US20130246202A1 - Systems, Methods, and Computer Program Products for Using Proxy Accounts - Google Patents
Systems, Methods, and Computer Program Products for Using Proxy Accounts Download PDFInfo
- Publication number
- US20130246202A1 US20130246202A1 US13/482,425 US201213482425A US2013246202A1 US 20130246202 A1 US20130246202 A1 US 20130246202A1 US 201213482425 A US201213482425 A US 201213482425A US 2013246202 A1 US2013246202 A1 US 2013246202A1
- Authority
- US
- United States
- Prior art keywords
- account
- payment
- proxy
- credentials
- payment account
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
- 238000000034 method Methods 0.000 title claims description 44
- 238000004590 computer program Methods 0.000 title claims description 11
- 230000005055 memory storage Effects 0.000 claims abstract description 8
- 238000012011 method of payment Methods 0.000 claims abstract description 8
- 230000004044 response Effects 0.000 claims description 9
- 230000009471 action Effects 0.000 description 14
- 230000000670 limiting effect Effects 0.000 description 9
- 238000004891 communication Methods 0.000 description 8
- 230000001413 cellular effect Effects 0.000 description 5
- 230000001010 compromised effect Effects 0.000 description 5
- 238000010586 diagram Methods 0.000 description 5
- 238000005516 engineering process Methods 0.000 description 5
- 238000007726 management method Methods 0.000 description 4
- 230000003287 optical effect Effects 0.000 description 4
- 230000008569 process Effects 0.000 description 4
- 241000238634 Libellulidae Species 0.000 description 3
- 238000012545 processing Methods 0.000 description 3
- 238000012546 transfer Methods 0.000 description 3
- 238000012795 verification Methods 0.000 description 3
- 239000002131 composite material Substances 0.000 description 2
- 238000013461 design Methods 0.000 description 2
- 238000001514 detection method Methods 0.000 description 2
- 238000000926 separation method Methods 0.000 description 2
- 230000003068 static effect Effects 0.000 description 2
- 238000013459 approach Methods 0.000 description 1
- 239000011449 brick Substances 0.000 description 1
- 230000008859 change Effects 0.000 description 1
- 238000007796 conventional method Methods 0.000 description 1
- 230000001186 cumulative effect Effects 0.000 description 1
- 230000009849 deactivation Effects 0.000 description 1
- 230000003247 decreasing effect Effects 0.000 description 1
- 238000000151 deposition Methods 0.000 description 1
- 230000000694 effects Effects 0.000 description 1
- 230000002452 interceptive effect Effects 0.000 description 1
- 238000011835 investigation Methods 0.000 description 1
- 239000004973 liquid crystal related substance Substances 0.000 description 1
- 230000007246 mechanism Effects 0.000 description 1
- 238000010295 mobile communication Methods 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 239000004570 mortar (masonry) Substances 0.000 description 1
- 230000008447 perception Effects 0.000 description 1
- 238000012552 review Methods 0.000 description 1
- 230000000007 visual effect Effects 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/385—Payment protocols; Details thereof using an alias or single-use codes
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/08—Payment architectures
- G06Q20/20—Point-of-sale [POS] network systems
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/08—Payment architectures
- G06Q20/20—Point-of-sale [POS] network systems
- G06Q20/202—Interconnection or interaction of plural electronic cash registers [ECR] or to host computer, e.g. network details, transfer of information from host to ECR or from ECR to ECR
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/22—Payment schemes or models
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/22—Payment schemes or models
- G06Q20/227—Payment schemes or models characterised in that multiple accounts are available, e.g. to the payer
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/30—Payment architectures, schemes or protocols characterised by the use of specific devices or networks
- G06Q20/32—Payment architectures, schemes or protocols characterised by the use of specific devices or networks using wireless devices
- G06Q20/322—Aspects of commerce using mobile devices [M-devices]
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/30—Payment architectures, schemes or protocols characterised by the use of specific devices or networks
- G06Q20/32—Payment architectures, schemes or protocols characterised by the use of specific devices or networks using wireless devices
- G06Q20/326—Payment applications installed on the mobile devices
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/30—Payment architectures, schemes or protocols characterised by the use of specific devices or networks
- G06Q20/32—Payment architectures, schemes or protocols characterised by the use of specific devices or networks using wireless devices
- G06Q20/327—Short range or proximity payments by means of M-devices
- G06Q20/3278—RFID or NFC payments by means of M-devices
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/382—Payment protocols; Details thereof insuring higher security of transaction
- G06Q20/3821—Electronic credentials
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/40—Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
- G06Q20/401—Transaction verification
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/40—Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
- G06Q20/405—Establishing or using transaction specific rules
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/30—Payment architectures, schemes or protocols characterised by the use of specific devices or networks
- G06Q20/36—Payment architectures, schemes or protocols characterised by the use of specific devices or networks using electronic wallets or electronic money safes
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/30—Payment architectures, schemes or protocols characterised by the use of specific devices or networks
- G06Q20/36—Payment architectures, schemes or protocols characterised by the use of specific devices or networks using electronic wallets or electronic money safes
- G06Q20/367—Payment architectures, schemes or protocols characterised by the use of specific devices or networks using electronic wallets or electronic money safes involving electronic purses or money safes
Definitions
- the present disclosure generally relates to electronic transactions, and more particularly, to techniques for using proxy accounts associated with a primary account.
- One of the broader forms of the present disclosure involves an electronic device including an input/output interface operable to receive an input from a user and communicate an output to the user, a transceiver operable to electronically communicate with a computer network, a computer processor operable to execute instructions, and a memory storage operable to store the instructions, the memory storage further comprising a program module that is operable to: receive credentials for a proxy payment account, where the proxy payment account is linked to a primary payment account and not linked directly to a method of payment underlying the primary payment account, and make payment at a Point of Sale (POS) using the received credentials.
- POS Point of Sale
- Another one of the broader forms of the present disclosure involves a method including at a mobile device, receiving credentials for a proxy payment account associated with a primary payment account, wherein the primary payment account is linked to a method of payment, further wherein the proxy payment account is linked to the primary account but is not linked directly to the method of payment, wherein payments to and from the proxy payment account are cleared through the primary account, and making payment for a transaction by passing the received credentials to a POS.
- Another one of the broader forms of the present disclosure involves a computer program product having a computer readable medium tangibly recording computer program logic for managing electronic payment, the computer program product including: code to generate an electronic user interface on a mobile computing device for managing electronic payment, code to receive input from a user, via the user interface, indicating a request to use a proxy payment account for payment at a POS, code to receive credentials for the proxy payment account at the mobile computing device, the proxy payment account being linked to a primary payment account and to a payment method through the primary payment account, the proxy payment account not being directly linked to the payment method, and code to pass the received credentials to the POS from the mobile computing device.
- FIG. 1 illustrates an example relationship between a primary payment account and a multitude of proxy payment accounts.
- FIGS. 2-7 illustrate an example user interface of an example application program according to various aspects of the present disclosure.
- FIGS. 8 and 9 illustrates a flowchart containing example process flows according to various aspects of the present disclosure.
- FIG. 10 illustrates an example system for making a payment at a POS.
- FIG. 11 illustrates an example mobile application for making payment at a POS.
- FIGS. 12 and 13 illustrate example methods to make payment at a POS and manage proxy accounts at a mobile device.
- FIG. 14 illustrates a block diagram of a computer system for implementing various methods and devices described according to various aspects of the present disclosure.
- FIG. 15 illustrates a block diagram of a computer system for implementing various methods and devices described according to various aspects of the present disclosure.
- an owner e.g., a consumer or business
- Each proxy account is linked to the primary account, and withdrawals/deposit are from/to the proxy account via the primary account.
- proxy accounts One purpose of the proxy accounts is to provide more security about who can withdraw from the account.
- rules are created for each of the proxy accounts specifying payments to/from a single counterparty.
- counterparties are payees and payors with respect to the account owner.
- a purpose of the proxy accounts is to provide greater control of inbound and outbound money. Proxy accounts can be created and destroyed easily by the owner. If primary account information is stolen for a proxy account, when the owner is notified, the owner can quickly cancel and replace the proxy account with a new proxy account. The primary account containing the monies is uncompromised. And in a scenario wherein transactions with the proxy account are limited by rules specifying a maximum transaction size, the primary account may be unharmed, or at worst, harmed within limits set up for the proxy account.
- each proxy account can be associated with one or more counterparties, where each counterparty is not exposed to the credentials of the primary account or to other proxy accounts not associated with that counterparty.
- proxy accounts can not only be used to prevent or limit damage from theft, but proxy accounts can also be used to assist investigations in focusing on a particular instance of compromise.
- tracking payments to/from the counterparty may be simplified, since the payments would be associated with a specific account for that counterparty.
- an account owner may establish any arbitrary rule or set of rules for a given proxy account.
- rules include, e.g., limitations regarding how much a proxy account can distribute in a certain time period, which counterparties are associated with the proxy account, a maximum lifetime for the proxy account, a one-time use lifespan, and the like.
- the concept disclosed above encompasses a variety of other uses. For instance, a parent may create a proxy account for a child.
- the concept can also be extended to credit cards and electronic wallets to provide a security buffer from a primary account and can be extended further to allow proxy account balances.
- FIG. 1 is an illustration of a primary account and multiple proxy accounts, adapted according to one embodiment.
- Primary account 101 is linked to the monies 103 and is used to complete all debits and credits in the arrangement of FIG. 1 .
- monies 103 represents the payment facilities of the issuing bank.
- primary account 101 is an electronic wallet from a payment service, such as PayPalTM
- monies 103 represent the underlying bank account, credit account, or other facility used to clear the payments to/from primary account 101 .
- the scope of embodiments is not limited to credit cards and electronic wallets as primary accounts. Rather, the scope of embodiments may include any appropriate account, such as those accessed by debit cards or the like.
- proxy accounts 102 a - f are linked to the primary account 101 , using primary account 101 as a payment method for deposits and withdrawals.
- primary account 101 as a payment method for deposits and withdrawals.
- Proxy accounts 102 are not linked directly to monies 103 . Instead, proxy accounts 102 are linked to primary account 101 .
- primary account 101 is an electronic wallet that provides access to a bank account (as monies 103 )
- payment is made to/from proxy account 102 using primary account 101
- the counterparty may be unaware of the existence of the bank account.
- the counterparty may be unaware of the existence of primary account 101 in an example wherein the credentials of primary account 101 are kept from the counterparty.
- primary account 101 is a credit card
- the counterparty is unaware of the primary account's credit card number or of the payment facility of the underlying issuing bank.
- the proxy account credentials are not valid credentials to access the payment facilities of the issuing bank, as the payments are made through primary account 101 .
- the arrangement of FIG. 1 provides at least one degree of separation between proxy accounts 102 and primary account 101 , and proxy accounts 102 do not have credentials to directly access monies 103 .
- the arrangement of FIG. 1 isolates primary account 101 and monies 103 from counterparties, thereby providing an enhanced level of security to the owner of the accounts 101 , 102 .
- an owner creates and manages accounts 101 , 102 using a computer to login to a network-based facility. Once the owner is confirmed by the security measures of the payment service, the owner is presented with an interface (e.g., a web-based Graphical User Interface (GUI) or other type of interface) to create and manage accounts.
- GUI Graphical User Interface
- FIG. 2 illustrates an example user interface 200 for an electronic device adapted according to one embodiment.
- the electronic device may include a smart phone or other hand-held device.
- the electronic device may be another suitable electronic device such as a computer tablet or laptop/desktop personal computer.
- the owner may access interface 200 through a web browser, a specialized application, or other appropriate technique.
- a user may download application software programs, also known as “apps” or “applications” to the portable electronic device.
- applications are computer software programs designed to execute specific tasks.
- Apple's® App Store, Microsoft's Windows® Store, and Google's® Android Market offer a multitude of applications, including entertainment programs, business applications, file management tools, and other widgets, etc.
- Interface 200 is an example of an interface seen by the owner when the owner creates one or more proxy accounts that link to a primary account (as in FIG. 1 ).
- Interface 200 may be embodied in any appropriate manner, such as on a touch screen interface or another GUI that uses a mouse or other pointing device.
- the various buttons, fields, and some of the text is created using hypertext or other interactive code to allow the user to perform actions with the items on the screen.
- FIG. 2 starts off after the owner has already created a primary account, and it is understood that an interface similar to interface 200 could be used to create a primary account as well.
- the illustration of FIG. 2 begins at an Account Services page that references the primary account, which for purposes of this example is given number XXX-XXXX.
- the owner is presented with three options, each associated with one of buttons 202 , 204 , 206 .
- buttons 202 , 204 , 206 By selecting button 202 , the owner can manage the primary account, such as by changing a billing address, password, or the like.
- Button 206 allows the owner to return to a main menu (not shown).
- Button 204 triggers the payment service to generate a proxy account that is linked to primary account XXX-XXX.
- the owner can select credentials for the proxy account (e.g., by generating an account number or login), but in this example, the service generates the credentials.
- FIG. 3 is an illustration of an example screen in interface 200 showing that the service has created proxy account YYY-YYYY.
- the owner can return to Account Services by selecting button 302 .
- the owner can also create rules for the proxy account by selecting button 304 .
- the owner Upon selecting button 304 , the owner is taken to the screen shown in FIG. 4 .
- the screen of FIG. 4 provides a utility for the owner to create rules to apply to the proxy account.
- the user can select the text in either options 402 , 404 , 406 to create a specific rule to apply to the proxy account.
- the option shown in text 402 provides for a time-based rule, such as a maximum lifetime for the proxy account.
- the option shown in text 404 provides for a transaction amount rule (e.g., a maximum amount to transactions to/from the proxy account).
- the option shown in text 406 provides for a counterparty identity rule (e.g., allowing transactions with one or more pre-selected counterparties).
- FIG. 4 is illustrative only.
- the scope of embodiments can include any arbitrary rule for use of a proxy account. Examples of other rules include limiting the proxy account to a single transaction, limiting the proxy account to make payments only during certain pre-defined times, limiting the proxy account to only deposits or only withdrawals, limiting the proxy account for use only with counterparties in certain geographic regions, and the like.
- the service takes the owner to the screen shown in FIG. 5 .
- the owner can select from pre-defined account lifetimes of one month 502 , six months 504 , and one year 506 .
- the user can select a specific date from calendar tool 508 on which to deactivate or cancel the proxy account.
- the owner may select button 510 to enter the selection.
- other events may be selected that, upon the occurrence of such event, the proxy account is deactivated or canceled.
- One example is detection of fraud or attempted use outside of the established rule set.
- Another example includes a pre-defined elapsed time with no activity.
- Such rules may be default rules or may be selected, and other appropriate events may trigger deactivation or cancelation as well.
- the service takes the owner to the screen of FIG. 6 to define transaction amounts for the proxy account.
- the owner may use field 602 or button 604 to enter, if desired, a transaction amount limit for deposits.
- the owner may use field 606 and button 608 to enter, if desired, a transaction amount for withdrawals.
- the user may select the done button 610 to enter the selection.
- the screen of FIG. 6 is shown as providing an opportunity to enter a per-transaction amount for the proxy account.
- other embodiments may also define a total lifetime amount for transactions using the proxy account. Any appropriate rule to limit an amount of money, whether per-transaction, cumulative over a span of time, or otherwise are within the scope of embodiments.
- the owner may choose option 406 to set up a rule identifying a counterparty.
- the service takes the owner to the screen shown in FIG. 7 .
- There are various ways to identify a counterparty with two of those ways being by identifying an account number associated with the counter party and a name of the counterparty.
- the owner may use fields 702 , 704 to enter an identification of a counterparty and select button 706 to enter the information.
- any appropriate technique for identifying a counterparty is within the scope of embodiments.
- the proxy account is limited to use with that counterparty only until specified otherwise by the account owner.
- an account is, by default, limited for use with the first payee or payor counterparty to a transaction employing the proxy payment account.
- the owner may simply create the proxy payment account and then use the proxy payment account to either send or receive payment to/from a given counterparty, thereby automatically associating the proxy payment account with the identity of the counterparty. Should the owner desire to use the same proxy payment account with a different counterparty the owner may go back to the payment service and use an interface, such as interface 200 , to amend the rule to allow additional counterparties.
- FIGS. 2-7 are shown as an illustrative example, other embodiments may provide screens to create more than one proxy account, to attach more than one rule to a given proxy account, and to attach a given rule to more than one proxy account.
- the scope of the disclosure provides for attaching any appropriate rule, or set of rules, to any number of proxy accounts to suit an account owner's purpose.
- FIG. 8 illustrates method 800 , adapted according to one embodiment, for a user to manage payment according to the principles discussed above in FIGS. 1-7 .
- the user employs one or more computers and the interface 200 ( FIGS. 2-7 ) when acting according to method 800 .
- the owner creates a primary payment account.
- An example primary account is described above at FIG. 1 .
- the owner creates a proxy payment account that is linked to the primary payment account.
- Example proxy payment accounts are described above at FIG. 1 .
- the owner may create the primary payment account and the proxy payment account in the same web session or application session or a different session.
- the scope of embodiments also includes a scenario wherein the owner creates a proxy payment account to link to a primary payment account that has been preexisting for a significant amount of time.
- the owner applies a rule or rule set to the proxy payment account.
- a rule or rule set is given above at FIGS. 2-7 .
- the owner sends and/or receives payments with the proxy payment account.
- the proxy payment account has different credentials than the primary payment account and is not directly linked to the monies, thereby keeping the primary account and the true method of payment secret from the counterparties interfacing with the proxy payment account.
- the actions of block 840 are carried out consistently with the rule or rule set applied to the proxy payment account.
- payment is electronic and accomplished by computers, and thus, the rules are applied automatically by the payment service as the transaction is carried out (or is attempted to be carried out).
- the owner cancels the proxy payment account.
- the owner is notified of possible fraud and cancels the proxy payment account in response thereto.
- the owner has set a rule in block 830 to automatically cancel the account after a specified event or time, and the payment service applies the rule automatically absent further instruction by the owner.
- embodiments are not limited to the particular flow shown in FIG. 8 . Rather, other embodiments may add, omit, rearrange, or modify one or more actions in accordance with a given design. For instance, the owner may create more than one proxy account and apply any appropriate rules to some or all of the different proxy accounts.
- FIG. 9 is an illustration of method 900 , adapted according to one embodiment, to manage electronic payment accounts.
- the actions of FIG. 9 may be performed electronically by a payment service (e.g., a service providing an electronic payment, such as PayPalTM, an issuing bank for a credit card or debit card, and/or the like).
- a payment service e.g., a service providing an electronic payment, such as PayPalTM, an issuing bank for a credit card or debit card, and/or the like.
- the various actions are carried out by one or more computer processors executing computer code to provide the described functionality.
- the service generates an electronic user interface for managing electronic payment.
- An example user interface is shown as interface 200 in FIGS. 2-7 .
- the interface allows an owner of a primary payment account to manage the primary account, including to generate one or more proxy payment accounts.
- the service receives input from a user, via the user interface, indicating a request to create a proxy payment account.
- the payment service may receive the input over the Internet or other computer network.
- Block 930 the payment service initiates creation of the proxy payment account in response to the input.
- the proxy payment account is linked to the primary payment account and to a payment method through the primary payment account but is not directly linked to the payment method.
- An example proxy payment account is described above with respect to FIG. 1 .
- Block 930 may further include generating account information, such as an account number, a login, and/or the like.
- the payment service applies a rule to the proxy payment account.
- the rule sets out a limitation on use of the proxy payment account.
- blocks 910 - 940 may be carried out in conjunction with a human user at a computer-based device interacting with the interface.
- the interface is provided by a website rendered on a web browser or by an application on a personal computer or smartphone.
- the human user interacts with the payment service, directing the payment service to create the proxy account, create rules, process payments, etc.
- the payment service facilitates payment processing using the proxy account.
- a counterparty presents the proper credentials to send/receive payment using the proxy account.
- the payment service is aware that the proxy payment account is linked to the primary payment account, and the payment service clears the transaction by depositing or withdrawing an amount of money using the primary payment account.
- the payment service does not, in this example, provide information to the counterparty indicating the existence of the primary payment account or the specific underlying payment facility.
- Block 950 may further include keeping records for the owner that show the transactions totaled at the primary payment account and also booked at the proxy payment account.
- Block 960 includes detecting possible fraud.
- detecting possible fraud includes using conventional fraud detection algorithms currently used by credit card-issuing banks to detect fraud.
