US20050085931A1 - Online ATM transaction with digital certificate - Google Patents
Online ATM transaction with digital certificate Download PDFInfo
- Publication number
- US20050085931A1 US20050085931A1 US10/375,290 US37529003A US2005085931A1 US 20050085931 A1 US20050085931 A1 US 20050085931A1 US 37529003 A US37529003 A US 37529003A US 2005085931 A1 US2005085931 A1 US 2005085931A1
- Authority
- US
- United States
- Prior art keywords
- transaction
- computer system
- buyer
- accordance
- digital certificate
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Abandoned
Links
- 238000000034 method Methods 0.000 claims abstract description 69
- 230000008569 process Effects 0.000 claims description 18
- 238000012795 verification Methods 0.000 claims description 7
- 230000008520 organization Effects 0.000 claims description 4
- 208000001613 Gambling Diseases 0.000 claims description 3
- 238000000151 deposition Methods 0.000 claims description 3
- 238000013475 authorization Methods 0.000 claims description 2
- 230000000977 initiatory effect Effects 0.000 claims description 2
- 230000001960 triggered effect Effects 0.000 claims 2
- 230000000694 effects Effects 0.000 claims 1
- 230000009471 action Effects 0.000 description 10
- 238000004891 communication Methods 0.000 description 9
- 230000006870 function Effects 0.000 description 6
- 238000012545 processing Methods 0.000 description 6
- 230000008901 benefit Effects 0.000 description 4
- 238000005516 engineering process Methods 0.000 description 4
- 238000012546 transfer Methods 0.000 description 4
- 238000006467 substitution reaction Methods 0.000 description 3
- 230000005540 biological transmission Effects 0.000 description 2
- 238000013461 design Methods 0.000 description 2
- 239000000835 fiber Substances 0.000 description 2
- 238000012986 modification Methods 0.000 description 2
- 230000004048 modification Effects 0.000 description 2
- 230000008707 rearrangement Effects 0.000 description 2
- 230000004075 alteration Effects 0.000 description 1
- 230000001413 cellular effect Effects 0.000 description 1
- 238000004590 computer program Methods 0.000 description 1
- 238000012790 confirmation Methods 0.000 description 1
- 230000003993 interaction Effects 0.000 description 1
- 239000000463 material Substances 0.000 description 1
- 230000007246 mechanism Effects 0.000 description 1
- 230000005055 memory storage Effects 0.000 description 1
- 238000012360 testing method Methods 0.000 description 1
- 230000000007 visual effect Effects 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/22—Payment schemes or models
- G06Q20/26—Debit schemes, e.g. "pay now"
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/04—Payment circuits
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/08—Payment architectures
- G06Q20/12—Payment architectures specially adapted for electronic shopping systems
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/382—Payment protocols; Details thereof insuring higher security of transaction
- G06Q20/3821—Electronic credentials
- G06Q20/38215—Use of certificates or encrypted proofs of transaction rights
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07F—COIN-FREED OR LIKE APPARATUS
- G07F19/00—Complete banking systems; Coded card-freed arrangements adapted for dispensing or receiving monies or the like and posting such transactions to existing accounts, e.g. automatic teller machines
- G07F19/20—Automatic teller machines [ATMs]
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07F—COIN-FREED OR LIKE APPARATUS
- G07F19/00—Complete banking systems; Coded card-freed arrangements adapted for dispensing or receiving monies or the like and posting such transactions to existing accounts, e.g. automatic teller machines
- G07F19/20—Automatic teller machines [ATMs]
- G07F19/202—Depositing operations within ATMs
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07F—COIN-FREED OR LIKE APPARATUS
- G07F19/00—Complete banking systems; Coded card-freed arrangements adapted for dispensing or receiving monies or the like and posting such transactions to existing accounts, e.g. automatic teller machines
- G07F19/20—Automatic teller machines [ATMs]
- G07F19/211—Software architecture within ATMs or in relation to the ATM network
Definitions
- the present invention relates to a system and method for performing bank account debit payment transactions using a digital certificate. In one aspect, it relates to a system and method of verifying an ATM transaction using a digital certificate for use in electronic commerce over the Internet.
- Authentication systems are often used for security purposes to verify the authenticity of one or more parties during a transaction.
- authentication systems have been manual, involving simple personal recognition or quick verification of the party via some form of additional identification.
- a typical authentication process occurs, for example, when purchasing an item with a personal check. The sales clerk will process the check only if he or she recognizes the person writing the check or if that person presents another piece of identification (e.g., driver's license) to verify the authenticity of that person who is offering the check.
- Another common manual authentication process might occur in an apartment building or at work where a person is authenticated by a security guard or receptionist through visual recognition.
- Some authenticating systems are electronic. For example, a common electronic authentication system is used in an automated teller machine (ATM).
- ATM automated teller machine
- Bank members are issued special ATM cards for use in the ATMs to permit automated and/or remote access to and/or withdrawals from the member's bank account.
- the ATM cards that are primarily in use today are plastic cards having a single magnetic strip on one side.
- the magnetic strip typically contains information regarding the bank, the member, and his or her account number.
- PIN personal identification number
- the member inserts the magnetic-strip card into the ATM and enters his or her four-digit PIN.
- the PIN authenticates for the ATM that the person standing at the ATM is the member who owns the inserted ATM card (or an authorized person representing that member).
- Personal accounts have become an onmipresent aspect of contemporary society, associated with almost every aspect of our lives.
- Personal accounts are associated with, for example, telephone calling cards, checking and savings accounts in banks, computer networks, and credit cards.
- account security is maintained (and unauthorized access prevented) by use of a password or PIN.
- Account security is typically maintained by requiring two separate steps for account access. First, the account number must be entered. Second, a password or PIN associated with the account must be entered as well.
- the account number is typically not concealed (i.e., it may be printed on the telephone calling card or credit card, or it may be recorded on a magnetic strip affixed to the card which is read by an associated card reader) and may be considered, at least for security purposes, to be readily accessible.
- a password or PIN is not supposed to be readily accessible. Rather, a user is typically instructed to memorize and not write down a password or PIN to prevent inadvertent disclosure of the password or PIN. By keeping the password or PIN confidential, unauthorized access to an account is usually prevented.
- a telephone calling card number may be provided by keying in the number on a telephone keypad or, in some circumstances, sliding the telephone calling card through a magnetic card reader attached to a specially equipped telephone.
- the account number is printed on the telephone calling card, and accordingly is readily accessible to any individual looking at the telephone calling card.
- merely knowing the account number sometimes does not allow someone to use the telephone calling card when a caller also has to know the PIN associated with the telephone calling card before a call may be placed using the telephone calling card.
- someone who steals such a telephone calling card or merely knows the account number printed on the telephone calling card cannot make fraudulent telephone calls using the telephone calling card account because only the authorized user knows the PIN necessary to activate the account.
- an ATM access card or debit card often has at least one account number associated with it that is normally recorded on the magnetic strip affixed to the card and is read when the card is inserted into or swiped at an ATM.
- unauthorized use of the card is usually prevented by requiring entry of a PIN before an account identified on the card can be accessed to, for example, withdraw money from the account.
- the owner of the ATM access card is normally instructed to memorize the PIN and not write it down to prevent an unauthorized user from learning the PIN.
- Computer networks and databases also often have user accounts and associated passwords.
- a user may have an electronic mail account or, as is increasingly often the case, the user may have a personal account associated with a web page accessed through the Internet.
- the user's account number and password or PIN are needed before access to an account or a restricted-access web page is granted.
- a computer user may have a stock trading account with a stock broker that maintains a web page.
- the user's account is not accessible without entry of an identification number, which is normally keyed in by the user at a remote terminal.
- the identification number may be detected by an observer. In this case, the observer may be simply watching the keyboard or, alternatively, the observer may be using a so-called “sniffer” to observe the network traffic.
- a PIN or password is often used in connection with accessing voice mail.
- a user will enter the voice mail account number, typically the user's extension number, and then will be prompted to enter an access code of some kind. It is only by entering the appropriate access code (a PIN or password) that the user is able to listen to his or her voice mail. Thus, the user is able to maintain a degree of confidentiality with respect to his or her voice mail.
- a security system or authentication method is too complex or too time consuming, it will sometimes discourage an authorized user from dealing using it. In other words, the user may turn to simpler or more convenient sites out of frustration or anger.
- a system for performing an ATM debit transaction over the Internet comprises a transaction computer system adapted to be communicably coupled to each of a payee computer system and an ATM debit network as needed during the ATM debit transaction.
- the transaction computer system has software adapted to authenticate an identity of a payor using a payor digital certificate provided by the payor and adapted to debit funds from a bank account of the payor via the ATM debit network if the identity of the payor is authenticated by a decryption of the payor digital certificate.
- a system for transacting electronic commerce payments over the Internet comprises a bank account debit network, a payee computer system, a payor computer system, a transaction computer system, and a software program.
- the bank account debit network links together a plurality of financial institutions.
- the payee computer system is communicably coupled to the Internet.
- the payor computer system is communicably coupled to the Internet, such that the payor computer system can be communicably coupled to the payee computer system via the Internet.
- the transaction computer system is communicably coupled to the payee computer system and the bank account debit network.
- the software program on the transaction computer system is adapted to authorize a bank account debit transaction between the payee computer system and the payor computer system using at least one digital certificate exchange for at least partial authorization of the bank account debit transaction. Also, the software program is adapted to submit the bank account debit transaction to the bank account debit network for debiting money from a bank account of a payor if the bank account debit transaction has been authenticated and authorized using the at least one digital certificate exchange.
- a system for performing a secure ATM transaction for a buyer making a payment to a seller over the Internet comprises an ATM network, a seller web site, a transaction computer system, and a software program.
- the ATM network links together a plurality of banks.
- the seller web site is accessible to the buyer via the Internet.
- the transaction computer system is adapted to be communicably coupled to the seller web site and the ATM network as needed to perform the secure ATM transaction.
- the software program on the transaction computer system is adapted to authorize and facilitate the secure ATM transaction between the seller and the buyer using at least one digital certificate, and when the secure ATM transaction is authorized, the software program is also adapted to submit a debit request to the ATM network corresponding to the secure ATM transaction.
- a system for authenticating identities of parties to an ATM debit transaction occurring over the Internet comprises a transaction computer system located remotely from a first computer system of a first party to the ATM debit transaction.
- the transaction computer system comprises a software program adapted to authenticate the identity of the first party using a digital certificate presented to the transaction computer system by the first party.
- the transaction computer system is adapted to be communicably coupled to an ATM debit network as needed.
- the first computer system is adapted to be communicably coupled to the transaction computer system as needed.
- a second computer system of a second party to the ATM debit transaction communicates with the first computer system via the Internet when the ATM debit transaction is initiated.
- a method of performing a bank account debit transaction over the Internet comprises the following steps, the order of which may vary: (i) requiring a payor to provide a payor digital certificate that can authenticate the identity of the payor; (ii) verifying the authenticity of the payor digital certificate on a transaction computer system; and (iii) if the payor digital certificate is authenticated, debiting funds from a bank account of the payor via a bank account debit network, wherein the transaction computer system is communicably coupled to the bank account debit network as needed during the debiting step.
- a method of performing a bank account debit transaction over the Internet comprises the following steps, the order of which may vary: (i) debiting funds from a bank account of a payor via a bank account debit network; (ii) requiring a payee to provide a payee digital certificate that can authenticate the identity of the payee; (iii) verifying the authenticity of the payee digital certificate on a transaction computer system; and (iv) if the payee digital certificate is authenticated, transferring the debited funds into an account of the payee.
- a method of purchasing at least one of a product, service, or property from a seller via the Internet with an ATM debit card, without requiring a buyer and the ATM debit card to be physically present at a machine, employee, or facility of the seller, is provided.
- the method comprises the following steps, the order of which may vary: (i) when a buyer selects a debit card payment option to pay for the at least one product, service, or property offered on a seller web site, requiring the buyer to provide a buyer digital certificate to a certificate authority to authenticate the identity of the buyer; (ii) verifying the authenticity of the buyer digital certificate; (iii) if the buyer digital certificate is authenticated, debiting funds from a bank account associated with the ATM debit card via an ATM debit network; and (iv) transferring the debited funds to an account of the seller as payment for the at least one product or service purchased by the buyer from the seller web site over the Internet.
- method of selling at least one of a product, service, or property via the Internet comprises the following steps, the order of which may vary: (i) providing a seller web site that a buyer can access via the Internet; (ii) providing a transaction computer system, wherein the transaction computer system is adapted to be communicably coupled to a seller computer system as needed, wherein the seller computer system comprises code and data adapted to provide the seller web site, and wherein the transaction computer system is adapted to be communicably coupled to a bank account debit network; (iii) when a buyer selects a debit card payment option for an electronic commerce transaction to purchase the at least one product, service, or property offered on the seller web site, initiating a debit transaction on the transaction computer system; (iv) sending a seller digital certificate to the transaction computer system for verification of the identity of the seller; (v) determining whether the seller digital certificate is authentic by decrypting the seller digital certificate at the transaction computer system; (vi) collecting a bank account
- the preferred embodiment provides a system, method, and computer program product that allows ATM debit transactions to be verified using a digital certificate, possibly located on the buyer's computer, which can be sent with each ATM debit transaction communication to authenticate the source of the communication (e.g., the buyer's computer system).
- a digital certificate possibly located on the buyer's computer, which can be sent with each ATM debit transaction communication to authenticate the source of the communication (e.g., the buyer's computer system).
- the PIN that might otherwise be used in an ATM debit transaction for verification purposes may not need to be used for verification.
- a digital certificate may be issued and downloaded. The digital certificate then can be stored on the buyer's computer system.
- FIG. 1 is a schematic of a system in accordance with a preferred embodiment of the present invention.
- FIGS. 2A-2C show a flow chart schematic of a business method or process in accordance with the preferred embodiment of the present invention.
- ATM refers to an Automated Teller Machine (e.g., remote, unmanned bank machine for providing cash withdrawals), not Asynchronous Transfer Mode.
- ATM network ATM debit network
- ATM debit network ATM debit network
- bank account debit network a plurality of financial institutes networked together to support the use of Automated Teller Machines
- a network of multipoint DDS dataphone digital service or digital data system
- circuits linking together a plurality of Automated Teller Machines with a plurality of banks for the purpose of providing debit transactions by bank customers at Automated Teller Machines
- a secure banking network linking together a plurality of financial institutes for the exchange of funds between banks
- a network of banks and/or financial institutions linked together for the purpose of debiting funds from a bank account of a payor and depositing these debited funds into an account of a payee
- a secure banking network
- bank account refers to a personal, business, or commercial bank account (e.g., checking, savings, money market) and it does not refer a credit card account.
- ATM transaction generally refers to a transaction where funds are withdrawn from a bank account of a payor.
