The present invention relates to a method, system and computer program for authorizing an electronic payment request
In an increasingly digital world, people today rarely use cash for making payments. Instead, they tend to use bank cards, credit cards, debit cards or cash cards for making payments. These payment systems are relatively secure because they employ extensive security mechanisms. In particular, in most of these payment systems, a secret code must be provided by a purchaser and authenticated by a bank, to authorise the movement of funds from the purchaser's account to the vendor.
Recent years have seen rapid growth in the use of credit cards and/or debit cards to purchase merchandise at point-of-sale locations, through public telephones or over the Internet. During these purchase transactions some personal data is publicly released, albeit in a very limited way. However, in view of the inherently public nature of telephone networks and/or the Internet, this personal information is at risk of interception.
Identity theft is recognised as an increasingly important crime, wherein, despite all of the security checks used to authenticate and protect personal information, a credit/debit card may be cloned and used by malicious persons to rob money from the bank account of a legitimate user. In fact, in view of the almost instantaneous nature of today's electronic transactions, even temporary ownership of a credit (or other payment) card could allow a malicious user to make a large number of payments either on the Internet or by physically accessing places which accept such cards.
US patent application No. US2006/0131390 describes a system for providing a notification of a pending transaction request and obtaining an authorization from a cardholder. The system includes a phone number of a mobile device assigned to receive an authorization request for a respective account. When a transaction request is received, the system identifies the phone number of the mobile device assigned to receive authorization request messages for the account requesting the transaction. The system generates and transmits an authorization request message to the determined phone number; and a reply message is returned from the mobile device which explicitly indicates if the user of the mobile device approves or refuses this transaction.
In a similar vein, US patent application No US2004/0177040 describes a method for securing a card transaction using a mobile device which is capable of preventing the card from being embezzled and counterfeited.
Both US2006/0131390 and US2004/0177040 effectively use a mobile device to send an authorization request and await a reply message to authorise a payment request. Thus, these systems require:
According to the invention, there is provided a method, system and computer product for authorizing an electronic payment request. A first code is requested from a user on receipt of a payment request made with a payment card configured with one or more details of one or more devices in the possession of one or more owners of the card. The payment is refused in the event the first code does not substantially match a predefined second code. A third code is requested from the one or more devices with whose details the payment card is configured if the first code substantially matches the second code. The third code is compared with a predefined fourth code. The payment is refused in the event the third code does not substantially match the fourth code, while the payment is authorized in the event the third code substantially matches the fourth code.
An embodiment of the invention is herein described, by way of example, only with reference to the accompanying figures in which:
For simplicity, credit, debit, bank and cash cards etc. will be generically known henceforth as “payment cards”. One of the main problems with traditional mechanisms for authenticating a payment card is that these mechanisms all employ codes (or keys) that reside on the payment card itself. Thus, a malicious and technical expert could easily clone a payment card or otherwise attack a user's account to gain access.
The preferred embodiment ensures that the authentication of a debit/credit card is not solely reliant upon the card itself. Instead, the preferred embodiment provides an additional layer of security into an authentication process, wherein this additional layer of security is executed through an external device owned by the purchaser, before an electronic payment is authorized.
The preferred embodiment minimally interferes with the existing security structures of banks and/or vendors. In particular, the preferred embodiment does not alter traditional authentication mechanisms. Instead, the new functionality of the preferred embodiment can be simply plugged into an existing traditional security mechanism and sold as a new service by a bank.
The preferred embodiment can also leverage a user's personal information (and user's external device) to advise a user of an authentication failure, thereby providing almost instantaneous warning to the user of a potential breach in their security.
In contrast, with the aforementioned prior art documents, the preferred embodiment can leverage the following technologies:
(a) RFID technology to read an authorization profile from a user-owned tag;
(b) a bluetooth connection that is capable of:
(c) Infra-red communication, or more particularly, an infrared data association (IrDA) connection to read the authorization code from a user-owned device/tag.
Moreover, the preferred embodiment can leverage any type of profile stored in a user's mobile device to perform a check on a payment transaction. In particular, the preferred embodiment can automatically check a specific payment against a defined user-profile (e.g., an expenditure threshold for a particular type of shopping or a daily expenditure threshold, etc.).
Referring to
In support of the above, one preferred embodiment includes additional information into a traditional payment card. The additional information includes features that can be used to verify the identity of the registered owner of the card. For example, the additional information could include: a number of the registered owners mobile phone; a unique International Mobile Equipment Identity (IMEI) code of the registered owner's mobile phone; and an identifier of an RFID tag carried by the registered owner.
To process this additional information, the preferred embodiment includes a pluggable component, which in use is installed into a payment system. The pluggable component is adapted to check the identity of the user of a payment card based on the additional information embedded within the card.
Referring to
On receiving 12 a payment request, made with the user's payment card, the preferred embodiment verifies that the payment card is configured for the dual-layer authentication process. In the event the payment card is not configured for dual-layer authentication, the preferred embodiment performs the traditional steps of authenticating 14 the card in a payment request and authorizing 18 the payment in the event the card is authenticated 16 and otherwise refusing 20 the payment.
In the event the user's payment card is configured for dual-layer authentication, the preferred embodiment performs most of the traditional authentication 14 steps mentioned above (including refusing 20 payment in the event the card is not authenticated). However, in contrast with the traditional authentication process, which would simply make the payment if the card is authorized 18, the preferred embodiment automatically (or on reaching a preconfigured threshold) performs an additional authentication 22 step, which could comprise inter alia, the following operations:
In the event, the secondary authentication step is successful, the preferred embodiment allows the payment to be made. Otherwise, the preferred embodiment refuses the payment request. The preferred embodiment may also issue a warning message to the phone identified within the card, in the event of a failed attempt to make a payment using the card. An alternate embodiment performs the steps in the reverse order, so that the local check is performed first (i.e. so that no external connection is required).
While the above discussion has described the additional authentication step as following the traditional normal authentication step, nonetheless, it will be understood that the preferred embodiment is not limited to this particular implementation, in particular, the preferred embodiment may perform the additional authentication step before the traditional authentication steps.
Referring to
Similar considerations apply if the system has a different topology, or it is based on other networks. Alternatively, the computers have a different structure, including equivalent units, or consist of other data processing entities (such as PDAs, mobile phones and the like).
Alterations and modifications may be made to the above without departing from the scope of the invention.
Number | Date | Country | Kind |
---|---|---|---|
08158820.4 | Jun 2008 | EP | regional |