- Another example includes detecting possible fraud anytime there is an attempt to use the proxy payment account inconsistent with any of the rules applied to the proxy payment account. Any technique to detect possible fraud, now known or later developed, may be applied in various embodiments.
- Block 960 also includes taking appropriate action.
- the payment service notifies the owner of the account of possible fraud and also gives the owner a chance to respond and either confirm that there is no fraud or indicate that there might be fraud.
- Appropriate action may also include canceling the proxy payment account with or without instruction from the account owner to do so. Any appropriate action is within the scope of embodiments.
- method 900 may include creating and managing multiple proxy payment accounts, each with any arbitrary number of rules applied thereto.
- Various embodiments may provide one or more advantages over conventional techniques. For instance, the separation between the primary payment account and the proxy payment account, and the lack of knowledge by the counterparty of the primary payment account, provides security to the account owner by limiting the chance that the primary payment account might be compromised. Furthermore, the ability to set rules may prevent unauthorized or fraudulent payment altogether by limiting payment to certain transactions and/or to certain counterparties. At the very least, setting rules for use of the proxy payment account may limit any damage to the primary account by limiting the proxy account to a specific amount of money. An account owner may enjoy both flexibility and security by creating proxy payment accounts and applying appropriate rule sets thereto.
- canceling and replacing the proxy payment account may include canceling and replacing only a single proxy payment account for one counterparty.
- Such process may be simpler than replacing account information at a multitude of different counterparties, as is done currently when a credit card is compromised.
- a user pays a merchant at a Point of Sale (POS) using a proxy account.
- POS Point of Sale
- a proxy account may be used via smartphone using any appropriate payment technology, such as Near Field Communication (NFC) and the like.
- NFC Near Field Communication
- rules for usage may also be bundled with proxy account credentials for further restrictions on the use of such proxy accounts.
- FIG. 10 is a simplified diagram of an example system using proxy accounts for payments from mobile device 1004 to POS 1002 .
- mobile device 1004 uses a wireless technology to communicate with POS 1002 to provide proxy account credentials thereto to complete payment for a transaction.
- POS 1002 then communicates with payment processor 1008 (e.g., a payment service such as PayPalTM or a bank, in the case of a proxy account associated with a credit card) to receive the money when the payment processor 1008 clears the transaction.
- payment processor 1008 e.g., a payment service such as PayPalTM or a bank, in the case of a proxy account associated with a credit card
- mobile device 1004 can communicate via network 1010 (e.g., the Internet, a cellular network, and/or the like) wirelessly.
- Mobile device 1004 is shown communicating through wireless base station 1006 , which may be a Wi-Fi access point, a cellular tower, or other facility.
- Proxy account credentials (e.g., account numbers, security codes, user identifiers, etc.) can be generated and delivered to mobile device 1004 at any appropriate time. For instance, generation of proxy account credentials may occur at time of sale using internet connectivity of mobile device 1004 . In another example, proxy account generation may occur at a previous time when a network connection to mobile device 1004 was available, so that a network connection at POS 1002 is not necessary. In such an embodiment, proxy account credentials can be created and batched on mobile device 1004 for subsequent off-line use. The following is an example use illustration of a embodiment that generates proxy credentials and stores the credentials locally on a mobile device for later use.
- an application on mobile device 1004 can request payment processor's 1008 servers to generate X number of proxy account credentials.
- no information in the credentials specifies a relationship to a primary account.
- Credential information is unique, and a relationship to a primary account is derived by searching a database at payment processor 1008 that is not publicly exposed.
- the proxy accounts created may be automatically associated with various rules for usage that are appropriate for a mobile caching application. For instance, the created proxy accounts may be stipulated as single-usage, for use at a POS and cannot be used again for withdrawal (except for a refund from the same merchant). In other embodiments, the proxy accounts, the credentials of which are batched on the mobile device, may have more or fewer restrictions or even different restrictions as appropriate.
- the X number of proxy account credentials are stored locally on mobile device 1004 in encrypted form only readable by the particular mobile application running on mobile device 1004 .
- the mobile application marks locally the usage of that proxy account with some metadata, such as information stating that the proxy account has already been used, at a certain time, and with a certain retailer, for a particular amount.
- FIG. 11 is an illustration of example application 1102 , which is running on a mobile device (such as mobile device 1004 of FIG. 10 ) and batches proxy account credentials.
- Repository 1104 stores proxy account credentials
- repository 1106 stores metadata for used proxy accounts.
- Module 1108 uses proxy account credentials from repository 1104 to pay for transactions and then generates metadata in repository 1106 after a proxy account has been used. In this manner, application 1102 pays at the POS using proxy account credentials and manages metadata for use of the proxy accounts.
- Application 1102 can also be used in embodiments wherein proxy account credentials are downloaded from a network at the POS during the transaction as well as with batched-credential embodiments.
- module 1108 schedules retrieval of additional available accounts from the servers of payment processor 1008 ( FIG. 10 ), either as a background task or explicitly asking the user for permission to request refresh of accounts.
- the number of account credentials that are generated and provided to mobile application 1102 is large enough that the user is not burdened by too frequent proxy account refreshing.
- mobile application 1102 can provide more flexibility to the user in terms of rules of use.
- a user can request additional or different rules to be placed on proxy accounts at time of usage or before the time of usage (such as shown in FIGS. 4-7 ).
- a user can set rules to be applied automatically if a recognized merchant is identified as the counterparty for a transaction.
- Application 1102 can allow for changes in default server created rules, such as amount allowed, expiration period, reuse parameters, and the like.
- the rules themselves can be indicated in proxy account credentials, encrypted with a key either specific to the primary account or specific to the proxy account. Such a feature allows rules to be generated without informing payment processor 1008 beforehand. In other implementations, the rules may be tracked by payment processor 1008 , having been previously informed. In fact, any appropriate technique to apply and/or track rules may be used in various implementations.
- FIG. 12 is an illustration of method 1200 , adapted according to one embodiment, to manage electronic payment accounts and to conduct transactions at a POS using proxy accounts.
- Method 1200 may be performed in some embodiments by a mobile application running on a mobile device, such as mobile device 1004 of FIG. 10 .
- the mobile device receives account credentials.
- the mobile device may receive the account credentials during the transaction and while at the merchant's POS over a network from the payment processor.
- the mobile device may request account credentials from the payment processor during the transaction and receive the credentials in response to the request on-the-fly and in an elapsed time that is appropriate for a transaction.
- the mobile device may receive the account credentials over the network and then store the account credentials for later use.
- the mobile application stores the account credentials in a secure manner and then presents the account credentials at an appropriate time.
- the mobile application may automatically (or manually in response to user input) exchange data with the payment processor about available proxy accounts and metadata about usage of proxy accounts as a network connection becomes available.
- the proxy account credentials are received by the mobile device in a secure manner.
- the credentials may be delivered in an encrypted form and then stored in the same or a different encrypted form.
- the mobile application pays a merchant at a POS using the proxy account credentials.
- the user may interact with the mobile application through any appropriate electronic interface.
- the proxy account credentials can be transferred from the mobile device to the POS using any appropriate technology, such as by NFC or encrypted Wi-Fi.
- the merchant's POS then presents the credentials to the payment processor to verify the credentials and receive payment.
- the actions of block 1220 are performed quickly enough that it is significantly in “real-time” from the perception of a human consumer.
- Block 1220 may further include the mobile application writing metadata to repository 1106 ( FIG. 11 ) to indicate that a particular proxy account has been used. The number of unused proxy accounts is then decreased by one.
- the used proxy account may be designated as single-use-only, perhaps by a default rule.
- the particular proxy account may be indicated as retired using metadata.
- the particular proxy account may be usable more than once, perhaps for a specified number of times or only at a specified merchant. In such cases, the metadata may indicate that the account has been used but it is not necessarily retired.
- the mobile application allows the user to manage the proxy accounts on-line.
- mobile application 1102 provides an interface, such as that shown in FIGS. 2-7 , to a human user.
- the human user then may manage settings, such as default rules for locally-batched or mobile-downloaded accounts.
- the user may set rules during a transaction or at a different time.
- Some embodiments may also allow a user to review payments and manually prompt the download of additional account credentials from the mobile interface.
- the user has a mobile application running on a mobile device.
- the user may interact with the mobile application to download account credentials, such as by using a touch screen interface or other interface to cause the mobile application to send a request for account credentials to the payment processor.
- the mobile application itself may automatically request one or more account credentials from the payment processor as appropriate.
- the mobile application may include an identifier of the user in the request so that the payment processor may verify that the request is proper and may track proxy account creation locally.
- the user goes to a brick and mortar store that has a point of sale, and the user brings a mobile device that runs a mobile application that provides proxy account payment/management functionality.
- the user approaches the POS to pay for a transaction.
- the mobile application causes a transceiver of the mobile device to communicate with the POS, receiving the transaction amount and merchant identification from the POS and providing proxy account credentials to the POS authorized for the transaction amount.
- the POS then provides the account credentials and transaction amount to the payment processor for verification along with an identification of the merchant sufficient to route money from the payment processor to an account of the merchant.
- the payment processor verifies the payment (if appropriate), schedules payment to the merchant, and provides a verification to the POS.
- the POS then communicates with the mobile application to indicate that the transaction is complete.
- FIG. 13 is an illustration of method 1300 , adapted according to one embodiment, to manage electronic payment accounts and to conduct transactions at a POS using proxy accounts.
- Method 1300 may be performed in some embodiments by a program at one or more computers of a payment processor, such as payment processor 1008 of FIG. 10 .
- the computer sends proxy account credentials to a mobile device.
- the computer may send a batch of account credentials to the mobile device to cache and use offline.
- the computer may send one or more account credentials during a transaction that the mobile device is facilitating.
- the computer may send the proxy account credentials in response to a request from the mobile application and/or may push proxy account credentials to the mobile application as appropriate.
- the mobile application presents identifying information (e.g., user account/password, primary account credentials, and/or an encryption key) to the payment processor so that the payment processor may create proxy accounts for the correct primary account and also verify that the mobile application is genuine to prevent fraud.
- the computer may send the account credentials in an encrypted or otherwise secure form over a wireless or wired network, such as over the Internet and/or through a cellular network.
- the computer may send the proxy account credentials in response to a prompt by the mobile device or in response to any other stimulus.
- the computer processes a payment to a merchant using a proxy account. For instance, when the merchant receives the proxy account credentials from the mobile application, the merchant may forward those credentials, the transaction amount, and an identifier of the merchant to the payment processor in order to receive payment therefrom.
- the payment processor analyzes the proxy account credentials, and if valid and in accordance with applicable rules, the payment processor then provides a verification to the merchant and schedules a transfer of money to the merchant. In some instances, the payment processor may verify that the primary account has sufficient funds to cover the transaction. As described above, at the payment processor the payment is cleared through a primary account or other payment facility that is linked to the proxy account but not known to the merchant.
- the payment processor may transfer money to the merchant using identifying information from the merchant, such as a bank routing number or other information.
- the user may be enrolled in a scrip program.
- a scrip program An example is when a store teams with a school for a school fundraiser, wherein a portion of sales from scrip participants at the store goes to the school.
- the user may notify the payment processor that its payment to a particular merchant should be linked to a particular scrip program.
- the payment processor saves this information in a database, and when the user makes a payment to the merchant, the payment processor notifies the merchant and/or the scrip program to ensure that the transaction is properly linked to the scrip program.
- the payment processor provides a facility for the user to manage proxy accounts. For instance, in some embodiments, the payment processor allows access to the account management features through an interface, such as that shown in FIGS. 2-7 , to a human user. The human user then may manage settings, such as default rules for locally-batched or mobile downloaded accounts.
- embodiments is not limited to the actions shown in FIGS. 12 and 13 .
- other embodiments may add, omit, modify, or rearrange any actions.
- other embodiments may allow for any communication between and among the payment processor, the mobile application, and the merchant as appropriate to facilitate a transaction.
- Embodiments adapted for use at POSs may provide various advantages. For instance, in the context of Automatic Teller Machines (ATMs), thieves may use skimmers to capture card numbers and Personal Identification Numbers (PINs) from users often without being caught. A skimmer is often a façade placed over an ATM that looks unsuspicious yet has magnetic-reading and optical capture technology. As POS payments become more popular, e.g., using NFC, the presentation of user account credentials may become a target of skimming technology. However, proxy accounts that can be limited to a single merchant and/or to a single transaction deny the skimmers credentials that can be useful elsewhere or at a later time.
- ATMs Automatic Teller Machines
- PINs Personal Identification Numbers
- FIG. 14 is a simplified block diagram of an example electronic device 1400 on which the account owner may interact with the POS and/or the payment service according to various aspects of the present disclosure.
- the electronic device 1400 may be a portable personal electronic device, such as a smart phone, laptop, or a tablet.
- the electronic device 1400 may also be a more powerful computer, for example a server computer.
- the electronic device 1400 includes an input/output interface 1410 .
- the interface 1410 is operable to receive an input from a user and communicate an output to the user.
- the input/output interface 1410 includes a visual display unit, for example a touch-sensitive screen.
- Input/output interface 101 may display a graphical interface, such as interface 200 of FIGS. 2-7 .
- the electronic device 1400 includes a transceiver 1420 .
- the transceiver 1420 is operable to electronically communicate with external devices.
- the transceiver 1420 is operable to wirelessly communicate with a POS, cellular towers, or other network access points and infrastructure.
- the electronic device 1400 also includes a computer processor 1430 that is operable to execute computer instructions and a memory storage 1440 that is operable to store the computer instructions.
- the memory storage 1440 also contains a program module that is an embodiment of the application that interacts with the POS, the account owner, and/or the payment service.
- the program module operates to provide action such as receiving owner input to create a proxy payment account.
- FIG. 15 is a block diagram of a computer system 1500 suitable for implementing various methods and devices described herein, for example, the various method blocks of the methods 800 , 900 , 1200 , and 1300 .
- the computer system 1500 may represent a computer upon which the account owner sees interface 200 and/or make a payment at a POS.
- the computer system 1500 may represent a server computer or other type of computer that can be used as part of an account management or payment processing infrastructure at a payment service. Accordingly, it should be appreciated that each of the devices may be implemented as the computer system 1500 for communication with a network in a manner as follows.
- the computer system 1500 such as a mobile communications device and/or a network server, includes a bus component 1502 or other communication mechanisms for communicating information, which interconnects subsystems and components, such as processing component 1504 (e.g., processor, micro-controller, digital signal processor (DSP), etc.), system memory component 1506 (e.g., RAM), static storage component 1508 (e.g., ROM), disk drive component 1510 (e.g., magnetic or optical), network interface component 1512 (e.g., modem or Ethernet card), display component 1514 (e.g., touch-screens, cathode ray tube (CRT) displays, or liquid crystal display (LCD)), input component 1516 (e.g., keyboard or touch-sensitive components operable to detect a touch by a human body), cursor control component 1518 (e.g., mouse or trackball), and image capture component 1520 (e.g., analog or digital camera).
- processing component 1504 e.g., processor, micro-controller, digital signal processor
- computer system 1500 performs specific operations by processor 1504 executing one or more sequences of one or more instructions contained in system memory component 1506 .
- Such instructions may be read into system memory component 1506 from another computer readable medium, such as static storage component 1508 or disk drive component 1510 .
- static storage component 1508 or disk drive component 1510 may be another computer readable medium.
- hard-wired circuitry may be used in place of (or in combination with) software instructions to implement the present disclosure.
- Non-volatile media includes optical or magnetic disks, such as disk drive component 1510
- volatile media includes dynamic memory, such as system memory component 1506 .
- Computer readable media includes, for example, floppy disk, flexible disk, hard disk, magnetic tape, any other magnetic medium, CD-ROM, any other optical medium, punch cards, paper tape, any other physical medium with patterns of holes, RAM, PROM, EPROM, FLASH-EPROM, any other memory chip or cartridge, or any other medium from which a computer is adapted to read.
- execution of instruction sequences to practice the present disclosure may be performed by computer system 1500 .
- a plurality of computer systems 1500 coupled by communication link 1530 e.g., a communications network, such as a LAN, WLAN, PTSN, and/or various other wired or wireless networks, including telecommunications, mobile, and cellular phone networks
- communication link 1530 e.g., a communications network, such as a LAN, WLAN, PTSN, and/or various other wired or wireless networks, including telecommunications, mobile, and cellular phone networks
- Computer system 1500 may transmit and receive messages, data, information and instructions, including one or more programs (i.e., application code) through communication link 1530 and communication interface 1512 .
- Received program code may be executed by processor 1504 as received and/or stored in disk drive component 1510 or some other storage component for execution.
- various embodiments provided by the present disclosure may be implemented using hardware, software, or combinations of hardware and software.
- the various hardware components and/or software components set forth herein may be combined into composite components comprising software, hardware, and/or both without departing from the spirit of the present disclosure.
- the various hardware components and/or software components set forth herein may be separated into sub-components comprising software, hardware, or both without departing from the scope of the present disclosure.
- software components may be implemented as hardware components and vice-versa.
- Software in accordance with the present disclosure, such as computer program code and/or data, may be stored on one or more computer readable mediums. It is also contemplated that software identified herein may be implemented using one or more general purpose or specific purpose computers and/or computer systems, networked and/or otherwise. Where applicable, the ordering of various steps described herein may be changed, combined into composite steps, and/or separated into sub-steps to provide features described herein.
Landscapes
- Business, Economics & Management (AREA)
- Accounting & Taxation (AREA)
- Engineering & Computer Science (AREA)
- Physics & Mathematics (AREA)
- Theoretical Computer Science (AREA)
- General Physics & Mathematics (AREA)
- General Business, Economics & Management (AREA)
- Strategic Management (AREA)
- Finance (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Economics (AREA)
- Development Economics (AREA)
- Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
Abstract
Description
- This application is a continuation-in-part of U.S. Ser. No. 13/420,888 filed Mar. 15, 2012, and entitled, “Systems, Methods, And Computer Program Products For Using Proxy Accounts,” the entire disclosure of which are incorporated herein by reference.
- 1. Technical Field
- The present disclosure generally relates to electronic transactions, and more particularly, to techniques for using proxy accounts associated with a primary account.
- 2. Related Art
- It is common for consumers and businesses to have electronic accounts to send and receive payments from other parties. One example includes credit cards, which are typically read electronically and transfer money electronically. Another example is a payment service, such as that offered under the name PayPal™, which provides electronic wallets that users can link to credit cards, bank accounts, and any other form of payment.
- One problem with most methods of payment, whether electronic or otherwise, is that it can be prone to fraud. For instance, it is not uncommon for criminals to steal credit card information and then to attempt to use the credit card information to pay for goods and services. A typical, modern credit card theft scenario involves a consumer's card that is compromised in some fashion and then canceled and replaced by the card issuer relatively quickly.
- While the consumer is not typically obliged to pay for the criminal's purchases, the consumer still feels some inconvenience. For instance, most consumers store credit card information at multiple vendors and may even use a card to make automatic payments toward one or more bills. But when the credit card is suddenly canceled and replaced, the consumer is in the position of having to change the stored information for a variety of vendors and may even miss one or more scheduled payments set up on the old card.
- Furthermore, when a user of an account employs the account for making payments to many different entities, it can be quite difficult to determine exactly how an account was compromised because multiple entities have been exposed to the account's credentials. There is currently no convenient solution to protect the integrity of an account while still allowing easy payment.
- One of the broader forms of the present disclosure involves an electronic device including an input/output interface operable to receive an input from a user and communicate an output to the user, a transceiver operable to electronically communicate with a computer network, a computer processor operable to execute instructions, and a memory storage operable to store the instructions, the memory storage further comprising a program module that is operable to: receive credentials for a proxy payment account, where the proxy payment account is linked to a primary payment account and not linked directly to a method of payment underlying the primary payment account, and make payment at a Point of Sale (POS) using the received credentials.
- Another one of the broader forms of the present disclosure involves a method including at a mobile device, receiving credentials for a proxy payment account associated with a primary payment account, wherein the primary payment account is linked to a method of payment, further wherein the proxy payment account is linked to the primary account but is not linked directly to the method of payment, wherein payments to and from the proxy payment account are cleared through the primary account, and making payment for a transaction by passing the received credentials to a POS.
- Another one of the broader forms of the present disclosure involves a computer program product having a computer readable medium tangibly recording computer program logic for managing electronic payment, the computer program product including: code to generate an electronic user interface on a mobile computing device for managing electronic payment, code to receive input from a user, via the user interface, indicating a request to use a proxy payment account for payment at a POS, code to receive credentials for the proxy payment account at the mobile computing device, the proxy payment account being linked to a primary payment account and to a payment method through the primary payment account, the proxy payment account not being directly linked to the payment method, and code to pass the received credentials to the POS from the mobile computing device.
