Accessing information for multiple financial accounts via the internet - Google Patents
Accessing information for multiple financial accounts via the internet Download PDFInfo
- Publication number
- WO2001061662A2 WO2001061662A2 PCT/US2001/003130 US0103130W WO0161662A2 WO 2001061662 A2 WO2001061662 A2 WO 2001061662A2 US 0103130 W US0103130 W US 0103130W WO 0161662 A2 WO0161662 A2 WO 0161662A2
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- atm
- internet user
- card
- internet
- pin number
- Prior art date
Links
Classifications
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07F—COIN-FREED OR LIKE APPARATUS
- G07F7/00—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus
- G07F7/08—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means
- G07F7/10—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means together with a coded signal, e.g. in the form of personal identification information, like personal identification number [PIN] or biometric data
- G07F7/1008—Active credit-cards provided with means to personalise their use, e.g. with PIN-introduction/comparison system
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/04—Payment circuits
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/08—Payment architectures
- G06Q20/10—Payment architectures specially adapted for electronic funds transfer [EFT] systems; specially adapted for home banking systems
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/22—Payment schemes or models
- G06Q20/229—Hierarchy of users of accounts
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/30—Payment architectures, schemes or protocols characterised by the use of specific devices or networks
- G06Q20/34—Payment architectures, schemes or protocols characterised by the use of specific devices or networks using cards, e.g. integrated circuit [IC] cards or magnetic cards
- G06Q20/341—Active cards, i.e. cards including their own processing means, e.g. including an IC or chip
Definitions
- the present invention relates to e-commerce, and more particularly, to a system and method to Internet enable the ATM banking network so that Internet users can register and access their ATM enabled financial accounts, consolidate at one web-site location account information among various banking or financial institutions, view account balances, and transfer funds between accounts, all over the Internet.
- On-line banking allows customers to access their ATM enabled accounts with a particular bank with 24/7 convenience and from virtually any location.
- On-line banking typically provides a customer with a host of services, including for example: viewing account balances, transfer money between accounts, obtaining transaction records for checking, savings and credit card amounts, obtaining summary information on CD and IRA accounts, pay bills on-line, and download transaction and financial information to a financial management software package residing on the customers computer.
- on-line banking has achieved relatively low penetration among banking customers. In general only the larger banks and a few smaller but more progressive banks currently offer on-line banking services.
- ATM machines allow the customer to withdraw or deposit money into an account, check account balances, and transfer money between accounts at the financial institution that issued the ATM card.
- Banks prefer customers to use ATM's because electronic transactions are much less expensive to process than those handled in person by a teller for instance.
- ATM cards are enormously popular, they do have their drawbacks. Foremost, the cardholder must be physically present at an ATM machine to perform any one of the above-defined transactions. Also the cardholder typically has to pay a transaction fee if they withdraw money from an ATM that does not belong to the financial institution that issued the card. Further a typical cardholder may have several ATM cards each issued by different financial institutions. For example, it is not uncommon for a person to have a first ATM card for a checking and savings account at a local bank, one or more ATM enabled Visa or MasterCard credit/debit cards issued by other banking institutions, and one or more ATM enabled cards for money market and/or stock accounts provided by a brokerage institution. Such a cardholder can access each account only one at a time from an ATM. Currently there is no way for the cardholder to consolidate the financial information from multiple ATM card issuers.
- the present invention is a system and method to access ATM enabled financial accounts over the Internet so that banking customers can consolidate account information among various financial institutions, view account balances, and transfer funds between accounts over the Internet.
- the system includes a computing system coupled between the Internet and the ATM network.
- the computing system is configured to receive a request from the Internet user to access their ATM enabled accounts.
- the computing system in response generates an ATM protocol message and passes it onto a shared the ATM network.
- the ATM network switches the transaction to the bank or financial institution that issued the card.
- the issuing bank or financial institution then processes the ATM protocol message, just like an ordinary ATM transaction, and sends a reply back to the computing system through the ATM network.
- the reply is then converted into an Internet protocol message and provided to the user over the Internet.
- the account number and PIN number for each ATM card are secured using either an encryption scheme that enables the Internet user to safely submit this information over a standard ATM machine, the Internet, via a telephone, or using a dynamically generated HTML translation symbol table that includes a randomly generated set of symbols that correspond to the complete set of alpha-numeric values that can possibly be used to define the PIN number for the card.
- the user is prompted to enter the symbols that correspond to the actual values of the PIN number.
- the symbols are then decoded by the computing system to obtain their true values.
- ATM card numbers are encrypted and stored in one storage device and the corresponding PIN numbers are encrypted using a second encryption scheme and stored at a second storage device for security purposes.
- the present invention enables banks and other financial institutions to provide customers with aggregate financial statements including account information from different financial institutions using a variety of delivery channels, including the Internet, email, or monthly statements for example.
- Figure 1 is a block diagram of a system allowing an Internet user to access their ATM enabled financial accounts over the Internet according to one embodiment of the present invention.
