A method for verifying a portable consumer device. The method includes receiving an authorization request message associated with a transaction conducted using a portable consumer device. The portable consumer device includes a portable consumer device fingerprint. The authorization request message
A method for verifying a portable consumer device. The method includes receiving an authorization request message associated with a transaction conducted using a portable consumer device. The portable consumer device includes a portable consumer device fingerprint. The authorization request message includes an altered portable consumer device fingerprint and an algorithm identifier. The method also includes selecting an algorithm from among a plurality of algorithms using the algorithm identifier, determining the portable consumer device fingerprint using selected algorithm and the altered portable consumer device fingerprint, determining if the portable consumer device fingerprint matches a stored portable consumer device fingerprint, and sending an authorization response message after determining if the portable consumer device fingerprint matches the stored portable consumer device fingerprint.
대표청구항▼
1. A computer-implemented method comprising: receiving an authorization request message associated with a payment transaction, by a server computer, wherein the authorization request message is generated after an interaction between a portable consumer device and an access device, wherein as a resul
1. A computer-implemented method comprising: receiving an authorization request message associated with a payment transaction, by a server computer, wherein the authorization request message is generated after an interaction between a portable consumer device and an access device, wherein as a result of the interaction, the access device reads an account number and an expiration date associated with the portable consumer device;after receiving the authorization request message, selecting an algorithm from among a plurality of algorithms associated with different types of portable consumer device fingerprinting systems using an algorithm identifier stored on a non-transitory computer readable medium of the server computer, wherein different types of portable consumer device fingerprinting systems are associated with different companies that each use their own proprietary algorithm in the access device to alter a fingerprint of a portable consumer device;analyzing the authorization request message, using the server computer, for one or more characteristics of the portable consumer device or the access device to determine when a confidence threshold associated with the payment transaction is met or exceeded; andwhen the confidence threshold is not exceeded, performing additional authentication processing, by the server computer, to authenticate the portable consumer device for the payment transaction. 2. The method of claim 1 wherein the one or more characteristics of the portable consumer device include a particular portable consumer device used. 3. The method of claim 1 wherein the one or more characteristics of the access device include a particular algorithm used to alter a portable consumer device fingerprint associated with the portable consumer device. 4. The method of claim 3 wherein analyzing the authorization request message comprises analyzing at least one characteristic of the access device and at least one characteristic of the portable consumer device to determine when the confidence threshold is met or exceeded. 5. The method of claim 4 wherein the one or more characteristics of the access device include a particular algorithm present in the access device. 6. The method of claim 4 wherein the portable consumer device is a payment card. 7. The method of claim 4 wherein the portable consumer device is a phone. 8. The method of claim 4, wherein the method further comprises: sending an authorization response message to a consumer without performing additional authentication processing when the confidence threshold is met. 9. The method of claim 1 wherein the additional authentication processing comprises sending a consumer a message to a phone operated by the consumer or to an access device used to conduct the payment transaction, wherein the message indicates that the payment transaction is occurring. 10. The method of claim 1, further comprises determining whether the profile of the payment transaction is deemed to be risky. 11. The method of claim 1, wherein analyzing the authorization request message for the one or more characteristics of the portable consumer device further comprises determining whether there has been any recent suspicious payment transaction associated with the portable consumer device. 12. The method of independent claim 1, wherein the authorization request message contains a particular algorithm identification associated with a Point of Sale terminal. 13. The method of independent claim 1, wherein the authorization request message contains a particular algorithm identification associated with an altered portable consumer device fingerprint. 14. The method of claim 1, wherein analyzing the authorization request message, using the server computer, encompasses one or more characteristics of the portable consumer device or the access device to determine when the confidence threshold associated with the payment transaction is met or exceeded is performed by a confidence assessment module stored on the computer. 15. The method of claim 14, wherein the confidence assessment module generates a confidence assessment from type of the portable consumer device and type of algorithm used to encrypt the portable consumer device fingerprint. 16. A system comprising: means for receiving an authorization request message associated with a payment transaction, wherein the authorization request message is generated after an interaction between a portable consumer device and an access device, wherein as a result of the interaction, the access device reads an account number and an expiration date associated with the portable consumer device;means for selecting an algorithm, after receiving the authorization request message, from among a plurality of algorithms associated with different types of portable consumer device fingerprinting systems using an algorithm identifier, wherein different types of portable consumer device fingerprinting systems are associated with different companies that each use their own proprietary algorithm in the access device to alter a portable consumer device fingerprint;means for analyzing the authorization request message for one or more characteristics of the portable consumer device or the access device to determine when a confidence threshold associated with the payment transaction is met or exceeded; andmeans for performing additional authentication processing when the confidence threshold is not exceeded to authenticate the portable consumer device for the payment transaction. 17. The system of claim 16 wherein the one or more characteristics of the portable consumer device include a particular portable consumer device. 18. The system of claim 16 wherein the one or more characteristics of the access device include a particular algorithm in the access device. 19. The system of claim 16 wherein the means for analyzing the authorization request message comprises means for analyzing at least one characteristic of the access device and at least one characteristic of the portable consumer device. 20. The system of claim 16 wherein the portable consumer device is a payment card. 21. A system comprising: a server computer comprising a processor; anda non-transitory computer readable medium coupled to the non-transitory computer readable medium, the non-transitory computer readable medium having computer readable program codes embodies therein for: receiving an authorization request message associated with a payment transaction, wherein the authorization request message is generated after an interaction between a portable consumer device and an access device;wherein as a result of the interaction, the access device reads an account number and an expiration date associated with the portable consumer device;after receiving the authorization request message, selecting an algorithm from among a plurality of algorithms associated with different types of portable consumer device fingerprinting systems using an algorithm identifier, wherein different types of portable consumer device fingerprinting systems are associated with different companies that each use their own proprietary algorithm in the access device to alter a fingerprint of a portable consumer device;analyzing the authentication request message for one or more characteristics of the portable consumer device or the access device to determine when a confidence threshold associated with the payment transaction is met or exceeded, andperforming additional authentication processing when the confidence threshold is not exceeded to authenticate the portable consumer device for the payment transaction. 22. The system of claim 21 further comprising the access device in operative communication with the server computer. 23. The system of claim 22 wherein the access device is a POS terminal. 24. The system of claim 21 wherein the one or more characteristics of the access device includes a particular algorithm that is used by the access device to encrypt data from the portable consumer device. 25. The system of claim 21 wherein the one or more characteristics of the portable consumer device includes a particular portable consumer device. 26. The system of claim 21, wherein the system further comprises an algorithm database including a plurality of algorithm identifications and a plurality of algorithms associated with one or more access devices.