-
FIG. 1 illustrates an example relationship between a primary payment account and a multitude of proxy payment accounts. -
FIGS. 2-7 illustrate an example user interface of an example application program according to various aspects of the present disclosure. -
FIGS. 8 and 9 illustrates a flowchart containing example process flows according to various aspects of the present disclosure. -
FIG. 10 illustrates an example system for making a payment at a POS. -
FIG. 11 illustrates an example mobile application for making payment at a POS. -
FIGS. 12 and 13 illustrate example methods to make payment at a POS and manage proxy accounts at a mobile device. -
FIG. 14 illustrates a block diagram of a computer system for implementing various methods and devices described according to various aspects of the present disclosure. -
FIG. 15 illustrates a block diagram of a computer system for implementing various methods and devices described according to various aspects of the present disclosure. - It is to be understood that the following disclosure provides many different embodiments, or examples, for implementing different features of the present disclosure. Specific examples of components and arrangements are described below to simplify the present disclosure. These are, of course, merely examples and are not intended to be limiting.
- According to the various aspects of the present disclosure, a method, system, and computer program product are discussed below that improve electronic payment accounts.
- In one example, an owner (e.g., a consumer or business) has a primary payment account and many proxy payment accounts that are targeted to individual vendors and have restrictive financial rules amendable by the owner of the primary account. Each proxy account is linked to the primary account, and withdrawals/deposit are from/to the proxy account via the primary account.
- One purpose of the proxy accounts is to provide more security about who can withdraw from the account. Thus, in one example, rules are created for each of the proxy accounts specifying payments to/from a single counterparty. In this example, counterparties are payees and payors with respect to the account owner. From another aspect, a purpose of the proxy accounts is to provide greater control of inbound and outbound money. Proxy accounts can be created and destroyed easily by the owner. If primary account information is stolen for a proxy account, when the owner is notified, the owner can quickly cancel and replace the proxy account with a new proxy account. The primary account containing the monies is uncompromised. And in a scenario wherein transactions with the proxy account are limited by rules specifying a maximum transaction size, the primary account may be unharmed, or at worst, harmed within limits set up for the proxy account.
- Also, each proxy account can be associated with one or more counterparties, where each counterparty is not exposed to the credentials of the primary account or to other proxy accounts not associated with that counterparty. In such an arrangement, when a counterparty is compromised itself or leaks proxy account information the owner can quickly identify the counterparty responsible. Thus, proxy accounts can not only be used to prevent or limit damage from theft, but proxy accounts can also be used to assist investigations in focusing on a particular instance of compromise. Additionally, when the account owner sets up a system wherein each counterparty is associated with a particular proxy account, tracking payments to/from the counterparty may be simplified, since the payments would be associated with a specific account for that counterparty.
- Continuing with the example, an account owner may establish any arbitrary rule or set of rules for a given proxy account. Examples of rules include, e.g., limitations regarding how much a proxy account can distribute in a certain time period, which counterparties are associated with the proxy account, a maximum lifetime for the proxy account, a one-time use lifespan, and the like.
- The concept disclosed above encompasses a variety of other uses. For instance, a parent may create a proxy account for a child. The concept can also be extended to credit cards and electronic wallets to provide a security buffer from a primary account and can be extended further to allow proxy account balances.
-
FIG. 1 is an illustration of a primary account and multiple proxy accounts, adapted according to one embodiment.Primary account 101 is linked to themonies 103 and is used to complete all debits and credits in the arrangement ofFIG. 1 . In an example whereinprimary account 101 is a credit card,monies 103 represents the payment facilities of the issuing bank. In an example whereinprimary account 101 is an electronic wallet from a payment service, such as PayPal™,monies 103 represent the underlying bank account, credit account, or other facility used to clear the payments to/fromprimary account 101. However, the scope of embodiments is not limited to credit cards and electronic wallets as primary accounts. Rather, the scope of embodiments may include any appropriate account, such as those accessed by debit cards or the like. - Continuing with
FIG. 1 , proxy accounts 102 a-f are linked to theprimary account 101, usingprimary account 101 as a payment method for deposits and withdrawals. Thus, when a payment is made toproxy account 102 a, orproxy account 102 a makes a payment, the transaction is cleared throughprimary account 101, as the source of, and destination for, the money in the transaction. Further, credentials for each of the primary accounts 102 are different from each other and from that ofprimary account 101. - Proxy accounts 102 are not linked directly to
monies 103. Instead, proxy accounts 102 are linked toprimary account 101. In one example, whereinprimary account 101 is an electronic wallet that provides access to a bank account (as monies 103), payment is made to/from proxy account 102 usingprimary account 101, and the counterparty may be unaware of the existence of the bank account. In fact, the counterparty may be unaware of the existence ofprimary account 101 in an example wherein the credentials ofprimary account 101 are kept from the counterparty. - In another example in which
primary account 101 is a credit card, the counterparty is unaware of the primary account's credit card number or of the payment facility of the underlying issuing bank. Also, the proxy account credentials are not valid credentials to access the payment facilities of the issuing bank, as the payments are made throughprimary account 101. - Thus, the arrangement of
FIG. 1 provides at least one degree of separation between proxy accounts 102 andprimary account 101, and proxy accounts 102 do not have credentials to directly accessmonies 103. Thus, the arrangement ofFIG. 1 isolatesprimary account 101 andmonies 103 from counterparties, thereby providing an enhanced level of security to the owner of theaccounts 101, 102. - In various embodiments an owner creates and manages
accounts 101, 102 using a computer to login to a network-based facility. Once the owner is confirmed by the security measures of the payment service, the owner is presented with an interface (e.g., a web-based Graphical User Interface (GUI) or other type of interface) to create and manage accounts. -
FIG. 2 illustrates anexample user interface 200 for an electronic device adapted according to one embodiment. In the illustrated embodiment, the electronic device may include a smart phone or other hand-held device. In alternative embodiments, the electronic device may be another suitable electronic device such as a computer tablet or laptop/desktop personal computer. The owner may accessinterface 200 through a web browser, a specialized application, or other appropriate technique. For instance, a user may download application software programs, also known as “apps” or “applications” to the portable electronic device. In general, applications are computer software programs designed to execute specific tasks. As examples, Apple's® App Store, Microsoft's Windows® Store, and Google's® Android Market offer a multitude of applications, including entertainment programs, business applications, file management tools, and other widgets, etc. -
Interface 200 is an example of an interface seen by the owner when the owner creates one or more proxy accounts that link to a primary account (as inFIG. 1 ).Interface 200 may be embodied in any appropriate manner, such as on a touch screen interface or another GUI that uses a mouse or other pointing device. In this example, the various buttons, fields, and some of the text is created using hypertext or other interactive code to allow the user to perform actions with the items on the screen. -
FIG. 2 starts off after the owner has already created a primary account, and it is understood that an interface similar tointerface 200 could be used to create a primary account as well. The illustration ofFIG. 2 begins at an Account Services page that references the primary account, which for purposes of this example is given number XXX-XXXX. The owner is presented with three options, each associated with one ofbuttons button 202, the owner can manage the primary account, such as by changing a billing address, password, or the like.Button 206 allows the owner to return to a main menu (not shown). -
Button 204 triggers the payment service to generate a proxy account that is linked to primary account XXX-XXXX. In some examples, the owner can select credentials for the proxy account (e.g., by generating an account number or login), but in this example, the service generates the credentials.FIG. 3 is an illustration of an example screen ininterface 200 showing that the service has created proxy account YYY-YYYY. InFIG. 3 , the owner can return to Account Services by selectingbutton 302. The owner can also create rules for the proxy account by selecting button 304. - Upon selecting button 304, the owner is taken to the screen shown in
FIG. 4 . The screen ofFIG. 4 provides a utility for the owner to create rules to apply to the proxy account. The user can select the text in either options 402, 404, 406 to create a specific rule to apply to the proxy account. - The option shown in text 402 provides for a time-based rule, such as a maximum lifetime for the proxy account. The option shown in text 404 provides for a transaction amount rule (e.g., a maximum amount to transactions to/from the proxy account). Similarly, the option shown in text 406 provides for a counterparty identity rule (e.g., allowing transactions with one or more pre-selected counterparties). Each of these options are described in more detail with respect to
FIGS. 5-7 . - It should be noted, though, that the options shown in
FIG. 4 are illustrative only. The scope of embodiments can include any arbitrary rule for use of a proxy account. Examples of other rules include limiting the proxy account to a single transaction, limiting the proxy account to make payments only during certain pre-defined times, limiting the proxy account to only deposits or only withdrawals, limiting the proxy account for use only with counterparties in certain geographic regions, and the like. - When the owner selects option 402, the service takes the owner to the screen shown in
FIG. 5 . Within the screen ofFIG. 5 , the owner can select from pre-defined account lifetimes of onemonth 502, six months 504, and oneyear 506. Alternatively, the user can select a specific date fromcalendar tool 508 on which to deactivate or cancel the proxy account. Once the owner provides a maximum lifetime, the owner may selectbutton 510 to enter the selection. - Although not shown in
FIG. 5 , other events may be selected that, upon the occurrence of such event, the proxy account is deactivated or canceled. One example is detection of fraud or attempted use outside of the established rule set. Another example includes a pre-defined elapsed time with no activity. Such rules may be default rules or may be selected, and other appropriate events may trigger deactivation or cancelation as well. - Returning to
FIG. 4 , when the owner selects option 404, the service takes the owner to the screen ofFIG. 6 to define transaction amounts for the proxy account. The owner may usefield 602 orbutton 604 to enter, if desired, a transaction amount limit for deposits. Similarly, the owner may usefield 606 andbutton 608 to enter, if desired, a transaction amount for withdrawals. The user may select the donebutton 610 to enter the selection. - The screen of
FIG. 6 is shown as providing an opportunity to enter a per-transaction amount for the proxy account. However, other embodiments may also define a total lifetime amount for transactions using the proxy account. Any appropriate rule to limit an amount of money, whether per-transaction, cumulative over a span of time, or otherwise are within the scope of embodiments. - Returning to
FIG. 4 , the owner may choose option 406 to set up a rule identifying a counterparty. Upon selection of option 406, the service takes the owner to the screen shown inFIG. 7 . There are various ways to identify a counterparty, with two of those ways being by identifying an account number associated with the counter party and a name of the counterparty. The owner may usefields select button 706 to enter the information. However, any appropriate technique for identifying a counterparty is within the scope of embodiments. Upon identification of a counterparty, the proxy account is limited to use with that counterparty only until specified otherwise by the account owner. - In some instances, an account is, by default, limited for use with the first payee or payor counterparty to a transaction employing the proxy payment account. Thus, rather than having to enter counterparty identification information in the screen of
FIG. 7 , the owner may simply create the proxy payment account and then use the proxy payment account to either send or receive payment to/from a given counterparty, thereby automatically associating the proxy payment account with the identity of the counterparty. Should the owner desire to use the same proxy payment account with a different counterparty the owner may go back to the payment service and use an interface, such asinterface 200, to amend the rule to allow additional counterparties. -
FIGS. 2-7 are shown as an illustrative example, other embodiments may provide screens to create more than one proxy account, to attach more than one rule to a given proxy account, and to attach a given rule to more than one proxy account. The scope of the disclosure provides for attaching any appropriate rule, or set of rules, to any number of proxy accounts to suit an account owner's purpose. - Various embodiments include methods for managing payment using a primary account and a proxy account.
FIG. 8 illustratesmethod 800, adapted according to one embodiment, for a user to manage payment according to the principles discussed above inFIGS. 1-7 . In one example, the user employs one or more computers and the interface 200 (FIGS. 2-7 ) when acting according tomethod 800. - At
block 810, the owner creates a primary payment account. An example primary account is described above atFIG. 1 . - At
block 820, the owner creates a proxy payment account that is linked to the primary payment account. Example proxy payment accounts are described above atFIG. 1 . The owner may create the primary payment account and the proxy payment account in the same web session or application session or a different session. In other words, the scope of embodiments also includes a scenario wherein the owner creates a proxy payment account to link to a primary payment account that has been preexisting for a significant amount of time. - At
block 830, the owner applies a rule or rule set to the proxy payment account. An example of applying rules to the proxy payment account is given above atFIGS. 2-7 . - At
block 840, the owner sends and/or receives payments with the proxy payment account. As explained above, the proxy payment account has different credentials than the primary payment account and is not directly linked to the monies, thereby keeping the primary account and the true method of payment secret from the counterparties interfacing with the proxy payment account. Further, as explained above, the actions ofblock 840 are carried out consistently with the rule or rule set applied to the proxy payment account. In this example, payment is electronic and accomplished by computers, and thus, the rules are applied automatically by the payment service as the transaction is carried out (or is attempted to be carried out). - In block 850, the owner cancels the proxy payment account. In one example, the owner is notified of possible fraud and cancels the proxy payment account in response thereto. In another example, the owner has set a rule in
block 830 to automatically cancel the account after a specified event or time, and the payment service applies the rule automatically absent further instruction by the owner. - The scope of embodiments is not limited to the particular flow shown in
FIG. 8 . Rather, other embodiments may add, omit, rearrange, or modify one or more actions in accordance with a given design. For instance, the owner may create more than one proxy account and apply any appropriate rules to some or all of the different proxy accounts. -
FIG. 9 is an illustration ofmethod 900, adapted according to one embodiment, to manage electronic payment accounts. The actions ofFIG. 9 may be performed electronically by a payment service (e.g., a service providing an electronic payment, such as PayPal™, an issuing bank for a credit card or debit card, and/or the like). In some embodiments, the various actions are carried out by one or more computer processors executing computer code to provide the described functionality. - In
block 910, the service generates an electronic user interface for managing electronic payment. An example user interface is shown asinterface 200 inFIGS. 2-7 . The interface allows an owner of a primary payment account to manage the primary account, including to generate one or more proxy payment accounts. - In
block 920, the service receives input from a user, via the user interface, indicating a request to create a proxy payment account. The payment service may receive the input over the Internet or other computer network. - In
block 930, the payment service initiates creation of the proxy payment account in response to the input. The proxy payment account is linked to the primary payment account and to a payment method through the primary payment account but is not directly linked to the payment method. An example proxy payment account is described above with respect toFIG. 1 .Block 930 may further include generating account information, such as an account number, a login, and/or the like. - In
block 940, the payment service applies a rule to the proxy payment account. As described above with respect toFIGS. 2-7 , the rule sets out a limitation on use of the proxy payment account. - It should be noted that the actions of blocks 910-940 may be carried out in conjunction with a human user at a computer-based device interacting with the interface. In one example, the interface is provided by a website rendered on a web browser or by an application on a personal computer or smartphone. The human user interacts with the payment service, directing the payment service to create the proxy account, create rules, process payments, etc.
- In
block 950, the payment service facilitates payment processing using the proxy account. In one example, a counterparty presents the proper credentials to send/receive payment using the proxy account. The payment service is aware that the proxy payment account is linked to the primary payment account, and the payment service clears the transaction by depositing or withdrawing an amount of money using the primary payment account. The payment service does not, in this example, provide information to the counterparty indicating the existence of the primary payment account or the specific underlying payment facility. -
Block 950 may further include keeping records for the owner that show the transactions totaled at the primary payment account and also booked at the proxy payment account. - Block 960 includes detecting possible fraud. One example of detecting possible fraud includes using conventional fraud detection algorithms currently used by credit card-issuing banks to detect fraud. Another example includes detecting possible fraud anytime there is an attempt to use the proxy payment account inconsistent with any of the rules applied to the proxy payment account. Any technique to detect possible fraud, now known or later developed, may be applied in various embodiments.
- Block 960 also includes taking appropriate action. In one example, the payment service notifies the owner of the account of possible fraud and also gives the owner a chance to respond and either confirm that there is no fraud or indicate that there might be fraud. Appropriate action may also include canceling the proxy payment account with or without instruction from the account owner to do so. Any appropriate action is within the scope of embodiments.
- The scope of embodiments is not limited to the particular flow shown in
FIG. 9 . Rather, other embodiments may add, omit, rearrange, or modify one or more actions in accordance with a given design. For instance,method 900 may include creating and managing multiple proxy payment accounts, each with any arbitrary number of rules applied thereto. - Various embodiments may provide one or more advantages over conventional techniques. For instance, the separation between the primary payment account and the proxy payment account, and the lack of knowledge by the counterparty of the primary payment account, provides security to the account owner by limiting the chance that the primary payment account might be compromised. Furthermore, the ability to set rules may prevent unauthorized or fraudulent payment altogether by limiting payment to certain transactions and/or to certain counterparties. At the very least, setting rules for use of the proxy payment account may limit any damage to the primary account by limiting the proxy account to a specific amount of money. An account owner may enjoy both flexibility and security by creating proxy payment accounts and applying appropriate rule sets thereto.
- Furthermore, in a scenario wherein one proxy payment account is used per counterparty, canceling and replacing the proxy payment account may include canceling and replacing only a single proxy payment account for one counterparty. Such process may be simpler than replacing account information at a multitude of different counterparties, as is done currently when a credit card is compromised.
- In a further embodiment using proxy accounts, a user pays a merchant at a Point of Sale (POS) using a proxy account. For instance, when at a POS location, a proxy account may be used via smartphone using any appropriate payment technology, such as Near Field Communication (NFC) and the like. In some implementations rules for usage may also be bundled with proxy account credentials for further restrictions on the use of such proxy accounts.
-
FIG. 10 is a simplified diagram of an example system using proxy accounts for payments frommobile device 1004 toPOS 1002. As shown inFIG. 10 ,mobile device 1004 uses a wireless technology to communicate withPOS 1002 to provide proxy account credentials thereto to complete payment for a transaction.POS 1002 then communicates with payment processor 1008 (e.g., a payment service such as PayPal™ or a bank, in the case of a proxy account associated with a credit card) to receive the money when thepayment processor 1008 clears the transaction. - Further, as shown in
FIG. 10 ,mobile device 1004 can communicate via network 1010 (e.g., the Internet, a cellular network, and/or the like) wirelessly.Mobile device 1004 is shown communicating throughwireless base station 1006, which may be a Wi-Fi access point, a cellular tower, or other facility. - Proxy account credentials (e.g., account numbers, security codes, user identifiers, etc.) can be generated and delivered to
mobile device 1004 at any appropriate time. For instance, generation of proxy account credentials may occur at time of sale using internet connectivity ofmobile device 1004. In another example, proxy account generation may occur at a previous time when a network connection tomobile device 1004 was available, so that a network connection atPOS 1002 is not necessary. In such an embodiment, proxy account credentials can be created and batched onmobile device 1004 for subsequent off-line use. The following is an example use illustration of a embodiment that generates proxy credentials and stores the credentials locally on a mobile device for later use. - When
mobile device 1004 has a network connection either by Wi-Fi or cell phone carrier, an application onmobile device 1004 can request payment processor's 1008 servers to generate X number of proxy account credentials. As in the previous examples, no information in the credentials specifies a relationship to a primary account. Credential information is unique, and a relationship to a primary account is derived by searching a database atpayment processor 1008 that is not publicly exposed. Furthermore, in some embodiments, the proxy accounts created may be automatically associated with various rules for usage that are appropriate for a mobile caching application. For instance, the created proxy accounts may be stipulated as single-usage, for use at a POS and cannot be used again for withdrawal (except for a refund from the same merchant). In other embodiments, the proxy accounts, the credentials of which are batched on the mobile device, may have more or fewer restrictions or even different restrictions as appropriate. - The X number of proxy account credentials are stored locally on
mobile device 1004 in encrypted form only readable by the particular mobile application running onmobile device 1004. When a proxy account is used, the mobile application marks locally the usage of that proxy account with some metadata, such as information stating that the proxy account has already been used, at a certain time, and with a certain retailer, for a particular amount. -
FIG. 11 is an illustration ofexample application 1102, which is running on a mobile device (such asmobile device 1004 ofFIG. 10 ) and batches proxy account credentials.Repository 1104 stores proxy account credentials, andrepository 1106 stores metadata for used proxy accounts.Module 1108 uses proxy account credentials fromrepository 1104 to pay for transactions and then generates metadata inrepository 1106 after a proxy account has been used. In this manner,application 1102 pays at the POS using proxy account credentials and manages metadata for use of the proxy accounts.Application 1102 can also be used in embodiments wherein proxy account credentials are downloaded from a network at the POS during the transaction as well as with batched-credential embodiments. - If the store of available proxy accounts in
repository 1104 falls below a certain threshold of Y available accounts,module 1108 schedules retrieval of additional available accounts from the servers of payment processor 1008 (FIG. 10 ), either as a background task or explicitly asking the user for permission to request refresh of accounts. In some embodiments, the number of account credentials that are generated and provided tomobile application 1102 is large enough that the user is not burdened by too frequent proxy account refreshing. - In some instances,
mobile application 1102 can provide more flexibility to the user in terms of rules of use. In some examples, a user can request additional or different rules to be placed on proxy accounts at time of usage or before the time of usage (such as shown inFIGS. 4-7 ). In some examples, a user can set rules to be applied automatically if a recognized merchant is identified as the counterparty for a transaction.Application 1102 can allow for changes in default server created rules, such as amount allowed, expiration period, reuse parameters, and the like. - In some instances, the rules themselves can be indicated in proxy account credentials, encrypted with a key either specific to the primary account or specific to the proxy account. Such a feature allows rules to be generated without informing
payment processor 1008 beforehand. In other implementations, the rules may be tracked bypayment processor 1008, having been previously informed. In fact, any appropriate technique to apply and/or track rules may be used in various implementations. -
FIG. 12 is an illustration of method 1200, adapted according to one embodiment, to manage electronic payment accounts and to conduct transactions at a POS using proxy accounts. Method 1200 may be performed in some embodiments by a mobile application running on a mobile device, such asmobile device 1004 ofFIG. 10 . - In
block 1210, the mobile device receives account credentials. In some instances, the mobile device may receive the account credentials during the transaction and while at the merchant's POS over a network from the payment processor. For example, the mobile device may request account credentials from the payment processor during the transaction and receive the credentials in response to the request on-the-fly and in an elapsed time that is appropriate for a transaction. - In another example, the mobile device may receive the account credentials over the network and then store the account credentials for later use. In this scenario, the mobile application stores the account credentials in a secure manner and then presents the account credentials at an appropriate time. In such a scenario, the mobile application may automatically (or manually in response to user input) exchange data with the payment processor about available proxy accounts and metadata about usage of proxy accounts as a network connection becomes available.