- Figure 2 is a block diagram of another system according to an alternative embodiment of the present invention.
- Figure 3 is a diagram of a keystroke table used in yet another embodiment of the present invention.
- Figure 4 is a diagram of a database structure containing a record of an Internet user in a database of the system of the present invention.
- Figure 5 is a bank meter and a credit card meter for displaying account information according to one embodiment of the present invention.
- Figures 6 A through 61 are a series of computer display screen print outs of web pages illustrating the sequence and operation of the present invention from a Internet users perspective.
- Figures 7A and 7B are a flow diagram illustrating the operation of the system of the present invention according to one embodiment.
- FIG 8 is a diagram of a system for a bank or financial institution to provide aggregate account statements to users according to another embodiment of the present invention.
- DETAILED DESCRIPTION OF SPECIFIC EMBODIMENTS Referring to Figure 1, a block diagram of a communication infrastructure allowing an Internet user to access their ATM enabled financial accounts over the Internet according to one embodiment of the present invention is shown.
- the infrastructure 10 includes a computing system 12 coupled between the Internet 14 and an ATM network 16.
- a plurality of financial institutions such as banks or brokerage houses 18a through 18z are coupled to the computing system 12 through the ATM network 16.
- the computing system 12 allows an Internet user to access their various accounts at one or more financial institutions 18a - 18z using any one of a plurality of computing devices, such as but not limited to, a personal computer 20, a laptop computer 22, and/or a cell phone or PDA 24 coupled to the Internet 14.
- the personal computer 20 and/or laptop 22 can be connected either directly to the Internet 14 using a dial-up modem, Digital Subscriber line (DSL), cable modem, fiber optic interconnect, a wireless service or through an Internet Service Provider (ISP) 26,.
- the cell phone or PDA 24 is connected directly to the computing system 12 through wireless infrastructure 28 provided by a wireless service provider as shown or indirectly through the Internet 14.
- the computing system 12 includes a web server 30 coupled to the Internet 14 through a firewall 32, two storage devices 34a and 34b for storing a database within the computing system 12, a first hardware encryption device 36, a switch server 38 coupled to the ATM network 16 through another firewall 40, and a second encryption device 42.
- the web server 30 and switch server 38 are UltraSparc servers offered by Sun Microsystems, Inc, of Mountain View, CA.
- other types of servers running either Unix, Linux, or Windows NT/2000 based operating systems can be used.
- the switch server 38 can be replaced with an ATM processor.
- the encryption devices 36 and 42 are for example from Racal Corporation, Sunrise Florida.
- These devices 36 and 42 are capable of decrypting and encrypting information in hardware, as opposed to software, and are generally safer than software encryption schemes which are more susceptible to being hacked.
- the only way to access information in a hardware encryption unit is to physically access the internal circuitry of the device.
- most of these devices are designed to be tamper-proof, meaning the device becomes inoperable if it is tampered with.
- all of the elements 30-42 can be maintained by a single information management organization, or in the alternative, one or more of the elements 30-42, such as an ATM processor, can be outsourced to a third party.
- the switch server 38 can be replaced by an ATM processing server company.
- the computing system 12 enables an ATM card holder to access their ATM enabled accounts from either their personal computer 20, lap top 22, or cell phone or PDA 24.
- the computing system 12 thus Internet enables the existing ATM network infrastructure and extends its delivery channels beyond just ATMs to on-line services, digital cellular services and PDAs.
- the computing system 12 enables ATM card holders to store account number(s) and personal identification numbers (PINs) from multiple ATM card issuing institutions at one location for the purpose of creating an on-line profile to consolidate financial information and conduct account transactions.
- the computing system 12 enables card holders of ATM credit and debit cards to, among other things, safely obtain the balance of deposit and credit accounts and transfer funds between linked accounts over the Internet and without the need to use an ATM machine or ATM cards.
- a typical ATM card includes the user's name, card number, and the expiration date of the card, embossed on the front surface.
- a magnetic stripe is manufactured into the back surface of the card.
- the stripe typically stores data that is electronically encoded by the financial institution that issues the card.
- the organization of data encoded on cards is typically defined by ANSI and ISO standards.
- Track Two typically contains the primary account number, expire data, service code, and other discretionary data for the card.
- the present invention allows the card holder to provide all or a portion of the Track
- the Track Two information which is stored in the database maintained in the computing system 12, is retrieved, processes into an ATM protocol message, and provided to the ATM network 14 each time the ATM account is to be accessed.
- This arrangement poises several potential security issues, including the: (i) exposure of the Track Two information when the user provides this information to the computing system 12; and (ii) unauthorized access to the Track Two information while stored in the computing system 12.
- the present invention contemplates several measures to eliminate or at least significantly reduce the possibility of either of these events from occurring.
- Several alternative embodiments for securing account and PIN numbers and for maintaining this information securely in the computing system 12 is discussed below.
- FIG. 1 In a first embodiment for securely obtaining ATM card account and PIN numbers, reference is again made to Figure 1.