- buyer generally refers to the person, group, partnership, entity, agency, or organization that desires to or is making a money payment to another for whatever reason (e.g., order or purchase goods or services, pay filing fee, pay a bill, pay back a person or entity to which money is owed, pay admission for an entertainment event, make a charitable donation, purchase a lottery ticket, place a bet for a gambling or casino game, etc.), or withdrawing funds from a bank account for whatever reason.
- reason e.g., order or purchase goods or services, pay filing fee, pay a bill, pay back a person or entity to which money is owed, pay admission for an entertainment event, make a charitable donation, purchase a lottery ticket, place a bet for a gambling or casino game, etc.
- the terms “seller,” merchant,” and “payee” as used herein each generally refers to the person, group, partnership, entity, agency, or organization that is receiving or that will receive a money payment from a buyer, user, customer, or payor for whatever reason, or that is receiving or that will receive the withdrawn funds from a buyer, user, customer, or payor for whatever reason.
- computer system refers to a system that may comprise one computer unit or machine, a plurality of computer units or machines, a network of computer units or machines, a server, a database, a memory storage device, a processor, software, a printer, a monitor, and/or any combination thereof.
- a “computer system” can be located in one physical facility, in one box, in one rack, in a plurality of racks, in a plurality of boxes, or in a plurality of physical locations linked together with communication lines.
- Software or software programs loaded on, stored in, or running on a computer system may comprise one executable file, a plurality of subprograms or libraries, a plurality of components, and/or any combination thereof.
- software or software programs loaded on, stored in, or running on a computer system may be found in a single machine, may be spread out among a plurality of machines, may be burned into a chip, board, or chip set, and/or any combination thereof.
- PKI Public Key Infrastructure
- the sender and recipient share a secret key, which is used both to encrypt and decrypt the message or information.
- the same key is used to encrypt the message or information by the sender and to decrypt the message or information by the recipient.
- keys are used to encrypt and decrypt the message or information.
- a pair of numbers are related to each other by a cryptographic or mathematical formula, such that the message or information can be encrypted with a public key, transmitted in an encrypted form, and decrypted with the corresponding private key of the key pair, and vice versa.
- certificate authority certifying authority
- certification authority certifying authority
- digital certificate is used herein to generically refer to an encrypted data file that comprises identification information of a person or entity (e.g., person's or entity's name, person's or entity's address, person's or entity's domain information, certificate authority that issued the certificate, term of the certificate or expiration date, certificate serial number, restrictions to the use of the certificate) for the purpose of identifying, verifying, and/or authenticating the identity of the person or entity presenting the digital certificate.
- the digital certificate is typically encrypted with a private key of a trusted third party (i.e., a certificate authority) that issues the digital certificate.
- a certificate authority i.e., a certificate authority
- a digital certificate can only be opened with the certificate authority's public key, only the certificate authority could have issued the digital certificate. Because the certificate authority is a trusted third party, the contents of the digital certificate can likewise be trusted. Via a digital certificate a certificate authority can guarantee that one or both of the parties exchanging information digitally (e.g., over the Internet) are really who they claim to be. Hence, a digital certificate is analogous to a driver's license or passport issued by a government agency.
- the term “communicably coupled” is used herein to generically refer to any connection that is adapted to carry communications, whatever the supporting technology.
- two devices may be communicably coupled using hard-wire-type connections, such as phone lines, POTS, T1 lines, DSL, cable television network, modem, SCSI connection, fiber optic, Ethernet, twisted pair, switches, token rings, local area network, PBX, wide area network, Internet connections, etc.
- two devices may be communicably coupled using wireless connections adapted to carry communication such as via electromagnetic waves, satellite transmission, microwaves, laser light, wireless optics (e.g., infrared), etc.
- the term includes logical connections between two processes on the same system and processes connected by a common computing device memory space. Thus, the technology by which the communication is transmitted is not material to the meaning of communicably coupled.
- FIG. 1 is a schematic of a system 20 in accordance with a preferred embodiment of the present invention.
- the system 20 is adapted to perform an ATM debit transaction between a payor and a payee over the Internet using digital certificates to authenticate the identity of the parties (payor and payee) to the ATM debit transaction.
- the system 20 provides a way for a payor to pay a payee over the Internet with an ATM debit card, but without the payor being physically present at the payee's facility or store or in the presence of a representative or employee of the payee.
- the present invention provides a way to conduct a secure ATM debit transaction over the Internet and authenticate the identity of the payor and/or the payee.
- the computer systems shown in FIG. 1 can be broken into four groups: client computer system 22 , merchant computer system 24 , ATM debit network 26 , and transaction computer system 28 .
- the client computer system 22 may also be referred to (i.e., is equivalent to) a buyer computer system of a buyer or a payor computer system of a payor.
- the merchant computer system 24 may also be referred to (i.e., is equivalent to) a merchant web site, a seller computer system or seller web site of a seller, or a payee computer system or payee web site of a payee.
- the client desires to or needs to make a payment to the merchant (payee).
- the most common use of the system 20 will probably be electronic commerce for the sale of goods or services over the Internet, which continues to be a rapidly growing way to shop and do business.
- the client computer system 22 may be located virtually anywhere in the world due to the numerous available ways of electronic communication, such as telephone wires to a client's home, high-speed digital access lines to an office, fiber optic cable networks, wireless laptops, wireless palm-size computers, cellular telephones, and satellite communication devices.
- the merchant computer system 24 will typically be a server that provides code and data (e.g., HTML, SGML, XML, Java Applets, image files) to generated a merchant web site that can be accessed by the client via the Internet 30 .
- code and data e.g., HTML, SGML, XML, Java Applets, image files
- the client computer system 22 can be communicably connected to the merchant web site 24 via the Internet 30 .
- the arrows show how the components of the system are communicably coupled together as needed.
- the client computer system 22 and the merchant web site 24 are communicably coupled via the Internet 30 .
- the merchant computer system 24 may be communicably coupled to the transaction computer system 28 , for example, via the Internet or via a direct dial-up line.
- the transaction computer system 28 of the preferred embodiment comprises a gateway server 32 , a business server 34 , a database server 36 , and a certifying authority server 38 .
- the gateway server 32 has software for receiving, routing, and communicating among the various components.
- the database server 36 in this example is an Oracle 8i database server, which is used to store information generated for and during the ATM debit transactions.
- the gateway server 32 is communicably coupled to the ATM debit network 26 as needed to submit debit requests or fund transfer requests to the bank or financial institution where the client has a bank account associated with the client's ATM debit card.
- the certifying authority server 38 is a server that is physically located in a secure facility of a trusted third-party (certifying authority's facility). The certifying authority issues and authenticates digital certificates.
- the buyer By authenticating the digital certificate of a merchant web site 24 through the certifying authority, the buyer can be confident that the merchant web site 24 is really that of the actual merchant, and not that of an imposter. Similarly, by authenticating the digital certificate or digital signature of a buyer, the merchant can be confident that the buyer is really the actual buyer or someone authorized by the buyer to use the buyer's computer system 22 and the buyer's ATM debit card.
- the business server 34 of the transaction computer system 28 is adapted send and receive email messages for the transaction computer system (e.g., generating and sending email receipts to a buyer) and to provide code and data for a web site of the provider 40 of the online ATM transaction services.
- the preferred embodiment shown in FIG. 1 is just one possible configuration for a system in accordance with the present invention, and the configuration may vary.
- the gateway server 32 , business server 34 , and database server 36 are located at the physical facilities of the online ATM transaction service provider 40 .
- these servers may be located at different locations while still being capable of being communicably coupled together to acts as the transaction computer system 28 .
- the transaction computer system 28 may be fully scaleable and modular.
- the certifying authority 38 may also be the provider of the online ATM transaction services 40 .
- all of the components of the transaction computer system 28 may be at the certifying authority's facilities.
- the transaction computer system 28 may be split different ways or different combinations.
- the database server 36 and the certifying authority server 38 may be located at and maintained at the certifying authority's building.
- the online ATM transaction service provider 40 may also act as the certifying authority, and hence the entire transaction computer system 28 may be all located within the provider's facility 40 .
- the number of ways to provide a transaction computer system 28 of the present invention will likely also progress accordingly.
- the functions and tasks of the certifying authority server 38 , the database server 36 , the gateway server 32 , and the business server 34 may all be provided by and performed on a single computer machine (i.e., in the same rack, or perhaps even within the same box or rack component).
- the tasks and components of the transaction computer system 28 of an embodiment of the present invention can be split-up, consolidated, or combined in numerous ways while still performing the same or equivalent core functions of the present invention.
- the following description describes an example scenario of an electronic commerce transaction over the Internet in accordance with the present invention and focuses on the encryption aspects of such a transaction to illustrate a possible use of encryption technology to securely exchange information and the digital certificates when applying the present invention.
- Joe Buyer the buyer
- Gadget Seller, Inc. the seller
- the buyer's identity and the seller's identity will be verified and authenticated through the use of digital certificates.
- the seller transfers the buyer to a transaction computer system of a transaction service provider, which may be that of the seller or that of a third party.
- the buyer's computer and the transaction computer system establish an secure socket layer (SSL) connection, or any other equivalent standard secure connection.
- SSL secure socket layer
- the buyer and provider can send each other messages or information encrypted with symmetric session key, and hence an SSL connection is established. It is preferable to send and receive large amounts of data or information that is symmetrically encrypted rather than being asymmetrically encrypted because symmetric encryption and decryption is faster and consumes less processor effort. But the asymmetric encryption is useful in managing the secure delivery of the symmetric session key.
- the buyer needs to securely transmit the buyer's bank account information (e.g., ATM debit card number, bank account number, PIN) to the provider.
- the buyer creates a hash code of the buyer's information using a standard hash function and encrypts the hash code with the symmetric session key.
- the hash code will be used by the provider to verify that the information sent by the buyer has not been altered along the way.
- the buyer also encrypts the buyer's information with the symmetric session key.
- the buyer then creates a package including the symmetrically encrypted information, the symmetrically encrypted hash code of the information, and the buyer's digital certificate.
- the buyer then digitally signs the package (i.e., asymmetrically encrypts the package with the buyer's private key) and sends the asymmetrically encrypted package to the provider.
- the provider can only asymmetrically decrypt the package using the buyer's public key, which proves to the provider that only the buyer could have sent it because only the buyer has the corresponding private key.
- the provider decrypts the information and hash code using the symmetric session key.
- the provider has the buyer's account information, the corresponding hash code, and the buyer's digital certificate.
- the provider then rehashes the buyer's account information and compares the two hash codes of the buyer's account information to verify that the buyer's account information has not changed since it was transmitted by the buyer, i.e., verifying that the information was not corrupted or tampered with.
- the transaction computer system can direct the buyer to a certifying authority to obtain one.
- a digital certificate issued by a certificate authority to the buyer will typically include information about the buyer, an expiration date or validity period, a serial number, and the issuing certificate authority's information (i.e., name of certificate authority, etc.).
- the digital certificate issued by the certificate authority is signed by the certificate authority. That is, the certificate authority encrypts the buyer's digital certificate with the certificate authority's private key, and thus the buyer's digital certificate can only be decrypted and read with the certificate authority's public key.
- anyone opening the buyer's digital certificate will know that only the certificate authority, who is a trusted third party, could have issued it because only the certificate authority has the corresponding private key.
- the buyer In obtaining a digital certificate from a certificate authority, the buyer will likely establish a secure connection (e.g., SSL connection) with the certificate authority, provide the requisite information to the certificate authority for obtaining a digital certificate, and securely receive the digital certificate from the certificate authority using encryption before transmission.
- the seller can obtain a digital certificate from a certificate authority, just as described for the buyer, so that the seller can provide its digital certificate to authenticate its identity for a buyer or a banking institute.
- the provider now needs to decrypt and verify the buyer's digital certificate. If the provider does not already have the certificate authority's public key, the provider next obtains the certificate authority's public key. With the certificate authority's public key, the provider decrypts the buyer's digital certificate.
- the provider determines whether the digital certificate is still valid and whether there are any specific restrictions on the digital certificate relevant to the transaction. Also, the provider compares the information from the buyer's digital certificate with the information provided by the buyer to determine if they match. Because the provider trusts the certificate authority and because the buyer signed the information sent to the provider, the provider can authenticate that the buyer is really who he/she/it claims to be. Likewise, the provider can authenticate the identity of the seller by obtaining and decrypting the seller's digital certificate via encrypted communications. Thus, the use of digital certificates allows the provider to authenticate the identity of the buyer and the seller, which will ideally safeguard both parties from fraud. Now that the identities of the transaction parties' has been authenticated by the provider, the provider can proceed to execute the ATM debit transaction by communicating with the relevant financial institution(s) and/or bank(s) via the ATM debit network.
- FIGS. 2A-2C show a flow chart schematic of a business method or process in accordance with the preferred embodiment of the present invention. Because the preface above focuses on encryption processes that may be used in applying the present invention, the following description focuses on other aspects of the preferred embodiment and progresses through the flow chart schematic of FIGS. 2A-2C .
- the process shown in FIGS. 2A-2C is adapted to run on the system shown in FIG. 1 .
- FIG. 1 shows a flow chart schematic of a business method or process in accordance with the preferred embodiment of the present invention.
- the process can be understood by following the logic sequences and paths of the arrows shown connecting the action, query, or decision boxes in FIGS. 2A-2C .
- the merchant computer system 24 redirects the buyer away from the merchant web site and to a site generated by the transaction computer system 28 .
- the transaction computer system 28 establishes a secure connection between the buyer computer system 22 and the transaction computer system 28 , such as a secure socket layer (SSL) connection.
- SSL secure socket layer
- the transaction computer system 28 sends an HTML error message to the buyer's browser 22 and the buyer is returned to the merchant web site 24 . If the SSL secure connection is successful, the transaction computer system 28 collects the buyer's Internet Protocol (IP) address and domain information. Next, the transaction computer system 28 checks the merchant's digital certificate to verify and authenticate the identity of the merchant compared to the identity claimed by the merchant. If the merchant's digital certificate cannot be authenticated, an HTML error message is sent to the buyer and the buyer is returned to the merchant web site 24 . In other words, the ATM debit transaction is canceled because the merchant's digital certificate was not authenticated.
- IP Internet Protocol
- the transaction computer system 28 collects a bank account number, which corresponds to a bank account (e.g., checking, savings).
- the bank account number may be the ATM debit card number stamped on an ATM debit card, which corresponds to one or more bank accounts. Often an ATM debit card number will differ from a checking account number, even though both number may correspond to the same bank account.
- the transaction computer system 28 validates the ATM debit card number, which may require interaction the bank via the ATM debit network 26 .
- the transaction computer system 28 requests the ATM debit card number again (e.g., in case the number was entered wrong).
- the buyer's computer system 22 may have a card swiping device that will read a magnetic strip on the ATM debit card to input the ATM debit card number information, or the buyer may just type in the ATM debit card number, which is typically stamped on the card.