- In any event, the proxy account credentials are received by the mobile device in a secure manner. For instance, the credentials may be delivered in an encrypted form and then stored in the same or a different encrypted form.
- In
block 1220, the mobile application pays a merchant at a POS using the proxy account credentials. The user may interact with the mobile application through any appropriate electronic interface. The proxy account credentials can be transferred from the mobile device to the POS using any appropriate technology, such as by NFC or encrypted Wi-Fi. The merchant's POS then presents the credentials to the payment processor to verify the credentials and receive payment. In some instances, the actions ofblock 1220 are performed quickly enough that it is significantly in “real-time” from the perception of a human consumer. -
Block 1220 may further include the mobile application writing metadata to repository 1106 (FIG. 11 ) to indicate that a particular proxy account has been used. The number of unused proxy accounts is then decreased by one. In some embodiments, the used proxy account may be designated as single-use-only, perhaps by a default rule. In such case, the particular proxy account may be indicated as retired using metadata. In other instances, the particular proxy account may be usable more than once, perhaps for a specified number of times or only at a specified merchant. In such cases, the metadata may indicate that the account has been used but it is not necessarily retired. - In
block 1230, the mobile application allows the user to manage the proxy accounts on-line. For instance, in some embodiments,mobile application 1102 provides an interface, such as that shown inFIGS. 2-7 , to a human user. The human user then may manage settings, such as default rules for locally-batched or mobile-downloaded accounts. In some instances, the user may set rules during a transaction or at a different time. Some embodiments may also allow a user to review payments and manually prompt the download of additional account credentials from the mobile interface. - In a example use scenario, the user has a mobile application running on a mobile device. The user may interact with the mobile application to download account credentials, such as by using a touch screen interface or other interface to cause the mobile application to send a request for account credentials to the payment processor. Additionally or alternatively, the mobile application itself may automatically request one or more account credentials from the payment processor as appropriate. In such examples, the mobile application may include an identifier of the user in the request so that the payment processor may verify that the request is proper and may track proxy account creation locally.
- The user goes to a brick and mortar store that has a point of sale, and the user brings a mobile device that runs a mobile application that provides proxy account payment/management functionality. The user approaches the POS to pay for a transaction. In an NFC scenario, the mobile application causes a transceiver of the mobile device to communicate with the POS, receiving the transaction amount and merchant identification from the POS and providing proxy account credentials to the POS authorized for the transaction amount. The POS then provides the account credentials and transaction amount to the payment processor for verification along with an identification of the merchant sufficient to route money from the payment processor to an account of the merchant. The payment processor verifies the payment (if appropriate), schedules payment to the merchant, and provides a verification to the POS. The POS then communicates with the mobile application to indicate that the transaction is complete.
-
FIG. 13 is an illustration of method 1300, adapted according to one embodiment, to manage electronic payment accounts and to conduct transactions at a POS using proxy accounts. Method 1300 may be performed in some embodiments by a program at one or more computers of a payment processor, such aspayment processor 1008 ofFIG. 10 . - In
block 1310, the computer sends proxy account credentials to a mobile device. In some instances, the computer may send a batch of account credentials to the mobile device to cache and use offline. In other embodiments, the computer may send one or more account credentials during a transaction that the mobile device is facilitating. The computer may send the proxy account credentials in response to a request from the mobile application and/or may push proxy account credentials to the mobile application as appropriate. In some examples, the mobile application presents identifying information (e.g., user account/password, primary account credentials, and/or an encryption key) to the payment processor so that the payment processor may create proxy accounts for the correct primary account and also verify that the mobile application is genuine to prevent fraud. - Furthermore, in some embodiments, the computer may send the account credentials in an encrypted or otherwise secure form over a wireless or wired network, such as over the Internet and/or through a cellular network. In any event, the computer may send the proxy account credentials in response to a prompt by the mobile device or in response to any other stimulus.
- In
block 1320, the computer processes a payment to a merchant using a proxy account. For instance, when the merchant receives the proxy account credentials from the mobile application, the merchant may forward those credentials, the transaction amount, and an identifier of the merchant to the payment processor in order to receive payment therefrom. The payment processor analyzes the proxy account credentials, and if valid and in accordance with applicable rules, the payment processor then provides a verification to the merchant and schedules a transfer of money to the merchant. In some instances, the payment processor may verify that the primary account has sufficient funds to cover the transaction. As described above, at the payment processor the payment is cleared through a primary account or other payment facility that is linked to the proxy account but not known to the merchant. The payment processor may transfer money to the merchant using identifying information from the merchant, such as a bank routing number or other information. - In some instances, the user may be enrolled in a scrip program. An example is when a store teams with a school for a school fundraiser, wherein a portion of sales from scrip participants at the store goes to the school. In order to facilitate scrip participation, the user may notify the payment processor that its payment to a particular merchant should be linked to a particular scrip program. The payment processor saves this information in a database, and when the user makes a payment to the merchant, the payment processor notifies the merchant and/or the scrip program to ensure that the transaction is properly linked to the scrip program.
- In
block 1330, the payment processor provides a facility for the user to manage proxy accounts. For instance, in some embodiments, the payment processor allows access to the account management features through an interface, such as that shown inFIGS. 2-7 , to a human user. The human user then may manage settings, such as default rules for locally-batched or mobile downloaded accounts. - The scope of embodiments is not limited to the actions shown in
FIGS. 12 and 13 . For instance, other embodiments may add, omit, modify, or rearrange any actions. In one example, other embodiments may allow for any communication between and among the payment processor, the mobile application, and the merchant as appropriate to facilitate a transaction. - Embodiments adapted for use at POSs may provide various advantages. For instance, in the context of Automatic Teller Machines (ATMs), thieves may use skimmers to capture card numbers and Personal Identification Numbers (PINs) from users often without being caught. A skimmer is often a façade placed over an ATM that looks unsuspicious yet has magnetic-reading and optical capture technology. As POS payments become more popular, e.g., using NFC, the presentation of user account credentials may become a target of skimming technology. However, proxy accounts that can be limited to a single merchant and/or to a single transaction deny the skimmers credentials that can be useful elsewhere or at a later time.
-
FIG. 14 is a simplified block diagram of an exampleelectronic device 1400 on which the account owner may interact with the POS and/or the payment service according to various aspects of the present disclosure. Theelectronic device 1400 may be a portable personal electronic device, such as a smart phone, laptop, or a tablet. Theelectronic device 1400 may also be a more powerful computer, for example a server computer. Theelectronic device 1400 includes an input/output interface 1410. Theinterface 1410 is operable to receive an input from a user and communicate an output to the user. In an embodiment, the input/output interface 1410 includes a visual display unit, for example a touch-sensitive screen. Input/output interface 101 may display a graphical interface, such asinterface 200 ofFIGS. 2-7 . - The
electronic device 1400 includes atransceiver 1420. Thetransceiver 1420 is operable to electronically communicate with external devices. In an embodiment, thetransceiver 1420 is operable to wirelessly communicate with a POS, cellular towers, or other network access points and infrastructure. Theelectronic device 1400 also includes acomputer processor 1430 that is operable to execute computer instructions and amemory storage 1440 that is operable to store the computer instructions. - The
memory storage 1440 also contains a program module that is an embodiment of the application that interacts with the POS, the account owner, and/or the payment service. The program module operates to provide action such as receiving owner input to create a proxy payment account. -
FIG. 15 is a block diagram of acomputer system 1500 suitable for implementing various methods and devices described herein, for example, the various method blocks of themethods computer system 1500 may represent a computer upon which the account owner seesinterface 200 and/or make a payment at a POS. In another example, thecomputer system 1500 may represent a server computer or other type of computer that can be used as part of an account management or payment processing infrastructure at a payment service. Accordingly, it should be appreciated that each of the devices may be implemented as thecomputer system 1500 for communication with a network in a manner as follows. - In accordance with various embodiments of the present disclosure, the
computer system 1500, such as a mobile communications device and/or a network server, includes abus component 1502 or other communication mechanisms for communicating information, which interconnects subsystems and components, such as processing component 1504 (e.g., processor, micro-controller, digital signal processor (DSP), etc.), system memory component 1506 (e.g., RAM), static storage component 1508 (e.g., ROM), disk drive component 1510 (e.g., magnetic or optical), network interface component 1512 (e.g., modem or Ethernet card), display component 1514 (e.g., touch-screens, cathode ray tube (CRT) displays, or liquid crystal display (LCD)), input component 1516 (e.g., keyboard or touch-sensitive components operable to detect a touch by a human body), cursor control component 1518 (e.g., mouse or trackball), and image capture component 1520 (e.g., analog or digital camera). In one implementation,disk drive component 1510 may comprise a database having one or more disk drive components. - In accordance with embodiments of the present disclosure,
computer system 1500 performs specific operations byprocessor 1504 executing one or more sequences of one or more instructions contained insystem memory component 1506. Such instructions may be read intosystem memory component 1506 from another computer readable medium, such asstatic storage component 1508 ordisk drive component 1510. In other embodiments, hard-wired circuitry may be used in place of (or in combination with) software instructions to implement the present disclosure. - Logic may be encoded in a computer readable, non-transitory medium, which may refer to any medium that participates in providing instructions to
processor 1504 for execution. Such a medium may take many forms, including but not limited to, non-volatile media and volatile media. In various implementations, non-volatile media includes optical or magnetic disks, such asdisk drive component 1510, and volatile media includes dynamic memory, such assystem memory component 1506. - Some common forms of computer readable media includes, for example, floppy disk, flexible disk, hard disk, magnetic tape, any other magnetic medium, CD-ROM, any other optical medium, punch cards, paper tape, any other physical medium with patterns of holes, RAM, PROM, EPROM, FLASH-EPROM, any other memory chip or cartridge, or any other medium from which a computer is adapted to read.
- In various embodiments of the present disclosure, execution of instruction sequences to practice the present disclosure may be performed by
computer system 1500. In various other embodiments of the present disclosure, a plurality ofcomputer systems 1500 coupled by communication link 1530 (e.g., a communications network, such as a LAN, WLAN, PTSN, and/or various other wired or wireless networks, including telecommunications, mobile, and cellular phone networks) may perform instruction sequences to practice the present disclosure in coordination with one another. -
Computer system 1500 may transmit and receive messages, data, information and instructions, including one or more programs (i.e., application code) throughcommunication link 1530 andcommunication interface 1512. Received program code may be executed byprocessor 1504 as received and/or stored indisk drive component 1510 or some other storage component for execution. - Where applicable, various embodiments provided by the present disclosure may be implemented using hardware, software, or combinations of hardware and software. Also, where applicable, the various hardware components and/or software components set forth herein may be combined into composite components comprising software, hardware, and/or both without departing from the spirit of the present disclosure. Where applicable, the various hardware components and/or software components set forth herein may be separated into sub-components comprising software, hardware, or both without departing from the scope of the present disclosure. In addition, where applicable, it is contemplated that software components may be implemented as hardware components and vice-versa.
- Software, in accordance with the present disclosure, such as computer program code and/or data, may be stored on one or more computer readable mediums. It is also contemplated that software identified herein may be implemented using one or more general purpose or specific purpose computers and/or computer systems, networked and/or otherwise. Where applicable, the ordering of various steps described herein may be changed, combined into composite steps, and/or separated into sub-steps to provide features described herein.
- It should be appreciated that like reference numerals are used to identify like elements illustrated in one or more of the figures, wherein these labeled figures are for purposes of illustrating embodiments of the present disclosure and not for purposes of limiting the same.
- The foregoing disclosure is not intended to limit the present disclosure to the precise forms or particular fields of use disclosed. As such, it is contemplated that various alternate embodiments and/or modifications to the present disclosure, whether explicitly described or implied herein, are possible in light of the disclosure. Having thus described embodiments of the present disclosure, persons of ordinary skill in the art will recognize that changes may be made in form and detail without departing from the scope of the present disclosure. Thus, the present disclosure is limited only by the claims.
Claims (20)
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US13/482,425 US9105021B2 (en) | 2012-03-15 | 2012-05-29 | Systems, methods, and computer program products for using proxy accounts |
US14/796,649 US10679213B2 (en) | 2012-03-15 | 2015-07-10 | Systems, methods, and computer program products for using proxy accounts |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US13/420,888 US20130246267A1 (en) | 2012-03-15 | 2012-03-15 | Systems, Methods, and Computer Program Products for Using Proxy Accounts |
US13/482,425 US9105021B2 (en) | 2012-03-15 | 2012-05-29 | Systems, methods, and computer program products for using proxy accounts |
Related Parent Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US13/420,888 Continuation-In-Part US20130246267A1 (en) | 2012-03-15 | 2012-03-15 | Systems, Methods, and Computer Program Products for Using Proxy Accounts |
Related Child Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US14/796,649 Continuation US10679213B2 (en) | 2012-03-15 | 2015-07-10 | Systems, methods, and computer program products for using proxy accounts |
Publications (2)
Publication Number | Publication Date |
---|---|
US20130246202A1 true US20130246202A1 (en) | 2013-09-19 |
US9105021B2 US9105021B2 (en) | 2015-08-11 |
Family
ID=49158540
Family Applications (2)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US13/482,425 Active 2033-06-10 US9105021B2 (en) | 2012-03-15 | 2012-05-29 | Systems, methods, and computer program products for using proxy accounts |
US14/796,649 Active 2034-06-01 US10679213B2 (en) | 2012-03-15 | 2015-07-10 | Systems, methods, and computer program products for using proxy accounts |
Family Applications After (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US14/796,649 Active 2034-06-01 US10679213B2 (en) | 2012-03-15 | 2015-07-10 | Systems, methods, and computer program products for using proxy accounts |
Country Status (1)
Country | Link |
---|---|
US (2) | US9105021B2 (en) |
Cited By (162)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8827154B2 (en) | 2009-05-15 | 2014-09-09 | Visa International Service Association | Verification of portable consumer devices |
US20140366106A1 (en) * | 2013-06-05 | 2014-12-11 | Samsung Electronics Co., Ltd. | Apparatus and method for processing data of applet included in a plurality of secure elements |
US9038886B2 (en) | 2009-05-15 | 2015-05-26 | Visa International Service Association | Verification of portable consumer devices |
US20150242843A1 (en) * | 2011-12-21 | 2015-08-27 | Mastercard International Incorporated | Methods and systems for providing a payment account with adaptive interchange |
US9256871B2 (en) | 2012-07-26 | 2016-02-09 | Visa U.S.A. Inc. | Configurable payment tokens |
US9280765B2 (en) | 2011-04-11 | 2016-03-08 | Visa International Service Association | Multiple tokenization for authentication |
US9317848B2 (en) | 2009-05-15 | 2016-04-19 | Visa International Service Association | Integration of verification tokens with mobile communication devices |
US9372971B2 (en) | 2009-05-15 | 2016-06-21 | Visa International Service Association | Integration of verification tokens with portable computing devices |
US9424413B2 (en) | 2010-02-24 | 2016-08-23 | Visa International Service Association | Integration of payment capability into secure elements of computers |
US9516487B2 (en) | 2013-11-19 | 2016-12-06 | Visa International Service Association | Automated account provisioning |
US9524501B2 (en) | 2012-06-06 | 2016-12-20 | Visa International Service Association | Method and system for correlating diverse transaction data |
US9530131B2 (en) | 2008-07-29 | 2016-12-27 | Visa U.S.A. Inc. | Transaction processing using a global unique identifier |
US9547769B2 (en) | 2012-07-03 | 2017-01-17 | Visa International Service Association | Data protection hub |
US20170039546A1 (en) * | 2015-08-05 | 2017-02-09 | Alibaba Group Holding Limited | Method and Apparatus for Service Authentication Cross-Reference to Related Applications |
US9574896B2 (en) | 2015-02-13 | 2017-02-21 | Apple Inc. | Navigation user interface |
US9582801B2 (en) | 2009-05-15 | 2017-02-28 | Visa International Service Association | Secure communication of payment information to merchants using a verification token |
US9665722B2 (en) | 2012-08-10 | 2017-05-30 | Visa International Service Association | Privacy firewall |