- users visit the web site application hosted by server 30 on the Internet using a browser enabled for 128 bit SSL encryption and are prompted to create a profile and register their ATM enabled cards.
- users create a username and password. Users are then prompted to enter card information for each card they wish to access. Users are then prompted to enter the corresponding PINs for cards registered. Once the user has entered all required card data the Internet registration process concludes.
- the SSL message is passed through the web server 30, and is provided to the encryption device 36 where the entire message is decrypted.
- the hardware encryption device then passes the card data, in the clear, to the server 38.
- the PIN is re-encrypted by device 36 and is then stored in the storage device 34b.
- the server 38 then provides the card data to the second encryption device 42, where it is encrypted using a second encryption scheme and stored in device 34a. scheme, and then stored in device
- the Track Two information is encrypted when it is transferred to and passed through the web server 30 to the hardware encryption device 36.
- the account number and PIN number are therefore not in the clear in the web server 30 where it is the most vulnerable within the computing system 12.
- the PIN number is "never in the clear" within the computing system 12.
- the account number and the PIN number are also encrypted using different schemes and each is stored separately in two different devices 34a and 34b in the computing system 12. This makes it exceedingly difficult for a hacker to not only obtain both pieces of information, but to decrypt either one or both pieces of information.
- the aforementioned arrangement is therefore very secure.
- the card data can be stored on device 34a in the clear.
- the system 200 of this embodiment includes the computing system 12 coupled between the ATM network 16 and the Internet 14, a plurality of financial institutions 18a -
- the computing system 12 contains the same elements 30-40 as described in relation to Figure 1, but are not illustrated or described in detail herein for the sake of simplicity.
- the user is required to first create a profile when signing up and registering for the service. This is accomplished by accessing the web site hosted by the web server 30 and entering a username and password. For each ATM enabled card, the user is prompted to enter the card number, expiration date, type of card, and the bank or financial institution that issued the card. This data is then stored in storage device 34a in a similar manner as described above. The user is purposely directed not to enter the corresponding
- the web server 30 responds by providing the user with an ID number, a 800 telephone number, and instructions to call the 800 number which connects the user to the telephone response unit 204. These instructions can be provided either by an email or the server 30 can generate a web page that presents this information to the user.
- the user calls the telephone response unit 204, the user is prompted to enter the ID number and the PIN number for each card.
- the PIN number(s) are then stored in database 34b. Again preferably all the user and Track Two information except the PIN numbers are stored in the first storage device 34a either in encrypted form or in the clear and the PIN numbers are encrypted by the hardware encryption device 36 and maintained on separate storage device 34b.
- the telephone response unit 204 can be a voice recognition unit or it can prompt the user to enter the information using the keypad on the phone. Also the telephone response unit 204 can be programmed to call the user to obtain the PIN number rather than the user calling the machine.
- FIG. 3 a diagram of a keystroke encryption table 350 used in yet another embodiment of the present invention is shown.
- One problem afflicting Internet users today is that hackers have the ability to secretly install over the Internet a program on a user's computer that allows the hacker to monitor the user's computer keystrokes without the user's knowledge. A hacker could therefore steal the user's ATM account and PIN number when the user submits this data to the computing system 12 over the Internet..
- the table 350 is designed to eliminate or at least significantly reduce this risk.
- the table 350 includes a first row 352 of alpha and/or numeric characters and a second row 254 of dynamically generated symbols each corresponding to the alpha and or numeric characters of row 352 respectively.
- the symbols are randomly generated by the web server 30 so that a different set of symbols appears each time a user attempts to enter any account or PIN data.
- the alpha and/or numeric characters shown in row 352 are digits (0 through
- the server 30 forwards them to the hardware encryption device 36. Again preferably all the user and Track Two information except the PIN numbers are stored in the first storage device 34a either in encrypted form or in the clear and the PIN numbers are encrypted by the hardware encryption device 36 and maintained on separate storage device 34b. Since the sequence of symbols entered by the
- the number of possible permutations of the table 350 can be very significant as the number of possible symbols used in row 354 increases. For example, if 35 distinct symbols are used, 183,579,396 possible combinations of the table 350 can be generated. Potentially the table 350 can be made even more secure and difficult to hack by adding more symbols or graphics to the symbol set. To do so, the Internet user would need to use the computer's mouse or other input device since the additional symbols would not map to keyboard characters, at least on the keyboards currently found on most computers today. Furthermore, the entered keystroke symbols can be encrypted as described above for additional security.
- an alternative embodiment for securely obtaining card and PIN data is through the use of ATM machines 44 is shown.
- an ATM cardholder will be prompted to register a card for Internet access during a ATM transaction.
- To register a card at an ATM the cardholder will simply swipe or insert a card and enter the correct PIN when prompted.
- the information is then forwarded to the computing system 12 by the owner or driver of the ATM machine.
- the computing system 12 The computing system
- the 12 responds by sending a message back to the ATM machine.
- the cardholder issued a receipt that includes a URL and unique identification number. The information will be used to later complete the registration process on the Internet.
