[go: up one dir, main page]

WO2025076365A1 - Système et procédé de vérification de l'achat d'un compte de valeur stockée électronique - Google Patents

Système et procédé de vérification de l'achat d'un compte de valeur stockée électronique Download PDF

Info

Publication number
WO2025076365A1
WO2025076365A1 PCT/US2024/049978 US2024049978W WO2025076365A1 WO 2025076365 A1 WO2025076365 A1 WO 2025076365A1 US 2024049978 W US2024049978 W US 2024049978W WO 2025076365 A1 WO2025076365 A1 WO 2025076365A1
Authority
WO
WIPO (PCT)
Prior art keywords
stored value
recipient
purchaser
information
value account
Prior art date
Application number
PCT/US2024/049978
Other languages
English (en)
Inventor
Rathin Guha
Prabhu Inbarajan
Radhika PATHANI
Adam RAUCHUT
Nikhil Sathe
Original Assignee
Blackhawk Network, Inc.
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Blackhawk Network, Inc. filed Critical Blackhawk Network, Inc.
Publication of WO2025076365A1 publication Critical patent/WO2025076365A1/fr

Links

Classifications

    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/08Payment architectures
    • G06Q20/12Payment architectures specially adapted for electronic shopping systems
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/08Payment architectures
    • G06Q20/10Payment architectures specially adapted for electronic funds transfer [EFT] systems; specially adapted for home banking systems
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/386Payment protocols; Details thereof using messaging services or messaging apps
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/401Transaction verification
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/401Transaction verification
    • G06Q20/4014Identity check for transactions
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/401Transaction verification
    • G06Q20/4015Transaction verification using location information
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/401Transaction verification
    • G06Q20/4016Transaction verification involving fraud or risk level assessment in transaction processing
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/405Establishing or using transaction specific rules