- the buyer may input the ATM debit card number using a keyboard and/or using a mouse interacting with a virtual keypad or keyboard (graphical user interface) displayed on the buyer's computer system (e.g., buyer's browser).
- an HTML error message can be generated and sent to the buyer's browser, and the ATM transaction is terminated.
- the transaction computer system 28 determines whether the ATM debit transaction at hand requires a digital certificate from the buyer. Such consideration may be based, for example, on the rules for the buyer's bank account usage or it may be based on the dollar value involved (e.g., for transactions exceeding $200). If a digital certificate is required from the buyer, then the transaction computer system 28 requests and/or receives a digital certificate from the buyer. If or when the buyer has a digital certificate that the transaction computer system 28 can open or access, then the transaction computer system 28 attempts to authenticate the buyer digital certificate.
- the transaction computer system 28 1) performs an administrative removal, sends an HTML error message to the buyer, terminates the ATM debit transaction, and returns the buyer to the merchant's web site; 2) activates the certificate if it determines that the digital certificate was awaiting the buyer to pick it up or retrieve it, and returns to the action 52 of checking the buyer digital certificate; or 3) re-issues a digital certificate to the buyer if it determines that the digital certificate was removed for being inactive, and returns to the action 52 of checking the buyer digital certificate.
- the transaction computer system 28 can attempt to issue the buyer a new digital certificate. In attempting to issue the buyer a new digital certificate, the transaction computer system 28 collects any relevant client information already provided to the merchant computer system 24 via the merchant web site. Then, the transaction computer system 28 requests additional information if needed. The transaction computer system 28 attempts to confirm the zip code with the buyer's address information. If confirmed, one point is added to a score variable that starts as zero. If not confirmed, the transaction computer system 28 attempts to confirm the zip code with the area code of the buyer's phone number. If confirmed, one point is added to the score variable.
- the transaction computer system 28 attempts to confirm the address with the buyer's phone number. If confirmed, one point is added to the score variable. If not confirmed, no points are added to the score. Next, the transaction computer system 28 determines whether the score is greater than one, which indicates whether any of the confirmation tests added a point to the score. If the score is not greater than zero, then the transaction computer system 28 sends an HTML error message to the buyer, terminates the ATM debit transaction, and returns the buyer to the merchant's web site. If the score is greater than zero, the transaction computer system 28 confirms the address information with information from the ATM debit network 26 regarding the buyer's bank account.
- the transaction computer system 28 sends an HTML error message to the buyer, terminates the ATM debit transaction, and returns the buyer to the merchant's web site 24 . If the address is confirmed with the information provided from the ATM debit network 26 , the transaction computer system 28 populates the digital certificate with information about the buyer, issues a digital certificate to the buyer, and returns to the check buyer digital certificate action 52 .
- the transaction computer system 28 sets the certificate level. Continuing on FIG. 2B , after the certificate level is set, the transaction computer system 28 searches its database 36 for the certificate identification number or some other certificate identifier. If the certificate is not found in the database server 36 or in the certifying authority server 38 , a new database record is created and the new database record is sent for further processing (box 54 ). If the certificate is found in the transaction computer system 28 (i.e., a database record already exists for this certificate in database 36 ), the certificate record is retrieved and sent for further processing (box 54 ).
- the transaction computer system 28 creates an ID (identification) record for the buyer.
- the database 36 of the transaction computer system 28 is searched to determine whether a record matching the buyer's identification can found in the database 36 . If the buyer's ID already exists in the database 36 , then the record for the buyer is sent for further processing (box 54 ). If the buyer's ID cannot be found in the database, a new account or a re-entry account is generated, stored in the database, and sent for further processing (box 54 ).
- the database 36 of the transaction computer system 28 tracks and stores records of past transactions for each user or buyer by record ID.
- the transaction computer system 28 checks for system lockouts for the buyer of record. If there has been a system lockout, the transaction computer system 28 sets an error code of invalid account or invalid password and the transaction is canceled, terminated, or finalized without completion. If there have been no system lockouts, the transaction computer system 28 next checks for whether there have been transaction lockouts for the buyer of record. If there have been no transaction lockouts, the transaction computer system 28 further checks for whether there have been password lockouts for the buyer of record.
- the transaction computer system 28 next determines whether there has been one or more transaction lockout or password lockout on that day. If there has been a transaction lockout or password lockout on that day, the transaction computer system 28 sets an error code of invalid account or invalid password and the transaction is canceled, terminated, or finalized without completion. If there have been no transaction lockouts or password lockouts on that day, then the transaction computer system 28 resets the transaction counter, date, and bad password counter unlock account settings for the record of the buyer, and progresses to the “Select Action” box 58 .
- the process progresses to the “Select Action” box 58 .
- One purpose of these checks is to try to prevent hackers or other persons attempting to commit fraud from passing through and completing an ATM debit transaction. In other words, it is for the protection of legitimate buyers and those who may have had there information taken or used without permission.
- one of the actions is selected: process transaction; cancel transaction; edit contract information; verify web site; or view privacy policy. If cancel transaction is selected (see path E continued on FIG. 2A ), an HTML error message is sent to the buyer, the ATM debit transaction is terminated, and the buyer is returned to the merchant's web site. If the process transaction action is selected (see path D continued on FIG. 2C ), then the ATM debit transaction proceeds. Next, the transaction computer system 28 determines whether the amount to be debited is over the limit, which may be determined by each bank for a given bank account, by the balance in the bank account available for withdrawal, or by some other rules or regulations.
- the transaction computer system 28 next determines whether the transaction amount is over the merchant's limit, which may vary from merchant to merchant. If the transaction amount is over the merchant's limit, an error code is sent to the buyer's browser 22 to inform the buyer that the transaction amount is over the merchant's limit and the transaction is ended. If the transaction amount is not over the merchant's limit, the transaction computer system 28 next determines whether the transaction amount exceeds the limit for that day.
- the transaction computer system 28 compares the prior transaction amounts for that day plus the proposed transaction amount to the limit set per day for that bank account. If the transactions for the day plus the proposed transactions exceed the limit per day, then an error code is sent to the buyer's browser 22 to inform the buyer that the transaction amount will go over the daily limit and the transaction is ended.
- the transaction computer system 28 If there have been no ATM debit transactions for that account on that day, and if there have been transactions that day and the limit will not be exceeded by the proposed transaction, then the transaction computer system 28 starts to finalize the transaction. At this point the transaction computer system 28 makes a request from the respective bank of the bank account via the ATM debit network 26 . If the transaction fails at this stage (i.e., bank server down, problem at bank, restriction set by bank, etc.), then a failure code is sent back to the transaction computer system 28 via the ATM debit network 26 . Upon notice of failure, the transaction computer system 28 writes to the transaction record on the database 36 to update it, emails an error report to the buyer, displays an error report on the buyer's browser 22 , and returns the buyer to the merchant's web site 24 .
- the transaction computer system 28 writes to the transaction record on the database 36 to update it, emails an error report to the buyer, displays an error report on the buyer's browser 22 , and returns the buyer to the merchant's web site 24 .
- a success code is sent back to the transaction computer system 28 via the ATM debit network 26 .
- the transaction computer system 28 Upon notice of a successful ATM debit transaction, the transaction computer system 28 writes to the transaction record on the database 36 to update it. If the most recent limit date of record for the bank account at hand is the same as the day of the transaction just completed, then the limit counter is increased by one and the current transaction amount is added to the prior limit amount to update the limit amount in light of the current transaction. If the most recent limit date differs from the current date of the transaction at hand, then the transaction computer system resets the limit date to the current date of the transaction at hand, the limit amount is reset to equal the current transaction amount, and the limit counter is reset to equal one.
- the transaction computer system 28 After the transaction computer system 28 is finished updating the database 36 , the transaction computer system 28 sends an email receipt to the buyer, and displays a receipt on the buyer's browser 22 . At this point, a successful and secure ATM debit transaction is completed over the Internet so that the buyer can pay the merchant using an ATM debit card for the electronic commerce transaction (e.g., sale of goods or services over the Internet).
- an ATM debit card for the electronic commerce transaction (e.g., sale of goods or services over the Internet).
- the present invention can be used in a number of online applications, including but not limited to: purchasing lottery tickets over the Internet; playing casino games over the Internet; gambling over the Internet; sending money to friends or relatives in distant places over the Internet; buying groceries (to be delivered) over the Internet; buying books, videos, music, or software (to be delivered) over the Internet; paying for or bidding on items in an online auction; purchasing movies to view via the Internet; donating money to a charity organization over the Internet; downloading digital books, music, images, video clips, graphics, games, or software over the Internet; paying bills (e.g., electric, mortgage, phone, cable, rent, ISP services, credit card statements) over the Internet; or buying real estate over the Internet. Therefore, the present invention provides a way for buyers, banks, and sellers to all have the confidence that an ATM debit transaction over the Internet can be completed securely and with less chances for fraud to occur.
- this invention provides a system and method of authenticating and processing an ATM debit or bank account withdrawal transaction over the Internet using at least one digital certificate to authenticate the identity of at least one party to the transaction.
- the drawings and detailed description herein are to be regarded in an illustrative rather than a restrictive manner, and are not intended to limit the invention to the particular forms and examples disclosed.
- the invention includes any further modifications, changes, rearrangements, substitutions, alternatives, design choices, and embodiments apparent to those of ordinary skill in the art, without departing from the spirit and scope of this invention, as defined by the following claims.
- the following claims be interpreted to embrace all such further modifications, changes, rearrangements, substitutions, alternatives, design choices, and embodiments.
Landscapes
- Business, Economics & Management (AREA)
- Accounting & Taxation (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Engineering & Computer Science (AREA)
- Finance (AREA)
- Strategic Management (AREA)
- General Business, Economics & Management (AREA)
- Theoretical Computer Science (AREA)
- Software Systems (AREA)
- Computer Security & Cryptography (AREA)
- Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
Abstract
Description
- This application is a continuation of international application number PCT US01/27342, filed Aug. 31, 2001. Under 35 U.S.C. § 119(e), this application claims the benefit of commonly owned U.S. Provisional Patent Application having Ser. No. 60/229,400 entitled S
YSTEM FOR ONLINE AUTOMATED TELLER TRANSACTIONS filed on Aug. 31, 2000, which is also hereby incorporated by reference. - The present invention relates to a system and method for performing bank account debit payment transactions using a digital certificate. In one aspect, it relates to a system and method of verifying an ATM transaction using a digital certificate for use in electronic commerce over the Internet.
- Authentication systems are often used for security purposes to verify the authenticity of one or more parties during a transaction. Traditionally, authentication systems have been manual, involving simple personal recognition or quick verification of the party via some form of additional identification. A typical authentication process occurs, for example, when purchasing an item with a personal check. The sales clerk will process the check only if he or she recognizes the person writing the check or if that person presents another piece of identification (e.g., driver's license) to verify the authenticity of that person who is offering the check. Another common manual authentication process might occur in an apartment building or at work where a person is authenticated by a security guard or receptionist through visual recognition.
- Some authenticating systems are electronic. For example, a common electronic authentication system is used in an automated teller machine (ATM). Bank members are issued special ATM cards for use in the ATMs to permit automated and/or remote access to and/or withdrawals from the member's bank account. The ATM cards that are primarily in use today are plastic cards having a single magnetic strip on one side. The magnetic strip typically contains information regarding the bank, the member, and his or her account number. To guard against unauthorized access, the member is also assigned or asked to choose a multi-digit password or personal identification number (PIN). In use, the member inserts the magnetic-strip card into the ATM and enters his or her four-digit PIN. The PIN authenticates for the ATM that the person standing at the ATM is the member who owns the inserted ATM card (or an authorized person representing that member).
- ATM cards or bank debit cards are now being accepted by many stores and merchants for the purchase of merchandise in a store. Magnetic-strip cards are limited, however, in that comparison of the PIN number recorded on the magnetic-strip card with the PIN number entered by the card user most often requires the purchaser to be in the merchant's physical presence.
- Personal accounts have become an onmipresent aspect of contemporary society, associated with almost every aspect of our lives. Personal accounts are associated with, for example, telephone calling cards, checking and savings accounts in banks, computer networks, and credit cards. Typically, account security is maintained (and unauthorized access prevented) by use of a password or PIN.
- Account security is typically maintained by requiring two separate steps for account access. First, the account number must be entered. Second, a password or PIN associated with the account must be entered as well. The account number is typically not concealed (i.e., it may be printed on the telephone calling card or credit card, or it may be recorded on a magnetic strip affixed to the card which is read by an associated card reader) and may be considered, at least for security purposes, to be readily accessible. In contrast, a password or PIN is not supposed to be readily accessible. Rather, a user is typically instructed to memorize and not write down a password or PIN to prevent inadvertent disclosure of the password or PIN. By keeping the password or PIN confidential, unauthorized access to an account is usually prevented.
- For example, a telephone calling card number may be provided by keying in the number on a telephone keypad or, in some circumstances, sliding the telephone calling card through a magnetic card reader attached to a specially equipped telephone. The account number is printed on the telephone calling card, and accordingly is readily accessible to any individual looking at the telephone calling card. However, merely knowing the account number sometimes does not allow someone to use the telephone calling card when a caller also has to know the PIN associated with the telephone calling card before a call may be placed using the telephone calling card. Hence in theory, someone who steals such a telephone calling card or merely knows the account number printed on the telephone calling card cannot make fraudulent telephone calls using the telephone calling card account because only the authorized user knows the PIN necessary to activate the account.
- Similarly, an ATM access card or debit card often has at least one account number associated with it that is normally recorded on the magnetic strip affixed to the card and is read when the card is inserted into or swiped at an ATM. Again, unauthorized use of the card (and therefore unauthorized account access) is usually prevented by requiring entry of a PIN before an account identified on the card can be accessed to, for example, withdraw money from the account. The owner of the ATM access card is normally instructed to memorize the PIN and not write it down to prevent an unauthorized user from learning the PIN.
- Computer networks and databases also often have user accounts and associated passwords. For example, a user may have an electronic mail account or, as is increasingly often the case, the user may have a personal account associated with a web page accessed through the Internet. Typically, the user's account number and password or PIN are needed before access to an account or a restricted-access web page is granted. For example, a computer user may have a stock trading account with a stock broker that maintains a web page. The user's account is not accessible without entry of an identification number, which is normally keyed in by the user at a remote terminal. As with other multiple level security systems using passwords or PINs, the identification number may be detected by an observer. In this case, the observer may be simply watching the keyboard or, alternatively, the observer may be using a so-called “sniffer” to observe the network traffic.
- In another application, a PIN or password is often used in connection with accessing voice mail. In a typical voice mail system, a user will enter the voice mail account number, typically the user's extension number, and then will be prompted to enter an access code of some kind. It is only by entering the appropriate access code (a PIN or password) that the user is able to listen to his or her voice mail. Thus, the user is able to maintain a degree of confidentiality with respect to his or her voice mail.