- the user When the cardholder accesses the URL and enters the identification number listed on the receipt, the user prompted to enter the last 4 digits of the registered card for verification.
- the user Upon completion of the verification process the user will be prompted to create a username and password for future access to account information driven by the ATM enabled card.
- a user can register additional cards using the same ATM registration process and add them to an existing profile. Once registered, a user can access their ATM enabled accounts in the same manner as described above.Once a user has gone through the sign-up and registration process and has entered the account number and PIN number information for each ATM card, regardless of the technique used, this information is stored in the database and is used to create a user-profile. Subsequently when the user wishes to access their account(s), the user just needs to enter their User password and ID. This prompts the computing system 12 to retrieve the necessary Track Two information from the database to formulate an ATM request to access the account.
- a user-profile is thus advantageous in situations where a user would: (i) like to avoid typing in their account and PIN numbers every time they access the account information on-line; and/or (ii) like to have their account information automatically downloaded to their PC 20, laptop 22, or cell phone or PDA 24 at pre-designated times.
- the user may be required to enter their account and PIN numbers each time they wish to access their ATM accounts.
- a user's record 150 includes fields for storing the user's User ID and Password and profile information.
- the record 150 also includes a pointer 152 that points to a file of card data records 154.
- Each record 154 contains cardholder data (except the PIN number) for each of the user's cards.
- Each card record 154 also contains a pointer 156 that points to a record 158 that contains the PIN number associated with the card.
- the information contained in records 150 and 154 are stored in device 34a and are hardware encrypted using one encryption scheme.
- the PIN number in record 158 is stored in device 34b and is hardware encrypted using a different encryption scheme. Further since the storage devices 34a and 34b are physically separate, it is very difficult for a hacker to obtain both the account number and PIN number. The above-described arrangement therefore provides a very high level of security for the user.
- a request to access the account on the ATM network 14 is processed in the same manner.
- a request is generated in four ways: (i) immediately after a user signs-up and becomes a registered member of the web site maintained on the web server 30. In this situation, the user is required to enter the Track Two information for each ATM card they wish the computing system 12 to access; (ii) when a previously registered user wishes to access their ATM card accounts.
- the user is required to enter their previously defined Username and password to the web server 30 which prompts the computing system 12 to access the previously defined accounts; (iii) by a user who wishes to obtain information one time, without becoming a registered user.
- the user enters the card data and PIN data to the computing system 12 and is provided a response.
- No card or PIN data is stored in the computing system 12 under this circumstance,
- the user has previously defined pre-designated times in which they wish the computing system 12 to automatically access their accounts over the ATM network 14 and provide this information to the user over the Internet.
- the computing system 12 automatically generates the request at the designated times with this alternative.
- a query based on the user ID is sent to storage device 34a.
- the results of the query is to obtain the card data and the pointer to the PIN.
- the card data is then unencrypted and the pointer used to generate another query against storage device 34b.
- the results of the second query is to provide the encrypted PIN.
- the encrypted PIN is hardware decrypted then reencrypted in the format expected by an ATM access provider.
- Both card data and the encrypted PIN is sent within a standard ATM message (ISO 8583) to the ATM access provider over the ATM network 16.
- the ATM access provider switches the transaction to the financial institution 18 that issued the card.
- the financial institution 18 that issued the ATM card processes the transaction just like any other ATM transaction.
- the reply information from the financial institution is then sent back through the ATM network 16 and the computing system 12 to the user over the Internet
- the account balance or balances associated with the ATM card are stored in the database along with the time the request was made. The balance information is thus available to the user at a later time. If the user believes that the balance information stored in the database is out of date or stale, the user can of course make a new request to retrieve the most up-to-date balance information. In one embodiment, only the account balance information, the card name, and a portion (i.e. the last four digits) of the account number are sent to the user. The entire account number and the PIN number are not sent back for security reasons. In alternative embodiments, this same sequence can be used to retrieve and send the users account information at pre-designated times. The only difference being that queries to the storage device 34a and 34b are automatically made by computing system 12 at the designated times as opposed to the user getting on-line and requesting the information.
- the bank meter 110 provides a graphical representation of a person's bank account balance.
- the graph includes a scale ranging from "Empty" to "Full”.
- the monetary value of Full is previously defined by the user through the Enter Full data entry window web page (not shown) that requests this information. For example, if a person keeps no more than $5000.00 in their checking account, they would designated this amount as Full. Thus if they have a balance of $1250.00 in the amount, the meter 110 will show that it is approximately twenty five percent full.
- the "Credit Card Meter” 112 graphically shows the amount of available credit a person may have on a credit card. If a credit card account is designed as having $10,000.00 credit limit, then the Credit Card Meter 112 will display the card owner's outstanding charges and the amount of credit left on the card. In the example shown, the charges are approximately $7,000.00 and therefore the available credit is approximately $3,000.00. In alternative embodiments, of the invention, the meters can be set display account balances and available credits in any currency selected by the user. Operation of the Present Invention
- FIG. 6A through 6J a series of web pages of the web site hosted on server 30 are shown to illustrate the sequence and operation of the present invention. It should be noted that the content and sequence of these web pages as shown is only exemplary and that other content and sequences of web pages could be used. These web pages of course can be readily modified to implement the other embodiments of the present invention as described herein.