Definitions

  • FIG. 2 is a screenshot of a payment approval screen that is generated in a first email after the purchase of an electronic stored value account
  • FIG. 3 is a screenshot of a portion of the payment approval screen shown in FIG. 2 that identifies the recipient of the electronic stored value account
  • FIG. 4 is a screenshot of a secure link that provides access to content that is generated in a second email delivered to the recipient of the electronic stored value account;
  • FIG. 5 is a screenshot of redemption instructions for the electronic stored value account that is generated in response to clicking the activation link shown in FIG. 4;
  • FIG. 6 illustrates an embodiment of a system and/or environment for facilitating a purchase and activation of a stored value account according to an embodiment of the disclosure
  • the payment method could also be other alternative payment methods beyond credit card.
  • the purchaser enters a name, physical address, email address, and phone number of an intended recipient 120 of the electronic stored value account 132, in some embodiments the electronic stored value account 132 can be and/or be represented by a physical stored value card, and electronic stored value card, an electronic wallet, or combinations thereof.
  • the purchaser 100 is the same as the recipient 120.
  • the purchaser information is stored in a risk management system 112 using security such as tokenizing the data, encrypting the data, and/or hashing the data.
  • the purchaser information stored in the risk management system 112 also includes the credit card number, as well as, information related to the point of sale 102, for example, the IP address and location of the point of sale 102.
  • the order management system 110 receives a purchase verification for the electronic stored value account 132.
  • the purchaser information related to the purchaser 100 is verified with risk management system 112.
  • the risk management system 112 determines whether the credit card is valid or if the credit card is stolen or expired. Is the credit card is determined to be stolen or expired, the purchase of the electronic stored value account 132 is terminated. In such a scenario, the purchaser 100 receives an email notification that the transaction cannot be completed, in some embodiments.
  • the risk management system 112 determines whether any of the purchaser information is on a fraud watch list. In some embodiments, the risk management system 112 performs a velocity check by monitoring a number of electronic stored value accounts 132 purchased by the purchaser 100 or purchased on the point of sale 102 in a predetermined time.
  • the risk management system 112 is configured to communicate with a secure content access controller 116.
  • the secure content access controller 116 is configured to store, maintain, control, deliver, or combinations thereof, the rights, authorizations, abilities, or combinations thereof, i.e. content package 117, to use electronic stored value account(s) 132, e.g., an electronic stored value account 132 which is the subject of order 105.
  • the secure content access controller 116 is configured to communicate with order management system 110 and respond to order management system 110 requests for a secure link 402 which can be activated and/or accessed by a recipient 120 to receive content package 117.
  • the risk management system 112 may be configured to suspend delivery of the secure link 402 with access to the electronic stored value account 132, if the number of electronic stored value accounts 132 purchased by the purchaser 100 in a predetermined time exceeds a predetermined number.
  • the order management system 110 asks the secure content access controller 116 for permission to send a secure link email 118 to initiate access to the content package 117. If permission is granted by the secure content access controller 116, the secure content access controller 116 provides the order management system 110 with the content package 117 in the form of secure link 402 which has been produced, generated, and/or created by the secure content access controller 116. In an embodiment, the order management system 110 receives the content package 117 from the secure content access controller 116 and the order management system 110 produces, generates, and/or creates secure link 402 which contains the content package 117 for provision to the recipient 120. The order management system 110 delivers to the recipient 120 the secure link email 118 (shown in FIG. 4) having secure link 402.
  • the recipient 120 clicks on the secure link 402 using a recipient system 122, for example a computer or mobile device.
  • Recipient information is then delivered to the risk management system 112 upon access of the secure link 402.
  • the recipient information is the same as the purchaser information.
  • the recipient information includes the recipient email address.
  • the recipient information includes the name of the recipient, a physical address and phone number of the recipient, an IP address of the recipient system 122, or a location of the recipient system 122.
  • the recipient information could include secret pins or one-time passwords to be verified, or other forms of challenge questions or data input validation.
  • the risk management system 112 determines whether the recipient phone number belongs to the recipient name. It will be appreciated that the risk management system 112 can determine a correlation between any data points in the recipient information. In one embodiment, the risk management system 112 determines whether any of the recipient information is on a fraud watch list. In some embodiments, the risk management system 112 performs a velocity check by monitoring a number of electronic stored value accounts 132 requested and/or received by the recipient 120 or requested and/or received at the recipient system 122 in a predetermined time. The risk management system 1 12 blocks activating the electronic stored value account 132, if the number of electronic stored value accounts 132 requested and/or received by the recipient 120 in a predetermined time exceeds a predetermined number.
