A method for verifying a portable consumer device. The method includes receiving an authorization request message associated with a transaction conducted using a portable consumer device. The portable consumer device includes a portable consumer device fingerprint. The authorization request message
A method for verifying a portable consumer device. The method includes receiving an authorization request message associated with a transaction conducted using a portable consumer device. The portable consumer device includes a portable consumer device fingerprint. The authorization request message includes an altered portable consumer device fingerprint and an algorithm identifier. The method also includes selecting an algorithm from among a plurality of algorithms using the algorithm identifier, determining the portable consumer device fingerprint using selected algorithm and the altered portable consumer device fingerprint, determining if the portable consumer device fingerprint matches a stored portable consumer device fingerprint, and sending an authorization response message after determining if the portable consumer device fingerprint matches the stored portable consumer device fingerprint.
대표청구항▼
What is claimed is: 1. A method comprising: receiving, at a server computer, an authorization request message associated with a transaction conducted using a portable consumer device, wherein the portable consumer device comprises a portable consumer device fingerprint, and wherein the authorizatio
What is claimed is: 1. A method comprising: receiving, at a server computer, an authorization request message associated with a transaction conducted using a portable consumer device, wherein the portable consumer device comprises a portable consumer device fingerprint, and wherein the authorization request message comprises an altered portable consumer device fingerprint and an algorithm identifier, wherein the authorization request message further comprises an account number associated with the portable consumer device and a transaction amount associated with the transaction; selecting, using the server computer, an algorithm from among a plurality of algorithms associated with different types of portable consumer device fingerprinting systems using the algorithm identifier, wherein the different types of portable consumer device fingerprinting systems are associated with different companies who each uses its own proprietary algorithm in an access device to alter the portable consumer device fingerprint; determining, using the server computer, the portable consumer device fingerprint using the selected algorithm and the altered portable consumer device fingerprint; determining, using the server computer, whether the transaction meets a confidence threshold by determining a reliability associated with the selected algorithm; determining, using the server computer, if the portable consumer device fingerprint matches a stored portable consumer device fingerprint; and sending, using the server computer, an authorization response message after determining if the portable consumer device fingerprint matches the stored portable consumer device fingerprint. 2. The method of claim 1 wherein the altered portable consumer device fingerprint was formed an at access device at a merchant. 3. The method of claim 1 wherein the stored portable consumer device fingerprint is stored in a database, which also stores an account number associated with the portable consumer device. 4. The method of claim 1 wherein the portable consumer device is a payment card comprising a magnetic stripe, wherein the portable consumer device fingerprint is a magnetic stripe fingerprint. 5. The method of claim 1 wherein the algorithm is a key used in an encryption process. 6. The method of claim 1 further comprising receiving the authorization response message from an issuer of the portable consumer device before sending the authorization response message. 7. An article of manufacture comprising: a computer readable medium having computer readable program codes means embodied therein for: receiving an authorization request message associated with a transaction conducted using a portable consumer device, wherein the portable consumer device comprises a portable consumer device fingerprint, and wherein the authorization request message comprises an altered portable consumer device fingerprint and an algorithm identifier, wherein the authorization request message further comprises an account number associated with the portable consumer device; selecting an algorithm from among a plurality of algorithms associated with different types of portable consumer device fingerprinting systems using the algorithm identifier, wherein the different types of portable consumer device fingerprinting systems are associated with different companies who each uses its own proprietary algorithm in an access device to alter the portable consumer device fingerprint; determining the portable consumer device fingerprint using the selected algorithm and the altered portable consumer device fingerprint; determining, using the server computer, whether the transaction meets a confidence threshold by determining a reliability associated with the selected algorithm; determining if the portable consumer device fingerprint matches a stored portable consumer device fingerprint; and sending an authorization response message after determining if the portable consumer device fingerprint matches the stored portable consumer device fingerprint. 8. The computer readable medium of claim 7 wherein the portable consumer device is a payment card comprising a magnetic stripe, wherein the portable consumer device fingerprint is a magnetic stripe fingerprint. 9. A server computer comprising a computer readable medium storing a computer program containing instructions thereon for instructing the server computer to perform the steps of: receiving an authorization request message associated with a transaction conducted using a portable consumer device, wherein the portable consumer device comprises a portable consumer device fingerprint, and wherein the authorization request message comprises an altered portable consumer device fingerprint and an algorithm identifier, wherein the authorization request message further comprises an account number associated with the portable consumer device; selecting an algorithm from among a plurality of algorithms associated with different types of portable consumer device fingerprinting systems using the algorithm identifier, wherein the different types of portable consumer device fingerprinting systems are associated with different companies who each uses its own proprietary algorithm in an access device to alter the portable consumer device fingerprint; determining the portable consumer device fingerprint using the selected algorithm and the altered portable consumer device fingerprint; determining, using the server computer, whether the transaction meets a confidence threshold by determining a reliability associated with the selected algorithm; determining if the portable consumer device fingerprint matches a stored portable consumer device fingerprint; and sending an authorization response message after determining if the portable consumer device fingerprint matches the stored portable consumer device fingerprint. 