- FIG. 6A an exemplary home page for the web site hosted by web server 30 in system 12 is shown.
- the home web page includes icons for an Internet user to sign-up, login-in, and try the service of accessing the ATM enabled accounts on-line.
- Figure 6B illustrates a exemplary web page for a new Internet user to sign up for the service.
- This page includes data entry fields for the user to enter their user name, password, email addresses and a field to select if they would like to enter their ATM card PIN numbers by telephone or on-line. When all the fields are completed, the user is required to select the "next" icon.
- Figure 6C is the next page that appears in the sign-up process.
- This page includes data entry fields for card data including a card name, card number, expiration data, PIN number, and type of account(s) (checking/now, savings/money market, or credit.)
- a new card can be entered by selecting the "add” icon.
- the clear icon causes the existing data entered into the above fields to be removed.
- the "done" icon is selected.
- Figure 6D illustrates an exemplary web page that informs the user that they have successfully registered. It also informs the user that they can pre-select delivery options and the display options.
- Figure 6E illustrates an exemplary web page that enables the Internet user to pre-select delivery options of their account information.
- the web page includes data entry fields to allow the Internet user to select a delivery option (email and/or a hand held device such as a PDA), the frequency of the delivery (daily, weekly or monthly) and the ATM cards they wish to access.
- Figure 6F illustrates an exemplary web page for enabling the Internet user to select a display option for their ATM cards.
- the web site provides the display options of showing balances/credits only, showing balance or credit in graphical form only, or both.
- the lower portion of the figure shows account balances in graphical form.
- Figure 6G shows an exemplary web page where an Internet user that previously registered can log-in and access their ATM enabled accounts over the Internet. In this web page, data entry fields are provided for the user to enter their user name and password. Once these are successfully entered, the "next" icon is selected to proceed.
- Figure 6H shows an exemplary page of a user's balance for their checking/now and savings/MM accounts associated with an ATM card. Note the balances are shown in both numerical and graphical form. If the user had submitted multiple ATM cards issued by the same or different financial institutions, similar tables showing account balances would appear. Also note that a "Perform a Transfer" icon is provided.
- FIG. 61 an exemplary page for enabling on Internet user to transfer funds between different accounts associated with an ATM card is shown.
- “To" and a "From” data entry fields are provided along with a data field to enter the amount to be transferred.
- the system 12 When the above fields have been completed and the "submit" icon is selected, the system 12 generates the appropriate ATM network message to effectuate the transfer. The results of the transfer are shown in the table at the bottom of the web page.
- the system 12 can be configured to effectuate fund transfers between accounts associated with different ATM cards issued by either the same institution or different institutions.
- Flow Diagram a flow diagram illustrating the sign-up and registration sequence over the Internet 14 is shown.
- a user is required to access the web site hosted by the web server 30 (Step 120).
- the user is then requested to define and enter a User password and ID (Step 121).
- the user is prompted to enter user profile information and the Track Two information and PIN data for each ATM card they wish to enter into computing system 12 (Step 122).
- the computing system 12 in reply creates a user profile, encrypts and stores the Track Two information and PIN data in the storage devices 34a and
- Step 123 completing the sign-up and registration process.
- FIG 7B a flow diagram illustrating the access of an ATM account through the computing system 12 is shown. Initially the Internet user is required to access the web site hosted by the web server 30 (Step 130). The user is next required to enter their
- Step 131 The User password and ID are then compared with the existing passwords and IDs stored in the computing system 12 for authentication (Step 132).
- the user is prompted to enter the information again or the request is terminated. If authenticated, the request is processed, the storage device 34a and 34b are accessed, and the Track Two and PIN information is retrieved from the user's records in the database contained in the computing system 12 (Step 133). An ATM protocol message is then created from the Track Two information and passed onto the ATM network 16 through the switch server 38 (Step 134). When the financial institution that issued the card responds
- Step 135) the balance information is stored in the database in computing system 12 and the reply is forwarded to the Internet user over the Internet (Step 136). If the user wishes to access multiple ATM cards, the sequence of steps described above is repeated for each card. Similarly if the Internet user has requested that they receive their ATM account information at pre-designated times, the computing system 12 execute steps 133 through 136 automatically at the designated times. Finally in the embodiment described herein, the user is not required to enter the Track Two information to access the card account. However, it should be understood, that the present invention can be readily modified to require the Internet user to enter and authenticate the Track Two information before each request can proceed.
- the ATM network 14 is actually an aggregation of several ATM networks such as Nyce, Cirrus, Star, InTerlink and several others owned by individual compames or consortiums of banks.
- the major ATM players have agreed upon and defined a standardized set of messaging protocols and rules.