  • Activation of the electronic stored value account 132 is also suspended based on a location or region where the secure link 402 is accessed, in some embodiments. For example, access of the electronic stored value account 132 in high-risk regions may be prohibited. In some embodiments, access of the electronic stored value account 132 is suspended based on a comparison of the location of the point of sale 102 to a location of the recipient system 122. In some embodiments, pattern and other advanced correlation techniques could identify victim assisted or other fraud activity by comparison of recipient and purchaser information points.
  • the system verifies redeemer information of a user redeeming the electronic stored value account 132 at a time of redemption of the electronic stored value account 132. In some embodiments, the system permits redemption of the electronic stored value account subsequent to, and in response to, verifying the redeemer information. In some embodiments, the system verifies the redeemer information by determining a physical distance between a location of redemption of the electronic stored value account 132 and a location of purchase of the electronic stored value account 132. In some embodiments, the system suspends redemption of the electronic stored value account 132 if the physical distance between a location of redemption of the electronic stored value account 132 and a location of purchase of the electronic stored value account 132 exceeds a predetermined distance.
  • FIG. 6 is a block diagram of an example system network 600 that may be used to implement an embodiment of the system of Figure 1.
  • the system network 600 in Figure 6 is described to illustrate one example of a network that may be used to implement the system described above with reference to Figure 1. Many other network architectures not described here may be used as well.
  • the system network 600 includes a web server farm 602, a database server farm 604, an electronic data interchange (EDI) farm 607, and an internal access server farm 608.
  • the system network 600 includes a layer 7 switch farm 610 and an Internet firewall infrastructure 612, for example, to implement a consumer front-end over the Internet 614.
  • the consumer front-end may be implemented as a site on the World Wide Web.
  • the system network 600 also includes an EDI virtual local area network (VLAN) 616 with point-to-point connections 618 to EDI partners 620a, 620b, 620c.
  • VLAN virtual local area network
  • the system network 600 in Figure 6 implements a logical separation of server systems based upon type and manner of access. This introduces multiple layers of access, and in turn, provides a deeper layer of security, even within the system network 600.
  • the system network 600 includes a general vertical depth of separation of service and levels of security allowing for several layers of access. The layers of access range from the consumer front-end (via the Internet 614), which is at the forefront and has the lightest layer of security, to a system database 605, which is at the deepest layer of access and security.
  • the next layer of access includes servers in the web server farm 602 that form the business logic tier.
  • the business logic tier includes application code (Beans) that will handle requests from client applications (such as web browsers) and make requests to the Data Access Tier for relevant data. It will then process the data and deliver it for presentation to the client applications.
  • the business logic tier is kept separate from interaction with consumers to preserve integrity of the applications and access to the database 605. Added security may be provided by an outer web farm VLAN 632.
  • the system network 600 includes a general horizontal separation of EDI partnerships, which are logical VLANs that separate access by each partner 620a, 620b, 620c to the infrastructure of the example system for implementing the disclosed lottery system using the system network 600.
  • a partner may access their own private VLAN at 616 and 618 into the system network 600 infrastructure through a VPN concentrator or routed through a routing module on the backbone switch.
  • This structure may isolate potential security breaches from single partners 620a, 620b, 620c. It may also prevent any partner 620a, 620b, 620c from being able to access rival partner data from the system network 600.
  • Connectivity to the system network 600 may be provided by co-location facilities hosting the remote infrastructure. Connectivity may be provided by Tier 1 Internet Backbone providers to ensure access to most networks without having to transcend networks in order to provide the shortest network path from consumer to infrastructure. Besides utilizing connectivity to Tier 1 providers and managing complex BGP routes to the Internet Backbone, a backup connection to InterNAP will also be established.
  • the complex backbone connections force the infrastructure to appear “local” to the consumers accessing the system network 600 via their host ISPs. This prevents the consumer from transcending networks between peer networks and eventually experience degraded network performance.
  • the web server farm 602 includes two banks of servers for serving either static or dynamic content. Each bank may be designated as either the static web farm or the dynamic web farm.
