Apparatuses, methods, and systems pertaining to the verification of portable consumer devices are disclosed. In one implementation, a verification token is coupled to a computer by a USB connection so as to use the computer's networking facilities. The verification token reads identification informa
Apparatuses, methods, and systems pertaining to the verification of portable consumer devices are disclosed. In one implementation, a verification token is coupled to a computer by a USB connection so as to use the computer's networking facilities. The verification token reads identification information from a user's portable consumer device (e.g., credit card) and sends the information to a validation entry over a communications network using the computer's networking facilities. The validation entity applies one or more validation tests to the information that it receives from the verification token. If a selected number of tests are passed, the validation entity sends a device verification value to the verification token, and optionally to a payment processing network. The verification token may enter the device verification value into a CVV field of a web page appearing on the computer's display, or may display the value to the user using the computer's display.
대표청구항▼
1. A method comprising: receiving, from a user computer at a server computer over a communications network, a request for a verification value associated with a portable consumer device associated with a user, and an encrypted message encrypted using a key stored in a security module of a verificati
1. A method comprising: receiving, from a user computer at a server computer over a communications network, a request for a verification value associated with a portable consumer device associated with a user, and an encrypted message encrypted using a key stored in a security module of a verification token, the verification token in communication with the user computer, the request comprising identification information pertaining to the portable consumer device;applying, by the server computer, at least one validation test pertaining to the received request, wherein the validation test comprises validating the encrypted message from the user computer; andsending, by the server computer to the user computer over the communications network, after the at least one validation test is passed, a verification value to the verification token or to an entity configured to forward the verification value to the verification token. 2. The method of claim 1, further comprising sending, if the at least one validation test is passed, the verification value to a payment processing network. 3. The method of claim 1, wherein encrypted message is an encrypted test message, and wherein the method further comprises: receiving a serial number of the verification token and the encrypted test message;obtaining a key and one or more acceptable messages; andvalidating the encrypted test message using the encrypted test message, the obtained key, and the one or more acceptable messages. 4. The method of claim 3, wherein validating the encrypted test message comprises decrypting the encrypted test message using the obtained key, and comparing the decrypted test message to the one or more acceptable messages for a match. 5. The method of claim 3, wherein validating the encrypted test message comprises encrypting the obtained one or more acceptable messages with the obtained key, and comparing the encrypted test message to the one or more encrypted acceptable messages for a match. 6. The method of claim 1, further comprising: receiving a serial number of the verification token; andcomparing the received serial number with serial numbers of suspicious tokens. 7. The method of claim 1 wherein the verification token is coupled to the user computer to access a networking facility of the user computer, and wherein the method further comprises: receiving one or more data messages having information specific to the user computer, the information being obtained by the verification token, andcomparing the received information with computer-specific information of suspicious computers for a match. 8. The method of claim 1 wherein the request for the verification value is conveyed by way of a network packet on a communications network, and wherein the method further comprises: obtaining a source IP address from the network packet; andcomparing the obtained source IP address with suspect IP addresses for a match. 9. The method of claim 1, wherein the received identification information includes an account number associated with the portable consumer device and a digital fingerprint, and wherein the method further comprises: obtaining a valid digital fingerprint; andcomparing the digital fingerprint in the received identification information to the valid digital fingerprint. 10. The method of claim 1, wherein the received identification information includes an account number associated with the portable consumer device and a variable datum that varies each time the portable consumer device is used, and wherein the method further comprises: obtaining one or more acceptable datum values for the portable consumer device having the account number in the received identification information; andcomparing the variable datum in the received identification information to obtain one or more acceptable datum values for a match. 11. The method of claim 1, wherein the received identification information includes an account number associated with the portable consumer device and a variable datum that varies each time the portable consumer device is read for its identification information, and wherein the method further comprises: sending the account number and the variable datum to an issuing bank with a request for the bank to determine if the variable datum is valid; andreceiving the issuing bank's determination. 12. The method of claim 1, further comprising sending, if the at least one validation test is passed, a dynamic account number to the verification token or to the entity configured to forward the dynamic account number to the verification token. 