- the messaging protocols enable transactions to "seamlessly" occur between ATM networks, banks and other financial institutions.
- the rules define, among other things, the payment of interchange fees between financial institutions. For example, if an ATM card issued by a first bank is used at an ATM machine of a second bank, the first bank has to pay the second bank an interchange fee for the transaction under the rules. Currently this fee ranges from twenty five to thirty five cents, depending on how many "hops" across the ATM network is required to satisfy the transaction.
- the present invention it is possible for a cardholder to simultaneously initiate multiple requests to multiple financial institutions thereby generating multiple fees from one transaction. Furthermore when an Internet user pre-arranges to receive their ATM account information automatically, the increased traffic across the ATM network further increases the revenue stream generated by the computing system 12.
- the present invention thus enables a party that maintains or otherwise controls the computing system 12 to generate revenue in a number of possible ways.
- the present invention could also be used as a "sticky application" by web portal sites.
- a hyper-text link can be used to automatically forward an Internet user at a portal to the web server 30 so the user can sign-up and register to access their ATM card accounts over the Internet. This of course will help increase traffic to the web site 30, and hence, generate more transaction fees.
- the banks and financial institutions could also provide a similar hyper-text link from their web sites to the web server 30, or they could build the computing system 12 into their existing information technology infrastructure so this capability can be offered to their customers and Internet users in general.
- the diagram 800 includes the computing system 12. the Internet 14, an ATM network 16, a plurality of financial institutions 18a through 18z, an Internet user's personal computer 20 (or laptop, cell phone or PDA), an ATM machine 802, a bank
- the ATM machine 802 can belong to the bank 804 and therefore be directly linked into the bank's information system infrastructure or, alternatively, can be linked through the ATM network
- This embodiment empowers bank 804 to offer their customers a "true" consolidated financial statement of all of their ATM enabled accounts regardless of the financial institutions 18a through 18z that issued the cards.
- the bank 804 can obtain the Track Two information for each ATM enabled account of a customer, including for ATM cards issued by other financial institutions, either over the Internet 14, using a telephone response unit as discussed in the present application, by requiring the customer to visit the bank 804 in person and provide the information using a card reader, or through an
- the bank 804 can request the computing system 12 to access the ATM enabled accounts so the bank 804 can generate a consolidated financial statement which include all the customer's ATM enabled accounts from various institutions 18a through 18z and not just those issued by the bank 804.
- the bank 804 can then deliver the consolidated report to the customer using a variety of delivery channels 806, including but not limited to on-line banking, by telephone, email, over the Internet, by monthly statements mailed to the customer, etc. and at times and frequencies desired by the customer. Not only would this be valuable service for customers, but it would generate additional ATM transaction fees for the bank 804 as the bank that originated the transaction.
- bank 804 could directly access the Internet 14 and the ATM network
- the present invention provides numerous benefits and advantages. Foremost it empowers Internet user's to consolidate all of their ATM enabled financial accounts at one location on the Internet. It also provides these user's with the ability to perform certain
Landscapes
- Business, Economics & Management (AREA)
- Accounting & Taxation (AREA)
- Engineering & Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- General Business, Economics & Management (AREA)
- Strategic Management (AREA)
- Theoretical Computer Science (AREA)
- Finance (AREA)
- Microelectronics & Electronic Packaging (AREA)
- Computer Networks & Wireless Communication (AREA)
- Development Economics (AREA)
- Economics (AREA)
- Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
Abstract
Description
Claims
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
AU2001231260A AU2001231260A1 (en) | 2000-02-14 | 2001-01-31 | Accessing information for multiple financial accounts via the internet |
Applications Claiming Priority (10)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US18229000P | 2000-02-14 | 2000-02-14 | |
US60/182,290 | 2000-02-14 | ||
US65222900A | 2000-08-29 | 2000-08-29 | |
US65022000A | 2000-08-29 | 2000-08-29 | |
US65047200A | 2000-08-29 | 2000-08-29 | |
US65047100A | 2000-08-29 | 2000-08-29 | |
US09/650,472 | 2000-08-29 | ||
US09/650,220 | 2000-08-29 | ||
US09/652,229 | 2000-08-29 | ||