  • the static web farm may service client requests for static content that is neither databasegenerated nor does it use any type of server content processing and generation before being transmitted through the Internet to the client applications (e.g. web browser). Such examples of content would be images, video, or web templates.
  • the dynamic web farm may be designed to serve dynamic content generated in multiple ways, whether that is done via XML/XLS transformation, server-side scripting, or through middle-tier applications that directly interfaces with the database 605.
  • the web server farm 602 may be implemented using any suitable hardware and software systems implementing server functions.
  • the web server farm 602 is implemented with Sun® multiprocessor blade servers (Sun® is a registered trademark of Oracle America, Inc.) running either the Solaris® (Solaris® is a registered trademark of Oracle America, Inc.) operating system or Red Hat® Enterprise LinuxTM operating system (Red Hat® Enterprise LinuxTM arc trademarks of Red Hat, Inc.).
  • the example implementation of the web server farm 602 also includes the Zeus® web server (ZWS) application (Zeus® is a registered trademark of Marden-Kane, Inc.).
  • the database 605 for the database server farm 604 may reside in a SAN (Storage Area Network) solution that will offer both high availability and fault tolerance.
  • SAN Storage Area Network
  • the EDI farm servers 606 may be implemented using any suitable hardware and software system configured to operate server functions, hi an example implementation, the EDI server farm 606 is implemented using the same platform as that of the web server farm 602 or by running IBM Mainframes.
  • the EDI farm servers 606 software in the example implementation may also be similar’ to that of the web server farm 602 software. If the EDI farm servers 606 include IBM Mainframes, then the hardware will run IBM AIX operating systems, and the EDI farm servers 606 will run IBM Websphere Application Server software.
  • specific implementations of the EDI server farm 606 may use any suitable hardware and software systems.
  • the hardware and software systems described above are merely examples of the types of hardware and software systems that may be used.
  • the internal access farm servers 608 may also resemble the web server farm 602 in platform, software, and resource architecture. However, like the EDI farm servers 606, the applications will be tailored for internal access from an enterprise Intranet. Such applications may include data mining and statistical information for marketing and sales.
  • the transaction processing system 620 may be configured for communication with one or more information datastores 630, for example, which may individually or collectively include an entry for each of the stored value accounts offered for sale the retailer 601 or multiple retailers.
  • the transaction processing system 620 may be configured for communication with at least one SAS (c.g., at least one of 640a, 640b, and 640c).
  • the transaction processing system 620 is configured to utilize one or more application programming interfaces (APIs) that are each configured to allow the transaction processing system 620 to interface and/or interact with a particular SAS (e.g., 640a, 640b, 640c).
  • APIs application programming interfaces
  • the transaction processing system 620 utilize each of a first API 625a, a second API 625b, and a third API 625c to interface and/or interact with each of a first SAS 640a, a second SAS 640b, and a third SAS 640c.
  • one of the first API 625a, second API 625b, or third API 625c may allow the transaction processing system 620 to direct/request activation of a particular stored value account for a particular SAS with one of the first SAS 640a, the second SAS 640b, or the third SAS 640c.
  • the SASs 640a, 640b, 640c may be configured for communication with one or more information datastores, e.g., datastore 645.
  • Datastore 645 may contain separate sub-datastores 645a and 645b.
  • separate sub-datastores 645a and 645b may individually or collectively include an entry for each of the stored value accounts offered for sale the retailer 601 or multiple retailers.
  • stored value account information used to verify activation request/information may be stored in a stored value account information database, e.g., datastore 645a.
  • Activation requestor information may be stored in a requestor information database, e.g., datastore 645b.
  • FIG. 7 illustrates a computer system 780 suitable for implementing all, or a portion of, one or more embodiments disclosed herein.
  • the computer system 780 includes a processor 782 (which may be referred to as a central processor unit or CPU) that is in communication with memory devices including secondary storage 784, read only memory (ROM) 786, random access memory (RAM) 788, input/output (I/O) devices 790, and network connectivity devices 792.
  • the processor 782 may be implemented as one or more CPU chips.
  • a design that is still subject to frequent change may be preferred to be implemented in software, because re-spinning a hardware implementation is more expensive than re-spinning a software design.
  • a design that is stable that will be produced in large volume may be preferred to be implemented in hardware, for example in an application specific integrated circuit (ASIC), because for large production runs the hardware implementation may be less expensive than the software implementation.
  • ASIC application specific integrated circuit
  • a design may be developed and tested in a software form and later transformed, by well-known design rules, to an equivalent hardware implementation in an application specific integrated circuit that hardwires the instructions of the software.