13. The method of claim 12, further comprising sending, if the at least one validation test is passed, the verification value and the dynamic account number to a payment processing network. 14. The method of claim 13, further comprising sending a transaction number to the payment processing network and to a personal communication device or email address associated with the account number in the received identification information. 15. The method of claim 1, further comprising sending, if the at least one validation test is passed, address information to the verification token or to the entity configured to forward the address information to the verification token. 16. The method of claim 1, further comprising encrypting or encoding the verification value before sending the value. 17. The method of claim 1, further comprising: identifying a mobile phone number or universal resource identifier of a communications device associated with the portable consumer device indicated in the received identification information, andsending a message to the portable communications device indicating that a request has been made for the verification value for the user's portable consumer device. 18. The method of claim 17, wherein the message comprises a text message sent to a cell phone. 19. The method of claim 1, further comprising: identifying an email address associated with the portable consumer device indicated in the received identification information, andsending a message to the identified email address indicating that the request has been made for a verification value for the user's portable consumer device. 20. A server computer comprising: a processor; anda computer readable medium coupled to the processor, the computer readable medium comprising code, executable by the processor, for implementing a method comprising:receiving a request for a verification value associated with a portable consumer device associated with a user from a user computer over a communications network, and an encrypted message encrypted using a key stored in a security module of a verification token, the verification token in communication with the user computer, the request comprising identification information pertaining to the portable consumer device;applying at least one validation test pertaining to the received request, wherein the validation test comprises validating the encrypted message from the user computer; andsending after the at least one validation test is passed, a verification value over the communications network to the verification token or to an entity configured to forward the verification value to the verification token. 21. The server computer of claim 20 wherein the method further comprises: receiving a serial number of the verification token; andcomparing the received serial number with serial numbers of suspicious tokens. 22. The server computer of claim 20 wherein the received identification information includes an account number associated with the portable consumer device and a digital fingerprint, and wherein the method further comprises: obtaining a valid digital fingerprint; andcomparing the digital fingerprint in the received identification information to the valid digital fingerprint. 23. The server computer of claim 20 wherein the method further comprises: encrypting or encoding the verification value before sending the value. 24. The server computer of claim 20 wherein the method further comprises: sending, if the at least one validation test is passed, a dynamic account number to the verification token or to the entity configured to forward the dynamic account number to the verification token. 25. The server computer of claim 20, wherein the method further comprises: sending, if the at least one validation test is passed, the verification value and a dynamic account number to a payment processing network. 26. The method of claim 1, wherein the verification value is a cryptogram, and wherein the encrypted message is in the request for the verification value.
연구과제 타임라인
LOADING...
LOADING...
LOADING...
LOADING...
LOADING...
이 특허에 인용된 특허 (267)
Raj, Thanigaivel Ashwin; Fuentes, Jacob Saul; Tullis, John; Shastry, Vishwanath, Alias management and value transfer claim processing.
Asghari Kamrani,Nader; Asghari Kamrani,Kamran, Direct authentication and authorization system and method for trusted network of financial institutions.
Ziarno Witold A. (4519 S. St. Louis Ave. Chicago IL 60632), Display cursor controlling device for reading card information from an information bearing credit or debit card.
Mullen, Jeffrey David, Dynamic credit card with magnetic stripe and embedded encoder and methods for using the same to provide a copy-proof credit card.
Mullen, Jeffrey David, Dynamic credit card with magnetic stripe and embedded encoder and methods for using the same to provide a copy-proof credit card.
Mullen, Jeffrey David, Dynamic credit card with magnetic stripe and embedded encoder and methods for using the same to provide a copy-proof credit card.
Franklin D. Chase ; Rosen Daniel ; Benaloh Josh ; Simon Daniel R., Electronic online commerce card with customer generated transaction proxy number for online transactions.
Bierbaum, Christopher J.; Cope, Warren B.; Katzer, Robin D.; Paczkowski, Lyle W., Electronic payment using a proxy account number stored in a secure element.
Stolfo,Salvotore J.; Yemini,Yechiam; Shaykin,Leonard P., Electronic purchase of goods over a communications network including physical delivery while securing private and personal information of the purchasing party.
Goldstein,Seth; Mahajan,Rajesh; Muppirala,Prakash; Quigley,Benjamin L.; Rawat,Jai; Subramanya,Venkatesh; Tran,Vincent, Intelligent method of order completion in an e-commerce environment based on availability of stored billing information.
Hirai Chiaki (Tokyo JPX) Kondo Hidefumi (Yamato JPX), Method and apparatus for completing a partially completed document in accordance with a blank form from data automatical.