연구과제 타임라인
LOADING...
LOADING...
LOADING...
LOADING...
LOADING...
이 특허에 인용된 특허 (136)
Cucinotta Robert P. ; Maskatiya Karim, ATM and POS terminal and method of use thereof.
Gauthier, Patrick; Hammad, Ayman; Merckling, Roger, Compact protocol and solution for substantially offline messaging between portable consumer device and based device.
Foladare Mark Jeffrey ; Goldman Shelley B. ; Gorini Dominick ; Silverman David Phillip ; Wang Shaoqing ; Westrich Robert S., Credit card spending authorization control system.
Ehrsam William F. (Kingston NY) Elander Robert C. (Saugerties NY) Matyas Stephen M. (Poughkeepsie NY) Meyer Carl H. W. (Kingston NY) Powers Robert L. (West Hurley NY) Prentice Paul N. (Hyde Park NY) , Cryptographic communication security for single domain networks.
Gopinathan Krishna M. ; Biafore Louis S. ; Ferguson William M. ; Lazarus Michael A. ; Pathria Anu K. ; Jost Allen, Fraud detection using predictive modeling.
Mark S. Flaig ; George J. Odishoo ; Gary T. Shea ; Sally A. Wojak-Puranen ; Robert T. Clark, Method and apparatus for detecting and investigating fraudulent transactions in debit and charge card activations.
Indeck Ronald Scott ; Muller Marcel Wettstein ; Engel George Lawrence ; Hege Alan Lee, Method and apparatus for improved fingerprinting and authenticating various magnetic media.
Kranzley,Arthur D.; Orfei,Stephen W.; Rutherford,Bruce J.; Wankmueller,John, Method and system for conducting secure electronic commerce transactions with authorization request data loop-back.
Levy,Philippe; Hammad,Ayman; Simcox,Virginia I.; Sloan,Jerry; Gorden,Mary, Method and system for facilitating memory and application management on a secured token.
Barrett,Michael Richard; Armes,David; Bishop,Fred; Shelby,James; Glazer,Elliott; Steitz,Philip W.; Gibbons,Stephen P., Method and system for implementing and managing an enterprise identity management for distributed security.
Bickham Richard S. (Cary IL) Furtaw Robert W. (Lake Zurich IL) Schultz Joseph G. (Bartlett IL) Sobti Arun (South Barrington IL) Zdunek Kenneth J. (Schaumburg IL), Method of providing an alert of a financial transaction.
Castrogiovanni, Benedetto; Read, John S., Method, apparatus and article to remotely associate wireless communications devices with subscriber identities and /or proxy wireless communications devices.
Maes Stephane Herman ; Sedivy Jan,CSX, Portable information and transaction processing system and method utilizing biometric authorization and digital certificate security.
Hynes John E. (6417 Deer Park Rd. Reistertown MD 21136) Conner Stephen A. (3631 Yolando Rd. Baltimore MD 21218), Securing magnetically encoded data using timing variations in encoded data.
Wong Kam-Fu (c/o Star Paging (Holding) Ltd. ; 1/F. ; Chung Nam Centre ; 414 Kwun Tong Road Kwun Tong ; Kowloon HKX), Security system for non-cash transactions.
Chan Alfred ; Kekicheff Marc B. ; Weise Joel M. ; Wentker David C., System and method for a multi-application smart card which can facilitate a post-issuance download of an application onto the smart card.
Hillmer, James M.; Jones, Richard A.; Gessner, Colleen M.; Johnston, Connie S.; Lewis, Jr., Kelly R.; Deshpande, Sanjay H., System and method for detecting fraudulent transactions.
Rahman Sam (4809 Laurette St. Torrance CA 90503) Magner James (5092 Tripoli Ave. Los Alamitos CA 90720) Brown John (12831 Longden St. Garden Grove CA 92645) Pun Adarsh (5404 White Fox Dr. Rancho Palo, Transaction device, equipment and method for protecting account numbers and their associated personal identification num.
Anderson Thomas G. (Los Altos CA) Boothroyd William A. (San Jose CA) Frey Richard C. (San Jose CA), Transaction execution system with secure data storage and communications.
Anderson Robert W. (Morgan Hill CA) Brock Steven F. (San Jose CA) Gee May L. (San Jose CA), Transaction execution system with secure encryption key storage and communications.
Davis Terry L. (Scottsdale AZ) Hart James A. (Radnor PA) Imperia Vincent A. (Tempe AZ) Love Michael (Wilmington DE) O\Malley Michael F. (Glenside PA) Russell James F. (Hockessin DE) Sears John W. (Pe, Transaction system for integrated circuit cards.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.