  • a machine controlled by a new ASIC is a particular machine or apparatus, likewise a computer that has been programmed and/or loaded with executable instructions may be viewed as a particular machine or apparatus.
  • the secondary storage 784 is typically comprised of one or more disk drives or tape drives and is used for non-volatile storage of data and as an over-flow data storage device if RAM 788 is not large enough to hold all working data. Secondary storage 784 may be used to store programs which are loaded into RAM 788 when such programs are selected for execution.
  • the ROM 786 is used to store instructions and perhaps data which are read during program execution. ROM 786 is a non-volatile memory device which typically has a small memory capacity relative to the larger memory capacity of secondary storage 784.
  • the RAM 788 is used to store volatile data and perhaps to store instructions. Access to both ROM 786 and RAM 788 is typically faster than to secondary storage 784.
  • the secondary storage 784, the RAM 788, and/or the ROM 786 may be referred to in some contexts as computer readable storage media and/or non-transitory computer readable media.
  • processor 782 might receive information from the network or might output information to the network in the course of performing the above-described method steps.
  • Such information which is often represented as a sequence of instructions to be executed using processor 782, may be received from and outputted to the network, for example, in the form of a computer data signal embodied in a carrier wave.
  • Such information may be received from and outputted to the network, for example, in the form of a computer data baseband signal or signal embodied in a carrier wave.
  • the baseband signal or signal embedded in the carrier wave may be generated according to several methods well known to one skilled in the art.
  • the baseband signal and/or signal embedded in the carrier wave may be referred to in some contexts as a transitory signal.
  • the computer system 780 may comprise two or more computers in communication with each other that collaborate to perform a task.
  • an application may be partitioned in such a way as to permit concurrent and/or parallel processing of the instructions of the application.
  • the data processed by the application may be partitioned in such a way as to peimit concurrent and/or parallel processing of different portions of a data set by the two or more computers.
  • virtualization software may be employed by the computer system 780 to provide the functionality of a number of servers that is not directly bound to the number of computers in the computer system 780. For example, virtualization software may provide twenty virtual servers on four physical computers.
  • Cloud computing may comprise providing computing services via a network connection using dynamically scalable computing resources.
  • Cloud computing may be supported, at least in part, by virtualization software.
  • a cloud computing environment may be established by an enterprise and/or may be hired on an as-needed basis from a third-party provider.
  • Some cloud computing environments may comprise cloud computing resources owned and operated by the enterprise as well as cloud computing resources hired and/or leased from a third-party provider.
  • the computer program product may be suitable for loading, by the computer system 780, at least portions of the contents of the computer program product to the secondary storage 784, to the ROM 786, to the RAM 788, and/or to other non-volatile memory and volatile memory of the computer system 780.
  • the processor 782 may process the executable instructions and/or data structures in part by directly accessing the computer program product, for example by reading from a CD-ROM disk inserted into a disk drive peripheral of the computer system 780.
  • the processor 782 may process the executable instructions and/or data structures by remotely accessing the computer program product, for example by downloading the executable instructions and/or data structures from a remote server through the network connectivity devices 792.
  • the computer program product may comprise instructions that promote the loading and/or copying of data, data structures, files, and/or executable instructions to the secondary storage 784, to the ROM 786, to the RAM 788, and/or to other non-volatile memory and volatile memory of the computer system 780.
  • the processor 782 may comprise an internal RAM, an internal ROM, a cache memory, and/or other internal non-transitory storage blocks, sections, or components that may be referred to in some contexts as non-transitory computer readable media or computer readable storage media.
  • verifying a recipient’s entitlement to the electronic stored value account includes determining a negative correlation between a location of redemption of the electronic stored value account, initial access to the stored value account, and a location of purchase of the electronic stored value account.
  • verifying the recipient information includes determining whether the recipient information matches the purchaser information and signature of use.
  • the purchaser information includes at least one data element such as, but not limited to email address, a name, an IP address, a phone number, and a physical address of the purchaser; and the recipient information includes at least one data element such as, but not limited to email address, a name, an IP address, a phone number, and a physical address of the recipient.
  • the processor is further configured to verify the purchaser, recipient or registered user’s entitlement by determining whether any of the data elements of the aforesaid participants, the devices and/or transaction characteristics are on a system or human determined fraud watch list.