US09/650,471 | 2000-08-29 |
Publications (2)
Publication Number | Publication Date |
---|---|
WO2001061662A2 true WO2001061662A2 (en) | 2001-08-23 |
WO2001061662A3 WO2001061662A3 (en) | 2002-02-21 |
Family
ID=27539065
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/US2001/003130 WO2001061662A2 (en) | 2000-02-14 | 2001-01-31 | Accessing information for multiple financial accounts via the internet |
Country Status (2)
Country | Link |
---|---|
AU (1) | AU2001231260A1 (en) |
WO (1) | WO2001061662A2 (en) |
Cited By (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
GB2384357A (en) * | 2002-01-22 | 2003-07-23 | Ncr Int Inc | Self-service terminal for aggregating financial information |
GB2387702B (en) * | 2002-04-17 | 2005-06-01 | Cellectivity Ltd | Method of access control using PIN numbers |
WO2011028139A1 (en) * | 2009-09-07 | 2011-03-10 | Kiwibank Limited | Information exchange system |
US8538806B2 (en) | 2011-10-20 | 2013-09-17 | Rawllin International Inc. | Systems and methods for establishing transactions utilizing a data store of billing information |
US20140245419A1 (en) * | 2013-02-28 | 2014-08-28 | Citibank, N.A. | Methods and Systems for Accessing Account Information Electronically |
US9582788B2 (en) | 2010-02-05 | 2017-02-28 | Dwolla, Inc. | Dynamically selecting sending and receiving accounts |
US9792636B2 (en) | 2011-01-25 | 2017-10-17 | Dwolla, Inc. | Social network transaction processing system |
CN110738558A (en) * | 2018-07-20 | 2020-01-31 | 京东数字科技控股有限公司 | Information restoration method and device, electronic equipment and computer readable medium |
Family Cites Families (16)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JPH0623962B2 (en) * | 1990-01-17 | 1994-03-30 | インターナショナル、ビジネス、マシーンズ、コーポレーション | Data object automatic distribution control method and apparatus |
US5197147A (en) * | 1990-02-05 | 1993-03-23 | Vlsi Technology, Inc. | Keycode translation system for producing translated keycode signals responsive to keyboard signals which act as a pointer to keycode translation table |
US5172414A (en) * | 1991-09-13 | 1992-12-15 | At&T Bell Laboratories | Speech and control message encrypton in cellular radio |
DE4326826C2 (en) * | 1993-08-10 | 1996-05-23 | Siemens Ag | DTMF transmitter and telecommunications system for remote control of answering machines |
US5974141A (en) * | 1995-03-31 | 1999-10-26 | Mitsubishi Corporation | Data management system |
DE19600406A1 (en) * | 1995-01-09 | 1996-07-18 | Motorola Inc | Generation of encrypted speech messages for digital mobile communications system contg. transcoder |
US5953504A (en) * | 1995-10-10 | 1999-09-14 | Suntek Software Corporation | Public accessible terminal capable of opening an account for allowing access to the internet and E-mail by generating ID code and security code for users |
US5778178A (en) * | 1995-11-13 | 1998-07-07 | Arunachalam; Lakshmi | Method and apparatus for enabling real-time bi-directional transactions on a network |
US5822737A (en) * | 1996-02-05 | 1998-10-13 | Ogram; Mark E. | Financial transaction system |
JPH09224023A (en) * | 1996-02-15 | 1997-08-26 | Oki Electric Ind Co Ltd | Network resource managing system |
US5850442A (en) * | 1996-03-26 | 1998-12-15 | Entegrity Solutions Corporation | Secure world wide electronic commerce over an open network |
GB9624894D0 (en) * | 1996-11-29 | 1997-01-15 | Ncr Int Inc | Multi-transaction service system |
EP1010148A1 (en) * | 1997-04-15 | 2000-06-21 | Stratex/Paradigm (UK) Limited | Method for electronically vending, distributing, and recharging of pre-paid value, a vending machine and an electronic system for use therein |
US5971272A (en) * | 1997-08-19 | 1999-10-26 | At&T Corp. | Secured personal identification number |
CA2307635C (en) * | 1997-11-05 | 2004-07-06 | Microsoft Corporation | Notification scheduling system on a mobile device |
JPH11164041A (en) * | 1997-11-28 | 1999-06-18 | Ricoh Co Ltd | Voice mail server device |
-
2001
- 2001-01-31 AU AU2001231260A patent/AU2001231260A1/en not_active Abandoned
- 2001-01-31 WO PCT/US2001/003130 patent/WO2001061662A2/en active Application Filing
Cited By (15)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
GB2384357A (en) * | 2002-01-22 | 2003-07-23 | Ncr Int Inc | Self-service terminal for aggregating financial information |
GB2387702B (en) * | 2002-04-17 | 2005-06-01 | Cellectivity Ltd | Method of access control using PIN numbers |
WO2011028139A1 (en) * | 2009-09-07 | 2011-03-10 | Kiwibank Limited | Information exchange system |
US9582788B2 (en) | 2010-02-05 | 2017-02-28 | Dwolla, Inc. | Dynamically selecting sending and receiving accounts |
US10607268B2 (en) | 2011-01-25 | 2020-03-31 | Dwolla, Inc. | Social network transaction processing system |
US10089668B2 (en) | 2011-01-25 | 2018-10-02 | Dwolla, Inc. | API invoked functions for use in an online social network |
US9792636B2 (en) | 2011-01-25 | 2017-10-17 | Dwolla, Inc. | Social network transaction processing system |
US8538806B2 (en) | 2011-10-20 | 2013-09-17 | Rawllin International Inc. | Systems and methods for establishing transactions utilizing a data store of billing information |