10. A method comprising: sending, using an access device, an authorization request message associated with a transaction conducted using a portable consumer device, wherein the portable consumer device comprises a portable consumer device fingerprint, and wherein the authorization request message comprises an altered portable consumer device fingerprint and an algorithm identifier, wherein the authorization request message comprises an account number, wherein an algorithm is selected from among a plurality of algorithms associated with different types of portable consumer device fingerprinting systems using the algorithm identifier, wherein the different types of portable consumer device fingerprinting systems are associated with different companies who each uses its ownproprietary algorithm in an access device to alter the portable consumer device fingerprint, the portable consumer device fingerprint is determined using the selected algorithm and the altered portable consumer device fingerprint, a server computer determines whether the transaction meets a confidence threshold by determining a reliability associated with the selected algorithm, and the server computer determines if the portable consumer device fingerprint matches a stored portable consumer device fingerprint; and receiving, using an access device, an authorization response message, wherein the authorization response message indicates whether or not the transaction is approved. 11. The method of claim 10 wherein the portable consumer device is a phone. 12. The method of claim 10 wherein the portable consumer device is a payment card comprising a magnetic stripe, wherein the portable consumer device fingerprint is a magnetic stripe fingerprint. 13. The method of claim 10 wherein the algorithm is a key associated with an encryption process. 14. The method of claim 10 wherein the transaction is a payment transaction. 15. An article of manufacture comprising: a computer readable medium having computer readable program codes means embodied therein for: sending an authorization request message associated with a transaction conducted using a portable consumer device, wherein the portable consumer device comprises a portable consumer device fingerprint, and wherein the authorization request message comprises an altered portable consumer device fingerprint and an algorithm identifier, wherein the authorization request message further comprises an account number associated with the portable consumer device, wherein an algorithm is selected from among a plurality of algorithms associated with different types of portable consumer device fingerprinting systems using the algorithm identifier, wherein the different types of portable consumer device fingerprinting systems are associated with different companies who each uses its own proprietary algorithm in an access device to alter the portable consumer device fingerprint, the portable consumer device fingerprint is determined using the selected algorithm and the altered portable consumer device fingerprint, a server computer determines whether the transaction meets a confidence threshold by determining a reliability associated with the selected algorithm, and the server computer determines if the portable consumer device fingerprint matches a stored portable consumer device fingerprint; and receiving an authorization response message, wherein the authorization response message indicates whether or not the transaction is approved. 16. An access device comprising a computer readable medium storing a computer program containing instructions thereon for instructing the access device to perform the steps of: sending an authorization request message associated with a transaction conducted using a portable consumer device, wherein the portable consumer device comprises a portable consumer device fingerprint, and wherein the authorization request message comprises an altered portable consumer device fingerprint and an algorithm identifier, wherein the authorization request message further comprises an account number associated with the portable consumer device, wherein an algorithm is selected from among a plurality of algorithms associated with different types of portable consumer device fingerprinting systems using the algorithm identifier, wherein the different types of portable consumer device fingerprinting systems are associated with different companies who each uses its own proprietary algorithm in an access device to alter the portable consumer device fingerprint, the portable consumer device fingerprint is determined using the selected algorithm and the altered portable consumer device fingerprint, a server computer determines whether the transaction meets a confidence threshold by determining a reliability associated with the selected algorithm, and the server computer determines if the portable consumer device fingerprint matches a stored portable consumer device fmgerprint; and receiving an authorization response message, wherein the authorization response message indicates whether or not the transaction is approved. 17. The access device of claim 16 wherein the access device is a point of sale terminal. 18. The method of claim 1 further comprising sending a transaction notification message to a consumer to notify the consumer that a transaction associated with the portable consumer device is taking place, if the portable consumer device fingerprint does not match the stored portable consumer device fingerprint. 19. The method of claim 4 wherein the magnetic stripe fingerprint is embedded within the particular microscopic structure of the magnetic particles in the magnetic stripe in the payment card. 20. The method of claim 1 wherein the portable consumer device fingerprint includes a dynamic card verification value that can be generated by a chip in the portable consumer device. 21. The method of claim 1 wherein the algorithm identifier is associated with the algorithm used to create the altered portable consumer device fingerprint. 22. The method of claim 1 further comprising: initiating additional authentication processes, if the transaction does not meet the confidence threshold, wherein additional authentication processes include sending a dynamic challenge to a consumer associated with the portable consumer device or notifying the consumer that the transaction is occurring. 23. The method of claim 1 wherein the confidence threshold is set according to predetermined rules. 24. The method of claim 1 wherein the confidence threshold is determined by using transaction characteristics to score the transaction as being authentic or potentially suspicious. 25. The method of claim 24 wherein the transaction characteristics are related to the access device and the portable consumer device.