- However, each of these applications suffers from a common flaw. A casual observer or a dedicated intruder can detect the supposedly secret personal identification number or password, either by direct observation or by repeated trial attempts. Having determined what the personal identification number or password is, an unauthorized person can obtain access to the account with relative ease, having bypassed one of the security mechanisms intended to prevent such abuse.
- These access problems are exacerbated when an account is accessed over a computer system (e.g., electronic commerce over the Internet). In this case, both the account number and the passcode or PIN are directly entered into the computer system by the user, generally without the use of a magnetic-strip card or other medium, so they are both more easily intercepted. Further, there now exist many different means for capturing and recording keystrokes on a computer system, so that they can be later analyzed for account numbers and passcodes. Even more troublesome is the present capability to track the motion of a mouse or cursor on a graphical user interface (GUI) screen, and to record the screen location of touch-screen inputs, so that account numbers and passcodes can be determined my reconstructing the authorized user's actions on the GUI screen.
- Also, if a security system or authentication method is too complex or too time consuming, it will sometimes discourage an authorized user from dealing using it. In other words, the user may turn to simpler or more convenient sites out of frustration or anger.
- Hence, there is a need for either an alternative way to prevent the unauthorized use and access to a user's bank account for ATM or debit payments over the Internet, or a way to add an additional security measure to the currently available security measures, but without requiring too much burden or inconvenience for the user.
- All references cited herein are incorporated by reference to the maximum extent allowable by law. To the extent a reference may not be fully incorporated herein, it is incorporated by reference for background purposes, and indicative of the knowledge of one of ordinary skill in the art.
- The problems and needs outlined above are largely solved and met by the present invention. In accordance with one aspect of the present invention, a system for performing an ATM debit transaction over the Internet is provided. The system comprises a transaction computer system adapted to be communicably coupled to each of a payee computer system and an ATM debit network as needed during the ATM debit transaction. The transaction computer system has software adapted to authenticate an identity of a payor using a payor digital certificate provided by the payor and adapted to debit funds from a bank account of the payor via the ATM debit network if the identity of the payor is authenticated by a decryption of the payor digital certificate.
- In accordance with another aspect of the present invention, a system for transacting electronic commerce payments over the Internet is provided. The system comprises a bank account debit network, a payee computer system, a payor computer system, a transaction computer system, and a software program. The bank account debit network links together a plurality of financial institutions. The payee computer system is communicably coupled to the Internet. The payor computer system is communicably coupled to the Internet, such that the payor computer system can be communicably coupled to the payee computer system via the Internet. The transaction computer system is communicably coupled to the payee computer system and the bank account debit network. The software program on the transaction computer system is adapted to authorize a bank account debit transaction between the payee computer system and the payor computer system using at least one digital certificate exchange for at least partial authorization of the bank account debit transaction. Also, the software program is adapted to submit the bank account debit transaction to the bank account debit network for debiting money from a bank account of a payor if the bank account debit transaction has been authenticated and authorized using the at least one digital certificate exchange.
- In accordance with yet another aspect of the present invention, a system for performing a secure ATM transaction for a buyer making a payment to a seller over the Internet is provided. The system comprises an ATM network, a seller web site, a transaction computer system, and a software program. The ATM network links together a plurality of banks. The seller web site is accessible to the buyer via the Internet. The transaction computer system is adapted to be communicably coupled to the seller web site and the ATM network as needed to perform the secure ATM transaction. The software program on the transaction computer system is adapted to authorize and facilitate the secure ATM transaction between the seller and the buyer using at least one digital certificate, and when the secure ATM transaction is authorized, the software program is also adapted to submit a debit request to the ATM network corresponding to the secure ATM transaction.
- In accordance with still another aspect of the present invention, a system for authenticating identities of parties to an ATM debit transaction occurring over the Internet is provided. The system comprises a transaction computer system located remotely from a first computer system of a first party to the ATM debit transaction. The transaction computer system comprises a software program adapted to authenticate the identity of the first party using a digital certificate presented to the transaction computer system by the first party. The transaction computer system is adapted to be communicably coupled to an ATM debit network as needed. The first computer system is adapted to be communicably coupled to the transaction computer system as needed. A second computer system of a second party to the ATM debit transaction communicates with the first computer system via the Internet when the ATM debit transaction is initiated.
- In accordance with another aspect of the present invention, a method of performing a bank account debit transaction over the Internet is provided. The method comprises the following steps, the order of which may vary: (i) requiring a payor to provide a payor digital certificate that can authenticate the identity of the payor; (ii) verifying the authenticity of the payor digital certificate on a transaction computer system; and (iii) if the payor digital certificate is authenticated, debiting funds from a bank account of the payor via a bank account debit network, wherein the transaction computer system is communicably coupled to the bank account debit network as needed during the debiting step.
- In accordance with yet another aspect of the present invention, a method of performing a bank account debit transaction over the Internet is provided. The method comprises the following steps, the order of which may vary: (i) debiting funds from a bank account of a payor via a bank account debit network; (ii) requiring a payee to provide a payee digital certificate that can authenticate the identity of the payee; (iii) verifying the authenticity of the payee digital certificate on a transaction computer system; and (iv) if the payee digital certificate is authenticated, transferring the debited funds into an account of the payee.
- In accordance with still another aspect of the present invention, a method of purchasing at least one of a product, service, or property from a seller via the Internet with an ATM debit card, without requiring a buyer and the ATM debit card to be physically present at a machine, employee, or facility of the seller, is provided. The method comprises the following steps, the order of which may vary: (i) when a buyer selects a debit card payment option to pay for the at least one product, service, or property offered on a seller web site, requiring the buyer to provide a buyer digital certificate to a certificate authority to authenticate the identity of the buyer; (ii) verifying the authenticity of the buyer digital certificate; (iii) if the buyer digital certificate is authenticated, debiting funds from a bank account associated with the ATM debit card via an ATM debit network; and (iv) transferring the debited funds to an account of the seller as payment for the at least one product or service purchased by the buyer from the seller web site over the Internet.
- In accordance with still another aspect of the present invention, method of selling at least one of a product, service, or property via the Internet is provided. The method comprises the following steps, the order of which may vary: (i) providing a seller web site that a buyer can access via the Internet; (ii) providing a transaction computer system, wherein the transaction computer system is adapted to be communicably coupled to a seller computer system as needed, wherein the seller computer system comprises code and data adapted to provide the seller web site, and wherein the transaction computer system is adapted to be communicably coupled to a bank account debit network; (iii) when a buyer selects a debit card payment option for an electronic commerce transaction to purchase the at least one product, service, or property offered on the seller web site, initiating a debit transaction on the transaction computer system; (iv) sending a seller digital certificate to the transaction computer system for verification of the identity of the seller; (v) determining whether the seller digital certificate is authentic by decrypting the seller digital certificate at the transaction computer system; (vi) collecting a bank account number for a bank account of the buyer; (vii) determine whether the bank account number is valid; (viii) collecting a buyer digital certificate for verification of the identity of the buyer; (ix) determining whether the buyer digital certificate is authentic by decrypting the buyer digital certificate at the transaction computer system; (x) if the buyer digital certificate and the seller digital certificate are authenticated, submitting the debit transaction to the bank account debit network; (xi) debiting funds from the bank account of the buyer via the bank account debit network; (xii) informing the seller computer system that the debit transaction was successfully executed so that the electronic commerce transaction can be completed; and (xiii) depositing the debited funds into an account of the seller.
- The preferred embodiment provides a system, method, and computer program product that allows ATM debit transactions to be verified using a digital certificate, possibly located on the buyer's computer, which can be sent with each ATM debit transaction communication to authenticate the source of the communication (e.g., the buyer's computer system). Hence, the PIN that might otherwise be used in an ATM debit transaction for verification purposes may not need to be used for verification. If the buyer doesn't have a digital certificate already, a digital certificate may be issued and downloaded. The digital certificate then can be stored on the buyer's computer system.
- Other objects and advantages of the invention will become apparent upon reading the following detailed description and upon referencing the accompanying drawings, in which:
-
FIG. 1 is a schematic of a system in accordance with a preferred embodiment of the present invention; and -
FIGS. 2A-2C show a flow chart schematic of a business method or process in accordance with the preferred embodiment of the present invention. - Referring now to the drawings, wherein like reference numbers are used herein to designate like elements throughout the various views, a preferred embodiment of the present invention is illustrated and described, and other possible embodiments of the present invention are described. The figures are not necessarily drawn to scale, and in some instances the drawings have been exaggerated and/or simplified in places for illustrative purposes only. One of ordinary skill in the art will appreciate the many possible applications and variations of the present invention based on the following examples of possible embodiments of the present invention.
- The following guidelines provide at least partial definitions of some terms, phrases, and acronyms as used herein, although these guidelines are not necessarily the exclusive meanings.
- The acronym “ATM” as used herein refers to an Automated Teller Machine (e.g., remote, unmanned bank machine for providing cash withdrawals), not Asynchronous Transfer Mode.
- The phrases “ATM network,” “ATM debit network,” and “bank account debit network” as used herein each generically refers to: a plurality of financial institutes networked together to support the use of Automated Teller Machines; a network of multipoint DDS (dataphone digital service or digital data system) circuits linking together a plurality of Automated Teller Machines with a plurality of banks for the purpose of providing debit transactions by bank customers at Automated Teller Machines; a plurality of banks and/or financial institutes linked together over dedicated lines for the purpose of providing debit transactions at an Automated Teller Machine, or at a seller's or merchant's facility or place of doing business (e.g., store, restaurant, entertainment center, medical facility, shop); a secure banking network linking together a plurality of financial institutes for the exchange of funds between banks; a network of banks and/or financial institutions linked together for the purpose of debiting funds from a bank account of a payor and depositing these debited funds into an account of a payee; a network provided by a consortium of banks and financial institutes for allowing bank customers to withdraw money from the bank customer's bank account (e.g., checking, savings, money market accounts at a bank) to receive cash from an automated teller machine, to pay a seller for goods or services at the seller's facilities, or to pay a bill or order a product or service over the telephone; and/or any combination thereof.
- The phrase “bank account” as used herein refers to a personal, business, or commercial bank account (e.g., checking, savings, money market) and it does not refer a credit card account.
- The phrases “ATM transaction,” “debit transaction,” “bank account debit transaction,” “ATM debit transaction,” and “bank account withdrawal transaction” as used herein each generally refers to a transaction where funds are withdrawn from a bank account of a payor.
- The terms “buyer,” “user,” “customer,” and “payor” as used herein each generally refers to the person, group, partnership, entity, agency, or organization that desires to or is making a money payment to another for whatever reason (e.g., order or purchase goods or services, pay filing fee, pay a bill, pay back a person or entity to which money is owed, pay admission for an entertainment event, make a charitable donation, purchase a lottery ticket, place a bet for a gambling or casino game, etc.), or withdrawing funds from a bank account for whatever reason.
- The terms “seller,” merchant,” and “payee” as used herein each generally refers to the person, group, partnership, entity, agency, or organization that is receiving or that will receive a money payment from a buyer, user, customer, or payor for whatever reason, or that is receiving or that will receive the withdrawn funds from a buyer, user, customer, or payor for whatever reason.
- The phrase “computer system” as used herein generically refers to a system that may comprise one computer unit or machine, a plurality of computer units or machines, a network of computer units or machines, a server, a database, a memory storage device, a processor, software, a printer, a monitor, and/or any combination thereof. A “computer system” can be located in one physical facility, in one box, in one rack, in a plurality of racks, in a plurality of boxes, or in a plurality of physical locations linked together with communication lines. Software or software programs loaded on, stored in, or running on a computer system may comprise one executable file, a plurality of subprograms or libraries, a plurality of components, and/or any combination thereof. Also, software or software programs loaded on, stored in, or running on a computer system may be found in a single machine, may be spread out among a plurality of machines, may be burned into a chip, board, or chip set, and/or any combination thereof.
- The acronym “PKI” as used herein refers to Public Key Infrastructure, which is a way to manage public keys on a secure basis for use by widely distributed users or systems.
- Generally in symmetric encryption or symmetric cryptography, the sender and recipient share a secret key, which is used both to encrypt and decrypt the message or information. Hence, the same key is used to encrypt the message or information by the sender and to decrypt the message or information by the recipient.
- Generally in asymmetric encryption or asymmetric cryptography or public-private key pair encryption, different keys are used to encrypt and decrypt the message or information. A pair of numbers (keys) are related to each other by a cryptographic or mathematical formula, such that the message or information can be encrypted with a public key, transmitted in an encrypted form, and decrypted with the corresponding private key of the key pair, and vice versa.
- The terms “certificate authority,” “certifying authority,” and “certification authority” as used herein are interchangeable.
- The term “digital certificate” is used herein to generically refer to an encrypted data file that comprises identification information of a person or entity (e.g., person's or entity's name, person's or entity's address, person's or entity's domain information, certificate authority that issued the certificate, term of the certificate or expiration date, certificate serial number, restrictions to the use of the certificate) for the purpose of identifying, verifying, and/or authenticating the identity of the person or entity presenting the digital certificate. The digital certificate is typically encrypted with a private key of a trusted third party (i.e., a certificate authority) that issues the digital certificate. Thus, such a digital certificate encrypted with a certificate authority's private key can only be opened with the certificate authority's public key. Because such a digital certificate can only be opened with the certificate authority's public key, only the certificate authority could have issued the digital certificate. Because the certificate authority is a trusted third party, the contents of the digital certificate can likewise be trusted. Via a digital certificate a certificate authority can guarantee that one or both of the parties exchanging information digitally (e.g., over the Internet) are really who they claim to be. Hence, a digital certificate is analogous to a driver's license or passport issued by a government agency.
- The term “communicably coupled” is used herein to generically refer to any connection that is adapted to carry communications, whatever the supporting technology. For example, two devices may be communicably coupled using hard-wire-type connections, such as phone lines, POTS, T1 lines, DSL, cable television network, modem, SCSI connection, fiber optic, Ethernet, twisted pair, switches, token rings, local area network, PBX, wide area network, Internet connections, etc. Also, two devices may be communicably coupled using wireless connections adapted to carry communication such as via electromagnetic waves, satellite transmission, microwaves, laser light, wireless optics (e.g., infrared), etc. Further, the term includes logical connections between two processes on the same system and processes connected by a common computing device memory space. Thus, the technology by which the communication is transmitted is not material to the meaning of communicably coupled.
- Other technical terms used herein will typically have the ordinary meaning as known to one having ordinary skill in the art, and/or may be found in a technical dictionary, such as Newton's Telecom Dictionary.