Bajikar,Sundeep M.; Girard,Luke E.; Silvester,Kelan C.; McKeen,Francis X., Method and system and authenticating a user of a computer system that has a trusted platform module (TPM).
DeMello, Marco A.; Keely, Leroy B.; Byrum, Frank D.; Yaacovi, Yoram; Hughes, Kathryn E., Method and system for binding enhanced software features to a persona.
Talbert, Vincent W.; Keithly, Thomas H.; Hirschfeld, Daniel A.; Lavelle, Mark L., Method and system for completing a transaction between a customer and a merchant.
Fisher, Douglas; Dominguez, Benedicto H.; Lee, Timothy Mu-Chu, Method and system for performing two factor authentication in mail order and telephone order transactions.
Mutschler ; III Eugene Otto ; Stefaniak Joseph Peter, Method for dynamically embedding objects stored in a web server within HTML for display by a web browser.
Jonathan Shem-Ur IL; Anat Wolfson IL; Shaul Bar-Lev IL; Roni Sivan IL; Ehud Kaahtan IL, Method for preventing unauthorized use of credit cards in remote payments and an optional supplemental-code card for use therein.
Fung, Daniel Y.; Evans, Stephen C., Method, system and computer readable medium for web site account and e-commerce management from a central location.
Veteläinen,Altti Pekka Henrik, Methods, system, and computer readable medium for user data entry, at a terminal, for communication to a remote destination.
Khan,Mohammad; Kumar,Pradeep; Vijayshankar,Roshan; Liu,Ming Li; Narayanan,Narendra, Methods, systems and computer program products for over the air (OTA) provisioning of soft cards on devices with wireless communications capabilities.
Bhambri, Vikram; Walsh, Deirdre L.; Sausville, Paul C.; Biyani, Raj; Button, Thomas L.; Nolan, Sean; Warren, Susan; Hempey, Matthew D., Payment information security for multi-merchant purchasing environment for downloadable products.
Baker, David Preston; Marshall, III, Stanley N.; Hussein, Mohamed Reza; Hiller, Matthew Eric; Tung, Chin Pang; Mitchell, Andrew Robert, Secure storage of payment information on client devices.
Smith Robert Neal, Smart card authentication system comprising means for converting user identification and digital signature to pointing device position data and vice versa using lut.
Berardi, Michael J.; Bliman, Michal; Bonalle, David S.; Saunders, Peter D., System and method for encoding information in magnetic stripe format for use in radio frequency identification transactions.
Snapper,Erik J.; Jiggins,Julian P.; Shyam,Bharat; Partovi,Hadi; Berman,Eric R.; Freedman,Steven J.; Allard,James E.; Chang,Frank Z.; Proteau,Stephen P.; Jorgenson,Clint C., System and method for populating forms with previously used data values.
Chien, Emily; Sanchez, Trish; Saunders, Daniela; Wiseman, Jill; Balagopal, C R; Kinderknecht, Al; Parson, Jon W.; Preston, Ray, System and method for using loyalty rewards as currency.
Chien, Emily; Sanchez, Trish; Saunders, Daniela; Wiseman, Jill; Balagopal, C. R.; Kinderknecht, Al; Parson, Jon W.; Preston, Ray, System and method for using loyalty rewards as currency.
Chien, Emily; Sanchez, Trish; Saunders, Daniela; Wiseman, Jill; Balagopal, C. R.; Kinderknecht, Al; Parson, Jon W.; Preston, Ray, System and method for using loyalty rewards as currency.
Hughes Thomas S. (31310 Eagle Haven Cir. ; Ste. 100 Rancho Palos Verdes CA 90274) Molina Gustavo (24292 Rhona Dr. Laguna Niguel CA 92656), System for remote purchase payment transactions and remote bill payments.
Saunders, Peter D.; Leggatt, Lesley; Chuang, I-Hsin; Oh, John J., Systems, methods and computer program products for performing mass transit merchant transactions.
Hoffman Ned (Berkeley CA) Pare ; Jr. David F. (Berkeley CA) Lee Jonathan A. (Berkeley CA), Tokenless identification system for authorization of electronic transactions and electronic transmissions.
von Behren, Rob; Wall, Jonathan; Muehlberg, Alexej; Meyn, Hauke, Wallet application for interacting with a secure element application without a trusted server for authentication.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.