Landscapes

  • Business, Economics & Management (AREA)
  • Accounting & Taxation (AREA)
  • Engineering & Computer Science (AREA)
  • Finance (AREA)
  • Physics & Mathematics (AREA)
  • Strategic Management (AREA)
  • General Business, Economics & Management (AREA)
  • General Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Economics (AREA)
  • Development Economics (AREA)
  • Storage Device Security (AREA)

Abstract

L'invention concerne un système de traitement de compte de valeur stockée pour recevoir une vérification d'achat pour une forme de compte de valeur stockée électronique. Le système vérifie des informations d'acheteur et fournit une liaison sécurisée à un destinataire. Le système vérifie des informations de destinataire et permet l'accès au compte de valeur stockée électronique au destinataire.
PCT/US2024/049978 2023-10-06 2024-10-04 Système et procédé de vérification de l'achat d'un compte de valeur stockée électronique WO2025076365A1 (fr)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US202363543031P 2023-10-06 2023-10-06
US63/543,031 2023-10-06

Publications (1)

Publication Number Publication Date
WO2025076365A1 true WO2025076365A1 (fr) 2025-04-10

Family

ID=95284031

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/US2024/049978 WO2025076365A1 (fr) 2023-10-06 2024-10-04 Système et procédé de vérification de l'achat d'un compte de valeur stockée électronique

Country Status (1)

Country Link
WO (1) WO2025076365A1 (fr)

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20080021825A1 (en) * 1998-06-22 2008-01-24 Phillips Gregory J Debit Purchasing of Stored Value Card for Use By And/Or Delivery to Others
US20130297506A1 (en) * 2009-02-04 2013-11-07 Metabank System and computer program product to issue a retail prepaid card including a user-designed external face using a chit and related computer implemented methods
US20140214626A1 (en) * 2013-01-31 2014-07-31 Facebook, Inc. Methods for enabling gift card transactions
US20150161620A1 (en) * 2013-12-06 2015-06-11 Cube, Co. System and method for risk and fraud mitigation for merchant on-boarding
KR20200027489A (ko) * 2020-03-05 2020-03-12 김진곤 운영 서버의 동작 방법과 이를 포함하는 상품권 발행 서비스 제공 방법

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20080021825A1 (en) * 1998-06-22 2008-01-24 Phillips Gregory J Debit Purchasing of Stored Value Card for Use By And/Or Delivery to Others
US20130297506A1 (en) * 2009-02-04 2013-11-07 Metabank System and computer program product to issue a retail prepaid card including a user-designed external face using a chit and related computer implemented methods
US20140214626A1 (en) * 2013-01-31 2014-07-31 Facebook, Inc. Methods for enabling gift card transactions
US20150161620A1 (en) * 2013-12-06 2015-06-11 Cube, Co. System and method for risk and fraud mitigation for merchant on-boarding
KR20200027489A (ko) * 2020-03-05 2020-03-12 김진곤 운영 서버의 동작 방법과 이를 포함하는 상품권 발행 서비스 제공 방법

Similar Documents

Publication Publication Date Title
US11282074B2 (en) Automated application programming interface (API) system and method
US10984403B2 (en) Systems and methods for brokered authentification express seller links
US10007914B2 (en) Fraud detection employing personalized fraud detection rules
US10963932B2 (en) User enhanced authentication system for online purchases
US11665155B2 (en) Systems and methods for controlling third-party access of a protected data resource
US8424061B2 (en) Method, system and program product for authenticating a user seeking to perform an electronic service request
US10152705B2 (en) Quick payment using mobile device binding
JP6067132B2 (ja) デジタルサービスに対する要求を処理する方法
US11599623B2 (en) Global identity for use in a hybrid cloud network architecture
US20220247753A1 (en) Systems and methods for controlling third-party access of a protected data resource
AU2016377729A1 (en) Client apparatus, server apparatus and access control system for authorized access
US11823145B2 (en) Secured integration of third-party logic in electronic transaction processing
US10089476B1 (en) Compartments
WO2020142465A1 (fr) Gestionnaire de stockage de justificatif d'identité pour protéger la sécurité d'un justificatif d'identité pendant une utilisation de compte délégué
US12259860B2 (en) Efficient random string processing
US10516667B1 (en) Hidden compartments
US20240289780A1 (en) Multi-factor authentication (mfa) arrangements for dynamic virtual transaction token generation via browser extension
US20250119428A1 (en) Systems and methods for hosted authentication service
US12205116B1 (en) Systems and methods for executing an authenticated service
US11429734B2 (en) Protection of sensitive data fields in webpages
WO2017112759A1 (fr) Systèmes et procédés de sélection et d'approbation de contenu multimédia et d'applications
WO2018083712A1 (fr) Système et procédé d'attribution, de gestion et de transfert basé sur un contrôle par les pairs de jetons électroniques
WO2025076365A1 (fr) Système et procédé de vérification de l'achat d'un compte de valeur stockée électronique
US11749069B2 (en) Play my bill retail lottery game
Seth et al. Design and Development of E-Commerce–Oriented PaaS Application in Cloud Computing Environment

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 24875471

Country of ref document: EP

Kind code of ref document: A1