US9680942B2 (en) | 2014-05-01 | 2017-06-13 | Visa International Service Association | Data verification using access device |
US9704155B2 (en) | 2011-07-29 | 2017-07-11 | Visa International Service Association | Passing payment tokens through an hop/sop |
US9715681B2 (en) | 2009-04-28 | 2017-07-25 | Visa International Service Association | Verification of portable consumer devices |
US9741051B2 (en) | 2013-01-02 | 2017-08-22 | Visa International Service Association | Tokenization and third-party interaction |
US9775029B2 (en) | 2014-08-22 | 2017-09-26 | Visa International Service Association | Embedding cloud-based functionalities in a communication device |
US9780953B2 (en) | 2014-07-23 | 2017-10-03 | Visa International Service Association | Systems and methods for secure detokenization |
US9792611B2 (en) | 2009-05-15 | 2017-10-17 | Visa International Service Association | Secure authentication system and method |
US9830595B2 (en) | 2012-01-26 | 2017-11-28 | Visa International Service Association | System and method of providing tokenization as a service |
US9842330B1 (en) | 2016-09-06 | 2017-12-12 | Apple Inc. | User interfaces for stored-value accounts |
US9847999B2 (en) | 2016-05-19 | 2017-12-19 | Apple Inc. | User interface for a device requesting remote authorization |
US9846878B2 (en) | 2014-01-14 | 2017-12-19 | Visa International Service Association | Payment account identifier system |
US9848052B2 (en) | 2014-05-05 | 2017-12-19 | Visa International Service Association | System and method for token domain control |
US9846861B2 (en) | 2012-07-25 | 2017-12-19 | Visa International Service Association | Upstream and downstream data conversion |
US9858572B2 (en) | 2014-02-06 | 2018-01-02 | Google Llc | Dynamic alteration of track data |
US9898740B2 (en) | 2008-11-06 | 2018-02-20 | Visa International Service Association | Online challenge-response |
US9911118B2 (en) | 2012-11-21 | 2018-03-06 | Visa International Service Association | Device pairing via trusted intermediary |
US9911123B2 (en) | 2014-05-29 | 2018-03-06 | Apple Inc. | User interface for payments |
US9922322B2 (en) | 2013-12-19 | 2018-03-20 | Visa International Service Association | Cloud-based transactions with magnetic secure transmission |
US9940637B2 (en) | 2015-06-05 | 2018-04-10 | Apple Inc. | User interface for loyalty accounts and private label accounts |
US9942043B2 (en) | 2014-04-23 | 2018-04-10 | Visa International Service Association | Token security on a communication device |
US9959531B2 (en) | 2011-08-18 | 2018-05-01 | Visa International Service Association | Multi-directional wallet connector apparatuses, methods and systems |
US9967401B2 (en) | 2014-05-30 | 2018-05-08 | Apple Inc. | User interface for phone call routing among devices |
US9972005B2 (en) | 2013-12-19 | 2018-05-15 | Visa International Service Association | Cloud-based transactions methods and systems |
US9978062B2 (en) | 2013-05-15 | 2018-05-22 | Visa International Service Association | Mobile tokenization hub |
US9978094B2 (en) | 2013-10-11 | 2018-05-22 | Visa International Service Association | Tokenization revocation list |
US9996835B2 (en) | 2013-07-24 | 2018-06-12 | Visa International Service Association | Systems and methods for communicating token attributes associated with a token vault |
US9998978B2 (en) | 2015-04-16 | 2018-06-12 | Visa International Service Association | Systems and methods for processing dormant virtual access devices |
US10015147B2 (en) | 2014-10-22 | 2018-07-03 | Visa International Service Association | Token enrollment system and method |
US10026087B2 (en) | 2014-04-08 | 2018-07-17 | Visa International Service Association | Data passed in an interaction |
US10043178B2 (en) | 2007-06-25 | 2018-08-07 | Visa International Service Association | Secure mobile payment system |
US10066959B2 (en) | 2014-09-02 | 2018-09-04 | Apple Inc. | User interactions for a mapping application |
US10078832B2 (en) | 2011-08-24 | 2018-09-18 | Visa International Service Association | Method for using barcodes and mobile devices to conduct payment transactions |
US10083433B2 (en) * | 2014-03-13 | 2018-09-25 | First Data Corporation | Systems and methods for managing accounts |
US10096009B2 (en) | 2015-01-20 | 2018-10-09 | Visa International Service Association | Secure payment processing using authorization request |
US10121129B2 (en) | 2011-07-05 | 2018-11-06 | Visa International Service Association | Electronic wallet checkout platform apparatuses, methods and systems |
US10140615B2 (en) | 2014-09-22 | 2018-11-27 | Visa International Service Association | Secure mobile device credential provisioning using risk decision non-overrides |
US10147089B2 (en) | 2012-01-05 | 2018-12-04 | Visa International Service Association | Data protection with translation |
US10154084B2 (en) | 2011-07-05 | 2018-12-11 | Visa International Service Association | Hybrid applications utilizing distributed models and views apparatuses, methods and systems |
US10164996B2 (en) | 2015-03-12 | 2018-12-25 | Visa International Service Association | Methods and systems for providing a low value token buffer |
US10176478B2 (en) | 2012-10-23 | 2019-01-08 | Visa International Service Association | Transaction initiation determination system utilizing transaction data elements |
US10187363B2 (en) | 2014-12-31 | 2019-01-22 | Visa International Service Association | Hybrid integration of software development kit with secure execution environment |
US10192216B2 (en) | 2012-09-11 | 2019-01-29 | Visa International Service Association | Cloud-based virtual wallet NFC apparatuses, methods and systems |
US10216351B2 (en) | 2015-03-08 | 2019-02-26 | Apple Inc. | Device configuration user interface |
US10223691B2 (en) | 2011-02-22 | 2019-03-05 | Visa International Service Association | Universal electronic payment apparatuses, methods and systems |
US10223710B2 (en) | 2013-01-04 | 2019-03-05 | Visa International Service Association | Wearable intelligent vision device apparatuses, methods and systems |
US10223730B2 (en) | 2011-09-23 | 2019-03-05 | Visa International Service Association | E-wallet store injection search apparatuses, methods and systems |
US10242358B2 (en) | 2011-08-18 | 2019-03-26 | Visa International Service Association | Remote decoupled application persistent state apparatuses, methods and systems |
US10243958B2 (en) | 2016-01-07 | 2019-03-26 | Visa International Service Association | Systems and methods for device push provisoning |
US10250735B2 (en) | 2013-10-30 | 2019-04-02 | Apple Inc. | Displaying relevant user interface objects |
US10255456B2 (en) | 2014-09-26 | 2019-04-09 | Visa International Service Association | Remote server encrypted data provisioning system and methods |
US10255595B2 (en) | 2015-02-01 | 2019-04-09 | Apple Inc. | User interface for payments |
US10255601B2 (en) | 2010-02-25 | 2019-04-09 | Visa International Service Association | Multifactor authentication using a directory server |
US10255591B2 (en) | 2009-12-18 | 2019-04-09 | Visa International Service Association | Payment channel returning limited use proxy dynamic value |
US10257185B2 (en) | 2014-12-12 | 2019-04-09 | Visa International Service Association | Automated access data provisioning |
US10262001B2 (en) | 2012-02-02 | 2019-04-16 | Visa International Service Association | Multi-source, multi-dimensional, cross-entity, multimedia merchant analytics database platform apparatuses, methods and systems |
US10262308B2 (en) | 2007-06-25 | 2019-04-16 | Visa U.S.A. Inc. | Cardless challenge systems and methods |
US10272294B2 (en) | 2016-06-11 | 2019-04-30 | Apple Inc. | Activity and workout updates |
US10282724B2 (en) | 2012-03-06 | 2019-05-07 | Visa International Service Association | Security system incorporating mobile device |
US10289999B2 (en) | 2005-09-06 | 2019-05-14 | Visa U.S.A. Inc. | System and method for secured account numbers in proximity devices |
US10304047B2 (en) | 2012-12-07 | 2019-05-28 | Visa International Service Association | Token generating component |
US10313321B2 (en) | 2016-04-07 | 2019-06-04 | Visa International Service Association | Tokenization of co-network accounts |
US10325261B2 (en) | 2014-11-25 | 2019-06-18 | Visa International Service Association | Systems communications with non-sensitive identifiers |
US10324590B2 (en) | 2014-09-02 | 2019-06-18 | Apple Inc. | Reduced size configuration interface |
US10333921B2 (en) | 2015-04-10 | 2019-06-25 | Visa International Service Association | Browser integration with Cryptogram |
US10332079B2 (en) | 2015-06-05 | 2019-06-25 | Apple Inc. | User interface for loyalty accounts and private label accounts for a wearable device |
US10339293B2 (en) | 2014-08-15 | 2019-07-02 | Apple Inc. | Authenticated device used to unlock another device |
US10361856B2 (en) | 2016-06-24 | 2019-07-23 | Visa International Service Association | Unique token authentication cryptogram |
US10366387B2 (en) | 2013-10-29 | 2019-07-30 | Visa International Service Association | Digital wallet system and method |
US10373133B2 (en) | 2010-03-03 | 2019-08-06 | Visa International Service Association | Portable account number for consumer payment account |
US10395128B2 (en) | 2017-09-09 | 2019-08-27 | Apple Inc. | Implementation of biometric authentication |
US10433128B2 (en) | 2014-01-07 | 2019-10-01 | Visa International Service Association | Methods and systems for provisioning multiple devices |
US20190324391A1 (en) * | 2018-04-19 | 2019-10-24 | Konica Minolta, Inc. | Fixation apparatus and image forming apparatus |
US10484345B2 (en) | 2014-07-31 | 2019-11-19 | Visa International Service Association | System and method for identity verification across mobile applications |
US10491389B2 (en) | 2017-07-14 | 2019-11-26 | Visa International Service Association | Token provisioning utilizing a secure authentication system |
US10489779B2 (en) | 2013-10-21 | 2019-11-26 | Visa International Service Association | Multi-network token bin routing with defined verification parameters |
US10496986B2 (en) | 2013-08-08 | 2019-12-03 | Visa International Service Association | Multi-network tokenization processing |
US10509779B2 (en) | 2016-09-14 | 2019-12-17 | Visa International Service Association | Self-cleaning token vault |
US10510073B2 (en) | 2013-08-08 | 2019-12-17 | Visa International Service Association | Methods and systems for provisioning mobile devices with payment credentials |
US10515358B2 (en) | 2013-10-18 | 2019-12-24 | Visa International Service Association | Contextual transaction token methods and systems |
US10521579B2 (en) | 2017-09-09 | 2019-12-31 | Apple Inc. | Implementation of biometric authentication |
US10552834B2 (en) | 2015-04-30 | 2020-02-04 | Visa International Service Association | Tokenization capable authentication framework |
US10586229B2 (en) | 2010-01-12 | 2020-03-10 | Visa International Service Association | Anytime validation tokens |
US10586227B2 (en) | 2011-02-16 | 2020-03-10 | Visa International Service Association | Snap mobile payment apparatuses, methods and systems |
US10621581B2 (en) | 2016-06-11 | 2020-04-14 | Apple Inc. | User interface for transactions |
US10664844B2 (en) | 2015-12-04 | 2020-05-26 | Visa International Service Association | Unique code for token verification |
US10726413B2 (en) | 2010-08-12 | 2020-07-28 | Visa International Service Association | Securing external systems with account token substitution |
US10733604B2 (en) | 2007-09-13 | 2020-08-04 | Visa U.S.A. Inc. | Account permanence |
US10740731B2 (en) | 2013-01-02 | 2020-08-11 | Visa International Service Association | Third party settlement |
US10769628B2 (en) | 2014-10-24 | 2020-09-08 | Visa Europe Limited | Transaction messaging |
US10783576B1 (en) | 2019-03-24 | 2020-09-22 | Apple Inc. | User interfaces for managing an account |
US10802703B2 (en) | 2015-03-08 | 2020-10-13 | Apple Inc. | Sharing user-configurable graphical constructs |
US10825001B2 (en) | 2011-08-18 | 2020-11-03 | Visa International Service Association | Multi-directional wallet connector apparatuses, methods and systems |
US10846683B2 (en) | 2009-05-15 | 2020-11-24 | Visa International Service Association | Integration of verification tokens with mobile communication devices |
US10846694B2 (en) | 2014-05-21 | 2020-11-24 | Visa International Service Association | Offline authentication |
US10860199B2 (en) | 2016-09-23 | 2020-12-08 | Apple Inc. | Dynamically adjusting touch hysteresis based on contextual data |
US10873786B2 (en) | 2016-06-12 | 2020-12-22 | Apple Inc. | Recording and broadcasting application visual output |
US10877720B2 (en) | 2015-06-07 | 2020-12-29 | Apple Inc. | Browser with docked tabs |
US10878422B2 (en) | 2013-06-17 | 2020-12-29 | Visa International Service Association | System and method using merchant token |
US10891610B2 (en) | 2013-10-11 | 2021-01-12 | Visa International Service Association | Network token system |
US10902418B2 (en) | 2017-05-02 | 2021-01-26 | Visa International Service Association | System and method using interaction token |
US10902421B2 (en) | 2013-07-26 | 2021-01-26 | Visa International Service Association | Provisioning payment credentials to a consumer |
US10915899B2 (en) | 2017-03-17 | 2021-02-09 | Visa International Service Association | Replacing token on a multi-token user device |
US10937031B2 (en) | 2012-05-04 | 2021-03-02 | Visa International Service Association | System and method for local data conversion |
US10977657B2 (en) | 2015-02-09 | 2021-04-13 | Visa International Service Association | Token processing utilizing multiple authorizations |
US10990967B2 (en) | 2016-07-19 | 2021-04-27 | Visa International Service Association | Method of distributing tokens and managing token relationships |
US11004043B2 (en) | 2009-05-20 | 2021-05-11 | Visa International Service Association | Device including encrypted data for expiration date and verification value creation |
US11019193B2 (en) | 2015-02-02 | 2021-05-25 | Apple Inc. | Device, method, and graphical user interface for establishing a relationship and connection between two devices |
US11023890B2 (en) | 2014-06-05 | 2021-06-01 | Visa International Service Association | Identification and verification for provisioning mobile application |
US11037138B2 (en) | 2011-08-18 | 2021-06-15 | Visa International Service Association | Third-party value added wallet features and interfaces apparatuses, methods, and systems |
US11037150B2 (en) | 2016-06-12 | 2021-06-15 | Apple Inc. | User interfaces for transactions |
US11055710B2 (en) | 2013-05-02 | 2021-07-06 | Visa International Service Association | Systems and methods for verifying and processing transactions using virtual currency |
US11068578B2 (en) | 2016-06-03 | 2021-07-20 | Visa International Service Association | Subtoken management system for connected devices |
US11068889B2 (en) | 2015-10-15 | 2021-07-20 | Visa International Service Association | Instant token issuance |
US11068899B2 (en) | 2016-06-17 | 2021-07-20 | Visa International Service Association | Token aggregation for multi-party transactions |
US11080696B2 (en) | 2016-02-01 | 2021-08-03 | Visa International Service Association | Systems and methods for code display and use |
US20210256517A1 (en) * | 2020-02-14 | 2021-08-19 | Mastercard International Incorporated | Method and System for Facilitating Secure Card-Based Transactions |
US20210334800A1 (en) * | 2018-05-17 | 2021-10-28 | Standard Chartered Bank | Methods, systems, and devices for managing communication requests from a plurality of users |
US11176554B2 (en) | 2015-02-03 | 2021-11-16 | Visa International Service Association | Validation identity tokens for transactions |
US11227274B2 (en) * | 2018-11-27 | 2022-01-18 | Mastercard International Incorporated | Computer system and computer-implemented method for processing a cashless payment transaction via a point-of-sale terminal |
US11238140B2 (en) | 2016-07-11 | 2022-02-01 | Visa International Service Association | Encryption key exchange process using access device |
US11250391B2 (en) | 2015-01-30 | 2022-02-15 | Visa International Service Association | Token check offline |
US11250424B2 (en) | 2016-05-19 | 2022-02-15 | Visa International Service Association | Systems and methods for creating subtokens using primary tokens |
US11256789B2 (en) | 2018-06-18 | 2022-02-22 | Visa International Service Association | Recurring token transactions |
US11257074B2 (en) | 2014-09-29 | 2022-02-22 | Visa International Service Association | Transaction risk based token |
US11288661B2 (en) | 2011-02-16 | 2022-03-29 | Visa International Service Association | Snap mobile payment apparatuses, methods and systems |
US11323443B2 (en) | 2016-11-28 | 2022-05-03 | Visa International Service Association | Access identifier provisioning to application |
US11354723B2 (en) | 2011-09-23 | 2022-06-07 | Visa International Service Association | Smart shopping cart with E-wallet store injection search |
US11356257B2 (en) | 2018-03-07 | 2022-06-07 | Visa International Service Association | Secure remote token release with online authentication |
US11386421B2 (en) | 2016-04-19 | 2022-07-12 | Visa International Service Association | Systems and methods for performing push transactions |
US11430571B2 (en) | 2014-05-30 | 2022-08-30 | Apple Inc. | Wellness aggregator |
US11469895B2 (en) | 2018-11-14 | 2022-10-11 | Visa International Service Association | Cloud token provisioning of multiple tokens |
US11494765B2 (en) | 2017-05-11 | 2022-11-08 | Visa International Service Association | Secure remote transaction system using mobile devices |
US11539831B2 (en) | 2013-03-15 | 2022-12-27 | Apple Inc. | Providing remote interactions with host device using a wireless device |
US11580519B2 (en) | 2014-12-12 | 2023-02-14 | Visa International Service Association | Provisioning platform for machine-to-machine devices |
US11620643B2 (en) | 2014-11-26 | 2023-04-04 | Visa International Service Association | Tokenization request via access device |
US11727392B2 (en) | 2011-02-22 | 2023-08-15 | Visa International Service Association | Multi-purpose virtual card transaction apparatuses, methods and systems |
US11777934B2 (en) | 2018-08-22 | 2023-10-03 | Visa International Service Association | Method and system for token provisioning and processing |
US11782575B2 (en) | 2018-05-07 | 2023-10-10 | Apple Inc. | User interfaces for sharing contextually relevant media content |
US11849042B2 (en) | 2019-05-17 | 2023-12-19 | Visa International Service Association | Virtual access credential interaction system and method |
US20240005318A1 (en) * | 2022-06-30 | 2024-01-04 | Ncr Corporation | Resource modeling, access, and security |
US11900361B2 (en) | 2016-02-09 | 2024-02-13 | Visa International Service Association | Resource provider account token provisioning and processing |
US12002042B2 (en) | 2016-06-11 | 2024-06-04 | Apple, Inc | User interface for transactions |
US12028337B2 (en) | 2018-10-08 | 2024-07-02 | Visa International Service Association | Techniques for token proximity transactions |
US12141800B2 (en) | 2021-02-12 | 2024-11-12 | Visa International Service Association | Interaction account tokenization system and method |
US12294630B2 (en) | 2021-08-10 | 2025-05-06 | Visa International Service Association | System and method for token domain control |
Families Citing this family (25)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US10867298B1 (en) | 2008-10-31 | 2020-12-15 | Wells Fargo Bank, N.A. | Payment vehicle with on and off function |
US20100114768A1 (en) | 2008-10-31 | 2010-05-06 | Wachovia Corporation | Payment vehicle with on and off function |
US20150026070A1 (en) * | 2013-07-16 | 2015-01-22 | Mastercard International Incorporated | Systems and methods for correlating cardholder identity attributes on a payment card network to determine payment card fraud |
US9710808B2 (en) * | 2013-09-16 | 2017-07-18 | Igor V. SLEPININ | Direct digital cash system and method |
US11429975B1 (en) | 2015-03-27 | 2022-08-30 | Wells Fargo Bank, N.A. | Token management system |
US11170364B1 (en) | 2015-07-31 | 2021-11-09 | Wells Fargo Bank, N.A. | Connected payment card systems and methods |
GB2551790A (en) * | 2016-06-30 | 2018-01-03 | Ipco 2012 Ltd | A method, apparatus and system for electronic payments |
US11935020B1 (en) | 2016-07-01 | 2024-03-19 | Wells Fargo Bank, N.A. | Control tower for prospective transactions |
US11615402B1 (en) | 2016-07-01 | 2023-03-28 | Wells Fargo Bank, N.A. | Access control tower |
US11886611B1 (en) | 2016-07-01 | 2024-01-30 | Wells Fargo Bank, N.A. | Control tower for virtual rewards currency |
US12130937B1 (en) | 2016-07-01 | 2024-10-29 | Wells Fargo Bank, N.A. | Control tower for prospective transactions |