-
FIG. 1 is a schematic of a system 20 in accordance with a preferred embodiment of the present invention. The system 20 is adapted to perform an ATM debit transaction between a payor and a payee over the Internet using digital certificates to authenticate the identity of the parties (payor and payee) to the ATM debit transaction. In other words, the system 20 provides a way for a payor to pay a payee over the Internet with an ATM debit card, but without the payor being physically present at the payee's facility or store or in the presence of a representative or employee of the payee. Through the use of digital certificates, the present invention provides a way to conduct a secure ATM debit transaction over the Internet and authenticate the identity of the payor and/or the payee. Most buyers or customers on the Internet desire to execute a transaction or sale quickly and without a complicated procedure. But at the same time, most buyers and customers are concerned about protecting their bank accounts from fraud and theft. Hence, one of the goals of the system 20 is to prevent fraudulent use or theft of bank account information for transactions occurring over the Internet while also keeping the process relatively simple and convenient for the clients or payors. - The computer systems shown in
FIG. 1 can be broken into four groups:client computer system 22,merchant computer system 24,ATM debit network 26, andtransaction computer system 28. Theclient computer system 22 may also be referred to (i.e., is equivalent to) a buyer computer system of a buyer or a payor computer system of a payor. Similarly, themerchant computer system 24 may also be referred to (i.e., is equivalent to) a merchant web site, a seller computer system or seller web site of a seller, or a payee computer system or payee web site of a payee. In other words, for whatever reason (e.g., electronic commerce, business deal, purchase, bill payment, personal transaction, money transfer), the client (payor) desires to or needs to make a payment to the merchant (payee). The most common use of the system 20 will probably be electronic commerce for the sale of goods or services over the Internet, which continues to be a rapidly growing way to shop and do business. Theclient computer system 22 may be located virtually anywhere in the world due to the numerous available ways of electronic communication, such as telephone wires to a client's home, high-speed digital access lines to an office, fiber optic cable networks, wireless laptops, wireless palm-size computers, cellular telephones, and satellite communication devices. - The
merchant computer system 24 will typically be a server that provides code and data (e.g., HTML, SGML, XML, Java Applets, image files) to generated a merchant web site that can be accessed by the client via theInternet 30. Hence, theclient computer system 22 can be communicably connected to themerchant web site 24 via theInternet 30. - In
FIG. 1 , the arrows show how the components of the system are communicably coupled together as needed. Theclient computer system 22 and themerchant web site 24 are communicably coupled via theInternet 30. Themerchant computer system 24 may be communicably coupled to thetransaction computer system 28, for example, via the Internet or via a direct dial-up line. - The
transaction computer system 28 of the preferred embodiment comprises agateway server 32, abusiness server 34, adatabase server 36, and a certifyingauthority server 38. Thegateway server 32 has software for receiving, routing, and communicating among the various components. Thedatabase server 36 in this example is an Oracle 8i database server, which is used to store information generated for and during the ATM debit transactions. Thegateway server 32 is communicably coupled to theATM debit network 26 as needed to submit debit requests or fund transfer requests to the bank or financial institution where the client has a bank account associated with the client's ATM debit card. The certifyingauthority server 38 is a server that is physically located in a secure facility of a trusted third-party (certifying authority's facility). The certifying authority issues and authenticates digital certificates. By authenticating the digital certificate of amerchant web site 24 through the certifying authority, the buyer can be confident that themerchant web site 24 is really that of the actual merchant, and not that of an imposter. Similarly, by authenticating the digital certificate or digital signature of a buyer, the merchant can be confident that the buyer is really the actual buyer or someone authorized by the buyer to use the buyer'scomputer system 22 and the buyer's ATM debit card. - The
business server 34 of thetransaction computer system 28 is adapted send and receive email messages for the transaction computer system (e.g., generating and sending email receipts to a buyer) and to provide code and data for a web site of theprovider 40 of the online ATM transaction services. The preferred embodiment shown inFIG. 1 is just one possible configuration for a system in accordance with the present invention, and the configuration may vary. For example, in the preferred embodiment thegateway server 32,business server 34, anddatabase server 36 are located at the physical facilities of the online ATMtransaction service provider 40. However, these servers may be located at different locations while still being capable of being communicably coupled together to acts as thetransaction computer system 28. Also, there may bemultiple business servers 34,multiple gateway servers 32, and/ormultiple database servers 36 for a larger scale operation of the system 20, each of which may be all in one building or distributed in multiple buildings or in multiple locations across the nation or across the world. In other words, thetransaction computer system 28 is fully scaleable and modular. - Furthermore, in another embodiment, the certifying
authority 38 may also be the provider of the online ATM transaction services 40. Hence, all of the components of thetransaction computer system 28 may be at the certifying authority's facilities. In alternative, thetransaction computer system 28 may be split different ways or different combinations. For example, thedatabase server 36 and the certifyingauthority server 38 may be located at and maintained at the certifying authority's building. In another embodiment, the online ATMtransaction service provider 40 may also act as the certifying authority, and hence the entiretransaction computer system 28 may be all located within the provider'sfacility 40. As computer hardware and software capabilities continue to progress, the number of ways to provide atransaction computer system 28 of the present invention will likely also progress accordingly. For example, in yet another embodiment, the functions and tasks of the certifyingauthority server 38, thedatabase server 36, thegateway server 32, and thebusiness server 34 may all be provided by and performed on a single computer machine (i.e., in the same rack, or perhaps even within the same box or rack component). Thus, the tasks and components of thetransaction computer system 28 of an embodiment of the present invention can be split-up, consolidated, or combined in numerous ways while still performing the same or equivalent core functions of the present invention. - As a preface to the subsequent discussion regarding the flow chart schematic of
FIGS. 2A-2C , the following description describes an example scenario of an electronic commerce transaction over the Internet in accordance with the present invention and focuses on the encryption aspects of such a transaction to illustrate a possible use of encryption technology to securely exchange information and the digital certificates when applying the present invention. Suppose Joe Buyer (the buyer) desires to purchase a gadget from Gadget Seller, Inc. (the seller) securely over the Internet using an ATM debit card in accordance with the present invention. In a method of selling the gadget to the buyer over the Internet in accordance with the present invention, the buyer's identity and the seller's identity will be verified and authenticated through the use of digital certificates. When the buyer selects an ATM debit card payment option, the seller transfers the buyer to a transaction computer system of a transaction service provider, which may be that of the seller or that of a third party. The buyer's computer and the transaction computer system establish an secure socket layer (SSL) connection, or any other equivalent standard secure connection. After obtaining the symmetric session key, the buyer and provider can send each other messages or information encrypted with symmetric session key, and hence an SSL connection is established. It is preferable to send and receive large amounts of data or information that is symmetrically encrypted rather than being asymmetrically encrypted because symmetric encryption and decryption is faster and consumes less processor effort. But the asymmetric encryption is useful in managing the secure delivery of the symmetric session key. - The buyer needs to securely transmit the buyer's bank account information (e.g., ATM debit card number, bank account number, PIN) to the provider. The buyer creates a hash code of the buyer's information using a standard hash function and encrypts the hash code with the symmetric session key. The hash code will be used by the provider to verify that the information sent by the buyer has not been altered along the way. The buyer also encrypts the buyer's information with the symmetric session key. The buyer then creates a package including the symmetrically encrypted information, the symmetrically encrypted hash code of the information, and the buyer's digital certificate. The buyer then digitally signs the package (i.e., asymmetrically encrypts the package with the buyer's private key) and sends the asymmetrically encrypted package to the provider. The provider can only asymmetrically decrypt the package using the buyer's public key, which proves to the provider that only the buyer could have sent it because only the buyer has the corresponding private key. Next, the provider decrypts the information and hash code using the symmetric session key. Thus, at this point the provider has the buyer's account information, the corresponding hash code, and the buyer's digital certificate.
- The provider then rehashes the buyer's account information and compares the two hash codes of the buyer's account information to verify that the buyer's account information has not changed since it was transmitted by the buyer, i.e., verifying that the information was not corrupted or tampered with.
- If the buyer does not have a valid digital certificate before entering into the ATM debit transaction over the Internet, the transaction computer system can direct the buyer to a certifying authority to obtain one. A digital certificate issued by a certificate authority to the buyer will typically include information about the buyer, an expiration date or validity period, a serial number, and the issuing certificate authority's information (i.e., name of certificate authority, etc.). The digital certificate issued by the certificate authority is signed by the certificate authority. That is, the certificate authority encrypts the buyer's digital certificate with the certificate authority's private key, and thus the buyer's digital certificate can only be decrypted and read with the certificate authority's public key. Hence, anyone opening the buyer's digital certificate will know that only the certificate authority, who is a trusted third party, could have issued it because only the certificate authority has the corresponding private key.
- In obtaining a digital certificate from a certificate authority, the buyer will likely establish a secure connection (e.g., SSL connection) with the certificate authority, provide the requisite information to the certificate authority for obtaining a digital certificate, and securely receive the digital certificate from the certificate authority using encryption before transmission. The seller can obtain a digital certificate from a certificate authority, just as described for the buyer, so that the seller can provide its digital certificate to authenticate its identity for a buyer or a banking institute. Back to the transaction discussion, the provider now needs to decrypt and verify the buyer's digital certificate. If the provider does not already have the certificate authority's public key, the provider next obtains the certificate authority's public key. With the certificate authority's public key, the provider decrypts the buyer's digital certificate. The provider determines whether the digital certificate is still valid and whether there are any specific restrictions on the digital certificate relevant to the transaction. Also, the provider compares the information from the buyer's digital certificate with the information provided by the buyer to determine if they match. Because the provider trusts the certificate authority and because the buyer signed the information sent to the provider, the provider can authenticate that the buyer is really who he/she/it claims to be. Likewise, the provider can authenticate the identity of the seller by obtaining and decrypting the seller's digital certificate via encrypted communications. Thus, the use of digital certificates allows the provider to authenticate the identity of the buyer and the seller, which will ideally safeguard both parties from fraud. Now that the identities of the transaction parties' has been authenticated by the provider, the provider can proceed to execute the ATM debit transaction by communicating with the relevant financial institution(s) and/or bank(s) via the ATM debit network.
-
FIGS. 2A-2C show a flow chart schematic of a business method or process in accordance with the preferred embodiment of the present invention. Because the preface above focuses on encryption processes that may be used in applying the present invention, the following description focuses on other aspects of the preferred embodiment and progresses through the flow chart schematic ofFIGS. 2A-2C . The process shown inFIGS. 2A-2C is adapted to run on the system shown inFIG. 1 . However, as will be apparent to one having ordinary skill in the art with the benefit of this disclosure, other possible variations in the process are possible while performing the same or equivalent tasks or core functions of the present invention. For example, some of the details of how certain tasks are handled, when a transaction is terminated, or what order the steps are in may vary while still providing an ATM transaction over the Internet using at least one digital certificate to authenticate the identity of at least one party to the transaction. - Starting at the “Client selects payment option on Merchant Site”
box 50 in the upper left corner ofFIG. 2A , the process can be understood by following the logic sequences and paths of the arrows shown connecting the action, query, or decision boxes inFIGS. 2A-2C . When a buyer or client selects an option to pay using an ATM debit card (or payment by withdrawal from a bank account) on the merchant web site (e.g., when checking out after shopping and selecting items to purchase), themerchant computer system 24 redirects the buyer away from the merchant web site and to a site generated by thetransaction computer system 28. At this point thetransaction computer system 28 establishes a secure connection between thebuyer computer system 22 and thetransaction computer system 28, such as a secure socket layer (SSL) connection. If the SSL connection is not successful in providing a secure connection, thetransaction computer system 28 sends an HTML error message to the buyer'sbrowser 22 and the buyer is returned to themerchant web site 24. If the SSL secure connection is successful, thetransaction computer system 28 collects the buyer's Internet Protocol (IP) address and domain information. Next, thetransaction computer system 28 checks the merchant's digital certificate to verify and authenticate the identity of the merchant compared to the identity claimed by the merchant. If the merchant's digital certificate cannot be authenticated, an HTML error message is sent to the buyer and the buyer is returned to themerchant web site 24. In other words, the ATM debit transaction is canceled because the merchant's digital certificate was not authenticated. Thus there is either an error or problem with the merchant's digital certificate (e.g., it may have expired), or the supposed merchant is an imposter trying to commit a fraud using the identity or name of the actual merchant. Hence, the buyer can be protected from fraud by this part of the process through the use of digital certificate technology. - If the merchant digital certificate is authenticated (i.e., the certificate is valid and the merchant is legitimate according to the certificate), the