연구과제 타임라인
LOADING...
LOADING...
LOADING...
LOADING...
LOADING...
이 특허에 인용된 특허 (116)
Cucinotta Robert P. ; Maskatiya Karim, ATM and POS terminal and method of use thereof.
Gauthier, Patrick; Hammad, Ayman; Merckling, Roger, Compact protocol and solution for substantially offline messaging between portable consumer device and based device.
Foladare Mark Jeffrey ; Goldman Shelley B. ; Gorini Dominick ; Silverman David Phillip ; Wang Shaoqing ; Westrich Robert S., Credit card spending authorization control system.
Ehrsam William F. (Kingston NY) Elander Robert C. (Saugerties NY) Matyas Stephen M. (Poughkeepsie NY) Meyer Carl H. W. (Kingston NY) Powers Robert L. (West Hurley NY) Prentice Paul N. (Hyde Park NY) , Cryptographic communication security for single domain networks.
Gopinathan Krishna M. ; Biafore Louis S. ; Ferguson William M. ; Lazarus Michael A. ; Pathria Anu K. ; Jost Allen, Fraud detection using predictive modeling.
Mark S. Flaig ; George J. Odishoo ; Gary T. Shea ; Sally A. Wojak-Puranen ; Robert T. Clark, Method and apparatus for detecting and investigating fraudulent transactions in debit and charge card activations.
Indeck Ronald Scott ; Muller Marcel Wettstein ; Engel George Lawrence ; Hege Alan Lee, Method and apparatus for improved fingerprinting and authenticating various magnetic media.
Kranzley,Arthur D.; Orfei,Stephen W.; Rutherford,Bruce J.; Wankmueller,John, Method and system for conducting secure electronic commerce transactions with authorization request data loop-back.
Levy,Philippe; Hammad,Ayman; Simcox,Virginia I.; Sloan,Jerry; Gorden,Mary, Method and system for facilitating memory and application management on a secured token.
Barrett,Michael Richard; Armes,David; Bishop,Fred; Shelby,James; Glazer,Elliott; Steitz,Philip W.; Gibbons,Stephen P., Method and system for implementing and managing an enterprise identity management for distributed security.
Bickham Richard S. (Cary IL) Furtaw Robert W. (Lake Zurich IL) Schultz Joseph G. (Bartlett IL) Sobti Arun (South Barrington IL) Zdunek Kenneth J. (Schaumburg IL), Method of providing an alert of a financial transaction.
Castrogiovanni, Benedetto; Read, John S., Method, apparatus and article to remotely associate wireless communications devices with subscriber identities and /or proxy wireless communications devices.
Maes Stephane Herman ; Sedivy Jan,CSX, Portable information and transaction processing system and method utilizing biometric authorization and digital certificate security.
Hynes John E. (6417 Deer Park Rd. Reistertown MD 21136) Conner Stephen A. (3631 Yolando Rd. Baltimore MD 21218), Securing magnetically encoded data using timing variations in encoded data.
Wong Kam-Fu (c/o Star Paging (Holding) Ltd. ; 1/F. ; Chung Nam Centre ; 414 Kwun Tong Road Kwun Tong ; Kowloon HKX), Security system for non-cash transactions.
Chan Alfred ; Kekicheff Marc B. ; Weise Joel M. ; Wentker David C., System and method for a multi-application smart card which can facilitate a post-issuance download of an application onto the smart card.
Hillmer, James M.; Jones, Richard A.; Gessner, Colleen M.; Johnston, Connie S.; Lewis, Jr., Kelly R.; Deshpande, Sanjay H., System and method for detecting fraudulent transactions.
Rahman Sam (4809 Laurette St. Torrance CA 90503) Magner James (5092 Tripoli Ave. Los Alamitos CA 90720) Brown John (12831 Longden St. Garden Grove CA 92645) Pun Adarsh (5404 White Fox Dr. Rancho Palo, Transaction device, equipment and method for protecting account numbers and their associated personal identification num.
Anderson Thomas G. (Los Altos CA) Boothroyd William A. (San Jose CA) Frey Richard C. (San Jose CA), Transaction execution system with secure data storage and communications.
Anderson Robert W. (Morgan Hill CA) Brock Steven F. (San Jose CA) Gee May L. (San Jose CA), Transaction execution system with secure encryption key storage and communications.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.