US11386223B1 (en) | 2016-07-01 | 2022-07-12 | Wells Fargo Bank, N.A. | Access control tower |
US10992679B1 (en) | 2016-07-01 | 2021-04-27 | Wells Fargo Bank, N.A. | Access control tower |
US11556936B1 (en) | 2017-04-25 | 2023-01-17 | Wells Fargo Bank, N.A. | System and method for card control |
US11062388B1 (en) | 2017-07-06 | 2021-07-13 | Wells Fargo Bank, N.A | Data control tower |
US11188887B1 (en) | 2017-11-20 | 2021-11-30 | Wells Fargo Bank, N.A. | Systems and methods for payment information access management |
US11930439B2 (en) | 2019-01-09 | 2024-03-12 | Margo Networks Private Limited | Network control and optimization (NCO) system and method |
US10931778B2 (en) | 2019-01-09 | 2021-02-23 | Margo Networks Pvt. Ltd. | Content delivery network system and method |
US20210012321A1 (en) | 2019-07-08 | 2021-01-14 | Mastercard International Incorporated | Enhanced payment processing |
US10992606B1 (en) | 2020-09-04 | 2021-04-27 | Wells Fargo Bank, N.A. | Synchronous interfacing with unaffiliated networked systems to alter functionality of sets of electronic assets |
US11546338B1 (en) | 2021-01-05 | 2023-01-03 | Wells Fargo Bank, N.A. | Digital account controls portal and protocols for federated and non-federated systems and devices |
US12062068B2 (en) | 2021-05-04 | 2024-08-13 | Margo Networks Pvt. Ltd. | Oneapp system and method |
US11695855B2 (en) | 2021-05-17 | 2023-07-04 | Margo Networks Pvt. Ltd. | User generated pluggable content delivery network (CDN) system and method |
US12155641B1 (en) | 2022-04-15 | 2024-11-26 | Wells Fargo Bank, N.A. | Network access tokens and meta-application programming interfaces for enhanced inter-enterprise system data promulgation and profiling |
WO2023224680A1 (en) | 2022-05-18 | 2023-11-23 | Margo Networks Pvt. Ltd. | Peer to peer (p2p) encrypted data transfer/offload system and method |
Citations (39)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20020002538A1 (en) * | 2000-01-26 | 2002-01-03 | Ling Marvin T. | Method and apparatus for conducting electronic commerce transactions using electronic tokens |
US20050097060A1 (en) * | 2003-11-04 | 2005-05-05 | Lee Joo Y. | Method for electronic commerce using security token and apparatus thereof |
US6988657B1 (en) * | 2004-07-20 | 2006-01-24 | Irek Singer | Wireless payment processing system |
US20080103923A1 (en) * | 2006-10-31 | 2008-05-01 | Digital River, Inc. | Centralized Payment Gateway System and Method |
US20080283591A1 (en) * | 2007-05-17 | 2008-11-20 | Oder Ii John David | Secure payment card transactions |
US20090134217A1 (en) * | 1998-03-25 | 2009-05-28 | Orbis Patents Ltd. | Credit card system and method |
US7555460B1 (en) * | 2000-06-05 | 2009-06-30 | Diversinet Corp. | Payment system and method using tokens |
US20090240620A1 (en) * | 2008-03-24 | 2009-09-24 | Propay Usa, Inc. | Secure payment system |
US20090271287A1 (en) * | 2008-04-24 | 2009-10-29 | KIBOO LICENSING, LLC a Delaware limited liability company | Financial lifestyle navigator and banking system |
US20090294527A1 (en) * | 2008-06-02 | 2009-12-03 | Sears Brands, L.L.C. | System and method for payment card industry enterprise account number elimination |
US20100030697A1 (en) * | 2008-08-04 | 2010-02-04 | Propay, Inc. | End-to-end secure payment processes |
US20100094755A1 (en) * | 2008-10-09 | 2010-04-15 | Nelnet Business Solutions, Inc. | Providing payment data tokens for online transactions utilizing hosted inline frames |
US7761380B2 (en) * | 2006-09-28 | 2010-07-20 | Verifi, Inc. | System and method for authenticating a payment instrument transaction originating from a non-internet channel |
US20100257612A1 (en) * | 2009-04-07 | 2010-10-07 | Mcguire Kevin M | Token-based payment processing system |
WO2010126509A2 (en) * | 2009-04-30 | 2010-11-04 | Donald Michael Cardina | Systems and methods for randomized mobile payment |
US20110161233A1 (en) * | 2009-12-30 | 2011-06-30 | First Data Corporation | Secure transaction management |
US20110178884A1 (en) * | 2010-01-19 | 2011-07-21 | Mordechai Teicher | Trusted stored-value payment system that includes untrusted merchant terminals |
US20110208659A1 (en) * | 2006-08-15 | 2011-08-25 | Last Mile Technologies, Llc | Method and apparatus for making secure transactions using an internet accessible device and application |
US20110251892A1 (en) * | 2010-04-09 | 2011-10-13 | Kevin Laracey | Mobile Phone Payment Processing Methods and Systems |
US20110307710A1 (en) * | 2009-04-07 | 2011-12-15 | Princeton Payment Solutions | Tokenized Payment Processing Schemes |
US20110320344A1 (en) * | 2010-06-29 | 2011-12-29 | Patrick Faith | Evolving payment device |
US20120005038A1 (en) * | 2010-07-02 | 2012-01-05 | Saurabh Soman | System And Method For PCI-Compliant Transactions |
US8112353B2 (en) * | 2003-03-21 | 2012-02-07 | Ebay Inc. | Payment service to efficiently enable electronic payment |
US20120041881A1 (en) * | 2010-08-12 | 2012-02-16 | Gourab Basu | Securing external systems with account token substitution |
US20120078782A1 (en) * | 2008-06-25 | 2012-03-29 | Douglas Schoenberg | Method and system to process payment using url shortening and/or qr codes |
US20120203700A1 (en) * | 2010-12-10 | 2012-08-09 | Electronic Payment Exchange | Tokenized contactless payments for mobile devices |
US20120259782A1 (en) * | 2011-04-11 | 2012-10-11 | Ayman Hammad | Multiple tokenization for authentication |
US20120259781A1 (en) * | 2011-04-07 | 2012-10-11 | Fote Charles T | Broker-mediated payment systems and methods |
US20120267432A1 (en) * | 2010-11-12 | 2012-10-25 | Kuttuva Avinash | Secure payments with global mobile virtual wallet |
US20120317036A1 (en) * | 2011-06-07 | 2012-12-13 | Bower Mark F | Payment card processing system with structure preserving encryption |
US20130031006A1 (en) * | 2011-07-29 | 2013-01-31 | Mccullagh Niall | Passing payment tokens through an hop / sop |
US20130091061A1 (en) * | 2011-10-07 | 2013-04-11 | Mgt Plc | Secure payment system |
US20130097081A1 (en) * | 2011-10-12 | 2013-04-18 | Boost Payment Solutions, LLC | Electronic payment processing |
US20130110658A1 (en) * | 2011-05-05 | 2013-05-02 | Transaction Network Services, Inc. | Systems and methods for enabling mobile payments |
US8549279B1 (en) * | 2007-10-23 | 2013-10-01 | United Parcel Service Of America, Inc. | Encryption and tokenization architectures |
US20130275308A1 (en) * | 2010-11-29 | 2013-10-17 | Mobay Technologies Limited | System for verifying electronic transactions |
US20140032419A1 (en) * | 2012-07-26 | 2014-01-30 | Lisa Anderson | Configurable payment tokens |
US8655787B1 (en) * | 2010-06-29 | 2014-02-18 | Emc Corporation | Automated detection of defined input values and transformation to tokens |
US8682802B1 (en) * | 2011-11-09 | 2014-03-25 | Amazon Technologies, Inc. | Mobile payments using payment tokens |
Family Cites Families (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6422462B1 (en) | 1998-03-30 | 2002-07-23 | Morris E. Cohen | Apparatus and methods for improved credit cards and credit card transactions |
US7225156B2 (en) | 2001-07-11 | 2007-05-29 | Fisher Douglas C | Persistent dynamic payment service |
US20160314531A1 (en) * | 2009-04-27 | 2016-10-27 | Jpmorgan Chase Bank, N.A. | Targeted Benefit Account |
US8812395B2 (en) * | 2009-09-03 | 2014-08-19 | Virtual Piggy, Inc. | System and method for virtual piggybank |
US8620824B2 (en) * | 2010-05-28 | 2013-12-31 | Ca, Inc. | Pin protection for portable payment devices |
US8509431B2 (en) * | 2010-09-20 | 2013-08-13 | Interdigital Patent Holdings, Inc. | Identity management on a wireless device |
US9655787B2 (en) | 2010-11-19 | 2017-05-23 | Covenant Ministries Of Benevolence | Stacked moisture sensing device |
US20120226611A1 (en) * | 2011-03-01 | 2012-09-06 | Nimish Radia | Method and system for conducting a monetary transaction using a mobile communication device |
MX2013013165A (en) * | 2011-05-11 | 2014-09-01 | Mark Itwaru | Mobile image payment system. |
-
2012
- 2012-05-29 US US13/482,425 patent/US9105021B2/en active Active
-
2015
- 2015-07-10 US US14/796,649 patent/US10679213B2/en active Active
Patent Citations (39)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20090134217A1 (en) * | 1998-03-25 | 2009-05-28 | Orbis Patents Ltd. | Credit card system and method |
US20020002538A1 (en) * | 2000-01-26 | 2002-01-03 | Ling Marvin T. | Method and apparatus for conducting electronic commerce transactions using electronic tokens |
US7555460B1 (en) * | 2000-06-05 | 2009-06-30 | Diversinet Corp. | Payment system and method using tokens |
US8112353B2 (en) * | 2003-03-21 | 2012-02-07 | Ebay Inc. | Payment service to efficiently enable electronic payment |
US20050097060A1 (en) * | 2003-11-04 | 2005-05-05 | Lee Joo Y. | Method for electronic commerce using security token and apparatus thereof |
US6988657B1 (en) * | 2004-07-20 | 2006-01-24 | Irek Singer | Wireless payment processing system |
US20110208659A1 (en) * | 2006-08-15 | 2011-08-25 | Last Mile Technologies, Llc | Method and apparatus for making secure transactions using an internet accessible device and application |
US7761380B2 (en) * | 2006-09-28 | 2010-07-20 | Verifi, Inc. | System and method for authenticating a payment instrument transaction originating from a non-internet channel |
US20080103923A1 (en) * | 2006-10-31 | 2008-05-01 | Digital River, Inc. | Centralized Payment Gateway System and Method |
US20080283591A1 (en) * | 2007-05-17 | 2008-11-20 | Oder Ii John David | Secure payment card transactions |
US8549279B1 (en) * | 2007-10-23 | 2013-10-01 | United Parcel Service Of America, Inc. | Encryption and tokenization architectures |
US20090240620A1 (en) * | 2008-03-24 | 2009-09-24 | Propay Usa, Inc. | Secure payment system |
US20090271287A1 (en) * | 2008-04-24 | 2009-10-29 | KIBOO LICENSING, LLC a Delaware limited liability company | Financial lifestyle navigator and banking system |
US20090294527A1 (en) * | 2008-06-02 | 2009-12-03 | Sears Brands, L.L.C. | System and method for payment card industry enterprise account number elimination |
US20120078782A1 (en) * | 2008-06-25 | 2012-03-29 | Douglas Schoenberg | Method and system to process payment using url shortening and/or qr codes |
US20100030697A1 (en) * | 2008-08-04 | 2010-02-04 | Propay, Inc. | End-to-end secure payment processes |
US20100094755A1 (en) * | 2008-10-09 | 2010-04-15 | Nelnet Business Solutions, Inc. | Providing payment data tokens for online transactions utilizing hosted inline frames |
US20110307710A1 (en) * | 2009-04-07 | 2011-12-15 | Princeton Payment Solutions | Tokenized Payment Processing Schemes |
US20100257612A1 (en) * | 2009-04-07 | 2010-10-07 | Mcguire Kevin M | Token-based payment processing system |
WO2010126509A2 (en) * | 2009-04-30 | 2010-11-04 | Donald Michael Cardina | Systems and methods for randomized mobile payment |
US20110161233A1 (en) * | 2009-12-30 | 2011-06-30 | First Data Corporation | Secure transaction management |
US20110178884A1 (en) * | 2010-01-19 | 2011-07-21 | Mordechai Teicher | Trusted stored-value payment system that includes untrusted merchant terminals |
US20110251892A1 (en) * | 2010-04-09 | 2011-10-13 | Kevin Laracey | Mobile Phone Payment Processing Methods and Systems |
US20110320344A1 (en) * | 2010-06-29 | 2011-12-29 | Patrick Faith | Evolving payment device |
US8655787B1 (en) * | 2010-06-29 | 2014-02-18 | Emc Corporation | Automated detection of defined input values and transformation to tokens |
US20120005038A1 (en) * | 2010-07-02 | 2012-01-05 | Saurabh Soman | System And Method For PCI-Compliant Transactions |
US20120041881A1 (en) * | 2010-08-12 | 2012-02-16 | Gourab Basu | Securing external systems with account token substitution |
US20120267432A1 (en) * | 2010-11-12 | 2012-10-25 | Kuttuva Avinash | Secure payments with global mobile virtual wallet |
US20130275308A1 (en) * | 2010-11-29 | 2013-10-17 | Mobay Technologies Limited | System for verifying electronic transactions |
US20120203700A1 (en) * | 2010-12-10 | 2012-08-09 | Electronic Payment Exchange | Tokenized contactless payments for mobile devices |
US20120259781A1 (en) * | 2011-04-07 | 2012-10-11 | Fote Charles T | Broker-mediated payment systems and methods |
US20120259782A1 (en) * | 2011-04-11 | 2012-10-11 | Ayman Hammad | Multiple tokenization for authentication |
US20130110658A1 (en) * | 2011-05-05 | 2013-05-02 | Transaction Network Services, Inc. | Systems and methods for enabling mobile payments |
US20120317036A1 (en) * | 2011-06-07 | 2012-12-13 | Bower Mark F | Payment card processing system with structure preserving encryption |
US20130031006A1 (en) * | 2011-07-29 | 2013-01-31 | Mccullagh Niall | Passing payment tokens through an hop / sop |
US20130091061A1 (en) * | 2011-10-07 | 2013-04-11 | Mgt Plc | Secure payment system |
US20130097081A1 (en) * | 2011-10-12 | 2013-04-18 | Boost Payment Solutions, LLC | Electronic payment processing |
US8682802B1 (en) * | 2011-11-09 | 2014-03-25 | Amazon Technologies, Inc. | Mobile payments using payment tokens |
US20140032419A1 (en) * | 2012-07-26 | 2014-01-30 | Lisa Anderson | Configurable payment tokens |
Cited By (346)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US10922686B2 (en) | 2005-09-06 | 2021-02-16 | Visa U.S.A. Inc. | System and method for secured account numbers in proximity devices |
US12045812B2 (en) | 2005-09-06 | 2024-07-23 | Visa U.S.A. Inc. | System and method for secured account numbers in wireless devices |
US10289999B2 (en) | 2005-09-06 | 2019-05-14 | Visa U.S.A. Inc. | System and method for secured account numbers in proximity devices |
US11605074B2 (en) | 2005-09-06 | 2023-03-14 | Visa U.S.A. Inc. | System and method for secured account numbers in proximily devices |
US10262308B2 (en) | 2007-06-25 | 2019-04-16 | Visa U.S.A. Inc. | Cardless challenge systems and methods |
US10726416B2 (en) | 2007-06-25 | 2020-07-28 | Visa International Service Association | Secure mobile payment system |
US11481742B2 (en) | 2007-06-25 | 2022-10-25 | Visa U.S.A. Inc. | Cardless challenge systems and methods |
US10043178B2 (en) | 2007-06-25 | 2018-08-07 | Visa International Service Association | Secure mobile payment system |
US10733604B2 (en) | 2007-09-13 | 2020-08-04 | Visa U.S.A. Inc. | Account permanence |
US9530131B2 (en) | 2008-07-29 | 2016-12-27 | Visa U.S.A. Inc. | Transaction processing using a global unique identifier |
US9898740B2 (en) | 2008-11-06 | 2018-02-20 | Visa International Service Association | Online challenge-response |
US9715681B2 (en) | 2009-04-28 | 2017-07-25 | Visa International Service Association | Verification of portable consumer devices |
US10572864B2 (en) | 2009-04-28 | 2020-02-25 | Visa International Service Association | Verification of portable consumer devices |
US10997573B2 (en) | 2009-04-28 | 2021-05-04 | Visa International Service Association | Verification of portable consumer devices |
US10387871B2 (en) | 2009-05-15 | 2019-08-20 | Visa International Service Association | Integration of verification tokens with mobile communication devices |
US9792611B2 (en) | 2009-05-15 | 2017-10-17 | Visa International Service Association | Secure authentication system and method |
US10009177B2 (en) | 2009-05-15 | 2018-06-26 | Visa International Service Association | Integration of verification tokens with mobile communication devices |
US10049360B2 (en) | 2009-05-15 | 2018-08-14 | Visa International Service Association | Secure communication of payment information to merchants using a verification token |
US9904919B2 (en) | 2009-05-15 | 2018-02-27 | Visa International Service Association | Verification of portable consumer devices |
US9038886B2 (en) | 2009-05-15 | 2015-05-26 | Visa International Service Association | Verification of portable consumer devices |
US10846683B2 (en) | 2009-05-15 | 2020-11-24 | Visa International Service Association | Integration of verification tokens with mobile communication devices |
US12086787B2 (en) | 2009-05-15 | 2024-09-10 | Visa International Service Association | Integration of verification tokens with mobile communication devices |
US10043186B2 (en) | 2009-05-15 | 2018-08-07 | Visa International Service Association | Secure authentication system and method |
US8827154B2 (en) | 2009-05-15 | 2014-09-09 | Visa International Service Association | Verification of portable consumer devices |
US11574312B2 (en) | 2009-05-15 | 2023-02-07 | Visa International Service Association | Secure authentication system and method |
US9582801B2 (en) | 2009-05-15 | 2017-02-28 | Visa International Service Association | Secure communication of payment information to merchants using a verification token |
US9372971B2 (en) | 2009-05-15 | 2016-06-21 | Visa International Service Association | Integration of verification tokens with portable computing devices |
US9317848B2 (en) | 2009-05-15 | 2016-04-19 | Visa International Service Association | Integration of verification tokens with mobile communication devices |
US11004043B2 (en) | 2009-05-20 | 2021-05-11 | Visa International Service Association | Device including encrypted data for expiration date and verification value creation |
US11941591B2 (en) | 2009-05-20 | 2024-03-26 | Visa International Service Association | Device including encrypted data for expiration date and verification value creation |
US10255591B2 (en) | 2009-12-18 | 2019-04-09 | Visa International Service Association | Payment channel returning limited use proxy dynamic value |
US10586229B2 (en) | 2010-01-12 | 2020-03-10 | Visa International Service Association | Anytime validation tokens |
US9424413B2 (en) | 2010-02-24 | 2016-08-23 | Visa International Service Association | Integration of payment capability into secure elements of computers |
US10657528B2 (en) | 2010-02-24 | 2020-05-19 | Visa International Service Association | Integration of payment capability into secure elements of computers |
US9589268B2 (en) | 2010-02-24 | 2017-03-07 | Visa International Service Association | Integration of payment capability into secure elements of computers |
US10255601B2 (en) | 2010-02-25 | 2019-04-09 | Visa International Service Association | Multifactor authentication using a directory server |
US11900343B2 (en) | 2010-03-03 | 2024-02-13 | Visa International Service Association | Portable account number for consumer payment account |
US10373133B2 (en) | 2010-03-03 | 2019-08-06 | Visa International Service Association | Portable account number for consumer payment account |
US11803846B2 (en) | 2010-08-12 | 2023-10-31 | Visa International Service Association | Securing external systems with account token substitution |
US10726413B2 (en) | 2010-08-12 | 2020-07-28 | Visa International Service Association | Securing external systems with account token substitution |
US11847645B2 (en) | 2010-08-12 | 2023-12-19 | Visa International Service Association | Securing external systems with account token substitution |
US10586227B2 (en) | 2011-02-16 | 2020-03-10 | Visa International Service Association | Snap mobile payment apparatuses, methods and systems |
US11288661B2 (en) | 2011-02-16 | 2022-03-29 | Visa International Service Association | Snap mobile payment apparatuses, methods and systems |
US11023886B2 (en) | 2011-02-22 | 2021-06-01 | Visa International Service Association | Universal electronic payment apparatuses, methods and systems |
US10223691B2 (en) | 2011-02-22 | 2019-03-05 | Visa International Service Association | Universal electronic payment apparatuses, methods and systems |
US11727392B2 (en) | 2011-02-22 | 2023-08-15 | Visa International Service Association | Multi-purpose virtual card transaction apparatuses, methods and systems |
US9280765B2 (en) | 2011-04-11 | 2016-03-08 | Visa International Service Association | Multiple tokenization for authentication |
US10552828B2 (en) | 2011-04-11 | 2020-02-04 | Visa International Service Association | Multiple tokenization for authentication |
US10121129B2 (en) | 2011-07-05 | 2018-11-06 | Visa International Service Association | Electronic wallet checkout platform apparatuses, methods and systems |
US11900359B2 (en) | 2011-07-05 | 2024-02-13 | Visa International Service Association | Electronic wallet checkout platform apparatuses, methods and systems |
US11010753B2 (en) | 2011-07-05 | 2021-05-18 | Visa International Service Association | Electronic wallet checkout platform apparatuses, methods and systems |
US10154084B2 (en) | 2011-07-05 | 2018-12-11 | Visa International Service Association | Hybrid applications utilizing distributed models and views apparatuses, methods and systems |
US10803449B2 (en) | 2011-07-05 | 2020-10-13 | Visa International Service Association | Electronic wallet checkout platform apparatuses, methods and systems |
US10419529B2 (en) | 2011-07-05 | 2019-09-17 | Visa International Service Association | Hybrid applications utilizing distributed models and views apparatuses, methods and systems |