transaction computer system 28 then collects a bank account number, which corresponds to a bank account (e.g., checking, savings). The bank account number may be the ATM debit card number stamped on an ATM debit card, which corresponds to one or more bank accounts. Often an ATM debit card number will differ from a checking account number, even though both number may correspond to the same bank account. Next thetransaction computer system 28 validates the ATM debit card number, which may require interaction the bank via theATM debit network 26. If the ATM debit card number is not valid (e.g., closed account, non-existent account), thetransaction computer system 28 requests the ATM debit card number again (e.g., in case the number was entered wrong). For entering the ATM debit card number, the buyer'scomputer system 22 may have a card swiping device that will read a magnetic strip on the ATM debit card to input the ATM debit card number information, or the buyer may just type in the ATM debit card number, which is typically stamped on the card. The buyer may input the ATM debit card number using a keyboard and/or using a mouse interacting with a virtual keypad or keyboard (graphical user interface) displayed on the buyer's computer system (e.g., buyer's browser). Upon repeated tries, if the ATM debit card number still cannot be validated, then an HTML error message can be generated and sent to the buyer's browser, and the ATM transaction is terminated. - If the buyer's ATM debit card number is validated, then the
transaction computer system 28 determines whether the ATM debit transaction at hand requires a digital certificate from the buyer. Such consideration may be based, for example, on the rules for the buyer's bank account usage or it may be based on the dollar value involved (e.g., for transactions exceeding $200). If a digital certificate is required from the buyer, then thetransaction computer system 28 requests and/or receives a digital certificate from the buyer. If or when the buyer has a digital certificate that thetransaction computer system 28 can open or access, then thetransaction computer system 28 attempts to authenticate the buyer digital certificate. If the buyer digital certificate cannot be authenticated because it exists but has been suspended, then an HTML error message is sent to the buyer, the ATM debit transaction is terminated, and the buyer is returned to the merchant's web site. If the buyer digital certificate cannot be authenticated because it exists but is not active, then the transaction computer system 28: 1) performs an administrative removal, sends an HTML error message to the buyer, terminates the ATM debit transaction, and returns the buyer to the merchant's web site; 2) activates the certificate if it determines that the digital certificate was awaiting the buyer to pick it up or retrieve it, and returns to theaction 52 of checking the buyer digital certificate; or 3) re-issues a digital certificate to the buyer if it determines that the digital certificate was removed for being inactive, and returns to theaction 52 of checking the buyer digital certificate. - If the buyer does not have a digital certificate yet or if for some reason the
transaction computer system 28 cannot open or access the buyer digital certificate, then thetransaction computer system 28 can attempt to issue the buyer a new digital certificate. In attempting to issue the buyer a new digital certificate, thetransaction computer system 28 collects any relevant client information already provided to themerchant computer system 24 via the merchant web site. Then, thetransaction computer system 28 requests additional information if needed. Thetransaction computer system 28 attempts to confirm the zip code with the buyer's address information. If confirmed, one point is added to a score variable that starts as zero. If not confirmed, thetransaction computer system 28 attempts to confirm the zip code with the area code of the buyer's phone number. If confirmed, one point is added to the score variable. If not confirmed, thetransaction computer system 28 attempts to confirm the address with the buyer's phone number. If confirmed, one point is added to the score variable. If not confirmed, no points are added to the score. Next, thetransaction computer system 28 determines whether the score is greater than one, which indicates whether any of the confirmation tests added a point to the score. If the score is not greater than zero, then thetransaction computer system 28 sends an HTML error message to the buyer, terminates the ATM debit transaction, and returns the buyer to the merchant's web site. If the score is greater than zero, thetransaction computer system 28 confirms the address information with information from theATM debit network 26 regarding the buyer's bank account. If the address is not confirmed with the information provided from theATM debit network 26, thetransaction computer system 28 sends an HTML error message to the buyer, terminates the ATM debit transaction, and returns the buyer to the merchant'sweb site 24. If the address is confirmed with the information provided from theATM debit network 26, thetransaction computer system 28 populates the digital certificate with information about the buyer, issues a digital certificate to the buyer, and returns to the check buyerdigital certificate action 52. - If or when the
transactional computer system 28 authenticates the buyer digital certificate, thetransaction computer system 28 sets the certificate level. Continuing onFIG. 2B , after the certificate level is set, thetransaction computer system 28 searches itsdatabase 36 for the certificate identification number or some other certificate identifier. If the certificate is not found in thedatabase server 36 or in the certifyingauthority server 38, a new database record is created and the new database record is sent for further processing (box 54). If the certificate is found in the transaction computer system 28 (i.e., a database record already exists for this certificate in database 36), the certificate record is retrieved and sent for further processing (box 54). - Referring again to
FIG. 2A at the “Certificate Required Transaction”query box 56, if no certificate is required, then (continuing onFIG. 2B ) thetransaction computer system 28 creates an ID (identification) record for the buyer. Thedatabase 36 of thetransaction computer system 28 is searched to determine whether a record matching the buyer's identification can found in thedatabase 36. If the buyer's ID already exists in thedatabase 36, then the record for the buyer is sent for further processing (box 54). If the buyer's ID cannot be found in the database, a new account or a re-entry account is generated, stored in the database, and sent for further processing (box 54). - Referring to
box 54 inFIG. 2B , although it may have arrived from any of the paths described above, the buyer record is now ready for further processing. Thedatabase 36 of thetransaction computer system 28 tracks and stores records of past transactions for each user or buyer by record ID. Next, thetransaction computer system 28 checks for system lockouts for the buyer of record. If there has been a system lockout, thetransaction computer system 28 sets an error code of invalid account or invalid password and the transaction is canceled, terminated, or finalized without completion. If there have been no system lockouts, thetransaction computer system 28 next checks for whether there have been transaction lockouts for the buyer of record. If there have been no transaction lockouts, thetransaction computer system 28 further checks for whether there have been password lockouts for the buyer of record. - If there has been a transaction lockout or a password lockout for the buyer of record, the
transaction computer system 28 next determines whether there has been one or more transaction lockout or password lockout on that day. If there has been a transaction lockout or password lockout on that day, thetransaction computer system 28 sets an error code of invalid account or invalid password and the transaction is canceled, terminated, or finalized without completion. If there have been no transaction lockouts or password lockouts on that day, then thetransaction computer system 28 resets the transaction counter, date, and bad password counter unlock account settings for the record of the buyer, and progresses to the “Select Action”box 58. Also, if the buyer record indicates that there have been no system lockouts, no transaction lockouts, and no password lockouts, then the process progresses to the “Select Action”box 58. One purpose of these checks is to try to prevent hackers or other persons attempting to commit fraud from passing through and completing an ATM debit transaction. In other words, it is for the protection of legitimate buyers and those who may have had there information taken or used without permission. - Referring to the “Select Action”
box 58 inFIG. 2B , at this point one of the actions is selected: process transaction; cancel transaction; edit contract information; verify web site; or view privacy policy. If cancel transaction is selected (see path E continued onFIG. 2A ), an HTML error message is sent to the buyer, the ATM debit transaction is terminated, and the buyer is returned to the merchant's web site. If the process transaction action is selected (see path D continued onFIG. 2C ), then the ATM debit transaction proceeds. Next, thetransaction computer system 28 determines whether the amount to be debited is over the limit, which may be determined by each bank for a given bank account, by the balance in the bank account available for withdrawal, or by some other rules or regulations. If the transaction amount is over the limit, an error code is sent to the buyer'sbrowser 22 to inform the buyer that the transaction amount is over the limit and the transaction is ended. If the transaction amount is not over the limit, thetransaction computer system 28 next determines whether the transaction amount is over the merchant's limit, which may vary from merchant to merchant. If the transaction amount is over the merchant's limit, an error code is sent to the buyer'sbrowser 22 to inform the buyer that the transaction amount is over the merchant's limit and the transaction is ended. If the transaction amount is not over the merchant's limit, thetransaction computer system 28 next determines whether the transaction amount exceeds the limit for that day. For example, there may be a limit to the amount of purchases that may be made using the ATM debit card per day, which may be set by each bank for a given bank account, by the online ATMtransaction service provider 40, or by some other rules or regulations. Such checks are put in place because often when bank account information is stolen, the thief will try to charge as much as possible, as quickly as possible before the owner of the bank account realizes that his or her ATM debit card or check book is missing. If an ATM debit transaction has occurred on that day already, thetransaction computer system 28 compares the prior transaction amounts for that day plus the proposed transaction amount to the limit set per day for that bank account. If the transactions for the day plus the proposed transactions exceed the limit per day, then an error code is sent to the buyer'sbrowser 22 to inform the buyer that the transaction amount will go over the daily limit and the transaction is ended. - If there have been no ATM debit transactions for that account on that day, and if there have been transactions that day and the limit will not be exceeded by the proposed transaction, then the
transaction computer system 28 starts to finalize the transaction. At this point thetransaction computer system 28 makes a request from the respective bank of the bank account via theATM debit network 26. If the transaction fails at this stage (i.e., bank server down, problem at bank, restriction set by bank, etc.), then a failure code is sent back to thetransaction computer system 28 via theATM debit network 26. Upon notice of failure, thetransaction computer system 28 writes to the transaction record on thedatabase 36 to update it, emails an error report to the buyer, displays an error report on the buyer'sbrowser 22, and returns the buyer to the merchant'sweb site 24. - If the transaction is successful, a success code is sent back to the
transaction computer system 28 via theATM debit network 26. Upon notice of a successful ATM debit transaction, thetransaction computer system 28 writes to the transaction record on thedatabase 36 to update it. If the most recent limit date of record for the bank account at hand is the same as the day of the transaction just completed, then the limit counter is increased by one and the current transaction amount is added to the prior limit amount to update the limit amount in light of the current transaction. If the most recent limit date differs from the current date of the transaction at hand, then the transaction computer system resets the limit date to the current date of the transaction at hand, the limit amount is reset to equal the current transaction amount, and the limit counter is reset to equal one. After thetransaction computer system 28 is finished updating thedatabase 36, thetransaction computer system 28 sends an email receipt to the buyer, and displays a receipt on the buyer'sbrowser 22. At this point, a successful and secure ATM debit transaction is completed over the Internet so that the buyer can pay the merchant using an ATM debit card for the electronic commerce transaction (e.g., sale of goods or services over the Internet). - The present invention can be used in a number of online applications, including but not limited to: purchasing lottery tickets over the Internet; playing casino games over the Internet; gambling over the Internet; sending money to friends or relatives in distant places over the Internet; buying groceries (to be delivered) over the Internet; buying books, videos, music, or software (to be delivered) over the Internet; paying for or bidding on items in an online auction; purchasing movies to view via the Internet; donating money to a charity organization over the Internet; downloading digital books, music, images, video clips, graphics, games, or software over the Internet; paying bills (e.g., electric, mortgage, phone, cable, rent, ISP services, credit card statements) over the Internet; or buying real estate over the Internet. Therefore, the present invention provides a way for buyers, banks, and sellers to all have the confidence that an ATM debit transaction over the Internet can be completed securely and with less chances for fraud to occur.
- It will be appreciated by those skilled in the art having the benefit of this disclosure that this invention provides a system and method of authenticating and processing an ATM debit or bank account withdrawal transaction over the Internet using at least one digital certificate to authenticate the identity of at least one party to the transaction. It should be understood that the drawings and detailed description herein are to be regarded in an illustrative rather than a restrictive manner, and are not intended to limit the invention to the particular forms and examples disclosed. On the contrary, the invention includes any further modifications, changes, rearrangements, substitutions, alternatives, design choices, and embodiments apparent to those of ordinary skill in the art, without departing from the spirit and scope of this invention, as defined by the following claims. Thus, it is intended that the following claims be interpreted to embrace all such further modifications, changes, rearrangements, substitutions, alternatives, design choices, and embodiments.