US9027109B2 (en) | 2013-02-28 | 2015-05-05 | Citibank, N.A. | Methods and systems for accessing account information electronically |
WO2014133931A1 (en) * | 2013-02-28 | 2014-09-04 | Citibank, N. A. | Methods and systems for accessing account information electronically |
US20140245419A1 (en) * | 2013-02-28 | 2014-08-28 | Citibank, N.A. | Methods and Systems for Accessing Account Information Electronically |
US10943292B2 (en) | 2013-02-28 | 2021-03-09 | Citibank, N.A. | Methods and systems for accessing account information electronically |
US12112368B1 (en) | 2013-02-28 | 2024-10-08 | Citibank, N.A. | Methods and systems for accessing account information electronically |
CN110738558A (en) * | 2018-07-20 | 2020-01-31 | 京东数字科技控股有限公司 | Information restoration method and device, electronic equipment and computer readable medium |
CN110738558B (en) * | 2018-07-20 | 2024-03-05 | 京东科技控股股份有限公司 | Information restoration method, device, electronic equipment and computer readable medium |
Also Published As
Publication number | Publication date |
---|---|
WO2001061662A3 (en) | 2002-02-21 |
AU2001231260A1 (en) | 2001-08-27 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
RU2645593C2 (en) | Verification of portable consumer devices | |
KR100933387B1 (en) | Online payer authentication service | |
CN1303567C (en) | Method and cashless payment system for performing secure cashless payment transactions | |
US7865414B2 (en) | Method, system and computer readable medium for web site account and e-commerce management from a central location | |
US5850442A (en) | Secure world wide electronic commerce over an open network | |
RU2401455C2 (en) | Electronic system for rendering bank services | |
US9881298B2 (en) | Credit card system and method | |
US20010047335A1 (en) | Secure payment method and apparatus | |
US20020055909A1 (en) | Method, system and computer readable medium for Web site account and e-commerce management from a central location | |
US20020152180A1 (en) | System and method for performing secure remote real-time financial transactions over a public communications infrastructure with strong authentication | |
US20040070566A1 (en) | Card present network transactions | |
US20170161700A1 (en) | Secure internet atm | |
WO2006039364A2 (en) | System and method for electronic check verification over a network | |
AU2001248198A1 (en) | A method and system for a virtual safe | |
EP1272987A1 (en) | A method and system for a virtual safe | |
HUP0302552A2 (en) | System and method for purchasing goods and services through financial data network access ponts | |
WO2004023407A1 (en) | A method and system for transferring funds | |
US20050203843A1 (en) | Internet debit system | |
KR100822985B1 (en) | Nickname payment processing system | |
WO2001061662A2 (en) | Accessing information for multiple financial accounts via the internet | |
WO2001011515A2 (en) | Method and system for making anonymous electronic payments on the world wide web | |
KR20090036160A (en) | Value management method and system accumulated in online account linkage multifunction card and recording medium for it | |
US20020035694A1 (en) | Method and apparatus for anonymous remote transactions | |
WO2002001517A1 (en) | A method for carrying out electronic commerce transactions | |
KR20040101096A (en) | One-stop authentication and settlement method using a network terminal |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AK | Designated states |
Kind code of ref document: A2 Designated state(s): AE AG AL AM AT AU AZ BA BB BG BR BY BZ CA CH CN CR CU CZ DE DK DM DZ EE ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MA MD MG MK MN MW MX MZ NO NZ PL PT RO RU SD SE SG SI SK SL TJ TM TR TT TZ UA UG UZ VN YU ZA ZW |
|
AL | Designated countries for regional patents |
Kind code of ref document: A2 Designated state(s): GH GM KE LS MW MZ SD SL SZ TZ UG ZW AM AZ BY KG KZ MD RU TJ TM AT BE CH CY DE DK ES FI FR GB GR IE IT LU MC NL PT SE TR BF BJ CF CG CI CM GA GN GW ML MR NE SN TD TG |
|
121 | Ep: the epo has been informed by wipo that ep was designated in this application | ||
DFPE | Request for preliminary examination filed prior to expiration of 19th month from priority date (pct application filed before 20040101) | ||
AK | Designated states |
Kind code of ref document: A3 Designated state(s): AE AG AL AM AT AU AZ BA BB BG BR BY BZ CA CH CN CR CU CZ DE DK DM DZ EE ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MA MD MG MK MN MW MX MZ NO NZ PL PT RO RU SD SE SG SI SK SL TJ TM TR TT TZ UA UG UZ VN YU ZA ZW |
|
AL | Designated countries for regional patents |
Kind code of ref document: A3 Designated state(s): GH GM KE LS MW MZ SD SL SZ TZ UG ZW AM AZ BY KG KZ MD RU TJ TM AT BE CH CY DE DK ES FI FR GB GR IE IT LU MC NL PT SE TR BF BJ CF CG CI CM GA GN GW ML MR NE SN TD TG |
|
REG | Reference to national code |
Ref country code: DE Ref legal event code: 8642 Ref country code: DE Ref legal event code: 8642 |
|
122 | Ep: pct application non-entry in european phase | ||
NENP | Non-entry into the national phase |
Ref country code: JP |