US10839374B2 (en) | 2011-07-29 | 2020-11-17 | Visa International Service Association | Passing payment tokens through an HOP / SOP |
US9704155B2 (en) | 2011-07-29 | 2017-07-11 | Visa International Service Association | Passing payment tokens through an hop/sop |
US11397931B2 (en) | 2011-08-18 | 2022-07-26 | Visa International Service Association | Multi-directional wallet connector apparatuses, methods and systems |
US10242358B2 (en) | 2011-08-18 | 2019-03-26 | Visa International Service Association | Remote decoupled application persistent state apparatuses, methods and systems |
US11803825B2 (en) | 2011-08-18 | 2023-10-31 | Visa International Service Association | Multi-directional wallet connector apparatuses, methods and systems |
US10825001B2 (en) | 2011-08-18 | 2020-11-03 | Visa International Service Association | Multi-directional wallet connector apparatuses, methods and systems |
US12277537B2 (en) | 2011-08-18 | 2025-04-15 | Visa International Service Association | Multi-directional wallet connector apparatuses, methods and systems |
US10354240B2 (en) | 2011-08-18 | 2019-07-16 | Visa International Service Association | Multi-directional wallet connector apparatuses, methods and systems |
US9959531B2 (en) | 2011-08-18 | 2018-05-01 | Visa International Service Association | Multi-directional wallet connector apparatuses, methods and systems |
US11037138B2 (en) | 2011-08-18 | 2021-06-15 | Visa International Service Association | Third-party value added wallet features and interfaces apparatuses, methods, and systems |
US11763294B2 (en) | 2011-08-18 | 2023-09-19 | Visa International Service Association | Remote decoupled application persistent state apparatuses, methods and systems |
US11010756B2 (en) | 2011-08-18 | 2021-05-18 | Visa International Service Association | Remote decoupled application persistent state apparatuses, methods and systems |
US10402815B2 (en) | 2011-08-24 | 2019-09-03 | Visa International Service Association | Method for using barcodes and mobile devices to conduct payment transactions |
US10078832B2 (en) | 2011-08-24 | 2018-09-18 | Visa International Service Association | Method for using barcodes and mobile devices to conduct payment transactions |
US10223730B2 (en) | 2011-09-23 | 2019-03-05 | Visa International Service Association | E-wallet store injection search apparatuses, methods and systems |
US11354723B2 (en) | 2011-09-23 | 2022-06-07 | Visa International Service Association | Smart shopping cart with E-wallet store injection search |
US10147084B2 (en) * | 2011-12-21 | 2018-12-04 | Mastercard International Incorporated | Methods and systems for providing a payment account with adaptive interchange |
US20150242843A1 (en) * | 2011-12-21 | 2015-08-27 | Mastercard International Incorporated | Methods and systems for providing a payment account with adaptive interchange |
US11276058B2 (en) | 2012-01-05 | 2022-03-15 | Visa International Service Association | Data protection with translation |
US10685379B2 (en) | 2012-01-05 | 2020-06-16 | Visa International Service Association | Wearable intelligent vision device apparatuses, methods and systems |
US10147089B2 (en) | 2012-01-05 | 2018-12-04 | Visa International Service Association | Data protection with translation |
US9830595B2 (en) | 2012-01-26 | 2017-11-28 | Visa International Service Association | System and method of providing tokenization as a service |
US10607217B2 (en) | 2012-01-26 | 2020-03-31 | Visa International Service Association | System and method of providing tokenization as a service |
US10430381B2 (en) | 2012-02-02 | 2019-10-01 | Visa International Service Association | Multi-source, multi-dimensional, cross-entity, multimedia centralized personal information database platform apparatuses, methods and systems |
US10262001B2 (en) | 2012-02-02 | 2019-04-16 | Visa International Service Association | Multi-source, multi-dimensional, cross-entity, multimedia merchant analytics database platform apparatuses, methods and systems |
US11074218B2 (en) | 2012-02-02 | 2021-07-27 | Visa International Service Association | Multi-source, multi-dimensional, cross-entity, multimedia merchant analytics database platform apparatuses, methods and systems |
US10983960B2 (en) | 2012-02-02 | 2021-04-20 | Visa International Service Association | Multi-source, multi-dimensional, cross-entity, multimedia centralized personal information database platform apparatuses, methods and systems |
US11036681B2 (en) | 2012-02-02 | 2021-06-15 | Visa International Service Association | Multi-source, multi-dimensional, cross-entity, multimedia analytical model sharing database platform apparatuses, methods and systems |
US10282724B2 (en) | 2012-03-06 | 2019-05-07 | Visa International Service Association | Security system incorporating mobile device |
US11995633B2 (en) | 2012-03-06 | 2024-05-28 | Visa International Service Association | Security system incorporating mobile device |
US10937031B2 (en) | 2012-05-04 | 2021-03-02 | Visa International Service Association | System and method for local data conversion |
US11037140B2 (en) | 2012-06-06 | 2021-06-15 | Visa International Service Association | Method and system for correlating diverse transaction data |
US9524501B2 (en) | 2012-06-06 | 2016-12-20 | Visa International Service Association | Method and system for correlating diverse transaction data |
US10296904B2 (en) | 2012-06-06 | 2019-05-21 | Visa International Service Association | Method and system for correlating diverse transaction data |
US9547769B2 (en) | 2012-07-03 | 2017-01-17 | Visa International Service Association | Data protection hub |
US9846861B2 (en) | 2012-07-25 | 2017-12-19 | Visa International Service Association | Upstream and downstream data conversion |
US9727858B2 (en) | 2012-07-26 | 2017-08-08 | Visa U.S.A. Inc. | Configurable payment tokens |
US9256871B2 (en) | 2012-07-26 | 2016-02-09 | Visa U.S.A. Inc. | Configurable payment tokens |
US10586054B2 (en) | 2012-08-10 | 2020-03-10 | Visa International Service Association | Privacy firewall |
US10204227B2 (en) | 2012-08-10 | 2019-02-12 | Visa International Service Association | Privacy firewall |
US9665722B2 (en) | 2012-08-10 | 2017-05-30 | Visa International Service Association | Privacy firewall |
US10853797B2 (en) | 2012-09-11 | 2020-12-01 | Visa International Service Association | Cloud-based virtual wallet NFC apparatuses, methods and systems |
US11715097B2 (en) | 2012-09-11 | 2023-08-01 | Visa International Service Association | Cloud-based virtual wallet NFC apparatuses, methods and systems |
US10192216B2 (en) | 2012-09-11 | 2019-01-29 | Visa International Service Association | Cloud-based virtual wallet NFC apparatuses, methods and systems |
US10176478B2 (en) | 2012-10-23 | 2019-01-08 | Visa International Service Association | Transaction initiation determination system utilizing transaction data elements |
US10614460B2 (en) | 2012-10-23 | 2020-04-07 | Visa International Service Association | Transaction initiation determination system utilizing transaction data elements |
US10692076B2 (en) | 2012-11-21 | 2020-06-23 | Visa International Service Association | Device pairing via trusted intermediary |
US9911118B2 (en) | 2012-11-21 | 2018-03-06 | Visa International Service Association | Device pairing via trusted intermediary |
US10304047B2 (en) | 2012-12-07 | 2019-05-28 | Visa International Service Association | Token generating component |
US10740731B2 (en) | 2013-01-02 | 2020-08-11 | Visa International Service Association | Third party settlement |
US9741051B2 (en) | 2013-01-02 | 2017-08-22 | Visa International Service Association | Tokenization and third-party interaction |
US10223710B2 (en) | 2013-01-04 | 2019-03-05 | Visa International Service Association | Wearable intelligent vision device apparatuses, methods and systems |
US11539831B2 (en) | 2013-03-15 | 2022-12-27 | Apple Inc. | Providing remote interactions with host device using a wireless device |
US11055710B2 (en) | 2013-05-02 | 2021-07-06 | Visa International Service Association | Systems and methods for verifying and processing transactions using virtual currency |
US9978062B2 (en) | 2013-05-15 | 2018-05-22 | Visa International Service Association | Mobile tokenization hub |
US11341491B2 (en) | 2013-05-15 | 2022-05-24 | Visa International Service Association | Mobile tokenization hub using dynamic identity information |
US11861607B2 (en) | 2013-05-15 | 2024-01-02 | Visa International Service Association | Mobile tokenization hub using dynamic identity information |
US20140366106A1 (en) * | 2013-06-05 | 2014-12-11 | Samsung Electronics Co., Ltd. | Apparatus and method for processing data of applet included in a plurality of secure elements |
US10878422B2 (en) | 2013-06-17 | 2020-12-29 | Visa International Service Association | System and method using merchant token |
US11017402B2 (en) | 2013-06-17 | 2021-05-25 | Visa International Service Association | System and method using authorization and direct credit messaging |
US11915235B2 (en) | 2013-07-24 | 2024-02-27 | Visa International Service Association | Systems and methods for communicating token attributes associated with a token vault |
US9996835B2 (en) | 2013-07-24 | 2018-06-12 | Visa International Service Association | Systems and methods for communicating token attributes associated with a token vault |
US11093936B2 (en) | 2013-07-24 | 2021-08-17 | Visa International Service Association | Systems and methods for communicating token attributes associated with a token vault |
US10902421B2 (en) | 2013-07-26 | 2021-01-26 | Visa International Service Association | Provisioning payment credentials to a consumer |
US11676138B2 (en) | 2013-08-08 | 2023-06-13 | Visa International Service Association | Multi-network tokenization processing |
US10496986B2 (en) | 2013-08-08 | 2019-12-03 | Visa International Service Association | Multi-network tokenization processing |
US10510073B2 (en) | 2013-08-08 | 2019-12-17 | Visa International Service Association | Methods and systems for provisioning mobile devices with payment credentials |
US11392939B2 (en) | 2013-08-08 | 2022-07-19 | Visa International Service Association | Methods and systems for provisioning mobile devices with payment credentials |
US12205110B2 (en) | 2013-10-11 | 2025-01-21 | Visa International Service Association | Network token system |
US10891610B2 (en) | 2013-10-11 | 2021-01-12 | Visa International Service Association | Network token system |
US11710119B2 (en) | 2013-10-11 | 2023-07-25 | Visa International Service Association | Network token system |
US9978094B2 (en) | 2013-10-11 | 2018-05-22 | Visa International Service Association | Tokenization revocation list |
US10515358B2 (en) | 2013-10-18 | 2019-12-24 | Visa International Service Association | Contextual transaction token methods and systems |
US10489779B2 (en) | 2013-10-21 | 2019-11-26 | Visa International Service Association | Multi-network token bin routing with defined verification parameters |
US10366387B2 (en) | 2013-10-29 | 2019-07-30 | Visa International Service Association | Digital wallet system and method |
US10250735B2 (en) | 2013-10-30 | 2019-04-02 | Apple Inc. | Displaying relevant user interface objects |
US10972600B2 (en) | 2013-10-30 | 2021-04-06 | Apple Inc. | Displaying relevant user interface objects |
US12088755B2 (en) | 2013-10-30 | 2024-09-10 | Apple Inc. | Displaying relevant user interface objects |
US11316968B2 (en) | 2013-10-30 | 2022-04-26 | Apple Inc. | Displaying relevant user interface objects |
US9516487B2 (en) | 2013-11-19 | 2016-12-06 | Visa International Service Association | Automated account provisioning |
US10248952B2 (en) | 2013-11-19 | 2019-04-02 | Visa International Service Association | Automated account provisioning |
US10664824B2 (en) | 2013-12-19 | 2020-05-26 | Visa International Service Association | Cloud-based transactions methods and systems |
US9972005B2 (en) | 2013-12-19 | 2018-05-15 | Visa International Service Association | Cloud-based transactions methods and systems |
US9922322B2 (en) | 2013-12-19 | 2018-03-20 | Visa International Service Association | Cloud-based transactions with magnetic secure transmission |
US10909522B2 (en) | 2013-12-19 | 2021-02-02 | Visa International Service Association | Cloud-based transactions methods and systems |
US11164176B2 (en) | 2013-12-19 | 2021-11-02 | Visa International Service Association | Limited-use keys and cryptograms |
US11017386B2 (en) | 2013-12-19 | 2021-05-25 | Visa International Service Association | Cloud-based transactions with magnetic secure transmission |
US11875344B2 (en) | 2013-12-19 | 2024-01-16 | Visa International Service Association | Cloud-based transactions with magnetic secure transmission |
US10402814B2 (en) | 2013-12-19 | 2019-09-03 | Visa International Service Association | Cloud-based transactions methods and systems |
US10433128B2 (en) | 2014-01-07 | 2019-10-01 | Visa International Service Association | Methods and systems for provisioning multiple devices |
US10269018B2 (en) | 2014-01-14 | 2019-04-23 | Visa International Service Association | Payment account identifier system |
US10062079B2 (en) | 2014-01-14 | 2018-08-28 | Visa International Service Association | Payment account identifier system |
US9846878B2 (en) | 2014-01-14 | 2017-12-19 | Visa International Service Association | Payment account identifier system |
US9858572B2 (en) | 2014-02-06 | 2018-01-02 | Google Llc | Dynamic alteration of track data |
US10083433B2 (en) * | 2014-03-13 | 2018-09-25 | First Data Corporation | Systems and methods for managing accounts |
US11100507B2 (en) | 2014-04-08 | 2021-08-24 | Visa International Service Association | Data passed in an interaction |
US10026087B2 (en) | 2014-04-08 | 2018-07-17 | Visa International Service Association | Data passed in an interaction |
US9942043B2 (en) | 2014-04-23 | 2018-04-10 | Visa International Service Association | Token security on a communication device |
US10404461B2 (en) | 2014-04-23 | 2019-09-03 | Visa International Service Association | Token security on a communication device |
US10904002B2 (en) | 2014-04-23 | 2021-01-26 | Visa International Service Association | Token security on a communication device |
US9680942B2 (en) | 2014-05-01 | 2017-06-13 | Visa International Service Association | Data verification using access device |
US11470164B2 (en) | 2014-05-01 | 2022-10-11 | Visa International Service Association | Data verification using access device |
US11122133B2 (en) | 2014-05-05 | 2021-09-14 | Visa International Service Association | System and method for token domain control |
US9848052B2 (en) | 2014-05-05 | 2017-12-19 | Visa International Service Association | System and method for token domain control |
US10846694B2 (en) | 2014-05-21 | 2020-11-24 | Visa International Service Association | Offline authentication |
US11842350B2 (en) | 2014-05-21 | 2023-12-12 | Visa International Service Association | Offline authentication |
US10043185B2 (en) | 2014-05-29 | 2018-08-07 | Apple Inc. | User interface for payments |
US10977651B2 (en) | 2014-05-29 | 2021-04-13 | Apple Inc. | User interface for payments |
US10748153B2 (en) | 2014-05-29 | 2020-08-18 | Apple Inc. | User interface for payments |
US10438205B2 (en) | 2014-05-29 | 2019-10-08 | Apple Inc. | User interface for payments |
US10796309B2 (en) | 2014-05-29 | 2020-10-06 | Apple Inc. | User interface for payments |
US10482461B2 (en) | 2014-05-29 | 2019-11-19 | Apple Inc. | User interface for payments |
US10282727B2 (en) | 2014-05-29 | 2019-05-07 | Apple Inc. | User interface for payments |
US11836725B2 (en) | 2014-05-29 | 2023-12-05 | Apple Inc. | User interface for payments |
US10902424B2 (en) | 2014-05-29 | 2021-01-26 | Apple Inc. | User interface for payments |
US9911123B2 (en) | 2014-05-29 | 2018-03-06 | Apple Inc. | User interface for payments |
US9967401B2 (en) | 2014-05-30 | 2018-05-08 | Apple Inc. | User interface for phone call routing among devices |
US10616416B2 (en) | 2014-05-30 | 2020-04-07 | Apple Inc. | User interface for phone call routing among devices |
US10178234B2 (en) | 2014-05-30 | 2019-01-08 | Apple, Inc. | User interface for phone call routing among devices |
US11430571B2 (en) | 2014-05-30 | 2022-08-30 | Apple Inc. | Wellness aggregator |
US11023890B2 (en) | 2014-06-05 | 2021-06-01 | Visa International Service Association | Identification and verification for provisioning mobile application |
US11568405B2 (en) | 2014-06-05 | 2023-01-31 | Visa International Service Association | Identification and verification for provisioning mobile application |
US9780953B2 (en) | 2014-07-23 | 2017-10-03 | Visa International Service Association | Systems and methods for secure detokenization |
US10038563B2 (en) | 2014-07-23 | 2018-07-31 | Visa International Service Association | Systems and methods for secure detokenization |
US10652028B2 (en) | 2014-07-23 | 2020-05-12 | Visa International Service Association | Systems and methods for secure detokenization |
US10484345B2 (en) | 2014-07-31 | 2019-11-19 | Visa International Service Association | System and method for identity verification across mobile applications |
US11770369B2 (en) | 2014-07-31 | 2023-09-26 | Visa International Service Association | System and method for identity verification across mobile applications |
US11252136B2 (en) | 2014-07-31 | 2022-02-15 | Visa International Service Association | System and method for identity verification across mobile applications |
US10339293B2 (en) | 2014-08-15 | 2019-07-02 | Apple Inc. | Authenticated device used to unlock another device |
US11126704B2 (en) | 2014-08-15 | 2021-09-21 | Apple Inc. | Authenticated device used to unlock another device |
US10049353B2 (en) | 2014-08-22 | 2018-08-14 | Visa International Service Association | Embedding cloud-based functionalities in a communication device |
US11783061B2 (en) | 2014-08-22 | 2023-10-10 | Visa International Service Association | Embedding cloud-based functionalities in a communication device |
US10477393B2 (en) | 2014-08-22 | 2019-11-12 | Visa International Service Association | Embedding cloud-based functionalities in a communication device |
US11036873B2 (en) | 2014-08-22 | 2021-06-15 | Visa International Service Association | Embedding cloud-based functionalities in a communication device |
US9775029B2 (en) | 2014-08-22 | 2017-09-26 | Visa International Service Association | Embedding cloud-based functionalities in a communication device |
US11733055B2 (en) | 2014-09-02 | 2023-08-22 | Apple Inc. | User interactions for a mapping application |
US12164747B2 (en) | 2014-09-02 | 2024-12-10 | Apple Inc. | Reduced size configuration interface |
US10936164B2 (en) | 2014-09-02 | 2021-03-02 | Apple Inc. | Reduced size configuration interface |
US10324590B2 (en) | 2014-09-02 | 2019-06-18 | Apple Inc. | Reduced size configuration interface |
US10579225B2 (en) | 2014-09-02 | 2020-03-03 | Apple Inc. | Reduced size configuration interface |
US10914606B2 (en) | 2014-09-02 | 2021-02-09 | Apple Inc. | User interactions for a mapping application |
US11609681B2 (en) | 2014-09-02 | 2023-03-21 | Apple Inc. | Reduced size configuration interface |
US10066959B2 (en) | 2014-09-02 | 2018-09-04 | Apple Inc. | User interactions for a mapping application |
US11087328B2 (en) | 2014-09-22 | 2021-08-10 | Visa International Service Association | Secure mobile device credential provisioning using risk decision non-overrides |
US10140615B2 (en) | 2014-09-22 | 2018-11-27 | Visa International Service Association | Secure mobile device credential provisioning using risk decision non-overrides |
US11574311B2 (en) | 2014-09-22 | 2023-02-07 | Visa International Service Association | Secure mobile device credential provisioning using risk decision non-overrides |
US10643001B2 (en) | 2014-09-26 | 2020-05-05 | Visa International Service Association | Remote server encrypted data provisioning system and methods |
US10255456B2 (en) | 2014-09-26 | 2019-04-09 | Visa International Service Association | Remote server encrypted data provisioning system and methods |
US11257074B2 (en) | 2014-09-29 | 2022-02-22 | Visa International Service Association | Transaction risk based token |
US11734679B2 (en) | 2014-09-29 | 2023-08-22 | Visa International Service Association | Transaction risk based token |
US10412060B2 (en) | 2014-10-22 | 2019-09-10 | Visa International Service Association | Token enrollment system and method |
US10015147B2 (en) | 2014-10-22 | 2018-07-03 | Visa International Service Association | Token enrollment system and method |
US10769628B2 (en) | 2014-10-24 | 2020-09-08 | Visa Europe Limited | Transaction messaging |
US12051064B2 (en) | 2014-10-24 | 2024-07-30 | Visa Europe Limited | Transaction messaging |