- Any element or limitation in a claim that does not explicitly state or use the language of “means for” performing a specified function, or “step for” performing a specified function, is not to be construed or interpreted as a “means” or “step” clause under 35 U.S.C. § 112, sixth paragraph, and thus should not invoke 35 U.S.C. § 112, sixth paragraph. In particular, the use of “step of” or “steps of” in the preamble of the method claims herein are not intended to invoke the application of 35 U.S.C. § 112, sixth paragraph.
- Although the preferred embodiment has been described in detail, it should be understood that various changes, substitutions and alterations can be made therein without departing from the spirit and scope of the invention as defined by the appended claims.
Claims (62)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US10/375,290 US20050085931A1 (en) | 2000-08-31 | 2003-02-27 | Online ATM transaction with digital certificate |
Applications Claiming Priority (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US22940000P | 2000-08-31 | 2000-08-31 | |
PCT/US2001/027342 WO2002019282A2 (en) | 2000-08-31 | 2001-08-31 | System and method for online atm transaction with digital certificate |
US10/375,290 US20050085931A1 (en) | 2000-08-31 | 2003-02-27 | Online ATM transaction with digital certificate |
Related Parent Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/US2001/027342 Continuation WO2002019282A2 (en) | 2000-08-31 | 2001-08-31 | System and method for online atm transaction with digital certificate |
Publications (1)
Publication Number | Publication Date |
---|---|
US20050085931A1 true US20050085931A1 (en) | 2005-04-21 |
Family
ID=22861074
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US10/375,290 Abandoned US20050085931A1 (en) | 2000-08-31 | 2003-02-27 | Online ATM transaction with digital certificate |
Country Status (4)
Country | Link |
---|---|
US (1) | US20050085931A1 (en) |
EP (1) | EP1377943A2 (en) |
AU (1) | AU2001290605A1 (en) |
WO (1) | WO2002019282A2 (en) |
Cited By (52)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20030164851A1 (en) * | 2001-06-27 | 2003-09-04 | Smith James E. | Method and system for securing credit transactions |
US20050149439A1 (en) * | 2004-01-07 | 2005-07-07 | Daniel Suisa | Transaction Method and System Using an Issued Transaction Number for Verification of a Transaction |
US20060168116A1 (en) * | 2004-06-25 | 2006-07-27 | The Go Daddy Group, Inc. | Methods of issuing a domain name certificate |
US20060168161A1 (en) * | 2004-06-25 | 2006-07-27 | The Go Daddy Group, Inc. | Methods of issuing a certificate for a domain name |
US20060287965A1 (en) * | 2005-06-15 | 2006-12-21 | E.E. System Corporation | Method and system for real time online debit transactions |
US20070093298A1 (en) * | 2005-10-24 | 2007-04-26 | Brunet Robert A H | Method of Facilitating Online Group Play of a Lottery Game |
US20080077798A1 (en) * | 2006-09-26 | 2008-03-27 | Nachtigall Ernest H | System and method for secure verification of electronic transactions |
WO2008070951A1 (en) * | 2006-12-13 | 2008-06-19 | E.E. System Corporation | Method and system for real time online debit transactions |
US20090021349A1 (en) * | 2007-07-19 | 2009-01-22 | Stephen Errico | Method to record and authenticate a participant's biometric identification of an event via a network |
US20090119512A1 (en) * | 2001-08-07 | 2009-05-07 | Bullard Jr James C | System and method for providing secured electronic transactions |
US20090198617A1 (en) * | 2007-07-27 | 2009-08-06 | Ntt Docomo, Inc. | Method and apparatus for performing delegated transactions |
WO2009097464A2 (en) * | 2008-02-02 | 2009-08-06 | Peregrin Technologies, Inc. | Remote currency dispensation systems and methods |
US20090287562A1 (en) * | 2008-02-02 | 2009-11-19 | Peregrin Technologies, Inc. | Anonymous merchant-customer loyalty rewards program |
US20100131760A1 (en) * | 2007-04-11 | 2010-05-27 | Nec Corporaton | Content using system and content using method |
US20100217710A1 (en) * | 2007-04-06 | 2010-08-26 | Nec Corporation | Electronic money system and electronic money transaction method |
US7882026B1 (en) | 2007-07-25 | 2011-02-01 | United Services Automobile Association (Usaa) | Systems and methods for a flat interchange fee for high value credit card purchases |
US20110087591A1 (en) * | 2009-10-08 | 2011-04-14 | Tim Barnett | Personalization Data Creation or Modification Systems and Methods |
US20110087495A1 (en) * | 2009-10-14 | 2011-04-14 | Bank Of America Corporation | Suspicious entity investigation and related monitoring in a business enterprise environment |
US20110125644A1 (en) * | 2001-01-26 | 2011-05-26 | Acxsys Corporation | Online payment transfer and identity management system and method |
US20110202759A1 (en) * | 2010-02-12 | 2011-08-18 | Microsoft Corporation | Certificate remoting and recovery |
US8171085B1 (en) * | 2005-01-19 | 2012-05-01 | Apple Inc. | Methods and apparatuses for authenticating electronic messages |
US20120221470A1 (en) * | 2005-03-17 | 2012-08-30 | Dennis Bower Lyon | User authentication and secure transaction system |
US8694793B2 (en) | 2007-12-11 | 2014-04-08 | Visa U.S.A. Inc. | Biometric access control transactions |
US8700486B2 (en) | 2008-02-19 | 2014-04-15 | Go Daddy Operating Company, LLC | Rating e-commerce transactions |
US20140108245A1 (en) * | 1996-11-27 | 2014-04-17 | Diebold Self-Service Systems, Division Of Diebold, Incorporated | Automated banking machine that operates responsive to data bearing records |
US20140207596A1 (en) * | 1996-05-10 | 2014-07-24 | Transaction Holdings Ltd. Llc | Automated transaction machine |
US9178888B2 (en) | 2013-06-14 | 2015-11-03 | Go Daddy Operating Company, LLC | Method for domain control validation |
US9374244B1 (en) * | 2012-02-27 | 2016-06-21 | Amazon Technologies, Inc. | Remote browsing session management |
US9443268B1 (en) | 2013-08-16 | 2016-09-13 | Consumerinfo.Com, Inc. | Bill payment and reporting |
US9521138B2 (en) | 2013-06-14 | 2016-12-13 | Go Daddy Operating Company, LLC | System for domain control validation |
TWI608722B (en) * | 2016-06-23 | 2017-12-11 | Public key certificate method | |
US9948629B2 (en) | 2009-03-25 | 2018-04-17 | The 41St Parameter, Inc. | Systems and methods of sharing information through a tag-based consortium |
US9990631B2 (en) | 2012-11-14 | 2018-06-05 | The 41St Parameter, Inc. | Systems and methods of global identification |
US10021099B2 (en) | 2012-03-22 | 2018-07-10 | The 41st Paramter, Inc. | Methods and systems for persistent cross-application mobile device identification |
US10089679B2 (en) | 2006-03-31 | 2018-10-02 | The 41St Parameter, Inc. | Systems and methods for detection of session tampering and fraud prevention |
US10091312B1 (en) | 2014-10-14 | 2018-10-02 | The 41St Parameter, Inc. | Data structures for intelligently resolving deterministic and probabilistic device identifiers to device profiles and/or groups |
IT201700080890A1 (en) * | 2017-08-07 | 2019-02-07 | Vj Tech S R L | VIA IVR / OTP IDENTIFICATION AND AUTHENTICATION METHOD DEDICATED TO RESERVATION AND EXECUTION OF BANKING AND FINANCIAL SERVICES WITHOUT USING PERSONAL IDENTITY DOCUMENTS |
US10325314B1 (en) | 2013-11-15 | 2019-06-18 | Consumerinfo.Com, Inc. | Payment reporting systems |
US10417637B2 (en) | 2012-08-02 | 2019-09-17 | The 41St Parameter, Inc. | Systems and methods for accessing records via derivative locators |
US20190318352A1 (en) * | 2018-04-13 | 2019-10-17 | Ford Global Technologies, Llc | Wireless Digital Payment For Vehicles |
US10453066B2 (en) | 2003-07-01 | 2019-10-22 | The 41St Parameter, Inc. | Keystroke analysis |
US10573163B1 (en) | 2019-04-25 | 2020-02-25 | Capital One Services, Llc | Real-time ATM alert if user forgets card |
US10671749B2 (en) | 2018-09-05 | 2020-06-02 | Consumerinfo.Com, Inc. | Authenticated access and aggregation database platform |
US10726151B2 (en) | 2005-12-16 | 2020-07-28 | The 41St Parameter, Inc. | Methods and apparatus for securely displaying digital images |
US10853794B2 (en) | 2019-04-25 | 2020-12-01 | Capital One Services, Llc | System and method for generation of virtual account-linked card |
US10902327B1 (en) | 2013-08-30 | 2021-01-26 | The 41St Parameter, Inc. | System and method for device identification and uniqueness |
US10999298B2 (en) | 2004-03-02 | 2021-05-04 | The 41St Parameter, Inc. | Method and system for identifying users and detecting fraud by use of the internet |
US11010468B1 (en) | 2012-03-01 | 2021-05-18 | The 41St Parameter, Inc. | Methods and systems for fraud containment |
US20210182848A1 (en) * | 2019-12-17 | 2021-06-17 | Capital One Services, Llc | Identification and authorization of transactions via smart contracts |
US11301585B2 (en) | 2005-12-16 | 2022-04-12 | The 41St Parameter, Inc. | Methods and apparatus for securely displaying digital images |
US11314838B2 (en) | 2011-11-15 | 2022-04-26 | Tapad, Inc. | System and method for analyzing user device information |
US11784997B2 (en) | 2021-01-07 | 2023-10-10 | Bank Of America Corporation | System and method for authenticating secondary users of an entity system |
Citations (15)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5729594A (en) * | 1996-06-07 | 1998-03-17 | Klingman; Edwin E. | On-line secured financial transaction system through electronic media |
US5745886A (en) * | 1995-06-07 | 1998-04-28 | Citibank, N.A. | Trusted agents for open distribution of electronic money |
US5838812A (en) * | 1994-11-28 | 1998-11-17 | Smarttouch, Llc | Tokenless biometric transaction authorization system |
US5883810A (en) * | 1997-09-24 | 1999-03-16 | Microsoft Corporation | Electronic online commerce card with transactionproxy number for online transactions |
US6029150A (en) * | 1996-10-04 | 2000-02-22 | Certco, Llc | Payment and transactions in electronic commerce system |
US6035402A (en) * | 1996-12-20 | 2000-03-07 | Gte Cybertrust Solutions Incorporated | Virtual certificate authority |
US6098053A (en) * | 1998-01-28 | 2000-08-01 | Citibank, N.A. | System and method for performing an electronic financial transaction |
US6226618B1 (en) * | 1998-08-13 | 2001-05-01 | International Business Machines Corporation | Electronic content delivery system |
US6236972B1 (en) * | 1998-12-02 | 2001-05-22 | Gary Shkedy | Method and apparatus for facilitating transactions on a commercial network system |
US6285991B1 (en) * | 1996-12-13 | 2001-09-04 | Visa International Service Association | Secure interactive electronic account statement delivery system |
US6327578B1 (en) * | 1998-12-29 | 2001-12-04 | International Business Machines Corporation | Four-party credit/debit payment protocol |
US6430559B1 (en) * | 1999-11-02 | 2002-08-06 | Claritech Corporation | Method and apparatus for profile score threshold setting and updating |
US6607136B1 (en) * | 1998-09-16 | 2003-08-19 | Beepcard Inc. | Physical presence digital authentication system |
US7356187B2 (en) * | 2004-04-12 | 2008-04-08 | Clairvoyance Corporation | Method and apparatus for adjusting the model threshold of a support vector machine for text classification and filtering |
US7356604B1 (en) * | 2000-04-18 | 2008-04-08 | Claritech Corporation | Method and apparatus for comparing scores in a vector space retrieval process |
-
2001
- 2001-08-31 WO PCT/US2001/027342 patent/WO2002019282A2/en not_active Application Discontinuation
- 2001-08-31 AU AU2001290605A patent/AU2001290605A1/en not_active Abandoned
- 2001-08-31 EP EP01970619A patent/EP1377943A2/en not_active Withdrawn
-
2003
- 2003-02-27 US US10/375,290 patent/US20050085931A1/en not_active Abandoned
Patent Citations (17)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5838812A (en) * | 1994-11-28 | 1998-11-17 | Smarttouch, Llc | Tokenless biometric transaction authorization system |
US5745886A (en) * | 1995-06-07 | 1998-04-28 | Citibank, N.A. | Trusted agents for open distribution of electronic money |
US5729594A (en) * | 1996-06-07 | 1998-03-17 | Klingman; Edwin E. | On-line secured financial transaction system through electronic media |
US6029150A (en) * | 1996-10-04 | 2000-02-22 | Certco, Llc | Payment and transactions in electronic commerce system |
US6285991B1 (en) * | 1996-12-13 | 2001-09-04 | Visa International Service Association | Secure interactive electronic account statement delivery system |
US6035402A (en) * | 1996-12-20 | 2000-03-07 | Gte Cybertrust Solutions Incorporated | Virtual certificate authority |
US5883810A (en) * | 1997-09-24 | 1999-03-16 | Microsoft Corporation | Electronic online commerce card with transactionproxy number for online transactions |
US6098053A (en) * | 1998-01-28 | 2000-08-01 | Citibank, N.A. | System and method for performing an electronic financial transaction |
US6226618B1 (en) * | 1998-08-13 | 2001-05-01 | International Business Machines Corporation | Electronic content delivery system |
US6263313B1 (en) * | 1998-08-13 | 2001-07-17 | International Business Machines Corporation | Method and apparatus to create encoded digital content |
US6607136B1 (en) * | 1998-09-16 | 2003-08-19 | Beepcard Inc. | Physical presence digital authentication system |
US6236972B1 (en) * | 1998-12-02 | 2001-05-22 | Gary Shkedy | Method and apparatus for facilitating transactions on a commercial network system |
US6260024B1 (en) * | 1998-12-02 | 2001-07-10 | Gary Shkedy | Method and apparatus for facilitating buyer-driven purchase orders on a commercial network system |
US6327578B1 (en) * | 1998-12-29 | 2001-12-04 | International Business Machines Corporation | Four-party credit/debit payment protocol |
US6430559B1 (en) * | 1999-11-02 | 2002-08-06 | Claritech Corporation | Method and apparatus for profile score threshold setting and updating |
US7356604B1 (en) * | 2000-04-18 | 2008-04-08 | Claritech Corporation | Method and apparatus for comparing scores in a vector space retrieval process |
US7356187B2 (en) * | 2004-04-12 | 2008-04-08 | Clairvoyance Corporation | Method and apparatus for adjusting the model threshold of a support vector machine for text classification and filtering |
Cited By (102)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US9563884B2 (en) * | 1996-05-10 | 2017-02-07 | Transaction Holdings Ltd. Llc | Automated transaction machine |
US20140207596A1 (en) * | 1996-05-10 | 2014-07-24 | Transaction Holdings Ltd. Llc | Automated transaction machine |
US20140108245A1 (en) * | 1996-11-27 | 2014-04-17 | Diebold Self-Service Systems, Division Of Diebold, Incorporated | Automated banking machine that operates responsive to data bearing records |
US9679278B2 (en) * | 1996-11-27 | 2017-06-13 | Diebold Self-Service Systems | Automated banking machine that operates responsive to data bearing records |
US20110125644A1 (en) * | 2001-01-26 | 2011-05-26 | Acxsys Corporation | Online payment transfer and identity management system and method |
US9159058B2 (en) * | 2001-01-26 | 2015-10-13 | Acxsys Corporation | Online payment transfer and identity management system and method |
US20030164851A1 (en) * | 2001-06-27 | 2003-09-04 | Smith James E. | Method and system for securing credit transactions |
US8364953B2 (en) * | 2001-08-07 | 2013-01-29 | United States Postal Service | System and method for providing secured electronic transactions |
US20090119512A1 (en) * | 2001-08-07 | 2009-05-07 | Bullard Jr James C | System and method for providing secured electronic transactions |
US10453066B2 (en) | 2003-07-01 | 2019-10-22 | The 41St Parameter, Inc. | Keystroke analysis |
US11238456B2 (en) | 2003-07-01 | 2022-02-01 | The 41St Parameter, Inc. | Keystroke analysis |
US20050149439A1 (en) * | 2004-01-07 | 2005-07-07 | Daniel Suisa | Transaction Method and System Using an Issued Transaction Number for Verification of a Transaction |
US11683326B2 (en) | 2004-03-02 | 2023-06-20 | The 41St Parameter, Inc. | Method and system for identifying users and detecting fraud by use of the internet |
US10999298B2 (en) | 2004-03-02 | 2021-05-04 | The 41St Parameter, Inc. | Method and system for identifying users and detecting fraud by use of the internet |
US20060168116A1 (en) * | 2004-06-25 | 2006-07-27 | The Go Daddy Group, Inc. | Methods of issuing a domain name certificate |
US8285816B2 (en) * | 2004-06-25 | 2012-10-09 | Go Daddy Operating Company, LLC | Methods of issuing a certificate for a domain name |
US20060168161A1 (en) * | 2004-06-25 | 2006-07-27 | The Go Daddy Group, Inc. | Methods of issuing a certificate for a domain name |
US8171085B1 (en) * | 2005-01-19 | 2012-05-01 | Apple Inc. | Methods and apparatuses for authenticating electronic messages |
US20120221470A1 (en) * | 2005-03-17 | 2012-08-30 | Dennis Bower Lyon | User authentication and secure transaction system |
US8041646B2 (en) | 2005-06-15 | 2011-10-18 | E. E. System Corporation | Method and system for real time online debit transactions |
US20060287965A1 (en) * | 2005-06-15 | 2006-12-21 | E.E. System Corporation | Method and system for real time online debit transactions |
US20070093298A1 (en) * | 2005-10-24 | 2007-04-26 | Brunet Robert A H | Method of Facilitating Online Group Play of a Lottery Game |
US11301585B2 (en) | 2005-12-16 | 2022-04-12 | The 41St Parameter, Inc. | Methods and apparatus for securely displaying digital images |
US12079368B2 (en) | 2005-12-16 | 2024-09-03 | The 41St Parameter, Inc. | Methods and apparatus for securely displaying digital images |
US10726151B2 (en) | 2005-12-16 | 2020-07-28 | The 41St Parameter, Inc. | Methods and apparatus for securely displaying digital images |
US11195225B2 (en) | 2006-03-31 | 2021-12-07 | The 41St Parameter, Inc. | Systems and methods for detection of session tampering and fraud prevention |
US12093992B2 (en) | 2006-03-31 | 2024-09-17 | The 41St Parameter, Inc. | Systems and methods for detection of session tampering and fraud prevention |
US10535093B2 (en) | 2006-03-31 | 2020-01-14 | The 41St Parameter, Inc. | Systems and methods for detection of session tampering and fraud prevention |
US11727471B2 (en) | 2006-03-31 | 2023-08-15 | The 41St Parameter, Inc. | Systems and methods for detection of session tampering and fraud prevention |
US10089679B2 (en) | 2006-03-31 | 2018-10-02 | The 41St Parameter, Inc. | Systems and methods for detection of session tampering and fraud prevention |
US20080077798A1 (en) * | 2006-09-26 | 2008-03-27 | Nachtigall Ernest H | System and method for secure verification of electronic transactions |
US8621230B2 (en) * | 2006-09-26 | 2013-12-31 | International Business Machines Corporation | System and method for secure verification of electronic transactions |
WO2008070951A1 (en) * | 2006-12-13 | 2008-06-19 | E.E. System Corporation | Method and system for real time online debit transactions |
US8346668B2 (en) * | 2007-04-06 | 2013-01-01 | Nec Corporation | Electronic money system and electronic money transaction method |
US20100217710A1 (en) * | 2007-04-06 | 2010-08-26 | Nec Corporation | Electronic money system and electronic money transaction method |
US20100131760A1 (en) * | 2007-04-11 | 2010-05-27 | Nec Corporaton | Content using system and content using method |
US20090021349A1 (en) * | 2007-07-19 | 2009-01-22 | Stephen Errico | Method to record and authenticate a participant's biometric identification of an event via a network |
US7882026B1 (en) | 2007-07-25 | 2011-02-01 | United Services Automobile Association (Usaa) | Systems and methods for a flat interchange fee for high value credit card purchases |
US20090198617A1 (en) * | 2007-07-27 | 2009-08-06 | Ntt Docomo, Inc. | Method and apparatus for performing delegated transactions |
US8694793B2 (en) | 2007-12-11 | 2014-04-08 | Visa U.S.A. Inc. | Biometric access control transactions |
US8332321B2 (en) | 2008-02-02 | 2012-12-11 | Peregrin Technologies, Inc. | Remote currency dispensation systems and methods |
US20090287562A1 (en) * | 2008-02-02 | 2009-11-19 | Peregrin Technologies, Inc. | Anonymous merchant-customer loyalty rewards program |
US20100312701A1 (en) * | 2008-02-02 | 2010-12-09 | Peregrin Technologies, Inc. | Remote currency dispensation systems and methods |
US8762274B2 (en) | 2008-02-02 | 2014-06-24 | Peregrin Technologies, Inc. | Remote currency dispensation systems and methods |
WO2009097464A3 (en) * | 2008-02-02 | 2009-10-22 | Peregrin Technologies, Inc. | Remote currency dispensation systems and methods |
WO2009097464A2 (en) * | 2008-02-02 | 2009-08-06 | Peregrin Technologies, Inc. | Remote currency dispensation systems and methods |
US8700486B2 (en) | 2008-02-19 | 2014-04-15 | Go Daddy Operating Company, LLC | Rating e-commerce transactions |
US11750584B2 (en) | 2009-03-25 | 2023-09-05 | The 41St Parameter, Inc. | Systems and methods of sharing information through a tag-based consortium |
US9948629B2 (en) | 2009-03-25 | 2018-04-17 | The 41St Parameter, Inc. | Systems and methods of sharing information through a tag-based consortium |
US12132719B2 (en) | 2009-03-25 | 2024-10-29 | The 41St Parameter, Inc. | Systems and methods of sharing information through a tag-based consortium |
US10616201B2 (en) | 2009-03-25 | 2020-04-07 | The 41St Parameter, Inc. | Systems and methods of sharing information through a tag-based consortium |
US20110087591A1 (en) * | 2009-10-08 | 2011-04-14 | Tim Barnett | Personalization Data Creation or Modification Systems and Methods |
US20110087495A1 (en) * | 2009-10-14 | 2011-04-14 | Bank Of America Corporation | Suspicious entity investigation and related monitoring in a business enterprise environment |
US8621205B2 (en) * | 2010-02-12 | 2013-12-31 | Microsoft Corporation | Certificate remoting and recovery |
US20110202759A1 (en) * | 2010-02-12 | 2011-08-18 | Microsoft Corporation | Certificate remoting and recovery |
US11314838B2 (en) | 2011-11-15 | 2022-04-26 | Tapad, Inc. | System and method for analyzing user device information |
US9374244B1 (en) * | 2012-02-27 | 2016-06-21 | Amazon Technologies, Inc. | Remote browsing session management |
US12153666B1 (en) | 2012-03-01 | 2024-11-26 | The 41St Parameter, Inc. | Methods and systems for fraud containment |
US11010468B1 (en) | 2012-03-01 | 2021-05-18 | The 41St Parameter, Inc. | Methods and systems for fraud containment |
US11886575B1 (en) | 2012-03-01 | 2024-01-30 | The 41St Parameter, Inc. | Methods and systems for fraud containment |
US10021099B2 (en) | 2012-03-22 | 2018-07-10 | The 41st Paramter, Inc. | Methods and systems for persistent cross-application mobile device identification |
US11683306B2 (en) | 2012-03-22 | 2023-06-20 | The 41St Parameter, Inc. | Methods and systems for persistent cross-application mobile device identification |
US10341344B2 (en) | 2012-03-22 | 2019-07-02 | The 41St Parameter, Inc. | Methods and systems for persistent cross-application mobile device identification |
US10862889B2 (en) | 2012-03-22 | 2020-12-08 | The 41St Parameter, Inc. | Methods and systems for persistent cross application mobile device identification |
US12058131B2 (en) | 2012-03-22 | 2024-08-06 | The 41St Parameter, Inc. | Methods and systems for persistent cross-application mobile device identification |
US11301860B2 (en) | 2012-08-02 | 2022-04-12 | The 41St Parameter, Inc. | Systems and methods for accessing records via derivative locators |
US12002053B2 (en) | 2012-08-02 | 2024-06-04 | The 41St Parameter, Inc. | Systems and methods for accessing records via derivative locators |
US10417637B2 (en) | 2012-08-02 | 2019-09-17 | The 41St Parameter, Inc. | Systems and methods for accessing records via derivative locators |
US9990631B2 (en) | 2012-11-14 | 2018-06-05 | The 41St Parameter, Inc. | Systems and methods of global identification |
US10853813B2 (en) | 2012-11-14 | 2020-12-01 | The 41St Parameter, Inc. | Systems and methods of global identification |
US10395252B2 (en) | 2012-11-14 | 2019-08-27 | The 41St Parameter, Inc. | Systems and methods of global identification |
US11922423B2 (en) | 2012-11-14 | 2024-03-05 | The 41St Parameter, Inc. | Systems and methods of global identification |
US11410179B2 (en) | 2012-11-14 | 2022-08-09 | The 41St Parameter, Inc. | Systems and methods of global identification |
US9521138B2 (en) | 2013-06-14 | 2016-12-13 | Go Daddy Operating Company, LLC | System for domain control validation |
US9178888B2 (en) | 2013-06-14 | 2015-11-03 | Go Daddy Operating Company, LLC | Method for domain control validation |
US9443268B1 (en) | 2013-08-16 | 2016-09-13 | Consumerinfo.Com, Inc. | Bill payment and reporting |
US10902327B1 (en) | 2013-08-30 | 2021-01-26 | The 41St Parameter, Inc. | System and method for device identification and uniqueness |
US11657299B1 (en) | 2013-08-30 | 2023-05-23 | The 41St Parameter, Inc. | System and method for device identification and uniqueness |
US12045736B1 (en) | 2013-08-30 | 2024-07-23 | The 41St Parameter, Inc. | System and method for device identification and uniqueness |
US10269065B1 (en) | 2013-11-15 | 2019-04-23 | Consumerinfo.Com, Inc. | Bill payment and reporting |
US10325314B1 (en) | 2013-11-15 | 2019-06-18 | Consumerinfo.Com, Inc. | Payment reporting systems |
US10091312B1 (en) | 2014-10-14 | 2018-10-02 | The 41St Parameter, Inc. | Data structures for intelligently resolving deterministic and probabilistic device identifiers to device profiles and/or groups |
US11895204B1 (en) | 2014-10-14 | 2024-02-06 | The 41St Parameter, Inc. | Data structures for intelligently resolving deterministic and probabilistic device identifiers to device profiles and/or groups |
US11240326B1 (en) | 2014-10-14 | 2022-02-01 | The 41St Parameter, Inc. | Data structures for intelligently resolving deterministic and probabilistic device identifiers to device profiles and/or groups |
US10728350B1 (en) | 2014-10-14 | 2020-07-28 | The 41St Parameter, Inc. | Data structures for intelligently resolving deterministic and probabilistic device identifiers to device profiles and/or groups |
TWI608722B (en) * | 2016-06-23 | 2017-12-11 | Public key certificate method | |
IT201700080890A1 (en) * | 2017-08-07 | 2019-02-07 | Vj Tech S R L | VIA IVR / OTP IDENTIFICATION AND AUTHENTICATION METHOD DEDICATED TO RESERVATION AND EXECUTION OF BANKING AND FINANCIAL SERVICES WITHOUT USING PERSONAL IDENTITY DOCUMENTS |
US20190318352A1 (en) * | 2018-04-13 | 2019-10-17 | Ford Global Technologies, Llc | Wireless Digital Payment For Vehicles |
US12074876B2 (en) | 2018-09-05 | 2024-08-27 | Consumerinfo.Com, Inc. | Authenticated access and aggregation database platform |
US11399029B2 (en) | 2018-09-05 | 2022-07-26 | Consumerinfo.Com, Inc. | Database platform for realtime updating of user data from third party sources |
US10880313B2 (en) | 2018-09-05 | 2020-12-29 | Consumerinfo.Com, Inc. | Database platform for realtime updating of user data from third party sources |
US11265324B2 (en) | 2018-09-05 | 2022-03-01 | Consumerinfo.Com, Inc. | User permissions for access to secure data at third-party |
US10671749B2 (en) | 2018-09-05 | 2020-06-02 | Consumerinfo.Com, Inc. | Authenticated access and aggregation database platform |
US10573163B1 (en) | 2019-04-25 | 2020-02-25 | Capital One Services, Llc | Real-time ATM alert if user forgets card |
US11887463B2 (en) | 2019-04-25 | 2024-01-30 | Capital One Services, Llc | Systems and methods for card-handling by point of sale devices |
US11687915B2 (en) | 2019-04-25 | 2023-06-27 | Capital One Services, Llc | System and method for generation of virtual account-linked card |
US11538326B2 (en) | 2019-04-25 | 2022-12-27 | Capital One Services, Llc | Systems and methods for card-handling by point of sale devices |
US10853794B2 (en) | 2019-04-25 | 2020-12-01 | Capital One Services, Llc | System and method for generation of virtual account-linked card |
US12159276B2 (en) | 2019-04-25 | 2024-12-03 | Capital One Services, Llc | System and method for generation of virtual account-linked card |
US12236771B2 (en) | 2019-04-25 | 2025-02-25 | Capital One Services, Llc | Systems and methods for card-handling by point of sale devices |
US20210182848A1 (en) * | 2019-12-17 | 2021-06-17 | Capital One Services, Llc | Identification and authorization of transactions via smart contracts |
US11784997B2 (en) | 2021-01-07 | 2023-10-10 | Bank Of America Corporation | System and method for authenticating secondary users of an entity system |
Also Published As
Publication number | Publication date |
---|---|
EP1377943A2 (en) | 2004-01-07 |
WO2002019282A2 (en) | 2002-03-07 |
AU2001290605A1 (en) | 2002-03-13 |
WO2002019282A3 (en) | 2003-10-30 |
WO2002019282A9 (en) | 2003-12-18 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US20050085931A1 (en) | Online ATM transaction with digital certificate | |
US7269256B2 (en) | Electronic-monetary system | |
US10332114B2 (en) | Methods, systems and apparatuses for secure transactions | |
US7475045B2 (en) | Transaction system and transaction terminal equipment | |
JP4472188B2 (en) | Tokenless biometric electronic lending transaction | |
KR101137137B1 (en) | Mobile account authentication service | |
US5883810A (en) | Electronic online commerce card with transactionproxy number for online transactions | |
AU2001257280B2 (en) | Online payer authentication service | |
US20070198410A1 (en) | Credit fraud prevention systems and methods | |
US20020032663A1 (en) | Apparatus and method for performing secure network transactions | |
US20080183629A1 (en) | Method And System For Secure Authenticated Payment On A Computer Network | |
US20020184500A1 (en) | System and method for secure entry and authentication of consumer-centric information | |
WO2002048846A2 (en) | An authentication system | |
KR20030019560A (en) | System and method for verifying a financial instrument | |
AU2001257280A1 (en) | Online payer authentication service | |
EP1277180A2 (en) | Online payer authentication service | |
JPH07271884A (en) | Terminal certification method | |
US20030037001A1 (en) | E- commerce account holder security participation | |
EP1521220A1 (en) | Transaction system and transaction terminal apparatus | |
JP2002288427A (en) | Transaction executing method | |
KR20000030170A (en) | Money exchange method for electronic settlement using tele-communication network and hybrid card | |
Klur | What an organization should know about using electronic cash | |
Pilioura | Electronic payment systems on open computer networks: a survey | |
JP2002304589A (en) | Settlement system | |
AU679359B2 (en) | Electronic-monetary system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AS | Assignment |
Owner name: ATMDIRECT, TEXAS Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:WILLEBY, TANDY;REEL/FRAME:014497/0678 Effective date: 20030902 |
|
AS | Assignment |
Owner name: THE BANK OF NEW YORK, AS COLLATERAL AGENT, TEXAS Free format text: GRANT OF PATENT SECURITY INTEREST (UNDER THE AMENDED AND RESTATED PATENT SECURITY AGREEMENT);ASSIGNOR:SOLIDUS NETWORKS, INC.;REEL/FRAME:017176/0389 Effective date: 20060216 Owner name: SOLIDUS NETWORKS, INC. D/B/A PAY BY TOUCH SOLUTION Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:ZIEGLER, ROBERT;REEL/FRAME:017300/0410 Effective date: 20051212 |
|
AS | Assignment |
Owner name: SOLIDUS NETWORKS, INC. D/B/A PAY BY TOUCH SOLUTION Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:ATM ONLINE, INC.;REEL/FRAME:018191/0488 Effective date: 20060125 |
|
AS | Assignment |
Owner name: THE BANK OF NEW YORK, AS AGENT, AS SECURED PARTY, Free format text: GRANT OF PATENT SECURITY INTEREST;ASSIGNOR:SOLIDUS NETWORKS, INC.;REEL/FRAME:020270/0594 Effective date: 20071219 |
|
AS | Assignment |
Owner name: ACCULLINK, LLC, GEORGIA Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:SOLIDUS NETWORKS, INC.;REEL/FRAME:020845/0814 Effective date: 20080229 |
|
STCB | Information on status: application discontinuation |
Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION |
|
AS | Assignment |
Owner name: SILICON VALLEY BANK,CALIFORNIA Free format text: SECURITY AGREEMENT;ASSIGNOR:ACCULLINK, INC.;REEL/FRAME:024337/0001 Effective date: 20100423 Owner name: SILICON VALLEY BANK, CALIFORNIA Free format text: SECURITY AGREEMENT;ASSIGNOR:ACCULLINK, INC.;REEL/FRAME:024337/0001 Effective date: 20100423 |
|
AS | Assignment |
Owner name: ACCULLINK INC, GEORGIA Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:SILICON VALLEY BANK;REEL/FRAME:025178/0620 Effective date: 20101020 |
|
AS | Assignment |
Owner name: SILICON VALLEY BANK, CALIFORNIA Free format text: SECURITY INTEREST;ASSIGNOR:ACCULLINK, INC.;REEL/FRAME:032396/0314 Effective date: 20140307 |
|
AS | Assignment |
Owner name: SILICON VALLEY BANK, CALIFORNIA Free format text: SECURITY INTEREST;ASSIGNOR:ACCULLINK, INC.;REEL/FRAME:032404/0605 Effective date: 20140307 |
|
AS | Assignment |
Owner name: ACCULLINK, INC., GEORGIA Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:SILICON VALLEY BANK;REEL/FRAME:041186/0029 Effective date: 20151215 Owner name: ACCULLINK, INC., GEORGIA Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:THE BANK OF NEW YORK, AS AGENT, AS SECURED PARTY;REEL/FRAME:041639/0814 Effective date: 20080226 |