US10990977B2 (en) | 2014-11-25 | 2021-04-27 | Visa International Service Association | System communications with non-sensitive identifiers |
US12002049B2 (en) | 2014-11-25 | 2024-06-04 | Visa International Service Association | System communications with non-sensitive identifiers |
US10325261B2 (en) | 2014-11-25 | 2019-06-18 | Visa International Service Association | Systems communications with non-sensitive identifiers |
US12112316B2 (en) | 2014-11-26 | 2024-10-08 | Visa International Service Association | Tokenization request via access device |
US11620643B2 (en) | 2014-11-26 | 2023-04-04 | Visa International Service Association | Tokenization request via access device |
US10257185B2 (en) | 2014-12-12 | 2019-04-09 | Visa International Service Association | Automated access data provisioning |
US10785212B2 (en) | 2014-12-12 | 2020-09-22 | Visa International Service Association | Automated access data provisioning |
US11580519B2 (en) | 2014-12-12 | 2023-02-14 | Visa International Service Association | Provisioning platform for machine-to-machine devices |
US10511583B2 (en) | 2014-12-31 | 2019-12-17 | Visa International Service Association | Hybrid integration of software development kit with secure execution environment |
US10187363B2 (en) | 2014-12-31 | 2019-01-22 | Visa International Service Association | Hybrid integration of software development kit with secure execution environment |
US11240219B2 (en) | 2014-12-31 | 2022-02-01 | Visa International Service Association | Hybrid integration of software development kit with secure execution environment |
US11010734B2 (en) | 2015-01-20 | 2021-05-18 | Visa International Service Association | Secure payment processing using authorization request |
US10096009B2 (en) | 2015-01-20 | 2018-10-09 | Visa International Service Association | Secure payment processing using authorization request |
US10496965B2 (en) | 2015-01-20 | 2019-12-03 | Visa International Service Association | Secure payment processing using authorization request |
US11250391B2 (en) | 2015-01-30 | 2022-02-15 | Visa International Service Association | Token check offline |
US10255595B2 (en) | 2015-02-01 | 2019-04-09 | Apple Inc. | User interface for payments |
US11019193B2 (en) | 2015-02-02 | 2021-05-25 | Apple Inc. | Device, method, and graphical user interface for establishing a relationship and connection between two devices |
US11388280B2 (en) | 2015-02-02 | 2022-07-12 | Apple Inc. | Device, method, and graphical user interface for battery management |
US11176554B2 (en) | 2015-02-03 | 2021-11-16 | Visa International Service Association | Validation identity tokens for transactions |
US11915243B2 (en) | 2015-02-03 | 2024-02-27 | Visa International Service Association | Validation identity tokens for transactions |
US10977657B2 (en) | 2015-02-09 | 2021-04-13 | Visa International Service Association | Token processing utilizing multiple authorizations |
US9574896B2 (en) | 2015-02-13 | 2017-02-21 | Apple Inc. | Navigation user interface |
US10024682B2 (en) | 2015-02-13 | 2018-07-17 | Apple Inc. | Navigation user interface |
US10802703B2 (en) | 2015-03-08 | 2020-10-13 | Apple Inc. | Sharing user-configurable graphical constructs |
US11079894B2 (en) | 2015-03-08 | 2021-08-03 | Apple Inc. | Device configuration user interface |
US12019862B2 (en) | 2015-03-08 | 2024-06-25 | Apple Inc. | Sharing user-configurable graphical constructs |
US10216351B2 (en) | 2015-03-08 | 2019-02-26 | Apple Inc. | Device configuration user interface |
US10254911B2 (en) | 2015-03-08 | 2019-04-09 | Apple Inc. | Device configuration user interface |
US10164996B2 (en) | 2015-03-12 | 2018-12-25 | Visa International Service Association | Methods and systems for providing a low value token buffer |
US11271921B2 (en) | 2015-04-10 | 2022-03-08 | Visa International Service Association | Browser integration with cryptogram |
US10333921B2 (en) | 2015-04-10 | 2019-06-25 | Visa International Service Association | Browser integration with Cryptogram |
US12137088B2 (en) | 2015-04-10 | 2024-11-05 | Visa International Service Association | Browser integration with cryptogram |
US10568016B2 (en) | 2015-04-16 | 2020-02-18 | Visa International Service Association | Systems and methods for processing dormant virtual access devices |
US9998978B2 (en) | 2015-04-16 | 2018-06-12 | Visa International Service Association | Systems and methods for processing dormant virtual access devices |
US10552834B2 (en) | 2015-04-30 | 2020-02-04 | Visa International Service Association | Tokenization capable authentication framework |
US11321731B2 (en) | 2015-06-05 | 2022-05-03 | Apple Inc. | User interface for loyalty accounts and private label accounts |
US9940637B2 (en) | 2015-06-05 | 2018-04-10 | Apple Inc. | User interface for loyalty accounts and private label accounts |
US11783305B2 (en) | 2015-06-05 | 2023-10-10 | Apple Inc. | User interface for loyalty accounts and private label accounts for a wearable device |
US10026094B2 (en) | 2015-06-05 | 2018-07-17 | Apple Inc. | User interface for loyalty accounts and private label accounts |
US10332079B2 (en) | 2015-06-05 | 2019-06-25 | Apple Inc. | User interface for loyalty accounts and private label accounts for a wearable device |
US11734708B2 (en) | 2015-06-05 | 2023-08-22 | Apple Inc. | User interface for loyalty accounts and private label accounts |
US10990934B2 (en) | 2015-06-05 | 2021-04-27 | Apple Inc. | User interface for loyalty accounts and private label accounts for a wearable device |
US10600068B2 (en) | 2015-06-05 | 2020-03-24 | Apple Inc. | User interface for loyalty accounts and private label accounts |
US10877720B2 (en) | 2015-06-07 | 2020-12-29 | Apple Inc. | Browser with docked tabs |
US11385860B2 (en) | 2015-06-07 | 2022-07-12 | Apple Inc. | Browser with docked tabs |
US20170039546A1 (en) * | 2015-08-05 | 2017-02-09 | Alibaba Group Holding Limited | Method and Apparatus for Service Authentication Cross-Reference to Related Applications |
US10565582B2 (en) * | 2015-08-05 | 2020-02-18 | Alibaba Group Holding Limited | Method and apparatus for service authentication |
US11068889B2 (en) | 2015-10-15 | 2021-07-20 | Visa International Service Association | Instant token issuance |
US11127016B2 (en) | 2015-12-04 | 2021-09-21 | Visa International Service Association | Unique code for token verification |
US10664843B2 (en) | 2015-12-04 | 2020-05-26 | Visa International Service Association | Unique code for token verification |
US10664844B2 (en) | 2015-12-04 | 2020-05-26 | Visa International Service Association | Unique code for token verification |
US10911456B2 (en) | 2016-01-07 | 2021-02-02 | Visa International Service Association | Systems and methods for device push provisioning |
US10243958B2 (en) | 2016-01-07 | 2019-03-26 | Visa International Service Association | Systems and methods for device push provisoning |
US11720893B2 (en) | 2016-02-01 | 2023-08-08 | Visa International Service Association | Systems and methods for code display and use |
US11080696B2 (en) | 2016-02-01 | 2021-08-03 | Visa International Service Association | Systems and methods for code display and use |
US11900361B2 (en) | 2016-02-09 | 2024-02-13 | Visa International Service Association | Resource provider account token provisioning and processing |
US10313321B2 (en) | 2016-04-07 | 2019-06-04 | Visa International Service Association | Tokenization of co-network accounts |
US11386421B2 (en) | 2016-04-19 | 2022-07-12 | Visa International Service Association | Systems and methods for performing push transactions |
US11206309B2 (en) | 2016-05-19 | 2021-12-21 | Apple Inc. | User interface for remote authorization |
US11995649B2 (en) | 2016-05-19 | 2024-05-28 | Visa International Service Association | Systems and methods for creating subtokens using primary tokens |
US10749967B2 (en) | 2016-05-19 | 2020-08-18 | Apple Inc. | User interface for remote authorization |
US10334054B2 (en) | 2016-05-19 | 2019-06-25 | Apple Inc. | User interface for a device requesting remote authorization |
US9847999B2 (en) | 2016-05-19 | 2017-12-19 | Apple Inc. | User interface for a device requesting remote authorization |
US11250424B2 (en) | 2016-05-19 | 2022-02-15 | Visa International Service Association | Systems and methods for creating subtokens using primary tokens |
US11068578B2 (en) | 2016-06-03 | 2021-07-20 | Visa International Service Association | Subtoken management system for connected devices |
US11918857B2 (en) | 2016-06-11 | 2024-03-05 | Apple Inc. | Activity and workout updates |
US12274918B2 (en) | 2016-06-11 | 2025-04-15 | Apple Inc. | Activity and workout updates |
US10272294B2 (en) | 2016-06-11 | 2019-04-30 | Apple Inc. | Activity and workout updates |
US12002042B2 (en) | 2016-06-11 | 2024-06-04 | Apple, Inc | User interface for transactions |
US11148007B2 (en) | 2016-06-11 | 2021-10-19 | Apple Inc. | Activity and workout updates |
US11660503B2 (en) | 2016-06-11 | 2023-05-30 | Apple Inc. | Activity and workout updates |
US11481769B2 (en) | 2016-06-11 | 2022-10-25 | Apple Inc. | User interface for transactions |
US10621581B2 (en) | 2016-06-11 | 2020-04-14 | Apple Inc. | User interface for transactions |
US11161010B2 (en) | 2016-06-11 | 2021-11-02 | Apple Inc. | Activity and workout updates |
US10873786B2 (en) | 2016-06-12 | 2020-12-22 | Apple Inc. | Recording and broadcasting application visual output |
US11632591B2 (en) | 2016-06-12 | 2023-04-18 | Apple Inc. | Recording and broadcasting application visual output |
US11336961B2 (en) | 2016-06-12 | 2022-05-17 | Apple Inc. | Recording and broadcasting application visual output |
US11037150B2 (en) | 2016-06-12 | 2021-06-15 | Apple Inc. | User interfaces for transactions |
US11900372B2 (en) | 2016-06-12 | 2024-02-13 | Apple Inc. | User interfaces for transactions |
US11783343B2 (en) | 2016-06-17 | 2023-10-10 | Visa International Service Association | Token aggregation for multi-party transactions |
US11068899B2 (en) | 2016-06-17 | 2021-07-20 | Visa International Service Association | Token aggregation for multi-party transactions |
US11329822B2 (en) | 2016-06-24 | 2022-05-10 | Visa International Service Association | Unique token authentication verification value |
US12170730B2 (en) | 2016-06-24 | 2024-12-17 | Visa International Service Association | Unique token authentication verification value |
US10361856B2 (en) | 2016-06-24 | 2019-07-23 | Visa International Service Association | Unique token authentication cryptogram |
US11238140B2 (en) | 2016-07-11 | 2022-02-01 | Visa International Service Association | Encryption key exchange process using access device |
US11714885B2 (en) | 2016-07-11 | 2023-08-01 | Visa International Service Association | Encryption key exchange process using access device |
US12067558B2 (en) | 2016-07-19 | 2024-08-20 | Visa International Service Association | Method of distributing tokens and managing token relationships |
US10990967B2 (en) | 2016-07-19 | 2021-04-27 | Visa International Service Association | Method of distributing tokens and managing token relationships |
US12165127B2 (en) | 2016-09-06 | 2024-12-10 | Apple Inc. | User interfaces for stored-value accounts |
US9842330B1 (en) | 2016-09-06 | 2017-12-12 | Apple Inc. | User interfaces for stored-value accounts |
US11074572B2 (en) | 2016-09-06 | 2021-07-27 | Apple Inc. | User interfaces for stored-value accounts |
US10942918B2 (en) | 2016-09-14 | 2021-03-09 | Visa International Service Association | Self-cleaning token vault |
US10509779B2 (en) | 2016-09-14 | 2019-12-17 | Visa International Service Association | Self-cleaning token vault |
US10860199B2 (en) | 2016-09-23 | 2020-12-08 | Apple Inc. | Dynamically adjusting touch hysteresis based on contextual data |
US12273346B2 (en) | 2016-11-28 | 2025-04-08 | Visa International Service Association | Access identifier provisioning to application |
US11799862B2 (en) | 2016-11-28 | 2023-10-24 | Visa International Service Association | Access identifier provisioning to application |
US11323443B2 (en) | 2016-11-28 | 2022-05-03 | Visa International Service Association | Access identifier provisioning to application |
US10915899B2 (en) | 2017-03-17 | 2021-02-09 | Visa International Service Association | Replacing token on a multi-token user device |
US11900371B2 (en) | 2017-03-17 | 2024-02-13 | Visa International Service Association | Replacing token on a multi-token user device |
US11449862B2 (en) | 2017-05-02 | 2022-09-20 | Visa International Service Association | System and method using interaction token |
US10902418B2 (en) | 2017-05-02 | 2021-01-26 | Visa International Service Association | System and method using interaction token |
US12067562B2 (en) | 2017-05-11 | 2024-08-20 | Visa International Service Association | Secure remote transaction system using mobile devices |
US11494765B2 (en) | 2017-05-11 | 2022-11-08 | Visa International Service Association | Secure remote transaction system using mobile devices |
US10491389B2 (en) | 2017-07-14 | 2019-11-26 | Visa International Service Association | Token provisioning utilizing a secure authentication system |
US11398910B2 (en) | 2017-07-14 | 2022-07-26 | Visa International Service Association | Token provisioning utilizing a secure authentication system |
US11393258B2 (en) | 2017-09-09 | 2022-07-19 | Apple Inc. | Implementation of biometric authentication |
US10410076B2 (en) | 2017-09-09 | 2019-09-10 | Apple Inc. | Implementation of biometric authentication |
US10395128B2 (en) | 2017-09-09 | 2019-08-27 | Apple Inc. | Implementation of biometric authentication |
US11765163B2 (en) | 2017-09-09 | 2023-09-19 | Apple Inc. | Implementation of biometric authentication |
US10521579B2 (en) | 2017-09-09 | 2019-12-31 | Apple Inc. | Implementation of biometric authentication |
US11386189B2 (en) | 2017-09-09 | 2022-07-12 | Apple Inc. | Implementation of biometric authentication |
US10872256B2 (en) | 2017-09-09 | 2020-12-22 | Apple Inc. | Implementation of biometric authentication |
US10783227B2 (en) | 2017-09-09 | 2020-09-22 | Apple Inc. | Implementation of biometric authentication |
US11743042B2 (en) | 2018-03-07 | 2023-08-29 | Visa International Service Association | Secure remote token release with online authentication |
US11356257B2 (en) | 2018-03-07 | 2022-06-07 | Visa International Service Association | Secure remote token release with online authentication |
US20190324391A1 (en) * | 2018-04-19 | 2019-10-24 | Konica Minolta, Inc. | Fixation apparatus and image forming apparatus |
US11782575B2 (en) | 2018-05-07 | 2023-10-10 | Apple Inc. | User interfaces for sharing contextually relevant media content |
US20210334800A1 (en) * | 2018-05-17 | 2021-10-28 | Standard Chartered Bank | Methods, systems, and devices for managing communication requests from a plurality of users |
US12008088B2 (en) | 2018-06-18 | 2024-06-11 | Visa International Service Association | Recurring token transactions |
US11256789B2 (en) | 2018-06-18 | 2022-02-22 | Visa International Service Association | Recurring token transactions |
US11777934B2 (en) | 2018-08-22 | 2023-10-03 | Visa International Service Association | Method and system for token provisioning and processing |
US12120117B2 (en) | 2018-08-22 | 2024-10-15 | Visa International Service Association | Method and system for token provisioning and processing |
US12028337B2 (en) | 2018-10-08 | 2024-07-02 | Visa International Service Association | Techniques for token proximity transactions |
US11870903B2 (en) | 2018-11-14 | 2024-01-09 | Visa International Service Association | Cloud token provisioning of multiple tokens |
US11469895B2 (en) | 2018-11-14 | 2022-10-11 | Visa International Service Association | Cloud token provisioning of multiple tokens |
US11227274B2 (en) * | 2018-11-27 | 2022-01-18 | Mastercard International Incorporated | Computer system and computer-implemented method for processing a cashless payment transaction via a point-of-sale terminal |
US11328352B2 (en) | 2019-03-24 | 2022-05-10 | Apple Inc. | User interfaces for managing an account |
US12131374B2 (en) | 2019-03-24 | 2024-10-29 | Apple Inc. | User interfaces for managing an account |
US11688001B2 (en) | 2019-03-24 | 2023-06-27 | Apple Inc. | User interfaces for managing an account |
US11669896B2 (en) | 2019-03-24 | 2023-06-06 | Apple Inc. | User interfaces for managing an account |
US11610259B2 (en) | 2019-03-24 | 2023-03-21 | Apple Inc. | User interfaces for managing an account |
US10783576B1 (en) | 2019-03-24 | 2020-09-22 | Apple Inc. | User interfaces for managing an account |
US11849042B2 (en) | 2019-05-17 | 2023-12-19 | Visa International Service Association | Virtual access credential interaction system and method |
US11783332B2 (en) * | 2020-02-14 | 2023-10-10 | Mastercard International Incorporated | Method and system for facilitating secure card-based transactions |
US20210256517A1 (en) * | 2020-02-14 | 2021-08-19 | Mastercard International Incorporated | Method and System for Facilitating Secure Card-Based Transactions |
US12141800B2 (en) | 2021-02-12 | 2024-11-12 | Visa International Service Association | Interaction account tokenization system and method |
US12294630B2 (en) | 2021-08-10 | 2025-05-06 | Visa International Service Association | System and method for token domain control |
US20240005318A1 (en) * | 2022-06-30 | 2024-01-04 | Ncr Corporation | Resource modeling, access, and security |
Also Published As
Publication number | Publication date |
---|---|
US9105021B2 (en) | 2015-08-11 |
US20150310429A1 (en) | 2015-10-29 |
US10679213B2 (en) | 2020-06-09 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US10679213B2 (en) | Systems, methods, and computer program products for using proxy accounts | |
US20130246267A1 (en) | Systems, Methods, and Computer Program Products for Using Proxy Accounts | |
US11868974B2 (en) | Systems, methods, and computer program products providing push payments | |
US11238451B1 (en) | Authorization of cardless payment transactions | |
US20210248584A1 (en) | Offline bill splitting system | |
US11138593B1 (en) | Systems and methods for contactless smart card authentication | |
TWI508007B (en) | Secure electronic payment system and process | |
US20150242825A1 (en) | Generation, storage, and validation of encrypted electronic currency | |
US20130006848A1 (en) | Method of virtual transaction using mobile electronic devices or fixed electronic devices or a combination of both, for global commercial or noncommercial purposes | |
US20130246272A1 (en) | Secure mobile transactions | |
US20110238539A1 (en) | Methods for risk management in payment device system | |
US11308771B2 (en) | System and method for an automated teller machine to issue a secured bank card | |
JP2017503242A (en) | Electronic wallet fund transfer system | |
US20120209772A1 (en) | Payment system with time restrictions | |
JP2017041001A (en) | Internet banking fund transfer terminal program, fund transfer method, and cash card | |
US11687915B2 (en) | System and method for generation of virtual account-linked card | |
US20240412176A1 (en) | Math based currency point of sale systems and methods | |
US20240086875A1 (en) | Systems and methods for online math based currency (mbc) card-based exchanges | |
JP6989118B2 (en) | Payment systems, user terminals and methods executed by them, payment devices and methods executed by them, and programs. | |
AU2013101298A4 (en) | Payment authorisation method and system | |
AU2015100350A4 (en) | Payment authorisation method and system | |
US11568408B1 (en) | Apparatus and method for processing virtual credit cards for digital identities | |
US20180114201A1 (en) | Universal payment and transaction system | |
US20170337547A1 (en) | System and method for wallet transaction scoring using wallet content and connection origination | |
US20240020664A1 (en) | Methods and devices for utilizing a cryptocurrency backed debit card |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AS | Assignment |
Owner name: EBAY, INC., CALIFORNIA Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:TOBIN, JOHN PATRICK EDGAR;REEL/FRAME:028309/0837 Effective date: 20120529 |
|
STCF | Information on status: patent grant |
Free format text: PATENTED CASE |
|
AS | Assignment |
Owner name: PAYPAL, INC., CALIFORNIA Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:EBAY INC.;REEL/FRAME:036169/0798 Effective date: 20150717 |
|
MAFP | Maintenance fee payment |
Free format text: PAYMENT OF MAINTENANCE FEE, 4TH YEAR, LARGE ENTITY (ORIGINAL EVENT CODE: M1551); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY Year of fee payment: 4 |
|
MAFP | Maintenance fee payment |
Free format text: PAYMENT OF MAINTENANCE FEE, 8TH YEAR, LARGE ENTITY (ORIGINAL EVENT CODE: M1552); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY Year of fee payment: 8 |